Q: 1
Which of the following DoD policies establishes policies and assigns responsibilities to achieve DoD
IA through a defense-in-depth approach that integrates the capabilities of personnel, operations, and
technology, and supports the evolution to network-centric warfare
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Which of the following types of CNSS issuances establishes or describes policy and programs,
provides authority, or assigns responsibilities
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
The phase 3 of the Risk Management Framework (RMF) process is known as mitigation planning.
Which of the following processes take place in phase 3 Each correct answer represents a complete
solution. Choose all that apply.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which of the following CNSS policies describes the national policy on controlled access protection
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which of the following terms describes the measures that protect and support information and
information systems by ensuring their availability, integrity, authentication, confidentiality, and non-
repudiation
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Which of the following agencies provides command and control capabilities and enterprise
infrastructure to continuously operate and assure a global net-centric enterprise in direct support to
joint warfighters, National level leaders, and other mission and coalition partners across the full
spectrum of operations
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
You work as a systems engineer for BlueWell Inc. You want to communicate the quantitative and
qualitative system characteristics to all stakeholders. Which of the following documents will you use
to achieve the above task
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Which of the following is an Information Assurance (IA) model that protects and defends information
and information systems by ensuring their availability, integrity, authentication, confidentiality, and
non-repudiation
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which of the following are the benefits of SE as stated by MIL-STD-499B Each correct answer
represents a complete solution. Choose all that apply.
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2