최신 ISC Certification CGRC 무료샘플문제:
1. The security category of information 1 is determined to be: Confidentiality, low; Integrity, moderate; and availability, Moderate. The security category for information 2 is determined to be:
confidentiality, Not Applicable, Integrity, Low; and availability, Moderate. What is the overall security category? Response:
A) Security Category information type = (confidentiality, NOT APPLICABLE), (integrity, LOW), (availability, MODERATE)
B) Security Category information type = (confidentiality, NOT APPLICABLE), (integrity, MODERATE), (availability, HIGH)
C) Security Category information type = (confidentiality, LOW), (integrity, MODERATE), (availability, MODERATE)
D) Security Category information type = (confidentiality, LOW), (integrity, LOW), (availability, MODERATE)
2. One of the inputs to the risk determination task is the employment of risk assessments to provide information that may influence the risk analysis and risk determination. What publication provides guidance on conducting risk assessments?
Response:
A) NIST SP 800-59
B) NIST SP 800-30
C) NIST SP 800-39
D) NIST SP 800-37
3. Which National Institute of Standards and Technology Special Publication (NIST SP) 800 series document is concerned with continuous monitoring for federal information systems and organizations? Response:
A) SP 800-64
B) SP 800-137
C) SP 800-144
D) SP 800-26
4. The security assessment plan is prepared to provide the Authorizing Official and other organizational officials with a plan of how the security assessment will be conducted. Which roles have the primary responsibility to prepare the security assessment plan? Response:
A) Authorizing official (AO), Authorizing Official Designated Representative (AODR), Information System Owner (ISO)
B) Authorizing official (AO), Authorizing Official Designated Representative (AODR), Security Control Assessor (SCA)
C) Authorizing official (AO), Information System Owner (ISO), Security Control Assessor (SCA)
D) Information System Owner (ISO), Security Control Assessor (SCA), Information System Security Officer (ISSO)
5. Failure to authorize an operational system to process demonstrates that management has not exercised due care in protecting the system in the event of a security incident. Which of the following Acts has been violated?
Response:
A) Computer security Act of 1987
B) FIPS 102
C) Clinger-Cohen Act of 1996
D) FISMA, 2002
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: B | 질문 # 3 정답: B | 질문 # 4 정답: B | 질문 # 5 정답: D |