What are the responsibilities of an Authorizing Official?

An Authorizing Official plays the role of an approver. What are the responsibilities of an Authorizing Official? Each correct answer represents a complete solution. Choose all that apply.A . Establishing and implementing the organization's continuous monitoring programB . Determining the requirement of reauthorization and reauthorizing information systems when requiredC ....

August 19, 2019 No Comments READ MORE +

Which of the following are among the eight areas of IA defined by DoD?

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD? Each correct answer represents a complete solution. Choose all that apply.A...

August 18, 2019 No Comments READ MORE +

How many risk response types are available for a negative risk event in the project?

You work as a project manager for BlueWell Inc. You are preparing to plan risk responses for your project with your team. How many risk response types are available for a negative risk event in the project?A . SevenB . ThreeC . FourD . OneView AnswerAnswer: C

August 18, 2019 No Comments READ MORE +

Which of the following assessment methodologies defines a six-step technical security evaluation?

Which of the following assessment methodologies defines a six-step technical security evaluation?A . OCTAVEB . FITSAFC . DITSCAPD . FIPS 102View AnswerAnswer: D

August 18, 2019 No Comments READ MORE +

Which of the following RMF phases is known as risk analysis?

Which of the following RMF phases is known as risk analysis?A . Phase 2B . Phase 1C . Phase 0D . Phase 3View AnswerAnswer: A

August 17, 2019 No Comments READ MORE +

Where will you record the mitigation response?

You are the project manager for your company and a new change request has been approved for your project. This change request, however, has introduced several new risks to the project. You have communicated these risk events and the project stakeholders understand the possible effects these risks could have on...

August 17, 2019 No Comments READ MORE +

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media?

Which of the following is used to indicate that the software has met a defined quality level and is ready for mass distribution either by electronic means or by physical media?A . RTMB . CROC . DAAD . ATMView AnswerAnswer: A

August 16, 2019 No Comments READ MORE +

What type of risk response have you elected to use in this instance?

You are the project manager for GHY Project and are working to create a risk response for a negative risk. You and the project team have identified the risk that the project may not complete on time, as required by the management, due to the creation of the user guide...

August 16, 2019 No Comments READ MORE +

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?

Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?A . SafeguardsB . Preventive controlsC . Detective controlsD . Corrective controlsView AnswerAnswer: D

August 14, 2019 No Comments READ MORE +

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three.

Which of the following concepts represent the three fundamental principles of information security? Each correct answer represents a complete solution. Choose three.A . PrivacyB . IntegrityC . AvailabilityD . ConfidentialityView AnswerAnswer: BCD

August 14, 2019 No Comments READ MORE +