CDC Z3D053 Volume 1 quiz assesses key competencies in cybersecurity, focusing on duties like intrusion detection and firewall protection, managing network devices, and understanding risk management processes. It's tailored for cyber surety journeymen, enhancing skills crucial for safeguarding digital environments.
CAT–6.
Coaxial.
Fiber optic.
Twisted pair.
Rate this question:
21
22
60
80
Rate this question:
40
60
75
95
Rate this question:
50
80
5050
8080
Rate this question:
Having information ready when needed.
Not being able to deny who performed network actions.
The protection of the network from those not authorized access.
The assurance that no one has changed or destroyed information without permission.
Rate this question:
X.x.x.0.
X.x.x.255.
127.x.x.x.
255.255.255.255.
Rate this question:
A port.
A protocol.
A service point.
An entrance point.
Rate this question:
802.11a.
802.11b.
802.11g.
802.11n.
Rate this question:
Boot sector virus.
Worm program.
Trojan horse.
Macro virus.
Rate this question:
Risk Assessment (RA).
Personnel Security (PS).
Audit and Accountability (AU).
System and Information Integrity (SI).
Rate this question:
Client Systems (3D1X1).
Spectrum Operations (3D1X4).
Cyber Transport Systems (3D1X2).
Radio Frequency Transmission Systems (3D1X3).
Rate this question:
Fiber optic.
Terrestrial.
Radio frequency.
Satellite microwave.
Rate this question:
Bus.
Star.
Ring.
Tree.
Rate this question:
B.
C.
D.
E.
Rate this question:
7
20
23
53
Rate this question:
Tunneling.
Dual layer.
Dual stack.
Peer-to-peer.
Rate this question:
Wing (WG).
Air Force (AF).
Department of Defense (DOD).
Local Registration Authority/Trusted Agent (LRA/TA).
Rate this question:
End-user.
Remote user.
Administrative.
Limited (general).
Rate this question:
Threats.
Exploits.
Vulnerabilities.
Breaches of security.
Rate this question:
Shutting down ports.
Using strong passwords.
Ensuring remote access.
Disabling unused/unneeded services.
Rate this question:
An e-mail incident.
A message incident.
A classified e-mail incident.
A classified message incident.
Rate this question:
Number of information systems.
Number of personnel assigned.
Type of organization.
Mission need.
Rate this question:
Major General (O–8).
Brigadier General (O–7).
Colonel (O–6).
Lieutenant Colonel (O–5).
Rate this question:
Internet protocol (IP).
Hypertext transfer protocol (HTTP).
Transmission control protocol (TCP).
Dynamic host configuration protocol (DHCP).
Rate this question:
Writes itself before the original file.
Writes itself to the end of the original file.
Writes itself between file sections of 32-bit file.
Renames the original file and writes itself with the original file’s name.
Rate this question:
Option 1
Option 2
Option 3
Option 4
Rate this question:
Option 1
Option 2
Option 3
Option 4
Option 1
Option 2
Option 3
Option 4
4
6
8
10
Rate this question:
User datagram protocol (UDP).
Hypertext transfer protocol (HTTP).
Dynamic host configuration protocol (DHCP).
Transmission control protocol/Internet Protocol (TCP/IP).
Rate this question:
Integrity.
Availability.
Confidentiality.
Non-repudiation.
Rate this question:
Every 3 months.
Every 6 months.
Every 12 months.
Only once during the first two years.
Rate this question:
Secret and top secret.
Confidential and secret.
Unclassified and confidential.
All classifications may be kept on the flight line.
Rate this question:
Global network.
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wireless metropolitan area network (WMAN).
Rate this question:
Installing all applicable security patches.
Creating continuity throughout the network.
Minimizing risks posed by various cyberspace threats.
Keeping complete and accurate documentation for all configuration changes.
Rate this question:
An adequate information assurance (IA) posture in a shared-risk environment.
An adequate IA posture in the AF environment.
A federal desktop configuration.
A federal server configuration.
Rate this question:
Router.
Firewall.
Proxy server.
Network access server.
Rate this question:
Authorization and confidentiality.
Authentication and authorization.
Confidentiality and integrity.
Authorization and integrity.
Rate this question:
SF 700.
SF 702.
SF 704.
SF 705.
Rate this question:
Secret.
Top secret.
Unclassified.
Confidential.
Rate this question:
Design.
Define need.
Build and test.
Define need review.
Rate this question:
802.11a.
802.11b.
802.11g.
802.11n.
Rate this question:
WiFi protected access (WPA).
Wired equivalency privacy (WEP).
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Rate this question:
Rsh.
Telnet.
Finger.
File transfer protocol (FTP).
Rate this question:
NCO.
SNCO.
GS–07.
GS–09.
Rate this question:
TEMPEST.
BLACK.
EMSEC.
RED.
Rate this question:
Sustain cryptographic equipment.
Install and maintain servers or other computer systems.
Manage data, information, and knowledge sharing services.
Detection activities, including real-time intrusion detection and firewall protection.
Rate this question:
Strobe scan.
Sweep scan.
Fragment packet scan.
File transfer protocol (FTP) bounce scan.
Rate this question:
Quiz Review Timeline (Updated): Mar 18, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Intellectual Output 2: Chapter 1 Safe use of internet and social media, Self assesment test
This self-assessment test covers essential aspects of safe internet and social media use, including cybersecurity threats like malware, the importance of secure connections, and...
Questions:
10 |
Attempts:
76 |
Last updated:
Aug 25, 2023
|
Computer And Network Security Practice Questions!
Dive into key concepts of computer and network security with this practice quiz! Topics include decryption, virus identification, RSA algorithm, cryptanalysis, TLS, and key...
Questions:
20 |
Attempts:
835 |
Last updated:
May 25, 2024
|
CYBER CRIMES & IPR
Explore key aspects of cybersecurity and intellectual property rights in the CYBER CRIMES & IPR quiz. Assess your understanding of viruses, phishing, illegal downloading, scams,...
Questions:
10 |
Attempts:
112 |
Last updated:
Mar 20, 2023
|
True / False Exercise-Societal Impact
This quiz evaluates understanding of cybersecurity topics like malware, hacking, and ethical hacking, emphasizing their societal impacts.
Questions:
10 |
Attempts:
249 |
Last updated:
Mar 21, 2023
|
FTC Cybersecurity Basics Quiz
Test your understanding of cybersecurity basics by selecting the correct response for each question or statement.
Questions:
5 |
Attempts:
1027 |
Last updated:
Mar 21, 2023
|
Activity 3.1 - Principals of Cybersecurity
Based on the measures provided, select the most appropriate CIA component the measure is safeguarding against.
Questions:
7 |
Attempts:
1215 |
Last updated:
Mar 20, 2023
|
Wait!
Here's an interesting quiz for you.