Maintenance Cyber Discipline

Maintenance Cyber Discipline

This course is in MyLearning. It’s considered part of the Griffin courses. You will need to watch a video then mark as completed. After that, you can attempt the test.

Q: Match the following media/equipment to the correct procedure to which it applies:

A: Notification of virus -> report incident immediately; Cellphone/mp3 player -> refrain from connecting to a PMA; Disc from manufacturer -> scan before use

Q: Identify an example of an attack surface on a computer:

A: all of the above

Q: Equipment risks include:

A: All of the above

Q: A portable maintenance aid (PMA) is an example of a/an _____ computer.

A: direct-attached

Q: A separation between the maintenance computer, weapon system, and outside world is known as a/an _____.

A: air gap

Q: True or False: An “attack surface” consists of specific access points where malware can be introduced or an adversary can gain access.

A: True

Q: True or False: Defense in Depth refers to the practice of using several defensive layers of protective measures to safeguard our weapons systems.

A: True

Q: True or False: It is ok to assume that external systems are clean because someone else should have already ran the scans.

A: False

Q: True or False: Nuisance malware is intentional and targeted specifically towards an Air Force system by an adversary.

A: False

Q: True or False: Read-only is the safest media to use when controlling data transfer risk.

A: True

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *