Fitsp a module 4 Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Fitsp a module 4? On this page you'll find 13 study documents about Fitsp a module 4.
All 13 results
Sort by
-
FITSP-A Module 4 Question and answers 2023/2024 verified to pass
- Exam (elaborations) • 11 pages • 2023
-
Available in package deal
-
- $13.49
- + learn more
FITSP-A Module 4 Question and answers 2023/2024 verified to pass 
1. List the 3 security objectives under FISMA. 
a) Confidentiality, Integrity, Authentication 
b) Confidentiality, Integrity, Availability 
c) Containment, Integrity, Availability 
d) Confidentiality, Impact, Availability - correct answer Correct answer: b) Confidentiality, Integrity, Availability 
 
FISMA 2002, Section 3542 states: "The term 'information security' means protecting information and information systems from unaut...
-
FITSP-A Module 4 questions with 100% correct answers 2023
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $13.49
- + learn more
FITSP-A Module 4
-
FITSP-A Module 7 Exam Questions and Answers
- Exam (elaborations) • 12 pages • 2024
- Available in package deal
-
- $12.49
- + learn more
FITSP-A Module 7 Exam Questions and Answers 
1. Name the reporting tool, which automates Agency FISMA reporting directly to the DHS. 
a) FISMA 
b) DHS Reporting Metrics 
c) Cyberscope 
d) Cyberstat - Answer ️️ -Correct answer: c) CyberScope. 
In OMB M-10-15, CyberScope was designated as the reporting tool for FISMA reporting. 
Incorrect answers: a) FISMA requires the reports; b) DHS Reporting Metrics indicate what must 
be reported; d) CyberStat refers to OMB's reviews 
2. Which family of s...
-
FITSP-A Module 4 questions with complete solution 2023
- Exam (elaborations) • 11 pages • 2023
-
Available in package deal
-
- $12.99
- + learn more
FITSP-A Module 4
-
FITSP-A Module 5 Exam Questions and Answers
- Exam (elaborations) • 10 pages • 2024
- Available in package deal
-
- $12.49
- + learn more
FITSP-A Module 5 Exam Questions and Answers 
1. An assessment object for each security control, which identifies the specific control items 
being assessed and testing techniques, can be found in which document? 
a) NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management 
Framework to Federal Information Systems 
b) NIST Special Publication 800-53 Revision 4, Recommended Security Controls for Federal 
Information Systems and Organizations 
c) NIST Special Publication 8...
Get paid weekly? You can!
-
FITSP-A Module 4 Correctly answered 2023 updated to pass
- Exam (elaborations) • 11 pages • 2023
- Available in package deal
-
- $10.99
- + learn more
FITSP-A Module 4 Correctly answered 2023 updated to pass 1. List the 3 security objectives under FISMA. 
a) Confidentiality, Integrity, Authentication 
b) Confidentiality, Integrity, Availability 
c) Containment, Integrity, Availability 
d) Confidentiality, Impact, Availability - correct answer Correct answer: b) Confidentiality, Integrity, Availability 
 
FISMA 2002, Section 3542 states: "The term 'information security' means protecting information and information systems from unauthorized a...
-
FITSP-A Module 7 Exam Questions and Answers
- Exam (elaborations) • 12 pages • 2024
- Available in package deal
-
- $12.49
- + learn more
FITSP-A Module 7 Exam Questions and Answers 
1. Name the reporting tool, which automates Agency FISMA reporting directly to the DHS. 
a) FISMA 
b) DHS Reporting Metrics 
c) Cyberscope 
d) Cyberstat - Answer ️️ -Correct answer: c) CyberScope. 
In OMB M-10-15, CyberScope was designated as the reporting tool for FISMA reporting. 
Incorrect answers: a) FISMA requires the reports; b) DHS Reporting Metrics indicate what must 
be reported; d) CyberStat refers to OMB's reviews 
2. Which family of s...
-
FITSP Manager-Part 2 Exam Questions and Answers
- Exam (elaborations) • 47 pages • 2024
-
- $14.49
- + learn more
FITSP Manager-Part 2 Exam Questions and Answers 
HIDS/HIPS - Answer ️️ -- Host-Based, 
- monitors the characteristics of a single host and the events occurring within that host for 
suspicious activity and most commonly deployed on critical hosts such as publicly accessible 
servers and servers containing sensitive information 
- network traffic (only for that host), system logs, running processes, application activity, file 
access and modification, and system and application configuration ...
-
FITSP-A Module 5 Exam Questions and Answers
- Exam (elaborations) • 10 pages • 2024
-
- $12.49
- + learn more
FITSP-A Module 5 Exam Questions and Answers 
1. An assessment object for each security control, which identifies the specific control items 
being assessed and testing techniques, can be found in which document? 
a) NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management 
Framework to Federal Information Systems 
b) NIST Special Publication 800-53 Revision 4, Recommended Security Controls for Federal 
Information Systems and Organizations 
c) NIST Special Publication 8...
-
FITSP-A Module 9 question and answers rated A+ 2023 Passed
- Exam (elaborations) • 15 pages • 2023
- Available in package deal
-
- $12.99
- + learn more
FITSP-A Module 9 question and answers rated A+ 2023 Passed1. All of the following are considered remote access, EXCEPT: 
 
a) Dial-up 
b) Broadband 
c) VPN 
d) Wireless - correct answer Correct answer: c) VPN 
 
NIST SP 800-53r4, Control AC-17, Supplemental Guidance states: "Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections." 
 
Incor...
That summary you just bought made someone very happy. Also get paid weekly? Sell your study resources on Stuvia! Discover all about earning on Stuvia