What is the level of impact if the information label is low

Assignment Help Other Subject
Reference no: EM131218110

Question 1
This organization is responsible for implementing the national strategies in combating computer and intellectual property crimes worldwide. Specifically, to prevent, investigate, and prosecute computer crimes by working with other government agencies, the private sector, academic institutions, and foreign counterparts.
A) The United States Computer Emergency Readiness Team
B) The National Institute of Standards and Technology
C) The US Department of Justice Computer Crime and Intellectual Property Section
D) The Federal Bureau of Investigation National Cyber Investigation Joint Task Force

Question 2
U.S. Presidents use this power to set policy directives that implement or interpret federal statutes, a constitutional provision, or a treaty.
A) Public Law
B) Executive Orders
C) Technical Standards
D) Legislation

Question 3
Which public law provides additional penalties for related activities in connection with access devices and computers.
A) Computer Fraud and Abuse Act of 1986
B) Privacy Act of 1974
C) Computer Security Act of 1987
D) Comprehensive Crime Control Act of 1984

Question 4
Which public law establishes a Code of Fair Information Practice that governs the collection, maintenance, use, and dissemination of personally identifiable information about individuals that is maintained in systems of records by federal agencies.
A) Privacy Act of 1974
B) Computer Fraud and Abuse Act of 1986
C) Comprehensive Crime Control Act of 1984

Question 5
FISMA was created by what organization?
A) DISA
B) Congress
C) White House
D) Department of Defense

Question 6
This Act requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.
A) Confidential Information Protection and Statistical Efficiency Act of 2002
B) E-Government Act of 2002
C) Computer Security Act of 1987
D) Federal Information Security Management Act of 2002

Question 7
What is the level of impact if the information label is LOW?
A) Limited adverse impact on the organization
B) Serious adverse impact on the organization
C) Severe adverse impact on the organization
D) No adverse impact on the organization

Question 8
FIPS Pub 199 uses what term when referring to a HIGH impact?
A) Critical
B) Grave
C) Serious
D) Severe

Question 9
This Act intended to enhance the security and resiliency of the cyber and communications infrastructure of the United States.
A) Cybersecurity Act of 2012
B) Federal Information Security Management Act of 2002
C) Confidential Information Protection and Statistical Efficiency Act of 2002
D) Computer Security Act of 1987

Question 10
What are the three primary goals of the Comprehensive National Cybersecurity
Initiative (CNCI)?
A) To strengthen the future cybersecurity environment; To build cybersecurity capability in the electricity sector; To protect the nation's communication grid from cyber threats
B) To establish a front line of defense against todays immediate threats; To defend against the full spectrum of threats; To develop and implement a government-wide cyber counterintelligence (CI) plan
C) To defend against the full spectrum of threats; To coordinate and redirect research and development (R&D) efforts; To develop and implement a government-wide cyber counterintelligence (CI) plan
D) To establish a front line of defense against todays immediate threats; To defend against the full spectrum of threats; To strengthen the future cybersecurity environment

Question 11
This is the mission of what federal organization - to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve our quality of life.
A) Office of Management and Budget (OMB)
B) Department of Homeland Security (DHS)
C) National Institute of Standards and Technology (NIST)
D) Department of Commerce (DOC)

Question 12
Which of the following identifies the different function a system will need to perform in order to meet the documented business need?
A) Test scenario
B) Functional requirements
C) Testing requirements
D) Functional scenario
View Feedback

Question 13
This act provides for the sharing of certain cyber threat intelligence and provide cyber threat information between the intelligence community and cyber security entities including the private sector and utilities.

A) Federal Information Security Management Act (FISMA)
B) Cyber Intelligence Sharing and Protection Act (CISPA)
C) Government Information Security Reform Act (GISRA)
D) The PATRIOT Act

Question 14
The NIST organization has defined best practices for creating continuity plans. Which of the following phases deals with identifying and prioritizing critical functions and systems?
A) Develop recovery strategies
B) Conduct the business impact analysis
C) Identify preventive controls.
D) Develop the continuity planning policy statement.

Question 15
What is the primary purpose of the Framework for Improving Critical Infrastructure Cybersecurity?
A) To enhance the security and resilience of the Nation's critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity.
B) Establishing a process for identifying critical infrastructure with especially high priority for protection and to direct regulatory agencies to determine the adequacy of current requirements and their authority to establish additional requirements to address risks.
C) To protect the American people, to protect the Nation's critical infrastructure, and to protect Federal government computers and networks,
D) Providing a stable, but flexible catalog of security controls to meet current information protection needs and creating a foundation for the development of assessment methods and procedures for determining security control effectiveness.

Question 16
DOD Information Systems should only be interconnected under the following circumstances
A) Approved certification of interconnected systems
B) Compelling operational requirements
C) Approved authorization of interconnected systems
D) Demonstrable operational requirements

Question 17
Which of the following U.S. Acts permits people to legally access data collected about them by government agencies?
A) Signal Intelligence Presidential Directive
B) Privacy Act of 1974
C) Freedom of Information Act
D) Electronic Communications Privacy Act of 1986

Question 18
Who provides and independent assessment of the security plan?
A) Certification Agent
B) Program Manager
C) Security Officer
D) Security Manager

Question 19
FIPS 199 was established to develop standards for categorizing information and information systems. The potential of impact is high if:
A) the loss of CIA results in major damage to organizational assets
B) the loss of CIA results in significant financial loss
C) the loss of CIA significantly reduces the effectiveness of system functions
D) the loss of CIA results in minor harm to individuals

Question 20
According to FIPS 200, CIA uses 17 security-related areas. "Organizations must develop, document, periodically update, and implement security plans for organizational information systems that describe the security controls in place or planned for the information systems..." applies to which of the 17?
A) System and Information Integrity
B) Configuration Management
C) Contingency Planning
D) Planning

Question 21
How does FIPS 199 define LOW impact items?
A) Limited
B) Moderate
C) Minor
D) Low

Question 22
The Waterfall design methodology is best described as:
A) Most closely matches the IATF
B) Better interaction with customers
C) Flexibility and rapid development
D) Rigid and clearly defined structure

Question 23
What aspects are taken into account when defining a Mission Assurance Category (MAC)
A) confidentiality and integrity
B) sensitivity and importance
C) confidentiality and availability
D) availability and integrity.

Reference no: EM131218110

Questions Cloud

Evaluate the security posture of the organization : Evaluate the security posture of the organization and communicate the findings in an executive-level summary presentation and briefing memorandum.
What is the wlan topology in use : Based on the figure below, what is the WLAN topology in use? In what way does the ISM band impact the topology? What must be done to ensure proper coverage of voice and video applications in the network?
How much does the public policy issue cost americans : Describe and analyze the scope of the public policy concern. Be sure to address the following in your analysis.
The most valuable lesson from quarter : Why do people often settle for something less than excellent?-  What rewards can a person receive by creating excellence at work and in life?
What is the level of impact if the information label is low : What is the level of impact if the information label is LOW? What is the primary purpose of the Framework for Improving Critical Infrastructure Cybersecurity? Who provides and independent assessment of the security plan?
Are us ethical standards applicable worldwide : Are US ethical standards applicable worldwide? Explain your answer and provide examples. What are the consequences of failure to incorporate ethical considerations into global planning?
Identify potential quality concerns in the traditional areas : Identify potential quality concerns in the traditional areas of machinery, employees, measurements, and materials. Organize these quality concerns using a cause-and-effect diagram.
Do you believe social media can boost a business sales : Do you believe social media can boost a business's sales? Why, or why not? - What are some examples from your own experience?
How do leaders build effective cultures : How do leaders build effective cultures? How do values and shared vision and beliefs help drive culture and performance?

Reviews

Write a Review

Other Subject Questions & Answers

  Dwight frequently takes other children''s toys

Three-year-old Dwight frequently takes other children's toys from them, showing little concern for their feelings, even when they cry. When he does this, his mother tells him to "imagine how other kids feel when they lose their toys."

  How 24/7 television news and the dawn of the internet

How 24/7 television news and the dawn of the Internet have changed journalism. What are the benefits of these changes? What are the challenges of these changes?

  Phonics program helps childrens reading comprehension

Dr.Kenji wants to determine whether his new phonics program helps children’s reading comprehension. He gives a fifth grade class the program and also studies a second group class that does not go through the program.

  Climate change and your home city

CVE80010: Principles of Sustainability - Climate change & your home city - write a report that examines the ways in which climate change is predicted to impact upon your home city. What you consider to be your home city should be the one closest to..

  Cell membrane of animal cell a rigid barrier resistent

which of following is not the cell membrane of animal cell a rigid barrier resistent to all non cellular molecules

  Several states have recently passed legislation imposing

Several states have recently passed legislation imposing new registration and identification requirements. This has sparked debate about whether these are tactics intended to suppress turnout or to prevent fraud.

  Income increase or decrease

The company believes that a reduction in sales price of 10%, combined with an increase in advertising of $8000 will cause an increase in sales volume of 20%. If the company undertakes this advertising campaign by how much will income increase or decr..

  Discussing the medicalization of madnes

Goffman suggest the central feature of stigma is acceptant detail both arguements and illustrate these arguements by discussing the medicalization of madnes starting in classical greece rome and ending with european experience duringt the 18th cen..

  An urn contains 0 black balls and n - 0 white balls a

1. an urn contains 0 black balls and n - 0 white balls. a sample of n balls is to be selected without replacement. let

  Relevance of the electoral college underlying

Your judgment about the relevance of the Electoral College's underlying rationale to contemporary America. Your judgment about its impact on presidential leadership capacity.

  Write a reflection of 750-1000 words in which you identify

write a reflection of 750-1000 words in which you identify your strengths and weaknesses related to the four content

  Describe the industrial revolution

Describe the Industrial Revolution. How has it impacted the environment and the way that humans use natural resources?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd