IT CertificationsAnswer Key

Rmf Steps And Tasks

55 community-sourced questions and answers. Free — no login.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Prepare Tasks (Organization Level)

ANSWER

P-1: Risk Management Roles P-2: Risk Management Strategy P-3: Risk Assessment - Organization P-4: Organizationally-Tailored Control Baselines and Cybersecurity Framework Profiles (Optional) P-5: Common Control Identification P-6: Impact-Level Prioritization (Optional) P-7: Continuous Monitoring Strategy - Organization

QUESTION 2

Prepare Tasks (System Level)

ANSWER

P-8: Mission or Business Focus P-9: System Stakeholders P-10: Asset Identification P-11: Authorization Boundary P-12: Information Types P-13: Information Life Cycle P-14: Risk Assessment - System P-15: Requirements Definition P-16: Enterprise Architecture P-17: Requirements Allocation P-18: System Registration

QUESTION 3

Categorize Tasks

ANSWER

C-1: System Description C-2: Security Categorization C-3: Security Categorization Review and Approval

QUESTION 4

Select Tasks

ANSWER

S-1: Control Selection S-2: Control Tailoring S-3: Control Allocation S-4: Documentation of Planned Control Implementations S-5: Continuous Monitoring Strategy - System S-6: Plan Review and Approval

QUESTION 5

Implement Tasks

ANSWER

I-1: Control Implementation I-2: Update Control Implementation Information

QUESTION 6

Assess Tasks

ANSWER

A-1: Assessor Selection A-2: Assessment Plan A-3: Control Assessments A-4: Assessment Reports A-5: Remediation Actions A-6: Plan of Action and Milestones

QUESTION 7

Authorize Tasks

ANSWER

R-1: Authorization Package R-2: Risk Analysis and Determination R-3: Risk Response R-4: Authorization Decision R-5: Authorization Reporting

QUESTION 8

Monitor Tasks

ANSWER

M-1: System and Environment Changes M-2: Ongoing Assessments M-3: Ongoing Risk Response M-4: Authorization Package Updates M-5: Security and Privacy Reporting M-6: Ongoing Authorization M-7: System Disposal

QUESTION 9

Task P-1: Risk Management Roles Outcomes

ANSWER

Individuals are identified and assigned key roles for executing the Risk Management Framework.

QUESTION 10

Task P-2: Risk Management Strategy Outcomes

ANSWER

A risk management strategy for the organization that includes a determination and expression of organizational risk tolerance is established.

QUESTION 11

Task P-3: Risk Assessment - Organization Outcomes

ANSWER

An organization-wide risk assessment is completed or an existing risk assessment is updated.

QUESTION 12

Task P-4: Organizationally-Tailored Control Baselines and Cybersecurity Framework Profiles (Optional) Outcomes

ANSWER

Organizationally-tailored control baselines and/or Cybersecurity Framework Profiles are established and made available.

QUESTION 13

Task P-5: Common Control Identification Outcomes

ANSWER

Common controls that are available for inheritance by organizational systems are identified, documented, and published.

QUESTION 14

Task P-6: Impact-Level Prioritization (Optional) Outcomes

ANSWER

A prioritization of organizational systems with the same impact level is conducted.

QUESTION 15

Task P-7: Continuous Monitoring Strategy - Organization Outcomes

ANSWER

An organization-wide strategy for monitoring control effectiveness is developed and implemented.

QUESTION 16

Task P-8: Mission or Business Focus Outcomes

ANSWER

Missions, business functions, and mission/business processes that the system is intended to support are identified.

QUESTION 17

Task P-9: System Stakeholders Outcomes

ANSWER

The stakeholders having an interest in the system are identified.

QUESTION 18

Task P-10: Asset Identification Outcomes

ANSWER

Stakeholder assets are identified and prioritized.

QUESTION 19

Task P-11: Authorization Boundary Outcomes

ANSWER

The authorization boundary (i.e., system) is determined.

QUESTION 20

Task P-12: Information Types Outcomes

ANSWER

The types of information processed, stored, and transmitted by the system are identified.

QUESTION 21

Task P-13: Information Life Cycle Outcomes

ANSWER

All stages of the information life cycle are identified and understood for each information type processed, stored, or transmitted by the system.

QUESTION 22

Task P-14: Risk Assessment - System Outcomes

ANSWER

A system-level risk assessment is completed or an existing risk assessment is updated.

QUESTION 23

Task P-15: Requirements Definition Outcomes

ANSWER

Security and privacy requirements are defined and prioritized.

QUESTION 24

Task P-16: Enterprise Architecture Outcomes

ANSWER

The placement of the system within the enterprise architecture is determined.

QUESTION 25

Task P-17: Requirements Allocation Outcomes

ANSWER

Security and privacy requirements are allocated to the system and to the environment in which the system operates.

QUESTION 26

Task P-18: System Registration Outcomes

ANSWER

The system is registered for purposes of management, accountability, coordination, and oversight.

QUESTION 27

Task C-1: System Description Outcomes

ANSWER

The characteristics of the system are described and documented.

QUESTION 28

Task C-2: Security Categorization Outcomes

ANSWER

- A security categorization of the system, including the information processed by the system represented by the organization-identified information types, is completed. - Security categorization results are documented in the security, privacy, and SCRM plans. - Security categorization results are consistent with the enterprise architecture and commitment to protecting the organizational missions, business functions, and mission/business processes. - Security categorization results reflect the organization's risk management strategy.

QUESTION 29

Task C-3: Security Categorization Review and Approval Outcomes

ANSWER

The security categorization results are reviewed and the categorization decision is approved by senior leaders in the organization.

QUESTION 30

Task S-1: Control Selection Outcomes

ANSWER

Control baselines necessary to protect the system commensurate with risk are selected.

QUESTION 31

Task S-2: Control Tailoring Outcomes

ANSWER

Controls are tailored producing tailored control baselines.

QUESTION 32

Task S-3: Control Allocation Outcomes

ANSWER

- Controls are designated as system-specific, hybrid, or common controls. - Controls are allocated to the specific system elements (i.e., machine, physical, or human elements).

QUESTION 33

Task S-4: Documentation of Planned Control Implementations Outcomes

ANSWER

Controls and associated tailoring actions are documented in security and privacy plans or equivalent documents.

QUESTION 34

Task S-5: Continuous Monitoring Strategy-System Outcomes

ANSWER

A continuous monitoring strategy for the system that reflects the organizational risk management strategy is developed.

QUESTION 35

Task S-6: Plan Review and Approval Outcomes

ANSWER

Security and privacy plans reflecting the selection of controls necessary to protect the system and the environment of operation commensurate with risk are reviewed and approved by the authorizing official.

QUESTION 36

Task I-1: Control Implementation Outcomes

ANSWER

- Controls specified in the security and privacy plans are implemented. - Systems security and privacy engineering methodologies are used to implement the controls in the system security and privacy plans.

QUESTION 37

Task I-2: Update Control Implementation Information Outcomes

ANSWER

- Changes to the planned implementation of controls are documented. - The security and privacy plans are updated based on information obtained during the implementation of the controls.

QUESTION 38

Task A-1: Assessor Selection Outcomes

ANSWER

- An assessor or assessment team is selected to conduct the control assessments. - The appropriate level of independence is achieved for the assessor or assessment team selected.

QUESTION 39

Task A-2: Assessment Plan Outcomes

ANSWER

- Documentation needed to conduct the assessments is provided to the assessor or assessment team. - Security and privacy assessment plans are developed and documented. - Security and privacy assessment plans are reviewed and approved to establish the expectations for the control assessments and the level of effort required.

QUESTION 40

Task A-3: Control Assessments Outcomes

ANSWER

- Control assessments are conducted in accordance with the security and privacy assessment plans - Opportunities to reuse assessment results from previous assessments to make the risk management process timely and cost-effective are considered. - Use of automation to conduct control assessments is maximized to increase speed, effectiveness, and efficiency of assessments.

QUESTION 41

Task A-4: Assessment Reports Outcomes

ANSWER

Security and privacy assessment reports that provide findings and recommendations are completed.

QUESTION 42

Task A-5: Remediation Actions Outcomes

ANSWER

- Remediation actions to address deficiencies in the controls implemented in the system and environment of operation are taken. - Security and privacy plans are updated to reflect control implementation changes made based on the assessments and subsequent remediation actions.

QUESTION 43

Task A-6: Plan of Action and Milestones Outcomes

ANSWER

A plan of action and milestones detailing remediation plans for unacceptable risks identified in security and privacy assessment reports is developed.

QUESTION 44

Task R-1: Authorization Package Outcomes

ANSWER

An authorizing package is developed for submission to the authorizing official.

QUESTION 45

Task R-2: Risk Analysis and Determination Outcomes

ANSWER

A risk determination by the authorizing official that reflects the risk management strategy including risk tolerance, is rendered.

QUESTION 46

Task R-3: Risk Response Outcomes

ANSWER

Risk responses for determined risks are provided.

QUESTION 47

Task R-4: Authorization Decision Outcomes

ANSWER

The authorization for the system or the common controls is approved or denied.

QUESTION 48

Task R-5: Authorization Reporting Outcomes

ANSWER

Authorization decisions, significant vulnerabilities, and risks are reported to organizational officials.

QUESTION 49

Task M-1: System and Environment Changes Outcomes

ANSWER

The information system and environment of operation are monitored in accordance with the continuous monitoring strategy.

QUESTION 50

Task M-2: Ongoing Assessments Outcomes

ANSWER

Ongoing assessments of control effectiveness are conducted in accordance with the continuous monitoring strategy.

QUESTION 51

Task M-3: Ongoing Risk Response Outcomes

ANSWER

The output of continuous monitoring activities is analyzed and responded to appropriately.

QUESTION 52

Task M-4: Authorization Package Updates Outcomes

ANSWER

Risk management documents are updated based on continuous monitoring activities.

QUESTION 53

Task M-5: Security and Privacy Reporting Outcomes

ANSWER

A process is in place to report the security and privacy posture to the authorizing official and other senior leaders and executives.

QUESTION 54

Task M-6: Ongoing Authorization Outcomes

ANSWER

Authorizing officials conduct ongoing authorizations using the results of continuous monitoring activities and communicate changes in risk determination and acceptance decisions.

QUESTION 55

Task M-7: System Disposal Outcomes

ANSWER

A system disposal strategy is developed and implemented, as needed.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials