System specific Validated Online Lifecycle Threat VOLT reports are required to

System specific validated online lifecycle threat

This preview shows page 16 - 19 out of 42 pages.

19) System-specific Validated Online Lifecycle Threat (VOLT) reports are required to be kept current and validated throughout the acquisition process. All Major Defense Acquisition Programs (MDAPs) must have a validated VOLT in place at: [Identify the intelligence organizations of the Intelligence community and recognize how the IC provides support to an acquisition program.]Milestone A (TMRR Phase) Milestone B (EMD Phase) IOC (O&S Phase) FRP (P&D Phase) 20) The purpose of the Program Protection Plan (PPP) is to help programsensure that they adequately protect their technology, components, andinformation. It is used to develop __________________ for dissemination andimplementation throughout the program for which it is created. [Recognizehow implementing program protection, cybersecurity, and counterintelligence requirements into theacquisition strategy help to reduce overall program risk.][Remediation Accessed :N] Tailored protection guidanceCounterintelligence analytical productsSystem security engineering plansUpdated criticality analysis1) Who would certify the interoperability performance of a command and control system used by both the Army and the Navy? [Identify the key T&E support organizations within DoD.]
Background image
and Evaluation Activity (OPTEVFOR)Joint Requirements Oversight Council (JROC) 2) What documentation must be completed prior to a milestone review for a program that will significantly affect the quality of the environment?[Identify the information required for a milestone review regarding environmental, safety, and occupational health issues.] 4) Barriers to successful implementation of Integrated Product and Process Development (IPPD) include the following (Select all that apply): [Identify the barriers to successful Integrated Product Team (IPT) implementation.]
Background image
Agencies (OTAs).] FalseTrue6) The Program Manager (PM) should request a Counterintelligence (CI) analysis when an acquisition program containing Critical Program Information (CPI) is initiated. The CI analysis focuses on _____________________ and on how to counter the opposition's collection efforts. [Recognize how implementing program protection, cybersecurity, and counterintelligence requirements into the acquisition strategy help to reduce overall program risk.]
Background image
Image of page 19

You've reached the end of your free preview.

Want to read all 42 pages?

  • Fall '16
  • operational test, Operational Test and Evaluation, Director, Operational Test & Evaluation

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture