COMNAVIDFORINST M-5239.2D, COMMANDER'S CYBER SECURITY AND INFORMATION ASSURANCE HANDBOOK Flashcards

1
Q

What centralizes command of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD’s cyber expertise?

A

U.S. Cyber Command (USCYBERCOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What manages the entire DoD Information Network (DoDIN)?

A

Defense Information Systems Agency (DISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who serves as the Navy’s cryptologic commander?

A

Commander, Tenth Fleet (C10F)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What sets cyber policy for the Navy?

A

U.S. Fleet Cyber Command (FLTCYBERCOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What provides integrated communications and IT systems that enable Information Dominance and the C2 of maritime forces/

A

Program Executive Office for Command, Control, Communications, Computers, and Intelligence (PEO C4I)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What designs, develops, and deploys advanced communications and information capabilities?

A

Space and Naval Warfare Systems Command (SPAWAR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What, as the Navy’s C5I capability TYCOM, provides relevant, resilient, and effective C5I capabilities and a highly trained cyber workforce to maximize fleet readiness through Train and Assist Visits (TAVs) to support all Naval missions throughout cyberspace?

A

Navy Information Dominance Forces (NAVIDFOR)

NAVIFOR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What operates and defends the Navy’s portion of the DoD Information Network (DoDIN), current Information Condition (INFOCON) level, and issues tasking orders and guidance to the Fleet in the form of Communications Tasking Orders (CTOs) and Naval Telecommunications Directives (NTDs)?

A

Naval Network Warfare Command (NAVNETWARCOM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What has the mission of coordinating, monitoring, and overseeing the defense of Navy computer networks and systems and to be responsible for accomplishing Computer Network Defense (CND) missions as assigned by C10F and Commander, USCYBERCOM?

A

Navy Cyber Defense Operations Command (NCDOC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What afford the ability to confirm an event based on live system analysis, and/or determine any additional data gathering actions required to facilitate an investigation?

A

Cyber Tactical Teams (CTTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Navy’s Center of Excellence for Information Operations (IO)?

A

Navy Information Operations Command (NIOC), Norfolk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who is responsible to the Commanding Officer (CO) for the proper development, implementation, and enforcement of the command’s personnel and traditional/PHYSEC posture?

A

Command Security Manager (CSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who is responsible for ensuring the command’s Information System (IS) is operated, used, maintained, and disposed of per governing security policies and practices?

A

Information Systems Security Manager (ISSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which Navy Enlisted Classification (NEC) must Information Systems Security Mangers (ISSMs) have?

A

NEC 2779

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the minimum required pay grade for personnel holding the Information Systems Security Manager (ISSM) position at the tactical/shipboard level?

A

E-7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who implements and enforces system-level Cyber Security (CS) controls per program and policy guidance?

A

Information System Security Officer (ISSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which personnel administer and maintain a command’s Information System (IS), and are the backbone fo the Cybersecurity Workforce (CSWF)?

A

Privileged users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How often must authorized users of a network system participate in Cyber Awareness Challenge training as mandated by the DoD?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the DoD IA Implementation Guide that implements policy, assigns responsibilities, and prescribes procedures for applying integrated, layered protection of the DoD IS and networks?

A

DoDI 8500.2

20
Q

What is the DON IA Workforce Management Manual that provides guidance for managing your local Cybersecurity Workforce (CSWF) and addresses training/certification requirements for members of the Cybersecurity Workforce (CSWF)?

A

SECNAV M-5239.2

21
Q

What is the DoD governing instruction on Incident Response?

A

CJCS-M 6510.01F

22
Q

Which publication provides specific Navy policy for developing an Incident Response program locally?

A

SECNAVINST 5239.19

23
Q

Which Naval Telecommunications Directive (NTD) addresses Electronic Spillage (ES)/Negligent Discharge within the Navy enterprise, and must be incorporated into a local command Incident Response Plan?

A

NTD 11-08

24
Q

What must all commands maintain for their network systems as granted by the AO for an Information System (IS) to process, store, or transmit information?

A

Authorization to Operate (ATO)

25
Q

Once an Authorization to Operate (ATO) is granted, the Authorization Termination Date (ATD) is technically within how many years of the authorization date?

A

3

26
Q

How many months prior to a site’s Authorization to Operate (ATO) expiration must the Information Systems Security Manager (ISSM) contact their Immediate Superior in Command (ISIC) and begin to review and update the security authorization package for approval by Fleet Cyber Command (FLTCYBERCOM) Office of Operational DAA (ODAA)?

A

6

27
Q

What effectively terminated DIACAP as the DoD’s IT accreditation process in favor of a “multi-tiered Cyber Security (CS) risk management process”?

A

Navy Cyber Power 2020

28
Q

Per which reference must afloat and shore sites place all DoD Information Systems (IS) under the control of a locally chartered Configuration Control Board (CCB)?

A

DoDI 8500.2

29
Q

How often at a minimum must the Configuration Control Board (CCB) meet?

A

Quarterly

30
Q

Which scanning software is currently in use at the time of this publication for afloat and ashore commands?

A

Nessus Scanner

31
Q

What replaced the eEye Retina tool, part of the Secure Configuration Compliance Validation Initiative (SCCVI)?

A

Assured Compliance Assessment Solution (ACAS)

32
Q

Per DISA Field Security Operations, CCRI Contributing Factors, command personnel who are responsible for executing the Incident Response and Recovery (IR&R) plan must be trained and the plan must be exercised and updated at least annually (for networks that are Mission Assurance Category (MAC) level II or III) or how often (for networks that are MAC level I)?

A

Semi-annually

33
Q

Which local plan is critical for shore commands to develop in order to have the ability to sustain mission essential functions in the event of a man made or natural disaster that precludes the sue of their current facilities?

A

Continuity of Operations Plan (COOP)

34
Q

NAVNETWARCOM Computer Tasking Order (CTO) 08-05A (221515Z Jul 08), Standard Consent Banner and User Agreements and which other publication must be read and understood by all command Information Systems Security Managers (ISSMs), as these serve as the backbone for training and certifying the Cybersecurity Workforce (CSWF)?

A

OPNAVINST 5239.1C

35
Q

Which online database consolidates and reports certification and training requirements for all workforce members and must be regularly viewed and tracked by command leadership?

A

Total Workforce Management System (TWMS)

36
Q

In which course do students learn to apply the Tactics, Techniques, and Procedures (TTPs) needed to defend shipboard networks against intrusions and exploitations?

A

Computer Network Team Trainer (CNTT)

37
Q

Which systems, combined with Intrusion Detection Systems (IDS) at the Network Operations Center (NOC) level, comprise the bulk of unit-level intrusion detection and prevention and represent a component of the Navy’s overall Defense-in-Depth strategy?

A

Host Based Security System (HBSS)

38
Q

Administrators must ensure all subnets within each enclave are actively monitored in Host Based Security System (HBSS) by which module?

A

Rogue System Detection (RSD)

39
Q

For all systems, the Information Systems Security Manager (ISSM) must ensure that all network device and enclave passwords are stored offline and encrypted. Passwords must not be kept in a “master list,” they must instead be protected via which Standard Form and stored in a General Services Administration (GSA)-approved container appropriate for the classification level of the system?

A

SF-700

40
Q

Which process is designed to provide positive control of the vulnerability notification and corrective action process in the DoD?

A

Information Assurance Vulnerability Management (IAVM)

41
Q

How many steps is the Information Assurance Vulnerability Management (IAVM) patching process for Program of Records (PoRs)?

A

7

42
Q

Where do commands report compliance for Information Assurance Vulnerability Management (IAVM) patching?

A

Vulnerability Remediation Asset Monitor (VRAM)

43
Q

How often must scans be conducted for all network-connected Programs of Record (PoR) systems?

A

Monthly

44
Q

Commands must ensure an archive of the past how many days’ worth of scans exist in VRAM/VMS or are held locally?

A

90

45
Q

Anti-Virus (A/V) definitions must be maintained within a how many-day periodicity by requirement?

A

7

46
Q

What are published by Defense Information Systems Agency (DISA) for common network configuration and security requirements that specify how components should be configured to minimize the risk of vulnerability exploitation on the affected network?

A

Security Technical Implementation Guides (STIGs)

47
Q

Which tools are available to automate the Security Technical Implementation Guide (STIG) compliance validation?

A

Security Content Automation Protocol (SCAP)