Strategy Process Model should the PSM gain participation of Government and

Strategy process model should the psm gain

This preview shows page 5 - 6 out of 6 pages.

Strategy Process Model should the PSM gain participation of Government and private-sector subject matter experts and industry and all appropriate stakeholders, including the Warfighter representatives? [Identify long term supportability and sustainment strategies through the application of the Product Support Business Model (PSBM).] Form the Product Support Management IPT Integrate Warfighter Requirements & Support Establish/Refine Product Support Arrangements Identify/Refine Performance Outcomes 18) In which phase of the life cycle does the Life Cycle Sustainment Plan (LCSP) focus on developing the execution plan for the design, acquisition, fielding, and competition of sustainment activities to deliver the Product Support Package? [Capture the Product Support Strategy and specific planning and execution details in the Life Cycle Sustainment Plan (LCSP).] 19) Critical Intelligence Parameters (CIPs) are those key performance thresholds of foreign threat systems, which, if exceeded, could compromise the mission effectiveness of the U.S. system in development. Adversary military doctrine, tactics, strategy, and ______________ of systems should be considered in CIPs. [Identify the intelligence organizations of the Intelligence community and recognize how the IC provides support to an acquisition program.] 20) The Program Manager (PM) should request a Counterintelligence (CI) analysis when an acquisition program containing Critical Program Information (CPI) is initiated. The CI analysis focuses on _____________________ and on how to counter the opposition's collection efforts. [Recognize how implementing program protection, cybersecurity, and counterintelligence requirements into the acquisition strategy help to reduce overall program risk.] How the opposition sees the program
Image of page 5
Software assurance Authentication for allowing access Information systems infrastructure C 1) The risk management process has five activities: [4d. Identify the five activities of the risk management process.]Planning, Identification, Analysis, Handling, and Monitoring Analyzing, Designing, Developing, Testing and Observing Controlling, Alleviating, Assuming, Transferring and Targeting Planning, Controlling, Developing, Mitigating and Monitoring
Image of page 6

You've reached the end of your free preview.

Want to read all 6 pages?

  • Fall '16
  • Project Management, acquisition strategy, risk management process, acquisition program, Evaluation Master Plan

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture