Unit 4.8, 4.9, 4.10 & 4.11 Knowledge Check Flashcards
(35 cards)
This type of Science & Technology (S&D activity translates promising technology into solutions
for broadly defined military problems.
- Basic Research
- Advanced Technology Development
- Developmental Testing
- Applied Research
Applied Research
The _____ provides threat intelligence to defense policy makers, force planners and
warfighters to provide an understanding of foreign threat capabilities which may affect a program’s
design or implementation.
- Director of National Intelligence (DNI)
- Army Intelligence Coordinator
- Defense Intelligence Agency (DIA)
- National Security Agency (NSA)
Defense Intelligence Agency (DIA)
Modeling and Simulation is a risk management tool that we use:
- In virtually all phases of the acquisition life cycle.
- To avoid conducting developmental and operational testing.
- Primarily in early development to support the Analysis of Alternatives.
- Exclusively for mature designs that will be produced in quantity.
In virtually all phases of the acquisition life cycle.
Which of the following supportability analysis tools ensures that operational readiness is
achieved throughout a system’s lifecycle by developing maintenance concepts?
- Failure Modes and Effects Criticality Analysis (FMECA)
- Preventive Maintenance
- Level of Repair Analysis (LORA)
- Reliability Centered Maintenance (RCM)
Level of Repair Analysis (LORA)
Which of the following supportability analysis tools systematically identifies the likely modes of failure, the possible effects of each failure, and the criticality of each effect on mission completion, environmental impacts, health hazards, and system safety?
- Level of Repair Analysis (LORA)
- Failure Modes, Effects and Criticality Analysis (FMECA)
- Test Analyze, Fix and Test (TAFTI
- Reliability Centered Maintenance (RCM)
Failure Modes, Effects and Criticality Analysis (FMECA)
As part of the Program Protection Plan (PPP), cyber security is a critical priority for DoD.
Effective cyber security in DoD acquisition programs encompasses all of the necessary actions taken to ensure the _____ of a system’s information to enable warfighting operations.
- technological superiority
- reliability, availability, and maintenance (RAM)
- suitability and effectiveness
- confidentiality, integrity, and availability (CIA)
confidentiality, integrity, and availability (CIA)
Using _____ as part of the life cycle logistics and systems engineering processes to influence the design, also helps to determine the most cost effective way to support the system throughout its life.
- Full-Up Systems-Level (FUSL) test
- Product Support Analysis (PSA)
- An In-Service Review (ISR)
- Reliability Centered Maintenance (RCM)
Product Support Analysis (PSA)
Which of the following is NOT one of the methods used to achieve a producible design?
- Use a modular approach
- Introduce variability in the manufacturing process
- Minimize total number of parts
- Use standard components
Introduce variability in the manufacturing process
A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is _____.
- open systems
- software-embedded systems
- automated information systems
- non-developmental items
open systems
Select a primary weapon system function tested during Live Fire Test and Evaluation.
- Accuracy
- Reliability
- Maintainability
- Survivability
Survivability
______ consist(s) of a set of process elements, or “tools,” used to provide balance and manage the execution of the system engineering process.
- Requirements Development
- Technical Planning
- Technical Management Processes
- Configuration Management
Technical Management Processes
Joint Capability Technology Demonstrations (JCTDs) are a special case of Advanced Technology
Demonstrations (ATDs), and demonstrate the potential to eventually be fielded and used by
operational forces. Additionally, JCTDs are:
- A means of demonstrating the use of immature technology to address critical military needs
- Used for both maturing technology & refining operational concepts in the field
- A critical role player in the development of the program’s System Engineering Plan (SEP)
- Used exclusively when development and production activities are required
Used for both maturing technology & refining operational concepts in the field
Cyber Security planning activities, including writing the Cyber Security Strategy annex to the
Program Protection Plan, should begin _____.
- after the Capability Development Document (COD) validation
- during the Material Solution Analysis (MSA) Phase prior to Milestone A
- with the implementation of performance based support
- in full rate production
during the Material Solution Analysis (MSA) Phase prior to Milestone A
The primary source of threat intelligence to support the defense acquisition process is the _____.
- Capstone Threat Assessment
- Close in Training Area
- Corps Theater Assessment
- Center for Tactical Analysis
Capstone Threat Assessment
The _____ describes the threat to be countered and the projected threat environment.
- Validated On-line Training
- Validated On-line Life-Cycle Threat
- Verified On-line Logistics Table
- Verified On-line Life-Cycle Threat
Validated On-line Life-Cycle Threat
To minimize software development risk, the government should select a contractor who:
- Relies on leading edge approaches and the latest state-of-the-art tools for software development
- Can demonstrate software development process maturity and domain expertise
- Complies with Quality Standard M ll-Q9858A
- Is rated Level 1 on the Standard Capability Maturity Model Integration Appraisal Method for Process
Improvement (SCAMPI)
Complies with Quality Standard M ll-Q9858A
Prevention of damage to, protection of, and restoration of computers, electronic communications
systems, electronic communications services, wire communication, and electronic communication
refers to: ______.
- Cyber analysis
- Cyber Security
- Cyber assessment
- Security Posture
Cyber Security
_____ Preserves authorized restrictions on information access and disclosure:
- Integrity
- Confidentiality
- Availability
- Nonrepudiation
Confidentiality
_____ Guards against improper information modification or destruction.
- Authentication
- Availability
- Nonrepudiation
- Integrity
Integrity
Which of the following is NOT a primary technique used in Product Support Analysis (PSA)?
- Level of Repair Analysis (LORA)
- Mean Time to Repair (MTTR)
- Failure Modes, Effects & Criticality Analysis (FMECA)
- Fault Tree Analysis (FTA)
Failure Modes, Effects & Criticality Analysis (FMECA)
Which of the following Integrated Product Support (IPS) Element involves the identification and acquisition of personnel with the skills and grades required to operate, maintain, and support systems over their lifetime?
- Manpower and Personnel
- Product Support Management
- Training and Training Support
- Supply Support
Manpower and Personnel
Which of the following Integrated Product Support (IPS) Element objectives is “to plan and
manage cost and performance across the product support value chain, from design through disposal?”
- Supply Support
- Facilities and Infrastructure
- Maintenance Planning and Management
- Product Support Management
Product Support Management
Three critical factors in achieving maximum Operational Availability (AO) are:
- Vulnerability, interoperability and simplicity
- Viability. deniability and versatility
- Reliability, maintainability and supportability
- Transportability, survivability and affordability
Reliability, maintainability and supportability
Which document serves as the milestone acquisition document that describes the plan,
responsibilities, and decisions for all program protection activities?
-Test and Evaluation Master Plan
- Product Support Plan
- Acquisition Decision Memorandum
- Program Protection Plan
Program Protection Plan