Choose all that apply
A security policy is an overall general statement produced by senior management that dictates
what role security plays within the organization. What are the different types of policies Each
correct answer represents a complete solution. Choose all that apply.
Which of the following acts is used to recognize the importance of information security to the economic and na
Which of the following acts is used to recognize the importance of information security to the
economic and national security interests of the United States
Under which of the following CNSS policies, NIACAP is mandatory for all the systems that process USG classifie
Under which of the following CNSS policies, NIACAP is mandatory for all the systems that process
USG classified information
Which of the following terms describes the measures that protect and support information and information syste
Which of the following terms describes the measures that protect and support information and
information systems by ensuring their availability, integrity, authentication, confidentiality, and nonrepudiation
Which of the following is an Information Assurance (IA) model that protects and defends information …
Which of the following is an Information Assurance (IA) model that protects and defends
information and information systems by ensuring their availability, integrity, authentication,
confidentiality, and non-repudiation
Which of the following tools will help you to perform the above task
You work as an ISSE for BlueWell Inc. You want to break down user roles, processes, and
information until ambiguity is reduced to a satisfactory degree. Which of the following tools will
help you to perform the above task
Choose all that apply
The National Information Assurance Certification and Accreditation Process (NIACAP) is the
minimum standard process for the certification and accreditation of computer and
telecommunications systems that handle U.S. national security information. What are the different
types of NIACAP accreditation Each correct answer represents a complete solution. Choose all
that apply.
Which of the following are the effects of loss of confidentiality, integrity, or availability in a high level
FIPS 199 defines the three levels of potential impact on organizations low, moderate, and high.
Which of the following are the effects of loss of confidentiality, integrity, or availability in a high
level potential impact
Choose all that apply
Which of the following individuals are part of the senior management and are responsible for
authorization of individual systems, approving enterprise solutions, establishing security policies,
providing funds, and maintaining an understanding of risks at all levels Each correct answer
represents a complete solution. Choose all that apply.
Which of the following laws is the first to implement penalties for the creator of viruses, worms, and other t
Which of the following laws is the first to implement penalties for the creator of viruses, worms,
and other types of malicious code that causes harm to the computer systems