Cyber Security Fundamentals Answers

Question: Identify the training that is required for all categories and specialties regardless of whether they are certified or non-certified

Answer: IAF Online Course

Question: What are the factors institutionalized by the Army for hazard identification?

Answer: METTC-FC

Question: Which can be the more costly?

Answer: Reacting to a security incident.

Question: Which is the single factor which can make or break a security plan?

Answer: People

Question: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, authority and resources to satisfy the responsibilities established in DoDI 8500.2 and the DIACAP

Answer: Program or System managers.

Question: Jim, your organizations IAM, has been contacted by the Program Manager to assist in implementing the DIACAP. Jim is not required to assist the PM in this activity, and should pass this activity off to the IAO (or IASO).

Answer: False

Question: Honeypots are authorized for deployment on all Army information systems.

Answer: False

Question: Which firewall operates at the highest level of the OSI model?

Answer: Application gateway/proxy

Question: Which of the following would NOT be a possible vulnerability or exploit that may lead to an attacker by-passing the firewall?

Answer: A strong firewall policy

Question: Identify the security services of cryptography.

Answer: Confidentiality, Integrity, Authentication, and Non-repudiation

Donation Page

Support Our Work

Do you appreciate the value this website provides? If so, please consider donating to help keep it running. Your donation will go a long way in helping us continue to provide the same quality of content and services. Every bit helps, and your support is greatly appreciated. Thank you for your generosity.