Answer: C
Hint: The SSAA is used throughout the entire NIACAP pocess. After accreditation, the SSAA becomes the baseline security configuration document and is maintained during Phase 4.
Answer: C
Hint: Phase1, Definition, is focused on understanding the IS business case, environment, and architecture to determine the security requirements and level of effort necessary to achieve certificate and accreditation. The objective of Phase 1 is to agree on the security security requirements, C&A boundary, schedule, level of effort, and resources required. Answer A describes the objectives of Phase 2. Answer B describes the objectives of Phase 3. Answer D describes the objectives of Phase 4.
Answer: D
Hint: Phase 3, Validation, validates compliance of the fully integrated system with the security policy and requirements stated in the SSAA. The objective of Phase 3 is to produce the required evidence to support the DAA in making an informed decision to grant approval to operate the system. Answer A describes the objectives of Phase 2. Answer B describes the objectives of Phase 1. Answer C describes the objectives of Phase 4.
Answer: B
Hint: The Designated Approving Authority (DAA) is also referred to as the accreditor.
Answer: C
Hint: Answer C is a distracter; the other answers are all NIACAP roles.
Answer: B
Hint: Answer B is a distracter; the NIACAP applies to each of the other three accreditation types and may be tailored to meet the specific needs of the organization and IS. Answer A, a site accreditation, evaluates the applications and systems at a specific, self-contained location. Answer C, a type accreditation, evaluates an application or system that is distributed to a number of different locations. Answer D, a system accreditation, evaluates a major application or general support system.
Answer: A
Hint: The certifier, not the DAA. determines the existing level of residual risk and makes the accreditation recommendation. The DAA determines the acceptable, not existing, level of risk for a system. The other answers about the DAA are true.
Answer: B
Hint: The DAA, not the certifier, determines the acceptable level of residual risk for a system and must have the authority to oversee the budget and IS business operations of systems under his/her purview. The other statements about the certifier are true.
Answer: A
Hint: At the completion of the certification effort the certifier reports the status of certification and makes a recommendation to the DAA. The other answers are tasks assigned to the program manager.
Answer: B
Hint: The operational interests of system users are vested in the user representative. In the NIACAP process, the user representative is concerned with system availability, access, integrity, functionality, performance, and confidentiality as they relate to the mission environment. Users and their representative are found at all levels of an agency. The other answers are qualities of the DAA.
Answer: C
Hint: Answer C is a task for the certifier. As noted in the SSAA, the user representative;
- Is responsible for the identification of operational requirements
- Is responsible for the secure operational of a cerified and accredited IS
- Represents the user community
- Assists in the C&A process
- Functions as the liaison for the user community throughout the life cycle of the system
- Defines the system's operations and functional requirements
- Is responsible for ensuring that the user's operational interests are maintained throughout system development, modification, integration, acquisition, and deployment
Answer: D
Hint: Negotiation is a Phase 1 activity. The other three are the Phase 2 activities.
Answer: B
Hint: NSTISSP No.6 establishes the requirement for federal departments and agencies to implement a C&A process for national security systems. The requirements of the NSTISSI No. 6 apply to all U.S. government executive branch departments, agencies, and their conractors and consultants. The other three answers are correct statements about C&A.
Answer: B
Hint: Initial certification Analysis is a Phase 2 activity. The other three are the Phase 1 activities.
Answer: C
Hint: The Security Test and Evaluation (ST&E) is a major activity in Phase 3.
Answer: D
Hint: The objective of the ST&E is to assess the technical implementation of the security design; to ascertain that security software, hardware, and firmware features affecting confidentiality, integrity, availability, and that accountability have been implemented as documented in the SSAA; and that the features perform properly. ST&E validates the correct implementation of identification and authentication, audit capabilities, access controls, objrct reuse, trusted recovery, and network connection rule compliance. The other answers are distracters.
Answer: C
Hint: Penetration testing assesses the system's ability to withstand intentional attempts to circumvent system security features by exploiting technical security vulnerabilities. Penetration testing may include insider and outsider penetration attempts based on common vulnerabilities for the technology being used.
Answer: C
Hint: After receipt of the certifier's recommendation, the DAA reviews the SSAA and makes an accreditation determination. This determination is added to the SSAA. The final SSAA accreditation package includes the certifier's recommendation, the DAA authorization to operate, and supporting documentation. The SSAA must contain all information necessary to support the certifier's recommended decision, including security findings, deficiencies, risks to operation, and actions to resolve any deficiencies.
Answer: A
Hint: If the decision is made to not authorize the system to operate. the NIACAP process reverts to Phase 1, and the DAA, certifier, program manager, and user representative must agree to proposed solutions to meet an acceptable level of risk. The decision must state the specific reasons for denial and, if possible, provide suggested sloutions.
Answer: B
Hint: Phase 4 contains activities required to continue to operate and manage the system so that it will maintain an acceptable level of resident risk. Post-accreditation activities must include ongoing maintenance of the SSAA, system operations, security operations, change management, and compliance validation. The other answers relate to Phase 1.
Answer: C
Hint: Phase 4 must continue until the information system is removed from service, a major change is planned for system, or a periodic compliance validation is required. The other answers are distracters.
Answer: D
Hint: Phase 4 involves ongoing review of the SSAA to ensure it remains current. The user representative, DAA, certifier, and program manager must approve revisions to the SSAA. On approval, the necessary changes to the mission, environment, and architecture are documented in the SSAA.
Answer: D
Hint: After an IS appoved for operation in a specific computing environment, changes to the IS and the computing environment must be controlled. While changes may adversely affect the overall security posture of the infrastructure and the IS, change is ongoing as it esponds to the needs of the user and new technology developments. As the threats become more sophisticated or focused on a particular asset, countermeasures must be strengthened or added to provide adequate protection. Therefore, change management is requied to maintain an acceptable level of residual risk.
Answer: C
Hint: NIACAP has four levels of certification to ensure that the appropriate C&A is performed for varying schedule and budget limitations. TO determine the appropriate level of certification, the certifier must analyze the system's business functions; national, departmental, and agency security requirements; criticality of the system to the organizational mission; software poducts; computer infrastructure; the types of data pocessed by the system, and types of users. The levels are as follows;
- Level 1 -- Basic Security Review
- Level 2 -- Minimum Analysis
- Level 3 -- Detailed Analysis
- Level 4 -- Comprehensive Analysis
Answer: A
Hint: After accreditation, the SSAA becomes the baseline security configuration document. Phase 4 involves ongoing review of the SSAA to ensure it remains current. The user representative. DAA, and program manager must approve revisions to the SSAA. On approval, the necessary changes to the mission, environment, and architecture are doucumented in the SSAA.
Answer: D
Hint: NSTISSP No.6 determines that all federal government departments and agencies establish and implement programs mandating the certification and accreditation (C&A) of national security systems under their operational control. These C&A programs must ensure that information processed, stored, or transmitted by national security systems is adequately protected for confidentiality. integrity, and availability.
Answer: B
Hint: Carnegie Mellon University's Software Engineering Institute (SEI) created the Operationally Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE). OCTAVE is a self-guided assessment implemented in a series of short workkshops focusing on key organizational areas.
It is conducted in three phases:
1. Identify critical assets and the threats to those assets
2. Identify the vulnerabilities that expose threats
3. Develop an appropriate protection strategy for the organization's mission and priorities.
Answer: A
Hint: The Federal Information Processing Standard (FIPS) 102, the Guideline for Computer Security Certification and Accreditation, is a comprehensive guide explaining how to establish a C&A program and execute a complete C&A.
FIPS 102 details a 6-step approach:
1. Planning
2. Data Collection
3. Basic Evaluation
4. Detailed Evaluation
5. Report of Findings
6. Accreditation
Answer: D
Hint: The INFOSEC assessment methodology (IAM) is a detailed and systematic way of examining cyber vulnerabilities that was developed by the Nationl Security Agency to assist both INFOSEC assessment suppliers and consumers requiring assessments. The IAM examines the mission, organization, security policies and programs, and information systems and the threat to these systems.
Answer: B
Hint: The DITSCAP phases are identical to the NIACAP phases;
- Phase 1, Definition
- Phase 2, Verification
- Phase 3, Validation
- Phase 4, Post Accreditation