The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 305 Weeks Ago, 1 Day Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
I need help with the multiple choice answers on this quiz answers 6-20 on this document
Â
Â
Â
MULTIPLE CHOICES QUESTIONS
6. Which of the following is not part of the security best practice?
A. Need to know
B. Least privilege
C. Separation of duties
D. Exposer
Â
7. Which of the following is not a type of security control?
A. Directive Controls
B. Effective Controls
C. Preventive Controls
D. Corrective Controls
Â
8. FIPS Publication 199 requires agencies to categorize their information system as
A. Low-impact
B. Medium-impact
C. High-impact
D. All of the above
Â
9. Based on the FIPS PUB 200 The minimum security requirements cover -----------security -related areas with regard to protecting the confidentiality, integrity, and availability of federal information systems and the information processed, stored, and transmitted by those systems
A. 17
B. 3
C. 12
D. 5
Â
10. Federal agencies will have up to -----------year(s) from the date of final NIST Special Publication 800-53to fully comply with the changes but are encouraged to initiate compliance activities immediately.Â
A. Four
B. Three
C. Two
D. One
Â
11. Security awarenessÂ
A. Is the same a professional education
B. Is the same as background checks and verifying education
C. Makes it easy to find out who is a security risk
D. Begins the first day of employment
Â
12. Base on the NIST Special Publication 800-30, integration of Risk Management into the SDLC consist of ------------phasesÂ
A. 10
B. 5
C. 3
D. 6
Â
13. Base on the NIST Special Publication 800-30, The risk assessment methodology encompasses -------- primary steps
A. Five
B. Eight
C. Nine
D. Two
Â
14. Base on the NIST Special Publication 800-30, integration of Risk, the control categories for both technical and nontechnical control methods can be further classified as:Â
A. Preventive and detectiveÂ
B. preventive and defensive
C. defensive and detective
D. preventive and supportive
Â
15. Which of the following is not a risk mitigation method?
A. Risk Assumption
B. Risk avoidance
C. Risk study
D. Risk limitation
16. The risk assessment process is usually repeated at least every ------ years for federal agencies, as mandated by OMB Circular A-130
A. six
B. five
C. four.
D. Three
Â
17. Based on the MITRE Corporation’s Trusted Systems Concepts, A combination of hardware, software, and firmware that implements the Reference Monitor concept is called
A. Assurance system
B. Reference validation mechanism
C. Trusted computing systems
D. Trusted computing mechanism
Â
Â
18. The Biba model was developed to protect which of the following?
A. Availability
B. Integrity
C. Confidentiality
D. Access control
Â
19. The Bell-LaPadula model was developed to protect which of the following?
A. Availability
B. Integrity
C. Confidentiality
D. Access Control
Â
20. Which model is concerned with who is authorized to give access to file and folders to other users?
A. Clark-Wilson
B. Bell LaPadula
C. Biba
D. Take-Grant
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly