Cyberspace Operations
Mission Assurance
Critical Infrastructure
FMA-C
MRT-C
100

What are the three types of ownership in cyberspace

Blue, grey, red

100

What are the five core functions of the NIST CSF Core

ID, protect, detect, respond, recover

100

How does OT differ from IT

IT has to do with the flow of data and information whereas OT deals with connectivity between devices and how the devices themselves work together

100

What is the key output of FMA-C

MRT-C

100

How does KT-C differ from MRT-C

KT-C is specific and can be a single thing while MRT-C is an overarching big picture of everything

200

What are the 4 challenges to DoD cyberspace

Geography, technology, private industry and public infrastructure, globalization

200

What are the 5 standard teamwork roles

Host analyst, network analyst, intel, mission rep, leadership

200

What's the definition of operational technology?

Technologies involving interconnected devices and computers that monitor or control physical processes, whereas IT systems focus on the flow of information and data.

200

Who determines if a loss is unacceptable

Mission owner

200

Why is defining KT-C difficult

It is constantly changing and is situation dependent

300

What are the technical and non-technical means to attribute cyber attacks

IP address (geographical), TTPs, level of sophistication, political goals / interests

300

What are the three sub-components of profile

Business objectives, threat environment, and requirements and controls

300

What are the 4 components of Cyber Physical Systems and what do they do

Sensors, actuators, controller, communications network

300

What is a constraint in FMA-C and what are they for

Things to do, made in order to keep out of hazardous states

300

What is MRT-C

All devices, internal and external links, operating systems, services, applications, ports, protocols, hardware, software etc. of a system required to enable function of a critical asset. May exist external to the DOD cyberspace

400

What are the 4 threats to DoD Cyberspace

State actors, non-state answers, individuals, accidents and natural hazards

400

What are the 3 sub-components of tiers

Risk management process

integrated risk management program

external participation

400

Whats USCYBERCOMs role in cybersecurity

Hunt forward and defend forward by conducting persistent engagement of adversaries in cyberspace below the threshold of armed conflict

400

What are the three components of strategic thinking, describe each of them

Creative thinking, critical thinking, systems thinking

400

What are the three primary elements of the wheel of access. Describe each

Over the air, mission support systems, mission systems

500

What are the three dimensions of the Information Environment (IE) model? What are their corollary dimensions in Cyberspace Operations (CO) layer model?

Cognitive (human centric), information (data centric), physical (real-world, tangible)

Cyber persona layer, logical-network layer, physical layer

500

What are the 4 pillars of DoD MA

ID / prioritize key missions, assets, and functions

Develop / implement MA risk management construct

Use risk-informed decision making

Partner w non-DoD entities

500

What cybersecurity services does the NSA provide

Develop offensive + defensive cyber capabilities, 

Provide cryptographic products + services

Conducts threat assessments on USG networks / info services

Provides reports on cyber intelligence (SIGINT)

500

How is a mission statement structured and what is the difference between a tame and wicked problem

Purpose + means + goal. Tame problems have are simple, have a definite answer and cause. Wicked problems are complex, have answers more like better or worse rather than correct or wrong, and have a variety of causes

500

How does the Air Force model MRT-C

Wheel of access

M
e
n
u