DODI 8500.01, CYBER SECRITY Flashcards

1
Q

Which instruction established a DoD cyber security program to protect and defend DoD information and information technology?

A

DoDI 8500.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What will be employed to protect, detect, characterize, and mitigate unauthorized activity and vulnerabilities on DoD information networks?

A

Cyberspace Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What must be given to all DoD information in electronic format in the appropriate levels that reflects the importance of both information sharing and protection?

A

Confidentiality, Integrity and Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What must be used to ensure strong identification, authentication, and eliminate anonymity in DoD IS and PIT systems?

A

Identity Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which instruction must the DoD-wide Public Key Infrastructure (PKI) solution be managed in accordance with?

A

DoDI 8520.02

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which instruction must the biometrics that are used in support of identity assurance be managed in accordance with?

A

DoDD 8521.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who is responsible for the monitoring, evaluation, and providing the advice to the Secretary of Defense regarding all DoD cyber security activities and oversee implementation of DoDI 8500.01?

A

DoD CIO (Pages 14)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who does the DoD CIO coordinate with to ensure that cyber security policies and capabilities are aligned with and mutually supportive of personnel. physical, industrial, information and operations security and capabilities?

A

Under Secretary of Defense for Intelligence (USD(I))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who does the DoD CIO coordinate with in development of cybersecurity-related standards and guidance?

A

NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who does the DoD CIO coordinate with to ensure that cybersecurity responsibilities are integrated into processes for DoD acquisition programs, including research and development?

A

USD(AT&L)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does the DoD CIO appoint for DoD ISs and PIT systems governed by the Enterprise Information Mission Area (MA) (EIEMA)?

A

PAO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In what grade or the civilian employee equivalent must the candidate be to be appointed as the Defense IA Security Accreditation Working Group (DSAWG) Chair by the DoD CIO?

A

0-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How often must the DoD CIO conduct an assessment of the DoD Component cybersecurity program?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who develops or acquires solution that support cybersecurity objectives for use throughout the DoD via the ESSG process?

A

DISA Director

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In accordance with which instruction does the DISA Director ensure the continued development and maintenance of the standards procedures to catalog, regulate, and control the use and management of Internet protocols, data services, and associated ports an DoD networks?

A

DoD Instruction 8551.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In accordance with which publication does the DlSA Director develop and provide cybersecurity training and awareness products as well as a distributive training capability to support the DoD Components?

A

DoD Directive 8570.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Who does the DlSA Director coordinate with to ensure that command cyber readiness inspection guidance and metrics provide a unity effort among the security disciplines?

A

USD(I)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who assists with acquisition related agreements, and international cybersecurity and cyberspace defense negotiations and agreements?

A

USD(AT&L)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The USD(AT&L) must ensure that PIT systems included in acquisition programs are designated, categorized‘ and have their authorization boundaries defined according to the guidelines that are provided in which reference?

A

DoD Instruction 8510.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who exercises oversight responsibility for developmental test planning in support of interoperability and cybersecurity programs acquiring DoD is and PIT systems in accordance with DoDl 5134.17?

A

DASD(DT& E)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Who coordinates with the DoD ClO to ensure cybersecurity strategies, policies, and capabilities are aligned with overarching DoD cyberspace policy. and are supportive of policies and capabilities relating to the disclosure of classified military information to foreign governments and international organizations in accordance with DoD Directive 8000.0l

A

USD(P)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Who supports implementation of cybersecurity requirements for effective manning, management, and readiness assessments of the cybersecurity workforce in accordance with DoD Directive 8570.01 and DoD 8570.01-M?

A

USD(P&R)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Who evaluates or validates security implementation specifications described in DoDl 8500.01?

A

DIRNSA/CHCSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who develops, implements, and manages the cybersecurity program for DoD non cryptographic SCI systems, including the DoD intelligence (DoDIIS) and JWlCS?

A

Director, DIA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Who appoints the PAO for DoD IS and PIT systems governed by the Business Mission Area (BMA)?

A

Deputy Chief Management Officer (DCMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cybersecurity training and awareness products developed by what will be used to meet the baseline user awareness training that is required by BOB Directive 857001?

A

DISA

27
Q

Which program ensures that IT can be used in a way that allows mission owners and operators to have confidence in the confidentiality, integrity, and availability of IT and DoD information, and to make choices based on that confidence?

A

Defense cybersecurity

28
Q

What is used by the DoD to address risk management for all DoD ISs and PIT systems?

A

NIST SP 800-37

29
Q

From which perspective does tier one risk management address risk?

A

Organizational

30
Q

What provides the Tier I risk management governance for the DoD?

A

DoD ISRMC

31
Q

Which risk management tier addresses risk from a mission and business process perspective?

A

Tier 2

32
Q

Which risk management tier addresses risk from an IS and PlT system perspective?

A

Tier 3

33
Q

Cybersecurity risk management is planned for and documented in a cybersecurity strategy in accordance with Interim DoD Instruction 5000.02 along with which other reference?

A

DoD Instruction 8580.1

34
Q

What provides a disciplined and structured process that combines is security and risk management activities into the system development life cycle and authorizes their use within the DoD?

A

Risk Management Framework (RMF)

35
Q

How many steps does the Risk Management Framework (RMF) have?

A

6

36
Q

The reciprocal acceptance of DoD and other federal agency and department security authorizations will be implemented in accordance with procedures in which reference?

A

DoD Instruction 8510.01

37
Q

How many conditions must be met for operational resilience?

A

3

38
Q

Transmission of DoD information must be protected through the communications security (COMSEC) measures and procedures established in which reference?

A

DoDI 8523.01

39
Q

COMSEC monitoring and cybersecurity readiness testing will be conducted in accordance with which reference?

A

DOD Instruction 8560.01

40
Q

Which type of model provides people, Services, and platforms the ability to discover one another and connect to form new capabilities or teams without being constrained by geographic, organizational, or technical barriers?

A

Net centric

41
Q

What coordinates and facilitates relationships across LE, intelligence, and homeland security communities?

A

DoD Cyber Crime Center

42
Q

What is used to ensure strong identification and authentication as well as eliminates anonymity in DoD lSs so that entities’ access and access behavior are visible, traceable, and enable continuous monitoring for LE and cybersecurity?

A

Identity assurance

43
Q

Which instruction contains identity assurance policies and procedures regarding identity authentication for 185?

A

DoD Instruction 8520.03

44
Q

What provide standard cybersecurity, such as boundary defense, incident detection, and response, and key management as well as delivering common applications such as office automation and e-mail?

A

Enclaves

45
Q

Where must all DoD ISs be registered on the low side?

A

DITPR

46
Q

Which reference should be consulted for PIT cybersecurity requirements?

A

DoD Instruction 8510.01

47
Q

Which DoD level must all PIT systems be registered?

A

Component

48
Q

What consists of IT capabilities that are provided according to a formal agreement between DoD entities or between DoD and an entity external to DoD?

A

IT Service

49
Q

Unified capability products will receive unified capability certification for cybersecurity in accordance with which reference?

A

DoD Instruction 8100.04

50
Q

All acquisitions of DoD [S will comply with USD(AT&L) Memorandum along with which other reference?

A

DoD Instruction 8580.1

51
Q

Which reference will ports, protocols, and services be managed in accordance with?

A

DoD Instruction 8551.1

52
Q

Who is responsible for configuring and reviewing the security for IT below the system level for acceptance and connection into an authorized computing environment

A

ISSM

53
Q

Who will oversee the development and acquisition of enterprise solutions for use throughout the DoD that support cybersecurity objectives?

A

ESSG

54
Q

Which TPM version or higher if required by DISA STle must DoD components ensure that new computer assets procured to support DoD meet?

A

1.2

55
Q

Which standards will be used by STIGs developed by DISA?

A

SCAP

56
Q

Who ensures that DoD IT is assigned to and governed by a DoD Component cybersecurity program?

A

DoD SISO

57
Q

Who performs the DoD risk executive function?

A

DOD ISRMC

58
Q

Who are responsible for overseeing and establishing guidance for the strategic implementation of cybersecurity and risk management within their MAs?

A

PAOs

59
Q

Who are responsible for developing and maintaining an organizational or system level cybersecurity program

A

ISSMs

60
Q

In accordance with which reference must ISSMs ensure that the handling ofpossible or actual data spills of classified information are handled with?

A

DOD Manual 5200.01

61
Q

Who is responsible for implementing and enforcing all DoD IS and PIT system cybersecurity policies and procedures as defined by cybersecurity related documentation?

A

ISSO

62
Q

Authorized users must meet the minimum cybersecurity awareness requirements in accordance with which reference?

A

DoD 8570.01-M

63
Q

Who render authorization decisions for DoD ISs and PIT systems under their purview in accordance with DoD Instruction 8510.01?

A

AOs