IT CertificationsAnswer Key

Nist 800 37 Pdf

20 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

NIST Risk Management Framework (RMF)

ANSWER

Categorization Information Systems

QUESTION 2

1).

ANSWER

Select Security Controls

QUESTION 3

2).

ANSWER

Implement Security Controls

QUESTION 4

3).

ANSWER

Access Security Controls

QUESTION 5

4).

ANSWER

Authorize Information Systems

QUESTION 6

5).

ANSWER

Moniter Security Controls

QUESTION 7

6).

ANSWER

( XXXXXX ) the information system and the information processed, stored, and transmitted by that system based on an impact analysis.

QUESTION 8

Categorize:

ANSWER

( XXXXXX ) an initial set of baseline security controls for the information system based on the security categorization; tailoring and supplementing the security control baseline as needed based on an organizational assessment of risk and local conditions.

QUESTION 9

Select:

ANSWER

( XXXXXX ) the security controls and describe how the controls are employed within the information system and its environment of operation.

QUESTION 10

Implement:

ANSWER

( XXXXXX ) the security controls using appropriate assessment procedures to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.

QUESTION 11

Access:

ANSWER

( XXXXXX ) information system operation based on a determination of the risk to organizational operations and assets, individuals, other organizations, and the Nation resulting from the operation of the information system and the decision that this risk is acceptable.

QUESTION 12

Authorize:

ANSWER

( XXXXXX ) the security controls in the information system on an ongoing basis including assessing control effectiveness, documenting changes to the system or its environment of operation, conducting security impact analyses of the associated changes, and reporting the security state of the system to designated organizational officials."

QUESTION 13

Moniter:

ANSWER

Operationally Critical Threat, Asset, and Vulnerability Evaluation

QUESTION 14

OCTAVE (alternative risk management frameworks (RMF))

ANSWER

Factor Analysis of Information Risk

QUESTION 15

FAIR (alternative risk management frameworks (RMF))

ANSWER

Threat Agent Risk Assessment

QUESTION 16

TARA (alternative risk management frameworks (RMF))

ANSWER

Catagorization

QUESTION 17

Can

ANSWER

Select

QUESTION 18

Someone

ANSWER

Implement

QUESTION 19

Inquire

ANSWER

Access

QUESTION 20

About

ANSWER

Authorize

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials