Computer Lab for Rent
Meeting Room Rental
Training Facility Rental
Exam Testing Center
Purchase Exam Vouchers
Custom Course Development
Who We Are
Work With Us
Take this free Risk Management Framework quiz to see if you are ready to sit in the training class!:
Step 1 of 11
What NIST Special Publication superseded the original Special Publication 800-30 as the source for guidance on risk management?
This risk management processes, at the information system level, link to risk management processes at the organization level through what newly defined role in the RMF?
Chief Information Officer
Authorizing Official Designated Representative
Senior Information Security Officer
Head Of Agency (Chief Executive Officer)
Risk Executive (Function)
Applying the first three steps in the RMF to legacy systems can be viewed as a _______________ _____________to determine if the necessary and sufficient security controls have been appropriately selected and allocated.
What establish the scope of protection for organizational information systems?
Dynamic External Subsystems
System Security Plan
Name the factors that influence the level of effort expended when implementing the RMF tasks?
Categorization of the System
Criticality of the System
Importance of the System
All of the above
The Risk Management Framework (RMF) places heavy emphasis on
Selection, implementation and monitoring of security controls
Findings, recommendations and accreditation package assembly
Security assessment report, system security plan analysis and security categorization review
Documentation, certification and accreditation
Tier 2 of the three-tiered risk management approach addresses risk-related concerns at which level?
Early integration of security in the SDLC enables agencies to maximize return on investment in their security programs through
Awareness of potential engineering challenges caused by mandatory security controls
Information system registration
Security control implementation
FedRAMP is a government-wide program that provides a standardized approach to
Security assessment, authorization and continuous monitoring for cloud products and services
Delineation between what is owned by the external entity and the organization
Risk management of agency information systems
Determination of dynamic subsystems
List the 6 steps of the RMF process?
Categorize, Select, Develop, Assess, Authorize, Monitor
Categorize, Select, Implement, Assess, Authorize, Monitor
Initiate, Select, Implement, Operate, Authorize, Monitor
Categorize, Select, Implement, Assess, Monitor, Disposal
Confirm Your Email to See Your Score!