Skip to main content
0%

RDRP Exam

RDRP Competency Exam

Welcome to the RMF for DoD IT Competency Exam.
To successfully acquire the RDRP designation you must achieve a score of 70% or higher on this exam.

Please work independently and draw from knowledge gained in BAI's RMF for DoD IT training class. Good luck!

Please provide your name and email address.

1 / 50

Which document contains the Description, Milestones and Estimated Completion for each system weakness?

2 / 50

What term identifies a control that is partially inherited, partially implemented by the system owner?

3 / 50

Which of the following roles has responsibility for establishing an organizational commitment to the actions required to effectively manage risk and protect the core missions and business functions being carried out by the organization?

4 / 50

What is/are NOT a part of an agency's information security program as mandated by FISMA?

5 / 50

What is the first step in selecting security controls for a DoD system?

6 / 50

Of the following roles, which has PRIMARY responsibility for reporting the security status of an information system to the authorizing official on an ongoing basis in accordance with the monitoring strategy?

7 / 50

Of the following roles, which has the PRIMARY responsibility for determining the security impact of proposed or actual changes to the information system or its environment of operation?

8 / 50

What is an example of a Tier Level Common Control?

9 / 50

Which of the following roles is responsible for providing overall security protections for a federal government agency?

10 / 50

To whom does the Federal Information Security Management Act (FISMA) 2002 apply?

11 / 50

Which automated tool provides a repository for artifacts?

12 / 50

Of the following roles, which has the PRIMARY responsibility for assembling and submitting an authorization package for an information system?

13 / 50

System and Services Acquisition controls are found in which family classification?

14 / 50

How are PIT and PIT Systems treated differently under RMF?

15 / 50

The term 'Type Authorization' refers to:

16 / 50

What is included in ACAS?

17 / 50

Which of the following describes the purpose of NIST SP 800-39, 'Managing Information Security Risk'?

18 / 50

Of the following roles, which has primary responsibility for implementing an information system disposal strategy which executes required actions when a system is removed from service?

19 / 50

For now, systems continue to receive Authorizations with three-year Termination Dates. This is based on earlier guidance from which of the options below?

20 / 50

Which of the following is a required artifact for only systems categorized as moderate or above?

21 / 50

What step in the RMF Lifecycle do you build the system?

22 / 50

Which of the following artifacts becomes very important during the decommissioning process?

23 / 50

Choose a situation that could change the monitoring frequency of a control.

24 / 50

What guidance is unique to DoD as opposed to only using NIST guidance?

25 / 50

Which DoD organization monitors and oversees IS security Practices (including RMF, where applicable) of DoD contractors and vendors processing classified information?

26 / 50

Of the following roles, which has the PRIMARY responsibility for preparing the security control assessment plan for an information system?

27 / 50

What is not included in the DoD Core Security Authorization Spreadsheet?

28 / 50

Which NIST publication provides guidance on implementing an ISCM?

29 / 50

A sunspot is an example of which of the following:

30 / 50

For a security control listed in NIST SP 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations', which of the following describes the security control enhancements in the control structure?

31 / 50

Maintenance controls are found in which family classification?

32 / 50

Which of the following statements about DoD's implementation of Information Security Continuous Monitoring (ISCM) is most accurate?

33 / 50

Which of these is a DoD task under the RMF step 'Categorization'?

34 / 50

Which RMF step aligns with the System Development Life Cycle Phase 'Operations and Support'?

35 / 50

Which of the following roles has responsibility for establishing an organizational commitment to information security?

36 / 50

For a security control listed in NIST SP 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations', which of the following describes the control statement in the control structure?

37 / 50

Of the following roles, which has the PRIMARY responsibility for determining the risk to organizational operations, organizational assets, individuals, other organizations, or the Nation?

38 / 50

For a security control listed in NIST SP 800-53, Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations', which of the following describes the organizational-parameterization in the control structure?

39 / 50

Which of the following describes the purpose of NIST SP 800-53, Rev 4/5?

40 / 50

Of the following roles, which has the PRIMARY responsibility for conducting remediation actions based on the results of ongoing monitoring activities, assessment of risk, and outstanding items in the Plan of Action & Milestones?

41 / 50

Which fundamental security property guards against improper information modification or destruction?

42 / 50

What is the primary gateway for gaining access to NIST Computer Security Publications, Standards, and guidelines plus other useful security-related information?

43 / 50

What is true about SCAP?

44 / 50

Which of the following statements about the Enterprise Mission Assurance Support Service (eMASS) is most accurate?

45 / 50

Security Control Characteristics include all except:

46 / 50

Of the following roles, which has the PRIMARY responsibility for reviewing and approving the information system security plan (SP)?

47 / 50

What step in the RMF Lifecycle do you document the security control implementation in the security plan?

48 / 50

Which publication replaced the DoDD 8570.01, 'Information Assurance Training Certification and Workforce Management'?

49 / 50

Which of the following Documents will you use to help you follow the process of categorizing the system?

50 / 50

How often does FISMA mandate a review of security controls?

Your score is