CDC 3DX53 Set 2 Vol 1 Edit 03 assesses knowledge in cyber surety, focusing on duties like intrusion detection and firewall protection, client systems operations, risk management processes, and network types. It prepares learners for roles in IT security.
CAT–6.
Coaxial.
Fiber Optic.
Twisted pair.
Rate this question:
Fiber optic.
Terrestrial.
Radio frequency.
Satellite microwave.
Rate this question:
32.
64.
128.
256.
Rate this question:
B.
C.
D.
E.
Rate this question:
0 to 1023.
1024 to 23535.
23536 to 49151.
49152 to 65535.
Rate this question:
7.
20.
23.
53.
Rate this question:
21.
22.
60.
80.
Rate this question:
Having information ready when needed.
Not being able to deny who performed network actions.
The protection of the network from those not authorized access.
The assurance that no one has changed or destroyed information without permission.
Rate this question:
Writes itself before the original file.
Writes itself to the end of the original file.
Writes itself between file sections of 32-bit file.
Renames the original file and writes itself with the original file’s name.
Rate this question:
Number of information systems.
Number of personnel assigned.
Type of organization.
Mission need.
Rate this question:
Risk Assessment (RA).
Personnel Security (PS).
Audit and Accountability (AU).
System and Information Integrity (SI).
Rate this question:
Major General (O–8).
Brigadier General (O–7).
Colonel (O–6).
Lieutenant Colonel (O–5).
Rate this question:
Bus.
Star.
Ring.
Tree.
Rate this question:
Mask.
Subnet.
Hierarchy.
Routing prefix.
Rate this question:
A port.
A protocol.
A service point.
An entrance point.
Rate this question:
Tunneling.
Dual layer.
Dual stack.
Peer-to-peer.
Rate this question:
802.11a.
802.11b.
802.11g.
802.11n.
Rate this question:
32-bit.
64-bit.
128-bit.
256-bit.
Rate this question:
Digital.
Biometric.
Encryption.
Identification.
Rate this question:
Wing (WG).
Air Force (AF).
Department of Defense (DOD).
Local Registration Authority/Trusted Agent (LRA/TA).
Rate this question:
End-user.
Remote user.
Administrative.
Limited (general).
Rate this question:
Threats.
Exploits.
Vulnerabilities.
Breaches of security.
Rate this question:
Shutting down ports.
Using strong passwords.
Ensuring remote access.
Disabling unused/unneeded services.
Rate this question:
Notices.
Postings.
Bulletins.
Announcements.
Rate this question:
NCO.
SNCO.
GS–07.
GS–09.
Rate this question:
2.
3.
4.
5.
Rate this question:
Every 3 months.
Every 6 months.
Every 12 months.
Only once during the first two years.
Rate this question:
SF 701.
SF 706.
SF 710.
SF 711.
Rate this question:
Secret and top secret.
Confidential and secret.
Unclassified and confidential.
All classifications may be kept on the flight line.
Rate this question:
TEMPEST.
BLACK.
EMSEC.
RED.
Rate this question:
Wing commander.
Information security system manager (ISPM).
Wing information assurance office (WIAO).
Communications and information system officer (CSO).
Rate this question:
4.
5.
6.
7.
Rate this question:
4.
6.
8.
10.
Rate this question:
50.
80.
5050.
8080.
Rate this question:
Strobe scan.
Sweep scan.
Fragment packet scan.
File transfer protocol (FTP) bounce scan.
Rate this question:
Fragment packets.
Synchronous (SYN) scan.
User datagram protocol (UDP) scan.
Transmission control protocol (TCP) scan.
Rate this question:
Installing all applicable security patches.
Creating continuity throughout the network.
Minimizing risks posed by various cyberspace threats.
Keeping complete and accurate documentation for all configuration changes.
Rate this question:
802.11a.
802.11b.
802.11g.
802.11n.
Rate this question:
An adequate information assurance (IA) posture in a shared-risk environment.
An adequate IA posture in the AF environment.
A federal desktop configuration.
A federal server configuration.
Rate this question:
Users are aware of their role in IA.
Users are trained on network security.
Users have met investigative requirements.
Users have satisfied network access requirements.
Rate this question:
An e-mail incident.
A message incident.
A classified e-mail incident.
A classified message incident.
Rate this question:
Communications squadron (CS).
National Security Agency (NSA).
General Services Administration (GSA).
Wing Information Assurance Office (WIAO).
Rate this question:
AF Form 4170.
AF Form 6170.
Standard Form 700.
Standard Form 701.
Rate this question:
Secret.
Top secret.
Unclassified.
Confidential.
Rate this question:
Low.
Moderate.
High.
Extreme.
Rate this question:
Design.
Define need.
Build and test.
Define need review.
Rate this question:
Sustain cryptographic equipment.
Install and maintain servers or other computer systems.
Manage data, information, and knowledge sharing services.
Detection activities, including real-time intrusion detection and firewall protection.
Rate this question:
Eight groups of four hexadecimal numbers, separated by colons.
Eight groups of four hexadecimal numbers, separated by periods.
Four groups of eight hexadecimal numbers, separated by colons.
Four groups of eight hexadecimal numbers, separated by periods.
Rate this question:
Quiz Review Timeline (Updated): Jun 12, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.