CDC Z3dx5x (Edit Code 02) Volume 1, Unit 2

28 Questions | Total Attempts: 33

SettingsSettingsSettings
Volume Quizzes & Trivia

.


Questions and Answers
  • 1. 
    (009) What United States Codes (USC) title authorizes the creation of the Department of Defense (DOD) as an executive component of government and establishes all subordinate agencies including the Army, Navy, Air Force, and Marine Corps?
    • A. 

      Title 10

    • B. 

      Title 18

    • C. 

      Title 32

    • D. 

      Title 50

  • 2. 
    (009) The Uniform Code of Military Justice (UCMJ) is derived from what United States Code (USC)?
    • A. 

      Title 3

    • B. 

      Title 8

    • C. 

      Title 10

    • D. 

      Title 18

  • 3. 
    (010) Which document spells out the comprehensive strategy for the United States to secure cyberspace?
    • A. 

      National Military Cyberspace Strategy

    • B. 

      National Strategy to Secure Cyberspace

    • C. 

      National Military Strategy for Cyberspace

    • D. 

      National Military Strategy to Secure Cyberspace

  • 4. 
    (010) Which policy has prevention of cyber attacks against America's critical infrastructure as a key strategic priority?
    • A. 

      National Security Policy

    • B. 

      National Strategy to Secure Cyberspace

    • C. 

      Comprehensive National Cyberspace Initiative

    • D. 

      National Military Strategy for Cyberspace Operations

  • 5. 
    (010) What policy outlines the United States (US) Armed Forces' comprehensive strategic approach for using cyberspace operations to assure US military strategic superiority in the cyber domain?
    • A. 

      National Security Policy

    • B. 

      National Strategy to Secure Cyberspace

    • C. 

      Comprehensive National Cybersecurity Initiative

    • D. 

      National Military Strategy for Cyberspace Operations

  • 6. 
    (010) When Air National Guard personnel in Title 32 status train for cyber operations, what title status must they be in to execute those missions?
    • A. 

      Title 10

    • B. 

      Title 30

    • C. 

      Title 50

    • D. 

      Title 52

  • 7. 
    (010) An employee or employer relationship that leads to the appearance of impartiality or favoritism is an unethical situation known as
    • A. 

      Misuse of position

    • B. 

      Covered relationships

    • C. 

      Non-public information

    • D. 

      Personal conflict of interest

  • 8. 
    (010) Members of a household or relatives with whom you have a close personal relationship is an example of which type of unethical situation
    • A. 

      Misuse of position

    • B. 

      Covered relationship

    • C. 

      Personal conflict of interest

    • D. 

      None, this is not an example of an unethical situation

  • 9. 
    (011) What cyberspace weapon system includes the Integrated Network Operations Security Center (I-NOSC), Enterprise Service Unit (ESU), and Area Processing Center (APC) functions?
    • A. 

      Air Force Intranet Control Weapon System

    • B. 

      Air Force Cyber Security and Control System

    • C. 

      Air Force Cyberspace Defense Weapon System

    • D. 

      Air Force Cyber Command and Control Mission System

  • 10. 
    (011) What cyberspace weapon system resulted from an operational initiative to consolidate numerous major command (MAJCOM) specific stove-piped networks into a centrally managed and controlled network under three Integrated Network Operations and Security Centers (I-NOSC)?
    • A. 

      Air Force Cyber Command and Control Mission System

    • B. 

      Air Force Cyberspace Defense Weapon System

    • C. 

      Air Force Cyber Security and Control System

    • D. 

      Air Force Intranet Control Weapon System

  • 11. 
    (011) What cyberspace weapons system is the top-level boundary and entry point into the Air Force Information Network (AFIN)?
    • A. 

      Air Force Cyber Command and Control Mission System

    • B. 

      Air Force Cyberspace Defense Weapon System

    • C. 

      Air Force Cyber Security and Control System

    • D. 

      Air Force Intranet Control Weapon System

  • 12. 
    (011) Proactive defense is one of the four integrated sub-disciplines of what cyberspace defense weapons system?
    • A. 

      Air Force Intranet Control Weapon System

    • B. 

      Air Force Cyber Security and Control System

    • C. 

      Air Force Cyberspace Defense Weapon System

    • D. 

      Air Force Cyber Command and Control Mission System

  • 13. 
    (011) What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?
    • A. 

      Air Force Cyber Command and Control Mission System

    • B. 

      Air Force Cyberspace Defense Weapon System

    • C. 

      Air Force Cyber Security and Control System

    • D. 

      Air Force Intranet Control Weapons System

  • 14. 
    (011) What cyberspace weapon system identifies vulnerabilities and provides commanders with a comprehensive assessment of the risk of existing vulnerabilities on critical mission networks?
    • A. 

      Cyberspace Vulnerability Assessment/Hunter Weapon System

    • B. 

      Air Force Cyber Command and Control Mission System

    • C. 

      Cyberspace Defense Analysis Weapon System

    • D. 

      Air Force Intranet Control Weapons System

  • 15. 
    (012) What major command and numbered Air Force (NAF) were realigned to support the Air Force cyberspace missions?
    • A. 

      Air Combat Command, 9th Air Force

    • B. 

      Air Force Space Command, 24th Air Force

    • C. 

      Air Force Global Strike Command, 8th Air Force

    • D. 

      Air Education and Training Command, 2nd Air Force

  • 16. 
    (012) What two cyber operation defense involve continuous monitoring and analyzing and directly counter an adversary penetrating a network or terminating an ongoing intrusion.
    • A. 

      Active and reactive

    • B. 

      Evasive and decisive

    • C. 

      Subversive and divisive

    • D. 

      Offensive and defensive

  • 17. 
    (012) Since Military Information Support Operations (MISO) and Public Affairs (PA) share a common specific audience, which activities are designed to mislead?
    • A. 

      Counterintelligence (CI)

    • B. 

      Operation Security (OPSEC)

    • C. 

      Military deception (MILDEC)

    • D. 

      Intelligence Surveillance and Reconnaissance (ISR)

  • 18. 
    (013) What document directs the development of the National Military Strategic Plan for Securing Cyberspace?
    • A. 

      Strategic Considerations

    • B. 

      Military Strategic Framework

    • C. 

      Implementation and Assessment

    • D. 

      Department of Defense Strategic Planning Guidance

  • 19. 
    (013) Which agency is responsible for matters pertaining to the identification, prioritization and remediation of critical Global Information Grid (GIG) infrastructure?
    • A. 

      Defense Industrial Base (DIB)

    • B. 

      Defense Intelligence Agency (DIA)

    • C. 

      National Reconnaissance Office (NRO)

    • D. 

      Defense Information Systems Agency (DISA)

  • 20. 
    (014) What unit installs, reconstitute, and test critical C4 systems for combatant commanders anywhere at any time?
    • A. 

      644th Combat Communication Squadron

    • B. 

      85th Engineering Installation Squadron

    • C. 

      83rd Network Operations Squadron

    • D. 

      4th Expeditionary Fighter Wing

  • 21. 
    (015) Which unit within the Air Force Network Operations (AFNetOps) community has a goal to reduce training and increase the warfighter capacity?
    • A. 

      Enterprise Service Unit (ESU)

    • B. 

      Area Processing Center (APC)

    • C. 

      Enterprise Service Desk (ESD)

    • D. 

      Network Operations Security Center (NOSC)

  • 22. 
    (015) What regional computing and data center provide enterprise services like messaging , Web access, and storage?
    • A. 

      Enterprise Service Unit (ESU)

    • B. 

      Area Processing Center (APC)

    • C. 

      Enterprise Service Desk (ESD)

    • D. 

      Network Operations Security Center (NOSC)

  • 23. 
    (015) What reason is the main purpose for consolidating Network Control Centers (NCC) and forming the Enterprise Service Desk?
    • A. 

      Manpower

    • B. 

      Efficiency

    • C. 

      Reduce costs

    • D. 

      Department of Defense 8570 mandate

  • 24. 
    (015) What year did the Air Force institute a single instance of Remedy allowing support to all locations within a single ticketing system?
    • A. 

      2009

    • B. 

      2010

    • C. 

      2011

    • D. 

      2012

  • 25. 
    (016) What two levels are joint task forces (JTF) divided into?
    • A. 

      Subordinate unified command and geographical command

    • B. 

      Unified command and subordinate unified command

    • C. 

      Functional command and geographical command

    • D. 

      Unified command and functional command

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.