Unit 4.8, 4.9, 4.10 & 4.11 Knowledge Check Flashcards
This type of Science & Technology (S&D activity translates promising technology into solutions
for broadly defined military problems.
- Basic Research
- Advanced Technology Development
- Developmental Testing
- Applied Research
Applied Research
The _____ provides threat intelligence to defense policy makers, force planners and
warfighters to provide an understanding of foreign threat capabilities which may affect a program’s
design or implementation.
- Director of National Intelligence (DNI)
- Army Intelligence Coordinator
- Defense Intelligence Agency (DIA)
- National Security Agency (NSA)
Defense Intelligence Agency (DIA)
Modeling and Simulation is a risk management tool that we use:
- In virtually all phases of the acquisition life cycle.
- To avoid conducting developmental and operational testing.
- Primarily in early development to support the Analysis of Alternatives.
- Exclusively for mature designs that will be produced in quantity.
In virtually all phases of the acquisition life cycle.
Which of the following supportability analysis tools ensures that operational readiness is
achieved throughout a system’s lifecycle by developing maintenance concepts?
- Failure Modes and Effects Criticality Analysis (FMECA)
- Preventive Maintenance
- Level of Repair Analysis (LORA)
- Reliability Centered Maintenance (RCM)
Level of Repair Analysis (LORA)
Which of the following supportability analysis tools systematically identifies the likely modes of failure, the possible effects of each failure, and the criticality of each effect on mission completion, environmental impacts, health hazards, and system safety?
- Level of Repair Analysis (LORA)
- Failure Modes, Effects and Criticality Analysis (FMECA)
- Test Analyze, Fix and Test (TAFTI
- Reliability Centered Maintenance (RCM)
Failure Modes, Effects and Criticality Analysis (FMECA)
As part of the Program Protection Plan (PPP), cyber security is a critical priority for DoD.
Effective cyber security in DoD acquisition programs encompasses all of the necessary actions taken to ensure the _____ of a system’s information to enable warfighting operations.
- technological superiority
- reliability, availability, and maintenance (RAM)
- suitability and effectiveness
- confidentiality, integrity, and availability (CIA)
confidentiality, integrity, and availability (CIA)
Using _____ as part of the life cycle logistics and systems engineering processes to influence the design, also helps to determine the most cost effective way to support the system throughout its life.
- Full-Up Systems-Level (FUSL) test
- Product Support Analysis (PSA)
- An In-Service Review (ISR)
- Reliability Centered Maintenance (RCM)
Product Support Analysis (PSA)
Which of the following is NOT one of the methods used to achieve a producible design?
- Use a modular approach
- Introduce variability in the manufacturing process
- Minimize total number of parts
- Use standard components
Introduce variability in the manufacturing process
A strategy that adopts interface standards that are defined by and widely used throughout industry to facilitate the update of components with new technology is _____.
- open systems
- software-embedded systems
- automated information systems
- non-developmental items
open systems
Select a primary weapon system function tested during Live Fire Test and Evaluation.
- Accuracy
- Reliability
- Maintainability
- Survivability
Survivability
______ consist(s) of a set of process elements, or “tools,” used to provide balance and manage the execution of the system engineering process.
- Requirements Development
- Technical Planning
- Technical Management Processes
- Configuration Management
Technical Management Processes
Joint Capability Technology Demonstrations (JCTDs) are a special case of Advanced Technology
Demonstrations (ATDs), and demonstrate the potential to eventually be fielded and used by
operational forces. Additionally, JCTDs are:
- A means of demonstrating the use of immature technology to address critical military needs
- Used for both maturing technology & refining operational concepts in the field
- A critical role player in the development of the program’s System Engineering Plan (SEP)
- Used exclusively when development and production activities are required
Used for both maturing technology & refining operational concepts in the field
Cyber Security planning activities, including writing the Cyber Security Strategy annex to the
Program Protection Plan, should begin _____.
- after the Capability Development Document (COD) validation
- during the Material Solution Analysis (MSA) Phase prior to Milestone A
- with the implementation of performance based support
- in full rate production
during the Material Solution Analysis (MSA) Phase prior to Milestone A
The primary source of threat intelligence to support the defense acquisition process is the _____.
- Capstone Threat Assessment
- Close in Training Area
- Corps Theater Assessment
- Center for Tactical Analysis
Capstone Threat Assessment
The _____ describes the threat to be countered and the projected threat environment.
- Validated On-line Training
- Validated On-line Life-Cycle Threat
- Verified On-line Logistics Table
- Verified On-line Life-Cycle Threat
Validated On-line Life-Cycle Threat