Task 1
Task 2
Task 3
Task 4
Task 5
100

This is the collection of documents used by an Authorizing Official to decide if a system’s risk is acceptable.

What is an Authorization Package?

100

What risk level refers to minor impact and disruption

What is a low-level risk?

100

This RMF task focuses on deciding how to handle identified risks.
 

What is Risk Response (Task 3 / R-3)?

100

This role is responsible for cybersecurity and protecting systems from threats.

What is a CISO (Chief Information Security Officer)?

100

This is the process of reporting the final authorization decision for a system

What is Authorization Reporting? 

200

 This role is responsible for submitting the completed authorization package to the Authorizing Official in Task R-1 
 

 Who is the System Owner?

200

This is the official senior (federal) official or executive with the authority to formally assume responsibility for operating information systems.  

What is the authorizing official (AO)?

200

This is the main goal of Risk Response after risks have been identified.

 

What is taking action on risks?

200

This executive focuses on IT systems and ensures technology supports business goals.
 

Question: What is a CIO (Chief Information Officer)?

200

This is the decision that tells whether a system is approved to operate or not.

What is an authorizing decision?

300

This document, found in the Authorization package, contains the results of security control testing performed during the assessment phase.
 

 What is the Security Assessment Report (SAR)?

300

This concept refers to how much risk an organization is willing to accept

What is risk tolerance?

300

 These are the four strategies used to handle risk.
 

What are accept, mitigate, transfer, and avoid?

300

This is the official decision that allows a system to operate after risk is accepted.
 

What is an Authorization to Operate (ATO)?

300

The 3 main authorizing decisions are 

What is approved, denied, or conditionally approved? 

400

This document, found in the Authorization package, tracks system weaknesses, assigns responsibility, and includes timelines for remediation.
 

What is the Plan of Action and Milestones (POA&M)?

400

This concept refers to the organizations evaluate the likelihood and impact of threat events to determine the overall risk level.


What is risk determination

400

This strategy involves reducing risk by implementing controls or safeguards.
 

What is risk mitigation?

400

This type of authorization allows a system to operate temporarily, even though some risk is still unacceptable.
 

What is an Interim Authorization to Operate (IATO)?

400

 This is the authorization status recorded for organizational tracking?

What is System Registry?

500

This document, found in the Authorization package, describes the system’s purpose and how its security controls are implemented.

What is the System Security Plan (SSP)?

500

This concept refers to identifying, evaluating, and prioritizing potential threats to determine their likelihood and impact, enabling proactive risk mitigation. 

What is risk analysis?

500

This strategy eliminates the activity that causes the risk.
 

What is risk avoidance?

500

This RMF Step 5 task involves deciding whether the remaining risk to operations, assets, or individuals is acceptable.
 

What is Accept Risk (Task 4)?

500

This is the type of control deficiency that must be reported during Task R-5? 


What is a Significant Security or Privacy Risk?

M
e
n
u