Questions And All Correct Answers.
A denial-of-service (DoS) attack occurs when legitimate _________ are unable to access ________,
______ or other network resources due to the actions of malicious cyber threat factors - Answer users,
Information systems, devices
Which of the following certifications would satisfy IAM level II and IAM level III? - Answer Security+
Which of the following categories require a privileged access agreement? - Answer IA Management
In accordance with AR 25-2, whose responsibility is it to ensure all users receive initial and annual IA
awareness training? - Answer IASO
A ________ and _________ are network infrastructure devices - Answer All
Shoulder Surfing is a good thing because people can get valuable information. You should never try to
protect against this behavior - Answer FALSE
What is the current DoD repository for sharing security authorization packages and risk assessment data
with Authorizing officials? - Answer Army Portfolio Management System (APMS)
What are the three main cloud computing service models - Answer Software as a Service, platform as a
Service and Infrastructure as a Service
Interoperability is a weakness in Cloud Computing - Answer TRUE
Encryptions is a way to send a message in ____________ - Answer code