Cyber Security Fundamentals 2020 Exam Answers

Question: A denial-of-service (DoS) attack occurs when legitimate _________ are unable to access ________, ______ or other network resources due to the actions of malicious cyber threat factors

Answer: users, Information systems, devices

Question: Which of the following certifications would satisfy IAM level II and IAM level III?

Answer: Security+

Question: Which of the following categories require a privileged access agreement?

Answer: IA Management

Question: In accordance with AR 25-2, whose responsibility is it to ensure all users receive initial and annual IA awareness training?

Answer: IASO

Question: A ________ and _________ are network infrastructure devices

Answer: All

Question: Shoulder Surfing is a good thing because people can get valuable information. You should never try to protect against this behavior

Answer: FALSE

Question: What is the current DoD repository for sharing security authorization packages and risk assessment data with Authorizing officials?

Answer: Army Portfolio Management System (APMS)

Question: What are the three main cloud computing service models

Answer: Software as a Service, platform as a Service and Infrastructure as a Service

Question: Interoperability is a weakness in Cloud Computing

Answer: TRUE

Question: Encryptions is a way to send a message in ____________

Answer: code

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.