100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

ISC2 CAP Exam Prep Questions With 100% Correct Answers 2024, 315 Questions and Correct Answers. Complete Solution.

Puntuación
-
Vendido
-
Páginas
28
Grado
A+
Subido en
14-03-2024
Escrito en
2023/2024

ISC2 CAP Exam Prep Questions With 100% Correct Answers 2024, 315 Questions and Correct Answers. Complete Solution. In FIPS 199, a loss of Confidentiality is defined as The unauthorized disclosure of information In FIPS 199, a loss of Integrity is defined as The unauthorized modification or destruction of information In FIPS 199, a loss of Availability is defined as The disruption of access to or use of information NIST Special Publication 800-53 r4 FIPS 200 Mandated - A catalog of security controls. Defines three baselines (L, M, H). Initial version published in 2005. None This FIPS document can be waived Inherited An organizations information systems are a mix of Windows and UNIX systems located in a single computer room. Access to the computer room is restricted by the door locks that require proximity cards and personal identification numbers (PINS). Only a small percentage of the organizations employees have access to the computer room. The computer room access restriction is an example of what type of security control relative to the hardware in the computer room? Supplement the common controls with system-specific or hybrid controls to achieve the required protection for the system An information system is currently in the initiation phase of the SDLC and has been categorized high impact. The information system owner wants to inherit common controls provided by another organization information system that is categorized moderate impact.. How does the information system owner ensure that the common controls will provide adequate protection for the information system? Active involvement by authorizing officials in the ongoing management of information system-related security risks. An effective security control monitoring strategy for an information system includes... All Steps In which steps is the security plan updated (Categorize, Implement, or Monitor) An enterprise security authorization program is considered successful when A) provides an effective means of meeting requirements B) permits efficient oversight of its activities C) provides assurance that controls are implemented at the system level Hybrid A large organization has a documented information system policy that has been reviewed and approved by senior officials and is readily available to all organizational staff. This information security policy explicitly addresses each of the 17 control families in NIST SP 800-53, Revision.3. Some system owners also established procedures for the technical class of security controls on certain of their systems. In their respective system security plans, control AC-1 Access Control Policy and Procedures (a technical class security control) must be identified as what type of control? NIST Special Publication 800-37, Revision 1 This manual defines the RIsk Management Framework NIST Special Publication 800-30 This manual defines how to conduct a risk assessment FISMA Federal Information Security Management Act Federal Information Security Management Act (FISMA) This raised visibility through government on certification, accreditation and system authorizations and follows NIST SP 800-37 SDLC phases within the RMF in order 1) Initiation 2) Development/Acquisition 3) Implementation 4) Operation/Maintenance 5) Disposal Information System Owner (ISO) This organizational official is responsible for the procurement, development, integration, modification, operation, maintenance, and disposal of an information system. FIPS 200 This document specifies security requirements for federal information and information systems in 17 security-related areas that represent a broad-based, balanced information security program. Specifies that a minimum baseline of security controls, as defined in NIST SP 800-53, will be implemented. Specifies that the baselines are to be appropriately tailored. Leveraged Which authorization approach (leveraged, single, and joint or site specific) considers time elapsed since the authorization results were produced, the environment of operation, the criticality/sensitivity of the information, and the risk tolerance of other organizations? Authorizing Official (AO) When an authorization to operation (ATO) is issued, this role authoritatively accepts residual risk on behalf of the organization. Information Technology Systems The objective of system authorization is to ensure the security of... Will NEVER have a primary role in any RMF step tasks A) Information system security officer (ISSO) B) Information system security engineer (ISSE) Authorizing Official (AO) Who does the Security Control Assessor (SCA) report directly to? Independence and Technical Confidence The two basic traits a Security Control Assessor (SCA) must have Successful information technology develops separate security perimeters covering individual critical resources according to the system boundaries rather than one perimeter to cover all critical resources. This works because... A) Systems are distance B) Their limits can be defined in practical terms C) Security is comparatively easy to implement at system level Authorizing Official (AO) The Information System Owner (ISO) is appointed by this person Chief Information Officer (CIO) The Common Control Provider (CCP) is appointed by this person Certification The process to assess effectiveness of security controls NIST Special Publication 800-53, Revision 4 This publication introduces the new family Program Management as well as eight additional security and privacy control families to the FIPS 200 17 security control families. The three Risk Management core components A) Risk Assessment (understand what can go wrong) B) Risk Mitigation (identify how risk is managed) C) Security Control (must be planned and budgeted) Accreditation Management decision (based on the assessment) to permit an information system to operate at its current security posture. The documents required for the accreditation package are... A) Security plan B) Security assessment report C) Plan of action and milestones CPIC Capital Planning and Investment Controls Capital Planning and Investments Controls includes the following... A) How systems are funded B) Supplemental funding for new or improved security control implementation NIST classifications of security controls A) System specific B) Hybrid C) Common After an information system has been certified, the Senior Information Security Officer (SISO) needs to: A) Monitor system's compliance with requirements B) Measure progress of corrective actions addressing weaknesses C) Track accepted risks The steps in the Authorization Process 1) Risk management 2) Near real-time awareness 3) Automation 4) Program management 5) Continuous monitoring NIST SP 800-39 This publication addresses risk management from an Enterprise perspective NIST SP 800-30 This publication provides the approach for performing system-level risk assessments and risk prioritization NIST SP 800-60 This publication defines the types of information needed by the organization to successfully carry out identified mission and business processes and define organization's internal/external information flows. NIST SP 800-37, Revision 1 This publication documents the importance of clearly defining the information system boundaries. NIST SP 800-64 This publication identifies various security activities according to order of performance in the system development life cycle (SDLC) Acquisition/Development During this phase of the SDLC Information Technology Security Activities, defined by NIST SP 800-64, the System Security Plan (SSP) is initiated. Risk Assessment The best method to determine if a security event impact will require recertification is through performing this activity. The System Authorization Methodology Life Cycles phases for NIST 1) Initiation 2) Security Certification 3) Security Accreditation 4) Continuous Monitoring Remediation Identification of security weaknesses is part of the comprehensive program. Assessment must be followed up by this step. Project Agreements This sets the ground rules for the project and serves as the basis for setting expectation. Information System Owners (ISO) This role plays a primary role in the inventory process and their roles must be defined in writing. Type Accreditation This type of accreditation relates to the common system authorization of all systems of a given type that are secured in a like manner. It may also apply to an application installed and used by multiple users throughout an organization. Site Accreditation

Mostrar más Leer menos
Institución
ISC2 CAP
Grado
ISC2 CAP










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
ISC2 CAP
Grado
ISC2 CAP

Información del documento

Subido en
14 de marzo de 2024
Número de páginas
28
Escrito en
2023/2024
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$14.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
QUICKEXAMINER Walden University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
87
Miembro desde
2 año
Número de seguidores
44
Documentos
5450
Última venta
4 semanas hace
QUICK EXAMINER

Looking for high-quality study materials to help you excel? You’re in the right place! I provide well-structured notes, summaries, essays, and research papers across various subjects, all designed to make studying easier and more efficient. Why Choose My Materials? ✔ Comprehensive and well-organized content ✔ Easy-to-understand explanations ✔ Time-saving summaries for exams and research ✔ Carefully curated to ensure accuracy and clarity Each document is crafted to provide valuable insights, helping you grasp concepts quickly and effectively. Whether you're preparing for exams, writing an assignment, or just need clear and concise notes, my resources will support your academic journey. Browse my collection and take your studies to the next level

Lee mas Leer menos
3.6

15 reseñas

5
5
4
5
3
2
2
0
1
3

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes