CDC Z3D152 Flashcards
Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
Radio Frequency Transmission Systems (3D1X3)
Which of the following is not a communications security program duty and responsibility for Cyber Transport Systems?
Technical security
What is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field?
Core competency
To prevent manual handling hazards, utilize team lifting when lifting items that weigh more than how many pounds?
25
Which hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?
Stress
What simple, systematic process allows commanders to maximize combat capability, while limiting risk?
Risk management
How many steps are in the risk management (RM) process?
Five
Which of the following is a principle of risk management (RM)?
Apply the RM process continuously
An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having what category of vulnerability?
I
How many Integrated Network and Operation Security Centers (INOSC) does the Air Force have?
Two
The Integrated Network Operations and Security Centers (INOSC) has several responsibilities except
install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).
At which open systems interconnect (OSI) layer does a circuit layer gateway operate?
6
Which term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP)?
IP telephony
You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except
consolidating your voice with your data using virtual local area networks (VLAN).
Host-based intrusion detection systems (HIDS) are
passive and active.
Network-based intrusion detection systems (NIDS) are
passive only.
One advantage of a network-based intrusion detection system (NIDS) is that it
uses very few network resources.
The disadvantage of a host-based intrusion detection system (HIDS) is that it
consumes resources on the host it resides on and slows that device down.
Which intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures?
Network-based.
Which intrusion detection system (IDS) uses software sensors?
Host-based.
What security posture permits everything that is not specifically denied?
Open.
What is the first line of defense in securing laptops?
Set a login ID and password combination for access.
What type of certificate authenticates the identity of the user?
Digital.
The definition of integrity as applied to identification, authentication, and encryption is
the assurance that no one has changed or destroyed information without permission.