Which of the following is not a part of Identify Risks process? A. Decision tree diagram B. Cause and effect diagram C. Influence diagram D. System or process flow chart
Which of the following processes has the goal to ensure that any change does not lead to reduced or compromised security? A. Risk management B. Security management C. Configuration management D. Change control management
Which of the following individuals is responsible for the final accreditation decision? A. Information System Owner B. Certification Agent C. User Representative D. Risk Executive
According to FIPS Publication 199, what are the three levels of potential impact on organizations in the event of a compromise on confidentiality, integrity, and availability? A. Confidential, Secret, and High B. Minimum, Moderate, and High C. Low, Normal, and High D. Low, Moderate, and High
Which of the following NIST documents includes components for penetration testing? A. NIST SP 800-53 B. NIST SP 800-26 C. NIST SP 800-37 D. NIST SP 800-30
Which of the following recovery plans includes a monitoring process and triggers for initiating planned actions? A. Contingency plan B. Business continuity plan C. Disaster recovery plan D. Continuity of Operations Plan
Correct Answer: A
Please disable your adblocker or whitelist this site!