DODI 8500.01, Intro/ Encl. 2 Flashcards

1
Q

Which instruction established a DoD cybersecurity program to protect and defend DoD information and
information technology?

A

DoDI 8500.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What will be employed to protect, detect, characterize, counter, and mitigate unauthorized activity and
vulnerabilities on DoD information networks?

A

Cyberspace defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must be given to all DoD information in electronic format in the appropriate levels that reflects the
importance of both information sharing and protection?

A

Confidentiality, Integrity, and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What must be used to ensure strong identification, authentication, and eliminate anonymity in DoD IS
and PIT systems?

A

Identity Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which instruction must the DoD-wide Public Key Infrastructure (PKI) solution be managed in
accordance with?

A

DoDI 8520.02

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which instruction must biometrics that are used in support of identity assurance be managed in
accordance with?

A

DoDD 8521.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who is responsible for monitoring, evaluating, and providing advice to the Secretary of Defense
regarding all DoD cybersecurity activities and overseeing the implementation of DoDI 8500.01?

A

DoD CIO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who does the DoD CIO coordinate with to ensure that cybersecurity policies and capabilities are aligned
with and mutually supportive of personnel, physical, industrial, information, and operations security

policies and capabilities?

A

Under Secretary of Defense for Intelligence (USD(I))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who does the DoD CIO coordinate with in development of cybersecurity-related standards and
guidance?

A

NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who does the DoD CIO coordinate with to ensure that cybersecurity responsibilities are integrated into
processes for DoD acquisition programs, including research and development?

A

USD(AT&L)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
What does the DoD CIO appoint for DoD ISs and PIT systems governed by the Enterprise Information
Mission Area (MA) (EIEMA)?
A

PAO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what grade or the civilian employee equivalent must the candidate be to be appointed as the Defense
IA Security Accreditation Working Group (DSAWG) Chair by the DoD CIO?

A

O-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How often must the DoD CIO conduct an assessment of the DoD Component cybersecurity programs?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who develops or acquires solutions that support cybersecurity objectives for use throughout the DoD via
the ESSG process?

A

DISA Director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In accordance with which instruction does the DISA Director ensure the continued development and
maintenance of guidance and standards procedures to catalog, regulate, and control the use and
management of Internet protocols, data services, and associated ports on DoD networks?

A

DoD Instruction 8551.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In accordance with which publication does the DISA Director develop and provide cybersecurity training and awareness products as well as a distributive training capability to support the DoD
Components?

A

DoD Directive 8570.01

17
Q

Who does the DISA Director coordinate with to ensure that command cyber readiness inspection
guidance and metrics provide a unity of effort among the security disciplines?

A

USD(I)

18
Q

Who assists with acquisition-related agreements, and international cybersecurity and cyberspace
defense negotiations and agreements?

A

USD(AT&L)

19
Q
  1. The USD(AT&L) must ensure that PIT systems included in acquisition programs are designated,
    categorized, and have their authorization boundaries defined according to the guidelines that are provided
    in which reference?
A

DoD Instruction 8510.01

20
Q

Who exercises oversight responsibility for developmental test planning in support of interoperability
and cybersecurity programs acquiring DoD IS and PIT systems in accordance with DoDI 5134.17?

A

DASD(DT&E)

21
Q

Who coordinates with the DoD CIO to ensure cybersecurity strategies, policies, and capabilities are
aligned with overarching DoD cyberspace policy, and are supportive of policies and capabilities relating to
the disclosure of classified military information to foreign governments and international organizations in
accordance with DoD Directive 8000.01?

A

USD(P)

22
Q

Who supports implementation of cybersecurity requirements for effective manning, management, and
readiness assessments of the cybersecurity workforce in accordance with DoD Directive 8570.01 and DoD
8570.01-M?

A

USD(P&R)

23
Q

Who evaluates or validates security implementation specifications described in DoDI 8500.01?

A

DIRNSA/CHCSS

24
Q

Who develops, implements, and manages the cybersecurity program for DoD non-cryptographic SCI
systems, including the DoD Intelligence IS (DoDIIS) and JWICS?

A

Director, DIA

25
Q

Who appoints the PAO for DoD ISs and PIT systems governed by the Business Mission Area (BMA)?

A

Deputy Chief Management Officer (DCMO)

26
Q

Cybersecurity training and awareness products developed by what will be used to meet the baseline
user awareness training that is required by DoD Directive 8570.01?

A

DISA