Quiz: Computer Network Operations Questions!

18 Questions | Total Attempts: 51

SettingsSettingsSettings
Network Quizzes & Trivia

Questions and Answers
  • 1. 
    What are the three major considerations that apply to Cyberspace Operations?
    • A. 

      Policy, Security, Authority.

    • B. 

      Authority, Security, Law.

    • C. 

      Law, Authority, Policy.

    • D. 

      Security, Policy, Law.

  • 2. 
    What title status must National Guard Guardsmen be in to execute cyber operations?
    • A. 

      Title 10

    • B. 

      Title 30

    • C. 

      Title 59

    • D. 

      Title 32

  • 3. 
    Which operations center monitors and controls Air Force network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity?
    • A. 

      Integrated Network Operations Security Center (I-NOSC).

    • B. 

      Base Defense Operations Center.

    • C. 

      624th Operations Center.

    • D. 

      Air Operations Center

  • 4. 
    Within the information environment what term describes the advantage, or imbalance, in one's favor?
    • A. 

      Information Management.

    • B. 

       Network-centric warfare.

    • C. 

       Information Superiority.

    • D. 

      Information Operations

  • 5. 
    What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary's, and maximizing cyberspace superiority?
    • A. 

      Careful planning.

    • B. 

      Reactive operations.

    • C. 

       Immediate response.

    • D. 

      Information Operations

  • 6. 
    Which Electronic Warfare capability uses jamming to reduce the adversary's use of the electromagnetic spectrum (EMS)?
    • A. 

      Electronic attack.

    • B. 

      Electronic protection.

    • C. 

      Network Exploitation.

    • D. 

      Electronic warfare support

  • 7. 
    Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)?
    • A. 

      EW concerns radiated energy.

    • B. 

      CNO concerns radiated energy.

    • C. 

       EW is only used for offensive purposes.

    • D. 

      CNO is only used for defensive purposes

  • 8. 
    Which Cyberspace Defense Weapon System sub-discipline determines the extent of intrusions, develops courses of action required to mitigate threats, and determines and executes response actions?
    • A. 

      Computer Forensics.

    • B. 

      Incident Prevention.

    • C. 

      Incident Detection.

    • D. 

      Incident Response.

  • 9. 
    Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information?
    • A. 

      Defense-in-Depth.

    • B. 

       Proactive Defense.

    • C. 

      Situational Awareness.

    • D. 

      Network Standardization

  • 10. 
    Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor?
    • A. 

      Supervisory System.

    • B. 

       Remote Terminal Unit.

    • C. 

      Human Machine Interface.

    • D. 

      Programmable Logic Controller

  • 11. 
    Which Supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data?
    • A. 

       Supervisory System.

    • B. 

      Remote Terminal Unit.

    • C. 

       Human Machine Interface.

    • D. 

       Programmable Logic Controller

  • 12. 
    Which threat vector is considered more of an annoyance than an attack?
    • A. 

      Virus

    • B. 

      Spam

    • C. 

      Spyware

    • D. 

      Phishing

  • 13. 
    Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?
    • A. 

      Patches

    • B. 

      Antivirus

    • C. 

      Software removal.

    • D. 

      Vulnerability scanner

  • 14. 
    Which identity management process uses a fingerprint to authenticate a user?
    • A. 

      Token.

    • B. 

      Biometrics.

    • C. 

      Multifactor.

    • D. 

      Knowledge-based

  • 15. 
    Which identity management process uses a password to authenticate a user?  
    • A. 

      Token

    • B. 

      Biometrics.

    • C. 

      Multifactor.

    • D. 

      Knowledge-based.

  • 16. 
    What system monitoring concept uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines?
    • A. 

      Intrusion Detection and Prevention Systems.

    • B. 

      End-to-End Performance Monitoring.

    • C. 

      Vulnerability scanners.

    • D. 

      Capacity Planning.

  • 17. 
    Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk?
    • A. 

      Wing commander.

    • B. 

      Authorizing Official (AO).

    • C. 

      Wing information security office (WIAO).

    • D. 

       Communications and information systems officer (CSO).

  • 18. 
    The technical solution for a communications and information system requirement summarizes
    • A. 

      Only full costs.

    • B. 

       recommended course of action only.

    • C. 

       full cost and recommended course of action.

    • D. 

      Full cost, recommended course of action, and security requirements.

Back to Top Back to top