100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

FITSP-M 2 questions and answers with solutions

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
29-05-2025
Written in
2024/2025

FITSP-M 2 questions and answers with solutions

Institution
FITSP
Course
FITSP










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
FITSP
Course
FITSP

Document information

Uploaded on
May 29, 2025
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

FITSP-M 2 questions and answers with
solutions
CIO - ANSWER Most senior executive in an enterprise responsible for IT and computer systems
that support enterprise goals.



Chief Information Security Officer (CISO) - ANSWER Senior executive responsible for establishing
and maintaining the enterprise vision, strategy, and program to ensure information assets are
adequately protected.



Directs staff in identifying, developing, implementing, and maintaining processes across the
organization to reduce information and IT risks.



Risk Executive - ANSWER An individual or group within an organization that helps to ensure that
risk-related considerations for individual information systems, to include authorization
decisions, are viewed from an organization-wide perspective with regard to the overall strategic
goals and objectives.



Who designates a Senior Agency Information Security Officer (SAISO)? - ANSWER CIO



What is the CIO responsible for? - ANSWER -Designating the SAISO

-Developing and maintaining security policies, procedures, and control techniques

-Overseeing personnel with significant responsibilities for information security and ensuring
adequate training

-Assisting senior organizational officials concerning their security responsibilities

-Reporting annually to the Agency Head on overall effectiveness of the organizations
information security program

,Who determines the appropriate allocation of resources dedicated to the protection of
information systems supporting the organizations' missions and business functions? - ANSWER
The CIO and AO



Authorizing Official - ANSWER -A senior (federal) official or executive with the authority to
formally assume responsibility for operating an information system at an acceptable level of risk
to organizational operations.

-Has budgetary oversight

-Must be a government employee

-Assumes risk by signing ATO



Senior Agency Information Security Officer - ANSWER Official responsible for carrying out the
Chief Information Officer responsibilities under FISMA and serving as the Chief Information
Officer's primary liaison to the agency's authorizing officials, information system owners, and
information system security officers. Referred to as the CISO in some organizations



SecCM - ANSWER Security Focused Configuration Management



What are the three tiers of Organization Wide Risk Management and what roles are aligned to
them? - ANSWER Tier 1. Organization (Risk Executive)

Tier 2. Mission/Business Processes (Information Security Architect)

Tier 3. Information Systems (Information System Security Engineer)



Information System Security Officer - ANSWER Individual assigned responsibility by the senior
agency information security officer, authorizing official, management official, or information
system owner for ensuring that the appropriate operational security posture is maintained for
an information system or program.



Information System Security Engineer - ANSWER Individual assigned responsibility for
conducting information system security engineering activities.

, HIPAA and HITECH - ANSWER Protects/secures Personal Health Information (PHI).

Controls need to be in place to secure PHI during the collection, storing, or processing of data.

Used by any organization that is collection, storing, or processing PHI (hospitals, medial
providers, insurance companies, etc.)



HITECH came later and enhances HIPAA



Where are deficiencies and corrective actions documented? - ANSWER POAMS, which are kept
even after closed. If the issue happens again, the POAM is reopened.



M-06-19 - ANSWER Required potential breach of PII data to be reported within one hour of
discovery



All CONMON relies on Security Content Automation Protocol (SCAP).... True or False? - ANSWER
True



Who issues binding operational directives (BODs)? - ANSWER DHS



FISMA 2002 - ANSWER -Emphasized risk based policy for cost effective security.

-Requires agency program officials, CIOs, and IGs to conduct annual reviews of the Agency's
Security Information Program and report them to OMB.



FISMA 2014 - ANSWER Replaced subchapters 2 and 3 of FISMA 2002.

Primary purposes include:

-Assign responsibilities to the Secretary of Homeland Security, as that department did not exist
at the time of FISMA 2002.

-Formalized reporting of information security incidents and privacy breaches

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Performance Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
319
Member since
1 year
Number of followers
36
Documents
15290
Last sold
1 day ago

Get everything you need to ace your classes in one place. We offer instant downloads of test banks, easy-to-read study guides, step-by-step homework help, and sample research papers to save you hours of work. Whether you're prepping for a big final or stuck on a tough assignment, our resources give you the exact shortcuts and practice you need to boost your grades fast. Stop stressing and get the competitive edge you need to succeed right now

Read more Read less
4.4

217 reviews

5
128
4
60
3
19
2
4
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions