ACCURATE ANSWERS
________ supervise, direct, and provide guidance on all aspects of the
employment of cyberspace personnel and systems. correct answer cyberspace
officers
_____________ are network focused and threat-agnostic while _____________
are threat-specific and frequently support mission assurance objectives. correct
answer dodin ops, dco
_______decisions are influenced by the C2 system's ability to network the force.
correct answer force employment
A _____ is a telephone set residing at a different site than the CUCM it is
associated with. correct answer long local
A _____ is a telephone set residing at a different site than the CUCM it is
associated with. correct answer voice vlan
A _____ is a type of software that works as an interface between the user and
server. correct answer OS
A _____ provides the basic level of control on all computer peripherals. correct
answer kernal
,A _______ is a robust hub that operates at higher-level units (typically MEFs,
MSCs, Deployed MEBs) that specifically addresses network operations. correct
answer NOC
A _______ is used to increase redundancy or to provide telephone services to
remote locations where the installation of a CUCM would not be feasible. correct
answer long local
A common security strategy used to provide a protective multilayer barrier
against various forms of attack. correct answer defense in depth
A cyberattack occurs against a MCEN router. What type of cyberspace is the
router? correct answer blue
A cyberattack occurs against a MCEN router. What type of cyberspace is the
router? correct answer cat 6
A cyberattack occurs against an adversary's switch. What type of cyberspace is
the switch? correct answer red
A DoD federated data environment for sharing information through interfaces
and services to discover, understand and exchange data with partners across all
domains, echelons and security levels refers to what enabling technology? correct
answer data fabric
A domain arranged into a hierarchical structure is called what? correct answer
tree
,A hacker achieves their original goals at what stage of the cyber kill chain? correct
answer actions on objectives
A hacker assumes remote control of a device at what stage of the cyber kill chain?
correct answer c2
A hacker conducts data theft, destruction, encryption, or exfiltration at what
stage of the cyber kill chain? correct answer ACTIONS ON OBJECTIVES
A hacker creates an attack or malicious software at what stage of the cyber kill
chain? correct answer weaponization
A hacker harvests email addresses at what stage of the cyber kill chain? correct
answer RECON
A hacker launches an attack at what stage of the cyber kill chain? correct answer
delivery
A hacker puts malware on an asset at what stage of the cyber kill chain? correct
answer installation
A hacker sends email attachments or malicious links at what stage of the cyber kill
chain? correct answer delivery
A list of permissions associated with an object. The list specifies who or what is
allowed to access the object and what operations are allowed to be performed on
the object. correct answer acl
, A proactive security practice designed to prevent the exploitation of IT
vulnerabilities that may exist on the MCEN. The projected benefit is to reduce the
time and money spent dealing with vulnerabilities and exploitation of those
vulnerabilities. correct answer Vulnerability Management
A publisher server is the only Call Manager whose database can be altered.
correct answer true
A router in a foreign nation is a temporary stepping point for a cyberattack. What
type of cyberspace is the router? correct answer gray
A router in the US is a temporary stepping point for a cyberattack. What type of
cyberspace is the router? correct answer gray
A set of specifications for a system, or Configuration Item within a system, that
has been formally reviewed and agreed on at a given point in time, and which can
be changed only through change control procedures. correct answer baseline
config
A unit policy on "Bring your own device to work" is an example of a: correct
answer issue specific policy
A user calls you at the help desk and complains about their computer preforming
slow while using 10+ applications. What (2) Operating components are being over
utilized? correct answer CPU & Ram