Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free Risk Management Framework quiz to see if you are ready to sit in the training class!:
Step 1 of 11
What NIST Special Publication superseded the original Special Publication 800-30 as the source for guidance on risk management?
This risk management processes, at the information system level, link to risk management processes at the organization level through what newly defined role in the RMF?
Authorizing Official Designated Representative
Head Of Agency (Chief Executive Officer)
Chief Information Officer
Senior Information Security Officer
Risk Executive (Function)
Applying the first three steps in the RMF to legacy systems can be viewed as a _______________ _____________to determine if the necessary and sufficient security controls have been appropriately selected and allocated.
What establish the scope of protection for organizational information systems?
System Security Plan
Dynamic External Subsystems
Name the factors that influence the level of effort expended when implementing the RMF tasks?
Criticality of the System
Importance of the System
Categorization of the System
All of the above
The Risk Management Framework (RMF) places heavy emphasis on
Documentation, certification and accreditation
Selection, implementation and monitoring of security controls
Findings, recommendations and accreditation package assembly
Security assessment report, system security plan analysis and security categorization review
Tier 2 of the three-tiered risk management approach addresses risk-related concerns at which level?
Early integration of security in the SDLC enables agencies to maximize return on investment in their security programs through
Awareness of potential engineering challenges caused by mandatory security controls
Security control implementation
Information system registration
FedRAMP is a government-wide program that provides a standardized approach to
Risk management of agency information systems
Security assessment, authorization and continuous monitoring for cloud products and services
Determination of dynamic subsystems
Delineation between what is owned by the external entity and the organization
List the 6 steps of the RMF process?
Categorize, Select, Develop, Assess, Authorize, Monitor
Initiate, Select, Implement, Operate, Authorize, Monitor
Categorize, Select, Implement, Assess, Monitor, Disposal
Categorize, Select, Implement, Assess, Authorize, Monitor
Confirm Your Email to See Your Score!