Which of the following individuals is responsible for monitoring the information system environment for factors that can negatively impact the security of the system and its accreditation?
Correct Answer:
C
Which of the following RMF phases is known as risk analysis?
Correct Answer:
A
Which of the following techniques are used after a security breach and are intended to limit the extent of any damage caused by the incident?
Correct Answer:
D
You are the project manager for TTP project. You are in the Identify Risks process. You have to create the risk register. Which of the following are included in the risk register?
Each correct answer represents a complete solution. Choose two.
Correct Answer:
AB
Which of the following NIST documents provides a guideline for identifying an information system as a National Security System?
Correct Answer:
B