Air ForceComprehensive Study Set

3D0X3 Air Force

131 questions across 0 topics. Use the find bar or section chips to jump to what you need.

Community-sourced. Answers may be wrong or out of date. Always verify with your official training portal before submitting. Not affiliated with any branch, agency, or vendor. Details.
QUESTION 1

Confidentiality

ANSWER

________________ is assurance information is not disclosed to unauthorized individuals, processes, or devices. It is important to understand with confidentiality, access is granted or denied based upon rights or permissions.

QUESTION 2

Integrity

ANSWER

_____________________ is ensuring the accuracy of the information and having the controls in place to protect against destruction or unauthorized modification.

QUESTION 3

Availability

ANSWER

A loss of __________ is the disruption of access to or use of information or an information system.

QUESTION 4

Authentication

ANSWER

________________ is the verification of the identity of a person. It guarantees the authenticity of who signed the data so you can be sure who participated in a transaction and it was not forged by someone else.

QUESTION 5

Non-repudiation

ANSWER

________________ is the assurance a sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity so neither can later deny having processed the data.

QUESTION 6

Information Assurance

ANSWER

The Cyber Surety Specialist must ensure _____________ _____________ policies fully support legal and regulatory requirements.

QUESTION 7

Communications Security (COMSEC) Management

ANSWER

The Cyber Surety Specialist performs ______________ ______________ duties in accordance with national and Department of Defense (DoD) directives.

QUESTION 8

Classified message incidents, classified file incidents, classified data spillage, unauthorized device connections

ANSWER

Audits and enforces the compliance of cybersecurity procedures and investigates security-related incidents to include COMSEC incidents, ________, _________,_________, __________, and unauthorized network access.

QUESTION 9

Administrative, physical, technical

ANSWER

Ensures appropriate _____________, __________, ___________ and safeguards are incorporated into all new and existing IS resources and protects IS resources from malicious activity.

QUESTION 10

Oversight, management

ANSWER

Responsible for ___________ or _____________ of installation cybersecurity awareness programs.

QUESTION 11

Rescission

ANSWER

Is an OPR action to remove the publication from circulation without being replaced by another publication.

QUESTION 12

Supersession

ANSWER

An action by which a new/revised publication is issued to replace the older version. Action to publish a new or revised publication includes the supersession action.

QUESTION 13

Supersedes, rescinds, removes

ANSWER

A publication becomes obsolete when another publication _____________ it, when the Office of Primary Responsibility (OPR) ____________ it, or when the Air Force Departmental Publishing Office (AFDPO) __________ it from the publishing web site because it is expired.

QUESTION 14

Office of Primary Responsibilities

ANSWER

To rescind a publication, ___________ must complete coordination and obtain certification and approval using the AF Form 673.

QUESTION 15

One

ANSWER

AF Policy Memorandums (AFPM) and Guidance Memorandums (GM) expire _______ year after the date of publication.

QUESTION 16

Military members, civilian employees

ANSWER

Certifying and approving officials for Air Force publications and forms must be either _________ or _________.

QUESTION 17

False

ANSWER

T/F The e-Publishing web site is open to the public, so only the classified titles of classified and restricted access products are provided, along with directions for accessing restricted web sites, and/or instructions on how to obtain copies from the OPR.

QUESTION 18

AF Cyber Tasking Order (AFCTO)

ANSWER

___________ are operational type orders issued to perform specific actions at specific time frames in support of AF and Joint requirements. AF CTOs are generally derived from USCYBERCOM orders and issued by AFCYBER via the 616 OC. Air Force Space Command (AFSPC)/CC or his/her delegated representative will issue AF CTOs directly (via 16 AF and the 616 OC) to direct the execution of cyberspace operations to protect and defend the AFIN.

QUESTION 19

AF Cyberspace Control Order (AFCC)

ANSWER

__________ are used to build/shape the portion of cyberspace to be employed in support of a Combatant Command (CCMD) operation or in response to adversary actions.

QUESTION 20

AF Time Compliance Network Order (AFTCNO)

ANSWER

These are downward-directed operations, security, or configuration management-related orders issued by the Air Force Network Operations Security Center (AFNOSC) or NOSCs.

QUESTION 21

Ideas, questions, discussions

ANSWER

The AF IACE serves as the primary cybersecurity/IA support resource for the Wing COMSEC Office and managers, providing a collaborative one-stop-shop for cybersecurity/IA _________, _________, ___________ and hosts dynamic content for information sharing.

QUESTION 22

ICAM, individual, resource, time, reason

ANSWER

_________________ is the set of security disciplines that allows an organization to: "Enable the right to access the right at the right for the right

QUESTION 23

Password, PIN, security question/answers

ANSWER

___________, ___________ and ___________ are examples of the Authentication Factors of Something you know.

QUESTION 24

ID badge, CAC, token

ANSWER

____________, _______________, ___________ is an example of the Authentication Factors of Something you have.

QUESTION 25

Fingerprint, retina, voice patterns

ANSWER

_________, _________, _________ is an example of the Authentication Factors of Something you are.

QUESTION 26

Active Directory (ADUC), Common Computing Environment (CCE), Global Content Delivery Service (GCDS)

ANSWER

The current Authorization Frameworks are?

QUESTION 27

COMPUSEC

ANSWER

_____________ includes all measures to safeguard ISs and information against sabotage, tampering, denial of service, espionage, fraud, misappropriation, misuse, or release to unauthorized persons.

QUESTION 28

Insider, outsider

ANSWER

Protect ISs from ___________ and ____________ threats by controlling physical access to the facilities and data by implementing procedures identified in Joint, DoD, AF publications, and organizationally created procedures.

QUESTION 29

Information System Security Manager (ISSM), Information System Security Officer (ISSO)

ANSWER

________________/______________ is responsible for the protection from threats by ensuring proper configuration of technical security mechanisms and establishing physical controls for the removal and secure storage of information from unattended ISs.

QUESTION 30

Classified, controlled, sensitive

ANSWER

Protect display devices to prevent inadvertent viewing of _____________ and _____________ or ___________ information by unauthorized users (e.g., away from windows, doorways, public areas).

QUESTION 31

Classified

ANSWER

Ensure the transmission of __________ information is encrypted using NSA-approved cryptography IAW AFMAN 17-1302, Communications Security (COMSEC) Operations, and CJCSI 6510.01.

QUESTION 32

STIGs

ANSWER

Mark and label all KVM switches (regardless of classification environment) to identify the switch position and the associated classification of the connected systems IAW the DISA Keyboard, Video, Mouse Switch Security _________.

QUESTION 33

True

ANSWER

T/F Partitioning security controls into common, hybrid, and system-specific controls can result in significant savings to organizations in implementation and assessment costs as well as a more consistent application of security controls organization-wide.

QUESTION 34

Virus, worm, trojan horse

ANSWER

Protect ISs from malicious logic attacks by applying a mix of human and technological preventative measures IAW the DISA STIGs and CJCSI 6510.01 to protect from the following.

QUESTION 35

Find, fix

ANSWER

The COMPUSEC Assessment is a ______________ and ___________ program review, essentially functioning as a staff assistance visit and therefore, strengthen the AF cybersecurity program.

QUESTION 36

Wing Cybersecurity Office (WCO)

ANSWER

The ________ will perform annual assessments of all units utilizing IT under the control of the base communications unit, including IT of tenant units.

QUESTION 37

ISSO/ISSM/ Commander Support Staff (CSS)

ANSWER

Assessments consist of an interview and site visit with the _________________

QUESTION 38

Detailed unit reports, follow-up reports, annual executive summaries

ANSWER

COMPUSEC Assessment Reports consist of__________, ___________, and _____________ .

QUESTION 39

Change Management

ANSWER

________________ ensures continuity of operations as changes are validated, approved, and implemented on Air Force networks.

QUESTION 40

eMASS

ANSWER

The _____________ is the automated Cyber Security Management tool designed to develop, collect and manage DoD Information Technology.

QUESTION 41

Availability, security

ANSWER

ACAS enhances the ___________ and ____________ of the DoD Information Network (DoDIN) by ensuring adherence to Information Assurance (IA) and Network Operations (NetOps) policies.

QUESTION 42

Security Content Automation Protocol (SCAP), software, configuration

ANSWER

______________ comprises a number of open standards that are widely used to enumerate ______________ flaws and __________________ issues related to security.

QUESTION 43

Environmental disruptions, human or machine errors, purposeful attack

ANSWER

Threats to information and information systems include:

QUESTION 44

Information security, security risks

ANSWER

It is imperative leaders at all levels of an organization understand their responsibilities for achieving adequate ____________ _____________ and for managing information system-related ______________ _______________.

QUESTION 45

RMF

ANSWER

The ______ provides a disciplined and structured process to perform AF IT security as well as risk management activities and to integrate those activities into the system development life cycle.

QUESTION 46

Dynamic

ANSWER

The RMF changes the traditional focus of Certification and Accreditation (C&A) as a static, procedural activity to a more __________ approach.

QUESTION 47

Life cycle risk management

ANSWER

RMF process encompasses____________ _______________ _______________ ________________ to determine and manage the residual cybersecurity risk to the AF created by the vulnerabilities and threats associated with objectives in military, intelligence, and business operations.

QUESTION 48

Internal

ANSWER

DoD organizations that use _____________ IT services must ensure the categorization of the IS delivering the service is appropriate to the needs of the DoD IS using the service.

QUESTION 49

Confidentiality, integrity, availability

ANSWER

DoD organizations that use external IT services provided by a non-DoD federal government agency must ensure the categorization of the IS delivering the service is appropriate to the ______________, _________________, and ______________ needs of the information and mission.

QUESTION 50

Three

ANSWER

FIPS Publication 199 defines __________ levels of potential impact on organizations or individuals should there be a breach of security.

QUESTION 51

Administrative Assistant to the Secretary of the Air Force (SAF/AA)

ANSWER

Works with the CISO to oversee the establishment of risk tolerance and security controls for IT owned by Headquarters Air Force (HAF) organizations without a functional CIO (HAF Portfolio).

QUESTION 52

Authorizing Official (AO)

ANSWER

The _____________ is the official with the authority responsible for accepting a level of risk for a system balanced with mission requirements.

QUESTION 53

Approval to connect

ANSWER

The AF Enterprise AO is the only authority permitted to grant an ________ to the Air Force Information Networks (AFIN).

QUESTION 54

Security Control Assessor (SCA)

ANSWER

The _______________ will periodically assess security controls employed within and inherited by the IT IAW the Information Security Continuous Monitoring strategy.

QUESTION 55

Security Controls Assessor Representative (SCAR)

ANSWER

This position may be an organic or contracted resource.

QUESTION 56

Agent of the Security Controls Assessor (ASCA)

ANSWER

The _________________ is a licensed 3rd-party agent assisting in assessment activities and provides an independent report for the SCA.

QUESTION 57

Communications Squadron Commander (CS/CC)

ANSWER

Serves as the PM or ISO for the base enclave and performs duties IAW DoDI 5000.02 and AFI 17-130.

QUESTION 58

Information System Security Manager (ISSM)

ANSWER

The _____________ is the primary cybersecurity technical advisor to the AO, PM, and ISO.

QUESTION 59

Information System Security Officer (ISSO)

ANSWER

The ____________ is responsible for ensuring the appropriate operational security posture is maintained for assigned IT.

QUESTION 60

Information Systems Security Engineer (ISSE)

ANSWER

The ______ is an individual, group, or organization responsible for conducting information system security engineering activities.

QUESTION 61

Information Owner (IO)/Steward

ANSWER

An organizational official with statutory, management, or operational authority for specified information and the responsibility for establishing the policies and procedures governing its generation, classification, collection, processing, dissemination, and disposal as defined in CNSSI No. 4009.

QUESTION 62

MAJCOM Cybersecurity Office or Function

ANSWER

The ______________ ____________ ____________ develops, implements, oversees, and maintains a MAJCOM cybersecurity program that adheres to cybersecurity architecture, requirements, objectives, policies, processes, and procedures.

QUESTION 63

User Representative (UR)

ANSWER

The ____________ is the individual or organization that represents operational and functional requirements of the user community for a particular system during the RMF process.

QUESTION 64

Initiation, development/acquisition, implementation/assessment, operation/maintenance, disposal

ANSWER

The five phases of the System Development Life Cycle are: ____________, _____________, ____________, ____________, ____________.

QUESTION 65

Prepare step

ANSWER

The purpose of the ________________ is to carry out essential activities at the organization, mission and business process, and information system levels of the enterprise to help prepare the organization to manage its security and privacy risks using the Risk Management Framework.

QUESTION 66

Security, privacy risk management

ANSWER

Identify and assign individuals to specific roles associated with _________ and _____________.

QUESTION 67

Risk management strategy

ANSWER

Establish a _____________ for the organization that includes a determination of risk tolerance.

QUESTION 68

TASK P-3 (Risk Assessment- Organization)

ANSWER

Which Prepare Task assesses organization-wide security and privacy risks and updates the risk assessment results on an ongoing basis?

QUESTION 69

Low, moderate, high

ANSWER

During categorization, the impact to confidentiality, integrity, and accessibility is categorized into one of three designations ___________, ___________, ______________ to address the impact of a loss.

QUESTION 70

Enterprise Mission Assurance Support Service (eMass)

ANSWER

PMs or ISOs deploying systems across DoD/AF Components will register the system and post the categorization checklist to?

QUESTION 71

XACTA Information Assurance Manager

ANSWER

Utilize ____________________________ on systems/networks certified to process, store, and transmit SCI or SAP/SAR related information (i.e. AFJWICS).

QUESTION 72

Common, system-specific, hybrid

ANSWER

There are three distinct types of designations related to the security controls. These designations include ____________ controls, _____________ controls, and ________________ controls.

QUESTION 73

Inheritable

ANSWER

Common controls are security controls whose implementation results in a security capability that is _________________ by one or more organizational information systems.

QUESTION 74

Information system owners

ANSWER

System-specific controls are the primary responsibility of ____________________________________ and their respective authorizing officials.

QUESTION 75

Common, system-specific

ANSWER

Organizations assign a hybrid status to security controls when one part of the control is ___________ and another part of the control is ___________________.

QUESTION 76

Implement

ANSWER

_____________________ the security controls specified in the security plan in accordance with DoD implementation guidance found on the KS.

QUESTION 77

Inheritance

ANSWER

Security controls that are available for _____________________ (e.g. common controls) by IS and PIT systems will be identified and have associated compliance status provided by hosting or connected systems

QUESTION 78

Develop, review, approve

ANSWER

___________________, ___________________, and ________________ a plan to assess the security controls.

QUESTION 79

SCA

ANSWER

The risk assessment will be used by the _____ to determine the level of overall system cybersecurity risk and as a basis for a recommendation for risk acceptance or denial.

QUESTION 80

Non-compliant (NC)

ANSWER

If vulnerabilities are found, the control is recorded as __________________ in the POA&M, with sufficient explanation.

QUESTION 81

Not applicable (NA)

ANSWER

Security controls that are not technically or procedurally relevant to the system, as determined by the AO, will be recorded as ___________ in the POA&M, with sufficient justification.

QUESTION 82

Security Assessment Report (SAR)

ANSWER

The status and results of all security control assessments in the control set will be recorded in the?

QUESTION 83

SCA, SAR

ANSWER

The ______________ must determine and document in _______________ the an assessment of overall system level of risk and identify the key drivers for the assessment.

QUESTION 84

CAT III

ANSWER

_________________ weaknesses will not prevent an ATO from being granted if the AO accepts the risk associated with the weaknesses.

QUESTION 85

DATO

ANSWER

If risk is determined to be unacceptable when compared to the mission assurance requirement, then the AO, in collaboration with all program stakeholders, will issue the authorization decision in the form of a _______________.

QUESTION 86

Authorization to Connect (ATC)

ANSWER

An ________________ is granted to allow a system to connect to the AFIN or DODIN.

QUESTION 87

Configuration changes, negatively

ANSWER

Continuously monitor the system or information environment for security-relevant events and ________________ that ________________ affect security posture.

QUESTION 88

Quality

ANSWER

Periodically assess the _____________ of security controls implementation against performance indicators.

QUESTION 89

Electronic System Security Assessment (ESSA)

ANSWER

The _______________________ provides commanders with an assessment as to the type and amount of information traversing Department of Defense (DOD) electronic communication systems that is at risk to adversary collection and exploitation.

QUESTION 90

Monitors, collects, analyzes

ANSWER

The AF _________, _________________, and ___________________ information from DOD electronic communications systems to determine if any critical or classified information transmitted via unsecured and unprotected systems could adversely affect US (and allied/coalition) operations.

QUESTION 91

AF OPSEC, Information Operations (IO), Red Teaming

ANSWER

CDA operations are an integral part of ___________, ______________, and _________________.

QUESTION 92

Effectiveness

ANSWER

Cyber Defense Analysis (CDA) is a very effective tool to identify real world problems that can adversely affect the warfighter's ______________.

QUESTION 93

AIM

ANSWER

Which Cyber Defense Analysis (CDA) mission identifies and report disclosed information that could be used to gain authorized access to compromise Air Force Networks and devices?

QUESTION 94

Focused Look Assessment

ANSWER

OPSEC PMs and members of the AF OPSEC Support Team (AF OST) can request a ____________ through their MAJCOM, DRU, or field operating agency (FOA).

QUESTION 95

Telephone, Email Communication, Radio Frequency (RF) Communications

ANSWER

Which ESSA monitoring capabilities are to a commander and the AF OST?

QUESTION 96

IbCs

ANSWER

_________ include collaborative tools such as social networking sites (SNS), social media, user-generated content, social software, e-mail, instant messaging, and discussion forums.

QUESTION 97

WRA

ANSWER

_______________ is the assessment of information posted on AF unclassified, owned, leased, or operated public and private web sites in order to minimize exploitation of AF information by adversaries that can negatively impact AF operations.

QUESTION 98

Consent to monitoring

ANSWER

Users of DOD electronic communications devices are to be notified the use of those devices constitutes ______________.

QUESTION 99

All computers

ANSWER

The notice and consent log-on banner, Attachment 2, must be installed on:

QUESTION 100

AF Form 4394, six months

ANSWER

Ensure users of the system have a valid ____________________ on file. The signed forms will be retained by the organizational Cybersecurity office or designated representative until ______________ after the user no longer requires access to the system.

QUESTION 101

DOD information systems, applications

ANSWER

The DOD Banner/User Agreement policy memorandum only applies to _______________ not ________________.

QUESTION 102

Portable Electronic Device (PED)

ANSWER

What is a non-stationary electronic apparatus with the capability of recording, storing, and/or transmitting information?

QUESTION 103

AF Form 4433, AF Form 4394

ANSWER

Any telecommunication devices not otherwise referenced must have a signed ___________ or __________ on file.

QUESTION 104

Remanence

ANSWER

______________ is the residual information remaining on storage media.

QUESTION 105

Remanence Security (REMSEC)

ANSWER

Actions taken to protect the confidentiality of information on information systems (to include infrastructure devices such as routers and switches).

QUESTION 106

Authorized, properly cleared

ANSWER

To protect against compromise, allow only __________ and _______________ persons with a need to know access to media containing classified and sensitive information.

QUESTION 107

Impractical, destruction

ANSWER

As the monetary cost of media decreases, the cost of sanitizing media may become _______________ and ________________ may become more cost effective.

QUESTION 108

Sanitization

ANSWER

Process to render access to target data on the media infeasible for a given level of effort.

QUESTION 109

Clear, purge, destroy

ANSWER

________________, _______________, and _______________ are actions that can be taken to sanitize media.

QUESTION 110

NSA, destroy

ANSWER

Only products listed on the __________________ Evaluated Products List (EPL) or received approval from NSA may be used to _____________________ classified information (to include media and devices.)

QUESTION 111

Degaussing

ANSWER

Applying a reversing magnetizing field to make magnetic media unreadable is know as?

QUESTION 112

Incinerate

ANSWER

Destruction using high heat/temperatures to reduce the media into ash.

QUESTION 113

Clear

ANSWER

__________ classified media before reuse and reuse only in a classified environment.

QUESTION 114

Donating, selling, destroying

ANSWER

Disposal is the process of reutilizing, transferring, _____________, __________, ____________, or other final removal of media from service.

QUESTION 115

Prohibited

ANSWER

Reuse of classified IS storage media in unclassified environments is __________.

QUESTION 116

Routers, switches, MFDs

ANSWER

Hardware such as _____________. _____________, ______________, etc., may contain multiple types of media and the sanitization methods are based on the type of media and the classification of the operational environment.

QUESTION 117

TEMPEST

ANSWER

__________ is defined as the investigation, study, and control of compromising emanations from telecommunications and automated information systems equipment.

QUESTION 118

Compromising emanations, adversary

ANSWER

___________________ are unintentional electronic signals that, if intercepted and analyzed by an _______________________, would disclose the classified information transferred, received, handled, or otherwise processed by any information-processing equipment/system and telecommunications systems.

QUESTION 119

Through space

ANSWER

Radiated Signals are electromagnetic or acoustic emissions of undesired signal data propagated _______________.

QUESTION 120

Zone B

ANSWER

Inspectable Space (IS) is 20 up to 100 meters.

QUESTION 121

Zone A

ANSWER

The "Best" Equipment Radiation Tempest Zone (ERTZ) Assignment is?

QUESTION 122

Zone C

ANSWER

Inspectable Space (IS) is More than 100 meters (best).

QUESTION 123

Protection, classified

ANSWER

RED is a designation applied to telecommunications and information systems, plus associated areas, circuits, components, equipment, and wire lines requiring _______________ during electrical transmission when ___________ signals are being processed.

QUESTION 124

Black

ANSWER

__________ is a designation applied to telecommunications and information systems, and to associated areas, circuits, components, equipment, and wire lines where unclassified or encrypted classified signals are processed.

QUESTION 125

Technical evaluation, vulnerabilities, threats, countermeasures

ANSWER

EMSEC Countermeasures Review is a _______________ of a facility where classified information will be processed and identifies the EMSEC _______________ and _____________, specifies the required inspectable space, determines the required EMSEC _______________, and ascertains the most cost-effective way to apply required countermeasures.

QUESTION 126

Certified TEMPEST Technical Authority (CTTA)

ANSWER

_________________ is an experienced, technically qualified government employee who meets established certification requirements to fulfill CTTA responsibilities.

QUESTION 127

Base

ANSWER

Wing TEMPEST Security Managers are the point of contact for all TEMPEST matters at the __________ level.

QUESTION 128

Wing TEMPEST Security Managers

ANSWER

Who provides training and assistance to unit TEMPEST Monitors as needed.

QUESTION 129

30

ANSWER

Unit TEMPEST Representatives must ensure TEMPEST Monitor training is received from the Base TEMPEST Manager within __________ days of appointment and as needed thereafter.

QUESTION 130

TEMPEST Information Messages (TIM)

ANSWER

_________________ are issued by the AF-CTTA to make time-critical changes to the Air Force TEMPEST process and publications, update requirements, and clarify guidance. Compliance with them are mandatory.

QUESTION 131

EMSEC Assessment, countermeasures review

ANSWER

___________ is a desktop analysis to determine whether an EMSEC _____________ is required or not.

Looking for a different version?

CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").

Search all study materials