Answer: B
Hint: Answer A is a distracter. Answer C, operational controls, are security controls that are usually implemented by people instead of systems. Answer D, technical control, are security controls that the computer system executes.
Answer: A
Answer: C
Hint: Answer A is a definition of data integrity, answer B defines authentication, and answer D describes confidentiality.
Answer: C
Hint: Answer A and B are distracters. Answer D refers to a "nonhierarchical grouping of sensitive information used to control access to data more finely than with hierarchical security classification alone," as defined in NSTISSI Publication No, 4009.
Answer: B
Hint: Answer A, QUADRANT, refers to technology that provides tamper-proof protection to cryptographic equipment. Answer C defines "a set of assurance requirements that represent a point on the Common Criteria predefined assurance scale," and answer D is a "framework that assigns and portrays IA roles and behavior among all IT assets, and prescribes rules for interaction and connection"
Answer: C
Hint: Answer A refers to the National Infrastructure (NII), answer B defines the Global Information Infrastructure (GII), and answer D defines a Policy Approving Authority (PAA).
Answer: B
Hint: Answer A refers to the concept of Tranquillity, answer C refers to a Special Access Program (SAP), and answer D is distracter.
Answer: B
Hint: The other answers are distracters.
Answer: D
Answer: B
Hint: Additional characteristics of a national information system include employing cryptographic activities related to national security, associated with equipment that is an integral part of a weapon or weapons system(s), and critical to the direct fulfillment of military or intelligence missions.
Answer: C
Answer: C
Hint: Standards associated with national defense are still the responsibility of the DoD and NSA.
Answer: B
Answer: D
Answer: C
Hint: The other answers are distracters
Answer: B
Answer: B
Answer: C
Hint: Answer A refers to a device embodying a communications security (COMSEC) design that NSA has approved as a CCI. Answer B is part of a CCI that does not perform the entire COMSEC function but depends upon the host equipment, or assembly, to complete and operate the COMSEC function. Answer D is a device or electronic key used to unlock the secure mode of cryptp-equipment.
Answer: D
Hint: Answers A, B, and C are distracters
Answer: A
Hint: The other answers are distracters.
Answer: B
Hint: Answer A and D are distracters. Answer C, PII, is usually associated with privacy. An example of PII is a person's health care information.
Answer: A
Hint: The other answwers are distracters.
Answer: C
Answer: B
Hint: The other answers are distracters.
Answer: C
Hint: Answers A and B are distracters. Answer D, a Type 2 product, defines unclassified cryptographic equipment, assemblies, or components endorsed by the NSA for in national security systems as defined in Title 40 U.S.C. Section 1452.
Answer: D
Hint: This responsibility is assigned to the OMB
Answer: A
Answer: B
Answer: C
Answer: A