Cyber Security Fundamentals 2025 Pre-Test Exam Questions and
Graded Answers, 100 % Guaranteed
A denial-of-service (DoS) attack occurs when legitimate _________ are unable to access
________, ______ or other network resources due to the actions of malicious cyber threat
factors - ✔✔users, Information systems, devices
Which of the following certifications would satisfy IAM level II and IAM level III? -
✔✔Security+
Which of the following categories require a privileged access agreement? - ✔✔IA
Management
In accordance with AR 25-2, whose responsibility is it to ensure all users receive initial and
annual IA awareness training? - ✔✔IASO
A ________ and _________ are network infrastructure devices - ✔✔All
Shoulder Surfing is a good thing because people can get valuable information. You should
never try to protect against this behaviour - ✔✔FALSE
What is the current DoD repository for sharing security authorization packages and risk
assessment data with Authorizing officials? - ✔✔Army Portfolio Management System
(APMS)
What are the three main cloud computing service models - ✔✔Software as a Service,
platform as a Service and Infrastructure as a Service
Interoperability is a weakness in Cloud Computing - ✔✔TRUE
Encryptions is a way to send a message in ____________ - ✔✔code
Graded Answers, 100 % Guaranteed
A denial-of-service (DoS) attack occurs when legitimate _________ are unable to access
________, ______ or other network resources due to the actions of malicious cyber threat
factors - ✔✔users, Information systems, devices
Which of the following certifications would satisfy IAM level II and IAM level III? -
✔✔Security+
Which of the following categories require a privileged access agreement? - ✔✔IA
Management
In accordance with AR 25-2, whose responsibility is it to ensure all users receive initial and
annual IA awareness training? - ✔✔IASO
A ________ and _________ are network infrastructure devices - ✔✔All
Shoulder Surfing is a good thing because people can get valuable information. You should
never try to protect against this behaviour - ✔✔FALSE
What is the current DoD repository for sharing security authorization packages and risk
assessment data with Authorizing officials? - ✔✔Army Portfolio Management System
(APMS)
What are the three main cloud computing service models - ✔✔Software as a Service,
platform as a Service and Infrastructure as a Service
Interoperability is a weakness in Cloud Computing - ✔✔TRUE
Encryptions is a way to send a message in ____________ - ✔✔code