IT CertificationsAnswer Key

Rmf Step 2

18 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Risk Management Framework (RMF) is the unified information security framework for the entire federal government that is replacing the legacy DIACAP (DoD Information Assurance Certification and Accreditation Process) processes within federal government departments and agencies, the Department of Defense (DOD) and the Intelligence Community (IC).

ANSWER

What is RMF?

QUESTION 2

DIACAP is the certification and accreditation (C&A) process that was implemented in 2006 replacing DITSCAP. DIACAP has now been replaced by the RMF process.

ANSWER

What is DIACAP?

QUESTION 3

Step 1 - CATEGORIZE System Step 2 - SELECT Security Controls Step 3 - IMPLEMENT Security Controls Step 4 - ASSESS Security Controls Step 5 - AUTHORIZE Systems Step 6 - MONITOR Security Controls

ANSWER

What are the steps in the RMF process?

QUESTION 4

DoDI 8510.01

ANSWER

_________________ is the high level document dated march 2014 that sets forth policy stating that RMF is to be used by DoD.

QUESTION 5

CNSSI 1253

ANSWER

_________________ establishes guidlelines and a method for selecting security controls for information systems and the information they contain.

QUESTION 6

NIST SP 800-37

ANSWER

_________________ is the guide for applying RMF to Federal Information Systems.

QUESTION 7

NIST SP 800-53

ANSWER

_________________ provides a security controls catalog and guidance for security control selection.

QUESTION 8

confidentiality, integrity, availability

ANSWER

Security controls are safeguards and countermeasures prescribed for an information system to protect _________ , ___________ and __________ of a system and its information.

QUESTION 9

mission, business, system risks

ANSWER

Security controls are safeguards and countermeasures prescribed for an information system to properly manage _____________ , _______________ and ____________ risks.

QUESTION 10

reciprocity

ANSWER

Cybersecurity _______________ is an essential element in ensuring IT capabilities are developed and fielded rapidly and efficiently across the DoD Information Enterprise.

QUESTION 11

security roles and responsibilities

ANSWER

The continuous monitoring strategy defines all of the following EXCEPT: - Security status reporting requirements - the configuration management process - security roles and responsibilities - how the security impact analysis will be conducted

QUESTION 12

categorize the information system

ANSWER

Which of the following is not included in the tasks that are part of the second step of the RMF process? - identify common security controls - develop a monitoring strategy - categorize the information system - apply appropriate overlay(s) based on the information and mission requirements

QUESTION 13

it is developed late in the system development cycle

ANSWER

Which of the following is not true of the Monitoring Strategy? - It is ongoing - it may be included in the security plan - it is a critical aspect of risk management - it is developed late in the system development cycle

QUESTION 14

select security controls

ANSWER

The second step in the RMF process is: - Monitor security controls - assess security controls - categorize the system - select security controls

QUESTION 15

to manage roles and responsibilities

ANSWER

Security controls are safeguards and countermeasures prescribed for an information system to accomplish all of the following except: - to manage roles and responsibilities - to properly manage mission, business and system risks - to facilitate reciprocity - to protect the confidentiality, integrity, and availability of the system and its information

QUESTION 16

Define the system boundary

ANSWER

All of the following are important to selecting security controls, EXCEPT: - Tailor security controls - Develop a monitoring strategy - Define the system boundary - Identify common controls

QUESTION 17

FALSE

ANSWER

The RMF Knowledge Service is not applicable to generating a set of baseline security controls. (True or False)

QUESTION 18

TRUE

ANSWER

Security Controls have a well-defined organization and structure and are divided into eighteen families: (True or False)

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials