
Secret Private Quiz

Quiz
•
Other
•
Professional Development
•
Medium
ASHLEY TRIVITT
Used 18+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
When any entity assess compliance with the security requirements of NIST SP 800-171, they must use:
The NIST SP 800-171A procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-88 Revision 1 procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-53B procedures to evaluate the effectiveness of the tested controls
The NIST SP 800-171 Revision 2 procedures to evaluate the effectiveness of the tested controls
2.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Certified Assessors will review information and evidence to independently verify that:
The contractor is aware of the objectives of the required practices
The contractor meets the stated assessment objectives for all the required practices
The contractor has implemented all the required controls
There is an action plan in place to implement all the required practices
3.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
PKI stands for:
Public Key Information
Public Key Infrastructure
Performance Key Indicator
Process Key Indicator
4.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The Property that preserves authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information is called:
Security
Privacy
Integrity
Confidentiality
5.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
The application of an assessment procedure to a security requirement produces:
Assessment findings
All of these
Risk Mitigations
Remediation Plans
6.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
Security functions include:
Employee vetting
Establishing System Accounts
Performance Review
Communication with regulators
7.
MULTIPLE CHOICE QUESTION
2 mins • 1 pt
To document implementation of NIST SP 800-171, the contractor must develop, document, and periodically update a system security plan that describes:
All of these
System environments of operation
How security requirements are implemented
System boundaries
Create a free account and access millions of resources
Similar Resources on Wayground
55 questions
Mixed Review - Ch 7-8-9

Quiz
•
University - Professi...
45 questions
Mock Paper 1 (2023)

Quiz
•
Professional Development
55 questions
Cyber Mock

Quiz
•
Professional Development
45 questions
HEART Customer Service Quiz

Quiz
•
Professional Development
50 questions
WKF Kata Test 1

Quiz
•
Professional Development
50 questions
MCQs on Risk Management FY 2021-22

Quiz
•
Professional Development
54 questions
Central Heating L2 6035 Plumbing

Quiz
•
Professional Development
55 questions
BT - Ch-10 Indentifying and Preventing Fraud

Quiz
•
Professional Development
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade