Rmf Ks
42 community-sourced questions and answers. Free — no login.
RMF KS
Risk Management Framework Knowledge Service ( RMF KS )
Threats to information and information systems include: Environmental disruptions, Human or machine errors, and Purposeful attacks. ( True or False )
True
It is imperative leaders at all levels of an organization understand their responsibilities for achieving adequate information security and for managing information system-related security risks. ( True or False )
True
The _____________ provides a disciplined and structured process to perform AF IT security as well as risk management activities and to integrate those activities into the system development life cycle.
Risk Management Framework ( RMF )
The RMF changes the traditional focus of Certification and Accreditation (C&A) as a static, procedural activity to a more ___________ approach.
dynamic
RMF process encompasses ________________ to determine and manage the residual cybersecurity risk to the AF created by the vulnerabilities and threats associated with objectives in military, intelligence, and business operations.
life cycle risk management
IT products, services, and platform information technology (PIT) are authorized for operation through the full RMF process. ( True or False )
False ( NOT authorized )
PIT
Platform Information Technology (PIT)
________________ are product-specific and document applicable DoD policies and security requirements, as well as best practices and configuration guidelines.
Security Technical Implementation Guides ( STIGs )
DoD organizations that use IT services are typically not responsible for authorizing them. ( True or False )
True
DoD organizations that use _______________ IT services must ensure the categorization of the IS delivering the service is appropriate to the needs of the DoD IS using the service. ( Internal or External )
Internal
DoD organizations that use external IT services provided by a non-DoD federal government agency must ensure the categorization of the IS delivering the service is appropriate to the confidentiality, integrity, and availability needs of the information and mission. ( True or False )
True
A loss of ______________ is the unauthorized disclosure of information.
Confidentiality
A loss of ____________ is the unauthorized modification or destruction of information.
Integrity
A loss of _____________ is the disruption of access to or use of information or an information system.
Availability
How many levels of potential impact on organizations or individuals is defined in FIPS Publication 199 ?
Three ( Low, Moderate, High )
CISO
Chief Information Security Officer
Who appoints the Chief Information Security Officer ( CISO ) ?
Secretary of the Air Force, Office of Information Dominance and Chief Information Officer ( SAF/CIO A6 )
Who works with the CISO to oversee the establishment of risk tolerance and security controls for IT owned by Headquarters Air Force (HAF) organizations without a functional CIO (HAF Portfolio)?
Administrative Assistant to the Secretary of the Air Force (SAF/AA)
Who acquires all AF electronic systems through organic programs within the AF, commercial-off-theshelf (COTS) systems, or non-developmental item (NDI) programs?
Secretary of the Air Force for Acquisition ( SAF/AQ )
Who maintains visibility of the cybersecurity posture of AF SCI and the DoD portion of the Intelligence Mission Area?
Deputy Chief of Staff, Intelligence, Surveillance, and Reconnaissance ( AF/A2 )
Who will develop, implement, maintain, and enforce the AF Cybersecurity Program and the RMF process, roles, and responsibilities?
Chief Information Security Officer (CISO), SAF/CIO A6Z
The ___________ is the official with the authority responsible for accepting a level of risk for a system balanced with mission requirements.
Authorizing Official ( AO )
The ______________ is the only authority permitted to grant an Approval to Connect (ATC) to the Air Force Information Networks (AFIN).
AF Enterprise AO
The _____________ may perform any and all duties of an Authorizing Official ( AO ) except for accepting risk by issuing an authorization decision. Also performs duties assigned by AO.
AO Designated Representative ( AODR )
All AOs have the flexibility in augmenting, executing, and implementing RMF for systems in their AOR. ( True or False )
True
The AF Enterprise AO is the only authority permitted to grant an _____________ to the Air Force Information Networks (AFIN).
Approval to Connect ( ATC )
The ______________ will periodically assess security controls employed within and inherited by the IT IAW the Information Security Continuous Monitoring strategy.
Security Control Assessor ( SCA )
This position may be an organic or contracted resource.
Security Controls Assessor Representative ( SCAR )
The ______________ is a licensed 3rd-party agent assisting in assessment activities and provides an independent report for the SCA.
Agent of the Security Controls Assessor ( ASCA )
The ISO is assigned the PM duties when no PM is assigned. ( True or False )
True
ISO
Information System Owners ( ISO )
PM
Program Manager
Who will identify, implement, and ensure full integration of cybersecurity into all phases of the acquisition, upgrade, or modification programs, including initial design, development, testing, fielding, operation, and sustainment?
Program Manager ( PM )
Who serves as the PM or ISO for the base enclave and performs duties IAW DoDI 5000.02 and AFI 17-130?
Communications Squadron Commander (CS/CC)
The ___________ is the primary cybersecurity technical advisor to the AO, PM, and ISO.
Information System Security Manager ( ISSM )
The ____________ is responsible for ensuring the appropriate operational security posture is maintained for assigned IT.
Information System Security Officer ( ISSO )
The _____________ is an individual, group, or organization responsible for conducting information system security engineering activities.
Information System Security Engineer ( ISSE )
An organizational official with statutory, management, or operational authority for specified information and the responsibility for establishing the policies and procedures governing its generation, classification, collection, processing, dissemination, and disposal as defined in CNSSI No. 4009.
Information Owner (IO)/Steward
The _______________ develops, implements, oversees, and maintains a MAJCOM cybersecurity program that adheres to cybersecurity architecture, requirements, objectives, policies, processes, and procedures.
MAJCOM Cybersecurity Office
The _______________ is the individual or organization that represents operational and functional requirements of the user community for a particular system during the RMF process.
User Representative
Name the Five Phases of the System Development Life Cycle
SDLC Phases 1. Initiation 2. Development/Acquisition 3. Implementation/Assessment 4. Operation/Maintenance 5. Disposal
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials