Management > QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 252 Module 8 Exam (All)

Defense Acquisition University PMT 252 252 Module 8 Exam

Document Content and Description Below

Contains 16 Questions (Attempt=1/3) Module 8 Exam 1) Which of the following Test and Evaluation (T&E) phases occurs the latest? Adversarial Assessment Cooperative Vulnerability Identification Coo... perative Vulnerability and Penetration Assessment Adversarial Cybersecurity Developmental Test and Evaluation (DT&E) 2) Which of the five pillars of cybersecurity is described as guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity? Non-repudiation Authentication Confidentiality Integrity 3) Which of the following is an invalid guideline for securing telework computers and laptops, per the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-114? Ensuring that updates are regularly applied to the operating system and primary applications, such as Web browsers, email clients, instant messaging clients, and security software Restricting who can use the personal computer (PC) by having a separate standard user account for each person, assigning a password to each user account, using the standard user accounts for daily use, and protecting user sessions from unauthorized physical access Disabling networking capabilities, such as Bluetooth Using a combination of security software such as antivirus and antispyware software, 1 10162720 1 10162693 1 10162699 1 personal firewalls, spam and Web content filtering, and popup blocking to stop most attacks, particularly malware 4) Which answer best reflects Department of Defense Instruction 5200.39's explanation of the role of the Program Protection Plan (PPP)? The PPP is a risk-based, comprehensive, living plan to protect Critical Program Information (CPI) that is associated with a Research, Development, and Acquisition (RD&A) Program. The PPP is used in conjunction with the Risk Register to manage program risks. The PPP is an analytical list of program threats and vulnerabilities. The PPP is used in conjunction with CPI to manage program risks. 5) Which one of the following is a correct statement? Cybersecurity and IA are equally involved in prevention. Cybersecurity is more involved in prevention than information assurance (IA). IA is more involved in prevention than cybersecurity. Cybersecurity and IA are synonymous. 6) Which two of the seven steps in the process to establish a Program Protection Plan (PPP) should occur sequentially, but for efficiency may be sequenced to occur concurrently? Step 3: Identify threats to Critical Program Information (CPI) and critical information and communications technology (ICT) components (CC), and Step 4: Identify CPI and CC vulnerabilities Step 4: Identify CPI and CC vulnerabilities, and Step 5: Identify risks to CPI and CC Step 2: Identify CPI and critical ICT CC, and Step 3: Identify threats to CPI and CC Step 5: Identify risks to CPI and CC, and Step 6: Build and coordinate PPP 7) Which of the following is a valid safeguard for protecting technology that supports a program? 10162681 1 10162695 1 10162683 1 10162700 1 Firewalls Cloud Computing Network Intrusion Phishing 8) Which of the following inclusions to the Cybersecurity Approach section of the Cybersecurity Strategy (CS) is false? Technical Approach Cybersecurity Implementation Management Approach Proposed Solutions and Mitigations 9) What is the primary method by which mission critical functions and components are identified and prioritized? Vulnerability Analysis (VA) Critical Program Information (CPI) Criticality Analysis (CA) Threat Analysis (TA) 10) The system categorization as defined in the Risk Management Framework (RMF) is one driver of cybersecurity requirements and requires which participants to determine the potential impact to the mission due to loss or degradation of Confidentiality, Integrity, and Availability (C-I-A)? Mission Owners and Information Owners Information Owners Program Management Office (PMO), Mission Owners, and Information Owners 10162710 1 10162689 1 10162716 1 Mission Owners 11) Which of the following is an inaccurate description of a program manager (PM)'s cybersecurity responsibilities, per the Department of Defense Instruction (DoDI) 8510.01? Ensure each program acquiring an IS or PIT system has an assigned IS security engineer and that they are fully integrated into the systems engineering process. Implement the Risk Management Framework (RMF) for assigned IS and PIT systems. Appoint an Information System Security Manager (ISSM) for each assigned IS or PIT system with the support, authority, and resources to satisfy the responsibilities established in this instruction. Authorize hosted or interconnected Information System (IS) and Platform Information Technology (PIT) systems. 12) Based on your understanding of the relationship between prevention countermeasures and detection-and-response countermeasures, which measures would you evaluate if your goal was to make an attack look more risky to a potential attacker? Measures to detect and respond to a risk Measures to prevent or deter a risk Measures to respond to and detect a risk Measures to deter or prevent a risk 13) Reduction of supply-chain security risk requires controlling ways in which security risks can be introduced into the product or service. Which of the following Acquisition Life Cycle components need to be monitored as such? End Capability, Technology Security, Management Logistics, Operational System Control Stakeholder Capability, Engineering Security, Logistics, and Organizational Product Control Supplier Capability, Product Security, Product Logistics, Operational Product Control User Capability, Development Security, Transportation Logistics, Organizational Product 10162707 1 10175137 1 10162712 1 Control 14) Which role of cybersecurity ensure the Confidentiality, Integrity, and Availability (CI-A) of system information? Ensure Program Protection Software Assurance Enable Warfighting Operations Integrate into Acquisition 15) Which of the following process steps for doing horizontal protection during Program Protection Plan (PPP) creation, update, or review occurs the earliest? Use the search capabilities in the Acquisition Security Database (ASDB) to identify other programs with potentially similar Critical Program Information (CPI); consider threat and vulnerability differences between programs. Compare planned countermeasure protection against the similar CPI and consider threat and vulnerability differences between programs. If there are perceived discrepancies or concerns, adjudicate the differences at the lowest organizational level. Create a record and fill out appropriate fields. 16) Which of the following statements concerning documentation during the Risk Management Framework (RMF) process is false? The Security Plan is critical to the RMF process. The Security Assessment Report (SAR) is critical to the RMF process. The Plan of Actions and Milestones (POA&M) is critical to the RMF process. The Security Authorization Design and Development Document (SADD) is critical to the 10162703 1 10175149 1 10162726 1 RMF process. Contains 2 Questions (Attempt=2/3) Module 8 Exam 1) Which of the following is the most accurate list of the Test and Evaluation (T&E) roles the program manager (PM) is responsible for identifying? The program test team, the Chief Developmental Tester, and the lead T&E organizations The program test team and the Chief Developmental Tester The program test team and the lead T&E organizations The Chief Development Tester 2) Which one of the following is a correct statement? IA is involved in all phases of the acquisition and IT life cycles. Cybersecurity is involved in all phases of the Acquisition Life Cycle but not the information technology (IT) life cycle. Cybersecurity is involved in all phases of the acquisition and Information Technology (IT) life cycle. 1 10162718 1 10162696 1 Cybersecurity is involved in all phases of the IT life cycle but not the Acquisition Life Cycle. [Show More]

Last updated: 1 year ago

Preview 1 out of 7 pages

Reviews( 0 )

Recommended For You

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252  PMT 252 Mod 1 test. (All)

preview
Defense Acquisition University PMT 252  PMT 252 Mod 1 test.

PMT 252 Mod 1 1. Your team is developing a list of new ideas to improve processes, so they brainstorm those ideas to develop a list of potential causes, collect data, and conduct analysis to determi...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > WGU C484 Organizational Behavior and Leadership Pre-Assessment | Questions with 100% Correct Answers | Verified | Latest Update (All)

preview
WGU C484 Organizational Behavior and Leadership Pre-Assessment | Questions with 100% Correct Answers | Verified | Latest Update

Employees A and B work together on the same project team. When the team faces a complex problem, the team leader usually asks B to generate alternative solutions for the team to consider. Experience...

By Tamia Cooper , Uploaded: Mar 12, 2023

$10

 Management> QUESTIONS & ANSWERS > Scaled Agile Framework (SAFe) 5.0 Quiz Answers, Updated June 2022 Guaranteed A+ (All)

preview
Scaled Agile Framework (SAFe) 5.0 Quiz Answers, Updated June 2022 Guaranteed A+

Scaled Agile Framework (SAFe) 5.0 Quiz Answers, Updated June 2022 Guaranteed A+

By Academia1434 , Uploaded: Sep 06, 2022

$13.5

 Management> QUESTIONS & ANSWERS > MGMT 681 Strategic Management; SAFe 5 Program Consultant Real Test Upgrade 5.0 (100% Correct Answers) 2022 (All)

preview
MGMT 681 Strategic Management; SAFe 5 Program Consultant Real Test Upgrade 5.0 (100% Correct Answers) 2022

MGMT 681 Strategic Management; SAFe 5 Program Consultant Real Test Upgrade 5.0 (100% Correct Answers) 2022

By Academia1434 , Uploaded: Sep 07, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University  PMT 252 Mod 2 test (All)

preview
Defense Acquisition University  PMT 252 Mod 2 test

PMT 252 Mod 2 1. A new screen in special military portable screen readers may be needed based on a potential threat. The screens require a rare material that can only be sourced from one country tha...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > NC Property and Casualty State Exam Questions and Answers 100% Pass (All)

preview
NC Property and Casualty State Exam Questions and Answers 100% Pass

Insurance ✔✔- a plan of spreading the risk of possible loss over a large number of people (Law of Large Numbers) - protects against the risk (uncertainty) of when a financial loss might occur Specu...

By remmington , Uploaded: Aug 12, 2023

$8

 Management> QUESTIONS & ANSWERS > WGU C483 Principles of Management Questions and Answers with Complete Solutions (All)

preview
WGU C483 Principles of Management Questions and Answers with Complete Solutions

Accommodation ✔✔A style of dealing with conflict involving cooperation on behalf of the other party but not being assertive about one's own interests Accounting audits ✔✔Procedures used to verify ac...

By keisha , Uploaded: Oct 12, 2022

$10

 Management> QUESTIONS & ANSWERS > MT140 Unit 2 Quiz test questions and answers docs 2020 (All)

preview
MT140 Unit 2 Quiz test questions and answers docs 2020

MT140 Unit 2 Quiz test questions and answers docs 2020 1. McGregor advocated a _____, suggesting that managers who encourage participation and allow opportunities for individual challenge and initia...

By YongSam , Uploaded: Nov 26, 2020

$9

 Management> QUESTIONS & ANSWERS > Servsafe Food Handler Examination Questions and Answers with Complete Solution (All)

preview
Servsafe Food Handler Examination Questions and Answers with Complete Solution

Servsafe Food Handler Examination Questions and Answers with Complete Solution 1. It is important to cover food when storing it in order to ✔✔ c. prevent cross contamination 2. A food handler ha...

By Crescent , Uploaded: Dec 19, 2022

$7.5

 Management> QUESTIONS & ANSWERS > Test Prep - WGU - Principles of Management - C483 Questions and Answers Latest Update (All)

preview
Test Prep - WGU - Principles of Management - C483 Questions and Answers Latest Update

Test Prep - WGU - Principles of Management - C483 Questions and Answers Latest Update A publicly-held company has a policy limiting financial donations to one religious group. Correct Answer- In w...

By bundleHub Solution guider , Uploaded: Sep 10, 2022

$7

$9.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
45
0

Document information


Connected school, study & course



About the document


Uploaded On

Sep 28, 2022

Number of pages

7

Written in

Seller


seller-icon
QuizMaster

Member since 4 years

1044 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 28, 2022

Downloads

 0

Views

 45

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter
Useful links
  • Courses
  • Categories
  • We accept

    payment cards


    Copyright © Browsegrades · High quality services·