FITSAF stands for Federal Information Technology Security Assessment Framework. It is a
methodology for assessing the security of information systems. Which of the following FITSAF levels
shows that the procedures and controls are tested and reviewed
A
Which of the following is a type of security management for computers and networks in order to
identify security breaches
B
Which of the following types of firewalls increases the security of data packets by remembering the
state of connection at the network and the session layers as they pass through the filter
C
Which of the following federal laws is designed to protect computer data from theft
B
Which of the following is used to indicate that the software has met a defined quality level and is
ready for mass distribution either by electronic means or by physical media
B
Part of your change management plan details what should happen in the change control system for
your project. Theresa, a junior project manager, asks what the configuration management activities
are for scope changes. You tell her that all of the following are valid configuration management
activities except for which one
A
Which of the following professionals is responsible for starting the Certification & Accreditation
(C&A) process
B
Which of the following security controls is a set of layered security services that address
communications and data security problems in the emerging Internet and intranet application space
B
Which of the following protocols is used to establish a secure terminal to a remote network device
C
Which of the following elements of Registration task 4 defines the system's external interfaces as
well as the purpose of each external interface, and the relationship between the interface and the
system
C
Which of the following guidelines is recommended for engineering, protecting, managing,
processing, and controlling national security and sensitive (although unclassified) information
B
Which of the following Security Control Assessment Tasks gathers the documentation and supporting
materials essential for the assessment of the security controls in the information system
C
Which of the following professionals plays the role of a monitor and takes part in the organization's
configuration management process
C
Which of the following processes culminates in an agreement between key players that a system in
its current configuration and operation provides adequate protection controls
A
The Phase 4 of DITSCAP C&A is known as Post Accreditation. This phase starts after the system has
been accredited in Phase 3. What are the process activities of this phase Each correct answer
represents a complete solution. Choose all that apply.
E,A,F,C,D