FITSP

Liberty University

Here are the best resources to pass FITSP. Find FITSP study guides, notes, assignments, and much more.

All 19 results

Sort by

FITSP-A Module 4 QUESTIONS AND ANSWERS
  • FITSP-A Module 4 QUESTIONS AND ANSWERS

  • Exam (elaborations) • 8 pages • 2023
  • Available in package deal
  • 1. List the 3 security objectives under FISMA. a) Confidentiality, Integrity, Authentication b) Confidentiality, Integrity, Availability c) Containment, Integrity, Availability d) Confidentiality, Impact, Availability correct answer: Correct answer: b) Confidentiality, Integrity, Availability FISMA 2002, Section 3542 states: "The term 'information security' means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or dest...
    (0)
  • $11.49
  • + learn more
FITSP-A Module 10 QUESTIONS AND ANSWERS
  • FITSP-A Module 10 QUESTIONS AND ANSWERS

  • Exam (elaborations) • 11 pages • 2023
  • Available in package deal
  • 1. What is defined as a simulation of an emergency designed to validate the viability of one or more aspects of an ISCP? a) ISCP Test b) ISCP Exercise c) ISCP Training d) ISCP Drill correct answer: Correct answer: b) ISCP Exercise NIST SP 800-34rl, Paragraph 3.5.3 states: "An exercise is a simulation of an emergency designed to validate the viability of one or more aspects of an ISCP." Incorrect answers: a) ISCP Testing takes many forms, but is not necessarily scenario-based; c) I...
    (0)
  • $11.49
  • + learn more
FITSP-A Module 9 QUESTIONS AND ANSWERS
  • FITSP-A Module 9 QUESTIONS AND ANSWERS

  • Exam (elaborations) • 11 pages • 2023
  • Available in package deal
  • 1. All of the following are considered remote access, EXCEPT: a) Dial-up b) Broadband c) VPN d) Wireless correct answer: Correct answer: c) VPN NIST SP 800-53r4, Control AC-17, Supplemental Guidance states: "Remote access methods include, for example, dial-up, broadband, and wireless. Organizations often employ encrypted virtual private networks (VPNs) to enhance confidentiality and integrity over remote connections." Incorrect answers: a), b), and d) are remote access methods as ...
    (0)
  • $12.99
  • + learn more
FITSP-A Module 5 QUESTIONS AND ANSWERS
  • FITSP-A Module 5 QUESTIONS AND ANSWERS

  • Exam (elaborations) • 8 pages • 2023
  • Available in package deal
  • 1. An assessment object for each security control, which identifies the specific control items being assessed and testing techniques, can be found in which document? a) NIST Special Publication 800-37 Revision 1, Guide for Applying the Risk Management Framework to Federal Information Systems b) NIST Special Publication 800-53 Revision 4, Recommended Security Controls for Federal Information Systems and Organizations c) NIST Special Publication 800-53A Revision 4, Guide for Assessing the Sec...
    (0)
  • $12.49
  • + learn more
FITSP-A 283 QUESTIONS AND ANSWERS
  • FITSP-A 283 QUESTIONS AND ANSWERS

  • Exam (elaborations) • 20 pages • 2023
  • Available in package deal
  • What elements are components of an information system? correct answer: OMB Circular A-130, App III: "A system normally includes hardware, software, information, data, applications, communications, and people." What are some of the threats that the information system faces? correct answer: NIST SP 800-39rl, p. 1: "Threats to information and information systems can include purposeful attacks, environmental disruptions, and human/machine errors and result in great harm to the national and e...
    (0)
  • $13.49
  • + learn more
FITSP-A Module 7 QUESTIONS WITH COMPLETE SOLUTIONS
  • FITSP-A Module 7 QUESTIONS WITH COMPLETE SOLUTIONS

  • Exam (elaborations) • 9 pages • 2023
  • Available in package deal
  • 1. Name the reporting tool, which automates Agency FISMA reporting directly to the DHS. a) FISMA b) DHS Reporting Metrics c) Cyberscope d) Cyberstat correct answer: Correct answer: c) CyberScope. In OMB M-10-15, CyberScope was designated as the reporting tool for FISMA reporting. Incorrect answers: a) FISMA requires the reports; b) DHS Reporting Metrics indicate what must be reported; d) CyberStat refers to OMB's reviews 2. Which family of security controls is considered Tier 2?...
    (0)
  • $10.49
  • + learn more
FITSP-A Module 8 QUESTIONS WITH COMPLETE SOLUTIONS
  • FITSP-A Module 8 QUESTIONS WITH COMPLETE SOLUTIONS

  • Exam (elaborations) • 9 pages • 2023
  • Available in package deal
  • 1. The implementation of a continuous monitoring program results in ongoing updates to all of the following documents, EXCEPT: a) Security Plan b) Security Assessment Plan c) Security Assessment Report d) Plan of Action & Milestones correct answer: Correct answer: b) Security Assessment Plan NIST SP 800-137, Chapter 1 states: "Frequent updates to security plans, security assessment reports, plans of action and milestones, hardware and software inventories, and other system information...
    (0)
  • $11.49
  • + learn more
FITSP Manager-Part 2| 242 QUESTIONS| WITH COMPLETE SOLUTIONS| 37 PAGES
  • FITSP Manager-Part 2| 242 QUESTIONS| WITH COMPLETE SOLUTIONS| 37 PAGES

  • Exam (elaborations) • 37 pages • 2023
  • Available in package deal
  • HIDS/HIPS correct answer: - Host-Based, - monitors the characteristics of a single host and the events occurring within that host for suspicious activity and most commonly deployed on critical hosts such as publicly accessible servers and servers containing sensitive information - network traffic (only for that host), system logs, running processes, application activity, file access and modification, and system and application configuration changes. NIST SP 800-60, Rev 1 correct answer: S...
    (0)
  • $12.99
  • + learn more
FITSP-A Module 3 QUESTIONS WITH COMPLETE SOLUTIONS
  • FITSP-A Module 3 QUESTIONS WITH COMPLETE SOLUTIONS

  • Exam (elaborations) • 11 pages • 2023
  • Available in package deal
  • 1. What elements are components of an information system? a) Hardware and software b) Interconnected systems c) People d) All of the above correct answer: Correct answer: d) All of the above OMB Circular A-130, App ill: "A system normally includes hardware, software, information, data, applications, communications, and people.' Incorrect answers: The individual choices alone do not constitute a system. Information systems must be considered in a holistic manner. 2. What are some of ...
    (0)
  • $12.99
  • + learn more
FITSP-A Module 1 Laws and Regs
  • FITSP-A Module 1 Laws and Regs

  • Exam (elaborations) • 2 pages • 2023
  • Available in package deal
  • Clinger-Cohen Act correct answer: The following legislation requires federal agencies to establish capital planning and investment control policies and procedures when procuring information technology: Clinger-Cohen Act correct answer: The following legislation requires federal agencies to appoint a Chief Information Officer: Federal Information Security Modernization Act of 2014 (FISMA) correct answer: The following legislation requires federal agencies to develop, document and impleme...
    (0)
  • $8.49
  • + learn more