Podcast
Questions and Answers
What is the primary goal of the Computer Security Division (CSD) at NIST?
What is the primary goal of the Computer Security Division (CSD) at NIST?
- To improve information systems security (correct)
- To publish Special Publication 800 series
- To develop ITL bulletins
- To oversee eight divisions within NIST's ITL
Which of the following is a publication series produced by NIST?
Which of the following is a publication series produced by NIST?
- CSD bulletins
- NIST Security Division newsletters
- ITL reports
- Special Publication 800 series (correct)
How many divisions are within NIST's Information Technology Laboratory?
How many divisions are within NIST's Information Technology Laboratory?
- Six
- Five
- Seven
- Eight (correct)
What is the name of the laboratory that the Computer Security Division (CSD) is a part of?
What is the name of the laboratory that the Computer Security Division (CSD) is a part of?
What type of documents are ITL bulletins?
What type of documents are ITL bulletins?
What is a characteristic of human nature?
What is a characteristic of human nature?
What is the primary focus of the Asset Management domain?
What is the primary focus of the Asset Management domain?
What is NOT a primary goal of the Asset Management domain?
What is NOT a primary goal of the Asset Management domain?
What is the section number associated with the Asset Management domain?
What is the section number associated with the Asset Management domain?
What is the purpose of assigning classification levels in the Asset Management domain?
What is the purpose of assigning classification levels in the Asset Management domain?
What is the primary focus of the Cryptography domain?
What is the primary focus of the Cryptography domain?
When was the Cryptography domain added?
When was the Cryptography domain added?
What is the primary concern of the Cryptography domain in terms of information?
What is the primary concern of the Cryptography domain in terms of information?
What is the primary objective of using cryptography according to the Cryptography domain?
What is the primary objective of using cryptography according to the Cryptography domain?
Which of the following is related to the Cryptography domain?
Which of the following is related to the Cryptography domain?
Who is considered the information owner?
Who is considered the information owner?
Which role is responsible for the information ownership?
Which role is responsible for the information ownership?
What is the primary criterion for being an information owner?
What is the primary criterion for being an information owner?
Can any employee in an organization be considered an information owner?
Can any employee in an organization be considered an information owner?
Which of the following individuals is least likely to be an information owner?
Which of the following individuals is least likely to be an information owner?
What is the primary focus of identification in the context of secured information and systems?
What is the primary focus of identification in the context of secured information and systems?
What is the primary goal of identification in secured systems?
What is the primary goal of identification in secured systems?
In the context of secured information, what does identification primarily involve?
In the context of secured information, what does identification primarily involve?
What is the primary benefit of identification in secured systems?
What is the primary benefit of identification in secured systems?
What is the relationship between identification and access control in secured systems?
What is the relationship between identification and access control in secured systems?