100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

FITSP - Manager Questions Newest Actual Exam With Complete Questions And Correct Detailed Answers (Verified Answers) |Already Graded A+

Rating
-
Sold
-
Pages
64
Grade
A+
Uploaded on
08-01-2026
Written in
2025/2026

FITSP - Manager Questions Newest Actual Exam With Complete Questions And Correct Detailed Answers (Verified Answers) |Already Graded A+

Institution
FITSP - Manager
Course
FITSP - Manager











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
FITSP - Manager
Course
FITSP - Manager

Document information

Uploaded on
January 8, 2026
Number of pages
64
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

FITSP - Manager Questions Newest Actual Exam With Complete Questions And
Correct Detailed Answers (Verified Answers) |Already Graded A+


this legislation requires Federal agencies to develop document and implement an agency wide
information security program - (Correct Answer)-Clinger-Cohen



What are the six steps of the RMF - (Correct Answer)-Categorize

Select

Implement

Assess

Authorize

Monitor



What is the term used to evaluate operational information systems against the RMF, to determine
the security controls in place and the requirements to mitigate risk at a acceptable level? -
(Correct Answer)-Gap Anaylsis



What is the legal precedence - (Correct Answer)-Consitution

Public Law

Executive Orders/Presidential Directives

Processing Standards

Agency Regulations

State / Local Laws

Industry Standards

, 2



What is the Privacy Act - 1974 four basic policy objectives? - (Correct Answer)-Restict
disclosure

Increased rights of access to agency records

Grant individuals the rights to seek amendment

Establish a code of fair information practices



What is the purpose of Computer Fraud and Abuse Act (CFAA) - 1986? - (Correct Answer)-
Intended to reduce cracking of computer systems and to address Federal computer-related
offenses.



Governs case with a compelling Federal interest.



What computer in theory are covered by the CFAA and defined as protected computers? -
(Correct Answer)-Exclusively used by a financial institution or the US goverment, or any
computer when the conduct constituting the offense affect the computer use by or for the
financial institution or the goverement



Used in or affecting interstate or foreign commerce or communication, including a computer
located outside the US.



What does the Electronic Communications Privacy Act of 1986 (ECPA) restrict, prohibit and
permit? - (Correct Answer)-Restict wire taps from telephone call to include transmissions of
electronic data by computer



Prohibit access to store electronic communications

, 3




Permits the tracing of telephone communications



What superseded the Computer Security Act of 1987? - (Correct Answer)-FISMA of 2002



Why was the the Computer Security Act - 1987 passed? - (Correct Answer)-To improved the
security and privacy of sensitive information in Federal systems, and to establish a minimum
acceptable security practices for such systems.



What does the Computer Security Act - 1987 assign, require and mandate. - (Correct Answer)-
Assigned NIST formerly know as National Bureau of Standards) to develop standard of
minumum acceptable practices with help of the NSA



Required the establishment of security policies of Federal computer system that contain sensitive
information



Mandated security awareness training for Federal employees that use those systems



What's another name for the Information Technology Managment Reform Act - 1996? - (Correct
Answer)-Clinger-Cohen Act



What did the Clinger-Cohen Act do? - (Correct Answer)-Implemented the Capital Planning
Investment Control (CPIC) IT budget planning process

, 4



Granted OMB authority to oversee the acquisition,use,and disposal of IT by the Federal
Goverment

Established CIO positions in every department and agency in the Federal Goverment

Established the CIO council with 28 major agencies and OMB

Defined and IT architecture (ITA) for evolving and acquiring IT



What is the "at risk" category under Clinger-Cohen act supported by OMB? - (Correct Answer)-
OMB grades IT projects and funds accordingly - the "at risk" category indicates. "This risk of
not receiving initial or continued funding for the project.



What was the first official public declaration of what constitues a National Security System? -
(Correct Answer)-Clinger-Cohen Act (CCA)



According to the CCA, what is considered a National Security System (NSS)? - (Correct
Answer)-If the system in involved the following

Involves intelligence activities

Involves cryptologic activities related to national security

Involves command and controls of military forces

Involves equipment that is an integral part of a weapon or weapons system

Is critical to the direct fulfillment of milatary or intelligence mission



What is Goverment Information Security Reform Act (GISRA) 2000 - (Correct Answer)-The
Government Information Security Reform Act (formerly known as the Thompson-Liebermann
Act) is a federal law that required U.S. government agencies to implement an information

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
DoctorGriffin Maryland University
View profile
Follow You need to be logged in order to follow users or courses
Sold
2803
Member since
6 months
Number of followers
17
Documents
1351
Last sold
6 days ago

4.9

183 reviews

5
167
4
15
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions