CJCSM 6510.01B, Encl. F & G Flashcards
What is the focal point for Net Defense threat data in the Department of Defense?
USCYBERCOM
Which type of data consists of information that can help lead to increased defense of DoD information
networks and the attribution and intent of network intruder(s)?
Threat
What employs intelligence, counterintelligence, law enforcement and other military capabilities to
defend DoD information and computer networks?
CND
Where is the technical reporting between the incident handling program and intelligence maintained?
JIMS
Which group consists of senior representatives from federal agencies that have roles and responsibilities
related to preventing, investigating, defending against, responding to, mitigating, and assisting in the recovery from cyber incidents and attacks?
Cyber Unified Coordination Group (CUCG)
What is an interagency forum where organizations responsible for a range of activities (technical
response and recovery, LE, intelligence, and defensive measures) coordinate for the purpose of preparing
for and executing an efficient and effective response to an incident?
NCRCG
What is the central repository for managing all reportable events and incidents in the Department of
Defense?
JIMS
What is the system of record for the JLLP that provides a Web-enabled information management system
to meet operational needs for reporting lessons learned?
Joint Lessons Learned Information System (JLLIS)
What is used by CND Analysts for collecting, processing, and storing the DoD networking sensing
environment information, facilitating execution of selected COAs to mitigate and respond to attacks
directed at DoD information networks?
Enterprise Sensor Grid (ESG)
What is the functional owner of the JIMS and maintains and manages it?
USCYBERCOM
What is the central repository for storing malware and associated analysis?
Joint Malware Catalog (JMC)
What is the basis for the Department of Defense’s capability to rapidly analyze malicious code and
provide an accurate understanding of its behavior and capabilities?
Joint Malware Catalog (JMC)
What is the functional owner of the JMC?
USCYBERCOM
What is the primary CND intelligence analysis tool suite used to derive CND intelligence information?
JIMS
Which list ensures critical DoD ISs are not affected inadvertently by responses to CND events?
DoD Protected Traffic List