1.
What does the acronym MOU stand for?
Correct Answer
A. Memorandum of Understanding
Explanation
An MOU stands for Memorandum of Understanding. It is a formal agreement between two or more parties that outlines the terms and details of their mutual understanding and cooperation. It is often used in business, government, and international relations to establish a framework for collaboration, joint projects, or partnerships. The other options, Memory of Understanding and Memorandum on Understanding, are not correct acronyms for MOU. Therefore, the correct answer is Memorandum of Understanding.
2.
What are the requirements of a mobile processing plan at a Government Site?
Correct Answer
E. All of the Above
Explanation
The correct answer is "All of the Above". This means that all of the listed requirements are necessary for a mobile processing plan at a Government Site. The contractor must provide an approved security plan, the government activity must agree to accept security oversight, and an approved Memorandum of Understanding (MOU) must be provided if the system will connect to a government accredited system.
3.
Shipping a mobile system requires 5 days notice prior to shipping a classified system to/from any off-site facility.
Correct Answer
A. True
Explanation
This statement suggests that it is necessary to provide a 5-day notice before shipping a classified system to or from any off-site facility. This implies that there is a specific protocol or process in place for handling classified systems during shipping, and it is important to adhere to this timeline to ensure proper security measures are taken.
4.
Security seals will not be affixed when equipment is relocated to detect tampering.
Correct Answer
B. False
Explanation
This statement is false because security seals are actually affixed when equipment is relocated in order to detect any tampering. The purpose of security seals is to provide evidence of any unauthorized access or tampering with the equipment during transportation or relocation. Therefore, the correct answer is False.
5.
Are Mobile Systems with Interim Approval to Operate (IATO) allowed to relocate to a different facility? If so, who has to grant permission?
Correct Answer
B. Yes. Regional Designated Approval Authority (RDAA)
Explanation
Mobile systems with Interim Approval to Operate (IATO) are allowed to relocate to a different facility. The Regional Designated Approval Authority (RDAA) is the entity that has to grant permission for the relocation.
6.
A Mobile Processing Plan is required for equipment relocated to an area outside of its primary facility.
Correct Answer
A. True
Explanation
A Mobile Processing Plan is necessary when equipment is moved to a location outside of its main facility in order to ensure that the equipment can continue to function properly and efficiently. This plan includes provisions for setting up the necessary infrastructure, such as power supply and network connectivity, in the new location. It also outlines the steps and procedures for safely transporting and reinstalling the equipment. Therefore, it is true that a Mobile Processing Plan is required for equipment relocated to an area outside of its primary facility.
7.
Why are Trusted Downloads completed?
Correct Answer
Trusted Downloads are done to ensure that the information that is being released below the accredited level of the information system has no classified information hidden in the document before being released.
Explanation
Trusted Downloads are completed to verify that the information being released from the information system below the accredited level does not contain any classified information that may be concealed within the document. This process helps to maintain the integrity and security of the information system by ensuring that only authorized and non-sensitive information is released.
8.
What is Human-Readable Output Review?
Correct Answer
A review of human-readable output before the output is released outside the security boundary to determine whether it is accurately marked with the appropriate classification and applicable associated security markings.
9.
What are the DSS authorized File Types and Formats for a Trusted Download?
Correct Answer
ASCII, Hypertext Markup Language, JPEG, BMO, Graphic Interchange Format
Explanation
Use commas to seperate each one
10.
Users shall be required to authenticate their identities at logon. This is accomplished by entering their password in conjunction with their user identification prior to the execution of any application or utility on the system. What is this called?
Correct Answer
B. Authentication at Logon
Explanation
The process described in the question is commonly known as "Authentication at Logon". It involves users verifying their identities by entering their password and user identification before accessing any application or utility on the system. This authentication process ensures that only authorized individuals can access the system and its resources. The other options, such as "Password Authentication" and "Unique Identification", are not as comprehensive or accurate in describing the specific process mentioned in the question.
11.
Why is it important to introduce yourself to the Program Manager and System Administrator?
Correct Answer
D. All of the Above
Explanation
It is important to introduce yourself to the Program Manager and System Administrator because it ensures that you know who the point of contact is for the system and who to reach out to in case of any issues or questions. Additionally, establishing a working relationship with these individuals is crucial for the smooth functioning of the system. Introducing yourself in person allows for a face-to-face meeting, which can help build rapport and facilitate effective communication. Therefore, all of the above reasons make it important to introduce yourself to the Program Manager and System Administrator.
12.
Why are DEM 6700 Forms used?
Correct Answer
These forms are used for creating a record or paper trail for a piece of equipment that will become classified.
Explanation
The DEM 6700 forms are used to create a record or paper trail for a piece of equipment that will become classified. This means that these forms are used to document the process of classifying a piece of equipment, ensuring that there is a clear record of the classification and any associated information. This helps to maintain accountability and traceability for classified equipment.
13.
Who signs the DEM 6700 forms?
Correct Answer
C. ISSO/System Administrator
Explanation
The ISSO/System Administrator signs the DEM 6700 forms.
14.
Who signs the completed User Briefing Acknowledgement?
Correct Answer
ISSO
Explanation
one word answer
15.
Who signs an ISSO or AISSO user briefing?
Correct Answer
ISSM
Explanation
one word answer
16.
Who is responsible for filling out a DEM 6700 Form?
Correct Answer
System Administrator
Explanation
The System Administrator is responsible for filling out a DEM 6700 Form. As the person in charge of managing and maintaining the computer system, the System Administrator has the necessary knowledge and access to complete the form accurately. They are responsible for ensuring that all required information is provided and that the form is filled out correctly according to the guidelines and procedures in place.
17.
Who is responsible for briefing a user and managing an account on a classified system?
Correct Answer
A. ISSO
Explanation
The ISSO (Information System Security Officer) is responsible for briefing a user and managing an account on a classified system. They ensure that users are properly trained and informed about the system's security protocols and procedures. The ISSO also manages user accounts, granting access and privileges based on the user's role and responsibilities. This helps to maintain the confidentiality, integrity, and availability of the classified system and its information.
18.
Where can you download an SSP from?
Correct Answer
B. Enterprise Product Data Management (EPDM)
Explanation
The correct answer is Enterprise Product Data Management (EPDM) because it is the specific platform or system where you can download an SSP (System Security Plan). The other options listed, such as Remedy Database, IA COE, and IDE, are not typically used for downloading an SSP.
19.
Where are user briefings found?
Correct Answer
IS Profile Attachment 6 of an SSP.
Explanation
This questions pertains to the SSP
20.
Where are the completed forms sent to be processed?
Correct Answer
NSCC
Explanation
one word answer
21.
Where are Maintenance Logs located?
Correct Answer
Most maintenance logs are kept in a folder specific to that classified system on the “S drive” but some maintenance logs are tracked differently, check with training ISSO for verification. This makes it easier for the ISSO or AISSO to access the maintenance log to update it.
Explanation
Maintenance logs are typically located in a folder on the "S drive" that is specific to the classified system. However, there may be some cases where maintenance logs are tracked differently, so it is recommended to consult with the training ISSO (Information System Security Officer) for verification. This arrangement allows for easy access and updating of the maintenance log by the ISSO or AISSO (Alternate Information System Security Officer).
22.
When are NSCC briefings completed?
Correct Answer
Once a year depending on when password reset goes into effect.
23.
What two categories do Mobile Systems fall under?
Correct Answer
Systems that are relocated to other contractor sites, Systems that are relocated to government sites.
Explanation
use a comma to seperate answers
24.
What is the Enterprise Product Data Mangement System?
Correct Answer
D. All of the Above
Explanation
The Enterprise Product Data Management System is a comprehensive program that encompasses various functionalities. It is designed to implement common processes and tools for managing the product development process. This system enables users to work seamlessly on engineering programs, ensuring efficient collaboration and productivity. Additionally, it facilitates the downloading and uploading of completed SSPs (System Security Plans) and profiles for classified systems. Overall, the Enterprise Product Data Management System encompasses all of the mentioned functionalities.
25.
What is the DSS Form Letter 16 used for?
Correct Answer
It is used for any accredited system that is being relocated to a Government site where the system will remain overnight or longer.
Explanation
The DSS Form Letter 16 is used when an accredited system needs to be relocated to a Government site and will remain there overnight or for a longer period of time. This form is likely used to inform the appropriate authorities and obtain any necessary approvals or permissions for the relocation.
26.
What is Media Review?
Correct Answer
Media Review is a comprehensive review of electronic output prior to being released outside the security boundary.
27.
What is a Trusted Download?
Correct Answer
A Trusted Download is a procedure, or series of procedures, that permits information to be released below the accredited level of the Information System (IS).
Explanation
A Trusted Download refers to a set of procedures that allow information to be released at a level below the accredited level of the Information System (IS). This means that certain information can be accessed and downloaded by individuals who may not have the highest level of authorization or clearance. These procedures ensure that the information is still protected and secure, even when accessed by individuals with lower levels of clearance.
28.
What is a nomination letter used for?
Correct Answer
B. Nominate someone for an ISSO/AISSO position
Explanation
A nomination letter is used to propose and recommend someone for a specific position, in this case, an ISSO/AISSO position. It serves as a formal way to highlight the qualifications, skills, and achievements of the individual being nominated, and express support for their candidacy. The letter typically includes details about the nominee's experience, expertise, and suitability for the position, and may also include testimonials or endorsements from others. The purpose of the nomination letter is to persuade the decision-makers to consider and select the nominee for the desired position.
29.
What is a DEM 6700 Form?
Correct Answer
A form that is used by system administrators, logistics personnel, ISSOs and Data Control in order to make a PC, hard drive or a monitor classified through the databank for a specific IS.
30.
What does SSP stand for?
Correct Answer
C. System Security Plan
Explanation
The correct answer is System Security Plan. A System Security Plan (SSP) is a document that outlines the security controls and procedures for a specific system or network. It provides a comprehensive overview of the security measures in place to protect the system from potential threats and vulnerabilities. The SSP includes details such as risk assessments, security requirements, incident response procedures, and security training programs. It is an essential component of an organization's overall security program and helps ensure the confidentiality, integrity, and availability of the system and its data.
31.
What are the requirements of a mobile processing plan at a contractor's site?
Correct Answer(s)
A. Identify the system
B. List relocation site(s) and type of site
D. List how the equipment, dedicated software, and all classified information are to be transported and safeguarded.
F. Provide a statement that only an appropriately cleared employee of the contractor holding the Accreditation Letter will act as the ISSO for the system while it is relocated.
I. The FSO or ISSM must provide the receiving location with a copy of the SSP and the IS Accreditation Letter.
J. DSS retains security cognizance for IS under control of a cleared contractor while it is in transit to or from the facility and/or a government installation.
K. When an IS travels a copy of SSP and accreditation letter will accompany it.
Explanation
The requirements of a mobile processing plan at a contractor's site include identifying the system, listing relocation site(s) and type of site, listing how the equipment, dedicated software, and all classified information will be transported and safeguarded, providing a statement that only an appropriately cleared employee of the contractor holding the Accreditation Letter will act as the ISSO for the system during relocation, providing the receiving location with a copy of the SSP and the IS Accreditation Letter, retaining security cognizance for IS under control of a cleared contractor while it is in transit, and ensuring that a copy of the SSP and accreditation letter accompanies the IS during travel.
32.
What are maintenance Logs?
Correct Answer(s)
Maintenance Logs are records used to track any type of problems, software installations or maintenance that may occur on your classified system.
33.
Under the new ODAA requirements passwords for a classified system should be at a minimum 12 characters long and will only be valid for no longer than 365 days?
Correct Answer
B. False
Explanation
The statement is false because under the new ODAA requirements, passwords for a classified system should be at a minimum of 12 characters long, but they do not have a specified validity period of 365 days.
34.
There are 5 common Operating Systems used on a classified system?
Correct Answer
A. True
Explanation
The statement is true because there are indeed 5 common operating systems used on a classified system. However, without further information, it is not possible to determine which specific operating systems are being referred to.
35.
The definition of a hardware list is any piece of equipment that is not associated with that particular classified system and is not marked appropriately?
Correct Answer
B. False
Explanation
A hardware list refers to a list of equipment that is associated with a particular classified system and is marked appropriately. Therefore, the statement that a hardware list is any piece of equipment that is not associated with that particular classified system and is not marked appropriately is false.
36.
The anti-virus on a classified system are updated on a as needed basis?
Correct Answer
B. False
Explanation
The statement suggests that the anti-virus on a classified system are updated on an as-needed basis. However, the correct answer is False. This means that the statement is not true. The anti-virus on a classified system is typically updated regularly and not just on an as-needed basis. Regular updates are necessary to ensure that the system is protected against the latest threats and vulnerabilities.
37.
Privileged users have access to IS control, monitoring or administration functions.
Correct Answer
A. True
Explanation
Privileged users are individuals who have elevated access rights or permissions within a system or organization. These users typically have the ability to control, monitor, or administer various aspects of the information system. This includes tasks such as managing user accounts, configuring security settings, and monitoring system performance. Therefore, it is true that privileged users have access to IS control, monitoring, or administration functions.
38.
Prior to installation, the ISSM or appointed designee must approve all software unless already approved, both new and modifications to previously installed software.
Correct Answer
A. True
Explanation
The statement is stating that prior to installation, the ISSM or appointed designee must approve all software, whether it is new or a modification to previously installed software. This means that any software that is being installed on the system needs to be approved by the ISSM or their designee. Therefore, the correct answer is True.
39.
Prior to installation on an accredited system, software that is received directly from the vendor and installed into a protected environment does not have to be screened or tested.
Correct Answer
B. False
Explanation
Software that is received directly from the vendor and installed into a protected environment still needs to be screened or tested prior to installation on an accredited system. This is because even though the software comes directly from the vendor, it can still contain potential vulnerabilities or malicious code that could compromise the security of the accredited system. Therefore, it is important to screen or test the software before installation to ensure its safety and compatibility with the protected environment.
40.
Passwords shall be protected at a level commensurate with the sensitivity level or classification level and classification category of the information which they allow access?
Correct Answer
A. True
Explanation
This statement is true because passwords should be protected at a level that matches the sensitivity or classification level of the information they provide access to. Passwords act as a security measure and help prevent unauthorized access to sensitive information. Therefore, it is important to ensure that the level of protection for passwords aligns with the sensitivity of the information they protect.
41.
Name of the five common Operating Systems associated with a classified system.
Correct Answer
Solaris,Windows,UNIX,Open VMS,Linux
Explanation
use commas to seperate answers. No spaces in between answers
42.
In an audit log, the resolution to problems that might have occurred is added to this log. This is done to show the DoD that you have found a potential problem and have rectified any issues.
Correct Answer
B. False
Explanation
In an audit log, the resolution to problems that might have occurred is not added to the log. The purpose of an audit log is to document and track any changes or actions taken, but it does not necessarily include the resolution to problems. The audit log serves as a record of events and can be used to demonstrate compliance or identify any potential issues, but the actual resolution would typically be documented elsewhere.
43.
If a user's need-to-know, clearance level, or employment status changes, what steps should be taken to protect your classified systems?
Correct Answer
D. All of the Above
Explanation
When a user's need-to-know, clearance level, or employment status changes, it is important to take multiple steps to protect classified systems. First, the user should be terminated from the user list to ensure they no longer have access to the systems. Additionally, their accounts should be disabled to prevent any unauthorized access. Finally, changing all combinations on storage devices adds an extra layer of security by preventing any potential access. Therefore, all of the above steps should be taken to protect classified systems when these changes occur.
44.
If a system requests to stay offsite for longer period of time, what three options are available to the ISSM:
Correct Answer
D. All of the Above
Explanation
The system can be transferred to the gaining ISSM for accreditation under that location's cage code. Alternatively, a request and justification can be submitted to extend the relocation period beyond 120 days, with a specified return or transfer date. Lastly, the system can be returned to the owning facility. Therefore, all of the above options are available to the ISSM.
45.
If a mobile system is connected to a separately accredited system at the remote location it will be treated as an Interconnected LAN. What is required prior to this connection occurring?
Correct Answer
Network Security Plan
Explanation
Do not use acronym for answer. Spell out each word.
46.
How often are user briefings completed?
Correct Answer
once per year
Explanation
User briefings are completed once per year. This means that they are conducted annually, providing users with updates, information, and any necessary training. This frequency allows for regular communication and ensures that users are kept informed and knowledgeable about the relevant topics. By completing user briefings once per year, organizations can maintain consistency and ensure that users are up to date with any changes or developments in their field.
47.
How often are back ups completed on a classified system?
Correct Answer
B. Monthly
Explanation
Back ups on a classified system are completed on a monthly basis. This means that the system is backed up once every month to ensure that any data or information stored on the system is protected and can be recovered if needed. This regular schedule of back ups helps to minimize the risk of data loss and ensures the system's integrity and security.
48.
How often are audits completed?
Correct Answer
C. Weekly
Explanation
Audits are completed on a weekly basis. This means that they are conducted every week to assess and evaluate the financial records, processes, and compliance of an organization. Conducting audits weekly allows for regular monitoring and identification of any potential issues or discrepancies, ensuring that corrective actions can be taken promptly. It also helps in maintaining transparency, accuracy, and accountability in the financial operations of the organization.
49.
How long is the Letter 16 valid for?
Correct Answer
Valid for the life of the contract or system accreditation
Explanation
The Letter 16 is valid for the entire duration of the contract or system accreditation. This means that it remains valid as long as the contract or accreditation is in effect. There is no specific time limit mentioned, indicating that the validity extends for the entire duration of the contract or accreditation.
50.
How do you back up audit logs on a classified system?
Correct Answer
By taking the audit records for a particular month and placing them on media.
Explanation
The correct answer suggests that to back up audit logs on a classified system, the audit records for a specific month should be taken and stored on media. This ensures that the audit logs are preserved and can be accessed if needed for compliance or investigation purposes.