Block 1 Day 4

studied byStudied by 0 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 16

flashcard set

Earn XP

Description and Tags

Block 1 Day 4 Review Questions Objective 1G & 1H

17 Terms

1

RMF

incorporates strategy, policy, awareness/training, assessment, continuous monitoring, authorization, implementation, and remediation

New cards
2

RMF Step 1, Prepare

carry out essential activities at the org, mission and business process to help prepare the org to manage its security/privacy risks using RMF, includes the 18 task

New cards
3

RMF Step 2, Categorize System

Impact to confidentiality, integrity, and accessibility is categorized

New cards
4

RMF Step 3, Select security Control

Three distinct types of designations to include common, system-specific, and hybrid

New cards
5

RMF Step 4, Implement Security controls

Specified in the security plan in accordance with guidance found o the KS

New cards
6

RMF Step 5, Assess Security Controls

Develop, review,, and approve a plan to assess the security controls

New cards
7

RMF Step 6, Authorize System

Accreditation decisions, authorization to operate (ATO), Interim Authorization to Test (IATT), Denial pf authorization to Operate(DATO) involves CAT I, II, II

New cards
8

Severity Category - CAT I

Shall be corrected before an ATO is granted

New cards
9

Severity Category - CAT II

shall be corrected or satisfactorily mitigate before an ATO can be granted

New cards
10

Severity Category - CAT III

Does not prevent an ATO

New cards
11

Authorization to Connect (ATC)

allows system to connect to the AFIN or DODI

New cards
12

Denial of Authorization to Connect (DATC)

AF-AO determination an IS cannot connect to the Af-GIG because of an inadequate IA design, if already connected, the IS connection must be terminated

New cards
13

RMF Step 7, Monitor Security Controls

Continuously monitor the system for security-relevant events and configuration change that negatively affect security posture

New cards
14

AIM

Protect the Air Force, DoD and Government networks

New cards
15

ESSA

protect information pertaining to airforce, DOD and government operations

New cards
16

CORA

Mitigate the effects of lost air force, DoD and government operations, capabilities, and resources

New cards
17
New cards

Explore top notes

note Note
studied byStudied by 38 people
910 days ago
4.0(1)
note Note
studied byStudied by 4 people
58 days ago
5.0(1)
note Note
studied byStudied by 72 people
199 days ago
5.0(1)
note Note
studied byStudied by 8 people
954 days ago
5.0(1)
note Note
studied byStudied by 20 people
1006 days ago
4.0(1)
note Note
studied byStudied by 13 people
890 days ago
5.0(1)
note Note
studied byStudied by 34 people
848 days ago
5.0(1)
note Note
studied byStudied by 767 people
708 days ago
4.0(4)

Explore top flashcards

flashcards Flashcard (71)
studied byStudied by 2 people
747 days ago
5.0(1)
flashcards Flashcard (49)
studied byStudied by 3 people
302 days ago
5.0(2)
flashcards Flashcard (27)
studied byStudied by 4 people
828 days ago
5.0(1)
flashcards Flashcard (57)
studied byStudied by 40 people
465 days ago
5.0(1)
flashcards Flashcard (30)
studied byStudied by 34 people
497 days ago
5.0(1)
flashcards Flashcard (25)
studied byStudied by 62 people
793 days ago
5.0(2)
flashcards Flashcard (82)
studied byStudied by 100 people
515 days ago
5.0(1)
flashcards Flashcard (68)
studied byStudied by 97 people
23 days ago
5.0(1)
robot