Module 10: Policy & Governance

Module 10 Assessment

Multiple Choice

Identify the choice that best completes the statement or answers the question.

 

____ 1. ___________________ consists of owners and operators and their representatives, collaborating between government and private sector owners of critical infrastructure.

a. Critical Infrastructure Cross-Sector Council c. Regional Consortium Coordinating Council
b. Government Coordinating Councils d. Sector Coordinating Councils

 

____ 2. ___________________ is composed of senior officials from federal agencies who facilitate communication and coordination on critical infrastructure security and resilience across the federal government.

a. Critical Infrastructure Cross-Sector Council c. Federal Senior Leadership Council
b. Government Coordinating Councils d. Sector Coordinating Councils

 

____ 3. ___________________ are organizations, including ISACs, that focus on information dissemination and collaboration on a cross-sector basis through a national council.

a. Federal Senior Leadership Council c. Information Sharing Organizations
b. Government Coordinating Councils d. Sector Coordinating Councils

 

____ 4. Which of the following is not one of the NIPP’s seven core tenets?

a. Identifying and managing risk c. Adopting a partnership approach to security and resilience
b. Promoting the public dissemination of an organization’s vulnerabilities d. Promoting security and resilience during design stages of systems and networks

 

____ 5. ___________________ is a dedicated 24/7 coordination and information-sharing operations center that maintains situational awareness of the nation’s CI, serving as a hub between the government and the private sector when an incident is detected.

a. National Infrastructure Coordinating Center (NICC) c. Information Sharing Organizations
b. Information Sharing and Analysis Centers (ISACs) d. National Cybersecurity and Communications Integration Center (NCCIC)

 

Short Answer

6. Define the role of an ISAC in critical infrastructure protection.

 

 

 

For the answers to these questions, email your name, the name of your college or other institution, and your position there to info@cyberwatchwest.org. CyberWatch West will email you a copy of the answer key.

License

Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Cybersecurity by Whatcom Community College and CyberWatch West is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book