Explore the Risk Management Framework through targeted questions! Assess your understanding of security assessment, system authorization, and the roles involved in the RMF process. Key for professionals aiming to enhance their knowledge in system security and compliance.
Security plan;
Security assessment report; and
Plan of action and milestones.
MOR, memorandum on record for your recomendation
Rate this question:
Categorize
Implement
Asses the controls
Continuous Monitoring
Rate this question:
800-37
800-59
800-60
800-53
800-50
ISSO
ISO
SCA
ISSM
AO
CIO
Rate this question:
IATT and IATO
Authorization to operate; and Denial of authorization to operate.
ATO and IATT
ATO and ATO with conditions
Rate this question:
Disposal
Clearing
Purging
Destroying
Rate this question:
Hot Site
Cold site
Mobile Site
Mirrored Site
Rate this question:
Manage
Maintain
Monitor
Modify
Rate this question:
Risk Avoidance
Risk Mitigation
Risk Acceptance
Risk Sharing or Transfer
Rate this question:
Black box
White box
Grey box
Comprehensive
Rate this question:
Not Applicable
Low
Moderate
Medium
High
Other
Rate this question:
30 days
7 days
90 days
4 hours
24 hours
Rate this question:
Moderate
Low
Medium
High
Rate this question:
Full
As needed
Incremental
Differential
Rate this question:
Wikipedia
Federal Information Security Management Act 2002
Federal Information Security Management Act 2012
Federal Information Security Modernization Act 2002
Federal Information Security Modernization Act 2012
Rate this question:
Qualitative Values
Quantitative Values
Semi-Quantitative Values
Semi Qualitative Values
Rate this question:
Appendix G
Appendix H
Appendix I
Appendix J
Rate this question:
Black Box testing
White box testing
Red box testing
Grey box testing
Rate this question:
CIO
SOAP
CEO
SISO
Name, such as full name, maiden name, mother‘s maiden name, or alias
Personal identification number, such as social security number (SSN), passport number, driver‘s license number, taxpayer identification number, patient identification number, and financial account or credit card number
Address information, such as street address or email address
Asset information, such as Internet Protocol (IP) or Media Access Control (MAC) address or other host-specific persistent static identifier that consistently links to a particular person or small, welldefined group of people
Telephone numbers, including mobile, business, and personal numbers
Rate this question:
Step 1 Task 4
Step 4 Task 1
Step 5 Task 1
Step 3 Task 3
Examine
Interview
Test
Interrogate
Assess
Rate this question:
Authorization decision
Terms and conditions for the authorization
Authorization termination date
The AODR signature
Rate this question:
Describe the information system
Describe the information system (including the system boundary)
Describe the information system (including system boundary) and document the description in the security plan.
Categorize
Rate this question:
Planning
Configuration
Termination
Initiation
Development and acquisition
Implementation
Operation and maintenance
Disposal
Rate this question:
New threat/vulnerability/impact information
An increased number of findings, weaknesses, and/or deficiencies from the continuous monitoring program
New missions/business requirements
A change in the Authorizing Official
A significant change in risk assessment findings
Significant changes to the information system, common controls, or the environment of operation
Organizational thresholds being exceeded.
Rate this question:
Standardize the format and nomenclature used for communicating information about configurations and security flaws.
Do vulnerability scans
Do STIG checks
Do SCA Automation checking
Rate this question:
Remediation
SAP
SAR
Authorize
Rate this question:
Quiz Review Timeline (Updated): Nov 16, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.