1.
Which of the of following departments protects and supports DoD information, information systems, and information networks that are critical to the department and the armed forces during the day-to-day operations, and in the time of crisis
2.
Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions
3.
Certification and Accreditation (C&A or CnA) is a process for implementing information security. Which of the following is the correct order of C&A phases in a DITSCAP assessment
4.
Which of the following federal agencies has the objective to develop and promote measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life
5.
SIMULATION Fill in the blank with an appropriate phrase. The ____________ helps the customer understand and document the information management needs that support the business or mission. Correct Answer: systems engineer Section: (none) Explanation Explanation/Reference:Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the international information security standards Each correct answer represents a complete solution. Choose all that apply.
6.
Which of the following certification levels requires the completion of the minimum security checklist, and the system user or an independent certifier can complete the checklist
7.
Which of the following cooperative programs carried out by NIST provides a nationwide network of local centers offering technical and business assistance to small manufacturers
8.
Which of the following DoD directives defines DITSCAP as the standard C&A process for the Department of Defense
9.
You work as a security engineer for BlueWell Inc. According to you, which of the following statements determines the main focus of the ISSE process
10.
Which of the following is NOT an objective of the security program