Continuous Monitoring is the fourth phase of the security certification and accreditation process. What activities are performed in the Continuous Monitoring process Each correct answer represents a complete solution. Choose all that apply.
Answer : A, B, C
You are working as a project manager in your organization. You are nearing the final stages of project execution and looking towards the final risk monitoring and controlling activities. For your project archives, which one of the following is an output of risk monitoring and control
Answer : C
Which of the following are the major tasks of risk management Each correct answer represents a complete solution. Choose two.
Answer : A, D
Which of the following types of cryptography defined by FIPS 185 describes a cryptographic algorithm or a tool accepted by the National Security Agency for protecting classified information
Answer : D
Which of the following types of CNSS issuances establishes criteria, and assigns responsibilities
Answer : D
Which of the following firewall types operates at the Network layer of the OSI model and can filter data by port, interface address, source address, and destination address
Answer : D
Which of the following federal agencies coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produces foreign intelligence information
Answer : B