Cyber Security Fundamentals Answers
Question: Identify the training that is required for all categories and specialties regardless of whether they are certified or non-certified
Answer: IAF Online Course
Question: What are the factors institutionalized by the Army for hazard identification?
Answer: METTC-FC
Question: Which can be the more costly?
Answer: Reacting to a security incident.
Question: Which is the single factor which can make or break a security plan?
Answer: People
Question: The _____________ is responsible for ensuring that each assigned DoD information system has a designated Information Assurance Manager (IAM) with the support, authority and resources to satisfy the responsibilities established in DoDI 8500.2 and the DIACAP
Answer: Program or System managers.
Question: Jim, your organizations IAM, has been contacted by the Program Manager to assist in implementing the DIACAP. Jim is not required to assist the PM in this activity, and should pass this activity off to the IAO (or IASO).
Answer: False
Question: Honeypots are authorized for deployment on all Army information systems.
Answer: False
Question: Which firewall operates at the highest level of the OSI model?
Answer: Application gateway/proxy
Question: Which of the following would NOT be a possible vulnerability or exploit that may lead to an attacker by-passing the firewall?
Answer: A strong firewall policy
Question: Identify the security services of cryptography.
Answer: Confidentiality, Integrity, Authentication, and Non-repudiation