Hardest Trivia Quiz On Information Systems Security Officer!

50 Questions | Total Attempts: 65

SettingsSettingsSettings
Please wait...
Hardest Trivia Quiz On Information Systems Security Officer!

Below is the Hardest Trivia Quiz on Information Systems Security Officer! One of the major characteristics of information systems is there are a lot of threats it faces. The function of an officer in this position is to establish and maintain a corporate-wide information security management program to ensure that information assets are adequately protected. Take the quiz and see how equipped you are for the role.


Questions and Answers
  • 1. 
     What does the acronym MOU stand for?
    • A. 

      Memorandum of Understanding

    • B. 

      Memory of Understanding

    • C. 

      Memorandum on Understanding

    • D. 

      All of the Above

  • 2. 
     What are the requirements of a mobile processing plan at a Government Site?
    • A. 

      The contractor will provide the applicable government sites with a copy of the approved security plan.

    • B. 

      Prior to shipment, the applicable government activity must concur in writing to accept security oversight for a specific IS.

    • C. 

      An approved Memorandum of Understanding (MOU) must be provided if the DSS accredited system will connect to a government accredited system.

    • D. 

      None of the Above

    • E. 

      All of the Above

  • 3. 
     Shipping a mobile system requires 5 days notice prior to shipping a classified system to/from any off-site facility.
    • A. 

      True

    • B. 

      False

  • 4. 
    Security seals will not be affixed when equipment is relocated to detect tampering.
    • A. 

      True

    • B. 

      False

  • 5. 
     Are Mobile Systems with Interim Approval to Operate (IATO) allowed to relocate to a different facility? If so, who has to grant permission?
    • A. 

      Yes. Defense Security Service (DSS)

    • B. 

      Yes. Regional Designated Approval Authority (RDAA)

    • C. 

      No Mobility without a full ATO

    • D. 

      No. Information System Security Officer (ISSO)

  • 6. 
     A Mobile Processing Plan is required for equipment relocated to an area outside of its primary facility.
    • A. 

      True

    • B. 

      False

  • 7. 
    Why are Trusted Downloads completed?
  • 8. 
    What is Human-Readable Output Review?
  • 9. 
    What are the DSS authorized File Types and Formats for a Trusted Download?
  • 10. 
    Users shall be required to authenticate their identities at logon. This is accomplished by entering their password in conjunction with their user identification prior to the execution of any application or utility on the system. What is this called?
    • A. 

      Password Authentication

    • B. 

      Authentication at Logon

    • C. 

      Unique Identification

    • D. 

      None of the Above

  • 11. 
    Why is it important to introduce yourself to the Program Manager and System Administrator?
    • A. 

      To ensure you know who the point of contact is for that system as well as who to contact when an issue arises on your system.

    • B. 

      Because you’re working relationship with the program and system administrator are essential to the function of the system.

    • C. 

      Allows a face to face meeting with each person to ensure they know who to contact if they have any issues or questions.

    • D. 

      All of the Above

  • 12. 
    Why are DEM 6700 Forms used?
  • 13. 
    Who signs the DEM 6700 forms?
    • A. 

      ISSM/ISSO

    • B. 

      User/System Administrator

    • C. 

      ISSO/System Administrator

    • D. 

      User/Manager

  • 14. 
    Who signs the completed User Briefing Acknowledgement?
  • 15. 
    Who signs an ISSO or AISSO user briefing?
  • 16. 
    Who is responsible for filling out a DEM 6700 Form?
  • 17. 
    Who is responsible for briefing a user and managing an account on a classified system?
    • A. 

      ISSO

    • B. 

      ISSM

    • C. 

      User

    • D. 

      None of the Above

  • 18. 
    Where can you download an SSP from?
    • A. 

      Remedy Database

    • B. 

      Enterprise Product Data Management (EPDM)

    • C. 

      Information Assurance Center of Excellence (IA COE)

    • D. 

      IDE

  • 19. 
    Where are user briefings found?
  • 20. 
    Where are the completed forms sent to be processed?
  • 21. 
    Where are Maintenance Logs located?
  • 22. 
    When are NSCC briefings completed? 
  • 23. 
    What two categories do Mobile Systems fall under?
  • 24. 
    What is the Enterprise Product Data Mangement System?
    • A. 

      It is a newly created program that will be used to implement common processes and tools to manage the product development process.

    • B. 

      It will allow users to work seamlessly on engineering programs

    • C. 

      It will be used to download and upload completed SSPs and profiles for classified systems.

    • D. 

      All of the Above

  • 25. 
    What is the DSS Form Letter 16 used for?
Back to Top Back to top