DODI 8500.01, Intro/ Encl. 2 Flashcards
Which instruction established a DoD cybersecurity program to protect and defend DoD information and
information technology?
DoDI 8500.01
What will be employed to protect, detect, characterize, counter, and mitigate unauthorized activity and
vulnerabilities on DoD information networks?
Cyberspace defense
What must be given to all DoD information in electronic format in the appropriate levels that reflects the
importance of both information sharing and protection?
Confidentiality, Integrity, and Availability
What must be used to ensure strong identification, authentication, and eliminate anonymity in DoD IS
and PIT systems?
Identity Assurance
Which instruction must the DoD-wide Public Key Infrastructure (PKI) solution be managed in
accordance with?
DoDI 8520.02
Which instruction must biometrics that are used in support of identity assurance be managed in
accordance with?
DoDD 8521.01
Who is responsible for monitoring, evaluating, and providing advice to the Secretary of Defense
regarding all DoD cybersecurity activities and overseeing the implementation of DoDI 8500.01?
DoD CIO
Who does the DoD CIO coordinate with to ensure that cybersecurity policies and capabilities are aligned
with and mutually supportive of personnel, physical, industrial, information, and operations security
policies and capabilities?
Under Secretary of Defense for Intelligence (USD(I))
Who does the DoD CIO coordinate with in development of cybersecurity-related standards and
guidance?
NIST
Who does the DoD CIO coordinate with to ensure that cybersecurity responsibilities are integrated into
processes for DoD acquisition programs, including research and development?
USD(AT&L)
What does the DoD CIO appoint for DoD ISs and PIT systems governed by the Enterprise Information Mission Area (MA) (EIEMA)?
PAO
In what grade or the civilian employee equivalent must the candidate be to be appointed as the Defense
IA Security Accreditation Working Group (DSAWG) Chair by the DoD CIO?
O-6
How often must the DoD CIO conduct an assessment of the DoD Component cybersecurity programs?
Annually
Who develops or acquires solutions that support cybersecurity objectives for use throughout the DoD via
the ESSG process?
DISA Director
In accordance with which instruction does the DISA Director ensure the continued development and
maintenance of guidance and standards procedures to catalog, regulate, and control the use and
management of Internet protocols, data services, and associated ports on DoD networks?
DoD Instruction 8551.1