Answers to the 2010 Government IT Security Quiz

See How You Did on Our 12 Question Test Here are the answers to the quiz on government IT security in 2010.
  1. D: Will Pelgrin, the former New York State chief information security officer, also heads the Multi-State Information Sharing and Analysis Center.
    See MS-ISAC Opens New Operation Center

  2. D: Pennsylvania fired Bob Maley after he spoke about the breach at the RSA security conference. He says he wanted people to realize that simply following trend reports and compliance checklists aren't enough in today's environment.
    See Why I Spoke Publicly About Cyber Incident

  3. B: Karen Evans served as CIO at the Energy Department, not Commerce.
    See Three Questions for Karen Evans

  4. B: Rep. Mac Thornberry, R-Texas, explains that one of the reasons cybersecurity legislation is hard to enact is that many committees claim jurisdiction over it.
    See Texan Emerges as House Infosec Leader

  5. B: Sameer Bhalotra previously served as senior cybersecurity staffer on the Senate Select Committee on Intelligence.
    See Who's Sameer Bhalotra? Howard Schmidt Knows

  6. D: The Protecting Cyberspace as a National Asset Act of 2010 passed the Senate Homeland Security and Governmental Affairs Committee but never came up for a vote by the full Senate.
    See Senate Panel Clears Major Cybersecurity Bill

  7. D: Virginia didn't host a U.S. Cyber Challenge contest in 2010.
    See Video: Searching for the Good Hacker

  8. A-2 SP 800-34 Contingency Planning Federal Information Systems
    B-1 SP 800-53A Assessing the Security Controls in Federal Information Systems
    C-3 SP 800-122 Protecting the Confidentiality of Personally Identifiable Information
    D-4 SP 800-127 Securing WiMAX Wireless Communications
    E-5 SP 800-128 Security Configuration Management of Information Systems

  9. A: The Obama administration proposed a $3.6 billion CNCI budget for fiscal year 2011, which began Oct. 1.
    See CNCI Budget Request Set at $3.6 Billion

  10. D: The State Department's cyber coordinator will lead its global diplomatic engagement on cyber issues and serve as its primary liaison to White House Cybersecurity Coordinator Howard Schmidt.
    See State Department Creates Cyber Coordinator Post

  11. C: Lack of sufficient funding
    B: Increased sophistication of threats
    A: Inadequate availability of security professionals
    D+E (Tie) Lack of support from business stakeholders/Lack of visibility and influence within the enterprise.
    See CISOs Paint Gloomy Picture of State IT Security

  12. A: Under FedRAMP, if one agency vets cloud providers, other agencies could piggyback on that assessment and authorization.
    See FedRAMP Requirements Aimed to Easy Cloud Computing Adoption


11-12 right: Cybersecurity Coordinator
9-10 right: Majority Leader
7-8 right: Committee Chair
6 or fewer right: Back Bencher

About the Author

Eric Chabrow

Eric Chabrow

Retired Executive Editor, GovInfoSecurity

Chabrow, who retired at the end of 2017, hosted and produced the semi-weekly podcast ISMG Security Report and oversaw ISMG's GovInfoSecurity and InfoRiskToday. He's a veteran multimedia journalist who has covered information technology, government and business.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing, you agree to our use of cookies.