2.
Where are the completed forms sent to be processed?
Explanation
one word answer
3.
What two categories do Mobile Systems fall under?
Explanation
use a comma to seperate answers
4.
What is the DSS Form Letter 16 used for?
Explanation
The DSS Form Letter 16 is used when an accredited system needs to be relocated to a Government site and will remain there overnight or for a longer period of time. This form is likely used to inform the appropriate authorities and obtain any necessary approvals or permissions for the relocation.
5.
What is a Trusted Download?
Explanation
A Trusted Download refers to a set of procedures that allow information to be released at a level below the accredited level of the Information System (IS). This means that certain information can be accessed and downloaded by individuals who may not have the highest level of authorization or clearance. These procedures ensure that the information is still protected and secure, even when accessed by individuals with lower levels of clearance.
6.
If a mobile system is connected to a separately accredited system at the remote location it will be treated as an Interconnected LAN. What is required prior to this connection occurring?
Explanation
Do not use acronym for answer. Spell out each word.
7.
How long is the Letter 16 valid for?
Explanation
The Letter 16 is valid for the entire duration of the contract or system accreditation. This means that it remains valid as long as the contract or accreditation is in effect. There is no specific time limit mentioned, indicating that the validity extends for the entire duration of the contract or accreditation.
8.
How do you audit a classified system?
9.
Does a user requesting the installation of a specific type of software have to place a Help Desk Ticket prior to the software being added to their machine?
Explanation
The correct answer is true because in most organizations, users are required to place a help desk ticket to request the installation of any software on their machine. This helps the IT department keep track of software installations, ensure compatibility, and manage licensing. It also allows the help desk to prioritize and schedule software installations based on the needs and resources of the organization.
10.
Define what a "Unique Identification" means:
Correct Answer
Each user shall have an unique identity which is associated with all auditable actions taken by that individual.
Explanation
A "Unique Identification" refers to a distinct identity that is assigned to each user. This identity is linked to all the actions that the individual takes, making it possible to track and audit their activities. This ensures accountability and allows for the identification of specific users responsible for certain actions.
11.
An ISSO is responsible for verifying that the information provided on the Software Installation Request (SIR) is accurate before passing the SIR to their Information System Security Manager (ISSM)?
Explanation
The ISSO (Information System Security Officer) is responsible for verifying the accuracy of the information provided on the Software Installation Request (SIR) before passing it to the ISSM (Information System Security Manager). This ensures that the information being provided is correct and meets the necessary security requirements before any software installation takes place.
12.
Why is it important to introduce yourself to the Program Manager and System Administrator?
Correct Answer
A. All of the Above
Explanation
It is important to introduce yourself to the Program Manager and System Administrator because it ensures that you know who the point of contact is for the system and who to reach out to in case of any issues or questions. Additionally, establishing a working relationship with these individuals is crucial for the smooth functioning of the system. Introducing yourself in person allows for a face-to-face meeting, which can help build rapport and facilitate effective communication. Therefore, all of the above reasons make it important to introduce yourself to the Program Manager and System Administrator.
13.
In order to search for a help desk ticket, you first need to go to Remedy's homepage and click on HD_ISC Ticket (Search)?
Explanation
To search for a help desk ticket, you need to go to Remedy's homepage and click on HD_ISC Ticket (Search). This suggests that the statement "True" is the correct answer as it accurately describes the necessary steps to perform the search.
14.
Prior to installation, the ISSM or appointed designee must approve all software unless already approved, both new and modifications to previously installed software.
Explanation
The statement is stating that prior to installation, the ISSM or appointed designee must approve all software, whether it is new or a modification to previously installed software. This means that any software that is being installed on the system needs to be approved by the ISSM or their designee. Therefore, the correct answer is True.
15.
What does the acronym MOU stand for?
Correct Answer
A. Memorandum of Understanding
Explanation
An MOU stands for Memorandum of Understanding. It is a formal agreement between two or more parties that outlines the terms and details of their mutual understanding and cooperation. It is often used in business, government, and international relations to establish a framework for collaboration, joint projects, or partnerships. The other options, Memory of Understanding and Memorandum on Understanding, are not correct acronyms for MOU. Therefore, the correct answer is Memorandum of Understanding.
16.
A help desk ticket is an information and assistance resourced used to troubleshoot problems with computers?
Explanation
A help desk ticket is indeed an information and assistance resource used to troubleshoot problems with computers. It is a way for users to report issues they are facing with their computers or software, and for the help desk team to track and address these problems. The ticket typically includes details about the issue, such as error messages or symptoms, and allows the help desk team to prioritize and efficiently resolve the problem.
17.
A Software Installation Request (SIR) is submitted by a specific program to our License Management Team to add a certain type of software onto a classified system.
Explanation
A Software Installation Request (SIR) is indeed submitted by a specific program to the License Management Team to add a certain type of software onto a classified system. This process ensures that only authorized software is installed on the system and helps maintain security and compliance.
18.
A Mobile Processing Plan is required for equipment relocated to an area outside of its primary facility.
Explanation
A Mobile Processing Plan is necessary when equipment is moved to a location outside of its main facility in order to ensure that the equipment can continue to function properly and efficiently. This plan includes provisions for setting up the necessary infrastructure, such as power supply and network connectivity, in the new location. It also outlines the steps and procedures for safely transporting and reinstalling the equipment. Therefore, it is true that a Mobile Processing Plan is required for equipment relocated to an area outside of its primary facility.
19.
Privileged users have access to IS control, monitoring or administration functions.
Explanation
Privileged users are individuals who have elevated access rights or permissions within a system or organization. These users typically have the ability to control, monitor, or administer various aspects of the information system. This includes tasks such as managing user accounts, configuring security settings, and monitoring system performance. Therefore, it is true that privileged users have access to IS control, monitoring, or administration functions.
20.
Active users are re-briefed at least once a year unless a security incident occurs?
Explanation
Active users are re-briefed at least once a year unless a security incident occurs. This means that all active users receive a briefing at least once every year, unless there is a security incident that requires them to be briefed more frequently. This ensures that users are kept up to date with the latest security protocols and measures, helping to maintain a secure environment.
21.
Prior to installation on an accredited system, software that is received directly from the vendor and installed into a protected environment does not have to be screened or tested.
Explanation
Software that is received directly from the vendor and installed into a protected environment still needs to be screened or tested prior to installation on an accredited system. This is because even though the software comes directly from the vendor, it can still contain potential vulnerabilities or malicious code that could compromise the security of the accredited system. Therefore, it is important to screen or test the software before installation to ensure its safety and compatibility with the protected environment.
22.
What does SSP stand for?
Correct Answer
A. System Security Plan
Explanation
The correct answer is System Security Plan. A System Security Plan (SSP) is a document that outlines the security controls and procedures for a specific system or network. It provides a comprehensive overview of the security measures in place to protect the system from potential threats and vulnerabilities. The SSP includes details such as risk assessments, security requirements, incident response procedures, and security training programs. It is an essential component of an organization's overall security program and helps ensure the confidentiality, integrity, and availability of the system and its data.
23.
Who signs an ISSO or AISSO user briefing?
Correct Answer
ISSM
Explanation
one word answer
24.
Who is responsible for briefing a user and managing an account on a classified system?
Explanation
The ISSO (Information System Security Officer) is responsible for briefing a user and managing an account on a classified system. They ensure that users are properly trained and informed about the system's security protocols and procedures. The ISSO also manages user accounts, granting access and privileges based on the user's role and responsibilities. This helps to maintain the confidentiality, integrity, and availability of the classified system and its information.
25.
Passwords shall be protected at a level commensurate with the sensitivity level or classification level and classification category of the information which they allow access?
Explanation
This statement is true because passwords should be protected at a level that matches the sensitivity or classification level of the information they provide access to. Passwords act as a security measure and help prevent unauthorized access to sensitive information. Therefore, it is important to ensure that the level of protection for passwords aligns with the sensitivity of the information they protect.
26.
All special briefing requirements can be verified through the contract document and/or with form DD254.
Explanation
The correct answer is true because special briefing requirements can indeed be verified through the contract document and/or with form DD254. These documents outline the specific instructions and guidelines for conducting briefings, ensuring that all necessary information is communicated effectively. By referring to these documents, individuals can confirm the requirements and ensure compliance with the contract terms.
27.
Who signs the completed User Briefing Acknowledgement?
Correct Answer
ISSO
Explanation
one word answer
28.
When performing a search for a specific piece of equipment, you are restricted to just searching by bar tag?
Explanation
When performing a search for a specific piece of equipment, you are not restricted to just searching by bar tag. There may be other search criteria available such as equipment name, model number, or other identifying information. Therefore, the correct answer is False.
29.
Audit Logs are backed up to ensure there is a record of this audit data just in case the system fails and all data is lost.
Explanation
Audit logs are essential for maintaining a record of all activities and changes within a system. Backing up these logs ensures that even if the system fails or all data is lost, the audit data remains intact. This helps in maintaining data integrity, investigating security breaches, and complying with regulatory requirements. Therefore, it is crucial to back up audit logs to ensure the availability and reliability of this important information.
30.
Audit Logs track any problems that have occurred during your weekly audit of that particular classified system.
Explanation
Audit Logs are used to track any problems or issues that have occurred during an audit. In this case, the audit is being conducted on a specific classified system. By keeping track of the audit logs, any problems or irregularities can be identified and addressed. Therefore, the statement that Audit Logs track any problems that have occurred during the weekly audit of the classified system is true.
31.
Anti-virus software is considered to be security relevant software on a classified system?
Explanation
Anti-virus software is considered to be security relevant software on a classified system because it plays a crucial role in protecting the system from potential threats and malicious activities. It helps to detect, prevent, and remove viruses, malware, and other harmful software that can compromise the security and integrity of the classified system. By regularly scanning and monitoring the system, anti-virus software ensures that any potential security vulnerabilities are identified and addressed promptly, thus maintaining the confidentiality and availability of classified information. Therefore, it is essential to have anti-virus software installed and updated on a classified system to ensure its security.
32.
There are 5 common Operating Systems used on a classified system?
Explanation
The statement is true because there are indeed 5 common operating systems used on a classified system. However, without further information, it is not possible to determine which specific operating systems are being referred to.
33.
Shipping a mobile system requires 5 days notice prior to shipping a classified system to/from any off-site facility.
Explanation
This statement suggests that it is necessary to provide a 5-day notice before shipping a classified system to or from any off-site facility. This implies that there is a specific protocol or process in place for handling classified systems during shipping, and it is important to adhere to this timeline to ensure proper security measures are taken.
34.
If a user's need-to-know, clearance level, or employment status changes, what steps should be taken to protect your classified systems?
Correct Answer
A. All of the Above
Explanation
When a user's need-to-know, clearance level, or employment status changes, it is important to take multiple steps to protect classified systems. First, the user should be terminated from the user list to ensure they no longer have access to the systems. Additionally, their accounts should be disabled to prevent any unauthorized access. Finally, changing all combinations on storage devices adds an extra layer of security by preventing any potential access. Therefore, all of the above steps should be taken to protect classified systems when these changes occur.
35.
If a system requests to stay offsite for longer period of time, what three options are available to the ISSM:
Correct Answer
A. All of the Above
Explanation
The system can be transferred to the gaining ISSM for accreditation under that location's cage code. Alternatively, a request and justification can be submitted to extend the relocation period beyond 120 days, with a specified return or transfer date. Lastly, the system can be returned to the owning facility. Therefore, all of the above options are available to the ISSM.
36.
Name the five documents that are required in order to ship a classified system?
Correct Answer
A. All of the Above
Explanation
The correct answer is "All of the Above" because all five documents - Signed Mobile Letter, System Diagram, Accreditation Letter, Mobile Processing Plan, and Transportation Plan - are required in order to ship a classified system. These documents ensure that the system is properly authorized, planned, and transported in a secure manner.
37.
What is the Enterprise Product Data Mangement System?
Correct Answer
A. All of the Above
Explanation
The Enterprise Product Data Management System is a comprehensive program that encompasses various functionalities. It is designed to implement common processes and tools for managing the product development process. This system enables users to work seamlessly on engineering programs, ensuring efficient collaboration and productivity. Additionally, it facilitates the downloading and uploading of completed SSPs (System Security Plans) and profiles for classified systems. Overall, the Enterprise Product Data Management System encompasses all of the mentioned functionalities.
38.
What is a nomination letter used for?
Correct Answer
A. Nominate someone for an ISSO/AISSO position
Explanation
A nomination letter is used to propose and recommend someone for a specific position, in this case, an ISSO/AISSO position. It serves as a formal way to highlight the qualifications, skills, and achievements of the individual being nominated, and express support for their candidacy. The letter typically includes details about the nominee's experience, expertise, and suitability for the position, and may also include testimonials or endorsements from others. The purpose of the nomination letter is to persuade the decision-makers to consider and select the nominee for the desired position.
39.
The definition of a hardware list is any piece of equipment that is not associated with that particular classified system and is not marked appropriately?
Explanation
A hardware list refers to a list of equipment that is associated with a particular classified system and is marked appropriately. Therefore, the statement that a hardware list is any piece of equipment that is not associated with that particular classified system and is not marked appropriately is false.
40.
How often are user briefings completed?
Correct Answer
once per year
Explanation
User briefings are completed once per year. This means that they are conducted annually, providing users with updates, information, and any necessary training. This frequency allows for regular communication and ensures that users are kept informed and knowledgeable about the relevant topics. By completing user briefings once per year, organizations can maintain consistency and ensure that users are up to date with any changes or developments in their field.
41.
When you are trying to search for a System's complete inventory, the use of the_________drop down menu allows you to find the correct SSP number.
Correct Answer
AISSP
Explanation
The correct answer is AISSP. When searching for a system's complete inventory, using the AISSP drop-down menu allows you to find the correct SSP number. This suggests that AISSP is a specific and relevant option in the drop-down menu that helps in locating the correct SSP number for the system's inventory.
42.
Security seals will not be affixed when equipment is relocated to detect tampering.
Explanation
This statement is false because security seals are actually affixed when equipment is relocated in order to detect any tampering. The purpose of security seals is to provide evidence of any unauthorized access or tampering with the equipment during transportation or relocation. Therefore, the correct answer is False.
43.
All system Audit Logs are backed up onto a CD and/or a DVD depending on the size of the audit data?
Explanation
This statement suggests that all system Audit Logs are indeed backed up onto a CD and/or a DVD, with the choice between the two depending on the size of the audit data. Therefore, the answer is true.
44.
Under the new ODAA requirements passwords for a classified system should be at a minimum 12 characters long and will only be valid for no longer than 365 days?
Explanation
The statement is false because under the new ODAA requirements, passwords for a classified system should be at a minimum of 12 characters long, but they do not have a specified validity period of 365 days.
45.
What are the requirements of a mobile processing plan at a Government Site?
Correct Answer
A. All of the Above
Explanation
The correct answer is "All of the Above". This means that all of the listed requirements are necessary for a mobile processing plan at a Government Site. The contractor must provide an approved security plan, the government activity must agree to accept security oversight, and an approved Memorandum of Understanding (MOU) must be provided if the system will connect to a government accredited system.
46.
Why are DEM 6700 Forms used?
Correct Answer
These forms are used for creating a record or paper trail for a piece of equipment that will become classified.
Explanation
The DEM 6700 forms are used to create a record or paper trail for a piece of equipment that will become classified. This means that these forms are used to document the process of classifying a piece of equipment, ensuring that there is a clear record of the classification and any associated information. This helps to maintain accountability and traceability for classified equipment.
47.
Name of the five common Operating Systems associated with a classified system.
Correct Answer
Solaris,Windows,UNIX,Open VMS,Linux
Explanation
use commas to seperate answers. No spaces in between answers
48.
Like the AISSP view, you can search on any of the fields, but we primarily search using the_____ ________, last name or location.
Correct Answer
ticket number
Explanation
The given correct answer is "ticket number". This means that when searching in the AISSP view, you have the option to search using any of the fields such as first name, last name, or location. However, the primary method of searching is using the ticket number. This suggests that the ticket number is a unique identifier that is commonly used to search and retrieve information in the AISSP view.
49.
The anti-virus on a classified system are updated on a as needed basis?
Explanation
The statement suggests that the anti-virus on a classified system are updated on an as-needed basis. However, the correct answer is False. This means that the statement is not true. The anti-virus on a classified system is typically updated regularly and not just on an as-needed basis. Regular updates are necessary to ensure that the system is protected against the latest threats and vulnerabilities.