Go ahead, test your knowledge:
80. Level of concern reflects
the sensitivity of the information and the consequences of the loss of
confidentiality, availability, or _____.
a. Truth
b. Equipment
c. Integrity
d. Values
e. Ethics
81. Who has responsibility
for accrediting information systems used to process classified information in
industry?
a. CSA
b. FSO
c. ISSM
d. ISSO
e. Contractor
82. The CSA can grant interim
approval to operate an IS for up to:
a. 120 days
b. 90 days
c. 180 days
d. 1 year
e. 45 days
83. Systems operate at
Protection Level 3 when:
a. All users have required approvals for
access to all information
on system
b. All users have required clearance, but
at least one lacks
need to know
c. All users have required clearance, but
at least one lacks formal access approval of the information
on the system
d. None of the above
e. All of the above
84. For availability of
information, what level of concern reflects that information must be available with
flexible tolerance for delay??
a. Low
b. Medium
c. High
d. Basic
e. Intermediate
Answers follow this line:
------------------------------------------------------------------------------------------------------------
80. Level of concern reflects the sensitivity of the information and the consequences of the loss of confidentiality, availability, or _____.
c. Integrity (NISPOM 8-401)
81. Who has responsibility for accrediting information systems used to process classified information in industry?
a. CSA (NISPOM 8-102)
82. The CSA can grant interim approval to operate an IS for up to:
c. 180 days (NISPOM 8-202)
83. Systems operate at Protection Level 3 when:
c. All users have required clearance, but at least one lacks formal access approval of the information on the system (NISPOM 8-402c)
84. For availability of information, what level of concern reflects that information must be available with flexible tolerance for delay??
d. Basic (NISPOM Chapter 8 Table 3)
Jeffrey W. Bennett, ISP is the owner of Red Bike Publishing Red Bike Publishing . Jeff is an accomplished writer of non-fiction books, novels and periodicals. He also owns Red bike Publishing. Published books include: "Get Rich in a Niche-Insider's Guide to Self Publishing in a Specialized Industry" and "Commitment-A Novel". Jeff is an expert in security and has written many security books including: "Insider's Guide to Security Clearances" and "DoD Security Clearances and Contracts Guidebook", "ISP Certification-The Industrial Security Professional Exam Manual", and NISPOM/FSO Training" See Red Bike Publishing for print copies of: Army Leadership, The Ranger Handbook, The Army Physical Readiness Manual, Drill and Ceremonies, The ITAR,and The NISPOM
No comments:
Post a Comment