Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien 4,6 TrustPilot
logo-home
Examen

CLE 074 QUESTIONS WITH 100% CORRECT

Note
-
Vendu
1
Pages
9
Grade
A+
Publié le
17-09-2024
Écrit en
2024/2025

According to a 2013 Pricewaterhouse/ CSO Magazine/Us Secret Service/Carnegie Mellon survey, about what percentage of electronic crime events are caused by insiders - ️️-- 20-25% 5-10% Greater than 80% About 60% Less than 5% The DoD instruction that definitively defines cybersecurity is - ️️--DoDI 8500.01, signed in March of 2014 Interium DoDI 5000.2 NIST Special Publication 800-145 Federal Information Systems Management Act (FISMA) USC Title 40. Clinger Cohen Act The Security Plan is initiated at Step One of the RMF process and used in all subsequent steps EXCEPT: - ️️--Step Four, Assess Security Controls Step Two, Select Security Controls Step Six, Monitor Security Controls, Step Five, Authorize Security Controls Step Three, Implement Security Controls Choose the best definition of a Cybersecurity Red Team - ️️-- A group of people authorized and organized to emulate a potential adversary's attack or exploitation capabilities against an enterprise's security posture Formal testing conducted after deployment to evaluate operational effectiveness and suitability A team that guarantees a high level of confidence that software is free from vulnerabilities, either intentionally or unintentionally designed into the softwareA group of individuals that conduct operational network vulnerability evaluations and provide mitigation techniques to customers who have a need for independent technical review of their network security posture A multidisciplinary group of people who are collectively responsible for delivering a defined cybersecurity product or process Which of the following is a common protection method used to protect against cyberattacks? - ️️-- All of the items listed are common protection methods used to protect against cyber-attacks Vulnerability testing Cryptography Firewalls Network traffic monitoring Basically, Joint Information Environment is___. - ️️--A comprehensive information technology modernization effort A description of data centers focused on cyber security a new project for DoD information technology centers A senior leadership challenge a misnomer for terrorist threats to cyber security The key governance in Tier 3 of the risk management hierarchy is the Authorizing Official; in Tier 2, the Principal Authorizing Official; in Tier 1, the DoD Chief Information Officer - ️️-- True False Choose the true statement about continuous monitoring and the system level continuous monitoring strategy - ️️--The RMF requires the development and documentation of a system-level strategy for the continuous monitoring of the effectiveness of security controls Continuous monitoring in and of itself provides a comprehensive, enterprise-wide risk management approach The RMF recommends but does not require the development of a system-level strategy for the continuous monitoring of security controlsAs one of the six steps in the RMF, continuous monitoring activities replace the security authorization process. the system-level continuous monitoring strategy has no relation to DoD enterprise-level or Component-level monitoring strategies. (True/False) Compliance with DoDI 8510.01 (RMF) is the only cybersecurity language that should be included in a contract as it will ensure adequate cybersecurity protection throughout the program lifecycle - ️️True -- False One of the DoD strategic initiatives for operating in cyberspace is to partner with other Federal agencies but also the private sector. Why is this partnering necessary? - ️️- - Many of the DoD's critical missions and operations rely on strengthening its international alliances and partnerships to develop combined capabilities to achieve cyber effects in support of combatant command plans Many of the DoD's critical functions and operations rely on service providers over which the Department has oversight but needs private sector assistance Many private sector enterprises require department assistance in mitigating risk in cyberspace operations Many of DoD's critical functions and operations rely on global supply chains over which the department has oversight but needs private sector assistance During this step in the Risk Management Framework (RMF) process, the Plan of Actions and Milestones (POA&M) is prepared based on the vulnerabilities identified during the security control assessment. - ️️Step 5 - Authorize system Step 1 - Categorize System Step 6 - Monitor Security Controls Incorrect - Step 4 - Assess Security Controls Incorrect - Step 3 - Implement Security Controls What are two areas that the DoD definition for cybersecurity stresses that were NOT stressed in the former definition of Information Assurance - ️️Communications and Prevention Mission Assurance and Software Assurance Incorrect - Intrusion Detection and Intrusion Prevention Incorrect - Continuous Monitoring and Configuration managementIncorrect -Information and Interoperability Name the policy that DoDI 8500.01 (Risk Management Framework (RMF) for Information Technology (IT)) replaces - ️️-- DoD Information Assurance Certification and Accreditation Process (DIACAP) Interim DoDI 5000.02 DoDI 5200.44 USC Title 40. Clinger Cohen Act Federal Information Systems Management Act (FISMA)

Montrer plus Lire moins
Établissement
CLE 074
Cours
CLE 074

Aperçu du contenu

CLE 074
According to a 2013 Pricewaterhouse/ CSO Magazine/Us Secret Service/Carnegie
Mellon survey, about what percentage of electronic crime events are caused by insiders
- ✔️✔️--> 20-25%

5-10%
Greater than 80%
About 60%
Less than 5%



The DoD instruction that definitively defines cybersecurity is - ✔️✔️-->DoDI 8500.01,
signed in March of 2014

Interium DoDI 5000.2

NIST Special Publication 800-145

Federal Information Systems Management Act (FISMA)

USC Title 40. Clinger Cohen Act

The Security Plan is initiated at Step One of the RMF process and used in all
subsequent steps EXCEPT: - ✔️✔️-->Step Four, Assess Security Controls

Step Two, Select Security Controls
Step Six, Monitor Security Controls,
Step Five, Authorize Security Controls
Step Three, Implement Security Controls

Choose the best definition of a Cybersecurity Red Team - ✔️✔️--> A group of people
authorized and organized to emulate a potential adversary's attack or exploitation
capabilities against an enterprise's security posture


Formal testing conducted after deployment to evaluate operational effectiveness and
suitability

A team that guarantees a high level of confidence that software is free from
vulnerabilities, either intentionally or unintentionally designed into the software

, A group of individuals that conduct operational network vulnerability evaluations and
provide mitigation techniques to customers who have a need for independent technical
review of their network security posture

A multidisciplinary group of people who are collectively responsible for delivering a
defined cybersecurity product or process

Which of the following is a common protection method used to protect against cyber-
attacks? - ✔️✔️--> All of the items listed are common protection methods used to
protect against cyber-attacks

Vulnerability testing
Cryptography
Firewalls
Network traffic monitoring

Basically, Joint Information Environment is___. - ✔️✔️-->A comprehensive information
technology modernization effort

A description of data centers focused on cyber security

a new project for DoD information technology centers

A senior leadership challenge

a misnomer for terrorist threats to cyber security

The key governance in Tier 3 of the risk management hierarchy is the Authorizing
Official; in Tier 2, the Principal Authorizing Official; in Tier 1, the DoD Chief Information
Officer - ✔️✔️--> True
False


Choose the true statement about continuous monitoring and the system level
continuous monitoring strategy - ✔️✔️-->The RMF requires the development and
documentation of a system-level strategy for the continuous monitoring of the
effectiveness of security controls


Continuous monitoring in and of itself provides a comprehensive, enterprise-wide risk
management approach

The RMF recommends but does not require the development of a system-level strategy
for the continuous monitoring of security controls

École, étude et sujet

Établissement
CLE 074
Cours
CLE 074

Infos sur le Document

Publié le
17 septembre 2024
Nombre de pages
9
Écrit en
2024/2025
Type
Examen
Contient
Questions et réponses

Sujets

€7,62
Accéder à l'intégralité du document:

Garantie de satisfaction à 100%
Disponible immédiatement après paiement
En ligne et en PDF
Tu n'es attaché à rien

Faites connaissance avec le vendeur

Seller avatar
Les scores de réputation sont basés sur le nombre de documents qu'un vendeur a vendus contre paiement ainsi que sur les avis qu'il a reçu pour ces documents. Il y a trois niveaux: Bronze, Argent et Or. Plus la réputation est bonne, plus vous pouvez faire confiance sur la qualité du travail des vendeurs.
ACADEMICMATERIALS City University New York
S'abonner Vous devez être connecté afin de suivre les étudiants ou les cours
Vendu
596
Membre depuis
2 année
Nombre de followers
185
Documents
10571
Dernière vente
6 heures de cela

4,0

98 revues

5
53
4
13
3
21
2
3
1
8

Documents populaires

Récemment consulté par vous

Pourquoi les étudiants choisissent Stuvia

Créé par d'autres étudiants, vérifié par les avis

Une qualité sur laquelle compter : rédigé par des étudiants qui ont réussi et évalué par d'autres qui ont utilisé ce document.

Le document ne convient pas ? Choisis un autre document

Aucun souci ! Tu peux sélectionner directement un autre document qui correspond mieux à ce que tu cherches.

Paye comme tu veux, apprends aussitôt

Aucun abonnement, aucun engagement. Paye selon tes habitudes par carte de crédit et télécharge ton document PDF instantanément.

Student with book image

“Acheté, téléchargé et réussi. C'est aussi simple que ça.”

Alisha Student

Foire aux questions