IT CertificationsAnswer Key

Nist 800 59

61 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

SP 800-14

ANSWER

generally Accepted Principles and Practices for Securing Information Technology Systems, provides best practices and security principles that can direct the security team in the development of a security ____.

QUESTION 2

SP 800-18,

ANSWER

Guide for Developing Security Plans

QUESTION 3

SP 800-18 Rev. 1

ANSWER

The Guide for Developing Security Plans for Federal Information Systems, must be customized to fit the particular needs of a(n) organization.

QUESTION 4

SP 800-27, rev. A

ANSWER

Engineering Principles for IT Security - Common Criteria

QUESTION 5

SP 800-30, rev. 1

ANSWER

Conducting Risk Assessments

QUESTION 6

SP 800-34

ANSWER

Contingency Planning Guide for Federal IT Systems

QUESTION 7

SP 800-37 Rev 1

ANSWER

Applying RMF

QUESTION 8

SP 800-45, rev. 2

ANSWER

Guidelines on email and security

QUESTION 9

SP 800-39

ANSWER

Managing Information Security Risk

QUESTION 10

SP 800-40, rev. 3

ANSWER

Patch and Vulnerability Management Program

QUESTION 11

SP 800-41, rev. 1

ANSWER

Firewalls and Firewall Policy

QUESTION 12

SP 800-47

ANSWER

Interconnecting IT systems

QUESTION 13

SP 800-50

ANSWER

IT Security Awareness and Training Program

QUESTION 14

SP 800-53, rev. 4

ANSWER

Security Controls for Federal IT Systems

QUESTION 15

SP 800-53A, rev 4

ANSWER

Assessing Security Controls

QUESTION 16

SP 800-55, rev 1

ANSWER

Performance Measurement Guide for Information Systems

QUESTION 17

SP 800-59

ANSWER

Guideline for identifying a system as a National Security System

QUESTION 18

SP 800-60

ANSWER

Mapping Information types to Security Categories

QUESTION 19

SP 800-61, rev. 2

ANSWER

Computer Security Incident Handling Guide

QUESTION 20

SP 800-64, rev 2

ANSWER

Security in SDLC

QUESTION 21

SP 800-65

ANSWER

Integration of IT Security and Capital Planning

QUESTION 22

SP 800-66, rev 1

ANSWER

HIPAA

QUESTION 23

SP 800-70, rev 2

ANSWER

National Checklist Program

QUESTION 24

SP-800-83

ANSWER

Malware Incident Prevention and Handling

QUESTION 25

SP 800-88, rev. 1

ANSWER

Media Sanitization

QUESTION 26

SP 800-92

ANSWER

Computer Security Log Management

QUESTION 27

SP 800-94

ANSWER

IDS/IPS (IDPS)

QUESTION 28

SP 800-100

ANSWER

Information Security Handbook: Managers

QUESTION 29

SP 800-115

ANSWER

Technical Guide to Information Security Testing and Assessment

QUESTION 30

SP 800-122

ANSWER

Guide to Protecting Confidentiality of PII

QUESTION 31

SP 800-128

ANSWER

Configuration Management

QUESTION 32

SP 800-137

ANSWER

Continuous Monitoring (ISCM)

QUESTION 33

SP 800-144

ANSWER

Security and Privacy in Public Cloud Computing

QUESTION 34

FIPS 140-2

ANSWER

Cryptography

QUESTION 35

FIPS 180-2

ANSWER

Secure hash Standard

QUESTION 36

FIPS 181

ANSWER

- Automated Password Generator Specifies a routine for an automated password generator. Three basic parts: • Unit Table: defines the alphabetic characters and specific rules • Diagram Table: defines the rules of all possible pairs of units and juxtaposition of units • Random Number Generator: uses a DES subroutine to produce double precision floating point values

QUESTION 37

FIPS 186-2

ANSWER

Digital Signature Standard

QUESTION 38

FIPS 190

ANSWER

Advanced Authentication (Factors)

QUESTION 39

FIPS 191

ANSWER

LAN Security (Confidentiality, Integrity, and Availability of the data)

QUESTION 40

FIPS 197

ANSWER

AES (AES is symmetric)

QUESTION 41

FIPS-198-1

ANSWER

HMAC (Keyed-Hash Message Authentication Code)

QUESTION 42

FIPS 199

ANSWER

Security Categorization based on impact levels

QUESTION 43

FIPS 200

ANSWER

Minimum Security Requirements for Federal Information and Information Systems (Baselines)

QUESTION 44

FIPS 201-2

ANSWER

Personal Identity Verification PIV (smart cards)

QUESTION 45

HSPD-1

ANSWER

Creates Homeland Security Council and functions

QUESTION 46

HSPD-3

ANSWER

HOmeland Security Advisory Team

QUESTION 47

HSPD-5

ANSWER

Management of Domestic Incidents

QUESTION 48

HSPD-7

ANSWER

Critical Infrastructure Identification, Prioritization, and Protection

QUESTION 49

HSPD-8

ANSWER

National Preparedness

QUESTION 50

HSPD-12

ANSWER

Common Identification Standard for Federal Employees

QUESTION 51

HSPD-20/NSPD-51

ANSWER

National Continuity Policy

QUESTION 52

HSPD-24

ANSWER

Biometrics for Identification for National Security

QUESTION 53

IR 7581

ANSWER

System and Network Security (Acronyms and Abbreviations)

QUESTION 54

IR 7564

ANSWER

Directions in Security Metrics Research

QUESTION 55

IR 7816-2011

ANSWER

Computer Security Division Annual Report

QUESTION 56

IR 7359

ANSWER

Information Security Guide for Gov Execs

QUESTION 57

IR 7536

ANSWER

NIST Computer Security Division (CSD) 2008 Annual Report

QUESTION 58

IR 7358

ANSWER

Program Review for Information Security Management Assistance (PRISMA)

QUESTION 59

IR 7316

ANSWER

Assessment of Access Control Systems

QUESTION 60

IR 7298

ANSWER

Glossary of Key Information Security Terms

QUESTION 61

IR 7206

ANSWER

Smart Cards and Mobile Device Authentication

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials