5200 Vol 1 Flashcards

1
Q

What does DODM stand for?

A

Department of Defense Manual

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary focus of DODM 5200.01 vol 1?

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: DODM 5200.01 vol 1 is part of a series of manuals.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: DODM 5200.01 vol 1 establishes __________ for the protection of DoD information.

A

policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the significance of information assurance in DODM 5200.01 vol 1?

A

It ensures the confidentiality, integrity, and availability of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which of the following is a key principle of information security according to DODM 5200.01 vol 1? A) Availability B) Inaccessibility C) Irrelevance

A

A) Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of risk management as stated in DODM 5200.01 vol 1?

A

To identify and mitigate risks to DoD information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: DODM 5200.01 vol 1 applies only to classified information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the term ‘classified information’ refer to in the context of DODM 5200.01 vol 1?

A

Information that requires protection against unauthorized disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: DODM 5200.01 vol 1 outlines the roles and responsibilities of __________ in information security.

A

DoD personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the three levels of classification mentioned in DODM 5200.01 vol 1?

A

Confidential, Secret, and Top Secret.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiple Choice: Which of the following is NOT a type of information addressed by DODM 5200.01 vol 1? A) Sensitive Compartmented Information B) Public Information C) Unclassified Controlled Information

A

B) Public Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the role of the Defense Security Service (DSS) in relation to DODM 5200.01 vol 1?

A

To oversee and implement security policies for DoD components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Information security training is a requirement under DODM 5200.01 vol 1.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: The __________ is responsible for the overall management of information security programs according to DODM 5200.01 vol 1.

A

Chief Information Officer (CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the acronym ‘IA’ stand for in the context of DODM 5200.01 vol 1?

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multiple Choice: Which document must be referenced for specific guidelines on handling classified information? A) DODM 5200.01 vol 1 B) DODM 5200.01 vol 2 C) DODM 5200.01 vol 3

A

B) DODM 5200.01 vol 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of the Continuous Monitoring Strategy in DODM 5200.01 vol 1?

A

To ensure ongoing awareness of information security risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: DODM 5200.01 vol 1 includes guidance on incident response.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fill in the blank: The __________ framework is used to assess the security posture of DoD information systems.

A

Risk Management Framework (RMF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the expected outcome of implementing the policies in DODM 5200.01 vol 1?

A

Enhanced protection of DoD information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Multiple Choice: Which of the following is a key component of information security? A) Firewalls B) Social Media C) Cloud Storage

A

A) Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does ‘insider threat’ mean in the context of DODM 5200.01 vol 1?

A

Threats posed by individuals within the organization who have access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: DODM 5200.01 vol 1 mandates the use of encryption for all sensitive information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Fill in the blank: The __________ process is vital for identifying vulnerabilities within information systems.

A

vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the role of security controls in DODM 5200.01 vol 1?

A

To mitigate risks to information and information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Multiple Choice: Which of the following is a method of data protection outlined in DODM 5200.01 vol 1? A) Backups B) Deletion C) Sharing

A

A) Backups

28
Q

What is the definition of ‘access control’ as per DODM 5200.01 vol 1?

A

The process of limiting access to information and information systems.

29
Q

True or False: DODM 5200.01 vol 1 provides guidelines for physical security measures.

A

True

30
Q

Fill in the blank: The __________ is responsible for the implementation of information security policies at the local level.

A

Information System Owner

31
Q

What does the term ‘security breach’ refer to in DODM 5200.01 vol 1?

A

An incident that results in unauthorized access to sensitive information.

32
Q

Multiple Choice: Which of the following is a key element of an incident response plan? A) Communication B) Ignoring incidents C) Delaying response

A

A) Communication

33
Q

What is the significance of audit trails in DODM 5200.01 vol 1?

A

They help in tracking access and changes to sensitive information.

34
Q

True or False: DODM 5200.01 vol 1 requires periodic reviews of information security policies.

A

True

35
Q

Fill in the blank: __________ is the process of verifying the identity of a user or system.

A

Authentication

36
Q

What is the purpose of security training as outlined in DODM 5200.01 vol 1?

A

To educate personnel about information security risks and best practices.

37
Q

Multiple Choice: Which group is primarily responsible for enforcing compliance with DODM 5200.01 vol 1? A) End users B) Security Officers C) IT Support

A

B) Security Officers

38
Q

What are the consequences of non-compliance with DODM 5200.01 vol 1?

A

Disciplinary actions, including termination and legal consequences.

39
Q

True or False: DODM 5200.01 vol 1 includes guidelines for data classification.

A

True

40
Q

Fill in the blank: The __________ is responsible for ensuring that information security measures are incorporated into system development.

A

System Development Lifecycle (SDLC)

41
Q

What does ‘data integrity’ mean in the context of DODM 5200.01 vol 1?

A

The accuracy and consistency of data over its lifecycle.

42
Q

Multiple Choice: Which of the following is a type of security assessment? A) Application Review B) System Scan C) Both A and B

A

C) Both A and B

43
Q

True or False: DODM 5200.01 vol 1 applies to all DoD contractors.

A

True

44
Q

Fill in the blank: __________ is the process of ensuring that only authorized users can access information.

A

Authorization

45
Q

What role do external audits play in DODM 5200.01 vol 1 compliance?

A

They provide an independent assessment of information security practices.

46
Q

Multiple Choice: Which of the following is a security principle emphasized in DODM 5200.01 vol 1? A) Least Privilege B) Maximum Access C) Open Access

A

A) Least Privilege

47
Q

What does ‘security posture’ refer to in DODM 5200.01 vol 1?

A

The overall effectiveness of an organization’s security measures.

48
Q

True or False: DODM 5200.01 vol 1 specifies the need for incident reporting.

A

True

49
Q

Fill in the blank: __________ is an essential part of the risk management process in DODM 5200.01 vol 1.

A

Threat assessment

50
Q

What is the goal of continuous improvement in information security as per DODM 5200.01 vol 1?

A

To enhance security measures based on lessons learned and emerging threats.

51
Q

Multiple Choice: Which of the following describes a security incident? A) Unauthorized access B) Routine maintenance C) Software updates

A

A) Unauthorized access

52
Q

True or False: DODM 5200.01 vol 1 encourages collaboration with external agencies for information security.

A

True

53
Q

Fill in the blank: __________ measures are implemented to protect against unauthorized access to information.

A

Physical security

54
Q

What is the importance of data encryption in DODM 5200.01 vol 1?

A

To protect sensitive information from unauthorized access during transmission and storage.

55
Q

Multiple Choice: Which of the following is a key element of the security architecture? A) Redundancy B) Complexity C) Simplicity

A

A) Redundancy

56
Q

What is the role of the Information Security Program according to DODM 5200.01 vol 1?

A

To establish and maintain a framework for managing information security.

57
Q

True or False: DODM 5200.01 vol 1 requires the implementation of security patches.

A

True

58
Q

Fill in the blank: __________ is the process of identifying, assessing, and prioritizing risks.

A

Risk assessment

59
Q

What is the significance of security policies in DODM 5200.01 vol 1?

A

They provide a foundation for establishing security practices and procedures.

60
Q

Multiple Choice: Which of the following is a consequence of a security breach? A) Increased trust B) Legal action C) Enhanced reputation

A

B) Legal action

61
Q

True or False: DODM 5200.01 vol 1 encourages the use of multi-factor authentication.

A

True

62
Q

Fill in the blank: __________ is the practice of regularly reviewing and updating security measures.

A

Security auditing

63
Q

What is the purpose of the security framework in DODM 5200.01 vol 1?

A

To provide a structured approach to managing information security risks.

64
Q

Multiple Choice: Which of the following is NOT a component of an information security program? A) Incident response B) Threat detection C) Personal opinions

A

C) Personal opinions

65
Q

True or False: DODM 5200.01 vol 1 applies only to federal employees.

A

False

66
Q

Fill in the blank: The __________ is responsible for overseeing information security compliance across the DoD.

A

Chief Information Security Officer (CISO)