<?xml version="1.0"?>
<Module projectID="1303" moduleID="1571">
	<ModuleName>M01_L02</ModuleName>
	<AU>M01_L02</AU>
	<Title>DoD CNDSP Program</Title>
	<Subtitle>DoD CNDSP Program</Subtitle>
	<LinkSet>links</LinkSet>
	<CourseMapSWFPath>../M01_L02/assets/coursemap.swf</CourseMapSWFPath>
	<NavBtns>
        <NavBtn>
			<ID>courseMenuBtn</ID>
			<Label>Course menu</Label>
			<RMAText>Course menu. Select this button to access the course menu.</RMAText>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn> 	
		<NavBtn>
			<ID>moduleMapBtn</ID>
			<Label>Lesson Map</Label>
			<RMAText>Lesson Map.  Select this button to access the lesson map.</RMAText>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Name>Glossary</Name>
			<RMAText>Glossary. Select this button open the glossary.</RMAText> 
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button open the resources.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit.  Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause.  Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true">
			<ID>previousPgBtn</ID>
			<Name>Previous Page</Name>
			<RMAText>Previous. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn nextBtn="true">
			<ID>nextPgBtn</ID>
			<Name>Next Page</Name>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Introduction</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Objectives and Topics</Title>
					<Subtitle/>
					<Filename>disaiar02_01</Filename>
					<PageNbr>1</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Welcome to the lesson on the DoD Computer Network Defense Service Provider, or CNDSP, program. When you have completed this lesson, you will be able to identify the structure of the DoD CNDSP program, the roles and responsibilities of each CND tier, and the primary CND services. There are four topics in this lesson. After completing this introduction, you will explore the roles, responsibilities, functions, and goals of CND, and you will examine the primary CND services in greater detail. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Rich Media Text Description. Course: D O D Intrusion Detection System (I D S) Analysis, Part 4: C N D Analysis: Incident Response and Analysis, Lesson 2: D O D C N D S P Program. For each screen you will hear a description. The description is cued by an audio tone. Listen to the description, and then select the play audio narration button to continue. Screen 1 of 10. Lesson title: D O D C N D S P Program. Topic title: Introduction. Screen title: Objectives and Topics. Three learning objectives display in support of audio. Four topics display. The first topic is titled Introduction. The second topic is titled C N D Overview. The third topic is titled Primary C N D Services. The fourth and final topic is the Conclusion. Text displays: References to open source or freeware in this training product are for training purposes only, and should not be considered endorsements of these products. Please check with your command, service, or agency for guidance on the use of these products. The acronym C N D S P becomes a rollover that reads Computer Network Defense (C N D) Service Provider.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>CND Overview</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>CND Framework</Title>
					<Subtitle/>
					<Filename>disaiar02_02</Filename>
					<PageNbr>2</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Within the DoD, the CND function is organized into three tiers. Tier One operates at the global level to provide DoD-wide CND operational direction, support, and situational awareness to commands, services, and agencies, or C/S/As, and to field activities through policy and other guidance. Tier One includes USSTRATCOM, USCYBERCOM, and other supporting entities. Tier Two operates regionally at the component level to provide DoD component-wide CND operational direction and support in response to direction from Tier One. It also supports Tier One through information dissemination and incident reporting. Tier Two includes multiple C/S/A and field activity CNDSPs designated by heads of components to coordinate component-wide CND. Tier Three operates locally at the enclave level to provide local CND operational direction and support in response to direction from a designated Tier Two entity. Subscribers at Tier Three deploy protection and detection TTPs and disseminate network security information, attack sensing and warning data, and other incident indicators as required by the assigned CNDSP. Tier Three includes bases, posts, camps, stations, and other entities responding to direction from a Tier Two C/S/A or field activity CNDSP, such as local control centers that manage and control information systems, networks, and services, whether deployed or fixed, at DoD installations. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 2 of 10. Topic title: C N D Overview. Screen title: C N D Framework. Text displays at top of screen reading C N D Framework. Three boxes display beneath text. The first box represents Tier One. The second box represents Tier Two. The third box represents Tier Three. Text displays in support of audio. The term U S strat com becomes a rollover that reads U.S. Strategic Command. The term U S cyber com becomes a rollover that reads U.S. Cyber Command. The words supporting entities become a rollover that reads as follows: Director of National Intelligence (D N I), National Security Incident Response Center (N S I R C), Intelligence Community Incident Response Center (I C I R C), Defense Criminal Investigative Organization (D C I O), National Security Agency/Central Security Threat Operations Center (N T O C), Defense Information Systems Agency (D I S A). The acronym C S A becomes a rollover that reads command, service, agency. The acronym T T Peas becomes a rollover that reads tactics, techniques, and procedures.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>CND Function and Goals</Title>
					<Subtitle/>
					<Filename>disaiar02_03</Filename>
					<PageNbr>3</PageNbr>
					<ShowText>
						<Txt frameNbr="1">A primary function of CND is to provide a rapid response to network intrusions and other unauthorized activities occurring on DoD information systems and networks. The goals of incident response are to identify the extent of compromise, eradicate malicious and unauthorized activity from the affected networks, and collect indicators for detection and prevention of malicious activity on DoD networks. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 3 of 10. Screen title: C N D Function and Goals. Reprised image displays of basic network showing a network intrusion. Text displays in support of audio.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>CND Services</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Overview of CND Services</Title>
					<Subtitle/>
					<Filename>disaiar02_04</Filename>
					<PageNbr>4</PageNbr>
					<Popups>
						<Popup>
						</Popup>
					</Popups>
					<ShowText>
						<Txt frameNbr="1">CND Services are the actions taken to prevent or reduce the effects of computer network intrusions that may disrupt, degrade, destroy, exploit, allow unauthorized access to, or facilitate information theft from DoD computer networks, information systems, or their contents. The three primary CND services; Protect, Detect, and Respond, will be discussed in more detail on the following screens. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 4 of 10. Topic title: C N D Services. Screen title: Overview of C N D Services. Reprised image displays of basic network with an infected system. As infection spreads to other network components, walls appear to block spread of infection. Text displays in support of audio. Job aid icon displays. Select the job aid to open a printable job aid describing the responsibilities of each C N D service.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Protect</Title>
					<Subtitle/>
					<Filename>disaiar02_05</Filename>
					<PageNbr>5</PageNbr>
					<ShowText>
						<Txt frameNbr="1">CND Protect Services include several tasks that are undertaken to ensure the security of DoD systems and networks. These tasks include management of the DoD's Information Operations Condition, or INFOCON, system, information assurance and vulnerability management, vulnerability analysis and assessments, red teaming, and malware protection services. Note that Protect Services are often proactive and may not always result from an incident. Select each task to learn more. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
					<Popups>
						<Popup>
							<Title>Protect</Title>
							<Subtitle/>
							<Filename>disaiar02_05_01</Filename>
							<PageNbr>5</PageNbr>
							<ShowText>
								<Txt frameNbr="1"> All tiers are responsible for the management of the DoD's Information Operations Condition, or INFOCON, system. Managing this system requires implementation of, compliance with, and reporting on actions taken to create or enhance an information system, network configuration, or assurance posture in response to a CND alert or threat. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Management of DoD INFOCON System</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 1 of 5. Popup title: Management of D O D INFOCON System. Text displays in support of audio.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Protect</Title>
							<Subtitle/>
							<Filename>disaiar02_05_02</Filename>
							<PageNbr>5</PageNbr>
							<ShowText>
								<Txt frameNbr="1"> Information Assurance Vulnerability Alerts, or IAVAs, provide a mechanism to inform all entities of the latest system vulnerabilities and appropriate countermeasures. Management of IAVAs is essential to improving the CND posture of the DoD. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Information Assurance Vulnerability Management</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 2 of 5. Popup title: Information Assurance Vulnerability Management. Text displays in support of audio.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Protect</Title>
							<Subtitle/>
							<Filename>disaiar02_05_03</Filename>
							<PageNbr>5</PageNbr>
							<ShowText>
								<Txt frameNbr="1"> In conjunction with IAVAs, periodic vulnerability assessments, or VAAs, are the primary method of measuring the CND posture of DoD systems and networks. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Vulnerability Analysis and Assessments</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 3 of 5. Popup title: Vulnerability Analysis and Assessment. Text displays in support of audio. The acronym I A V A becomes a rollover that reads information assurance vulnerability alerts.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Protect</Title>
							<Subtitle/>
							<Filename>disaiar02_05_04</Filename>
							<PageNbr>5</PageNbr>
							<ShowText>
								<Txt frameNbr="1"> Combined with VAAs, red team activities are used to assess the security posture of systems, networks, and detection capabilities and recommend improvements to information assurance and CND capabilities. Tiers 2 and 3 support this task in much the same way that they support VAAs. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Red Teaming</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 4 of 5. Popup title: Read Teaming. Text displays in support of audio.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Protect</Title>
							<Subtitle/>
							<Filename>disaiar02_05_05</Filename>
							<PageNbr>5</PageNbr>
							<ShowText>
								<Txt frameNbr="1"> Provided by Tiers 2 and 3, malware protection services deploy and support anti-virus and anti-malware capabilities based on established signatures and TTPs. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Malware Protection Services</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 5 of 5. Popup title: Malware Protection Services. Text displays in support of audio. T T Peas becomes a rollover that reads tactics, techniques, and procedures.</ContentDescription></Sec508Data></Popup>
					</Popups>
				<Sec508Data><ContentDescription frameNbr="1">Screen 5 of 10. Screen title: Protect. Image displays of basic protected network. Text displays in support of audio. The following phrases become selectable as popups: Management of D O D info con system, information assurance and vulnerability management, vulnerability analysis and assessments, red teaming, malware protection services.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Detect</Title>
					<Subtitle/>
					<Filename>disaiar02_06</Filename>
					<PageNbr>6</PageNbr>
					<ShowText>
						<Txt frameNbr="1">CND Detect Services provide CND network security monitoring, intrusion detection, and event analysis; attack sensing and warning; and indications and warning, all of which contribute to overall situational awareness. Select Network Security Monitoring/Intrusion Detection, Attack Sensing and Warning, and Indications and Warning to learn more. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
					<Popups>
						<Popup>
							<Title>Detect</Title>
							<Subtitle/>
							<Filename>disaiar02_06_01</Filename>
							<PageNbr>6</PageNbr>
							<ShowText>
								<Txt frameNbr="1">Network security monitoring and intrusion detection services identify whether a network has been compromised, expose unauthorized activity, identify vulnerabilities, and provide direction on enhanced security guidance and methodology. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Network Security Monitoring/Intrusion Detection</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 1 of 3. Popup title: Network Security Monitoring Intrusion Detection. Text displays in support of audio.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Detect</Title>
							<Subtitle/>
							<Filename>disaiar02_06_02</Filename>
							<PageNbr>6</PageNbr>
							<ShowText>
								<Txt frameNbr="1">Attack sensing and warning, or AS&W, services give the DoD the ability to sense changes in DoD global information system and computer networks. These services include the detection, correlation, identification, and characterization of a large spectrum of intentional unauthorized activity, including computer intrusion or attack. Coupled with the notification to command and decision makers, AS&W services can help command leaders to develop an appropriate response. AS&W is enabled through a managed network of intrusion, misuse, and anomaly detection systems; supporting data fusion and analysis; diagnostics; long-term trend and pattern analysis; and warning communications channels and procedures. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Attack Sensing & Warning (AS&W)</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 2 of 3. Popup title: Attack Sensing and Warning (A S and W). Text displays in support of audio.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Detect</Title>
							<Subtitle/>
							<Filename>disaiar02_06_03</Filename>
							<PageNbr>6</PageNbr>
							<ShowText>
								<Txt frameNbr="1">Indications and warning, or I&W, services give the DoD the ability to sense changes in adversary activities. These services include those intelligence activities intended to detect and report time-sensitive intelligence information on foreign developments that could involve a threat to the United States or allied military, political, or economic interests or to U.S. citizens abroad. Note that the intelligence community provides indications and warnings for foreign threats from nation states and transnational groups. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Indications and Warning (I&W)</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 3 of 3. Popup title: Indications and Warning (I and W). Text displays in support of audio.</ContentDescription></Sec508Data></Popup>
					</Popups>
				<Sec508Data><ContentDescription frameNbr="1">Screen 6 of 10. Screen title: Detect. Reprised image displays of basic network. Text displays in support of audio. The following phrases become selectable as popups: network security monitoring intrusion detection, attack sensing and warning (A S and W), indications and warning (I and W).</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Respond</Title>
					<Subtitle/>
					<Filename>disaiar02_07</Filename>
					<PageNbr>7</PageNbr>
					<ShowText>
						<Txt frameNbr="1">CND Respond Services include the actions taken to report, analyze, and coordinate a response to any event or computer security incident for the purpose of mitigating any adverse operational or technical effects. Select Incident Reporting, Incident Analysis, and Incident Handling and Response to learn more. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
					<Popups>
						<Popup>
							<Title>Respond</Title>
							<Subtitle/>
							<Filename>disaiar02_07_01</Filename>
							<PageNbr>7</PageNbr>
							<ShowText>
								<Txt frameNbr="1">Incident reporting includes providing a well-defined framework for the timely reporting of any event or computer security incident. It provides an accurate, meaningful, and complete understanding of the incident, from initial detection to analysis and remediation. This information feeds into the User-Defined Operational Picture, or UDOP, which provides local, intermediate, and DoD-wide situational awareness of CND actions and their effects. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Incident Reporting</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 1 of 3. Popup title: Incident Reporting. Text displays in support of audio.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Respond</Title>
							<Subtitle/>
							<Filename>disaiar02_07_02</Filename>
							<PageNbr>7</PageNbr>
							<ShowText>
								<Txt frameNbr="1">Incident analysis identifies several critical elements of an incident to determine and characterize its possible effects on DoD networks, operational missions, and other defense programs. It relies on effective acquisition, preservation, and timely reporting of incident data. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Incident Analysis</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 2 of 3. Popup title: Incident Analysis. Text displays in support of audio.</ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Respond</Title>
							<Subtitle/>
							<Filename>disaiar02_07_03</Filename>
							<PageNbr>7</PageNbr>
							<ShowText>
								<Txt frameNbr="1">Incident handling and response includes the coordinated development and implementation of courses of action, or COAs, that focus on containment, eradication, and recovery. It also ensures the acquisition and preservation of data required for tactical analysis, strategic analysis, and law enforcement or counterintelligence investigations. </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName>Incident Handling and Response</Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1">Popup 3 of 3. Popup title: Incident Handling and Response. Text displays in support of audio. The acronym C O A becomes a rollover that reads course of action.</ContentDescription></Sec508Data></Popup>
					</Popups>
				<Sec508Data><ContentDescription frameNbr="1">Screen 7 of 10. Screen title: Respond. Reprised image displays of basic network. Text displays in support of audio. The following phrases become selectable as popups: incident reporting, incident analysis, incident handling and response.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Knowledge Check</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle/>
					<Filename>disaiar02_08</Filename>
					<PageNbr>8</PageNbr>
					<PageType>Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Questions>
						<Question qType="MC">
							<Txt>Includes local control centers that manage information systems at DoD installations.</Txt>
							<Response>
								<Txt>Tier 1 for Statement: Includes local control centers that manage information systems at DoD installations.</Txt>
							</Response>
							<Response>
								<Txt>Tier 2 for Statement: Includes local control centers that manage information systems at DoD installations.</Txt>
							</Response>
							<Response valid="true">
								<Txt>Tier 3 for Statement: Includes local control centers that manage information systems at DoD installations.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. CND Tier 3 includes local control centers that manage and control information systems, networks, and services, whether deployed or fixed at DoD installations.</DfltCorrect>
								<DfltIncorrect>Incorrect. CND Tier 3 includes local control centers that manage and control information systems, networks, and services, whether deployed or fixed at DoD installations.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Operates at the component level.</Txt>
							<Response>
								<Txt>Tier 1 for Statement: Operates at the component level.</Txt>
							</Response>
							<Response valid="true">
								<Txt>Tier 2 for Statement: Operates at the component level.</Txt>
							</Response>
							<Response>
								<Txt>Tier 3 for Statement: Operates at the component level.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 2 operates regionally at the component level to provide DoD component-wide CND operational direction and support in response to direction from Tier One.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 2 operates regionally at the component level to provide DoD component-wide CND operational direction and support in response to direction from Tier One.</DfltIncorrect>
							</Feedback>
						</Question>	
						<Question qType="MC">
							<Txt>Includes USSTRATCOM.</Txt>
							<Response valid="true">
								<Txt>Tier 1 for Statement: Includes USSTRATCOM.</Txt>
							</Response>
							<Response>
								<Txt>Tier 2 for Statement: Includes USSTRATCOM.</Txt>
							</Response>
							<Response>
								<Txt>Tier 3 for Statement: Includes USSTRATCOM.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 1 includes USSTRATCOM and supporting entities.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 1 includes USSTRATCOM and supporting entities.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Provides CND operational direction or support at the enclave level to DoD bases, posts, camps, and stations.</Txt>
							<Response>
								<Txt>Tier 1 for Statement: Provides CND operational direction or support at the enclave level to DoD bases, posts, camps, and stations.</Txt>
							</Response>
							<Response>
								<Txt>Tier 2 for Statement: Provides CND operational direction or support at the enclave level to DoD bases, posts, camps, and stations.</Txt>
							</Response>
							<Response valid="true">
								<Txt>Tier 3 for Statement: Provides CND operational direction or support at the enclave level to DoD bases, posts, camps, and stations.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 3 provides local enclave level CND operational direction and support in response to direction from a designated Tier Two entity to DoD bases, posts, camps, stations, and other entities.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 3 provides local enclave level CND operational direction and support in response to direction from a designated Tier Two entity to DoD bases, posts, camps, stations, and other entities.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Includes agency and field activity CNDSPs</Txt>
							<Response>
								<Txt>Tier 1 for Statement: Includes agency and field activity CNDSPs.</Txt>
							</Response>
							<Response valid="true">
								<Txt>Tier 2 for Statement: Includes agency and field activity CNDSPs.</Txt>
							</Response>
							<Response>
								<Txt>Tier 3 for Statement: Includes agency and field activity CNDSPs.</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Tier 2 includes multiple C/S/A and field activity CNDSPs designated by heads of components to coordinate component-wide CND.</DfltCorrect>
								<DfltIncorrect>Incorrect. Tier 2 includes multiple C/S/A and field activity CNDSPs designated by heads of components to coordinate component-wide CND.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<ShowText>
						<Txt frameNbr="1">Now check your knowledge. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 8 of 10. Topic title: Knowledge Check. Screen title: Knowledge Check. Knowledge check is a survey-style activity with five questions and three answer columns labeled Tier 1, Tier 2, and Tier 3. Select the best answer for each of the five questions, and then select Done. Use the keyboard to cycle through the answers.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Knowledge Check</Title>
					<Subtitle/>
					<Filename>disaiar02_09</Filename>
					<PageNbr>9</PageNbr>
					<PageType display="Sequential">Knowledge Check</PageType>
					<AttemptCountLimit>1</AttemptCountLimit>
					<DfltQuestionWidth>500</DfltQuestionWidth>
					<DfltFBWidth>425</DfltFBWidth>
					<Questions>
						<Question qType="MC">
							<Txt>Giving the DoD the ability to sense changes in DoD global information system and computer networks is part of which set of CND services?
Question 1 of 3.</Txt>
							<Response>
								<Txt>Protect Services</Txt>
							</Response>
							<Response valid="true">
								<Txt>Detect Services</Txt>
							</Response>
							<Response>
								<Txt>Respond Services</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Attack sensing and warning (AS&W) services give the DoD the ability to sense changes in DoD global information system and computer networks. It is part of the CND Detect Services.</DfltCorrect>
								<DfltIncorrect>Incorrect. Attack sensing and warning (AS&W) services give the DoD the ability to sense changes in DoD global information system and computer networks. It is part of the CND Detect Services.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Management of the DoD’s INFOCON system is part of which set of CND services?
Question 2 of 3</Txt>
							<Response valid="true">
								<Txt>Protect Services</Txt>
							</Response>
							<Response>
								<Txt>Detect Services</Txt>
							</Response>
							<Response>
								<Txt>Respond Services</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. The management of the DoD’s Information Operations Condition (INFOCON) system is part of the CND Protect Services.</DfltCorrect>
								<DfltIncorrect>Incorrect. The management of the DoD’s Information Operations Condition (INFOCON) system is part of the CND Protect Services.</DfltIncorrect>
							</Feedback>
						</Question>
						<Question qType="MC">
							<Txt>Identifying critical elements of an incident is part of which set of CND services?
Question 3 of 3</Txt>
							<Response>
								<Txt>Protect Services</Txt>
							</Response>
							<Response>
								<Txt>Detect Services</Txt>
							</Response>
							<Response valid="true">
								<Txt>Respond Services</Txt>
							</Response>
							<Feedback>
								<DfltCorrect>Correct. Incident analysis identifies several critical elements of an incident to determine and characterize its possible effects on DoD networks, operational missions, and other defense programs. It is part of the CND Respond Services.</DfltCorrect>
								<DfltIncorrect>Incorrect. Incident analysis identifies several critical elements of an incident to determine and characterize its possible effects on DoD networks, operational missions, and other defense programs. It is part of the CND Respond Services.</DfltIncorrect>
							</Feedback>
						</Question>
					</Questions>
					<ShowText>
						<Txt frameNbr="1">Now try these questions. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 9 of 10. Screen title: Knowledge Check. Knowledge check is a series of three multiple-choice questions, each with the same three answer options. Select the best answer, and then select Done. Use the keyboard to cycle through the answers.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Conclusion</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Summary and Conclusion</Title>
					<Subtitle/>
					<Filename>disaiar02_10</Filename>
					<PageNbr>10</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Congratulations! You have completed the lesson on the DoD CNDSP program. You should now be able to identify the structure of the DoD CNDSP program, the roles and responsibilities of each CND tier, and the primary CND services. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 10 of 10. Topic title: Conclusion. Screen title: Summary and Conclusion. Congratulations text displays. Text displays in support of audio. Objectives bullets change to checkmarks in sync with audio. The acronym C N D S P becomes a rollover that reads Computer Network Defense (C N D) Service Provider.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
	</Topics>
</Module>
