3DX7X Vol 1: Unit 6

18 Questions | Total Attempts: 111

SettingsSettingsSettings
Please wait...
3DX7X Vol 1: Unit 6

Cyber Operations Capabilities, Networking and Infrastructure


Questions and Answers
  • 1. 
    What are the three major considerations that apply to Cyberspace Operations?
    • A. 

      Policy, Security, Authority

    • B. 

      Authority, Security, Law

    • C. 

      Law, Authority, Policy

    • D. 

      Security, Policy, Law

  • 2. 
    What title status must National Guard Guardsmen be in to execute cyber operations?
    • A. 

      Title 10

    • B. 

      Title 30

    • C. 

      Title 50

    • D. 

      Title 52

  • 3. 
    Which operations center monitors and controls Air Force network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity?
    • A. 

      Integrated Network Operations Security Center (I-NOSC)

    • B. 

      Base Defense Operations Center

    • C. 

      624th Operations Center

    • D. 

      Air Operations Center

  • 4. 
    Within the information environment what term describes the advantage, or imbalance, in one's favor?
    • A. 

      Information Management

    • B. 

      Network-centric warfare

    • C. 

      Information Superiority

    • D. 

      Information Operations

  • 5. 
    What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary's, and maximizing cyberspace superiority?
    • A. 

      Careful planning

    • B. 

      Reactive operations

    • C. 

      Immediate response

    • D. 

      Information Operations

  • 6. 
    Which Electronic Warfare capability uses jamming to reduce the adversary's use of the electromagnetic spectrum (EMS)?
    • A. 

      Electronic attack

    • B. 

      Electronic protection

    • C. 

      Network Exploitation

    • D. 

      Electronic warfare support

  • 7. 
    Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)?
    • A. 

      EW concerns radiated energy

    • B. 

      CNO concerns radiated energy

    • C. 

      EW is only used for offensive purposes

    • D. 

      CNO is only used for defensive purposes

  • 8. 
    Which Cyberspace Defense Weapon System sub-discipline determines the extent of intrusions, develops course of action required to mitigate threats, and determines and executes response actions?
    • A. 

      Computer Forensics

    • B. 

      Incident Prevention

    • C. 

      Incident Detection

    • D. 

      Incident Response

  • 9. 
    Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information?
    • A. 

      Defense-in-Depth

    • B. 

      Proactive Defense

    • C. 

      Situational Awareness

    • D. 

      Network Standardization

  • 10. 
    Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor?
    • A. 

      Supervisory System

    • B. 

      Remote Terminal Unit

    • C. 

      Human Machine Interface

    • D. 

      Programmable Logic Controller

  • 11. 
    Which supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data?
    • A. 

      Supervisory System

    • B. 

      Remote Terminal Unit

    • C. 

      Human Machine Interface

    • D. 

      Programmable Logic Controller

  • 12. 
    Which threat vector is considered more of an annoyance than an attack?
    • A. 

      Virus

    • B. 

      Spam

    • C. 

      Spyware

    • D. 

      Phishing

  • 13. 
    Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?
    • A. 

      Patches

    • B. 

      Antivirus

    • C. 

      Software removal

    • D. 

      Vulnerability scanner

  • 14. 
    Which identity management process uses a fingerprint to authenticate a user?
    • A. 

      Token

    • B. 

      Biometrics

    • C. 

      Multifactor

    • D. 

      Knowledge-based

  • 15. 
    Which identity management process uses a password to authenticate a user?
    • A. 

      Token

    • B. 

      Biometrics

    • C. 

      Multifactor

    • D. 

      Knowledge-based

  • 16. 
    What system monitoring concept uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines?
    • A. 

      Intrusion Detection and Prevention Systems

    • B. 

      End-to-End Performance Monitoring

    • C. 

      Vulnerability scanners

    • D. 

      Capacity Planning

  • 17. 
    Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of a safeguards and acceptable risk?
    • A. 

      Wing Commander

    • B. 

      Authorizing Official

    • C. 

      Wing information security office (WIAO)

    • D. 

      Communications and Information systems officer (CSO)

  • 18. 
    The technical solution for a communications and information system requirement summarizes
    • A. 

      Only full costs

    • B. 

      Recommended course of action only

    • C. 

      Full cost and recommended course of action

    • D. 

      Full cost, recommended course of action, and security requirements