ISC Exam Questions

Which of the following statements are true about Certification and Accreditation?

Certification and Accreditation (C&A or CnA) is a process for implementing information security. It
is a systematic procedure for evaluating, describing, testing, and authorizing systems prior to or
after a system is in operation. Which of the following statements are true about Certification and
Accreditation? Each correct answer represents a complete solution. Choose two.

A.
Certification is a comprehensive assessment of the management, operational, and technical
security controls in an information system.

B.
Accreditation is a comprehensive assessment of the management, operational, and technical
security controls in an information system.

C.
Accreditation is the official management decision given by a senior agency official to authorize
operation of an information system.

D.
Certification is the official management decision given by a senior agency official to authorize
operation of an information system.

Explanation:
Certification and Accreditation (C&A or CnA) is a process for implementing

information security. It is a systematic procedure for evaluating, describing, testing, and
authorizing systems prior to or after a system is in operation. The C&A process is used extensively
in the U.S. Federal Government. Some C&A processes include FISMA, NIACAP, DIACAP, and
DCID 6/3. Certification is a comprehensive assessment of the management, operational, and
technical security controls in an information system, made in support of security accreditation, to
determine the extent to which the controls are implemented correctly, operating as intended, and
producing the desired outcome with respect to meeting the security requirements for the system.
Accreditation is the official management decision given by a senior agency official to authorize
operation of an information system and to explicitly accept the risk to agency operations (including
mission, functions, image, or reputation), agency assets, or individuals, based on the
implementation of an agreed-upon set of security controls.