Which of the following formulas was developed by FIPS 199 for categorization of an information system? A. SC information system = {(confidentiality, impact), (integrity, controls), (availability, risk)} B. SC information system = {(confidentiality, impact), (integrity, impact), (availability, impact)} C. SC information system = {(confidentiality, controls), (integrity, controls), (availability, controls )} D. SC information system = {(confidentiality, risk), (integrity, impact), (availability, controls)}
Which of the following formulas was developed by FIPS 199 for categorization of an information type? A. SC information type = {(confidentiality, controls), (integrity, controls), (authentication, controls)} B. SC information type = {(confidentiality, impact), (integrity, impact), (availability, impact)} C. SC information type = {(confidentiality, risk), (integrity, risk), (availability, risk)} D. SC information type = {(Authentication, impact), (integrity, impact), (availability, impact)}
Which of the following is a security policy implemented by an organization due to compliance, regulation, or other legal requirements? A. Advisory policy B. Informative policy C. System Security policy D. Regulatory policy
Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry? A. Segregation of duties B. Separation of duties C. Need to Know D. Due care
In which of the following Risk Management Framework (RMF) phases is strategic risk assessment planning performed? A. Phase 0 B. Phase 1 C. Phase 2 D. Phase 3