Which of the following security controls is a set of layered security services that address communications and data security problems in the emerging Internet and intranet application space
A. Internet Protocol Security (IPSec)
B. Common data security architecture (CDSA)
C. File encryptors
D. Application program interface (API)
Which of the following federal agencies provides a forum for the discussion of policy issues, sets national policy, and promulgates direction, operational procedures, and guidance for the security of national security systems
A. National Security AgencyCentral Security Service (NSACSS)
B. National Institute of Standards and Technology (NIST)
C. United States Congress
D. Committee on National Security Systems (CNSS)
What are the subordinate tasks of the Initiate and Plan IA CandA phase of the DIACAP process Each correct answer represents a complete solution. Choose all that apply.
A. Develop DIACAP strategy.
B. Initiate IA implementation plan.
C. Conduct validation activity.
D. Assemble DIACAP team.
E. Register system with DoD Component IA Program.
F. Assign IA controls.
Which of the following Security Control Assessment Tasks evaluates the operational, technical, and the management security controls of the information system using the techniques and measures selected or developed
A. Security Control Assessment Task 3
B. Security Control Assessment Task 1
C. Security Control Assessment Task 4
D. Security Control Assessment Task 2
Which of the following DoD directives defines DITSCAP as the standard CandA process for the Department of Defense
A. DoD 5200.22-M
B. DoD 8910.1
C. DoD 5200.40
D. DoD 8000.1
Which of the following cooperative programs carried out by NIST speed ups the development of modern technologies for broad, national benefit by co-funding research and development partnerships with the private sector
A. Baldrige National Quality Program
B. Advanced Technology Program
C. Manufacturing Extension Partnership
D. NIST Laboratories
Which of the following individuals informs all CandA participants about life cycle actions, security requirements, and documented user needs
A. User representative
B. DAA
C. Certification Agent
D. IS program manager
Which of the following acts is used to recognize the importance of information security to the economic and national security interests of the United States
A. Lanham Act
B. FISMA
C. Computer Fraud and Abuse Act
D. Computer Misuse Act
Which of the following organizations incorporates building secure audio and video communications equipment, making tamper protection products, and providing trusted microelectronics solutions
A. DTIC
B. NSA IAD
C. DIAP
D. DARPA
Fill in the blank with an appropriate section name. _________________ is a section of the SEMP template, which specifies the methods and reasoning planned to build the requisite trade-offs between functionality, performance, cost, and risk.