1.
Your project team has identified a project risk that must be responded to. The risk has been recorded in the risk register and the project team has been discussing potential risk responses for the risk event. The event is not likely to happen for several months but the probability of the event is high. Which one of the following is a valid response to the identified risk event
2.
Which of the following CNSS policies describes the national policy on use of cryptomaterial by activities operating in high risk environments
3.
Which of the following certification levels requires the completion of the minimum security checklist and more in-depth, independent analysis
4.
Which of the following individuals reviews and approves project deliverables from a QA perspective
5.
Which of the following memorandums reminds the departments and agencies of the OMB principles for including and funding security as an element of agency information technology systems and architectures and of the decision criteria which is used to evaluate security for information systems investments
6.
Numerous information security standards promote good security practices and define frameworks or systems to structure the analysis and design for managing information security controls. Which of the following are the U.S. Federal Government information security standards Each correct answer represents a complete solution. Choose all that apply.
7.
Which of the following is the acronym of RTM
8.
Which of the following is the application of statistical methods to the monitoring and control of a process to ensure that it operates at its full potential to produce conforming product
9.
Which of the following DoD directives is referred to as the Defense Automation Resources Management Manual
10.
Which of the following is a 1996 United States federal law, designed to improve the way the federal government acquires, uses, and disposes information technology