3D053 Cyber Surety Journeyman Volume 1. Information Protection – Internal Control URE's
Analyze controls and implement strategies to reduce or eliminate risk.
Make decisions based on overall cost versus benefit.
Develop and apply implementation strategies.
Supervise and review.
Rate this question:
25
50
75
100
Rate this question:
Global Network
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wireless metropolitan area network (WMAN).
Rate this question:
Services and Integration Division (SAF/XC).
Air Force Virtual Private Network (AF VPN).
AFNIC Architecture and Analysis Flight (EAC).
AFNIC Network Infrastructure Flight (ECN).
Rate this question:
Twisted pair.
Fiber optic.
Coaxial.
WiFi.
Rate this question:
Bus
Star
Tree
Ring
Rate this question:
Bus
Star
Tree
Ring
Rate this question:
A
B
C
D
Rate this question:
Dynamic host configuration protocol (DHCP).
Transmission control protocol (TCP).
Hypertext transfer protocol (HTTP).
Internet protocol (IP).
Rate this question:
Internet protocol (IP).
Hypertext transfer protocol (HTTP).
Transmission control protocol (TCP).
Dynamic host configuration protocol (DHCP).
Rate this question:
Prefixing.
Subnetting.
Transition technology.
Classless Inter-Domain Routing.
Rate this question:
Routing prefix.
Hierarchy.
Subnet.
Mask.
Rate this question:
Dual stack.
Dual layer.
Tunneling.
Peer-to-peer.
Dual stack.
Dual layer.
Tunneling.
Peer-to-peer
Rate this question:
Keeping complete and accurate documentation for all configuration changes.
Minimizing risks posed by various cyberspace threats
Creating continuity throughout the network.
Installing all applicable security patches.
Rate this question:
Keeping complete and accurate documentation for all configuration changes.
Minimizing risks posed by various cyberspace threats.
Creating continuity throughout the network.
Installing all applicable security patches.
Rate this question:
Reduces the number of network users with administrative privileges.
Achieves near end-to-end command and control capability.
Guards against the insider threat.
Improves network security.
Rate this question:
Reduces the number of network users with administrative privileges.
Achieves near end-to-end command and control capability.
Guards against the insider threat.
Improves network security.
Rate this question:
802.11a
802.11b
802.11g
802.11n
Rate this question:
WiFi protected access (WPA).
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wired equivalency privacy (WEP).
Rate this question:
Mission assurance category.
Defense-in-depth code.
System classification.
Secure location.
Rate this question:
Information classification.
Mission assurance.
Need-to-know.
Sensitivity.
Rate this question:
Information assurance officer (IAO) only.
IAO and security manager.
Information assurance officer.
System administrator.
Rate this question:
Are aware of their role in IA.
Are trained on network security.
Have met investigative requirements.
Have satisfied network access requirements.
Rate this question:
Digital.
Biometric.
Encryption.
Identification.
Rate this question:
Wing.
Air Force.
Department of Defense.
Local Registration Authority/Trusted Agent (LRA/TA).
Rate this question:
Cracking.
Evaluation.
Identification.
Authentication.
AFI 33–138, Enterprise Network Operations Notification and Tracking.
AFI 31–401, Information Security Program Management.
AFI 31–501, Personnel Security Program Management.
AFI 31–601, Industrial Security Program Management.
Rate this question:
AFI 33–332, Privacy Act Program.
AFI 31–401, Information Security Program Management.
AFI 31–501, Personnel Security Program Management.
AFI 31–601, Industrial Security Program Management.
Limited (general) access.
Administrative access.
Remote user access.
End-user access.
Rate this question:
Limited (general).
Administrative.
Remote user.
End-user.
Rate this question:
Chmod.
Chown.
Chroot.
Chgrp.
Rate this question:
Rsh.
Rlogin.
Telnet.
Rfinger.
Rate this question:
Notices.
Postings.
Bulletins.
Announcements.
Rate this question:
Writes itself before the original file.
Writes itself to the end of the original file.
Writes itself between file sections of 32-bit file.
Renames the original file and writes itself with the original file’s name.
Rate this question:
Boot sector virus.
Worm program
Trojan horse
Macro virus
Rate this question:
Log off your computer daily.
Install the latest service packs.
Update your anti-virus software.
Watch for files with .exe, .com, .bat. and .scr attachments.
Rate this question:
Monitoring network traffic.
Using the least privilege principle.
Using a bidirectional firewall.
Stopping peer-to-peer sharing.
Rate this question:
I
II
IV
VII
Rate this question:
I
II
IV
VII
Rate this question:
1
2
5
A
Rate this question:
Major commands.
Direct reporting units.
Field operating agencies.
Air Force network operating center network control division.
Rate this question:
Technical.
Administrative.
Authentication.
Confidentiality.
Rate this question:
Digital.
Biometric.
Encryption.
E-mail signing.
Rate this question:
War-dialing.
BIOS password.
Time-out feature.
Secure network location.
Rate this question:
Headquarters Air Force Network Integration Center (HQ AFNIC).
Major command commanders.
Squadron commanders.
Wing commanders.
Rate this question:
Wings.
Squadrons.
Major commands.
Headquarters Air Force Network Integration Center (HQ AFNIC).
Rate this question:
Human.
Technological.
Unintentional.
Environmental.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.