Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free Risk Management Framework quiz to see if you are ready to sit in the training class!:
Step 1 of 11
What NIST Special Publication superseded the original Special Publication 800-30 as the source for guidance on risk management?
This risk management processes, at the information system level, link to risk management processes at the organization level through what newly defined role in the RMF?
Risk Executive (Function)
Senior Information Security Officer
Head Of Agency (Chief Executive Officer)
Chief Information Officer
Authorizing Official Designated Representative
Applying the first three steps in the RMF to legacy systems can be viewed as a _______________ _____________to determine if the necessary and sufficient security controls have been appropriately selected and allocated.
What establish the scope of protection for organizational information systems?
Dynamic External Subsystems
System Security Plan
Name the factors that influence the level of effort expended when implementing the RMF tasks?
Importance of the System
Criticality of the System
All of the above
Categorization of the System
The Risk Management Framework (RMF) places heavy emphasis on
Findings, recommendations and accreditation package assembly
Documentation, certification and accreditation
Security assessment report, system security plan analysis and security categorization review
Selection, implementation and monitoring of security controls
Tier 2 of the three-tiered risk management approach addresses risk-related concerns at which level?
Early integration of security in the SDLC enables agencies to maximize return on investment in their security programs through
Information system registration
Awareness of potential engineering challenges caused by mandatory security controls
Security control implementation
FedRAMP is a government-wide program that provides a standardized approach to
Delineation between what is owned by the external entity and the organization
Security assessment, authorization and continuous monitoring for cloud products and services
Determination of dynamic subsystems
Risk management of agency information systems
List the 6 steps of the RMF process?
Initiate, Select, Implement, Operate, Authorize, Monitor
Categorize, Select, Develop, Assess, Authorize, Monitor
Categorize, Select, Implement, Assess, Monitor, Disposal
Categorize, Select, Implement, Assess, Authorize, Monitor
Confirm Your Email to See Your Score!