ACQ 1650 Module 5 Exam. Acquisition
Considerations for IT Services
Which policy document governs information technology (IT) services that collect,
maintain, use, and disseminate personally identifiable information?
a. DoDI 5000.74, Defense Acquisition of Services
b. DoDI 5400.16, DoD Privacy Impact Assessment Guidance
c. DoDD 5400.11, DoD Privacy Program
d. DoDD 1100.4, Guidance for Manpower Management - answerc. DoDD 5400.11, DoD
Privacy Program
[True or False]: Cloud service providers can deliver IT services more efficiently and
cost-effectively than traditional approaches, whether the services are provided by the
DoD or commercial providers. - answerTrue
The policy and security requirements found in DoDI 8420.01 impacts which of the
following service?
a. Commercial cellular services for voice and data
b. Data processing services
c. Commercial cloud computing services
d. Service Desk - answera. Commercial cellular services for voice and data
[True or False]: Program managers will ensure the information technology (IT) services
used by DoD will allow persons with disabilities access to the information that is
comparable to the access afforded persons without disabilities. - answerTrue
[True or False]: The DoD Enterprise Architecture defines the current architecture and
target architecture and provides a strategy that will enable an agency to transition from
its current state to its target environment. - answerTrue
When should the services acquisition team begin integrating the risk management
framework steps and activities in DoDI 8510.01, Risk Management Framework (RMF)
for DoD Information Technology (IT)?
a. From the beginning, prior to contract award
b. When executing the Acquisition Strategy
c. When developing the Acquisition Strategy
d. When the contract is awarded - answera. From the beginning, prior to contract award
Considerations for IT Services
Which policy document governs information technology (IT) services that collect,
maintain, use, and disseminate personally identifiable information?
a. DoDI 5000.74, Defense Acquisition of Services
b. DoDI 5400.16, DoD Privacy Impact Assessment Guidance
c. DoDD 5400.11, DoD Privacy Program
d. DoDD 1100.4, Guidance for Manpower Management - answerc. DoDD 5400.11, DoD
Privacy Program
[True or False]: Cloud service providers can deliver IT services more efficiently and
cost-effectively than traditional approaches, whether the services are provided by the
DoD or commercial providers. - answerTrue
The policy and security requirements found in DoDI 8420.01 impacts which of the
following service?
a. Commercial cellular services for voice and data
b. Data processing services
c. Commercial cloud computing services
d. Service Desk - answera. Commercial cellular services for voice and data
[True or False]: Program managers will ensure the information technology (IT) services
used by DoD will allow persons with disabilities access to the information that is
comparable to the access afforded persons without disabilities. - answerTrue
[True or False]: The DoD Enterprise Architecture defines the current architecture and
target architecture and provides a strategy that will enable an agency to transition from
its current state to its target environment. - answerTrue
When should the services acquisition team begin integrating the risk management
framework steps and activities in DoDI 8510.01, Risk Management Framework (RMF)
for DoD Information Technology (IT)?
a. From the beginning, prior to contract award
b. When executing the Acquisition Strategy
c. When developing the Acquisition Strategy
d. When the contract is awarded - answera. From the beginning, prior to contract award