Choose all that apply
Which of the following characteristics are described by the DIAP Information Readiness
Assessment function Each correct answer represents a complete solution. Choose all that apply.
Choose all that apply
The functional analysis process is used for translating system requirements into detailed function
criteria. Which of the following are the elements of functional analysis process Each correct
answer represents a complete solution. Choose all that apply.
Form an agreement governing the management, operation, and use of the interconnection
In which of the following phases of the interconnection life cycle as defined by NIST SP 800-47
does the participating organizations perform the following tasks Perform preliminary activities.
Examine all relevant technical, security and administrative issues. Form an agreement governing
the management, operation, and use of the interconnection.
Which of the following acts is endorsed to provide a clear statement of the proscribed activity concerning com
Which of the following acts is endorsed to provide a clear statement of the proscribed activity
concerning computers to the law enforcement community, those who own and operate computers,
and those tempted to commit crimes by unauthorized access to computers
Which of the following DITSCAP phases validates that the preceding work has produced an IS that operates in a
Which of the following DITSCAP phases validates that the preceding work has produced an IS
that operates in a specified computing environment
Which of the following terms describes the security of an information system against unauthorized access…
Which of the following terms describes the security of an information system against unauthorized
access to or modification of information, whether in storage, processing, or transit, and against the
denial of service to authorized users or the provision of service to unauthorized users
Which one of the following is a valid response to the identified risk event
Your project team has identified a project risk that must be responded to. The risk has been
recorded in the risk register and the project team has been discussing potential risk responses for
the risk event. The event is not likely to happen for several months but the probability of the event
is high. Which one of the following is a valid response to the identified risk event
Which of the following CNSS policies describes the national policy on use of cryptomaterial by activities oper
Which of the following CNSS policies describes the national policy on use of cryptomaterial by
activities operating in high risk environments
Which of the following sections of the SEMP template defines the project constraints, to include constraints o
Which of the following sections of the SEMP template defines the project constraints, to include
constraints on funding, personnel, facilities, manufacturing capability and capacity, critical
resources, and other constraints
Which of the following certification levels requires the completion of the minimum security checklist and more
Which of the following certification levels requires the completion of the minimum security checklist
and more in-depth, independent analysis