Block 1 Day 4

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 16

flashcard set

Earn XP

Description and Tags

Block 1 Day 4 Review Questions Objective 1G & 1H

17 Terms

1

RMF

incorporates strategy, policy, awareness/training, assessment, continuous monitoring, authorization, implementation, and remediation

New cards
2

RMF Step 1, Prepare

carry out essential activities at the org, mission and business process to help prepare the org to manage its security/privacy risks using RMF, includes the 18 task

New cards
3

RMF Step 2, Categorize System

Impact to confidentiality, integrity, and accessibility is categorized

New cards
4

RMF Step 3, Select security Control

Three distinct types of designations to include common, system-specific, and hybrid

New cards
5

RMF Step 4, Implement Security controls

Specified in the security plan in accordance with guidance found o the KS

New cards
6

RMF Step 5, Assess Security Controls

Develop, review,, and approve a plan to assess the security controls

New cards
7

RMF Step 6, Authorize System

Accreditation decisions, authorization to operate (ATO), Interim Authorization to Test (IATT), Denial pf authorization to Operate(DATO) involves CAT I, II, II

New cards
8

Severity Category - CAT I

Shall be corrected before an ATO is granted

New cards
9

Severity Category - CAT II

shall be corrected or satisfactorily mitigate before an ATO can be granted

New cards
10

Severity Category - CAT III

Does not prevent an ATO

New cards
11

Authorization to Connect (ATC)

allows system to connect to the AFIN or DODI

New cards
12

Denial of Authorization to Connect (DATC)

AF-AO determination an IS cannot connect to the Af-GIG because of an inadequate IA design, if already connected, the IS connection must be terminated

New cards
13

RMF Step 7, Monitor Security Controls

Continuously monitor the system for security-relevant events and configuration change that negatively affect security posture

New cards
14

AIM

Protect the Air Force, DoD and Government networks

New cards
15

ESSA

protect information pertaining to airforce, DOD and government operations

New cards
16

CORA

Mitigate the effects of lost air force, DoD and government operations, capabilities, and resources

New cards
17
New cards

Explore top notes

note Note
studied byStudied by 43 people
736 days ago
5.0(2)
note Note
studied byStudied by 16 people
628 days ago
5.0(2)
note Note
studied byStudied by 21 people
667 days ago
5.0(1)
note Note
studied byStudied by 100 people
661 days ago
5.0(2)
note Note
studied byStudied by 7 people
859 days ago
5.0(1)
note Note
studied byStudied by 59 people
845 days ago
5.0(2)
note Note
studied byStudied by 2 people
20 days ago
5.0(1)
note Note
studied byStudied by 34 people
668 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (23)
studied byStudied by 3 people
89 days ago
4.0(1)
flashcards Flashcard (23)
studied byStudied by 52 people
796 days ago
5.0(4)
flashcards Flashcard (133)
studied byStudied by 174 people
779 days ago
5.0(6)
flashcards Flashcard (112)
studied byStudied by 157 people
112 days ago
5.0(2)
flashcards Flashcard (100)
studied byStudied by 2 people
57 days ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 12 people
23 days ago
5.0(1)
flashcards Flashcard (92)
studied byStudied by 145 people
449 days ago
5.0(2)
flashcards Flashcard (20)
studied byStudied by 1 person
6 days ago
5.0(1)
robot