This 3D053 V1 & 2 2018 quiz assesses knowledge in cyber surety roles, focusing on duties such as intrusion detection and firewall protection, client systems management, and risk management processes. It is crucial for personnel in cyber operations and security.
A. 40.
B. 60.
C. 75.
D. 95.
Rate this question:
A. CAT–6
B. Coaxial
C. Fiber optic.
D. Twisted pair
Rate this question:
A. Fiber optic.
B. Terrestrial.
C. Radio frequency.
D. Satellite microwave.
Rate this question:
A. Bus.
B. Star.
C. Ring.
D. Tree.
Rate this question:
A. 4.
B. 6.
C. 8.
D. 10.
Rate this question:
A. mask.
B. subnet.
C. hierarchy.
D. routing prefix.
Rate this question:
A. 50.
B. 80.
C. 5050.
D. 8080.
Rate this question:
A. Internet protocol (IP).
B. Hypertext transfer protocol (HTTP).
C. Transmission control protocol (TCP).
D. Dynamic host configuration protocol (DHCP).
Rate this question:
A. 0 to 1023.
B. 1024 to 23535.
C. 23536 to 49151.
D. 49152 to 65535.
Rate this question:
A. 21.
B. 22.
C. 60.
D. 80.
Rate this question:
A. Fragment packets.
B. Synchronous (SYN) scan.
C. User datagram protocol (UDP) scan.
D. Transmission control protocol (TCP) scan.
Rate this question:
A. 802.11a.
B. 802.11b.
C. 802.11g.
D. 802.11n.
Rate this question:
A. having information ready when needed.
B. not being able to deny who performed network actions.
C. the protection of the network from those not authorized access.
D. the assurance that no one has changed or destroyed information without permission.
Rate this question:
A. 32-bit.
B. 64-bit.
C. 128-bit.
D. 256-bit.
Rate this question:
A. Digital.
B. Biometric.
C. Encryption.
D. Identification.
Rate this question:
A. Integrity.
B. Availability.
C. Confidentiality.
D. Non-repudiation.
Rate this question:
A. Wing (WG).
B. Air Force (AF).
C. Department of Defense (DOD).
D. Local Registration Authority/Trusted Agent (LRA/TA).
Rate this question:
A. End-user.
B. Remote user.
C. Administrative.
D. Limited (general).
Rate this question:
A. threats.
B. exploits.
C. vulnerabilities.
D. breaches of security.
Rate this question:
A. Shutting down ports.
B. Using strong passwords.
C. Ensuring remote access.
D. Disabling unused/unneeded services.
Rate this question:
A. an e-mail incident.
B. a message incident.
C. a classified e-mail incident.
D. a classified message incident.
Rate this question:
A. Number of information systems.
B. Number of personnel assigned.
C. Type of organization.
D. Mission need.
Rate this question:
A. TEMPEST.
B. BLACK.
C. EMSEC.
D. RED.
Rate this question:
A. Risk Assessment (RA).
B. Personnel Security (PS).
C. Audit and Accountability (AU).
D. System and Information Integrity (SI).
Rate this question:
A. Major General (O–8).
B. Brigadier General (O–7).
C. Colonel (O–6).
D. Lieutenant Colonel (O–5).
Rate this question:
A. Design.
B. Define need.
C. Build and test.
D. Define need review.
Rate this question:
A. Federal Aviation Administration (FAA).
B. Cryptologic Systems Division (CPSD).
C. National Security Agency (NSA).
D. Major command (MAJCOM).
Rate this question:
A. Communications security responsible officer (CRO).
B. Communications access program (CAP) assistant.
C. Communications security accountant.
D. Security manager.
Rate this question:
A. Communications security responsible officer (CRO).
B. Communications security account manager (CAM).
C. COMSEC accountant.
D. Security manager.
Rate this question:
A. Hold an interim security clearance.
B. Have a final security clearance.
C. Be a DOD cleared contractor.
D. Be a US citizen.
Rate this question:
A. A final security clearance.
B. An interim security clearance.
C. A clearance equal to the COMSEC being accessed.
D. A clearance higher than the COMSEC being accessed.
Rate this question:
A. Every week.
B. Every two weeks.
C. Once a month.
D. Every six months.
Rate this question:
A. Unit commander.
B. Security manager.
C. Communications security account manager (CAM).
D. Communication security responsible officer (CRO).
Rate this question:
A. Unit commander.
B. COMSEC material user.
C. Communications security account manager (CAM).
D. Cryptographic access program (CAP) administrator.
Rate this question:
A. Communications security account manager (CAM) or any responsible person on the COMSEC access list
B. Communications security responsible officer (CRO).
C. Alternate CAM only.
D. CAM only.
Rate this question:
A. Two-person control (TPC).
B. Two-person integrity (TPI).
C. Cryptographic access program (CAP).
D. Communications security management system (CMS).
Rate this question:
A. Under no circumstances.
B. When it is in a baggage claim area.
C. When it is loaded on a cargo dock.
D. When it is passed on to authorized airport personnel.
Rate this question:
A. Pilots.
B. Communications security manager (CAM).
C. Information system security officer (ISSO).
D. Combat Crew Communications (CCC) technician.
Rate this question:
A. Pilots.
B. Communications security manager (CAM).
C. Information system security officer (ISSO).
D. Combat Crew Communications (CCC) technician.
Rate this question:
A. Sustain cryptographic equipment.
B. Install and maintain servers or other computer systems.
C. Manage data, information, and knowledge sharing services.
D. Detection activities, including real-time intrusion detection and firewall protection.
Rate this question:
A. B.
B. C.
C. D.
D. E.
Rate this question:
A. User datagram protocol (UDP).
B. Hypertext transfer protocol (HTTP).
C. Dynamic host configuration protocol (DHCP).
D. Transmission control protocol/Internet Protocol (TCP/IP).
Rate this question:
A. a port.
B. a protocol.
C. a service point.
D. an entrance point.
Rate this question:
A. 7.
B. 20.
C. 23.
D. 53.
Rate this question:
A. Strobe scan.
B. Sweep scan.
C. Fragment packet scan.
D. File transfer protocol (FTP) bounce scan.
Rate this question:
A. Installing all applicable security patches.
B. Creating continuity throughout the network.
C. Minimizing risks posed by various cyberspace threats.
D. Keeping complete and accurate documentation for all configuration changes.
Rate this question:
A. 802.11a.
B. 802.11b.
C. 802.11g.
D. 802.11n.
Rate this question:
A. an adequate information assurance (IA) posture in a shared-risk environment.
B. an adequate IA posture in the AF environment.
C. a federal desktop configuration.
D. a federal server configuration.
Rate this question:
Quiz Review Timeline (Updated): Mar 21, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.