Which of the following Registration Tasks sets up the system architecture description, and describes the C&A boundary
Answer : B
Which of the following phases of the ISSE model is used to determine why the system needs to be built and what information needs to be protected
Answer : C
You work as a security engineer for BlueWell Inc. Which of the following documents will you use as a guide for the security certification and accreditation of Federal Information Systems
Answer : B
The principle of the SEMP is not to repeat the information, but rather to ensure that there are processes in place to conduct those functions. Which of the following sections of the SEMP template describes the work authorization procedures as well as change management approval processes
Answer : B
Which of the following processes illustrate the study of a technical nature of interest to focused audience, and consist of interim or final reports on work made by NIST for external sponsors, including government and non-government sponsors
Answer : C
Which of the following agencies is responsible for funding the development of many technologies such as computer networking, as well as NLS
Answer : A
Which of the following principles are defined by the IATF model Each correct answer represents a complete solution. Choose all that apply.
Answer : B, C, D