Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

RMF CHAPTER 8: STEP 4 ASSESS WITH COMPLETE SOLUTIONS

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
26-04-2025
Written in
2024/2025

FIPS 200/NIST SP 800-53 (Specification of Security Controls) NIST SP 800-53A (Assessment of Security Control Effectiveness) - ANSWER-When Assessing Security Controls, agencies are required to follow what publication for the specification of security controls; and what publication for the assessment of security control effectiveness? Satisfactory or Other - ANSWER-An assessment can be either ____________ or ____________; nothing else. Compliant or Non-compliant - ANSWER-An assessment can be deemed Satisfactory or Other. The DoD uses a different set of terms, what are they? - Scope - Method - Depth - Breath - ANSWER-What are the critical factors in assessments? - Prepare for security control assessment. - Establish security control assessment plan. - Determine security control effectiveness. - Develop initial security assessment report. - Perform initial remediation actions.

Show more Read less
Institution
RMF CHAPTER 8: STEP 4 ASSESS
Course
RMF CHAPTER 8: STEP 4 ASSESS

Content preview

RMF CHAPTER 8: STEP 4 ASSESS WITH
COMPLETE SOLUTIONS
FIPS 200/NIST SP 800-53 (Specification of Security Controls)

NIST SP 800-53A (Assessment of Security Control Effectiveness) - ANSWER-When
Assessing Security Controls, agencies are required to follow what publication for the
specification of security controls; and what publication for the assessment of security
control effectiveness?

Satisfactory or Other - ANSWER-An assessment can be either ____________ or
____________; nothing else.

Compliant or Non-compliant - ANSWER-An assessment can be deemed Satisfactory or
Other. The DoD uses a different set of terms, what are they?

- Scope
- Method
- Depth
- Breath - ANSWER-What are the critical factors in assessments?

- Prepare for security control assessment.
- Establish security control assessment plan.
- Determine security control effectiveness.
- Develop initial security assessment report.
- Perform initial remediation actions.
- Develop final security assessment report and addendum. - ANSWER-What are the 6
key areas for Assessment?

Security Assessment Plan - ANSWER-What defines methods and procedures for
testing, evaluating, and assessing various security controls in a system; includes Rules
of Engagement (ROE) document?

Rules of Engagement (ROE) document - ANSWER-What is a document that provides
oversight and approval for assessment and internal & external testing, including
penetration testing?

NIST SP 800-115 - ANSWER-Organizations should develop a Security Assessment
Plan as provided for in what publication?

1. Develop a Security Assessment Policy
2. Prioritize and Schedule Assessment
3. Select and Customize Techniques

, 4. Determine Logistics of Assessment
5. Develop the Assessment Plan
6. Address Legal Considerations - ANSWER-As provided by NIST Special Publication
800-115, NIST lays out recommendations for developing an Assessment plan. What are
the recommendations?

- Organizational requirements with which assessments must comply.
- Appropriate roles and responsibilities (at a minimum, for those individuals approving
and executing assessments).
- Adherence to established methodology.
- Assessment frequency.
- Documentation requirements, such as assessment plans and assessment results. -
ANSWER-What should the Security Assessment Policy in the Security Assessment
Plan address when developing it?

- What systems should undergo assessments.
- How often assessments should be done. - ANSWER-What should the Prioritize and
Schedule Assessment in the Security Assessment Plan address?

- System categorization
- Expected benefits
- Scheduling requirements
- When required by law or regulation
- Resource availability - ANSWER-When Prioritizing and Scheduling assessments,
prioritization should be based on what?

- An organization should first determine its assessment objectives (such as verifying
compliance, verifying system's security as part of C&A activities, identifying exploitable
vulnerabilities, or evaluating Intrusion Detection Systems).

- The organization should select the classes of techniques (e.g., review, target
identification and analysis, target vulnerability validation) to be used to obtain
information that supports those objectives, and specific techniques within each selected
class.

- Resources and skill available.
- Consider risk involved in selecting techniques. - ANSWER-What should the Select and
Customize Techniques in the Security Assessment Plan address?

- Identifying all required resources, including the assessment team.
- Selecting environments and locations from which to perform the assessment.
- Acquiring and configuring all necessary technical tools. - ANSWER-What should the
Determine Logistics of Assessment in the Security Assessment Plan address?

- Documents the activities planned for an assessment and other related information.
- To provide the rules and boundaries to which assessors must adhere.

Written for

Institution
RMF CHAPTER 8: STEP 4 ASSESS
Course
RMF CHAPTER 8: STEP 4 ASSESS

Document information

Uploaded on
April 26, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Thumbnail
Package deal
RISK MANAGEMENT FRAMEWORK(RMF) EXAM PACKAGE DEAL- COMPLETE BUNDLE PACK!!
-
21 2025
$ 386.29 More info

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTutor1 West Virginia University
View profile
Follow You need to be logged in order to follow users or courses
Sold
1673
Member since
3 year
Number of followers
1073
Documents
18137
Last sold
1 week ago
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

455 reviews

5
215
4
78
3
91
2
21
1
50

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions