Cyber Security Fundamentals 2020 Pre-Test

24 July 2022
4.7 (114 reviews)
27 test answers

Unlock all answers in this set

Unlock answers (23)
question
A denial-of-service (DoS) attack occurs when legitimate _________ are unable to access ________, ______ or other network resources due to the actions of malicious cyber threat factors
answer
users, Information systems, devices
question
Which of the following certifications would satisfy IAM level II and IAM level III?
answer
Security+
question
Which of the following categories require a privileged access agreement?
answer
IA Management
question
In accordance with AR 25-2, whose responsibility is it to ensure all users receive initial and annual IA awareness training?
answer
IASO
question
A ________ and _________ are network infrastructure devices
answer
All
question
Shoulder Surfing is a good thing because people can get valuable information. You should never try to protect against this behavior
answer
FALSE
question
What is the current DoD repository for sharing security authorization packages and risk assessment data with Authorizing officials?
answer
Army Portfolio Management System (APMS)
question
What are the three main cloud computing service models
answer
Software as a Service, platform as a Service and Infrastructure as a Service
question
Interoperability is a weakness in Cloud Computing
answer
TRUE
question
Encryptions is a way to send a message in ____________
answer
code
question
What is a Distributed Denial-of-Service attack?
answer
It occurs when multiple machines are operating together to attack one target
question
What are the four objectives of planning for security
answer
Identify , design, test and monitor
question
What is a Virtual Private Network used for
answer
Allows employees to connect securely to their network when away from the office
question
A precursor is a sign that an incident may occur in the future
answer
True
question
The two common denial-of-service attacks are
answer
rootkits and botnets
question
An indication is a sign that an incident may never occur
answer
FALSE
question
SSID stands for
answer
Service Set Identifier
question
What does LAMP stands for
answer
Linux, Apache, My SQL and PHP
question
Viruses, Worms and Trojan horses are types of malicious code
answer
True
question
What are rootkits
answer
A piece of software that can be installed and hidden on your computer without your knowledge
question
How often do all cybersecurity workforce personnel take the Cybersecurity Fundamental training IAW DA PAM 25-2-6
answer
Every year
question
How can I protect myself against fake antiviruses
answer
All
question
What does an Incident Response Plans allows for
answer
A timely and controlled response to security incidents, and attempts to mitigate any damage or lose
question
What is Website security
answer
Both A&B
question
According to DoD 8570.01-M, the IA technical category consists of how many levels?
answer
I, II, & III
question
Individual networks may be affected by DoS attacks without being directly targeted
answer
True
question
_____________your wireless data prevents anyone who might be able to access your network from viewing it
answer
Encrypting