CDC 3DX5X Chapter 2 Self-test

14 Questions | Total Attempts: 146

SettingsSettingsSettings
Please wait...
3DX5X Quizzes & Trivia

This to be used as a study guide only.


Questions and Answers
  • 1. 
    How do we influence the adversary's decision-making while protecting our operations?
    • A. 

      C4ISR

    • B. 

      By integrating the capabilities of influence operations, electronic warfare ops and network warfare ops in concert.

    • C. 

      By use of UAV's

    • D. 

      Denying, Degrading, Deception, and Destruction

  • 2. 
    This type of system typically implement a distributed database, commonly referred to as a "tag database", which contains data elements called tags or points.
    • A. 

      SCADA

    • B. 

      NADA

    • C. 

      NARA

    • D. 

      AFRIMS

  • 3. 
    Who is the focal point for Tier-2 (regional level) execution of enterprise network security and centralizes those aspects of network security previously performed by the MAJCOM NOSC's?
    • A. 

      DET4

    • B. 

      Local CFP

    • C. 

      Base CFP

    • D. 

      I-NOSC

  • 4. 
    What center is the execution arm for the AFNetOps/CC for the command and control of Air Force networks?
    • A. 

      I-NOSC

    • B. 

      AFNOC

    • C. 

      AFCC

    • D. 

      JFACC

  • 5. 
    What Air Force command is appointed as the primary for cyberspace missions?
    • A. 

      AFSPC

    • B. 

      I-NOSC

    • C. 

      AFNOC

    • D. 

      CFP

  • 6. 
    Who is responsible for the networthiness of information technology systems?
    • A. 

      MAJCOM

    • B. 

      AFSPC

    • C. 

      I-NOSC

    • D. 

      Information system owners

  • 7. 
    Check all that apply. What are the two divisions that are a functional part of the AFNOC?
    • A. 

      NOD

    • B. 

      CFP

    • C. 

      I-NOSC

    • D. 

      NSD

  • 8. 
    Who's goal is it to provide effective, efficient, secure and reliable information network services used in critical DOD and Air Force C&I processes?
    • A. 

      I-NOSC

    • B. 

      CFP

    • C. 

      DET4

    • D. 

      AFNETOPS

  • 9. 
    What does the SCADA do? Choose the best definition.
    • A. 

      Monitor and control centralized systems for industrial sites, or complexes of systems spread out over large areas (WAN).

    • B. 

      Monitor and control centralized systems for industrial sites, or complexes of systems spread out over small areas (BASE).

    • C. 

      Maintain centralized systems for industrial sites, or complexes of systems spread out over small areas (BASE).

  • 10. 
    The DOD IT DISR have minimum set of standards and guidelines for the acquisition of all DOD IT systems that produce, use, or exchange information.
    • A. 

      True

    • B. 

      False

  • 11. 
    Which flight provides technical and systems support for wing communications and computer systems including ground radio, voice networks, airfield systems, and secure communications maintenance?
    • A. 

      SCQ

    • B. 

      SCX

    • C. 

      SCB

    • D. 

      SCO

  • 12. 
    Which flight is responsible for base-level communication security programs, such as COMSEC, and Spectrum Information Assurance?
    • A. 

      SCQ

    • B. 

      SCX

    • C. 

      SCB

    • D. 

      SCO

  • 13. 
    How do defensive operations handle network intrusions?
    • A. 

      They turn off all machines as soon as they detect an intruder.

    • B. 

      They detect and deny access when unauthorized intrusions are attempted, determine the source, minimize the effectiveness and help to recover in a timely manner.

    • C. 

      They instantly cut all fiber lines when there is a intruder detected.

    • D. 

      By denying, degrading, disrupting, destroying, or altering the adversary's ability to use cyberspace.

  • 14. 
    How do offensive operations support US cyberspace objectives?
    • A. 

      They detect and deny access when unauthorized intrusions are attempted, determine the source, minimize the effectiveness and help to recover in a timely manner.

    • B. 

      Offensive operations has nothing to do with US cyberspace objectives.

    • C. 

      By denying, degrading, disrupting, destroying, or altering the adversary's ability to use cyberspace.

Back to Top Back to top