5200 Vol 1 Flashcards

(66 cards)

1
Q

What does DODM stand for?

A

Department of Defense Manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary focus of DODM 5200.01 vol 1?

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: DODM 5200.01 vol 1 is part of a series of manuals.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: DODM 5200.01 vol 1 establishes __________ for the protection of DoD information.

A

policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the significance of information assurance in DODM 5200.01 vol 1?

A

It ensures the confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which of the following is a key principle of information security according to DODM 5200.01 vol 1? A) Availability B) Inaccessibility C) Irrelevance

A

A) Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of risk management as stated in DODM 5200.01 vol 1?

A

To identify and mitigate risks to DoD information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: DODM 5200.01 vol 1 applies only to classified information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the term ‘classified information’ refer to in the context of DODM 5200.01 vol 1?

A

Information that requires protection against unauthorized disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: DODM 5200.01 vol 1 outlines the roles and responsibilities of __________ in information security.

A

DoD personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three levels of classification mentioned in DODM 5200.01 vol 1?

A

Confidential, Secret, and Top Secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiple Choice: Which of the following is NOT a type of information addressed by DODM 5200.01 vol 1? A) Sensitive Compartmented Information B) Public Information C) Unclassified Controlled Information

A

B) Public Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of the Defense Security Service (DSS) in relation to DODM 5200.01 vol 1?

A

To oversee and implement security policies for DoD components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Information security training is a requirement under DODM 5200.01 vol 1.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: The __________ is responsible for the overall management of information security programs according to DODM 5200.01 vol 1.

A

Chief Information Officer (CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the acronym ‘IA’ stand for in the context of DODM 5200.01 vol 1?

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multiple Choice: Which document must be referenced for specific guidelines on handling classified information? A) DODM 5200.01 vol 1 B) DODM 5200.01 vol 2 C) DODM 5200.01 vol 3

A

B) DODM 5200.01 vol 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of the Continuous Monitoring Strategy in DODM 5200.01 vol 1?

A

To ensure ongoing awareness of information security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: DODM 5200.01 vol 1 includes guidance on incident response.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fill in the blank: The __________ framework is used to assess the security posture of DoD information systems.

A

Risk Management Framework (RMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the expected outcome of implementing the policies in DODM 5200.01 vol 1?

A

Enhanced protection of DoD information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Multiple Choice: Which of the following is a key component of information security? A) Firewalls B) Social Media C) Cloud Storage

A

A) Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does ‘insider threat’ mean in the context of DODM 5200.01 vol 1?

A

Threats posed by individuals within the organization who have access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: DODM 5200.01 vol 1 mandates the use of encryption for all sensitive information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Fill in the blank: The __________ process is vital for identifying vulnerabilities within information systems.
vulnerability assessment
26
What is the role of security controls in DODM 5200.01 vol 1?
To mitigate risks to information and information systems.
27
Multiple Choice: Which of the following is a method of data protection outlined in DODM 5200.01 vol 1? A) Backups B) Deletion C) Sharing
A) Backups
28
What is the definition of 'access control' as per DODM 5200.01 vol 1?
The process of limiting access to information and information systems.
29
True or False: DODM 5200.01 vol 1 provides guidelines for physical security measures.
True
30
Fill in the blank: The __________ is responsible for the implementation of information security policies at the local level.
Information System Owner
31
What does the term 'security breach' refer to in DODM 5200.01 vol 1?
An incident that results in unauthorized access to sensitive information.
32
Multiple Choice: Which of the following is a key element of an incident response plan? A) Communication B) Ignoring incidents C) Delaying response
A) Communication
33
What is the significance of audit trails in DODM 5200.01 vol 1?
They help in tracking access and changes to sensitive information.
34
True or False: DODM 5200.01 vol 1 requires periodic reviews of information security policies.
True
35
Fill in the blank: __________ is the process of verifying the identity of a user or system.
Authentication
36
What is the purpose of security training as outlined in DODM 5200.01 vol 1?
To educate personnel about information security risks and best practices.
37
Multiple Choice: Which group is primarily responsible for enforcing compliance with DODM 5200.01 vol 1? A) End users B) Security Officers C) IT Support
B) Security Officers
38
What are the consequences of non-compliance with DODM 5200.01 vol 1?
Disciplinary actions, including termination and legal consequences.
39
True or False: DODM 5200.01 vol 1 includes guidelines for data classification.
True
40
Fill in the blank: The __________ is responsible for ensuring that information security measures are incorporated into system development.
System Development Lifecycle (SDLC)
41
What does 'data integrity' mean in the context of DODM 5200.01 vol 1?
The accuracy and consistency of data over its lifecycle.
42
Multiple Choice: Which of the following is a type of security assessment? A) Application Review B) System Scan C) Both A and B
C) Both A and B
43
True or False: DODM 5200.01 vol 1 applies to all DoD contractors.
True
44
Fill in the blank: __________ is the process of ensuring that only authorized users can access information.
Authorization
45
What role do external audits play in DODM 5200.01 vol 1 compliance?
They provide an independent assessment of information security practices.
46
Multiple Choice: Which of the following is a security principle emphasized in DODM 5200.01 vol 1? A) Least Privilege B) Maximum Access C) Open Access
A) Least Privilege
47
What does 'security posture' refer to in DODM 5200.01 vol 1?
The overall effectiveness of an organization's security measures.
48
True or False: DODM 5200.01 vol 1 specifies the need for incident reporting.
True
49
Fill in the blank: __________ is an essential part of the risk management process in DODM 5200.01 vol 1.
Threat assessment
50
What is the goal of continuous improvement in information security as per DODM 5200.01 vol 1?
To enhance security measures based on lessons learned and emerging threats.
51
Multiple Choice: Which of the following describes a security incident? A) Unauthorized access B) Routine maintenance C) Software updates
A) Unauthorized access
52
True or False: DODM 5200.01 vol 1 encourages collaboration with external agencies for information security.
True
53
Fill in the blank: __________ measures are implemented to protect against unauthorized access to information.
Physical security
54
What is the importance of data encryption in DODM 5200.01 vol 1?
To protect sensitive information from unauthorized access during transmission and storage.
55
Multiple Choice: Which of the following is a key element of the security architecture? A) Redundancy B) Complexity C) Simplicity
A) Redundancy
56
What is the role of the Information Security Program according to DODM 5200.01 vol 1?
To establish and maintain a framework for managing information security.
57
True or False: DODM 5200.01 vol 1 requires the implementation of security patches.
True
58
Fill in the blank: __________ is the process of identifying, assessing, and prioritizing risks.
Risk assessment
59
What is the significance of security policies in DODM 5200.01 vol 1?
They provide a foundation for establishing security practices and procedures.
60
Multiple Choice: Which of the following is a consequence of a security breach? A) Increased trust B) Legal action C) Enhanced reputation
B) Legal action
61
True or False: DODM 5200.01 vol 1 encourages the use of multi-factor authentication.
True
62
Fill in the blank: __________ is the practice of regularly reviewing and updating security measures.
Security auditing
63
What is the purpose of the security framework in DODM 5200.01 vol 1?
To provide a structured approach to managing information security risks.
64
Multiple Choice: Which of the following is NOT a component of an information security program? A) Incident response B) Threat detection C) Personal opinions
C) Personal opinions
65
True or False: DODM 5200.01 vol 1 applies only to federal employees.
False
66
Fill in the blank: The __________ is responsible for overseeing information security compliance across the DoD.
Chief Information Security Officer (CISO)