Which of the following terms describes the measures that protect and support information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation
Continuous Monitoring is the fourth phase of the security certification and accreditation process.
The Continuous Monitoring process consists of the following three main activities:
Configuration management and control Security control monitoring and impact analyses of changes
to the information system Status reporting and documentation The objective of these tasks is to
observe and evaluate the information system security controls during the system life cycle. These
tasks determine whether the changes that have occurred will negatively impact the system security.
Answer options E and D are incorrect. Security accreditation decision and security accreditation
documentation are the two tasks of the security accreditation phase.
Herman
3 months agoWalton
3 months agoAleshia
3 months agoJacklyn
4 months agoFernanda
4 months agoRessie
4 months agoValene
4 months agoShad
4 months agoIrene
5 months agoNieves
5 months agoVan
5 months agoCurt
5 months agoArthur
5 months agoYuki
5 months agoNoble
5 months agoJulio
5 months agoIlda
5 months agoOlen
10 months agoShaquana
10 months agoLashawna
10 months agoViola
8 months agoJarod
8 months agoBasilia
9 months agoDustin
10 months agoLuis
8 months agoCarin
9 months agoTaryn
9 months agoThaddeus
10 months agoLashonda
9 months agoNorah
9 months agoJeffrey
9 months agoShoshana
10 months agoArlene
11 months agoCarma
11 months agoLonny
11 months ago