To ensure an effective product support strategy during which step of the

To ensure an effective product support strategy

This preview shows page 3 - 4 out of 4 pages.

16) To ensure an effective product support strategy, during which step of the Product Support StrategyProcess Model should the PSM gain participation of Government and private-sector subject matterexperts and industry and all appropriate stakeholders, including the Warfighter representatives?[Identify long term supportability and sustainment strategies through the application of the Product Support BusinessModel (PSBM).][Remediation Accessed :N] Form the Product Support Management IPTIntegrate Warfighter Requirements & Support
Background image
Establish/Refine Product Support ArrangementsIdentify/Refine Performance Outcomes 17) In which phase of the life cycle does the Life Cycle Sustainment Plan (LCSP) focus on developingthe execution plan for the design, acquisition, fielding, and competition of sustainment activities todeliver the Product Support Package? [Capture the Product Support Strategy and specific planning and executiondetails in the Life Cycle Sustainment Plan (LCSP).][Remediation Accessed :N] 18) What is the preferred method of controlling environmentally hazardous materials during manufacturing,operations, and disposal? [Identify key federal and DoD policies governing environmental, safety, and health issuesassociated with defense systems acquisition.] 19) The ____________________ provides military intelligence to defense policy makers, force planners andwarfighters in DOD in support of weapons system acquisition. [Identify the intelligence organizations of theIntelligence community and recognize how the IC provides support to an acquisition program.] 20) As part of the Program Protection Plan (PPP), cybersecurity is a critical priority for DoD. Effectivecybersecurity in DoD acquisition programs encompasses all of the necessary actions taken to ensure the_________________ of a system's information to enable warfighting operations. [Recognize how implementingprogram protection, cybersecurity, and counterintelligence requirements into the acquisition strategy help to reduceoverall program risk.] Confidentiality, Integrity and Availability (CIA)Reliability, Availability, and Maintainability (RAM)Suitability and effectiveness Technological superiority Back to Status page
Background image

You've reached the end of your free preview.

Want to read all 4 pages?

  • Fall '16
  • Acquisition Program Baseline, operational test, acquisition strategy, acquisition program, Module 2 Exam 1

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture