d.
1, 2, 3, and 426. d.
The process of uniquely assigning information resources (e.g., information, personnel, equipment, funds, and IT infrastructure) to an information system defines the security boundary for that system. 27. For new information systems, which of the following can be interpreted as having budgetary authority and responsibility for developing and deploying the information systems?
a.
Security controlb.
Management controlc.
Operational controld.
Technical control27. b.
For new information systems, management control can be interpreted as having budgetary or programmatic authority and responsibility for developing and deploying the information systems. For current systems in the inventory, management control can be interpreted as having budgetary or operational authority for the day-to-day operation and maintenance of the information systems. 28. Which of the following actions should be implemented when a security function is unable to execute automated self-tests for verification?
1.
Compensating controls2.
System-specific controls3.
Common controls4.
Accept the riska.
1 onlyb.
2 and 3c.
1, 2, and 3d.
1, 2, 3, and 428. d.
For those security functions that are unable to execute automated self-tests, organizations should either implement compensating controls (i.e., management, technical, and operational controls), system-specific controls, common controls, or a combination of these controls. Otherwise, organization’s management explicitly accepts the risk of not performing the verification process. 29. Compensating security controls for an information system should be used by an organization only under which of the following conditions?
1.
Selecting compensating controls from the security control catalog2.
Providing justification for the use of compensating controls3.
Performing a formal risk assessment4.
Accepting the risk associated with the use of compensating controlsa.
1 onlyb.
3 onlyc.
1 and 3d.
1, 2, 3, and 429. d.
Compensating security controls for an information system should be used by an organization only under the following conditions: (i) the organization selects the compensating controls from the security control catalog, (ii) the organization provides a complete and convincing rationale and justification for how the compensating controls provide an equivalent security capability or level of protection for the information system, and (iii) the organization assesses and formally accepts the risk associated with using the compensating controls in the information system. 30. Common security controls can be applied to which of the following?
1.
All of an organization’s information systems2.
A group of systems at a specific site3.
Common systems at multiple sites4.
Common subsystems at multiple sitesa.
1 onlyb.
2 onlyc.
1 and 2d.
1, 2, 3, and 430. d.
Common security controls can apply to (i) all of an organization’s information systems, (ii) a group of information systems at a specific site, or (iii) common information systems, subsystems, or applications, including hardware, software, and firmware, deployed at multiple operational sites. 31. Which of the following should form the basis for management authorization to process information in a system or to operate an information system?
a.
A plan of actionsb.
Milestonesc.
System security pland.
Assessment report31. c.
Management authorization to process information in a system or to operate a system should be based on the assessment of management, operational, and technical controls. Because the system security plan establishes and documents the security controls, it should form the basis for the authorization, supplemented by the assessment report and the plan of actions and milestones. 32. Periodic assessment of the system security plan requires a review of changes occurring in which of the following areas?
1.
System status2.
System scope3.
System architecture4.
System interconnectionsa.
1 and 2b.
3 and 4c.
1, 2, and 3d.
1, 2, 3, and 4