DODI 8500.01, Encl. 3 Flashcards

1
Q

Which program ensures that IT can be used in a way that allows mission owners and operators to have
confidence in the confidentiality, integrity, and availability of IT and DoD information, and to make
choices based on that confidence?

A

Defense cyber security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is used by the DoD to address risk management for all DoD ISs and PIT systems?

A

NIST SP 800-37

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

From which perspective does tier one risk management address risk?

A

Organizational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What provides the Tier 1 risk management governance for the DoD?

A

DOD ISRMC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which risk management tier addresses risk from a mission and business process perspective?

A

Tier 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which risk management tier addresses risk from an IS and PIT system perspective?

A

Tier 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cybersecurity risk management is planned for and documented in a cybersecurity strategy in accordance with Interim DoD Instruction 5000.02 along with which other reference?

A

DOD Instruction 8580.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What provides a disciplined and structured process that combines IS security and risk management
activities into the system development life cycle and authorizes their use within the DoD?

A

Risk Management Framework (RMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many steps does the Risk Management Framework (RMF) have?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The reciprocal acceptance of DoD and other federal agency and department security authorizations will
be implemented in accordance with procedures in which reference?

A

DoD Instruction 8510.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. How many conditions must be met for operational resilience?
A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Transmission of DoD information must be protected through the communications security (COMSEC)
measures and procedures established in which reference?

A

DoDI 8523.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

COMSEC monitoring and cybersecurity readiness testing will be conducted in accordance with which
reference?

A

DoD Instruction 8560.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of model provides people, services, and platforms the ability to discover one another and
connect to form new capabilities or teams without being constrained by geographic, organizational, or technical barriers?

A

Net-centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What coordinates and facilitates relationships across LE, intelligence, and homeland security
communities?

A

DoD Cyber Crime Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is used to ensure strong identification and authentication as well as eliminates anonymity in DoD
ISs so that entities’ access and access behavior are visible, traceable, and enable continuous monitoring for
LE and cybersecurity?

A

Identity assurance

17
Q

Which instruction contains identity assurance policies and procedures regarding identity authentication
for ISs?

A

DoD Instruction 8520.03

18
Q

What provide standard cybersecurity, such as boundary defense, incident detection, and response, and
key management as well as delivering common applications such as office automation and e-mail?

A

Enclaves

19
Q

Where must all DoD ISs be registered on the low side?

A

DITPR

20
Q

Which reference should be consulted for PIT cybersecurity requirements?

A

DoD Instruction 8510.01

21
Q

Which DoD level must all PIT systems be registered?

A

Component

22
Q

What consists of IT capabilities that are provided according to a formal agreement between DoD
entities or between DoD and an entity external to DoD?

A

IT Service

23
Q

Unified capability products will receive unified capability certification for cybersecurity in accordance
with which reference?

A

DoD Instruction 8100.04

24
Q

All acquisitions of DoD IS will comply with USD(AT&L) Memorandum along with which other reference?

A

DoD Instruction 8580.1

25
Q

Which reference will ports, protocols, and services be managed in accordance with?

A

DoD Instruction 8551.1

26
Q

Who is responsible for configuring and reviewing the security for IT below the system level for
acceptance and connection into an authorized computing environment?

A

ISSM

27
Q

Who will oversee the development and acquisition of enterprise solutions for use throughout the DoD
that support cybersecurity objectives?

A

ESSG

28
Q

Which TPM version or higher if required by DISA STIGs must DoD components ensure that new
computer assets procured to support DoD meet?

A

1.2

29
Q

Which standards will be used by STIGs developed by DISA?

A

SCAP

30
Q

Who ensures that DoD IT is assigned to and governed by a DoD Component cybersecurity program?

A

DoD SISO

31
Q

Who performs the DoD risk executive function?

A

DoD ISRMC

32
Q

Who are responsible for overseeing and establishing guidance for the strategic implementation of
cybersecurity and risk management within their MAs?

A

PAOs

33
Q

Who render authorization decisions for DoD ISs and PIT systems under their purview in accordance
with DoD Instruction 8510.01?

A

AOs

34
Q

Who are responsible for developing and maintaining an organizational or system-level cybersecurity
program?

A

ISSMs

35
Q

In accordance with which reference must ISSMs ensure that the handling of possible or actual data spills of classified information are handled with?

A

DoD Manual 5200.01

36
Q

Who is responsible for implementing and enforcing all DoD IS and PIT system cybersecurity policies
and procedures as defined by cybersecurity-related documentation?

A

ISSO

37
Q

Authorized users must meet the minimum cybersecurity awareness requirements in accordance with
which reference?

A

DoD 8570.01-M