Skip to main content
0%

RDRP Exam

RDRP Competency Exam

Welcome to the RMF for DoD IT Competency Exam.
To successfully acquire the RDRP designation you must achieve a score of 70% or higher on this exam.

Please work independently and draw from knowledge gained in BAI's RMF for DoD IT training class. Good luck!

Please provide your name and email address.

1 / 50

Which publication replaced the DoDD 8570.01, 'Information Assurance Training Certification and Workforce Management'?

2 / 50

What is not included in the DoD Core Security Authorization Spreadsheet?

3 / 50

What role did the Joint Task Force Transformation Initiative (JTFTI) play in the RMF process?

4 / 50

Of the following roles, which has the PRIMARY responsibility for assembling and submitting an authorization package for an information system?

5 / 50

For now, systems continue to receive Authorizations with three-year Termination Dates. This is based on earlier guidance from which of the options below?

6 / 50

Which automated tool provides a repository for artifacts?

7 / 50

A tornado is an example of which of the following?

8 / 50

Maintenance controls are found in which family classification?

9 / 50

How many system-level families of security controls are listed in NIST SP 800-53, Revision 1, 'Security and Privacy Controls for Federal Information Systems and Organizations'?

10 / 50

What is included in ACAS?

11 / 50

The System Security Plan (SSP) indicates the assessment results of each security control as one of these three options:

12 / 50

In the multi-tiered risk management process described by NIST, at which level of the process is the organization depicted?

13 / 50

Of the following roles, which has the PRIMARY responsibility for developing a strategy for the continuous monitoring of security Control Effectiveness for an Information System?

14 / 50

A 'Type Authorization' includes which of the following requirements:

15 / 50

According to DoDI 8510.01, Risk Management Framework for DoD Information Technology, which of the following is a required document in an authorization package?

16 / 50

Which of these statements most accurately reflects DoD policy regarding National Security Systems (NSS) and RMF?

17 / 50

Of the following roles, which has the PRIMARY responsibility for preparing the security control assessment report for an information system?

18 / 50

Of the following roles, which has the PRIMARY responsibility for selecting security controls for an information system?

19 / 50

Which publication contains tables for use in quantification of risk?

20 / 50

Which of the following Documents will you use to help you follow the process of categorizing the system?

21 / 50

Which NIST publication provides guidance on implementing an ISCM?

22 / 50

Of the following roles, which has the PRIMARY responsibility for updating the security plan, security assessment report, and Plan of Actions & Milestones based on the results of the continuous Monitoring process?

23 / 50

Which of the following describes the purpose of NIST SP 800-53, Rev 4/5?

24 / 50

Which RMF step aligns with the System Development Life Cycle Phase 'Operations and Support'?

25 / 50

What is the primary gateway for gaining access to NIST Computer Security Publications, Standards, and guidelines plus other useful security-related information?

26 / 50

Of the following, which has the PRIMARY responsibility for assessing the implementation of security controls for an information system?

27 / 50

Of the following roles, which has the PRIMARY responsibility for determining the security impact of proposed or actual changes to the information system or its environment of operation?

28 / 50

In the three-tier RMF governance structure as implemented by DoD, which of the following most accurately describes Tier 3?

29 / 50

How are PIT and PIT Systems treated differently under RMF?

30 / 50

Who prepares the Security Assessment Plan?

31 / 50

What are the major steps of the Risk Management Framework (RMF)?

32 / 50

Of the following roles, which has the PRIMARY responsibility for identifying common controls provided by an organization?

33 / 50

Which document provides an overview of the security requirements of a system and the controls in place or planned for meeting those requirements?

34 / 50

Which of the following describes the purpose of NIST SP 800-37, Rev. 2, 'Risk Management Framework for Information Systems and Organizations: A System Life Cycle Approach for Security and Privacy'?

35 / 50

Which of the following forms of DoD information technology are required to undergo the RMF Assess process only?

36 / 50

For a security control listed in NIST SP 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations', which of the following describes the control statement in the control structure?

37 / 50

The term 'DoD Components' refers to:

38 / 50

Which fundamental security property guards against improper information modification or destruction?

39 / 50

Of the following roles, which has the PRIMARY responsibility for determining the risk to organizational operations, organizational assets, individuals, other organizations, or the Nation?

40 / 50

Which of the following best describes the RMF Knowledge Service (KS)?

41 / 50

Which of the following is part of the Joint Continuous Working Group (JCMWG) CONOPS Phase 1 for implementation of ISCM?

42 / 50

In accordance with the FISMA (Update 2014), which agency has been given a more active role in providing operational and technical assistance to other federal Executive Branch civilian agencies?

43 / 50

In which publication will you find the table displaying minimum DoD standards for organization-defined parameters?

44 / 50

Of the following roles, which has the PRIMARY responsibility for reviewing the reported security status of the information system on an ongoing basis in accordance with the monitoring strategy to determine whether the risk to organizational operations, organizational assets, individuals, other organizations, or the Nation remains acceptable?

45 / 50

Which of the following roles is responsible for providing overall security protections for a federal government agency?

46 / 50

Which of these is a DoD task under the RMF step 'Categorization'?

47 / 50

SCAP Stands for?

48 / 50

What is an example of a Tier Level Common Control?

49 / 50

A system of Records Notices (SORN) is a control in which family?

50 / 50

System and Services Acquisition controls are found in which family classification?

Your score is