Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractors

Which of the following individuals is responsible for the oversight of a program that is supported by a team of people that consists of, or be exclusively comprised of contractorsA . Quality Assurance ManagerB . Senior AnalystC . System OwnerD . Federal program managerView AnswerAnswer: D

August 5, 2020 No Comments READ MORE +

Which of the following protocols is used to establish a secure terminal to a remote network device

Which of the following protocols is used to establish a secure terminal to a remote network deviceA . WEPB . SMTPC . SSHD . IPSecView AnswerAnswer: C

August 5, 2020 No Comments READ MORE +

Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality

Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionalityA . Information Protection Policy (IPP)B . IMMC . System Security ContextD . CONOPSView AnswerAnswer: A

August 5, 2020 No Comments READ MORE +

Which of the following MAC levels requires basic integrity and availability?

DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability?A . MAC IB . MAC IIC . MAC IVD . MAC IIIView AnswerAnswer: D

August 5, 2020 No Comments READ MORE +

Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.

Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.A . The degree to which the security of the system, as it is defined, designed, and implemented, meets the security needs.B . The problem space is defined by...

August 5, 2020 No Comments READ MORE +

Which of the following policies describes the national policy on the secure electronic messaging service

Which of the following policies describes the national policy on the secure electronic messaging serviceA . NSTISSP No. 11B . NSTISSP No. 7C . NSTISSP No. 6D . NSTISSP No. 101View AnswerAnswer: B

August 5, 2020 No Comments READ MORE +

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the Internet

Which of the following protocols is built in the Web server and browser to encrypt data traveling over the InternetA . UDPB . SSLC . IPSecD . HTTPView AnswerAnswer: B

August 4, 2020 No Comments READ MORE +

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controls

Which of the following processes culminates in an agreement between key players that a system in its current configuration and operation provides adequate protection controlsA . Certification and accreditation (C&A)B . Risk ManagementC . Information systems security engineering (ISSE)D . Information Assurance (IA)View AnswerAnswer: A

August 4, 2020 No Comments READ MORE +

Which of the following documents will help you to describe the detailed plans, procedures, and schedules to guide the transition process?

You work as a system engineer for BlueWell Inc. Which of the following documents will help you to describe the detailed plans, procedures, and schedules to guide the transition process?A . Configuration management planB . Transition planC . Systems engineering management plan (SEMP)D . Acquisition planView AnswerAnswer: B

August 4, 2020 No Comments READ MORE +

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a system

Which of the following persons in an organization is responsible for rejecting or accepting the residual risk for a systemA . System OwnerB . Information Systems Security Officer (ISSO)C . Designated Approving Authority (DAA)D . Chief Information Security Officer (CISO)View AnswerAnswer: C

August 4, 2020 No Comments READ MORE +