100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

FITSP Manager Next Generation questions and answers with solutions

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
29-05-2025
Written in
2024/2025

FITSP Manager Next Generation questions and answers with solutions

Institution
FITSP
Course
FITSP










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
FITSP
Course
FITSP

Document information

Uploaded on
May 29, 2025
Number of pages
18
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

QA from FITSP Manager Next Generation
The following legislation requires federal agencies to develop, document and implement an
agency-wide information security program: - ANSWER FISMA



The following legislation requires each agency with an Inspector General to conduct an annual
evaluation of agency's information security program, or to appoint an independent external
auditor, to conduct the evaluation on their behalf - ANSWER E-Government Act of 2002, Section
208



The following OMB guidance established the requirement for federal agencies to review the
security controls in each system when significant modifications are made to the system, or at
least every three years. This guidance also requires federal agencies to re-authorize information
systems every three years - ANSWER OMB Circular No. A-130, Appendix III, Security of Federal
Automated Information Resources



The Federal Information Security Modernization Act of 2014 (FISMA 2014) formally assigns
information security responsibilities to which of the following agencies/departments (select
two): - ANSWER DHS and OMB



Current regulations still require the re-authorization of federal information systems at least
every three years. - ANSWER True



The following OMB guidance established the requirement for federal agencies to review the
security controls in each system when significant modifications are made to the system, but at
least every three years. This guidance also requires federal agencies to re-authorize information
systems every three years. - ANSWER OMB Circular No. A-130, Appendix III, Security of Federal
Automated Information Resources



As part of monitoring the security posture of agency desktops, OMB requires federal agencies to
use vulnerability scanning tools that leverage the ________ protocol. - ANSWER SCAP

,Following the loss of 26 million records containing PII at the Department of Veteran Affairs,
OMB released M-06-16 Protection of Sensitive Agency Information. This memo required all of
the following EXCEPT: - ANSWER Encryption of all server backup tapes



This Homeland Security Presidential Directive requires all federal agencies to adopt a standard,
government wide card to reduce identity fraud, protect personal privacy, and provide for
authentication. This directive was called: - ANSWER HSPD-12 - Common Identification Standard



Current regulations still require the re-authorization of federal information systems at least
every three years. - ANSWER True



What elements are components of an information system? - ANSWER Hardware and software,
Interconnected systems, People



What is the main consideration in determining the scope of authorization for information
systems? - ANSWER System Boundaries



Which approach involves continually balancing the protection of agency information and assets
with the cost of security controls and mitigation strategies? - ANSWER Risk Management
Approach



What establishes the scope of protection for organizational information systems? - ANSWER
System Boundaries



List the 7 steps of the RMF process? - ANSWER Prepare, Categorize, Select, Implement, Assess,
Authorize, Monitor



During what phase of the SDLC should the organization consider the security requirements? -
ANSWER Initiation Phase / Development / Acquisition Phase

, Security Reauthorizations are conducted during which phase of the SDLC? - ANSWER
Operations/Maintenance



What NIST Special Publication superseded the original Special Publication 800-30 as the primary
source for guidance on risk management? - ANSWER SP 800-39



Applying the first three steps in the RMF to legacy systems can be viewed as a
____________________________ to determine if the necessary and sufficient security controls
have been appropriately selected and allocated. - ANSWER Gap Analysis



Which of the following is not a key document to be updated as part of ISCM? - ANSWER SCAP



Security status reporting is: - ANSWER Event driven, Time driven



Which of these is not one of the steps of system disposal? - ANSWER Documentation



Which of the following SCAP specifications provide a standard naming and dictionary of system
configuration issues? - ANSWER CPE



Which of these is not a resource for the National Vulnerability Database (NVB)? - ANSWER
MAEC



Vulnerability and Patch Management, Event and Incident Management, and Malware Detection
are all examples of which of the following? - ANSWER Security Automation Domains



Why do organizations look for automated solutions for ISCM? - ANSWER Lower costs, enhance
efficiency, improve reliability

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Performance Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
319
Member since
1 year
Number of followers
36
Documents
15290
Last sold
1 day ago

Get everything you need to ace your classes in one place. We offer instant downloads of test banks, easy-to-read study guides, step-by-step homework help, and sample research papers to save you hours of work. Whether you're prepping for a big final or stuck on a tough assignment, our resources give you the exact shortcuts and practice you need to boost your grades fast. Stop stressing and get the competitive edge you need to succeed right now

Read more Read less
4.4

217 reviews

5
128
4
60
3
19
2
4
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions