Ask Homework Help/Study Tips Expert

Question 1
This organization is responsible for implementing the national strategies in combating computer and intellectual property crimes worldwide. Specifically, to prevent, investigate, and prosecute computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts.
A) The United States Computer Emergency Readiness Team
B) The National Institute of Standards and Technology
C) The US Department of Justice Computer Crime and Intellectual Property Section
D) The Federal Bureau of Investigation National Cyber Investigation Joint Task Force

Question 2
U.S. Presidents use this power to set policy directives that implement or interpret federal statutes, a constitutional provision, or a treaty.
A) Public Law
B) Executive Orders
C) Technical Standards
D) Legislation

Question 3
Which public law provides additional penalties for related activities in connection with access devices and computers.
A) Computer Fraud and Abuse Act of 1986
B) Privacy Act of 1974
C) Computer Security Act of 1987
D) Comprehensive Crime Control Act of 1984

Question 4
Which public law establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintained in systems of records by federal agencies.
A) Privacy Act of 1974
B) Computer Fraud and Abuse Act of 1986
C) Comprehensive Crime Control Act of 1984

Question 5
FISMA was created by what organization?
A) DISA
B) Congress
C) White House
D) Department of Defense

Question 6
This Act requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.
A) Confidential Information Protection and Statistical Efficiency Act of 2002
B) E-Government Act of 2002
C) Computer Security Act of 1987
D) Federal Information Security Management Act of 2002

Question 7
What is the level of impact if the information label is LOW?
A) Limited adverse impact on the organization
B) Serious adverse impact on the organization
C) Severe adverse impact on the organization
D) No adverse impact on the organization

Question 8
FIPS Pub 199 uses what term when referring to a HIGH impact?
A) Critical
B) Grave
C) Serious
D) Severe

Question 9
This Act intended to enhance the security and resiliency of the cyber and communications infrastructure of the United States.
A) Cybersecurity Act of 2012
B) Federal Information Security Management Act of 2002
C) Confidential Information Protection and Statistical Efficiency Act of 2002
D) Computer Security Act of 1987

Question 10
What are the three primary goals of the Comprehensive National Cybersecurity
Initiative (CNCI)?
A) To strengthen the future cybersecurity environment; To build cybersecurity capability in the electricity sector; To protect the nation's communication grid from cyber threats
B) To establish a front line of defense against todays immediate threats; To defend against the full spectrum of threats; To develop and implement a government-wide cyber counterintelligence (CI) plan
C) To defend against the full spectrum of threats; To coordinate and redirect research and development (R&D) efforts; To develop and implement a government-wide cyber counterintelligence (CI) plan
D) To establish a front line of defense against todays immediate threats; To defend against the full spectrum of threats; To strengthen the future cybersecurity environment

Question 11
This is the mission of what federal organization - to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
A) Office of Management and Budget (OMB)
B) Department of Homeland Security (DHS)
C) National Institute of Standards and Technology (NIST)
D) Department of Commerce (DOC)

Question 12
Which of the following identifies the different function a system will need to perform in order to meet the documented business need?
A) Test scenario
B) Functional requirements
C) Testing requirements
D) Functional scenario
View Feedback

Question 13
This act provides for the sharing of certain cyber threat intelligence and provide cyber threat information between the intelligence community and cyber security entities including the private sector and utilities.

A) Federal Information Security Management Act (FISMA)
B) Cyber Intelligence Sharing and Protection Act (CISPA)
C) Government Information Security Reform Act (GISRA)
D) The PATRIOT Act

Question 14
The NIST organization has defined best practices for creating continuity plans. Which of the following phases deals with identifying and prioritizing critical functions and systems?
A) Develop recovery strategies
B) Conduct the business impact analysis
C) Identify preventive controls.
D) Develop the continuity planning policy statement.

Question 15
What is the primary purpose of the Framework for Improving Critical Infrastructure Cybersecurity?
A) To enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity.
B) Establishing a process for identifying critical infrastructure with especially high priority for protection and to direct regulatory agencies to determine the adequacy of current requirements and their authority to establish additional requirements to address risks.
C) To protect the American people, to protect the Nation's critical infrastructure, and to protect Federal government computers and networks,
D) Providing a stable, but flexible catalog of security controls to meet current information protection needs and creating a foundation for the development of assessment methods and procedures for determining security control effectiveness.

Question 16
DOD Information Systems should only be interconnected under the following circumstances
A) Approved certification of interconnected systems
B) Compelling operational requirements
C) Approved authorization of interconnected systems
D) Demonstrable operational requirements

Question 17
Which of the following U.S. Acts permits people to legally access data collected about them by government agencies?
A) Signal Intelligence Presidential Directive
B) Privacy Act of 1974
C) Freedom of Information Act
D) Electronic Communications Privacy Act of 1986

Question 18
Who provides and independent assessment of the security plan?
A) Certification Agent
B) Program Manager
C) Security Officer
D) Security Manager

Question 19
FIPS 199 was established to develop standards for categorizing information and information systems. The potential of impact is high if:
A) the loss of CIA results in major damage to organizational assets
B) the loss of CIA results in significant financial loss
C) the loss of CIA significantly reduces the effectiveness of system functions
D) the loss of CIA results in minor harm to individuals

Question 20
According to FIPS 200, CIA uses 17 security-related areas. "Organizations must develop, document, periodically update, and implement security plans for organizational information systems that describe the security controls in place or planned for the information systems..." applies to which of the 17?
A) System and Information Integrity
B) Configuration Management
C) Contingency Planning
D) Planning

Question 21
How does FIPS 199 define LOW impact items?
A) Limited
B) Moderate
C) Minor
D) Low

Question 22
The Waterfall design methodology is best described as:
A) Most closely matches the IATF
B) Better interaction with customers
C) Flexibility and rapid development
D) Rigid and clearly defined structure

Question 23
What aspects are taken into account when defining a Mission Assurance Category (MAC)
A) confidentiality and integrity
B) sensitivity and importance
C) confidentiality and availability
D) availability and integrity.

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M91974069

Have any Question?


Related Questions in Homework Help/Study Tips

Review the website airmail service from the smithsonian

Review the website Airmail Service from the Smithsonian National Postal Museum that is dedicated to the history of the U.S. Air Mail Service. Go to the Airmail in America link and explore the additional tabs along the le ...

Read the article frank whittle and the race for the jet

Read the article Frank Whittle and the Race for the Jet from "Historynet" describing the historical influences of Sir Frank Whittle and his early work contributions to jet engine technologies. Prepare a presentation high ...

Overviewnow that we have had an introduction to the context

Overview Now that we have had an introduction to the context of Jesus' life and an overview of the Biblical gospels, we are now ready to take a look at the earliest gospel written about Jesus - the Gospel of Mark. In thi ...

Fitness projectstudents will design and implement a six

Fitness Project Students will design and implement a six week long fitness program for a family member, friend or co-worker. The fitness program will be based on concepts discussed in class. Students will provide justifi ...

Read grand canyon collision - the greatest commercial air

Read Grand Canyon Collision - The greatest commercial air tragedy of its day! from doney, which details the circumstances surrounding one of the most prolific aircraft accidents of all time-the June 1956 mid-air collisio ...

Qestion anti-trustprior to completing the assignment

Question: Anti-Trust Prior to completing the assignment, review Chapter 4 of your course text. You are a manager with 5 years of experience and need to write a report for senior management on how your firm can avoid the ...

Question how has the patient and affordable care act of

Question: How has the Patient and Affordable Care Act of 2010 (the "Health Care Reform Act") reshaped financial arrangements between hospitals, physicians, and other providers with Medicare making a single payment for al ...

Plate tectonicsthe learning objectives for chapter 2 and

Plate Tectonics The Learning Objectives for Chapter 2 and this web quest is to learn about and become familiar with: Plate Boundary Types Plate Boundary Interactions Plate Tectonic Map of the World Past Plate Movement an ...

Question critical case for billing amp codingcomplete the

Question: Critical Case for Billing & Coding Complete the Critical Case for Billing & Coding simulation within the LearnScape platform. You will need to create a single Microsoft Word file and save it to your computer. A ...

Review the cba provided in the resources section between

Review the CBA provided in the resources section between the Trustees of Columbia University and Local 2110 International Union of Technical, Office, and Professional Workers. Describe how this is similar to a "contract" ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As