1.
The Security Control Assessor has just completed the Security Assessment Report. What is the next STEP? [800-37r1]
A. 
B. 
C. 
D. 
Submit the Security Authorization Package
E. 
Review the SAR and get the SCA to do his/her job correctly
2.
The authorization package contains the following documents:
A. 
B. 
Security assessment report; and
C. 
Plan of action and milestones.
D. 
MOR, memorandum on record for your recomendation
3.
Mr. Harris, acting AODR, has just approved the Security Plan. What step is next.
A. 
B. 
C. 
D. 
4.
Sonny, The ISSO, wants to go a document that is for National Security System determination. Which document has he sent ?
A. 
B. 
C. 
D. 
E. 
5.
During STEP 4 of the RMF process. Which primary role has most of the responsibilities?
A. 
B. 
C. 
D. 
E. 
F. 
6.
There are two types of authorization decisions that can be rendered by authorizing officials: (800-37r1)
A. 
B. 
Authorization to operate; and Denial of authorization to operate.
C. 
D. 
ATO and ATO with conditions
7.
DSA Ross is disposing of a computer with a CLASSIFICATION of SECRET. The hard drive on this system will not be reused. Using NIST 800-88 Which sanitization type should be used for this system. "Guidelines for Media Sanitization "
A. 
B. 
C. 
D. 
8.
Sona is a SharePoint Administrator on a server with data availability impact classified as high, in case there is a hardware issue for redundancy they should be using a:
A. 
B. 
C. 
D. 
9.
Fabian has just been appointed to the position of the Security Control Assessor. He downloaded and read NIST Special Publication 800-30 Guide for Conducting Risk Assessments. What is the last step of that process?
A. 
B. 
C. 
D. 
10.
FMT Auto has added a Digital Display Unit to a vehicle, they will not be using any antivirus software on the system because its a standalone system and the AV software would take too much computing power. The AO is ok with leaving the AV software off the system. The STEP 3: RISK RESPONSE for NIST 800-39 would be considered as:
A. 
B. 
C. 
D. 
11.
Test methodology that assumes some knowledge of the internal structure and implementation detail of the assessment object
A. 
B. 
C. 
D. 
12.
A school has a web with a phone directory of employees‘ names and work phone numbers so that members of the public can contact them directly.In this case, the PII confidentiality impact level would be ____
A. 
B. 
C. 
D. 
E. 
F. 
13.
FISMA requires the Office of Management and Budget (OMB) to define a major incident and directs agencies to report major incidents to Congress within _______of identification.
A. 
B. 
C. 
D. 
E. 
14.
Systems that store, communicate, or process trade secrets will generally be assigned at least a _____ confidentiality impact level.
A. 
B. 
C. 
D. 
15.
_______ backup stores files that were created or modified since the last full backup.
A. 
B. 
C. 
D. 
16.
The legal definitions for Confidentiality, Integrity and Availability are defined within
A. 
B. 
Federal Information Security Management Act 2002
C. 
Federal Information Security Management Act 2012
D. 
Federal Information Security Modernization Act 2002
E. 
Federal Information Security Modernization Act 2012
17.
In the image below the data within column A is called
A. 
B. 
C. 
D. 
18.
Where would you find the privacy controls in 800-53
A. 
B. 
C. 
D. 
19.
Basic Testing is also known as
A. 
B. 
C. 
D. 
20.
The senior organizational official with overall organization-wide responsibility for information privacy issues.
A. 
B. 
C. 
D. 
21.
Examples of PII Data can include. (Select all that apply)
A. 
Name, such as full name, maiden name, mother‘s maiden name, or alias
B. 
Personal identification number, such as social security number (SSN), passport number, driver‘s license number, taxpayer identification number, patient identification number, and financial account or credit card number
C. 
Address information, such as street address or email address
D. 
Asset information, such as Internet Protocol (IP) or Media Access Control (MAC) address or other host-specific persistent static identifier that consistently links to a particular person or small, welldefined group of people
E. 
Telephone numbers, including mobile, business, and personal numbers
22.
OMB Memorandum 02-01 (Guidance for Preparing and Submitting Security Plans of Action and Milestones) is used for which part of the RMF Step and Task ?
A. 
B. 
C. 
D. 
23.
Fabian is doing an assessment. Select the correct POTENTIAL ASSESSMENT METHODS AND OBJECTS: for
IR-6(2) INCIDENT REPORTING | VULNERABILITIES RELATED TO INCIDENTS
"Organizational processes for incident reporting; automated mechanisms supporting and/or implementing reporting of vulnerabilities associated with security incidents]."
Match the the Assessment above with the selection below.
A. 
B. 
C. 
D. 
E. 
24.
The authorization decision document conveys the final security authorization decision from the authorizing official to the information system owner or common control provider, and other organizational officials, as appropriate. The authorization decision document contains the following information: (Check all that apply)
A. 
B. 
Terms and conditions for the authorization
C. 
Authorization termination date
D. 
25.
800-37 TASK 1-2 includes (best answer)
A. 
Describe the information system
B. 
Describe the information system (including the system boundary)
C. 
Describe the information system (including system boundary) and document the description in the security plan.
D.