Hardest Trivia Quiz On Information Systems Security Officer!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Madinolf
M
Madinolf
Community Contributor
Quizzes Created: 1 | Total Attempts: 158
| Attempts: 158 | Questions: 72
Please wait...
Question 1 / 72
0 %
0/100
Score 0/100
1. What are the DSS authorized File Types and Formats for a Trusted Download?

Explanation

Use commas to seperate each one

Submit
Please wait...
About This Quiz
Hardest Trivia Quiz On Information Systems Security Officer! - Quiz

Below is the Hardest Trivia Quiz on Information Systems Security Officer! One of the major characteristics of information systems is there are a lot of threats it faces. The function of an officer in this position is to establish and maintain a corporate-wide information security management program to ensure that... see moreinformation assets are adequately protected. Take the quiz and see how equipped you are for the role. see less

Personalize your quiz and earn a certificate with your name on it!
2. Where are the completed forms sent to be processed?

Explanation

one word answer

Submit
3. What two categories do Mobile Systems fall under?

Explanation

use a comma to seperate answers

Submit
4. What is the DSS Form Letter 16 used for?

Explanation

The DSS Form Letter 16 is used when an accredited system needs to be relocated to a Government site and will remain there overnight or for a longer period of time. This form is likely used to inform the appropriate authorities and obtain any necessary approvals or permissions for the relocation.

Submit
5. What is a Trusted Download?

Explanation

A Trusted Download refers to a set of procedures that allow information to be released at a level below the accredited level of the Information System (IS). This means that certain information can be accessed and downloaded by individuals who may not have the highest level of authorization or clearance. These procedures ensure that the information is still protected and secure, even when accessed by individuals with lower levels of clearance.

Submit
6. If a mobile system is connected to a separately accredited system at the remote location it will be treated as an Interconnected LAN.  What is required prior to this connection occurring?

Explanation

Do not use acronym for answer. Spell out each word.

Submit
7. How long is the Letter 16 valid for?

Explanation

The Letter 16 is valid for the entire duration of the contract or system accreditation. This means that it remains valid as long as the contract or accreditation is in effect. There is no specific time limit mentioned, indicating that the validity extends for the entire duration of the contract or accreditation.

Submit
8. How do you audit a classified system?

Explanation

not-available-via-ai

Submit
9. Does a user requesting the installation of a specific type of software have to place a Help Desk Ticket prior to the software being added to their machine?

Explanation

The correct answer is true because in most organizations, users are required to place a help desk ticket to request the installation of any software on their machine. This helps the IT department keep track of software installations, ensure compatibility, and manage licensing. It also allows the help desk to prioritize and schedule software installations based on the needs and resources of the organization.

Submit
10. Define what a "Unique Identification" means:

Explanation

A "Unique Identification" refers to a distinct identity that is assigned to each user. This identity is linked to all the actions that the individual takes, making it possible to track and audit their activities. This ensures accountability and allows for the identification of specific users responsible for certain actions.

Submit
11. An ISSO is responsible for verifying that the information provided on the Software Installation Request (SIR) is accurate before passing the SIR to their Information System Security Manager (ISSM)?

Explanation

The ISSO (Information System Security Officer) is responsible for verifying the accuracy of the information provided on the Software Installation Request (SIR) before passing it to the ISSM (Information System Security Manager). This ensures that the information being provided is correct and meets the necessary security requirements before any software installation takes place.

Submit
12. In order to search for a help desk ticket, you first need to go to Remedy's homepage and click on HD_ISC Ticket (Search)?

Explanation

To search for a help desk ticket, you need to go to Remedy's homepage and click on HD_ISC Ticket (Search). This suggests that the statement "True" is the correct answer as it accurately describes the necessary steps to perform the search.

Submit
13. Why is it important to introduce yourself to the Program Manager and System Administrator?

Explanation

It is important to introduce yourself to the Program Manager and System Administrator because it ensures that you know who the point of contact is for the system and who to reach out to in case of any issues or questions. Additionally, establishing a working relationship with these individuals is crucial for the smooth functioning of the system. Introducing yourself in person allows for a face-to-face meeting, which can help build rapport and facilitate effective communication. Therefore, all of the above reasons make it important to introduce yourself to the Program Manager and System Administrator.

Submit
14. Prior to installation, the ISSM or appointed designee must approve all software unless already approved, both new and modifications to previously installed software.

Explanation

The statement is stating that prior to installation, the ISSM or appointed designee must approve all software, whether it is new or a modification to previously installed software. This means that any software that is being installed on the system needs to be approved by the ISSM or their designee. Therefore, the correct answer is True.

Submit
15. A help desk ticket is an information and assistance resourced used to troubleshoot problems with computers?

Explanation

A help desk ticket is indeed an information and assistance resource used to troubleshoot problems with computers. It is a way for users to report issues they are facing with their computers or software, and for the help desk team to track and address these problems. The ticket typically includes details about the issue, such as error messages or symptoms, and allows the help desk team to prioritize and efficiently resolve the problem.

Submit
16.  What does the acronym MOU stand for?

Explanation

An MOU stands for Memorandum of Understanding. It is a formal agreement between two or more parties that outlines the terms and details of their mutual understanding and cooperation. It is often used in business, government, and international relations to establish a framework for collaboration, joint projects, or partnerships. The other options, Memory of Understanding and Memorandum on Understanding, are not correct acronyms for MOU. Therefore, the correct answer is Memorandum of Understanding.

Submit
17. A Software Installation Request (SIR) is submitted by a specific program to our License Management Team to add a certain type of software onto a classified system.

Explanation

A Software Installation Request (SIR) is indeed submitted by a specific program to the License Management Team to add a certain type of software onto a classified system. This process ensures that only authorized software is installed on the system and helps maintain security and compliance.

Submit
18. Active users are re-briefed at least once a year unless a security incident occurs?

Explanation

Active users are re-briefed at least once a year unless a security incident occurs. This means that all active users receive a briefing at least once every year, unless there is a security incident that requires them to be briefed more frequently. This ensures that users are kept up to date with the latest security protocols and measures, helping to maintain a secure environment.

Submit
19.  A Mobile Processing Plan is required for equipment relocated to an area outside of its primary facility.

Explanation

A Mobile Processing Plan is necessary when equipment is moved to a location outside of its main facility in order to ensure that the equipment can continue to function properly and efficiently. This plan includes provisions for setting up the necessary infrastructure, such as power supply and network connectivity, in the new location. It also outlines the steps and procedures for safely transporting and reinstalling the equipment. Therefore, it is true that a Mobile Processing Plan is required for equipment relocated to an area outside of its primary facility.

Submit
20. Privileged users have access to IS control, monitoring or administration functions.

Explanation

Privileged users are individuals who have elevated access rights or permissions within a system or organization. These users typically have the ability to control, monitor, or administer various aspects of the information system. This includes tasks such as managing user accounts, configuring security settings, and monitoring system performance. Therefore, it is true that privileged users have access to IS control, monitoring, or administration functions.

Submit
21. Prior to installation on an accredited system, software that is received directly from the vendor and installed into a protected environment does not have to be screened or tested.

Explanation

Software that is received directly from the vendor and installed into a protected environment still needs to be screened or tested prior to installation on an accredited system. This is because even though the software comes directly from the vendor, it can still contain potential vulnerabilities or malicious code that could compromise the security of the accredited system. Therefore, it is important to screen or test the software before installation to ensure its safety and compatibility with the protected environment.

Submit
22. What does SSP stand for?

Explanation

The correct answer is System Security Plan. A System Security Plan (SSP) is a document that outlines the security controls and procedures for a specific system or network. It provides a comprehensive overview of the security measures in place to protect the system from potential threats and vulnerabilities. The SSP includes details such as risk assessments, security requirements, incident response procedures, and security training programs. It is an essential component of an organization's overall security program and helps ensure the confidentiality, integrity, and availability of the system and its data.

Submit
23. Who signs an ISSO or AISSO user briefing?

Explanation

one word answer

Submit
24. Who is responsible for briefing a user and managing an account on a classified system?

Explanation

The ISSO (Information System Security Officer) is responsible for briefing a user and managing an account on a classified system. They ensure that users are properly trained and informed about the system's security protocols and procedures. The ISSO also manages user accounts, granting access and privileges based on the user's role and responsibilities. This helps to maintain the confidentiality, integrity, and availability of the classified system and its information.

Submit
25. Passwords shall be protected at a level commensurate with the sensitivity level or classification level and classification category of the information which they allow access?

Explanation

This statement is true because passwords should be protected at a level that matches the sensitivity or classification level of the information they provide access to. Passwords act as a security measure and help prevent unauthorized access to sensitive information. Therefore, it is important to ensure that the level of protection for passwords aligns with the sensitivity of the information they protect.

Submit
26. All special briefing requirements can be verified through the contract document and/or with form DD254.

Explanation

The correct answer is true because special briefing requirements can indeed be verified through the contract document and/or with form DD254. These documents outline the specific instructions and guidelines for conducting briefings, ensuring that all necessary information is communicated effectively. By referring to these documents, individuals can confirm the requirements and ensure compliance with the contract terms.

Submit
27. When performing a search for a specific piece of equipment, you are restricted to just searching by bar tag?

Explanation

When performing a search for a specific piece of equipment, you are not restricted to just searching by bar tag. There may be other search criteria available such as equipment name, model number, or other identifying information. Therefore, the correct answer is False.

Submit
28. Audit Logs are backed up to ensure there is a record of this audit data just in case the system fails and all data is lost.

Explanation

Audit logs are essential for maintaining a record of all activities and changes within a system. Backing up these logs ensures that even if the system fails or all data is lost, the audit data remains intact. This helps in maintaining data integrity, investigating security breaches, and complying with regulatory requirements. Therefore, it is crucial to back up audit logs to ensure the availability and reliability of this important information.

Submit
29. Who signs the completed User Briefing Acknowledgement?

Explanation

one word answer

Submit
30. Audit Logs track any problems that have occurred during your weekly audit of that particular classified system.

Explanation

Audit Logs are used to track any problems or issues that have occurred during an audit. In this case, the audit is being conducted on a specific classified system. By keeping track of the audit logs, any problems or irregularities can be identified and addressed. Therefore, the statement that Audit Logs track any problems that have occurred during the weekly audit of the classified system is true.

Submit
31. Anti-virus software is considered to be security relevant software on a classified system?

Explanation

Anti-virus software is considered to be security relevant software on a classified system because it plays a crucial role in protecting the system from potential threats and malicious activities. It helps to detect, prevent, and remove viruses, malware, and other harmful software that can compromise the security and integrity of the classified system. By regularly scanning and monitoring the system, anti-virus software ensures that any potential security vulnerabilities are identified and addressed promptly, thus maintaining the confidentiality and availability of classified information. Therefore, it is essential to have anti-virus software installed and updated on a classified system to ensure its security.

Submit
32. There are 5 common Operating Systems used on a classified system?

Explanation

The statement is true because there are indeed 5 common operating systems used on a classified system. However, without further information, it is not possible to determine which specific operating systems are being referred to.

Submit
33. Name the five documents that are required in order to ship a classified system?

Explanation

The correct answer is "All of the Above" because all five documents - Signed Mobile Letter, System Diagram, Accreditation Letter, Mobile Processing Plan, and Transportation Plan - are required in order to ship a classified system. These documents ensure that the system is properly authorized, planned, and transported in a secure manner.

Submit
34.  Shipping a mobile system requires 5 days notice prior to shipping a classified system to/from any off-site facility.

Explanation

This statement suggests that it is necessary to provide a 5-day notice before shipping a classified system to or from any off-site facility. This implies that there is a specific protocol or process in place for handling classified systems during shipping, and it is important to adhere to this timeline to ensure proper security measures are taken.

Submit
35. If a user's need-to-know, clearance level, or employment status changes, what steps should be taken to protect your classified systems?

Explanation

When a user's need-to-know, clearance level, or employment status changes, it is important to take multiple steps to protect classified systems. First, the user should be terminated from the user list to ensure they no longer have access to the systems. Additionally, their accounts should be disabled to prevent any unauthorized access. Finally, changing all combinations on storage devices adds an extra layer of security by preventing any potential access. Therefore, all of the above steps should be taken to protect classified systems when these changes occur.

Submit
36. If a system requests to stay offsite for longer period of time, what three options are available to the ISSM:

Explanation

The system can be transferred to the gaining ISSM for accreditation under that location's cage code. Alternatively, a request and justification can be submitted to extend the relocation period beyond 120 days, with a specified return or transfer date. Lastly, the system can be returned to the owning facility. Therefore, all of the above options are available to the ISSM.

Submit
37. What is the Enterprise Product Data Mangement System?

Explanation

The Enterprise Product Data Management System is a comprehensive program that encompasses various functionalities. It is designed to implement common processes and tools for managing the product development process. This system enables users to work seamlessly on engineering programs, ensuring efficient collaboration and productivity. Additionally, it facilitates the downloading and uploading of completed SSPs (System Security Plans) and profiles for classified systems. Overall, the Enterprise Product Data Management System encompasses all of the mentioned functionalities.

Submit
38. What is a nomination letter used for?

Explanation

A nomination letter is used to propose and recommend someone for a specific position, in this case, an ISSO/AISSO position. It serves as a formal way to highlight the qualifications, skills, and achievements of the individual being nominated, and express support for their candidacy. The letter typically includes details about the nominee's experience, expertise, and suitability for the position, and may also include testimonials or endorsements from others. The purpose of the nomination letter is to persuade the decision-makers to consider and select the nominee for the desired position.

Submit
39. The definition of a hardware list is any piece of equipment that is not associated with that particular classified system and is not marked appropriately?

Explanation

A hardware list refers to a list of equipment that is associated with a particular classified system and is marked appropriately. Therefore, the statement that a hardware list is any piece of equipment that is not associated with that particular classified system and is not marked appropriately is false.

Submit
40. When you are trying to search for a System's complete inventory, the use of the_________drop down menu allows you to find the correct SSP number.

Explanation

The correct answer is AISSP. When searching for a system's complete inventory, using the AISSP drop-down menu allows you to find the correct SSP number. This suggests that AISSP is a specific and relevant option in the drop-down menu that helps in locating the correct SSP number for the system's inventory.

Submit
41. How often are user briefings completed?

Explanation

User briefings are completed once per year. This means that they are conducted annually, providing users with updates, information, and any necessary training. This frequency allows for regular communication and ensures that users are kept informed and knowledgeable about the relevant topics. By completing user briefings once per year, organizations can maintain consistency and ensure that users are up to date with any changes or developments in their field.

Submit
42. Security seals will not be affixed when equipment is relocated to detect tampering.

Explanation

This statement is false because security seals are actually affixed when equipment is relocated in order to detect any tampering. The purpose of security seals is to provide evidence of any unauthorized access or tampering with the equipment during transportation or relocation. Therefore, the correct answer is False.

Submit
43. All system Audit Logs are backed up onto a CD and/or a DVD depending on the size of the audit data?

Explanation

This statement suggests that all system Audit Logs are indeed backed up onto a CD and/or a DVD, with the choice between the two depending on the size of the audit data. Therefore, the answer is true.

Submit
44. Under the new ODAA requirements passwords for a classified system should be at a minimum 12 characters long and will only be valid for no longer than 365 days?

Explanation

The statement is false because under the new ODAA requirements, passwords for a classified system should be at a minimum of 12 characters long, but they do not have a specified validity period of 365 days.

Submit
45. Like the AISSP view, you can search on any of the fields, but we primarily search using the_____ ________, last name or location. 

Explanation

The given correct answer is "ticket number". This means that when searching in the AISSP view, you have the option to search using any of the fields such as first name, last name, or location. However, the primary method of searching is using the ticket number. This suggests that the ticket number is a unique identifier that is commonly used to search and retrieve information in the AISSP view.

Submit
46.  What are the requirements of a mobile processing plan at a Government Site?

Explanation

The correct answer is "All of the Above". This means that all of the listed requirements are necessary for a mobile processing plan at a Government Site. The contractor must provide an approved security plan, the government activity must agree to accept security oversight, and an approved Memorandum of Understanding (MOU) must be provided if the system will connect to a government accredited system.

Submit
47. Why are DEM 6700 Forms used?

Explanation

The DEM 6700 forms are used to create a record or paper trail for a piece of equipment that will become classified. This means that these forms are used to document the process of classifying a piece of equipment, ensuring that there is a clear record of the classification and any associated information. This helps to maintain accountability and traceability for classified equipment.

Submit
48. Name of the five common Operating Systems associated with a classified system.

Explanation

use commas to seperate answers. No spaces in between answers

Submit
49. The anti-virus on a classified system are updated on a as needed basis?

Explanation

The statement suggests that the anti-virus on a classified system are updated on an as-needed basis. However, the correct answer is False. This means that the statement is not true. The anti-virus on a classified system is typically updated regularly and not just on an as-needed basis. Regular updates are necessary to ensure that the system is protected against the latest threats and vulnerabilities.

Submit
50. A mobile system can be offsite for no more than:

Explanation

A mobile system can be offsite for a maximum of 120 days. This means that it cannot be away from its designated location for more than four months. This limitation ensures that the mobile system remains accessible and available for use within a reasonable timeframe. Going beyond this timeframe may result in disruptions or delays in accessing the system, which can have negative consequences for its functionality and usability.

Submit
51. The NSCC Asset Information System is used to track classified inventory only?

Explanation

The NSCC Asset Information System is not used solely to track classified inventory. It is likely used to track all types of inventory, including both classified and unclassified items. Therefore, the statement that it is used to track classified inventory only is false.

Submit
52. Where can you download an SSP from?

Explanation

The correct answer is Enterprise Product Data Management (EPDM) because it is the specific platform or system where you can download an SSP (System Security Plan). The other options listed, such as Remedy Database, IA COE, and IDE, are not typically used for downloading an SSP.

Submit
53. Users shall be required to authenticate their identities at logon. This is accomplished by entering their password in conjunction with their user identification prior to the execution of any application or utility on the system. What is this called?

Explanation

The process described in the question is commonly known as "Authentication at Logon". It involves users verifying their identities by entering their password and user identification before accessing any application or utility on the system. This authentication process ensures that only authorized individuals can access the system and its resources. The other options, such as "Password Authentication" and "Unique Identification", are not as comprehensive or accurate in describing the specific process mentioned in the question.

Submit
54. What is Human-Readable Output Review?

Explanation

not-available-via-ai

Submit
55. Who is responsible for filling out a DEM 6700 Form?

Explanation

The System Administrator is responsible for filling out a DEM 6700 Form. As the person in charge of managing and maintaining the computer system, the System Administrator has the necessary knowledge and access to complete the form accurately. They are responsible for ensuring that all required information is provided and that the form is filled out correctly according to the guidelines and procedures in place.

Submit
56. What are maintenance Logs?

Explanation

not-available-via-ai

Submit
57. Define Mobility?

Explanation

not-available-via-ai

Submit
58. Who signs the DEM 6700 forms?

Explanation

The ISSO/System Administrator signs the DEM 6700 forms.

Submit
59. How often are audits completed?

Explanation

Audits are completed on a weekly basis. This means that they are conducted every week to assess and evaluate the financial records, processes, and compliance of an organization. Conducting audits weekly allows for regular monitoring and identification of any potential issues or discrepancies, ensuring that corrective actions can be taken promptly. It also helps in maintaining transparency, accuracy, and accountability in the financial operations of the organization.

Submit
60. When logging in to Remedy database your account log on and password are the same as your NT log on and password?

Explanation

The explanation for the correct answer "True" is that when logging in to the Remedy database, the account log on and password are the same as the NT (Network Logon) log on and password. This means that users can use their existing NT credentials to access the Remedy database without having to create a separate account or password.

Submit
61.  Are Mobile Systems with Interim Approval to Operate (IATO) allowed to relocate to a different facility? If so, who has to grant permission?

Explanation

Mobile systems with Interim Approval to Operate (IATO) are allowed to relocate to a different facility. The Regional Designated Approval Authority (RDAA) is the entity that has to grant permission for the relocation.

Submit
62. In an audit log, the resolution to problems that might have occurred is added to this log. This is done to show the DoD that you have found a potential problem and have rectified any issues.

Explanation

In an audit log, the resolution to problems that might have occurred is not added to the log. The purpose of an audit log is to document and track any changes or actions taken, but it does not necessarily include the resolution to problems. The audit log serves as a record of events and can be used to demonstrate compliance or identify any potential issues, but the actual resolution would typically be documented elsewhere.

Submit
63. What are the requirements of a mobile processing plan at a contractor's site? 

Explanation

The requirements of a mobile processing plan at a contractor's site include identifying the system, listing relocation site(s) and type of site, listing how the equipment, dedicated software, and all classified information will be transported and safeguarded, providing a statement that only an appropriately cleared employee of the contractor holding the Accreditation Letter will act as the ISSO for the system during relocation, providing the receiving location with a copy of the SSP and the IS Accreditation Letter, retaining security cognizance for IS under control of a cleared contractor while it is in transit, and ensuring that a copy of the SSP and accreditation letter accompanies the IS during travel.

Submit
64. How often are back ups completed on a classified system?

Explanation

Back ups on a classified system are completed on a monthly basis. This means that the system is backed up once every month to ensure that any data or information stored on the system is protected and can be recovered if needed. This regular schedule of back ups helps to minimize the risk of data loss and ensures the system's integrity and security.

Submit
65. Remedy's standard view consists of four tabbed pages. Below is a list of potential tabbed pages. 

Explanation

The correct answer includes the tabbed pages that are part of Remedy's standard view. These pages are Asset Information Tab, AISSP Security Log, Change History, and Purchasing.

Submit
66. Where are user briefings found?

Explanation

This questions pertains to the SSP

Submit
67. Where are Maintenance Logs located?

Explanation

Maintenance logs are typically located in a folder on the "S drive" that is specific to the classified system. However, there may be some cases where maintenance logs are tracked differently, so it is recommended to consult with the training ISSO (Information System Security Officer) for verification. This arrangement allows for easy access and updating of the maintenance log by the ISSO or AISSO (Alternate Information System Security Officer).

Submit
68. When are NSCC briefings completed? 

Explanation

not-available-via-ai

Submit
69. What is a DEM 6700 Form?

Explanation

not-available-via-ai

Submit
70. How do you back up audit logs on a classified system?

Explanation

The correct answer suggests that to back up audit logs on a classified system, the audit records for a specific month should be taken and stored on media. This ensures that the audit logs are preserved and can be accessed if needed for compliance or investigation purposes.

Submit
71. Why are Trusted Downloads completed?

Explanation

Trusted Downloads are completed to verify that the information being released from the information system below the accredited level does not contain any classified information that may be concealed within the document. This process helps to maintain the integrity and security of the information system by ensuring that only authorized and non-sensitive information is released.

Submit
72. What is Media Review?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 08, 2011
    Quiz Created by
    Madinolf
Cancel
  • All
    All (72)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What are the DSS authorized File Types and Formats for a Trusted...
Where are the completed forms sent to be processed?
What two categories do Mobile Systems fall under?
What is the DSS Form Letter 16 used for?
What is a Trusted Download?
If a mobile system is connected to a separately accredited system at...
How long is the Letter 16 valid for?
How do you audit a classified system?
Does a user requesting the installation of a specific type of software...
Define what a "Unique Identification" means:
An ISSO is responsible for verifying that the information provided on...
In order to search for a help desk ticket, you first need to go to...
Why is it important to introduce yourself to the Program Manager and...
Prior to installation, the ISSM or appointed designee must approve all...
A help desk ticket is an information and assistance resourced used to...
 What does the acronym MOU stand for?
A Software Installation Request (SIR) is submitted by a specific...
Active users are re-briefed at least once a year unless a security...
 A Mobile Processing Plan is required for equipment relocated to...
Privileged users have access to IS control, monitoring or...
Prior to installation on an accredited system, software that is...
What does SSP stand for?
Who signs an ISSO or AISSO user briefing?
Who is responsible for briefing a user and managing an account on a...
Passwords shall be protected at a level commensurate with the...
All special briefing requirements can be verified through the contract...
When performing a search for a specific piece of equipment, you are...
Audit Logs are backed up to ensure there is a record of this...
Who signs the completed User Briefing Acknowledgement?
Audit Logs track any problems that have occurred during your weekly...
Anti-virus software is considered to be security relevant software on...
There are 5 common Operating Systems used on a classified system?
Name the five documents that are required in order to ship a...
 Shipping a mobile system requires 5 days notice prior to...
If a user's need-to-know, clearance level, or employment status...
If a system requests to stay offsite for longer period of...
What is the Enterprise Product Data Mangement System?
What is a nomination letter used for?
The definition of a hardware list is any piece of equipment that is...
When you are trying to search for a System's complete inventory,...
How often are user briefings completed?
Security seals will not be affixed when equipment is relocated to...
All system Audit Logs are backed up onto a CD and/or a DVD depending...
Under the new ODAA requirements passwords for a classified system...
Like the AISSP view, you can search on any of the fields, but we...
 What are the requirements of a mobile processing plan at a...
Why are DEM 6700 Forms used?
Name of the five common Operating Systems associated with a classified...
The anti-virus on a classified system are updated on a as needed...
A mobile system can be offsite for no more than:
The NSCC Asset Information System is used to track classified...
Where can you download an SSP from?
Users shall be required to authenticate their identities at logon....
What is Human-Readable Output Review?
Who is responsible for filling out a DEM 6700 Form?
What are maintenance Logs?
Define Mobility?
Who signs the DEM 6700 forms?
How often are audits completed?
When logging in to Remedy database your account log on and password...
 Are Mobile Systems with Interim Approval to Operate (IATO)...
In an audit log, the resolution to problems that might have occurred...
What are the requirements of a mobile processing plan at a...
How often are back ups completed on a classified system?
Remedy's standard view consists of four tabbed pages. Below is a...
Where are user briefings found?
Where are Maintenance Logs located?
When are NSCC briefings completed? 
What is a DEM 6700 Form?
How do you back up audit logs on a classified system?
Why are Trusted Downloads completed?
What is Media Review?
Alert!

Advertisement