FITSP - Manager Questions Newest Actual Exam With Complete Questions And
Correct Detailed Answers (Verified Answers) |Already Graded A+
this legislation requires Federal agencies to develop document and implement an agency wide
information security program - (Correct Answer)-Clinger-Cohen
What are the six steps of the RMF - (Correct Answer)-Categorize
Select
Implement
Assess
Authorize
Monitor
What is the term used to evaluate operational information systems against the RMF, to determine
the security controls in place and the requirements to mitigate risk at a acceptable level? -
(Correct Answer)-Gap Anaylsis
What is the legal precedence - (Correct Answer)-Consitution
Public Law
Executive Orders/Presidential Directives
Processing Standards
Agency Regulations
State / Local Laws
Industry Standards
, 2
What is the Privacy Act - 1974 four basic policy objectives? - (Correct Answer)-Restict
disclosure
Increased rights of access to agency records
Grant individuals the rights to seek amendment
Establish a code of fair information practices
What is the purpose of Computer Fraud and Abuse Act (CFAA) - 1986? - (Correct Answer)-
Intended to reduce cracking of computer systems and to address Federal computer-related
offenses.
Governs case with a compelling Federal interest.
What computer in theory are covered by the CFAA and defined as protected computers? -
(Correct Answer)-Exclusively used by a financial institution or the US goverment, or any
computer when the conduct constituting the offense affect the computer use by or for the
financial institution or the goverement
Used in or affecting interstate or foreign commerce or communication, including a computer
located outside the US.
What does the Electronic Communications Privacy Act of 1986 (ECPA) restrict, prohibit and
permit? - (Correct Answer)-Restict wire taps from telephone call to include transmissions of
electronic data by computer
Prohibit access to store electronic communications
, 3
Permits the tracing of telephone communications
What superseded the Computer Security Act of 1987? - (Correct Answer)-FISMA of 2002
Why was the the Computer Security Act - 1987 passed? - (Correct Answer)-To improved the
security and privacy of sensitive information in Federal systems, and to establish a minimum
acceptable security practices for such systems.
What does the Computer Security Act - 1987 assign, require and mandate. - (Correct Answer)-
Assigned NIST formerly know as National Bureau of Standards) to develop standard of
minumum acceptable practices with help of the NSA
Required the establishment of security policies of Federal computer system that contain sensitive
information
Mandated security awareness training for Federal employees that use those systems
What's another name for the Information Technology Managment Reform Act - 1996? - (Correct
Answer)-Clinger-Cohen Act
What did the Clinger-Cohen Act do? - (Correct Answer)-Implemented the Capital Planning
Investment Control (CPIC) IT budget planning process
, 4
Granted OMB authority to oversee the acquisition,use,and disposal of IT by the Federal
Goverment
Established CIO positions in every department and agency in the Federal Goverment
Established the CIO council with 28 major agencies and OMB
Defined and IT architecture (ITA) for evolving and acquiring IT
What is the "at risk" category under Clinger-Cohen act supported by OMB? - (Correct Answer)-
OMB grades IT projects and funds accordingly - the "at risk" category indicates. "This risk of
not receiving initial or continued funding for the project.
What was the first official public declaration of what constitues a National Security System? -
(Correct Answer)-Clinger-Cohen Act (CCA)
According to the CCA, what is considered a National Security System (NSS)? - (Correct
Answer)-If the system in involved the following
Involves intelligence activities
Involves cryptologic activities related to national security
Involves command and controls of military forces
Involves equipment that is an integral part of a weapon or weapons system
Is critical to the direct fulfillment of milatary or intelligence mission
What is Goverment Information Security Reform Act (GISRA) 2000 - (Correct Answer)-The
Government Information Security Reform Act (formerly known as the Thompson-Liebermann
Act) is a federal law that required U.S. government agencies to implement an information
Correct Detailed Answers (Verified Answers) |Already Graded A+
this legislation requires Federal agencies to develop document and implement an agency wide
information security program - (Correct Answer)-Clinger-Cohen
What are the six steps of the RMF - (Correct Answer)-Categorize
Select
Implement
Assess
Authorize
Monitor
What is the term used to evaluate operational information systems against the RMF, to determine
the security controls in place and the requirements to mitigate risk at a acceptable level? -
(Correct Answer)-Gap Anaylsis
What is the legal precedence - (Correct Answer)-Consitution
Public Law
Executive Orders/Presidential Directives
Processing Standards
Agency Regulations
State / Local Laws
Industry Standards
, 2
What is the Privacy Act - 1974 four basic policy objectives? - (Correct Answer)-Restict
disclosure
Increased rights of access to agency records
Grant individuals the rights to seek amendment
Establish a code of fair information practices
What is the purpose of Computer Fraud and Abuse Act (CFAA) - 1986? - (Correct Answer)-
Intended to reduce cracking of computer systems and to address Federal computer-related
offenses.
Governs case with a compelling Federal interest.
What computer in theory are covered by the CFAA and defined as protected computers? -
(Correct Answer)-Exclusively used by a financial institution or the US goverment, or any
computer when the conduct constituting the offense affect the computer use by or for the
financial institution or the goverement
Used in or affecting interstate or foreign commerce or communication, including a computer
located outside the US.
What does the Electronic Communications Privacy Act of 1986 (ECPA) restrict, prohibit and
permit? - (Correct Answer)-Restict wire taps from telephone call to include transmissions of
electronic data by computer
Prohibit access to store electronic communications
, 3
Permits the tracing of telephone communications
What superseded the Computer Security Act of 1987? - (Correct Answer)-FISMA of 2002
Why was the the Computer Security Act - 1987 passed? - (Correct Answer)-To improved the
security and privacy of sensitive information in Federal systems, and to establish a minimum
acceptable security practices for such systems.
What does the Computer Security Act - 1987 assign, require and mandate. - (Correct Answer)-
Assigned NIST formerly know as National Bureau of Standards) to develop standard of
minumum acceptable practices with help of the NSA
Required the establishment of security policies of Federal computer system that contain sensitive
information
Mandated security awareness training for Federal employees that use those systems
What's another name for the Information Technology Managment Reform Act - 1996? - (Correct
Answer)-Clinger-Cohen Act
What did the Clinger-Cohen Act do? - (Correct Answer)-Implemented the Capital Planning
Investment Control (CPIC) IT budget planning process
, 4
Granted OMB authority to oversee the acquisition,use,and disposal of IT by the Federal
Goverment
Established CIO positions in every department and agency in the Federal Goverment
Established the CIO council with 28 major agencies and OMB
Defined and IT architecture (ITA) for evolving and acquiring IT
What is the "at risk" category under Clinger-Cohen act supported by OMB? - (Correct Answer)-
OMB grades IT projects and funds accordingly - the "at risk" category indicates. "This risk of
not receiving initial or continued funding for the project.
What was the first official public declaration of what constitues a National Security System? -
(Correct Answer)-Clinger-Cohen Act (CCA)
According to the CCA, what is considered a National Security System (NSS)? - (Correct
Answer)-If the system in involved the following
Involves intelligence activities
Involves cryptologic activities related to national security
Involves command and controls of military forces
Involves equipment that is an integral part of a weapon or weapons system
Is critical to the direct fulfillment of milatary or intelligence mission
What is Goverment Information Security Reform Act (GISRA) 2000 - (Correct Answer)-The
Government Information Security Reform Act (formerly known as the Thompson-Liebermann
Act) is a federal law that required U.S. government agencies to implement an information