Fitsp a module 3 - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Fitsp a module 3? On this page you'll find 17 study documents about Fitsp a module 3.
Page 2 out of 17 results
Sort by
-
FITSP Manager-Part 2 Exam Questions and Answers
- Exam (elaborations) • 47 pages • 2024
-
- $14.49
- + learn more
FITSP Manager-Part 2 Exam Questions and Answers 
HIDS/HIPS - Answer ️️ -- Host-Based, 
- monitors the characteristics of a single host and the events occurring within that host for 
suspicious activity and most commonly deployed on critical hosts such as publicly accessible 
servers and servers containing sensitive information 
- network traffic (only for that host), system logs, running processes, application activity, file 
access and modification, and system and application configuration ...
-
FITSP-A Module 9 question and answers rated A+ 2023 Passed
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $12.99
- + learn more
FITSP-A Module 9 question and answers rated A+ 2023 Passed1. All of the following are considered remote access, EXCEPT: 
 
a) Dial-up 
b) Broadband 
c) VPN 
d) Wireless - correct answer Correct answer: c) VPN 
 
NIST SP 800-53r4, Control AC-17, Supplemental Guidance states: "Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections." 
 
Incor...
-
FITSP-A Module 3 question n answers graded A+ 2023
- Exam (elaborations) • 16 pages • 2023
-
Available in package deal
-
- $11.49
- + learn more
FITSP-A Module 3
-
FITSP-A Module 8 question and answers rated A+ 2023 LATEST UPDATE
- Exam (elaborations) • 13 pages • 2023
- Available in package deal
-
- $11.49
- + learn more
FITSP-A Module 8 question and answers rated A+ 2023 LATEST UPDATE 
1. The implementation of a continuous monitoring program results in ongoing updates to all of the following documents, EXCEPT: 
 
a) Security Plan 
b) Security Assessment Plan 
c) Security Assessment Report 
d) Plan of Action & Milestones - correct answer Correct answer: b) Security Assessment Plan 
 
NIST SP 800-137, Chapter 1 states: "Frequent updates to security plans, security assessment reports, plans of action and mileston...
-
FITSP-A Module 7 Questions and Answers
- Exam (elaborations) • 9 pages • 2023
-
- $10.99
- + learn more
1. Name the reporting tool, which automates Agency FISMA reporting directly to the DHS. 
 
a) FISMA 
b) DHS Reporting Metrics 
c) Cyberscope 
d) Cyberstat - Answer- Correct answer: c) CyberScope. 
 
In OMB M-10-15, CyberScope was designated as the reporting tool for FISMA reporting. 
 
Incorrect answers: a) FISMA requires the reports; b) DHS Reporting Metrics indicate what must be reported; d) CyberStat refers to OMB's reviews 
 
2. Which family of security controls is considered Tier 2? 
 
a) ...
Too much month left at the end of the money?
-
FITSP-A Module 3 QUESTIONS WITH COMPLETE SOLUTIONS
- Exam (elaborations) • 11 pages • 2023
-
Available in package deal
-
- $12.99
- + learn more
1. What elements are components of an information system? 
a) Hardware and software 
b) Interconnected systems 
c) People 
d) All of the above correct answer: Correct answer: d) All of the above 
OMB Circular A-130, App ill: "A system normally includes hardware, software, information, data, applications, communications, and people.' 
Incorrect answers: The individual choices alone do not constitute a system. Information systems must be considered in a holistic manner. 
 
2. What are some of ...
-
FITSP-A Module 4 Questions and Answers (Graded A)
- Exam (elaborations) • 9 pages • 2023
-
- $10.49
- + learn more
1. List the 3 security objectives under FISMA. 
a) Confidentiality, Integrity, Authentication 
b) Confidentiality, Integrity, Availability 
c) Containment, Integrity, Availability 
d) Confidentiality, Impact, Availability - Answer- Correct answer: b) Confidentiality, Integrity, Availability 
 
FISMA 2002, Section 3542 states: "The term 'information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction...
$6.50 for your textbook summary multiplied by 100 fellow students... Do the math: that's a lot of money! Don't be a thief of your own wallet and start uploading yours now. Discover all about earning on Stuvia