90%(260)233 out of 260 people found this document helpful
This preview shows page 31 - 34 out of 34 pages.
19) System-specific Validated Online Lifecycle Threat (VOLT) reports arerequired to be kept current and validated throughout the acquisitionprocess. All Major Defense Acquisition Programs (MDAPs) must have avalidated VOLT in place at: [Identify the intelligence organizations of the Intelligencecommunity and recognize how the IC provides support to an acquisition program.][Remediation Accessed :N]
20) As part of the Program Protection Plan (PPP), cybersecurity is a critical priority for DoD. Effective cybersecurity in DoD acquisition programs encompasses all of the necessary actions taken to ensure the _________________ of a system's information to enable warfighting operations.[Recognize how implementing program protection, cybersecurity, and counterintelligence requirements into the acquisition strategy help to reduce overall program risk.]1) If the program is on the DOT&E Oversight List, which one of the following test and evaluation (T&E) products is required before the Full Rate Production Decision Review? [Identify the primary Test and Evaluation (T&E) products required at each acquisition milestone.]
DOT&E Report on Initial Operational Test and Evaluation (IOT&E)Live Fire T&E WaiverLRIP Article Quantities ApprovalEarly Operational Assessment2) Regarding test and evaluation (T&E) issues that may affect a program'sacquisition strategy, the program office can use ______________ to aid inunderstanding the implications of any necessary tradeoffs among testingconstraints. [Identify issues affecting T&E resource requirements, test planning, and testexecution activities in support of a program's acquisition strategy.][Remediation Accessed:N] Design of Experiments (DOE)Simulation-Based AcquisitionsModeling and SimulationEarly Operational Assessments
3) The ____________________ provides military intelligence to defense policy makers, force planners and warfighters in DOD in support of weapons system acquisition. [Identify the intelligence organizations of the Intelligence community and recognize how the IC provides support to an acquisition program.]