pg. 1
FITSP - Manager Next Generation Questions Newest 2026- 2027 Actual Exam With Complete Questions And Correct Detailed Answers (Verified Answers) |Already Graded A+
All of the following are examples of causation factors that contribute to
poor security control implementation and effectiveness, EXCEPT: -
ANSWER-Training-lack of appropriate training for the personnel installing, administering, maintaining, or using the systems
What are the data encryption format and digital certificate standard used by S/MIME? - ANSWER-PKCS #7 and X.509
IDPS use this type of detection, which compares definitions of activity considered normal, against observed events, to identify significant deviations. The IDPS creates profiles that represent the normal behavior of such things as users, hosts, network connections, or applications. The profiles are developed by monitoring the characteristics of typical activity over a period of time. - ANSWER-Anomaly-Based Detection
This AES algorithm may be used with the three different key lengths, and therefore these different "flavors" may be referred to all of the
following, EXCEPT: - ANSWER-AES-384
A hard drive pulled from a classified information system will be recycled, and reused within the organization. What is the recommended course of media sanitization? - ANSWER-Purge 1 / 3
pg. 2
Which FIPS 140-2 encryption level enables environmental protections? - ANSWER-Level 4
What is the US-CERT incident category name and reporting timeframe for a CAT-3 incident? - ANSWER-Malicious Code/Daily
What kind of diagnostic activities, indicated by the security control identifier MA-4, are those activities conducted by individuals communicating through a network; either an external network (e.g., the Internet) or an internal network? - ANSWER-Non-local Maintenance
All of the following are part of the incident handling process, EXCEPT:
- ANSWER-Initiation
What would be the appropriate backup strategy, and alternate site combination, for a system with a FIPS 199 Availability Impact of MODERATE? - ANSWER-VLAN/Cold
Blocking outside traffic that claims to be from within the organization requires the application of which security control? - ANSWER-AC-4 Information Flow Enforcement
All of the following are considered remote access, EXCEPT: -
ANSWER-VPN 2 / 3
pg. 3
What VPN model is most often used to allow hosts on unsecured networks, such as traveling employees and telecommuters, to gain access to internal organizational services, such as the organization's e- mail and Web servers? - ANSWER-Host-to-gateway
What is the protocol, used by IPSec that negotiates connection settings, authenticates endpoints to each other, defines the security parameters of IPsec-protected connections, negotiates secret keys, and manages, updates, and deletes IPsec-protected communication channels? -
ANSWER-IKE
All of the following encryption algorithms are approved for use by
Federal agencies, EXCEPT: - ANSWER-RSA
Bluetooth devices in this mode are "promiscuous" and do not employ any mechanisms to prevent other Bluetooth-enabled devices from
establishing connections, thus it is NON-SECURE: - ANSWER-Security
Mode 1
In Bluetooth Security Mode 3, the link level-enforced security mode, which of the following statements is true? - ANSWER-It mandates authentication and encryption for all connections to and from the device
- / 3