What are the phases of SDLC correct answers planning, system analysis & requirements, system
design, development, integration & testing, implementation, operation & maintenance
Engineering Principles for Information Technology Security correct answers NIST SP 800-27a
Guidance for Preparing and Submitting Security Plans of
Action and Milestones (POA&M) correct answers OMB M-02-01
Defines 8 system security principles and 14 practices correct answers NIST SP 800-14
The Congress declares that improving the security and privacy
of sensitive information in Federal computer systems is in the
public interest, and hereby creates a means for establishing
minimum acceptable security practices for such systems correct answers Computer Security Act
of 1987
Entity Authentication Using Public Key Cryptography correct answers FIPS 196
Digital Signature Standard correct answers FIPS 186-2
Escrowed Encryption Standard correct answers FIPS 185
Standards for Security Categorization of Federal Information
and Information Systems correct answers FIPS 199
Minimum Security Requirements for Federal Information and
,Information Systems correct answers FIPS 200
Guide for Mapping types of Information and Information
Systems to Security Categories correct answers NIST SP 800-60
Recommended Security Controls for Federal Information
Systems and Organizations correct answers NIST SP 800-53
National Checklist Program for IT Products-Guidelines for
Checklist Users and Developer correct answers NIST SP 800-70
Guide for Assessing the Security controls in Federal
Information Systems correct answers NIST SP 800-53A
Guide for Applying the Risk Management Framework to
Federal Information Systems: A Security Life Cycle Approach correct answers NIST SP 800-37
(Feb 22 2010)
Managing Risk from Information Systems correct answers NIST SP 800-39 v.2
National Training Standard for Senior System Managers correct answers CNSSI No. 4012
Operation of the Defense Acquisition Process correct answers DoDD 5000.2
National Industrial Security Program Operating Manual
(NISPOM) correct answers DoD 5220.22-M
, Secure Electronic Messaging Services correct answers NSTISSP No. 7
Securing Voice Communications correct answers NSTISSP No. 101
National Information Assurance Certification and Accreditation
Process (NIACAP) correct answers NSTISSI No. 1000
National Policy on Certification and Accreditation of National
Security Telecommunications and Information Systems correct answers CNSSP No. 6
National COMSEC Instruction correct answers NACSI 6002
Security Considerations in the System Development Life
Cycle correct answers NIST SP 800-64
Creating a Patch and Vulnerability Management Program correct answers NIST SP 800-40
Incorporating and Funding Security in Information Systems
Investments correct answers OMB M-00-07
This guidance requires contractors to protect all classified information for which they have
access to or custody of.
A. NISPOM
B. DoD 8250.1
C. DoD 8570.1
D. PII correct answers A. NISPOM