IT CertificationsAnswer Key

Nist 800 122

16 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Organizations should minimize the use, collection, and retention of PII to what is strictly necessary to accomplish their business purpose and mission.

ANSWER

- Review current holding of PII and ensure they are accurate, relevant, timely, and complete. - Reduce PII holdings to the minimum necessary for proper performance of agency functions. - Develop a schedule for periodic review of PII holdings. - Establish a plan to eliminate the unnecessary collection and use of SSN's

QUESTION 2

Organizations should categorize their PII by PII confidentiality impact level

ANSWER

Organizations should evaluate how easily PII can be used to identify specific individuals.

QUESTION 3

Identifiability

ANSWER

Organizations should consider how many individuals can be identified from the PII. Breaches of 25 records and 25 million records may have different impacts.

QUESTION 4

Quantity of PII

ANSWER

Organizations should evaluate the sensitivity of each individual PII data field.

QUESTION 5

Data Field Sensitivity

ANSWER

Organizations should evaluate the context of use - the purpose for which the PII is collected, stored, used, processed, disclosed, or disseminated.

QUESTION 6

Context of Use

ANSWER

An organization that is subject to any obligations to protect PII should consider such obligations when determining the PII confidentiality impact level.

QUESTION 7

Obligations to Protect Confidentiality

ANSWER

Organizations may choose to take into consideration the nature of authorized access to and the location of PII.

QUESTION 8

Access to and Location of PII

ANSWER

Not all PII should be protected in the same way.

QUESTION 9

Organizations should apply the appropriate safeguards for PII based on the PII confidentiality impact level

ANSWER

Organizations should develop comprehensive policies and procedures for protecting the confidentiality of PII.

QUESTION 10

Creating Policies and Procedures.

ANSWER

Organizations should reduce the possibility that PII will be accessed, used, or disclosed inappropriately by requiring that all individuals receive appropriate training before being granted access to systems containing PII.

QUESTION 11

Conducting Training

ANSWER

Organizations can de-identify records by removing enough PII such that the remaining information does not identify an individual and there is no reasonable basis to believe that the information can be used to identify and individual.

QUESTION 12

De-Identifying PII

ANSWER

Organizations can control access to PII through access control policies and access enforcement mechanisms.

QUESTION 13

Using Access Enforcement

ANSWER

Organizations can prohibit or strictly limit access to PII from portable and mobile devices, such as laptops, cell phones, and personal digital assistants (PDA), which are generally higher-risk than non-portable devices (e.g., desktop computers at the organization's facilities).

QUESTION 14

Implementing Access Control for Mobile Devices

ANSWER

Organizations can protect the confidentiality of transmitted PII. This is most often accomplished by encrypting the communications or by encrypting the information before it is transmitted.

QUESTION 15

Providing Transmission Confidentiality

ANSWER

Organizations can monitor events that affect the confidentiality of PII, such as inappropriate access to PII.

QUESTION 16

Auditing Events

ANSWER

Breaches involving PII are hazardous to both individuals and organizations.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials