(RMF) QUESTIONS WITH ANSWERS #5
Select all the steps which do not apply to the Risk Management Framework Implement
Security Controls. - correct answer -*Develop system-level continuous monitoring
strategy*
-Document security control implementation in the security plan
-Implement control solutions consistent with dod component cybersecurity architectures
-*Initiate the security plan*
Risk Management Framework Tier 2 Mission/Business Processes roles and
responsibilities are assigned to ____________________________ - correct answer -
*Information Systems Security Manager (ISSM)* WRONG
-Authorizing Official (AO)
-dod Component CIO/SISO
-dod CIO/SISO
Risk Management Framework Tier 1 Organization roles and responsibilities are
assigned to ____________________________ - correct answer -*Information Systems
Security Manager (ISSM)* WRONG
-Authorizing Official (AO)
-dod Component CIO/SISO
-dod CIO/SISO
Implementing a continuous monitoring process enables an organization to make
credible, risk-based decisions regarding the continued operation of the organization's
information systems. - correct answer -*True*
-False
Select the Risk Management Framework Step 1: Categorize System item from the
choices below: - correct answer -Determine impact of changes to the system and
environment, conduct needed remediation, and implement system decommissioning
strategy
-Assess security controls, and develop and approve security assessment plan
-Submit security authorization package (Security plan, SAR, and POA&M)
-*Register system with Department of Defense (dod) component cybersecurity program*
If you have just been given authorization to operate a classified information system,
what step are you now in within the Risk Management Framework? - correct answer -
Step 1: Categorize System
-Step 3: Implement Security Controls
-Step 5: Authorize System
-*Step 6: Monitor Security Controls*