There are seven risk responses for any project. Which one of the following is a valid risk response for a negative risk event
Answer : A
DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires high integrity and medium availability
Answer : B
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident
Answer : A
You work as a systems engineer for BlueWell Inc. You want to protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. Which of the following processes will you use to accomplish the task
Answer : A
Which of the following are the subtasks of the Define Life-Cycle Process Concepts task Each correct answer represents a complete solution. Choose all that apply.
Answer : A, B, D
In 2003, NIST developed a new Certification & Accreditation (C&A) guideline known as FIPS 199. What levels of potential impact are defined by FIPS 199 Each correct answer represents a complete solution. Choose all that apply.
Answer : A, B, C
Which of the following individuals informs all C&A participants about life cycle actions, security requirements, and documented user needs
Answer : D