CDC 3DX5X (Edit Code 02) Volume 2, Unit 3

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By David
D
David
Community Contributor
Quizzes Created: 9 | Total Attempts: 845
Questions: 30 | Attempts: 107

SettingsSettingsSettings
CDC Quizzes & Trivia

Questions and Answers
  • 1. 

    (227) What information system (IS) threat is the greatest threat to an organization's mission critical information via its communications and ISs?

    • A.

      Malware

    • B.

      Denial of service attacks

    • C.

      Inadvertent employee activity

    • D.

      Hostile information operations

    Correct Answer
    D. Hostile information operations
    Explanation
    Hostile information operations refer to deliberate and malicious activities carried out by individuals or groups with the intention of disrupting or compromising an organization's mission-critical information and its communication systems. These operations can include activities such as hacking, espionage, spreading false information, or conducting cyber-attacks. Unlike other threats like malware, denial of service attacks, or inadvertent employee activity, hostile information operations are specifically designed to target an organization's critical information and can cause significant damage if successful. Therefore, it is considered the greatest threat to an organization's mission-critical information and its communication systems.

    Rate this question:

  • 2. 

    (228) Which computer system vulnerability is not one in a computer system?

    • A.

      Attacker's capability to exploit the flaw

    • B.

      System's susceptibility to a flaw

    • C.

      Attacker's access to the flaw

    • D.

      Attacker's lack of ability

    Correct Answer
    D. Attacker's lack of ability
    Explanation
    The given question is asking about a computer system vulnerability that is not present in a computer system. The correct answer is "Attacker's lack of ability." This means that the vulnerability is not caused by the attacker's lack of skill or capability. Instead, vulnerabilities typically arise from flaws in the system, the system's susceptibility to those flaws, or the attacker's access to those flaws.

    Rate this question:

  • 3. 

    (228) Computer security (COMPUSEC) vulnerabilities are broken down into how many categories?

    • A.

      4

    • B.

      6

    • C.

      8

    • D.

      10

    Correct Answer
    C. 8
    Explanation
    Computer security vulnerabilities are broken down into eight categories. These categories help in classifying and understanding the different types of vulnerabilities that can be exploited by attackers. By categorizing vulnerabilities, it becomes easier for security professionals to identify and address specific areas of concern in order to protect computer systems and networks.

    Rate this question:

  • 4. 

    (228) What computer software is designed to collect personal information about users without their informed consent?

    • A.

      Malware

    • B.

      Spyware

    • C.

      Adware

    • D.

      Trojans

    Correct Answer
    B. Spyware
    Explanation
    Spyware is computer software that is designed to collect personal information about users without their informed consent. It is typically installed on a user's computer without their knowledge and can track their online activities, gather sensitive information such as passwords and credit card details, and transmit this data to third parties. Spyware poses a significant threat to user privacy and security, as it can lead to identity theft, financial fraud, and other malicious activities.

    Rate this question:

  • 5. 

    (228) Which incidents occur when a higher classification level of data transfers to a lower classification level system via a messaging system?

    • A.

      Classified message incident

    • B.

      Eavesdropping

    • C.

      Backdoor

    • D.

      Data Spillage

    Correct Answer
    A. Classified message incident
    Explanation
    When a higher classification level of data transfers to a lower classification level system via a messaging system, a classified message incident occurs. This means that sensitive information that is meant to be restricted to a higher level of security is inadvertently sent to a system with a lower level of security clearance. This can pose a significant risk as the lower level system may not have the necessary safeguards in place to protect the classified information, potentially leading to unauthorized access and exposure of sensitive data.

    Rate this question:

  • 6. 

    (229) Which classified document markings identifies the highest level of classification?

    • A.

      Banner Lines

    • B.

      Portion Marks

    • C.

      Component and office

    • D.

      Classification authority

    Correct Answer
    A. Banner Lines
    Explanation
    Banner Lines are the classified document markings that identify the highest level of classification. They typically appear at the top and bottom of each page and contain information such as the classification level, the document control number, and the agency or organization that originated the document. Banner Lines are essential for quickly identifying the sensitivity and handling requirements of a classified document.

    Rate this question:

  • 7. 

    (229) Which classified document marking appears on the face of each classified United States document and shall indicate the authority for the classification determination and the duration of the classification.

    • A.

      Banner Lines

    • B.

      Portion Marks

    • C.

      Component and office

    • D.

      Classification authority

    Correct Answer
    D. Classification authority
    Explanation
    The correct answer is "Classification authority." This marking appears on the face of each classified United States document and serves to indicate the authority responsible for the classification determination as well as the duration of the classification. This helps to ensure accountability and transparency in the classification process, as it provides information about who made the decision to classify the document and for how long it should remain classified.

    Rate this question:

  • 8. 

    (230) How would you determine if an intrusion detection system is required or another supplemental control is sufficient?

    • A.

      General Service Administration (GSA) makes that determination

    • B.

      Office of Special Investigation (OSI) makes that determination

    • C.

      Wing information office makes that determination

    • D.

      By competing a risk assessment

    Correct Answer
    D. By competing a risk assessment
    Explanation
    To determine if an intrusion detection system is required or if another supplemental control is sufficient, a risk assessment needs to be completed. This process involves evaluating the potential risks and threats to the system or network, as well as the potential impact of those risks. By conducting a risk assessment, the organization can identify the specific security needs and vulnerabilities, and then make an informed decision on whether an intrusion detection system is necessary or if another control measure can adequately address the identified risks.

    Rate this question:

  • 9. 

    (230) Which event is not a valid reason to change the combination on a container storing classified materials?

    • A.

      When it is placed in service

    • B.

      When it is removed from service

    • C.

      When the storage container has been cleared

    • D.

      When compromise of the combination is suspected

    Correct Answer
    C. When the storage container has been cleared
    Explanation
    Changing the combination on a container storing classified materials is not necessary when the storage container has been cleared. This implies that the materials have already been removed or no longer pose a risk. Therefore, there is no need to change the combination in this case.

    Rate this question:

  • 10. 

    (230) Which Air Force (AF) form records the destruction of Top Secret classified materials?

    • A.

      AF Form 88

    • B.

      AF Form 143

    • C.

      AF Form 144

    • D.

      AF Form 1776

    Correct Answer
    B. AF Form 143
    Explanation
    AF Form 143 is the correct answer because it is the form that records the destruction of Top Secret classified materials in the Air Force. This form is specifically designed for documenting the proper disposal and destruction of sensitive information to ensure accountability and security.

    Rate this question:

  • 11. 

    (231) Who should you seek out if you need information on transporting Top Secret information?

    • A.

      Classified Information Program Manager

    • B.

      Information Assurance Officer

    • C.

      Security Manager

    • D.

      Supervisor

    Correct Answer
    B. Information Assurance Officer
    Explanation
    If you need information on transporting Top Secret information, you should seek out the Information Assurance Officer. This person is responsible for ensuring the security and integrity of information systems and data within an organization. They are knowledgeable about the proper procedures and protocols for handling classified information and can provide guidance and assistance on transporting such sensitive information securely.

    Rate this question:

  • 12. 

    (231) Who has the authority to grant permission to ship classified materials on Friday - Sunday?

    • A.

      Classified Information Program Manager

    • B.

      Information Assurance Officer

    • C.

      Security Manager

    • D.

      Supervisor

    Correct Answer
    C. Security Manager
    Explanation
    The security manager has the authority to grant permission to ship classified materials on Friday - Sunday. As the individual responsible for overseeing security protocols and ensuring the protection of classified information, they have the necessary knowledge and authority to make decisions regarding the shipment of such materials. The classified information program manager, information assurance officer, and supervisor may have their own roles and responsibilities within the organization, but the security manager is specifically designated to handle security-related matters, including granting permission for shipping classified materials.

    Rate this question:

  • 13. 

    (232) What system includes all owned and leased communications and computing systems and services, software, data, security services, and other associated services necessary to achieve information superiority?

    • A.

      Department of Defense Information Network (DODIN)

    • B.

      Defense Information Systems Network (DISN)

    • C.

      Air Force Information Network (AFIN)

    • D.

      Defense Intelligence Network (DIN)

    Correct Answer
    A. Department of Defense Information Network (DODIN)
    Explanation
    The Department of Defense Information Network (DODIN) includes all owned and leased communications and computing systems and services, software, data, security services, and other associated services necessary to achieve information superiority. It is a comprehensive system that encompasses various networks and infrastructure to support the information needs of the Department of Defense. The DODIN plays a crucial role in ensuring the secure and efficient exchange of information within the defense community.

    Rate this question:

  • 14. 

    (232) Which of the following services provides additional communications capacity by using manned and unmanned systems to host communications packages for continuous communications coverage of large geographic areas?

    • A.

      Transport

    • B.

      Application

    • C.

      Aerial layer

    • D.

      Satellite communications (SATCOM)

    Correct Answer
    C. Aerial layer
    Explanation
    The aerial layer provides additional communications capacity by using manned and unmanned systems to host communications packages for continuous communications coverage of large geographic areas. This means that the aerial layer utilizes aircraft and drones to carry and maintain communication equipment, ensuring that there is uninterrupted communication coverage over a wide area.

    Rate this question:

  • 15. 

    (233) What system is a telecommunications network that provides the exchange of information in an inter-operable and global space, divided by security demands, transmission requirements and geographic needs of targeted end-user customers?

    • A.

      Department of Defense Information Network (DODIN)

    • B.

      Defense Information Systems Network (DISN)

    • C.

      Defense Information Systems Agency (DISA)

    • D.

      Air Force Information Network (AFIN)

    Correct Answer
    B. Defense Information Systems Network (DISN)
    Explanation
    The Defense Information Systems Network (DISN) is a telecommunications network that provides the exchange of information in an inter-operable and global space. It is divided by security demands, transmission requirements, and geographic needs of targeted end-user customers. The DISN is specifically designed to meet the communication needs of the Department of Defense and its various agencies. It ensures secure and reliable communication capabilities for military operations and supports the sharing of information among different branches of the military and with allied forces.

    Rate this question:

  • 16. 

    (233) Which network supports unclassified e-mail service to the user?

    • A.

      Secret Internet Protocol (IP) Data or Secure Internet Protocol Router Network (SIPRNET)

    • B.

      Sensitive but Unclassified (SBU) IP Data or Non-Secure Internet Protocol Router Network (NIPRNET)

    • C.

      Joint Worldwide Intelligence Communications System (JWICS) IP Data

    • D.

      Top Secret/ Secret Compartmentalized Information (TS/SCI) IP Data

    Correct Answer
    B. Sensitive but Unclassified (SBU) IP Data or Non-Secure Internet Protocol Router Network (NIPRNET)
    Explanation
    The correct answer is Sensitive but Unclassified (SBU) IP Data or Non-Secure Internet Protocol Router Network (NIPRNET). This network supports unclassified e-mail service to the user.

    Rate this question:

  • 17. 

    (234) Which network provides Department of Defense (DOD) customers with centralized and protected access to the public Internet?

    • A.

      Secret Internet Protocol (IP) Data or Secure Internet Protocol Router Network (SIPRNET)

    • B.

      Sensitive but Unclassified (SBU) IP Data or Non-Secure Internet Protocol Router Network (NIPRNET)

    • C.

      Joint Worldwide Intelligence Communications System (JWICS) IP Data

    • D.

      Top Secret/Secret Compartmentalized Information (TS/SCI) IP Data

    Correct Answer
    B. Sensitive but Unclassified (SBU) IP Data or Non-Secure Internet Protocol Router Network (NIPRNET)
    Explanation
    The correct answer is Sensitive but Unclassified (SBU) IP Data or Non-Secure Internet Protocol Router Network (NIPRNET). This network provides Department of Defense (DOD) customers with centralized and protected access to the public Internet. It is specifically designed for unclassified but sensitive information, allowing DOD personnel to access the internet while maintaining security measures to protect sensitive data.

    Rate this question:

  • 18. 

    (234) Which network provides high-quality, secure telecommunications for command and control (C2) and crisis management?

    • A.

      Defense Switched Network (DSN)

    • B.

      Defense Red Switch Network (DRSN)

    • C.

      Joint Worldwide Intelligence Communications System (JWICS) IP Data

    • D.

      Top Secret/Secret Compartmentalized Information (TS/SCI) Internet Protocol (IP) Data

    Correct Answer
    B. Defense Red Switch Network (DRSN)
    Explanation
    The Defense Red Switch Network (DRSN) is the correct answer because it provides high-quality, secure telecommunications for command and control (C2) and crisis management. The DRSN is a dedicated voice network used by the Department of Defense (DoD) to transmit classified and sensitive information. It is designed to ensure secure and reliable communication for military leaders and decision-makers during critical operations and emergencies. The DRSN is specifically built to meet the rigorous security requirements of the DoD and is used for sensitive communications at the highest levels of command and control.

    Rate this question:

  • 19. 

    Which system is the Department of Defense's (DOD) command and control (C2) system of record and full spectrum dominance enabler?

    • A.

      Strategic Automated Command and Control System (SACCS)

    • B.

      Global Command and Control System (GCCS)

    • C.

      Distributed Common Ground Station (DCGS)

    • D.

      Global Combat Support System (GCSS)

    Correct Answer
    B. Global Command and Control System (GCCS)
    Explanation
    The correct answer is Global Command and Control System (GCCS). This system is considered the Department of Defense's command and control system of record and full spectrum dominance enabler. It is a comprehensive system that provides situational awareness, decision support, and information sharing capabilities across all levels of military operations. GCCS enables the Department of Defense to effectively plan, execute, and assess military operations by integrating information from various sources and providing real-time command and control capabilities. It is a critical tool for military commanders to achieve full spectrum dominance and maintain operational superiority.

    Rate this question:

  • 20. 

    (235) Which system of the Global Command and Control System-Air Force (GCCS-AF) monitors status of resources and training systems ensuring that decision makers have the most accurate snapshot of the resources available to the joint force commander for mission completion?

    • A.

      Common Operational Picture (COP)

    • B.

      Global Command and Control System (GCCS)

    • C.

      GCCS Status of Resources and Training (GSORTS)

    • D.

      Deliberate Crisis Action Planning and Execution System (DCAPES)

    Correct Answer
    C. GCCS Status of Resources and Training (GSORTS)
    Explanation
    The GCCS Status of Resources and Training (GSORTS) system monitors the status of resources and training systems, providing decision makers with an accurate snapshot of the available resources for mission completion. This system ensures that the joint force commander has up-to-date information on the resources at their disposal, allowing them to make informed decisions and effectively plan and execute missions.

    Rate this question:

  • 21. 

    (236) What major program does the Global Combat Support System- Air Force (GCSS-AF) provides as a single point of reference for services and information for Air Force personnel?

    • A.

      Air Force Portal

    • B.

      IMDS

    • C.

      Advanced Distributed Learning Service (ADLS)

    • D.

      Electronic-publications (E-pubs)

    Correct Answer
    A. Air Force Portal
    Explanation
    The Air Force Portal is the major program that the Global Combat Support System- Air Force (GCSS-AF) provides as a single point of reference for services and information for Air Force personnel. The Air Force Portal is a secure website that allows Air Force members to access various resources and tools, such as email, calendars, training materials, and forms. It serves as a centralized platform for communication, collaboration, and information sharing within the Air Force community.

    Rate this question:

  • 22. 

    (237) Which system is the Air Forces' primary intelligence, surveillance and reconnaissance (ISR) collection, processing, exploitation, analysis and dissemination system?

    • A.

      Battle Control System-Fixed (BCS-F)

    • B.

      Global Combat Support System (GCSS)

    • C.

      Distributed Common Ground Station (DCGS)

    • D.

      Strategic Automated Command and Control System (SACCS)

    Correct Answer
    C. Distributed Common Ground Station (DCGS)
    Explanation
    The correct answer is Distributed Common Ground Station (DCGS). DCGS is the Air Forces' primary intelligence, surveillance and reconnaissance (ISR) collection, processing, exploitation, analysis, and dissemination system. It is a network-centric system that enables the integration of multiple intelligence sources and provides real-time situational awareness to commanders and analysts. DCGS collects data from various sources such as satellites, drones, and ground-based sensors, processes and analyzes the information, and disseminates actionable intelligence to decision-makers. It plays a crucial role in supporting mission planning, target identification, and overall situational awareness for the Air Force.

    Rate this question:

  • 23. 

    (238) Which system is a radar Tracker/Correlator software program hosted on a powerful server-based computer system that takes inputs from long range and short-range radars and displays it all on a scope?

    • A.

      Battle Control System-Fixed (BCS-F)

    • B.

      Global Combat Support System (GCSS)

    • C.

      Distributed Common Ground Station (DCGS)

    • D.

      Strategic Automated Command and Control System (SACCS)

    Correct Answer
    A. Battle Control System-Fixed (BCS-F)
    Explanation
    The correct answer is Battle Control System-Fixed (BCS-F). BCS-F is a radar Tracker/Correlator software program hosted on a powerful server-based computer system. It takes inputs from long range and short-range radars and displays the information on a scope. This system is used for tracking and correlating radar data in order to provide a comprehensive view of the battlefield.

    Rate this question:

  • 24. 

    (238)  How many air defenses sectors is the Battle Control System-Fixed (BSC-F) divided into?

    • A.

      Six

    • B.

      Five

    • C.

      Four

    • D.

      Two

    Correct Answer
    D. Two
    Explanation
    The Battle Control System-Fixed (BSC-F) is divided into two air defense sectors.

    Rate this question:

  • 25. 

    (239) Which system is a space-based high data rate communications link for the flow of information from the United States or rear echelon locations to deployed forces?

    • A.

      Global Broadcast System (GBS)

    • B.

      Global Combat Support System (GCSS)

    • C.

      Distributed Common Ground Station (DCGS)

    • D.

      Strategic Automated Command and Control System (SACCS)

    Correct Answer
    A. Global Broadcast System (GBS)
    Explanation
    The Global Broadcast System (GBS) is a space-based high data rate communications link that is used to transmit information from the United States or rear echelon locations to deployed forces. It provides a reliable and efficient means of communication, allowing for the flow of critical information to reach forces in the field in a timely manner. This system is specifically designed to support military operations and ensure that vital information can be shared quickly and effectively.

    Rate this question:

  • 26. 

    (240) What system is the priority component of the Department of Defense Information Network (DODIN) that directly supports the president, secretary of defense, and the Joint Chiefs of Staff in the exercise of their responsibilities?

    • A.

      Strategic Automated Command and Control System (SACCS)

    • B.

      Distributed Common Ground Station (DCGS)

    • C.

      National Military Command Center (NMCC)

    • D.

      Global High Frequency Network (HF-GCS)

    Correct Answer
    C. National Military Command Center (NMCC)
    Explanation
    The National Military Command Center (NMCC) is the priority component of the Department of Defense Information Network (DODIN) that directly supports the president, secretary of defense, and the Joint Chiefs of Staff in the exercise of their responsibilities. The NMCC serves as the principal command and control center for the Department of Defense, providing situational awareness, coordination, and decision-making support during military operations and national emergencies. It is responsible for monitoring and managing the overall operational status of the DODIN and ensuring effective communication and information exchange among key decision-makers.

    Rate this question:

  • 27. 

    (241) What system provides a secure communications path for command and control information in support of the Air Force's strategic aircraft and missile functions?

    • A.

      Strategic Automated Command and Control System (SACCS)

    • B.

      Distribution Common Ground Station (DCGS)

    • C.

      Global High Frequency Network (HF-GCS)

    • D.

      Global Combat Support System (GCSS)

    Correct Answer
    A. Strategic Automated Command and Control System (SACCS)
    Explanation
    The Strategic Automated Command and Control System (SACCS) is the correct answer because it provides a secure communications path for command and control information in support of the Air Force's strategic aircraft and missile functions. SACCS is specifically designed to ensure the secure and reliable transmission of critical information related to strategic operations, allowing for effective command and control of these assets. The other options, Distribution Common Ground Station (DCGS), Global High Frequency Network (HF-GCS), and Global Combat Support System (GCSS), do not specifically address the secure communications needs of the Air Force's strategic aircraft and missile functions.

    Rate this question:

  • 28. 

    (242) What system mission is to provide reliable, rapid, two-way communications between air-, land-, and sea-based users?

    • A.

      Strategic Automated Command and Control System (SACCS)

    • B.

      Distributed Common Ground Station (DCGS)

    • C.

      Global High Frequency Network (HF-GCS)

    • D.

      Global Combat Support System (GCSS)

    Correct Answer
    C. Global High Frequency Network (HF-GCS)
    Explanation
    The correct answer, Global High Frequency Network (HF-GCS), is the system that provides reliable, rapid, two-way communications between air-, land-, and sea-based users. This system utilizes high-frequency radio waves to transmit and receive communications, allowing for effective and efficient communication across different platforms and locations. The HF-GCS plays a crucial role in ensuring that users can communicate securely and quickly in various operational environments.

    Rate this question:

  • 29. 

    (241) Which system is the primary network used to transmit the Emergency Action Messages (EAM) generated by the National Military Command Center (NMCC) to the war-fighting commanders in the field?

    • A.

      Strategic Automated Command and Control System (SACCS)

    • B.

      Distributed Common Ground Station (DCGS)

    • C.

      Global High Frequency Network (HF-GCS)

    • D.

      Global Combat Support System (GCSS)

    Correct Answer
    A. Strategic Automated Command and Control System (SACCS)
    Explanation
    The primary network used to transmit the Emergency Action Messages (EAM) generated by the National Military Command Center (NMCC) to the war-fighting commanders in the field is the Strategic Automated Command and Control System (SACCS).

    Rate this question:

  • 30. 

    (242) What system of the Global High Frequency (HF) Network provides rapid, reliable, non-dedicated communications support between the National Command Authority, Department of Defense, aircraft, and ships of the United States government during peacetime, contingency situations, and war?

    • A.

      Mystic Star

    • B.

      Global HF system

    • C.

      Defense Communication System (DCS) entry

    • D.

      System of Inter-American Telecommunications for the Air Forces (SITFAA)

    Correct Answer
    B. Global HF system
    Explanation
    The Global HF system provides rapid, reliable, non-dedicated communications support between the National Command Authority, Department of Defense, aircraft, and ships of the United States government during peacetime, contingency situations, and war. This system is specifically designed to facilitate communication in various operational scenarios, ensuring effective coordination and command during critical situations.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.