Yea Flashcards

1
Q

What provides a disciplined and structured process that combines IS security and risk management activities into the system development life cycle and authorizs their use within the DoD?

A

Risk Management Framework (RMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many steps does the Risk Management Framework (RMF) have?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The reciprocal acceptance of DoD and other federal agency and department security authorizations will be implemented in accordance with procedures in which reference?

A

DoD Instruction 8510.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many conditions must be met for operational resilience

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transmission of DoD information must be protected through the communications security (COMSEC) measures and procedures established in which refernence

A

DoDI 8523.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

COMSEC monitoring and cybersecurity readiness testing will be conducted in accordance with which reference?

A

DoD Instruction 8560.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type of model provides people, services, and platforms the ability to discover one another and connect to form new capabilities or teams without being constrained by geographic, organizational, or technical barriers?

A

Net-centric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What coordinates and facilitates relationships across LE, intelligence, and homeland security communities?

A

DoD Cyber Crime Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used to ensure strong identification and authentication as well as eliminates anonymity in DoD ISs so that entities’ access and access behavior are visible, traceable, and enable continuous monitoring for LE and cybersecurity?

A

Identity assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which instruction contains identity assurance policies and procedures regarding identity authentication for ISs?

A

DoD Instruction 8520.03

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What provide standard cybersecurity such as boundary defense, incident detection, and respone, and key management as well as delivering common applications such as office automation and e-mail?

A

Enclaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Where must all DoD ISs be registered on the low side?

A

DITPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which reference should be consulted for PIT cybersecurity requirements?

A

DoD Instruction 8510.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which DoD level must all PIT systems be registered?

A

Component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What consists of IT capabilities that are providied according to a formal agreement between DoD entitites or between DoD and an entity external to DoD

A

IT Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unified capability products will receive unified capability certification for cybersecurity in accordance with which reference?

A

DoD Instruction 8100.04

17
Q

All acquisitions of DoD IS will comply with USD (AT&L) Memorandum along with which other reference?

A

DoD Instruction 8580.1

18
Q

Which reference will ports, protocols, and services be managed in accordance with?

A

DoD Instruction 8551.1

19
Q

Who is responsible for configuring and reviewing the security for IT below the system level for acceptance and connection into an authorized computing environment?

A

ISSM

20
Q

Who will oversee the development and acquisition of enterprise solutions for use throughout the DoD that support cybersecurity objectives?

A

ESSG