Which of the following terms describes the measures that protect and support information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation
Continuous Monitoring is the fourth phase of the security certification and accreditation process.
The Continuous Monitoring process consists of the following three main activities:
Configuration management and control Security control monitoring and impact analyses of changes
to the information system Status reporting and documentation The objective of these tasks is to
observe and evaluate the information system security controls during the system life cycle. These
tasks determine whether the changes that have occurred will negatively impact the system security.
Answer options E and D are incorrect. Security accreditation decision and security accreditation
documentation are the two tasks of the security accreditation phase.
Herman
4 months agoWalton
5 months agoAleshia
5 months agoJacklyn
5 months agoFernanda
5 months agoRessie
6 months agoValene
6 months agoShad
6 months agoIrene
6 months agoNieves
6 months agoVan
6 months agoCurt
6 months agoArthur
6 months agoYuki
6 months agoNoble
6 months agoJulio
6 months agoIlda
6 months agoOlen
11 months agoShaquana
11 months agoLashawna
11 months agoViola
9 months agoJarod
9 months agoBasilia
10 months agoDustin
11 months agoLuis
10 months agoCarin
10 months agoTaryn
10 months agoThaddeus
12 months agoLashonda
11 months agoNorah
11 months agoJeffrey
11 months agoShoshana
11 months agoArlene
1 year agoCarma
1 year agoLonny
1 year ago