CJCSM 6510.01B, Encl. F & G Flashcards

1
Q

What is the focal point for Net Defense threat data in the Department of Defense?

A

USCYBERCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of data consists of information that can help lead to increased defense of DoD information
networks and the attribution and intent of network intruder(s)?

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What employs intelligence, counterintelligence, law enforcement and other military capabilities to
defend DoD information and computer networks?

A

CND

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where is the technical reporting between the incident handling program and intelligence maintained?

A

JIMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which group consists of senior representatives from federal agencies that have roles and responsibilities
related to preventing, investigating, defending against, responding to, mitigating, and assisting in the recovery from cyber incidents and attacks?

A

Cyber Unified Coordination Group (CUCG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an interagency forum where organizations responsible for a range of activities (technical
response and recovery, LE, intelligence, and defensive measures) coordinate for the purpose of preparing
for and executing an efficient and effective response to an incident?

A

NCRCG

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the central repository for managing all reportable events and incidents in the Department of
Defense?

A

JIMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the system of record for the JLLP that provides a Web-enabled information management system
to meet operational needs for reporting lessons learned?

A

Joint Lessons Learned Information System (JLLIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used by CND Analysts for collecting, processing, and storing the DoD networking sensing
environment information, facilitating execution of selected COAs to mitigate and respond to attacks
directed at DoD information networks?

A

Enterprise Sensor Grid (ESG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the functional owner of the JIMS and maintains and manages it?

A

USCYBERCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the central repository for storing malware and associated analysis?

A

Joint Malware Catalog (JMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the basis for the Department of Defense’s capability to rapidly analyze malicious code and
provide an accurate understanding of its behavior and capabilities?

A

Joint Malware Catalog (JMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the functional owner of the JMC?

A

USCYBERCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the primary CND intelligence analysis tool suite used to derive CND intelligence information?

A

JIMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which list ensures critical DoD ISs are not affected inadvertently by responses to CND events?

A

DoD Protected Traffic List

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are defined as groups of related incidents and associated data requiring centralized management
at the DoD level?

A

Incident Sets

17
Q

How many progressive readiness conditions are there in the CYBERCON system?

A

5

18
Q
  1. Operations in support of CYBERCON implementation will be executed in accordance with which
    publication?
A

CJCSI 3121.01B