IT CertificationsAnswer Key

Sctm Rmf

55 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

What is the definition of JSIG?

ANSWER

Joint SAP implementation Guide

QUESTION 2

What is the NIST Special Publications 800-53?

ANSWER

Supplemental guidance to JSIG

QUESTION 3

What is the NIST Special Publications 800-53-A?

ANSWER

Guide for assessing security controls

QUESTION 4

What is CNSSI 1253?

ANSWER

Security Categorization and Control Selection for National Security Systems

QUESTION 5

What is the definition of RMF?

ANSWER

Risk Management Framework

QUESTION 6

JSIG term for Certification and Accreditation?

ANSWER

RMF Assessment and Authorization

QUESTION 7

JSIG term for Accreditation?

ANSWER

Authorization

QUESTION 8

JSIG term for Requirements?

ANSWER

Controls

QUESTION 9

What are the three JSIG levels of Accessibility (Protection Levels)?

ANSWER

Baseline Baseline +Accessibility Overlay Baseline + CDS Overlay

QUESTION 10

What is the JSIG term for Level of Concerns?

ANSWER

Impact Levels

QUESTION 11

What does SCTM stand for?

ANSWER

Security Controls Traceability Matrix

QUESTION 12

What is the JSIG term that replaced the Certification Test & Evaluation, and Security Test & Evaluation Report?

ANSWER

Security Assessment Report (SAR)

QUESTION 13

What is the JSIG term for Designated Accrediting Authority?

ANSWER

Authorizing Official (AO)

QUESTION 14

Who can the Authorizing Official (AO) delegate to?

ANSWER

Delegated Authorizing Official (DAO)

QUESTION 15

JSIG term for Information Assurance Manager (IAM)?

ANSWER

Information Systems Security Manager (ISSM)

QUESTION 16

JSIG term for Information Assurance Officer (IAO)?

ANSWER

Information System Security Officer (ISSO)

QUESTION 17

JSIG term for Program Manager?

ANSWER

Information System Owner (ISO)

QUESTION 18

JSIG term for Master System Security Plan?

ANSWER

Information Assurance Standard Operating Procedures (IA SOP)

QUESTION 19

JSIG term for guest system?

ANSWER

External Information System

QUESTION 20

What is the definition of ATO?

ANSWER

Approval to Operate

QUESTION 21

What is the JSIG term for (IATO)?

ANSWER

Authorization to Operate (ATO) with a Plan of Actions and Milestone (POA&M)

QUESTION 22

Who are the RMF Decision Authorities?

ANSWER

Element Head (SAPCO) Authorizing Official (AO) Delegated Authorizing Official (DAO)

QUESTION 23

Who are the RMF Assessors and Owners?

ANSWER

Security Control Assessor (SCA) Information Owner/Steward (IO)

QUESTION 24

Who are the RMF Implementers?

ANSWER

Information System Owner (ISO) Information Systems Security Officer/Manager

QUESTION 25

What is the role of the Element Head (SAPCO)?

ANSWER

• Bears ultimate responsibility for mission accomplishment and execution of business functions and all decisions made on his/her behalf • Responsible for adequately mitigating risks to the organization, individuals, and the Nation • Designates an Authorizing Official to make authorization decisions on behalf of Element Head (DoDM 5205.07 v1)

QUESTION 26

What is the role of the Authorizing Official (AO)?

ANSWER

• Shall have a broad and strategic understanding of the SAP Community, his/her organization, and its place/role in the overall SAP Community • Accountable to the Element Head for system authorization and associated risk management decision • Authority to formally assume responsibility for operating an information system at an acceptable level of risk

QUESTION 27

What is the role of the Delegated Authorizing Official (DAO)?

ANSWER

• Acts on behalf of the authorizing official • Carries out and coordinates the required activities associated with security authorization (DoDM 5205.07, JSIG) • Cannot authorize "HIGH" Impact Level systems

QUESTION 28

What is the role of the Security Control Assessor (SCA)?

ANSWER

• Designated by the Authorizing Official • Responsible for performing the comprehensive evaluation of the security features of an information system • Responsible for determining the degree to which it meets its security requirements (NIST SP 800-37)

QUESTION 29

What is the role of the Information Owner/Steward (IO)?

ANSWER

• Has statutory or operational authority for specified information and responsibility for establishing controls for its generation, classification, collection, processing, dissemination, and disposal • Typically, in the case of Stewards of classified information, this role is also the appointed Original Classification Authority (OCA) for that particular information

QUESTION 30

What is the role of the Information System Owner (ISO)?

ANSWER

• Responsible for overall procurement, development, integration, modification, or operation and maintenance of an IS • Responsible for the development and maintenance of the security plan and ensures that the system is deployed and operated in accordance with the agreed-upon security controls • Appoints the program ISSM/ISSO and ISSE • ISSM/ISSO and ISSE may be the same person

QUESTION 31

What is the role of the Information Systems Security Officer/Manager (ISSO/ISSM)?

ANSWER

• Responsible for the day-to-day security posture and continuous monitoring for a system • Responsible for the overall information assurance of a program, organization, system, or enclave

QUESTION 32

What is the Pre-RMF process?

ANSWER

Develop a Risk Assessment Report (RAR) specific to the Information System: • Identify and prioritize risks that inform risk response decisions • Identify asset(s) • Identity threats • Identify vulnerabilities & predisposing conditions • Determine the likelihoods • Identify Impacts • Determine risks & uncertainties • Communicate the results

QUESTION 33

How many RMF steps are there?

ANSWER

6

QUESTION 34

What are the six RMF steps?

ANSWER

RMF Step 1: Categorization of the System RMF Step 2: Selecting Security Controls RMF Step 3: Implementing Security Controls RMF Step 4: Assessing Security Controls RMF Step 5: Authorizing Systems RMF Step 6: Monitor Security Controls

QUESTION 35

How many control families are there?

ANSWER

18

QUESTION 36

What are the 18 control families?

ANSWER

AC - Access Control AT - Awareness and Training AU - Audit and Accountability CA - Security Assessment and Authorization CM - Configuration Management CP - Contingency Planning IA - Identification and Authentication IR - Incident Response MA - Maintenance MP - Media Protection PE - Physical and Environmental Protection PL - Planning PM - Program Management PS - Person Security RA - Risk Assessment SA - System and Services Acquisition SC - System and Communications Protection SI - System and Information Integrity

QUESTION 37

Who is responsible for Steps 1-3 of the RMF process (Categorize, Select, Implement)?

ANSWER

ISSO/ISSM

QUESTION 38

Who is responsible for Step 4 of the RMF process (Assess)?

ANSWER

Security Control Assessor (SCA)

QUESTION 39

Who is responsible for Step 5 of the RMF process (Authorize)?

ANSWER

AO/DAO

QUESTION 40

Who is responsible for Step 6 of the RMF process (Monitor)?

ANSWER

ISSO/ISSM

QUESTION 41

What is the definition of Continuous Monitoring (CONMON)?

ANSWER

Process to ensure ongoing awareness of information security, vulnerabilities, and threats to facilitate risk-based decision making.

QUESTION 42

What are the three methods of monitoring?

ANSWER

Examine Interview Test

QUESTION 43

What are the three Authorization Decisions that can be made on an RMF package?

ANSWER

Authorization to Operate Interim Authority to Test Denial of ATO

QUESTION 44

What are the key artifacts for the RMF Submission Package?

ANSWER

SSP (includes the RAR, SCTM, & CONMON Plan) SAR POA&M

QUESTION 45

What are the three impact ratings?

ANSWER

Three Impact Ratings Low Moderate High

QUESTION 46

What are the three impact levels?

ANSWER

Confidentiality (C) Integrity (I) Availability (A)

QUESTION 47

What is the selection of the (5) Security Controls?

ANSWER

• Common • Baseline • Overlays • Tailor controls • Supplement

QUESTION 48

What are Common Controls?

ANSWER

A security control that is inherited by one or more organizational information system

QUESTION 49

What are Compensating Security Controls?

ANSWER

Management, operational, and technical controls implemented by an organization in lieu of recommended controls in the baseline list of controls

QUESTION 50

Continuous Monitoring (ConMon) Plan

ANSWER

Provides the strategy to routinely evaluate selected IA controls/metrics. Reference NIST SP 800-137, Information Security Continuous Monitoring (ISCM) for Federal Information Systems and Organizations

QUESTION 51

Overlay

ANSWER

A specification of security controls, control enhancements, supplemental guidance, and other supporting information employed during the tailoring process, that is intended to complement (and further refine) security control baselines.

QUESTION 52

Plan of Actions and Milestones (POA&M)

ANSWER

Defines plans of action and milestones related to correcting weaknesses or deficiencies, as well as reducing or eliminating known vulnerabilities and identifies completion dates.

QUESTION 53

Risk Assessment Report (RAR)

ANSWER

Defines the organizationally established level of acceptable risk associated with the operation of an IT system at a specific level; identifies risks; and provides an assessed residual-risk-level for the system

QUESTION 54

Security Assessment Report (SAR)

ANSWER

Contains security control assessment results and recommended corrective actions for security-control weaknesses and deficiencies

QUESTION 55

System Security Plan (SSP)/Security Control Traceability Matrix (SCTM)

ANSWER

Provides an overview of security requirements, description of agreed-upon controls and other supporting security-related information

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials