1.
Which of the following elements of Registration task 4 defines the system's external interfaces as well as the purpose of each external interface, and the relationship between the interface and the system
2.
Which of the following guidelines is recommended for engineering, protecting, managing, processing, and controlling national security and sensitive (although unclassified) information
3.
Which of the following Security Control Assessment Tasks gathers the documentation and supporting materials essential for the assessment of the security controls in the information system
4.
Which of the following email lists is written for the technical audiences, and provides weekly summaries of security issues, new vulnerabilities, potential impact, patches and workarounds, as well as the actions recommended to mitigate risk
5.
Which of the following tasks obtains the customer agreement in planning the technical effort
6.
Which of the following elements are described by the functional requirements task Each correct answer represents a complete solution. Choose all that apply.
7.
Which of the following documents is defined as a source document, which is most useful for the ISSE when classifying the needed security functionality
8.
DoD 8500.2 establishes IA controls for information systems according to the Mission Assurance Categories (MAC) and confidentiality levels. Which of the following MAC levels requires basic integrity and availability
9.
What are the responsibilities of a system owner Each correct answer represents a complete solution. Choose all that apply.
10.
Which of the following Registration Tasks sets up the business or operational functional description and system identification