3D053 Cyber Surety Journeyman Volume 1. Information Protection – Internal Control URE's
Wing.
Air Force.
Department of Defense.
Local Registration Authority/Trusted Agent (LRA/TA).
Rate this question:
Limited (general).
Administrative.
Remote user.
End-user.
Rate this question:
Dynamic host configuration protocol (DHCP).
Transmission control protocol (TCP).
Hypertext transfer protocol (HTTP).
Internet protocol (IP).
Rate this question:
Information assurance officer (IAO) only.
IAO and security manager.
Information assurance officer.
System administrator.
Rate this question:
Twisted pair.
Fiber optic.
Coaxial.
WiFi.
Rate this question:
Bus
Star
Tree
Ring
Rate this question:
Internet protocol (IP).
Hypertext transfer protocol (HTTP).
Transmission control protocol (TCP).
Dynamic host configuration protocol (DHCP).
Rate this question:
Dual stack.
Dual layer.
Tunneling.
Peer-to-peer
Rate this question:
Boot sector virus.
Worm program
Trojan horse
Macro virus
Rate this question:
Denial of service.
Modification.
Destruction.
Disclosure.
Rate this question:
Controlled access areas (CAA).
Limited-control area (LCA).
Uncontrolled access areas (UAA).
Wing information assurance offices (WIAO).
Rate this question:
Denial of service.
Modification.
Destruction.
Disclosure.
Rate this question:
Prefixing.
Subnetting.
Transition technology.
Classless Inter-Domain Routing.
Rate this question:
Cracking.
Evaluation.
Identification.
Authentication.
Log off your computer daily.
Install the latest service packs.
Update your anti-virus software.
Watch for files with .exe, .com, .bat. and .scr attachments.
Rate this question:
TEMPEST.
BLACK.
EMSEC.
RED.
Rate this question:
Bus
Star
Tree
Ring
Rate this question:
15
30
45
60
Rate this question:
SPACE or SAP/SAR.
Major command.
Department of the Air Force.
Department of Defense.
Rate this question:
Major command.
Wing commander.
Designated approving authority.
Officer in charge.
Rate this question:
Secret and Top Secret.
Confidential and Secret.
Unclassified and Confidential.
All classifications may be kept on the flightline.
Rate this question:
Notices.
Postings.
Bulletins.
Announcements.
Rate this question:
Writes itself before the original file.
Writes itself to the end of the original file.
Writes itself between file sections of 32-bit file.
Renames the original file and writes itself with the original file’s name.
Rate this question:
1
2
5
A
Rate this question:
War-dialing.
BIOS password.
Time-out feature.
Secure network location.
Rate this question:
Every 3 months.
Every 6 months.
Every 12 months.
Only once during the first two years.
Rate this question:
Communications security (COMSEC).
Computer security (COMPUSEC).
Information security (INFOSEC).
Emissions security (EMSEC).
Rate this question:
Routing prefix.
Hierarchy.
Subnet.
Mask.
Rate this question:
Keeping complete and accurate documentation for all configuration changes.
Minimizing risks posed by various cyberspace threats.
Creating continuity throughout the network.
Installing all applicable security patches.
Rate this question:
Human.
Technological.
Unintentional.
Environmental.
Rate this question:
Ensure system vulnerabilities are identified.
Ensure system penetrations are identified.
Report fraud, waste and abuse.
Report a rudimentary inquiry.
Rate this question:
25
50
75
100
Rate this question:
WiFi protected access (WPA).
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wired equivalency privacy (WEP).
Rate this question:
A
B
C
D
Rate this question:
802.11a
802.11b
802.11g
802.11n
Rate this question:
Headquarters Air Force Network Integration Center (HQ AFNIC).
Major command commanders.
Squadron commanders.
Wing commanders.
Rate this question:
Chmod.
Chown.
Chroot.
Chgrp.
Rate this question:
Digital.
Biometric.
Encryption.
E-mail signing.
Rate this question:
Battery.
Signal.
Circuit.
Path.
Rate this question:
Keeping complete and accurate documentation for all configuration changes.
Minimizing risks posed by various cyberspace threats
Creating continuity throughout the network.
Installing all applicable security patches.
Rate this question:
Information classification.
Mission assurance.
Need-to-know.
Sensitivity.
Rate this question:
Are aware of their role in IA.
Are trained on network security.
Have met investigative requirements.
Have satisfied network access requirements.
Rate this question:
The wing commander.
The major command commander.
Air Force network operations center (AFNOC).
Air Force Office of Special Investigation (AFOSI).
Rate this question:
Global Network
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wireless metropolitan area network (WMAN).
Rate this question:
Dynamic random access memory and Random-access memory.
Programmable read-only memory and Optical Media.
Static random access memory.
Magnetic tapes.
Rate this question:
Rsh.
Rlogin.
Telnet.
Rfinger.
Rate this question:
10
20
50
70
Rate this question:
AFI 33–332, Privacy Act Program.
AFI 31–401, Information Security Program Management.
AFI 31–501, Personnel Security Program Management.
AFI 31–601, Industrial Security Program Management.
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
3D053 V1 & 2 2018
This 3D053 V1 & 2 2018 quiz assesses knowledge in cyber surety roles, focusing on duties such as intrusion detection and firewall protection, client systems management, and risk...
Questions:
175 |
Attempts:
157 |
Last updated:
Mar 21, 2023
|
CDC 3DX53 Set 2 Vol 1 Edit 03
CDC 3DX53 Set 2 Vol 1 Edit 03 assesses knowledge in cyber surety, focusing on duties like intrusion detection and firewall protection, client systems operations, risk management...
Questions:
90 |
Attempts:
44 |
Last updated:
Jun 12, 2024
|
CDC 3D053 : Trivia Questions Quiz On Cyber Surety!
This is a set of CDC 3D053 trivia Questions on Cyber Surety. In the world today a lot of the communication takes place over the internet or computer thus are susceptible to...
Questions:
52 |
Attempts:
207 |
Last updated:
Mar 19, 2023
|
3D053 Cyber Surety Volume 2 Information Protection - Boundary Control Journeyman
CDC 3D053 Cyber Surety Volume 2. Information Protection - Boundary Control Journeyman URE's
Questions:
70 |
Attempts:
263 |
Last updated:
Mar 17, 2023
|
Quiz: Do You Know About The Norton Family Of Products?
Put your knowledge to the test and take our exciting quiz on the Norton Family of Products! This interactive quiz will challenge your understanding of the renowned Norton...
Questions:
10 |
Attempts:
119 |
Last updated:
Jul 18, 2023
|
SEC Technologies And Tools - Cyber Security Quiz
As an innovative company, SEC Technologies is continuously working on game-changing solutions to protect government agencies, organizations and companies of all sizes and...
Questions:
78 |
Attempts:
614 |
Last updated:
Mar 22, 2023
|
Wait!
Here's an interesting quiz for you.