DODI 8510.01, RISK MANAGEMENT FRAMEWORK (RMF) FOR DOD INFORMATION TECHNOLOGY (IT) Flashcards

1
Q

Which approach to cybersecurity risk management as described in NIST SP 800-39 is implemented by the DoD RMF governance structure?

A

Three-tiered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which Tier level in RMF addresses risk management at the DoD enterprise level?

A

Tier 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who directs and oversees the cybersecurity risk management of DoD IT?

A

Department of Defense Chief Information Officer (DoD CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What performs the DoD Risk Executive Function?

A

DoD Information Security Risk Management Committee (ISRMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the community forum for reviewing and resolving authorization issues related to the sharing of community risk?

A

Defense IA Security Accreditation Working Group (DSAWG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who oversees the RMF TAG and the online KS?

A

Department of Defense Senior Information Security Officer (DoD SISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What provides implementation guidance for the RMF by interfacing with the DoD component cybersecurity programs, cybersecurity communities of interest (COIs), and other entities to address issues that are common across all entities?

A

Risk Management Framework Technical Advisory Group (RMF TAG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What supports RMF implementation, planning, and execution by functioning as the authoritative source for RMF procedures and guidance?

A

Knowledge Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Who must monitor and track overall execution of system-level POA&Ms?

A

Authorizing Officials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who develops, maintains, and tracks security plans for assigned IS and PIT systems?

A

Information System Owners (ISOs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

PMs must ensure periodic reviews, testing and assessment of assigned IS and PIT systems are conducted at least how often?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

PMs must ensure T&E of assigned IS and IT systems is planned, resourced, and documented in the program T&E master plan in accordance with which reference?

A

DoDI 5000.02

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What reduces redundant testing, assessing and documentation, and the associated cost in time and resources?

A

Reciprocity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What must PMs and ISOs who are deploying systems across DoD Components post security authorization documentation to in order to provide visibility of authorization status and documentation to planned receiving sites?

A

Enterprise Mission Assurance Support Service (eMASS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which reference contains DoD policy for Unified Capabilities (UC)?

A

DoDI 8100.04

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is used to deploy identical copies of an IS or PIT system in specified environments?

A

Type authorization

17
Q

Which type of systems do not transmit, receive, route, or exchange information outside of the system’s authorizations?

A

3

18
Q

What must all DoD IS and PIT systems have that provides an overview of the security requirements for the system and describes the security controls in place or planned for meeting those requirements?

A

Security plan

19
Q

How many steps are in the RMF process?

A

6

20
Q

What is step one of the RMF process?

A

Categorize system

21
Q

What is step two of the RMF process?

A

Select Security Controls

22
Q

What is step three of the RMF process?

A

Implement Security Controls

23
Q

What is step four of the RMF process?

A

Assess Security Controls

24
Q

What is step five of the RMF process?

A

Authorize System

25
Q

What is the final step of the RMF process?

A

Monitor Security Controls

26
Q

RMF Team members are required to meet the suitability and fitness requirements established in which reference?

A

DoD 5200.2-R

27
Q

What is the authoritative source for detailed security control descriptions, implementation guidance and assessment procedures?

A

Knowledge Service

28
Q

Which reference identifies vulnerability severity values?

A

NIST SP 800-30

29
Q

Who determines and documents in the SAR a risk level for every NC security control in the system baseline?

A

Security Control Assessor (SCA)

30
Q

What is used to document the SCA’s findings of compliance with assigned security controls based on actual assessment results?

A

Security Assessment Report (SAR)

31
Q

What is used to identify tasks that need to be accomplished to remediate or mitigate vulnerabilities?

A

POA&M

32
Q

IATTs should be granted only when an operational environment or live data is required to complete specific test objectives and should expire at the completion of testing (normally for a period of less than how many days)?

A

90

33
Q

Who continuously monitors the system or information environment for security-relevant events and configuration changes that negatively affect security posture?

A

Information Systems Security Manager (ISSM)