The following legislation requires federal agencies to establish capital planning and investment control policies and procedures when procuring information technology:
a) E-Government Act of 2002
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act...
FITSP - Auditor
Questions &
Answers(LATEST
UPDATE 2024)Correct
100%
The following legislation requires federal agencies to establish capital planning and investment control
policies and procedures when procuring information technology:
a) E-Government Act of 2002
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act (GISRA)
d) Clinger-Cohen Act - ANSWER Clinger-Cohen Act
The following legislation requires federal agencies to appoint a Chief Information Officer:
a) E-Government Act of 2002
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act (GISRA)
d) Clinger-Cohen Act - ANSWER Clinger-Cohen Act
,The following legislation requires federal agencies to develop, document, and implement an agency-
wide information security program:
a) E-Government Act of 2002, Section 208
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act (GISRA)
d) Clinger-Cohen Act - ANSWER Federal Information Security Management Act (FISMA)
The following legislation requires federal agencies to prepare Privacy Impact Assessments (PIAs) when
developing or procuring new information technology:
a) E-Government Act of 2002, Section 208
b) Federal Information Security Management Act (FISMA)
The following legislation requires each agency with an Inspector General to conduct an annual
evaluation of agency's information security program, or to appoint an
independent external auditor, to conduct the evaluation on their behalf:
a) E-Government Act of 2002, Title I
b) Federal Information Security Management Act (FISMA)
c) Government Information Security Reform Act (GISRA)
d) Clinger-Cohen Act - ANSWER Federal Information Security Management Act (FISMA)
The Secretary of what department or agency was delegated the responsibility by FISMA to prescribe
standards and guidelines pertaining to federal information systems
to improve the efficiency of operation or security of Federal information systems:
a) Department of Homeland Security (DHS)
b) Defense Department
c) Commerce Department
d) National Security Agency - ANSWER
, The following OMB guidance established the requirement for federal agencies to review the security
controls in each system when significant modifications are made to
the system, or at least every three years. This guidance also requires federal agencies to re-authorize
information systems every three years.
a) OMB Circular No. A-123- Management Accountability and Control
b) OMB Circular No. A-130, Appendix III, Security of Federal Automated Information Resources
c) OMB Circular No. A-127, Financial Management Systems
d) OMB Circular No. A-136, Financial Management Reporting Requirements - ANSWER OMB Circular No.
A-130, Appendix III, Security of Federal Automated Information Resources
The Federal Information Security Modernization Act of 2014 (FISMA 2014) formally assigns information
security responsibilities to which of the following agencies/departments (select two):
a) Commerce
b) DHS
c) Justice
d) OMB - ANSWER DHS and OMB
This Homeland Security Presidential Directive requires all Federal agencies to adopt a standard,
government-wide card to reduce identity fraud, protect personal privacy, and provide for
authentication. This directive is called:
a) Real-ID Act
b) HSPD-12 - Common Identification Standard
c) Critical Infrastructure Protection Act
d) HSPD 24 - Biometrics to Enhance National Security Act - ANSWER HSPD-12 - Common Identification
Standard
FISMA Reporting Metrics are now published annually by what agency/department?
a) OMB
b) Commerce
c) Justice
, d) DHS - ANSWER DHS
Agencies are now required to submit required FISMA reports using which of the following automated
systems?
a) CyberStat
b) FISMARpt
c) CyberScope
d) CyberProtect - ANSWER CyberScope
Where can you find the list of recently publish privacy controls required for Federal information systems
containing Pll?
Which agency/department conducts audits of private organizations using electronic health systems?
a) GAO
b) HHS
c) OMB
d) Justice - ANSWER HHS
The following OMB memo announced implementation of commonly accepted security configurations for
windows operating systems.
a) M-07-18
b) M-09-32
c) M-10-28
d) M-07-11 - ANSWER M-07-11
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller shantelleG. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.