3D053 Cyber Surety Journeyman Volume 1. Information Protection – Internal Control URE's
Wing.
Air Force.
Department of Defense.
Local Registration Authority/Trusted Agent (LRA/TA).
Rate this question:
Limited (general).
Administrative.
Remote user.
End-user.
Rate this question:
Dynamic host configuration protocol (DHCP).
Transmission control protocol (TCP).
Hypertext transfer protocol (HTTP).
Internet protocol (IP).
Rate this question:
Information assurance officer (IAO) only.
IAO and security manager.
Information assurance officer.
System administrator.
Rate this question:
Twisted pair.
Fiber optic.
Coaxial.
WiFi.
Rate this question:
Bus
Star
Tree
Ring
Rate this question:
Internet protocol (IP).
Hypertext transfer protocol (HTTP).
Transmission control protocol (TCP).
Dynamic host configuration protocol (DHCP).
Rate this question:
Dual stack.
Dual layer.
Tunneling.
Peer-to-peer
Rate this question:
Boot sector virus.
Worm program
Trojan horse
Macro virus
Rate this question:
Denial of service.
Modification.
Destruction.
Disclosure.
Rate this question:
Controlled access areas (CAA).
Limited-control area (LCA).
Uncontrolled access areas (UAA).
Wing information assurance offices (WIAO).
Rate this question:
Denial of service.
Modification.
Destruction.
Disclosure.
Rate this question:
Prefixing.
Subnetting.
Transition technology.
Classless Inter-Domain Routing.
Rate this question:
Cracking.
Evaluation.
Identification.
Authentication.
Log off your computer daily.
Install the latest service packs.
Update your anti-virus software.
Watch for files with .exe, .com, .bat. and .scr attachments.
Rate this question:
TEMPEST.
BLACK.
EMSEC.
RED.
Rate this question:
Bus
Star
Tree
Ring
Rate this question:
15
30
45
60
Rate this question:
SPACE or SAP/SAR.
Major command.
Department of the Air Force.
Department of Defense.
Rate this question:
Major command.
Wing commander.
Designated approving authority.
Officer in charge.
Rate this question:
Secret and Top Secret.
Confidential and Secret.
Unclassified and Confidential.
All classifications may be kept on the flightline.
Rate this question:
Notices.
Postings.
Bulletins.
Announcements.
Rate this question:
Writes itself before the original file.
Writes itself to the end of the original file.
Writes itself between file sections of 32-bit file.
Renames the original file and writes itself with the original file’s name.
Rate this question:
1
2
5
A
Rate this question:
War-dialing.
BIOS password.
Time-out feature.
Secure network location.
Rate this question:
Every 3 months.
Every 6 months.
Every 12 months.
Only once during the first two years.
Rate this question:
Communications security (COMSEC).
Computer security (COMPUSEC).
Information security (INFOSEC).
Emissions security (EMSEC).
Rate this question:
Routing prefix.
Hierarchy.
Subnet.
Mask.
Rate this question:
Keeping complete and accurate documentation for all configuration changes.
Minimizing risks posed by various cyberspace threats.
Creating continuity throughout the network.
Installing all applicable security patches.
Rate this question:
Human.
Technological.
Unintentional.
Environmental.
Rate this question:
Ensure system vulnerabilities are identified.
Ensure system penetrations are identified.
Report fraud, waste and abuse.
Report a rudimentary inquiry.
Rate this question:
25
50
75
100
Rate this question:
WiFi protected access (WPA).
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wired equivalency privacy (WEP).
Rate this question:
A
B
C
D
Rate this question:
802.11a
802.11b
802.11g
802.11n
Rate this question:
Headquarters Air Force Network Integration Center (HQ AFNIC).
Major command commanders.
Squadron commanders.
Wing commanders.
Rate this question:
Chmod.
Chown.
Chroot.
Chgrp.
Rate this question:
Digital.
Biometric.
Encryption.
E-mail signing.
Rate this question:
Battery.
Signal.
Circuit.
Path.
Rate this question:
Keeping complete and accurate documentation for all configuration changes.
Minimizing risks posed by various cyberspace threats
Creating continuity throughout the network.
Installing all applicable security patches.
Rate this question:
Information classification.
Mission assurance.
Need-to-know.
Sensitivity.
Rate this question:
Are aware of their role in IA.
Are trained on network security.
Have met investigative requirements.
Have satisfied network access requirements.
Rate this question:
The wing commander.
The major command commander.
Air Force network operations center (AFNOC).
Air Force Office of Special Investigation (AFOSI).
Rate this question:
Global Network
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wireless metropolitan area network (WMAN).
Rate this question:
Dynamic random access memory and Random-access memory.
Programmable read-only memory and Optical Media.
Static random access memory.
Magnetic tapes.
Rate this question:
Rsh.
Rlogin.
Telnet.
Rfinger.
Rate this question:
10
20
50
70
Rate this question:
AFI 33–332, Privacy Act Program.
AFI 31–401, Information Security Program Management.
AFI 31–501, Personnel Security Program Management.
AFI 31–601, Industrial Security Program Management.
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.