This quiz, titled '3D053 Vol's 1,2, and 3', assesses knowledge in cybersecurity, network technologies, and safety protocols. It covers operational risk management, lethal currents, VPN usage, and network types, essential for professionals in information security and IT.
Monitoring network traffic
Using the least privilege principle
Using a bidirectional firewall
Stopping peer-to-peer sharing
Rate this question:
Cannot analyze encrypted packets because it has no method for decrypting the data
Monitors log files for inadvisable settings or passwords
Monitors traffic on the network on which it is installed
Consumes very few network resources
Rate this question:
0-1023
1024-23535
23536-49151
49152-65535
Rate this question:
Denial of service
Modification
Destruction
Disclosure
Rate this question:
SPACE and SAP/SAR
Major command
Department of the Air Force
Department of Defense
Rate this question:
Firewalls
Information condition (INFOCON)
Security tools
Defense in depth
Rate this question:
Security forces
Information systems
Information assurance
Base information infrastructures
Rate this question:
High theft items
Cryptographic maintenance manuals
Unkeyed classified COMSEC equipment
Cryptographic access program (CAP) documentation
Rate this question:
A final security clearance
An interim security clearance
A clearance equal to the COMSEC being accessed
A clearance higher than the COMSEC being accessed
Rate this question:
Modifications
Amendments
Corrections
Updates
Rate this question:
Under no circumstances
When it is in a baggage area
When it is loaded on a cargo dock
When it is passed on to authorized airport personnel
Rate this question:
WiFi
Coaxial
Fiber Optic
Twisted pair
Rate this question:
Dynamic host configuration protocol (DHCP)
Transmission control protocol (TCP)
Hypertext transfer protocol (HTTP)
Internet protocol (IP)
Rate this question:
Internet Protocol (IP)
Hypertext transfer protocol (HTTP)
Transmission control protocol (TCP)
Dynamic host configuration protocol (DHCP)
Rate this question:
Wing
Air Force
Department of Defense
Local Registration Authority/Trusted Agent (LRA/TA)
Rate this question:
Can analyze any encrypted data if it is decrypted before reaching the target host
Consumes resources on the host resides on and slows the device down
Monitors log files for inadvisable settings or passwords
Monitors traffic on the host which it is installed
Rate this question:
Sidewinder
Death Star
Blue Coat
Viper
Rate this question:
Address Resolution Protocol (ARP)
Getroute
Ping host
Traceroute
Rate this question:
802.11a
802.11b
802.11g
802.11n
Rate this question:
TEMPEST
Black
EMSEC
RED
Rate this question:
Controlled access areas(CAA)
Limited-control area (LCA)
Uncontrolled access areas (UAA)
Wing information assurance offices (WIAO)
Rate this question:
Denial of service
Modification
Destruction
Disclosure
Rate this question:
Private
Public
Secure
Unsecure
Rate this question:
Firewalls
Internet Security Scanner
Security tools
Defense in depth
Rate this question:
Personnel reliability program (PRP)
Sealed authenticator systems (SAS)
Permissive action link (PAL)
Coded switch system (CSS)
Rate this question:
100
75
50
25
Rate this question:
Prefixing
Subnetting
Transition Technology
Classless Inter-Domain Routing
Rate this question:
Dual stack
Dual layer
Tunneling
Peer-to-peer
Rate this question:
Cracking
Evaluation
Identification
Authentication
Rate this question:
AFI 33-332, Privacy Act Program
AFI 31-401, Information Security Program Management
AFI 31-501, Personnel Security Program Management
AFI 31-601, Industial Security Program Management
Rate this question:
Limited (general)
Administrative
Remote user
End-user
Rate this question:
Writes itself before the original file.
Writes itself to the end of the original file.
Writes itself between file sections of 32-bit file.
Renames the orginal file and writes itself with the orginal file's name.
Rate this question:
Log off your computer daily
Install the latest service packs
Update your anti-virus software
Watch for files with .exe, .com, .bat, and .scr attachments
Rate this question:
War-dialing
BIOS password
Time-out feature
Secure network location
Rate this question:
15
30
45
60
Rate this question:
Use access control lists on SNMP agents to accept SNMP messages from all SNMP managers
Keep devices requiring SNMP together with those that do not through VLANs
Disable all SNMP devices/services if not required
Enable the set community strings if possible
Rate this question:
KYK-13
KYX-15
Simple key loader (SKL)
Communications security physical inventory (CPI)
Rate this question:
Current month only
Past six months only
Past six months plus the current month
Based upon local guidance at each installation
Rate this question:
Bus
Star
Tree
Ring
Rate this question:
Information assurance officer (IAO) only
IAO and security manager.
Have met investigative requirements
Have satisfied network access requirements.
Rate this question:
Notices
Postings
Bulletins
Announcements
Rate this question:
Boot sector virus
Worm program
Trojan horse
Macro virus
Rate this question:
1
2
5
A
Rate this question:
Major command
Wing commander
Designated approving authority
Officer in charge
Rate this question:
Consolidating your voice with your data using virtual local area network (VLAN)
Enabling access control lists (ACL) on firewalls, routers, an switches.
Deploying protection from dynamic host configuration protocol (DHCP) spoofing
Enabling port security access to only allow the required devices needed by the client.
Rate this question:
View telecom resource use
Track phone network usage
Provide conversation transcripts
Report on service performance and call quality
Rate this question:
Federal Aviation Administration (FAA)
Cryptologic Systems Group (CPSG)
Nation Security Agency (NSA)
Major Command (MAJCOM)
Rate this question:
Accounting legend code (ALC)
Edition
Quantity
Short title
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Intellectual Output 2: Chapter 1 Safe Use Of Internet And Social Media, Self Assesment Test
This self-assessment test covers essential aspects of safe internet and social media use, including cybersecurity threats like malware, the importance of secure connections, and...
Questions:
10 |
Attempts:
76 |
Last updated:
Aug 25, 2023
|
Computer And Network Security Practice Questions!
Dive into key concepts of computer and network security with this practice quiz! Topics include decryption, virus identification, RSA algorithm, cryptanalysis, TLS, and key...
Questions:
20 |
Attempts:
836 |
Last updated:
May 25, 2024
|
CYBER CRIMES & IPR
Explore key aspects of cybersecurity and intellectual property rights in the CYBER CRIMES & IPR quiz. Assess your understanding of viruses, phishing, illegal downloading, scams,...
Questions:
10 |
Attempts:
112 |
Last updated:
Mar 20, 2023
|
True / False Exercise-Societal Impact
This quiz evaluates understanding of cybersecurity topics like malware, hacking, and ethical hacking, emphasizing their societal impacts.
Questions:
10 |
Attempts:
249 |
Last updated:
Mar 21, 2023
|
FTC Cybersecurity Basics Quiz
Test your understanding of cybersecurity basics by selecting the correct response for each question or statement.
Questions:
5 |
Attempts:
1027 |
Last updated:
Mar 21, 2023
|
Activity 3.1 - Principals Of Cybersecurity
Based on the measures provided, select the most appropriate CIA component the measure is safeguarding against.
Questions:
7 |
Attempts:
1215 |
Last updated:
Mar 20, 2023
|
Wait!
Here's an interesting quiz for you.