C312B Quiz

docx

School

Command & General Staff College *

*We aren’t endorsed by this school

Course

C312

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

4

Uploaded by CorporalWorldYak19

Report
Question 1 10 out of 10 points Inside USCYBERCOM, who is responsible for building, maintaining, and defending DOD networks and associated equipment and data? Selected Answer: C. JFHQ-DODIN Response Feedback: Correct. Question 2 10 out of 10 points Which of the following is one of the three Cyber Mission Force mission areas? Selected Answer: C. Defending DODIN Response Feedback: Correct. Question 3 10 out of 10 points The most challenging aspect of attributing actions in cyberspace is _____________________ with sufficient confidence and verifiability to hold them accountable. Selected Answer: A. Connecting a cyber-persona or action to a named individual, group, or nation-state Response Feedback: Correct. Question 4 10 out of 10 points National-level cyberspace protection team support can be extended to defend ____________________ when ordered by SecDef. Selected Answer: A. Non-DOD mission partner or critical infrastructure networks Response Feedback: Correct. Question 5 0 out of 10 points Cybersecurity operations requires a "whole-of-government" approach. Which of the following is one of the three major federal government departments that plays a significant role in cybersecurity? Selected Answer: C. Department of State Response Feedback: Incorrect. Please review: Lesson, Cyber Operations: Joint Forces, page 33-08 Question 6 10 out of 10 points Which of the following provide analytic and planning support to national mission and combat mission teams? Selected A.
Answer: Cyber support teams Response Feedback: Correct. Question 7 10 out of 10 points In a _____________________, “Attackers steal legitimate user credentials and gain access to networks by masquerading as that user. An attacker can bypass network security, move laterally through the network, and potentially steal data or further exploit the network from within the security boundary.” Selected Answer: A. Credential abuse Response Feedback: Correct. Question 8 10 out of 10 points Which of the following organizations would be responsible for protecting the US power grid from cyberattack? Selected Answer: B. Department of Homeland Security Response Feedback: Correct. Question 9 10 out of 10 points Which of the following is NOT one of the three primary cyber missions? Selected Answer: B. Expand the US based networks and cyber capabilities. Response Feedback: Correct. Question 10 10 out of 10 points Missions intended to preserve the ability to utilize blue cyberspace capabilities and protect data, networks, cyberspace-enabled devices, and other designated systems by defeating on-going or imminent malicious cyberspace activity are: ________________________. Selected Answer: A. Defensive cyberspace operations Response Feedback: Correct. Question 1 10 out of 10 points Missions intended to preserve the ability to utilize blue cyberspace capabilities and protect data, networks, cyberspace-enabled devices, and other designated systems by defeating on- going or imminent malicious cyberspace activity are: ________________________. Selected Answer: A. Defensive cyberspace operations Response Feedback: Correct.
Question 2 10 out of 10 points Using a cyberspace capability that relies on ____________________ in the target may reveal its functionality and compromise the capability's effectiveness for future missions. Selected Answer: B. Exploitation of a technical vulnerability Response Feedback: Correct. Question 3 10 out of 10 points The commander of USCYBERCOM is dual-hatted and serves as the director of the: Selected Answer: C. National Security Agency (NSA) Response Feedback: Correct. Question 4 10 out of 10 points Which of the following organizations would be responsible for protecting the US power grid from cyberattack? Selected Answer: B. Department of Homeland Security Response Feedback: Correct. Question 5 10 out of 10 points Which of the following is a common reason actors may attempt to penetrate US networks and systems? Selected Answer: A. To steal intellectual property Response Feedback: Correct. Question 6 10 out of 10 points Which of the following is NOT one of the three cyberspace operations that the Department of Defense conducts? Selected Answer: A. Cyber assurance Response Feedback: Correct. Question 7 10 out of 10 points In which of the three cyberspace layers would you find how information is routed around the world to its intended destination?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Selected Answer: A. Logical network layer Response Feedback: Correct. Question 8 10 out of 10 points An attacker stealing a government employee's common access card and pin number, while they are on vacation, to gain access to the DOD network by masquerading as that individual is an example of what type of cyber threat. Selected Answer: A. Credential abuse Response Feedback: Correct. Question 9 10 out of 10 points Which of the following is one of the three cyberspace operations that the Department of Defense conducts? Selected Answer: A. DOD Information Network operations Response Feedback: Correct. Question 10 10 out of 10 points Which of the following describes the prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation? Selected Answer: C. Cybersecurity Response Feedback: Correct.

Browse Popular Homework Q&A

Q: The elevation of BM A = 611.88' BS (plus sight) on BM A = 6.33' IFS (minus sight) on STA 0+00= 1.50'…
Q: Write an equation describing the relationship of the given variables. Y varies inversely as the cube…
Q: Find the time required for an investment of 5000 dollars to grow to 8600 dollars at an interest rate…
Q: Bob has just finished climbing a sheer cliff above a beach, and wants to figure out how high he…
Q: Exercise No 2: A soccer player kicks the ball toward a goal that is 29.0 m in front of him. The ball…
Q: When applied to electrons the pauli excision principal requires what
Q: Shown in the figure below is a block and track system. All locations indicated by solid black lines…
Q: Refer to the figure.  I1 = 1.08, I2 = 2.25 A, and the two wires are separated by 9.32 cm. Now…
Q: Find the centroid (X and y) of the following shape (with respect to the axis shown): y 4 in 2 in Y 2…
Q: How did Hong Kong develop between 1842-1997 and 1997-present?
Q: Kelly-Lambing, Inc., a builder of government contracted small ships, has a steady work force of 10…
Q: An asteroid weighing 2,356 kg reaches a velocity of .191 c. Find it's kinetic energy. Show the…
Q: Considering cis-trans isomers, how many compounds are possible for 1,3,6-octatriene ?…
Q: Use basic identities to simplify sin3x+cos2xsinx.   Enclose arguments of functions in parentheses
Q: If the universe is expanding at a constant rate, you can calculate the age from Hubble's constant.…
Q: Find the indefinite integral (for x > 0) on the domain of positive real numbers. Remember to include…
Q: A state lotto has a prize that pays $1,200 each week for 30 years. Find the total value of the…
Q: A ball is thrown horizontally from the top of a 56.5-m building and lands 122.8 m from the base of…
Q: Large quantities of hydrogen are needed for the synthesis of ammonia. One preparation of hydrogen…
Q: 7 7 Suppose S f (x) da = -9 and S g (x) da = 2. 4 4 7 Evaluate f (4 f (x) +4 g (x)) d z. 4
Q: Solve the system of equations by any method. -2x + 5y = -28 7x + 2y = 20 %3D Enter the exact answer…
Q: Part A The rate constant for a certain reaction is k = 3.70x10-3 s Express your answer with the…