0%

RDRP Exam

RDRP Competency Exam

Welcome to the RMF for DoD IT Competency Exam.
To successfully acquire the RDRP designation you must achieve a score of 70% or higher on this exam.

Please work independently and draw from knowledge gained in BAI's RMF for DoD IT training class. Good luck!

Please provide your name and email address.

1 / 50

Security Control Characteristics include all except:

2 / 50

What term identifies a control that is partially inherited, partially implemented by the system owner?

3 / 50

Of the following roles, which has the PRIMARY responsibility for conducting remediation actions based on the results of ongoing monitoring activities, assessment of risk, and outstanding items in the Plan of Action & Milestones?

4 / 50

The term 'DoD Components' refers to:

5 / 50

Of the following roles, which has the PRIMARY responsibility for updating the security plan, security assessment report, and Plan of Actions & Milestones based on the results of the continuous Monitoring process?

6 / 50

The legacy terms 'Certification ' and Accreditation' correspond to which two steps of RMF?

7 / 50

What is/are NOT a part of an agency's information security program as mandated by FISMA?

8 / 50

What are the major steps of the Risk Management Framework (RMF)?

9 / 50

Of the following roles, which has the PRIMARY responsibility for reviewing and approving the information system security plan (SP)?

10 / 50

In the multi-tiered risk management process described by NIST, at which level of the process are the information systems depicted?

11 / 50

Which is not an Authorization Decision

12 / 50

In DoD, the Risk Executive Function is performed by:

13 / 50

Of the following roles, which has the PRIMARY responsibility for implementing security controls specified in a security plan?

14 / 50

A tornado is an example of which of the following?

15 / 50

Which of the following roles is responsible for providing overall security protections for a federal government agency?

16 / 50

Which publication replaced the DoDD 8570.01, 'Information Assurance Training Certification and Workforce Management'?

17 / 50

What step in the RMF Lifecycle do you build the system?

18 / 50

What is not included in the DoD Core Security Authorization Spreadsheet?

19 / 50

The failure of the temperature control device for a heating, Ventilation, and air conditioning (HVAC) system is an example of a which of the following:

20 / 50

How are PIT and PIT Systems treated differently under RMF?

21 / 50

Which of the following statements about DoD's implementation of Information Security Continuous Monitoring (ISCM) is most accurate?

22 / 50

Of the following roles, which has PRIMARY responsibility for reporting the security status of an information system to the authorizing official on an ongoing basis in accordance with the monitoring strategy?

23 / 50

What role did the Joint Task Force Transformation Initiative (JTFTI) play in the RMF process?

24 / 50

Who prepares the Security Assessment Plan?

25 / 50

FISMA requires agencies to report annually on the state of their information security program to which of the following organizations?

26 / 50

In which publication will you find the table displaying minimum DoD standards for organization-defined parameters?

27 / 50

Which of the following roles is unique to the DoD implementation of RMF?

28 / 50

System and Services Acquisition controls are found in which family classification?

29 / 50

To whom does the Federal Information Security Management Act (FISMA) 2002 apply?

30 / 50

What is the difference between DISA STIGs and DISA STIG Benchmarks?

31 / 50

The System Security Plan (SSP) indicates the assessment results of each security control as one of these three options:

32 / 50

In the multi-tiered risk management process described by NIST, at which level of the process is the organization depicted?

33 / 50

'Assess Selected Controls Annually' is still part of which RMF step?

34 / 50

Of the following roles, which has the PRIMARY responsibility for determining the risk to organizational operations, organizational assets, individuals, other organizations, or the Nation?

35 / 50

Of the following roles, which has the PRIMARY responsibility for assembling and submitting an authorization package for an information system?

36 / 50

Which guidance states that the systems will complete an initial authorization via NIST RMF prior to ongoing authorization utilizing Information System Continuous Monitoring (ISCM) strategy?

37 / 50

Which of these is a DoD task under the RMF step 'Categorization'?

38 / 50

Which of the following is a required artifact for only systems categorized as moderate or above?

39 / 50

According to DoDI 8510.01, Risk Management Framework for DoD Information Technology, which of the following is a required document in an authorization package?

40 / 50

Which fundamental security property guards against improper information modification or destruction?

41 / 50

Maintenance controls are found in which family classification?

42 / 50

Of the following roles, which has the PRIMARY responsibility for preparing the POA&M for an information system?

43 / 50

Which of the following statements concerning Standalone Information Systems (IS) and Platform Information Technology (PIT) is most accurate?

44 / 50

What is true about SCAP?

45 / 50

In the three-tier RMF governance structure as implemented by DoD, which of the following most accurately describes Tier 3?

46 / 50

Which DoD organization monitors and oversees IS security Practices (including RMF, where applicable) of DoD contractors and vendors processing classified information?

47 / 50

Which of the following is a required artifact for DoD systems containing Personally Identifiable Information?

48 / 50

A 'Type Authorization' includes which of the following requirements:

49 / 50

In order for a security control to be considered as 'inherited' by an information system, which of the following conditions must be met:

50 / 50

What step in the RMF Lifecycle do you document the security control implementation in the security plan?

Your score is