-
introduction
-
- Join this Course to access resources
- Join this Course to access resources
- 60 question Quiz
-
-
Visual tools
-
Supplemental Information
Why this course? An overview
Minimum Security Protocol Introduction
The referenced document, publicly available, outlines Federal Acquisition Regulation (FAR) clause 52.204-21, which establishes the mandatory minimum security protocols for private contractors handling non-public government data. It defines covered contractor information systems and identifies the specific types of federal contract information that require protection. The regulation mandates fifteen basic safeguarding requirements, ranging from access control and identity authentication to malicious code protection and physical equipment security. Furthermore, it stipulates that these cybersecurity obligations must be extended to subcontractors who interact with the same sensitive data. Ultimately, this document serves as a legal framework to ensure that contractual information remains secure while residing on or moving through external private networks.
Rating
0
0
There are no comments for now.
Join this Course
to be the first to leave a comment.
1.
According to FAR 52.204-21, what is a 'covered contractor information system'?
2.
What is the definition of 'Federal contract information' (FCI)?
3.
Does 'Federal contract information' include information provided by the Government to the public on websites?,
4.
What type of 'simple transactional information' is excluded from the definition of Federal contract information?
5.
According to CNSSI 4009, how is 'information' defined in the context of FAR 52.204-21?
6.
What constitutes an 'information system' under 44 U.S.C. 3502?
7.
In the context of contractor information systems, what does 'safeguarding' mean?
8.
To what three entities must information system access be limited?
9.
Information system access must be limited to specific types of _____ and _____ that authorized users are permitted to execute.
10.
What must a contractor do regarding connections to external information systems?
11.
Where must a contractor control information being posted or processed?
12.
As a prerequisite to allowing access to organizational systems, a contractor must _____ the identities of users, processes, or devices.
13.
What action must be taken on information system media containing FCI before disposal?
14.
Physical access to information systems and equipment must be limited to _____.
15.
Besides limiting access, what three physical safeguarding actions are required for visitors
16.
What physical hardware must be controlled and managed to protect information systems?
17.
At which two types of boundaries must organizational communications be monitored, controlled, and protected?
18.
How should publicly accessible system components be logically or physically separated from internal networks?
19.
How quickly should information and information system flaws be identified, reported, and corrected?
20.
Where must protection from malicious code be provided?
21.
When must malicious code protection mechanisms be updated?
22.
How often should scans of the information system be performed?
23.
When must real-time scans of files from external sources occur?
24.
Does FAR 52.204-21 relieve the contractor of safeguarding requirements for Controlled Unclassified Information (CUI)?
25.
Under what condition must a contractor include the substance of FAR 52.204-21 in a subcontract?
26.
Which specific type of acquisition is exempt from the flow-down requirements of FAR 52.204-21(c)
27.
Does the flow-down requirement of FAR 52.204-21 apply to subcontracts for commercial services?
28.
Identify the source of the definition for 'Information' used in FAR 52.204-21.
29.
Identify the source of the definition for 'Information system' used in FAR 52.204-21.
30.
According to control (viii), physical access must be limited to the systems, the equipment, and the _____.
31.
Control (x) defines 'organizational communications' as information _____ or _____ by organizational information systems.
32.
The requirements in FAR 52.204-21 are considered _____ safeguarding requirements.
33.
Control (v) requires the identification of users, devices, and _____.
34.
True or False: Simple transactional information necessary to process payments is considered Federal Contract Information (FCI).
35.
Which FAR part prescribes the insertion of clause 52.204-21?
36.
What is the primary objective of implementing subnetworks under control (xi)?
37.
Is the contractor required to report information system flaws as part of basic safeguarding?
39.
Does FAR 52.204-21 apply to systems that do not process, store, or transmit FCI?
40.
Term: Sanitization
41.
Term: Authentication
42.
Which control requires the maintenance of audit logs?
43.
Are contractors required to update malicious code protection mechanisms only during annual reviews?
44.
What does control (ii) restrict beyond just 'who' can access a system?
45.
Clause 52.204-21(b)(2) mentions that other safeguarding requirements may be specified by which entities?
46.
Does the definition of 'Information' include audiovisual representations?
47.
What must be done to visitors' activity according to control (ix)?
48.
What is the specific trigger for the flow-down requirement to a subcontractor?
49.
Under control (iii), what must be done to connections with external systems?
50.
Control (xv) requires real-time scans of files from external sources when they are _____, _____, or _____.
51.
Under FAR 52.204-21, who owns or operates the 'covered contractor information system'
52.
What is the purpose of control (iv) regarding publicly accessible information systems?
53.
In the subcontract flow-down requirement, paragraph (c) must be included in its _____.
54.
Is 'simple transactional information' defined as FCI if it is generated for the Government?
55.
Does control (vi) apply to devices as well as human users?
56.
What does control (xii) require regarding the timing of flaw correction?
57.
According to the definitions, what is the prerequisite for an information system to be 'covered'?
58.
What kind of separation is required for subnetworks in control (xi)?
59.
Which control requires monitoring of 'key internal boundaries'
Additional Resources
Join this Course to access resources