It enables the identification of supportability and sustainment strategies near

It enables the identification of supportability and

This preview shows page 5 - 6 out of 6 pages.

It enables the identification of supportability and sustainment strategies near the end of the life. It is a continuing process that assists in the identification and evolution of the PSM IPT. 17) At which point in the life cycle does the Life Cycle Sustainment Plan (LCSP) focus on how sustainment performance is measured, managed, assessed, and reported? [Capture the Product Support Strategy and specific planning and execution details in the Life Cycle Sustainment Plan (LCSP).][Remediation Accessed :N] FRP (P&D Phase) Milestone A (TMRR Phase) Milestone B (EMD Phase) Lesson 2.3IOC (O&S Phase) 18) What is the preferred method of controlling environmentally hazardous materials during manufacturing, operations, and disposal? 18) What is the preferred method of controlling environmentally hazardous materials during manufacturing, operations, and disposal? [Identify key federal and DoD policies governing environmental, safety, and health issues associated with defense systems acquisition.]
Background image
manufacturing costs. Disposal is the preferred method because of new technologies and improved landfill processes. Recycling is preferred over source reduction because reuse of hazardous substances costs less than substituting alternate processes. 19) System-specific Validated Online Lifecycle Threat (VOLT) reports are required to be kept current and validated throughout the acquisition process. All Major Defense Acquisition Programs (MDAPs) must have a validated VOLT in place at: [Identify the intelligence organizations of the Intelligence community and recognize how the IC provides support to an acquisition program.][Remediation Accessed :N] intelligence organizations of the Intelligence community and recognize how the IC provides support to an acquisition program.][Remediation Accessed :N] 20) As part of the Program Protection Plan (PPP), cybersecurity is a critical priority for DoD. Effective cybersecurity in DoD acquisition programs encompasses all of the necessary actions taken to ensure the _________________ of a system's information to enable warfighting operations. [Recognize how implementing program protection, cybersecurity, and counterintelligence requirements into the acquisition strategy help to reduce overall program risk.]Technological superiority
Background image

You've reached the end of your free preview.

Want to read all 6 pages?

  • Fall '16
  • Acquisition Program Baseline, operational test, acquisition strategy, acquisition program, Operational Test & Evaluation

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture