Contains 16 Questions (Attempt=1/3) Module 8 Exam 1) Which of the following Test and Evaluation (T&E) phases occurs the latest? Adversarial Assessment Cooperative Vulnerability Identification Coo... perative Vulnerability and Penetration Assessment Adversarial Cybersecurity Developmental Test and Evaluation (DT&E) 2) Which of the five pillars of cybersecurity is described as guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity? Non-repudiation Authentication Confidentiality Integrity 3) Which of the following is an invalid guideline for securing telework computers and laptops, per the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-114? Ensuring that updates are regularly applied to the operating system and primary applications, such as Web browsers, email clients, instant messaging clients, and security software Restricting who can use the personal computer (PC) by having a separate standard user account for each person, assigning a password to each user account, using the standard user accounts for daily use, and protecting user sessions from unauthorized physical access Disabling networking capabilities, such as Bluetooth Using a combination of security software such as antivirus and antispyware software, 1 10162720 1 10162693 1 10162699 1 personal firewalls, spam and Web content filtering, and popup blocking to stop most attacks, particularly malware 4) Which answer best reflects Department of Defense Instruction 5200.39's explanation of the role of the Program Protection Plan (PPP)? The PPP is a risk-based, comprehensive, living plan to protect Critical Program Information (CPI) that is associated with a Research, Development, and Acquisition (RD&A) Program. The PPP is used in conjunction with the Risk Register to manage program risks. The PPP is an analytical list of program threats and vulnerabilities. The PPP is used in conjunction with CPI to manage program risks. 5) Which one of the following is a correct statement? Cybersecurity and IA are equally involved in prevention. Cybersecurity is more involved in prevention than information assurance (IA). IA is more involved in prevention than cybersecurity. Cybersecurity and IA are synonymous. 6) Which two of the seven steps in the process to establish a Program Protection Plan (PPP) should occur sequentially, but for efficiency may be sequenced to occur concurrently? Step 3: Identify threats to Critical Program Information (CPI) and critical information and communications technology (ICT) components (CC), and Step 4: Identify CPI and CC vulnerabilities Step 4: Identify CPI and CC vulnerabilities, and Step 5: Identify risks to CPI and CC Step 2: Identify CPI and critical ICT CC, and Step 3: Identify threats to CPI and CC Step 5: Identify risks to CPI and CC, and Step 6: Build and coordinate PPP 7) Which of the following is a valid safeguard for protecting technology that supports a program? 10162681 1 10162695 1 10162683 1 10162700 1 Firewalls Cloud Computing Network Intrusion Phishing 8) Which of the following inclusions to the Cybersecurity Approach section of the Cybersecurity Strategy (CS) is false? Technical Approach Cybersecurity Implementation Management Approach Proposed Solutions and Mitigations 9) What is the primary method by which mission critical functions and components are identified and prioritized? Vulnerability Analysis (VA) Critical Program Information (CPI) Criticality Analysis (CA) Threat Analysis (TA) 10) The system categorization as defined in the Risk Management Framework (RMF) is one driver of cybersecurity requirements and requires which participants to determine the potential impact to the mission due to loss or degradation of Confidentiality, Integrity, and Availability (C-I-A)? Mission Owners and Information Owners Information Owners Program Management Office (PMO), Mission Owners, and Information Owners 10162710 1 10162689 1 10162716 1 Mission Owners 11) Which of the following is an inaccurate description of a program manager (PM)'s cybersecurity responsibilities, per the Department of Defense Instruction (DoDI) 8510.01? Ensure each program acquiring an IS or PIT system has an assigned IS security engineer and that they are fully integrated into the systems engineering process. Implement the Risk Management Framework (RMF) for assigned IS and PIT systems. Appoint an Information System Security Manager (ISSM) for each assigned IS or PIT system with the support, authority, and resources to satisfy the responsibilities established in this instruction. Authorize hosted or interconnected Information System (IS) and Platform Information Technology (PIT) systems. 12) Based on your understanding of the relationship between prevention countermeasures and detection-and-response countermeasures, which measures would you evaluate if your goal was to make an attack look more risky to a potential attacker? Measures to detect and respond to a risk Measures to prevent or deter a risk Measures to respond to and detect a risk Measures to deter or prevent a risk 13) Reduction of supply-chain security risk requires controlling ways in which security risks can be introduced into the product or service. Which of the following Acquisition Life Cycle components need to be monitored as such? End Capability, Technology Security, Management Logistics, Operational System Control Stakeholder Capability, Engineering Security, Logistics, and Organizational Product Control Supplier Capability, Product Security, Product Logistics, Operational Product Control User Capability, Development Security, Transportation Logistics, Organizational Product 10162707 1 10175137 1 10162712 1 Control 14) Which role of cybersecurity ensure the Confidentiality, Integrity, and Availability (CI-A) of system information? Ensure Program Protection Software Assurance Enable Warfighting Operations Integrate into Acquisition 15) Which of the following process steps for doing horizontal protection during Program Protection Plan (PPP) creation, update, or review occurs the earliest? Use the search capabilities in the Acquisition Security Database (ASDB) to identify other programs with potentially similar Critical Program Information (CPI); consider threat and vulnerability differences between programs. Compare planned countermeasure protection against the similar CPI and consider threat and vulnerability differences between programs. If there are perceived discrepancies or concerns, adjudicate the differences at the lowest organizational level. Create a record and fill out appropriate fields. 16) Which of the following statements concerning documentation during the Risk Management Framework (RMF) process is false? The Security Plan is critical to the RMF process. The Security Assessment Report (SAR) is critical to the RMF process. The Plan of Actions and Milestones (POA&M) is critical to the RMF process. The Security Authorization Design and Development Document (SADD) is critical to the 10162703 1 10175149 1 10162726 1 RMF process. Contains 2 Questions (Attempt=2/3) Module 8 Exam 1) Which of the following is the most accurate list of the Test and Evaluation (T&E) roles the program manager (PM) is responsible for identifying? The program test team, the Chief Developmental Tester, and the lead T&E organizations The program test team and the Chief Developmental Tester The program test team and the lead T&E organizations The Chief Development Tester 2) Which one of the following is a correct statement? IA is involved in all phases of the acquisition and IT life cycles. Cybersecurity is involved in all phases of the Acquisition Life Cycle but not the information technology (IT) life cycle. Cybersecurity is involved in all phases of the acquisition and Information Technology (IT) life cycle. 1 10162718 1 10162696 1 Cybersecurity is involved in all phases of the IT life cycle but not the Acquisition Life Cycle. [Show More]
Last updated: 1 year ago
Preview 1 out of 7 pages
Defense Acquisition University PMT 252 Lesson 1 test Module 1 Exam Defense Acquisition University PMT 252 252 Lesson 2 test . Module 2 Exam Defense Acquisition University PMT 252 252 Module 2...
By QuizMaster 1 year ago
Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 PMT 252 Mod 1 test. (All)
PMT 252 Mod 1 1. Your team is developing a list of new ideas to improve processes, so they brainstorm those ideas to develop a list of potential causes, collect data, and conduct analysis to determi...
By QuizMaster , Uploaded: Sep 28, 2022
Management> QUESTIONS & ANSWERS > WGU C484 Organizational Behavior and Leadership Pre-Assessment | Questions with 100% Correct Answers | Verified | Latest Update (All)
Employees A and B work together on the same project team. When the team faces a complex problem, the team leader usually asks B to generate alternative solutions for the team to consider. Experience...
By Tamia Cooper , Uploaded: Mar 12, 2023
Management> QUESTIONS & ANSWERS > Scaled Agile Framework (SAFe) 5.0 Quiz Answers, Updated June 2022 Guaranteed A+ (All)
Scaled Agile Framework (SAFe) 5.0 Quiz Answers, Updated June 2022 Guaranteed A+
By Academia1434 , Uploaded: Sep 06, 2022
Management> QUESTIONS & ANSWERS > MGMT 681 Strategic Management; SAFe 5 Program Consultant Real Test Upgrade 5.0 (100% Correct Answers) 2022 (All)
MGMT 681 Strategic Management; SAFe 5 Program Consultant Real Test Upgrade 5.0 (100% Correct Answers) 2022
By Academia1434 , Uploaded: Sep 07, 2022
Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 Mod 2 test (All)
PMT 252 Mod 2 1. A new screen in special military portable screen readers may be needed based on a potential threat. The screens require a rare material that can only be sourced from one country tha...
By QuizMaster , Uploaded: Sep 28, 2022
Management> QUESTIONS & ANSWERS > NC Property and Casualty State Exam Questions and Answers 100% Pass (All)
Insurance ✔✔- a plan of spreading the risk of possible loss over a large number of people (Law of Large Numbers) - protects against the risk (uncertainty) of when a financial loss might occur Specu...
By remmington , Uploaded: Aug 12, 2023
Management> QUESTIONS & ANSWERS > WGU C483 Principles of Management Questions and Answers with Complete Solutions (All)
Accommodation ✔✔A style of dealing with conflict involving cooperation on behalf of the other party but not being assertive about one's own interests Accounting audits ✔✔Procedures used to verify ac...
By keisha , Uploaded: Oct 12, 2022
Management> QUESTIONS & ANSWERS > MT140 Unit 2 Quiz test questions and answers docs 2020 (All)
MT140 Unit 2 Quiz test questions and answers docs 2020 1. McGregor advocated a _____, suggesting that managers who encourage participation and allow opportunities for individual challenge and initia...
By YongSam , Uploaded: Nov 26, 2020
Management> QUESTIONS & ANSWERS > Servsafe Food Handler Examination Questions and Answers with Complete Solution (All)
Servsafe Food Handler Examination Questions and Answers with Complete Solution 1. It is important to cover food when storing it in order to ✔✔ c. prevent cross contamination 2. A food handler ha...
By Crescent , Uploaded: Dec 19, 2022
Management> QUESTIONS & ANSWERS > Test Prep - WGU - Principles of Management - C483 Questions and Answers Latest Update (All)
Test Prep - WGU - Principles of Management - C483 Questions and Answers Latest Update A publicly-held company has a policy limiting financial donations to one religious group. Correct Answer- In w...
By bundleHub Solution guider , Uploaded: Sep 10, 2022
Connected school, study & course
About the document
Sep 28, 2022
Number of pages
This document has been written for:
Sep 28, 2022
Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students
Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.
Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality
Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.
Florida State University
Great way to get paid for all of the hard work!.
It is an excellent site to post assignment.
Florida State University
Awesome and a great way to make money!.
Thank you so much for this nice platform.
University Of South Florida
Great! It is a good place to share knowledge.
University of Windsor
G D Goenka University
It is helpful Platform for offering the notes
Louisiana State University
I love this site, they make everything so easy
Florida State University
Great tool for learning! I wish you success.
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
Copyright © Browsegrades · High quality services·