In which network does every device have exactly two neighbors?
The disadvantage of a network-based intrusion detection system ...
Which port range constitutes well-known ports?
By providing users with the necessary level of access to perform their...
The information assurance assessment and assistance program (IAAP)...
What items should never be stored in the same container with COMSEC...
Which type of security clearance is not valid for personnel...
Changes that must be made to material in communication security...
What is the risk outcome that results in the physical loss of assets...
When transproting bulky communication security (COMSEC) material...
Air Force information systems must complete the information technology...
Integration of the capabilities of personnel, operations, and...
Which bound media has a core surrounded by cladding and a second layer...
Which protocol has the job of verifiying the correct delivery of data...
Which protocol is an Internet Engineering Task Force (IETF) standard...
With what agency must the contract manager validate a contractor...
The disadvantage of a host-based intrusion detection system (HIDS) is...
What was the previous name for what is now called the McAfee Firewall...
Which firewall management interface menu option views the association...
What is the term for any equipment or area in which classified...
A protective distribution system (PDS) is usually installed between...
As part of a two-person control (TCP) team, you must be designated to...
What is the risk outcome the results in the loss of services provided...
Which WiFi standard is the slowest yet least expensive?
What is the default read community string of a simple network...
Restricting what traffic travels in and out of the network best...
Which of the following are considered long term communications...
What minimum milli-ampere current can be lethal?
As the migration to internet protocol (IP) V6 continues, many...
Setting up a secure point-to-point communication is called
How long should a communication security (COMSEC) inventory form be...
Within how many minutes should an individual respond if a protective...
When network password composition rules are not automatically enforce,...
Which Air Force Instruction (AFI) guides security policy and guidance...
What of access is given to users who perform troubleshooting,...
A companion file virus is one that
To virus-protect your system, make sure you perform all the following...
To limit the risks associated with using simple network management...
What should be implemented on desktop systems connected to critical...
Voice Protection System (VPS) reports provides full-service reporting...
Who requires that the communications security account manager (CAM) be...
Who has the authority to impose restrictions upon, and prohibit the...
Which network integrates multiple topologies?
The communication security physical inventory (CPI) will include all...
Sign the communication security (COMSEC) material destruction record
Who is responsible for verifying proper security clearances and...
What office assigns a tracking number to any reported communication...
When vulnerabilities are discovered within the Window operating system...
A program that contains or installs a malicious program is called a
What is the lowest level of information condition (INFOCON)?
You can implement all of the following security features to help...
When using secure split mail services, all external simple message...
When the cached information is verified to be up-to-date, the proxy...
The Cyber T hec The Cyber Surety journeyman monitors all of the...
Which class of internet protocols addresses in used for very large...
What situation is not an authorized exception to...
When transporting communication security (COMSEC), MAJCOM approval is...
While monitoring your network, a guideline you should remember is to
Message that are sent to the person administering a mail system are...
Sanitizing sealed disks, removable disk packs, magnetic bubble memory,...
Who owns the Enterprise Telephony Management system?
How often must a degausser be recertified for the first two years of...
What form is used to record the arrival or departure of all...
The main source of compromising emanations is the result of
Except under special circumstances, destroy communication security...
Requirements for availability and integrity are associated with
Cyber Surety specialists do not review information system audit...
Active intrusion detection system (IDS) blocks network traffic when it...
The front of the KOK-22A device fill connector allows interface with...
In which type of port scan does the scanner connect to the same port...
A firewall burb can best be defined as
Flaws that include threats in building construction, improper...
Which type of network typically provides wireless broadband data...
Personnel at the temporary duty (TDY) location can/should verify an...
Guidance for processing COMSEC material receipt reporting...
As a mininum, to what classification should you mark a...
What term is used for a domain name server (DNS) architecture when one...
Which access control list (ACL) restricts packets into or out of a...
The vulnerabilities of voice and data converged networks were...
When overwriting hard drives, examine what minimum percentage to...
For in-trasit storage, an installation commander can authorize what...
In basic circuit theory, if the power source is disconnected or if...
What cryptographic access program (CAP) withdrawal method is used for...
How often should communications security (COMSEC) access lists be...
The sequences of leading bits in an internet protocol used to identify...
To make it possible for replacement administrators to accomplish the...
Which wireless standard originally intended to create a wireless...
What shall be assigned to all Department of Defense information...
Port Scanning
An area, room, or space which, when attended, must be occupied by two...
With the consolidation of the several Network Operations and...
The integrated network operations and security center (INOSC) has...
Initial information assurance (IA) awareness training for all network...
What does a firewall support that improves systems performance by...
Which flexible command line can be used to gather information form...
When using transparent mail services, the following mail filtering...
Which communications security (COMSEC) tier generates,distributes, and...
The only authorized methods to destroy key tapes are by of the...
What local communications security managemet software (LCMS) desktop...
To improve system security, several services that are preloaded on...
Which intrusion detection system (IDS) uses software sensors?
When loading the vector set for the firefly credentials and you click...
What type of certificate authenticates the identity of the user?
Who reviews information assurance assurance program (IAAP) reports and...
Degaussing with an NSA-approved degausser is the only clear which...
Which name server is the only one that should have changes to...
All the following are requirements that must be met to be a...
Communications security (COMSEC) clerks should inspect all protective...
Who assesses local communications security (COMSEC) elements during...
What classification of communication security (COMSEC) material is the...
The local management device (LMD) supports or utilizes all of the...
Whenever possible, in which environment would you run the UNIX Apache...
Above which layer of the open systems integration (OSI) model are...
Which port tool is not used to test your simple network management...
Proxies do not
Automated security incident measurement (ASIM) transcripts are...
When using an intrusion detection system (IDS), remember to
Which device connects to the local management device (LMD) and...
Which type of firewall is typically used when speed is essential?
For what Berkeley Internet Name Domain (BIND) server type can there be...
Networked resources must be consistently monitored and controlled to...
The use of two or more network interface cards (NIC) best describes...
Which McAfee Firewall Enterprise management interface is the graphical...
From which media type must you remove to outer chassis and electronic...
What term is used to describe a communication security (COMSEC)...
What type of access isgiven to remote users who access, download, or...
Use the high availability shared cluster addresses dialog box to do...
...
Which COMSEC publication provides step-by-step procedures for COMSEC...
To use VPN products, obtain interim approval from?
When removing material from a communication security physical...
Before selecting a protective distribution system (PDS), with what two...
When coupled with standardized network policy, the standard desktop...
What is not true about firefly credentials?
Which communication security (COMSEC) management software is used in...
Which open source network-based intrusion detection system performs...
To ensure the integrity of the overwriting processm overwriting...
Unless directed by National Security Agency (NSA) or HQ CPSQ, how...
Which network-based security tool is a hardware and software and...
Information security-related access controls that include segregation...
Most of the firewall implementations you will encounter will be found...
Which Berkeley Internet Name Domain (BIND) system file provide reverse...
Who approves or disapproves IS (including software and services)...
All of the following are characteristics and capabilities of a Voice...
To determine the appropriate actions to take during the absence of the...
Drilled and repaired security containers or vaults may be used to...
A facility with an inspectable space of more than 20 meters but less...
What term is used to describe a communication security (COMSEC)...
Which situation does not describe a communication...
A final communication security (COMSEC) incident report...
All agencies/organizations implement information condition (INFOCON)...
Which firewall shutdown option is useful if you need to connect...
No procedures exist for cleaning which media type?
Which proxy is located near the web server and acts as an intermediary...
Which Voice Protection System (VPS) application provides allows you to...
Which Air Force System Security Instruction (AFSSI) will the wing...
Which intrusion detection system (IDS) examines servers or client...
Which intrusion detection system (IDS) monitors packets for protocol...
Which Berkeley Internet Name Domain (BIND) server is responsible for...
Examples of where sanitization and declassification are appropriate...
The coercivity of a Type II extended range degausser is
Which Voice Protection System (VPS) application generates reports of...
Which Voice Protection System (VPS) tree pane contains predefined...
What Standard Form label is used as a data descriptor label?
What is the fourth step in the operational risk management (ORM)...
Which of the following is not an authorized official who may...
Which type of firewall views information as a data stream and not as a...
Which mail system components sends or retrieves mail between the other...
Which email server relays all email entering or exiting the local...
During the initial research for voice system security, who...
Breaking down the packets' addresses to act as a gateway to allow...
Report loss or suspected loss of removable media containing controlled...
What is the default firewall shutdown option?
Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100...
Which intrusion detection system (IDS) examines traffic for suspicious...
Which common access card (CAC) certificate would be used to sign an...
What category is an incident in which an unauthorized person gained...
Which email server delivers all outgoing email to the mail relay...
Which communications security (COMSEC) management software does not...
Which is not a category of software package available today used that...
All of the following are Voice Protection System (VPS) policy...
Which security tool is designed to manage sensitive data and enforce...
Who reports all backdoors and unauthorized connections to Air Force...
What is referred to as a logistic and accounting system through which...
The transit cryptographic ignition key (CIK) for the KOK-22A is...
Which Air Force Systems Security Instruction (AFSSI) provides...
Who manages the cryptographic access program (CAP) database for...
What severity code applies to any vulnerability that, when resolved,...
What type of proxy must be run because of an attacker's potential...
In regards to Berkeley Internet Name Domain (BIND) system files, items...
Which Air Force System Security Instruction (AFSSI) will the wing...
Who is the final authority granting approval to operate a protective...
What category is an incident in which an Air Force...
Which agency conducts assessments of wing information assurance (IA)...
In which phase if the Department of Defense information assurance...
What severity code applies to any vulnerability that provides...
Which type of Nation Security Agency (NSA) approved encryption devices...
Which organization has direct operational control of Air Force Ports,...
When classified material is not stored in a General Service...
What severity code applies to any vulnerability that provides...