3D053 Cyber Surety Journeyman Volume 1. Information Protection –internal Control

80 Questions | Total Attempts: 382

SettingsSettingsSettings
Please wait...
3D053 Cyber Surety Journeyman Volume 1. Information Protection internal Control

3D053 Cyber Surety Journeyman Volume 1. Information Protection – Internal Control URE's


Questions and Answers
  • 1. 
    (001) The Cyber Surety journeyman monitors all of the following programs except
    • A. 

      Communications security (COMSEC).

    • B. 

      Computer security (COMPUSEC).

    • C. 

      Information security (INFOSEC).

    • D. 

      Emissions security (EMSEC).

  • 2. 
    (002) What is the fourth step in the operational risk management (ORM) process?
    • A. 

      Analyze controls and implement strategies to reduce or eliminate risk.

    • B. 

      Make decisions based on overall cost versus benefit.

    • C. 

      Develop and apply implementation strategies.

    • D. 

      Supervise and review.

  • 3. 
    (002) What minimum milli-ampere current can be lethal?
    • A. 

      25

    • B. 

      50

    • C. 

      75

    • D. 

      100

  • 4. 
    (003) Which type of network typically provides wireless broadband data services?
    • A. 

      Global Network

    • B. 

      Wireless local area network (WLAN).

    • C. 

      Wireless wide area network (WWAN).

    • D. 

      Wireless metropolitan area network (WMAN).

  • 5. 
    (003) To use VPN products, obtain interim approval from?
    • A. 

      Services and Integration Division (SAF/XC).

    • B. 

      Air Force Virtual Private Network (AF VPN).

    • C. 

      AFNIC Architecture and Analysis Flight (EAC).

    • D. 

      AFNIC Network Infrastructure Flight (ECN).

  • 6. 
    (004) Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
    • A. 

      Twisted pair.

    • B. 

      Fiber optic.

    • C. 

      Coaxial.

    • D. 

      WiFi.

  • 7. 
    (005) In which network does every device have exactly two neighbors?
    • A. 

      Bus

    • B. 

      Star

    • C. 

      Tree

    • D. 

      Ring

  • 8. 
    (005) Which network integrates multiple topologies?
    • A. 

      Bus

    • B. 

      Star

    • C. 

      Tree

    • D. 

      Ring

  • 9. 
    (006) Which class of internet protocol addresses is used for very large networks?
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 10. 
    (007) Which protocol has the job of verifying the correct delivery of data from client to server?
    • A. 

      Dynamic host configuration protocol (DHCP).

    • B. 

      Transmission control protocol (TCP).

    • C. 

      Hypertext transfer protocol (HTTP).

    • D. 

      Internet protocol (IP).

  • 11. 
    (007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a TCP/IP-based network?
    • A. 

      Internet protocol (IP).

    • B. 

      Hypertext transfer protocol (HTTP).

    • C. 

      Transmission control protocol (TCP).

    • D. 

      Dynamic host configuration protocol (DHCP).

  • 12. 
    (008) As the migration to internet protocol (IP) V6 continues, many organizations rely upon what to compensate for the lack of usable IP addresses?
    • A. 

      Prefixing.

    • B. 

      Subnetting.

    • C. 

      Transition technology.

    • D. 

      Classless Inter-Domain Routing.

  • 13. 
    (008) The sequence of leading bits in an internet protocol used to identify the network portion of an IP address is called?
    • A. 

      Routing prefix.

    • B. 

      Hierarchy.

    • C. 

      Subnet.

    • D. 

      Mask.

  • 14. 
    (009) Breaking down the packets’ addresses to act as a gateway to allow traffic to pass between networks involves which transition technology?
    • A. 

      Dual stack.

    • B. 

      Dual layer.

    • C. 

      Tunneling.

    • D. 

      Peer-to-peer.

  • 15. 
    (009) Setting up a secure point-to-point communication is called
    • A. 

      Dual stack.

    • B. 

      Dual layer.

    • C. 

      Tunneling.

    • D. 

      Peer-to-peer

  • 16. 
    (010) Networked resources must be consistently monitored and controlled to ensure access to the network while
    • A. 

      Keeping complete and accurate documentation for all configuration changes.

    • B. 

      Minimizing risks posed by various cyberspace threats

    • C. 

      Creating continuity throughout the network.

    • D. 

      Installing all applicable security patches.

  • 17. 
    (010) To make it possible for replacement administrators to accomplish the same tasks as their predecessors, administrators must be in the habit of
    • A. 

      Keeping complete and accurate documentation for all configuration changes.

    • B. 

      Minimizing risks posed by various cyberspace threats.

    • C. 

      Creating continuity throughout the network.

    • D. 

      Installing all applicable security patches.

  • 18. 
    (011) When coupled with standardized network policy, the standard desktop configuration (SDC) substantially
    • A. 

      Reduces the number of network users with administrative privileges.

    • B. 

      Achieves near end-to-end command and control capability.

    • C. 

      Guards against the insider threat.

    • D. 

      Improves network security.

  • 19. 
    (011) With the consolidation of the several Network Operations and Security Centers (NOSC), the Air Force
    • A. 

      Reduces the number of network users with administrative privileges.

    • B. 

      Achieves near end-to-end command and control capability.

    • C. 

      Guards against the insider threat.

    • D. 

      Improves network security.

  • 20. 
    (012) Which WiFi standard is the slowest yet least expensive?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 21. 
    (012) Which wireless standard originally intended to create a wireless security platform that would perform as securely as a traditional wired network by providing data encryption?
    • A. 

      WiFi protected access (WPA).

    • B. 

      Wireless local area network (WLAN).

    • C. 

      Wireless wide area network (WWAN).

    • D. 

      Wired equivalency privacy (WEP).

  • 22. 
    (013) What shall be assigned to all Department of Defense information systems that is directly associated with the importance of the information contained relative to achieving DOD goals and objectives?
    • A. 

      Mission assurance category.

    • B. 

      Defense-in-depth code.

    • C. 

      System classification.

    • D. 

      Secure location.

  • 23. 
    (013) Requirements for availability and integrity are associated with
    • A. 

      Information classification.

    • B. 

      Mission assurance.

    • C. 

      Need-to-know.

    • D. 

      Sensitivity.

  • 24. 
    (014) Who is responsible for verifying proper security clearances and background investigation checks prior to granting a network user access to the Air Force Provisioned Portion of the Global Information Grid (AF GIG)?
    • A. 

      Information assurance officer (IAO) only.

    • B. 

      IAO and security manager.

    • C. 

      Information assurance officer.

    • D. 

      System administrator.

  • 25. 
    (014) Initial information assurance (IA) awareness training for all network users ensures all of the following except that users
    • A. 

      Are aware of their role in IA.

    • B. 

      Are trained on network security.

    • C. 

      Have met investigative requirements.

    • D. 

      Have satisfied network access requirements.