This type of Science & Technology (S&D activity translates promising technology into solutions
for broadly defined military problems.
Applied Research
The _____ provides threat intelligence to defense policy makers, force planners and
warfighters to provide an understanding of foreign threat capabilities which may affect a program’s
design or implementation.
Defense Intelligence Agency (DIA)
Modeling and Simulation is a risk management tool that we use:
In virtually all phases of the acquisition life cycle.
Which of the following supportability analysis tools ensures that operational readiness is
achieved throughout a system’s lifecycle by developing maintenance concepts?
Level of Repair Analysis (LORA)
Which of the following supportability analysis tools systematically identifies the likely modes of failure, the possible effects of each failure, and the criticality of each effect on mission completion, environmental impacts, health hazards, and system safety?
Failure Modes, Effects and Criticality Analysis (FMECA)
As part of the Program Protection Plan (PPP), cyber security is a critical priority for DoD.
Effective cyber security in DoD acquisition programs encompasses all of the necessary actions taken to ensure the _____ of a system’s information to enable warfighting operations.
confidentiality, integrity, and availability (CIA)
Using _____ as part of the life cycle logistics and systems engineering processes to influence the design, also helps to determine the most cost effective way to support the system throughout its life.
Product Support Analysis (PSA)
Which of the following is NOT one of the methods used to achieve a producible design?
Introduce variability in the manufacturing process
A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is _____.
open systems
Select a primary weapon system function tested during Live Fire Test and Evaluation.
Survivability
______ consist(s) of a set of process elements, or “tools,” used to provide balance and manage the execution of the system engineering process.
Technical Management Processes
Joint Capability Technology Demonstrations (JCTDs) are a special case of Advanced Technology
Demonstrations (ATDs), and demonstrate the potential to eventually be fielded and used by
operational forces. Additionally, JCTDs are:
Used for both maturing technology & refining operational concepts in the field
Cyber Security planning activities, including writing the Cyber Security Strategy annex to the
Program Protection Plan, should begin _____.
during the Material Solution Analysis (MSA) Phase prior to Milestone A
The primary source of threat intelligence to support the defense acquisition process is the _____.
Capstone Threat Assessment
The _____ describes the threat to be countered and the projected threat environment.
Validated On-line Life-Cycle Threat
To minimize software development risk, the government should select a contractor who:
Complies with Quality Standard M ll-Q9858A
Prevention of damage to, protection of, and restoration of computers, electronic communications
systems, electronic communications services, wire communication, and electronic communication
refers to: ______.
Cyber Security
_____ Preserves authorized restrictions on information access and disclosure:
Confidentiality
_____ Guards against improper information modification or destruction.
Integrity
Which of the following is NOT a primary technique used in Product Support Analysis (PSA)?
Failure Modes, Effects & Criticality Analysis (FMECA)
Which of the following Integrated Product Support (IPS) Element involves the identification and acquisition of personnel with the skills and grades required to operate, maintain, and support systems over their lifetime?
Manpower and Personnel
Which of the following Integrated Product Support (IPS) Element objectives is “to plan and
manage cost and performance across the product support value chain, from design through disposal?”
Product Support Management
Three critical factors in achieving maximum Operational Availability (AO) are:
Reliability, maintainability and supportability
Which document serves as the milestone acquisition document that describes the plan,
responsibilities, and decisions for all program protection activities?
-Test and Evaluation Master Plan
Program Protection Plan