Maintenance Cyber Discipline
This course is in MyLearning. It’s considered part of the Griffin courses. You will need to watch a video then mark as completed. After that, you can attempt the test.
Q: Match the following media/equipment to the correct procedure to which it applies:
A: Notification of virus -> report incident immediately; Cellphone/mp3 player -> refrain from connecting to a PMA; Disc from manufacturer -> scan before use
Q: Identify an example of an attack surface on a computer:
A: all of the above
Q: Equipment risks include:
A: All of the above
Q: A portable maintenance aid (PMA) is an example of a/an _____ computer.
A: direct-attached
Q: A separation between the maintenance computer, weapon system, and outside world is known as a/an _____.
A: air gap
Q: True or False: An “attack surface” consists of specific access points where malware can be introduced or an adversary can gain access.
A: True
Q: True or False: Defense in Depth refers to the practice of using several defensive layers of protective measures to safeguard our weapons systems.
A: True
Q: True or False: It is ok to assume that external systems are clean because someone else should have already ran the scans.
A: False
Q: True or False: Nuisance malware is intentional and targeted specifically towards an Air Force system by an adversary.
A: False
Q: True or False: Read-only is the safest media to use when controlling data transfer risk.
A: True
