Module 10: Policy & Governance

Assessment

Multiple Choice

Identify the choice that best completes the statement or answers the question.

 

____ 1. ___________________ consists of owners and operators and their representatives, collaborating between government and private sector owners of critical infrastructure.

  • a. Critical Infrastructure Cross-Sector Council
  • b. Government Coordinating Councils
  • c. Regional Consortium Coordinating COuncil
  • d. Sector Coordinating Councils

 

____ 2. ___________________ is composed of senior officials from federal agencies who facilitate communication and coordination on critical infrastructure security and resilience across the federal government.

  • a. Critical Infrastructure Cross-Sector Council
  • b. Government Coordinating Councils
  • c. Federal Senior Leadership Council
  • d. Sector Coordinating Councils

 

____ 3. ___________________ are organizations, including ISACs, that focus on information dissemination and collaboration on a cross-sector basis through a national council.

  • a. Federal Senior Leadership Council
  • b. Government Coordinating Councils
  • c. Information Sharing Organizations
  • d. Sector Coordinating Councils

 

____ 4. Which of the following is not one of the NIPP’s seven core tenets?

  • a. Identifying and managing risk
  • b. Promoting the public dissemination of an organization’s vulnerabilities
  • c. Adopting a partnership approach to security and resilience
  • d. Promoting security and resilience during design stages of systems and networks

 

 

____ 5. ___________________ is a dedicated 24/7 coordination and information-sharing operations center that maintains situational awareness of the nation’s CI, serving as a hub between the government and the private sector when an incident is detected.

  • a. CISA Central
  • b. Information Sharing and Analysis Centers (ISACs)
  • c. Information Sharing Organizations
  • d. National Cybersecurity and Communications Integration Center (NCCIC)

 

Short Answer

  1. Explain the role of an ISAC in critical infrastructure protection.

 

 

License

Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Systems by NCyTE Center is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book