Management > QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 252 Module 8 Exam (All)

Defense Acquisition University PMT 252 252 Module 8 Exam

Document Content and Description Below

Contains 16 Questions (Attempt=1/3) Module 8 Exam 1) Which of the following Test and Evaluation (T&E) phases occurs the latest? Adversarial Assessment Cooperative Vulnerability Identification Coo... perative Vulnerability and Penetration Assessment Adversarial Cybersecurity Developmental Test and Evaluation (DT&E) 2) Which of the five pillars of cybersecurity is described as guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity? Non-repudiation Authentication Confidentiality Integrity 3) Which of the following is an invalid guideline for securing telework computers and laptops, per the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-114? Ensuring that updates are regularly applied to the operating system and primary applications, such as Web browsers, email clients, instant messaging clients, and security software Restricting who can use the personal computer (PC) by having a separate standard user account for each person, assigning a password to each user account, using the standard user accounts for daily use, and protecting user sessions from unauthorized physical access Disabling networking capabilities, such as Bluetooth Using a combination of security software such as antivirus and antispyware software, 1 10162720 1 10162693 1 10162699 1 personal firewalls, spam and Web content filtering, and popup blocking to stop most attacks, particularly malware 4) Which answer best reflects Department of Defense Instruction 5200.39's explanation of the role of the Program Protection Plan (PPP)? The PPP is a risk-based, comprehensive, living plan to protect Critical Program Information (CPI) that is associated with a Research, Development, and Acquisition (RD&A) Program. The PPP is used in conjunction with the Risk Register to manage program risks. The PPP is an analytical list of program threats and vulnerabilities. The PPP is used in conjunction with CPI to manage program risks. 5) Which one of the following is a correct statement? Cybersecurity and IA are equally involved in prevention. Cybersecurity is more involved in prevention than information assurance (IA). IA is more involved in prevention than cybersecurity. Cybersecurity and IA are synonymous. 6) Which two of the seven steps in the process to establish a Program Protection Plan (PPP) should occur sequentially, but for efficiency may be sequenced to occur concurrently? Step 3: Identify threats to Critical Program Information (CPI) and critical information and communications technology (ICT) components (CC), and Step 4: Identify CPI and CC vulnerabilities Step 4: Identify CPI and CC vulnerabilities, and Step 5: Identify risks to CPI and CC Step 2: Identify CPI and critical ICT CC, and Step 3: Identify threats to CPI and CC Step 5: Identify risks to CPI and CC, and Step 6: Build and coordinate PPP 7) Which of the following is a valid safeguard for protecting technology that supports a program? 10162681 1 10162695 1 10162683 1 10162700 1 Firewalls Cloud Computing Network Intrusion Phishing 8) Which of the following inclusions to the Cybersecurity Approach section of the Cybersecurity Strategy (CS) is false? Technical Approach Cybersecurity Implementation Management Approach Proposed Solutions and Mitigations 9) What is the primary method by which mission critical functions and components are identified and prioritized? Vulnerability Analysis (VA) Critical Program Information (CPI) Criticality Analysis (CA) Threat Analysis (TA) 10) The system categorization as defined in the Risk Management Framework (RMF) is one driver of cybersecurity requirements and requires which participants to determine the potential impact to the mission due to loss or degradation of Confidentiality, Integrity, and Availability (C-I-A)? Mission Owners and Information Owners Information Owners Program Management Office (PMO), Mission Owners, and Information Owners 10162710 1 10162689 1 10162716 1 Mission Owners 11) Which of the following is an inaccurate description of a program manager (PM)'s cybersecurity responsibilities, per the Department of Defense Instruction (DoDI) 8510.01? Ensure each program acquiring an IS or PIT system has an assigned IS security engineer and that they are fully integrated into the systems engineering process. Implement the Risk Management Framework (RMF) for assigned IS and PIT systems. Appoint an Information System Security Manager (ISSM) for each assigned IS or PIT system with the support, authority, and resources to satisfy the responsibilities established in this instruction. Authorize hosted or interconnected Information System (IS) and Platform Information Technology (PIT) systems. 12) Based on your understanding of the relationship between prevention countermeasures and detection-and-response countermeasures, which measures would you evaluate if your goal was to make an attack look more risky to a potential attacker? Measures to detect and respond to a risk Measures to prevent or deter a risk Measures to respond to and detect a risk Measures to deter or prevent a risk 13) Reduction of supply-chain security risk requires controlling ways in which security risks can be introduced into the product or service. Which of the following Acquisition Life Cycle components need to be monitored as such? End Capability, Technology Security, Management Logistics, Operational System Control Stakeholder Capability, Engineering Security, Logistics, and Organizational Product Control Supplier Capability, Product Security, Product Logistics, Operational Product Control User Capability, Development Security, Transportation Logistics, Organizational Product 10162707 1 10175137 1 10162712 1 Control 14) Which role of cybersecurity ensure the Confidentiality, Integrity, and Availability (CI-A) of system information? Ensure Program Protection Software Assurance Enable Warfighting Operations Integrate into Acquisition 15) Which of the following process steps for doing horizontal protection during Program Protection Plan (PPP) creation, update, or review occurs the earliest? Use the search capabilities in the Acquisition Security Database (ASDB) to identify other programs with potentially similar Critical Program Information (CPI); consider threat and vulnerability differences between programs. Compare planned countermeasure protection against the similar CPI and consider threat and vulnerability differences between programs. If there are perceived discrepancies or concerns, adjudicate the differences at the lowest organizational level. Create a record and fill out appropriate fields. 16) Which of the following statements concerning documentation during the Risk Management Framework (RMF) process is false? The Security Plan is critical to the RMF process. The Security Assessment Report (SAR) is critical to the RMF process. The Plan of Actions and Milestones (POA&M) is critical to the RMF process. The Security Authorization Design and Development Document (SADD) is critical to the 10162703 1 10175149 1 10162726 1 RMF process. Contains 2 Questions (Attempt=2/3) Module 8 Exam 1) Which of the following is the most accurate list of the Test and Evaluation (T&E) roles the program manager (PM) is responsible for identifying? The program test team, the Chief Developmental Tester, and the lead T&E organizations The program test team and the Chief Developmental Tester The program test team and the lead T&E organizations The Chief Development Tester 2) Which one of the following is a correct statement? IA is involved in all phases of the acquisition and IT life cycles. Cybersecurity is involved in all phases of the Acquisition Life Cycle but not the information technology (IT) life cycle. Cybersecurity is involved in all phases of the acquisition and Information Technology (IT) life cycle. 1 10162718 1 10162696 1 Cybersecurity is involved in all phases of the IT life cycle but not the Acquisition Life Cycle. [Show More]

Last updated: 1 year ago

Preview 1 out of 7 pages

Reviews( 0 )

Recommended For You

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252  Lesson 1 test Module 1 Exam (All)

preview
Defense Acquisition University PMT 252  Lesson 1 test Module 1 Exam

Contains 16 Questions (Attempt=1/3) Module 1 Exam 1) The systems engineering team is designing a new weapons system and is developing a plan of action. Each member developed plans and solutions for...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 252 Lesson 2 test . Module 2 Exam (All)

preview
Defense Acquisition University PMT 252 252 Lesson 2 test . Module 2 Exam

Contains 27 Questions (Attempt=1/3) Module 2 Exam 1) Which phase of the acquisition lifecycle would use proactive risk management activities to address risk associated with new requirements, follow...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 252  Module 2 Exam Results (All)

preview
Defense Acquisition University PMT 252 252  Module 2 Exam Results

Module 2 Exam • Here is your test result.The dots represent the choices you have made. • The highlighted questions are the questions you have missed. • Remediation Accessed shows whether you access...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 252 Module 3 test. (All)

preview
Defense Acquisition University PMT 252 252 Module 3 test.

Contains 7 Questions (Attempt=1/3) Module 3 Exam 1) When developing a Work Breakdown Structure (WBS), which common element would best categorize equipment acquisition or modernization? 3.2 pg. 25 o...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 252 Module 4 test 2nd attempt (All)

preview
Defense Acquisition University PMT 252 252 Module 4 test 2nd attempt

Contains 4 Questions (Attempt=2/3) Module 4 Exam 1) Consider the differences between the Program Evaluation and Review Technique (PERT) and Arrow Diagram Method (ADM) network schedules. Which of th...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 252 Module 8 Exam (All)

preview
Defense Acquisition University PMT 252 252 Module 8 Exam

Contains 16 Questions (Attempt=1/3) Module 8 Exam 1) Which of the following Test and Evaluation (T&E) phases occurs the latest? Adversarial Assessment Cooperative Vulnerability Identification Coo...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252  PMT 252 Mod 1 test. (All)

preview
Defense Acquisition University PMT 252  PMT 252 Mod 1 test.

PMT 252 Mod 1 1. Your team is developing a list of new ideas to improve processes, so they brainstorm those ideas to develop a list of potential causes, collect data, and conduct analysis to determi...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 PMT 252 Mod 4 test (All)

preview
Defense Acquisition University PMT 252 PMT 252 Mod 4 test

PMT 252 Mod 4 1. Which of the following is a viable solution to a schedule resource constraint? a. Conducting some task concurrently b. Substituting resources 2. Consider the differences between a...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Defense Acquisition University PMT 252 PMT 252 Mod 7 Test (All)

preview
Defense Acquisition University PMT 252 PMT 252 Mod 7 Test

PMT 252 Mod 7 1. Program Managers (PMs) continue to play a major role in post-production events to ensure Full Rate Production (FRP) and system support issues are addressed. In this phase (and the...

By QuizMaster , Uploaded: Sep 28, 2022

$9

 Management> QUESTIONS & ANSWERS > Global Logistics and Supply Chain Management, 4th Edition by Mangan 4th edition Quiz - Answers (All)

preview
Global Logistics and Supply Chain Management, 4th Edition by Mangan 4th edition Quiz - Answers

Test Bank for Global Logistics and Supply Chain Management, 4th Edition, 4e by Mangan, Lalwani, Calatayud TEST BANK ISBN-13: 9781119702993 Full chapters included (This book has combined Test Bank-Ch...

By Test-Bank Lounge , Uploaded: Sep 29, 2022

$10

$9.00

Add to cart

Instant download

Can't find what you want? Try our AI powered Search

OR

GET ASSIGNMENT HELP
55
0

Document information


Connected school, study & course



About the document


Uploaded On

Sep 28, 2022

Number of pages

7

Written in

Seller


seller-icon
QuizMaster

Member since 4 years

1060 Documents Sold


Additional information

This document has been written for:

Uploaded

Sep 28, 2022

Downloads

 0

Views

 55

Document Keyword Tags

THE BEST STUDY GUIDES

Avoid resits and achieve higher grades with the best study guides, textbook notes, and class notes written by your fellow students

custom preview

Avoid examination resits

Your fellow students know the appropriate material to use to deliver high quality content. With this great service and assistance from fellow students, you can become well prepared and avoid having to resits exams.

custom preview

Get the best grades

Your fellow student knows the best materials to research on and use. This guarantee you the best grades in your examination. Your fellow students use high quality materials, textbooks and notes to ensure high quality

custom preview

Earn from your notes

Get paid by selling your notes and study materials to other students. Earn alot of cash and help other students in study by providing them with appropriate and high quality study materials.

WHAT STUDENTS SAY ABOUT US


What is Browsegrades

In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Browsegrades · High quality services·