DODI 8510.01, RMF FOR DOD (IT) Flashcards

1
Q

Who oversees the implementation of DoDI 8510.01 and directs and oversees the cybersecurity risk management of DoD IT?

A

DoD Chief Information Officer (DoD CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who develops and provides RMF training and awareness products and a distributive training capability
to support the DoD Components?

A

Director, Defense Information Systems Agency (DISA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is responsible for coordinating with the DoD CIO to ensure RMFs processes are appropriately
integrated with Defense Acquisition System processes for DoD IT acquisitions?

A

Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L))

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who reviews plans, execution, and results of operational testing to ensure adequate evaluation of
cybersecurity for all DoD IT acquisitions subject to oversight?

A

Director, Operational Test and Evaluation (DOT&E)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who ensures that IS security engineering services, when provided to the DoD components, support the
RMF?

A

Director, National Security Agency/Chief, Central Security Service (DIRNSA/CHCSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. DOD Component heads must ensure that a trained and qualified AO is appointed in writing for all DoD IS and PIT systems operating within or on behalf of the DoD Component in accordance with which
    reference?
A

DoD Instruction 8500.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who is responsible for ensuring the Joint Capabilities Integration and Development System (JCIDS)
process supports and documents IS and PIT system categorization consistent with DoDI 8510.01?

A

Chairman of the Joint Chiefs of Staff (CJCS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who is responsible for ensuring all products, services, and PIT have completed the appropriate
evaluation and configuration processes prior to incorporation into or connection to an IS or PIT system?

A

Information Systems Security Manager (ISSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are product-specific and document the applicable DoD policies and security requirements, as well
as best practices and configuration guidelines?

A

Security Technical Implementation Guides (STIGs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are developed by DISA to provide general security compliance guidelines as well as serving as
source guidance documents for STIGs?

A

Security Requirements Guides (SRGs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which approach to cybersecurity risk management as described in NIST SP 800-39 is implemented by
the DoD RMF governance structure?

A

Three-tiered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which Tier level in RMF addresses risk management at the DoD enterprise level?

A

Tier 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who directs and oversees the cybersecurity risk management of DoD IT?

A

Department of Defense Chief Information Officer (DoD CIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What performs the DoD Risk Executive Function?

A

DoD Information Security Risk Management Committee (ISRMC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the community forum for reviewing and resolving authorization issues related to the sharing of
community risk?

A

Defense IA Security Accreditation Working Group (DSAWG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who oversees the RMF TAG and the online KS?

A

Department of Defense Senior Information Security Officer (DoD SISO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What provides implementation guidance for the RMF by interfacing with the DoD component
cybersecurity programs, cybersecurity communities of interest (COIs), and other entities to address issues
that are common across all entities?

A

Risk Management Framework Technical Advisory Group (RMF TAG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What supports RMF implementation, planning, and execution by functioning as the authoritative source
for RMF procedures and guidance?

A

Knowledge Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who must monitor and track overall execution of system-level POA&Ms?

A

Authorizing Officials (AOs)

20
Q

Who develops, maintains, and tracks security plans for assigned IS and PIT systems?

A

Information Systems Owners (ISOs)

21
Q

PMs must ensure periodic reviews, testing and assessment of assigned IS and PIT systems are
conducted at least how often?

A

Annually

22
Q

PMs must ensure T&E of assigned IS and IT systems is planned, resourced, and documented in the
program T&E master plan in accordance with which reference?

A

DoDI 5000.02

23
Q

What reduces redundant testing, assessing and documentation, and the associated cost in time and
resources?

A

Reciprocity

24
Q

What must PMs and ISOs who are deploying systems across DoD Components post security
authorization documentation to in order to provide visibility of authorization status and documentation to
planned receiving sites?

A

Enterprise Mission Assurance Support Service (eMASS)

25
Q

Which reference contains DoD policy for Unified Capabilities(UC)?

A

DoDI 8100.04

26
Q

What is used to deploy identical copies of an IS or PIT system in specified environments?

A

Type authorization

27
Q

Which type of systems do not transmit, receive, route, or exchange information outside of the system’s
authorization?

A

Platform Information Technology (PIT)

28
Q

How many different approaches are described by NIST SP 800-37 when planning for and conducting
security authorizations?

A

3

29
Q

What must all DoD IS and PIT systems have that provides an overview of the security requirements for
the system and describes the security controls in place or planned for meeting those requirements?

A

Security Plan

30
Q

How many steps are in the RMF process?

A

6

31
Q

What is step one of the RMF process?

A

Categorize system

32
Q

What is step two of the RMF process?

A

Select Security Controls

33
Q

What is step three of the RMF process?

A

Implement Security Controls

34
Q

What is step four of the RMF process?

A

Assess Security Controls

35
Q

What is step five of the RMF process?

A

Authorize System

36
Q

What is the final step of the RMF process?

A

Monitor Security Controls

37
Q

RMF Team members are required to meet the suitability and fitness requirements established in which
reference?

A

DoD 5200.2-R

38
Q
  1. What is the authoritative source for detailed security control descriptions, implementation guidance and
    assessment procedures?
A

Knowledge Service

39
Q

Which reference identifies vulnerability severity values?

A

NIST SP 800-30

40
Q

Who determines and documents in the SAR a risk level for every NC security control in the system
baseline?

A

Security Control Assessor (SCA)

41
Q

What is used to document the SCA’s findings of compliance with assigned security controls based on
actual assessment results?

A

Security Assessment Report

42
Q

What is used to identify tasks that need to be accomplished to remediate or mitigate vulnerabilities?

A

POA&M

43
Q
  1. IATTs should be granted only when an operational environment or live data is required to complete
    specific test objectives and should expire at the completion of testing (normally for a period of less than how many days)?
A

90

44
Q

Who continuously monitors the system or information environment for security-relevant events and
configuration changes that negatively affect security posture?

A

Information Systems Security Manager (ISSM)

45
Q

What is the authoritative source for RMF guidance and the repository for DoD RMF policy?

A

Knowledge Service (KS)

46
Q

Who is responsible for the functional configuration and content management of the KS as well as

providing detailed analysis and authoring support for the enterprise portion of the KS content?

A

Risk Management Framework Technical Advisory Group (RMF TAG)