IT CertificationsAnswer Key

Rmf Ks

42 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

RMF KS

ANSWER

Risk Management Framework Knowledge Service ( RMF KS )

QUESTION 2

Threats to information and information systems include: Environmental disruptions, Human or machine errors, and Purposeful attacks. ( True or False )

ANSWER

True

QUESTION 3

It is imperative leaders at all levels of an organization understand their responsibilities for achieving adequate information security and for managing information system-related security risks. ( True or False )

ANSWER

True

QUESTION 4

The _____________ provides a disciplined and structured process to perform AF IT security as well as risk management activities and to integrate those activities into the system development life cycle.

ANSWER

Risk Management Framework ( RMF )

QUESTION 5

The RMF changes the traditional focus of Certification and Accreditation (C&A) as a static, procedural activity to a more ___________ approach.

ANSWER

dynamic

QUESTION 6

RMF process encompasses ________________ to determine and manage the residual cybersecurity risk to the AF created by the vulnerabilities and threats associated with objectives in military, intelligence, and business operations.

ANSWER

life cycle risk management

QUESTION 7

IT products, services, and platform information technology (PIT) are authorized for operation through the full RMF process. ( True or False )

ANSWER

False ( NOT authorized )

QUESTION 8

PIT

ANSWER

Platform Information Technology (PIT)

QUESTION 9

________________ are product-specific and document applicable DoD policies and security requirements, as well as best practices and configuration guidelines.

ANSWER

Security Technical Implementation Guides ( STIGs )

QUESTION 10

DoD organizations that use IT services are typically not responsible for authorizing them. ( True or False )

ANSWER

True

QUESTION 11

DoD organizations that use _______________ IT services must ensure the categorization of the IS delivering the service is appropriate to the needs of the DoD IS using the service. ( Internal or External )

ANSWER

Internal

QUESTION 12

DoD organizations that use external IT services provided by a non-DoD federal government agency must ensure the categorization of the IS delivering the service is appropriate to the confidentiality, integrity, and availability needs of the information and mission. ( True or False )

ANSWER

True

QUESTION 13

A loss of ______________ is the unauthorized disclosure of information.

ANSWER

Confidentiality

QUESTION 14

A loss of ____________ is the unauthorized modification or destruction of information.

ANSWER

Integrity

QUESTION 15

A loss of _____________ is the disruption of access to or use of information or an information system.

ANSWER

Availability

QUESTION 16

How many levels of potential impact on organizations or individuals is defined in FIPS Publication 199 ?

ANSWER

Three ( Low, Moderate, High )

QUESTION 17

CISO

ANSWER

Chief Information Security Officer

QUESTION 18

Who appoints the Chief Information Security Officer ( CISO ) ?

ANSWER

Secretary of the Air Force, Office of Information Dominance and Chief Information Officer ( SAF/CIO A6 )

QUESTION 19

Who works with the CISO to oversee the establishment of risk tolerance and security controls for IT owned by Headquarters Air Force (HAF) organizations without a functional CIO (HAF Portfolio)?

ANSWER

Administrative Assistant to the Secretary of the Air Force (SAF/AA)

QUESTION 20

Who acquires all AF electronic systems through organic programs within the AF, commercial-off-theshelf (COTS) systems, or non-developmental item (NDI) programs?

ANSWER

Secretary of the Air Force for Acquisition ( SAF/AQ )

QUESTION 21

Who maintains visibility of the cybersecurity posture of AF SCI and the DoD portion of the Intelligence Mission Area?

ANSWER

Deputy Chief of Staff, Intelligence, Surveillance, and Reconnaissance ( AF/A2 )

QUESTION 22

Who will develop, implement, maintain, and enforce the AF Cybersecurity Program and the RMF process, roles, and responsibilities?

ANSWER

Chief Information Security Officer (CISO), SAF/CIO A6Z

QUESTION 23

The ___________ is the official with the authority responsible for accepting a level of risk for a system balanced with mission requirements.

ANSWER

Authorizing Official ( AO )

QUESTION 24

The ______________ is the only authority permitted to grant an Approval to Connect (ATC) to the Air Force Information Networks (AFIN).

ANSWER

AF Enterprise AO

QUESTION 25

The _____________ may perform any and all duties of an Authorizing Official ( AO ) except for accepting risk by issuing an authorization decision. Also performs duties assigned by AO.

ANSWER

AO Designated Representative ( AODR )

QUESTION 26

All AOs have the flexibility in augmenting, executing, and implementing RMF for systems in their AOR. ( True or False )

ANSWER

True

QUESTION 27

The AF Enterprise AO is the only authority permitted to grant an _____________ to the Air Force Information Networks (AFIN).

ANSWER

Approval to Connect ( ATC )

QUESTION 28

The ______________ will periodically assess security controls employed within and inherited by the IT IAW the Information Security Continuous Monitoring strategy.

ANSWER

Security Control Assessor ( SCA )

QUESTION 29

This position may be an organic or contracted resource.

ANSWER

Security Controls Assessor Representative ( SCAR )

QUESTION 30

The ______________ is a licensed 3rd-party agent assisting in assessment activities and provides an independent report for the SCA.

ANSWER

Agent of the Security Controls Assessor ( ASCA )

QUESTION 31

The ISO is assigned the PM duties when no PM is assigned. ( True or False )

ANSWER

True

QUESTION 32

ISO

ANSWER

Information System Owners ( ISO )

QUESTION 33

PM

ANSWER

Program Manager

QUESTION 34

Who will identify, implement, and ensure full integration of cybersecurity into all phases of the acquisition, upgrade, or modification programs, including initial design, development, testing, fielding, operation, and sustainment?

ANSWER

Program Manager ( PM )

QUESTION 35

Who serves as the PM or ISO for the base enclave and performs duties IAW DoDI 5000.02 and AFI 17-130?

ANSWER

Communications Squadron Commander (CS/CC)

QUESTION 36

The ___________ is the primary cybersecurity technical advisor to the AO, PM, and ISO.

ANSWER

Information System Security Manager ( ISSM )

QUESTION 37

The ____________ is responsible for ensuring the appropriate operational security posture is maintained for assigned IT.

ANSWER

Information System Security Officer ( ISSO )

QUESTION 38

The _____________ is an individual, group, or organization responsible for conducting information system security engineering activities.

ANSWER

Information System Security Engineer ( ISSE )

QUESTION 39

An organizational official with statutory, management, or operational authority for specified information and the responsibility for establishing the policies and procedures governing its generation, classification, collection, processing, dissemination, and disposal as defined in CNSSI No. 4009.

ANSWER

Information Owner (IO)/Steward

QUESTION 40

The _______________ develops, implements, oversees, and maintains a MAJCOM cybersecurity program that adheres to cybersecurity architecture, requirements, objectives, policies, processes, and procedures.

ANSWER

MAJCOM Cybersecurity Office

QUESTION 41

The _______________ is the individual or organization that represents operational and functional requirements of the user community for a particular system during the RMF process.

ANSWER

User Representative

QUESTION 42

Name the Five Phases of the System Development Life Cycle

ANSWER

SDLC Phases 1. Initiation 2. Development/Acquisition 3. Implementation/Assessment 4. Operation/Maintenance 5. Disposal

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials