3D0X3 Air Force
131 questions across 0 topics. Use the find bar or section chips to jump to what you need.
Confidentiality
________________ is assurance information is not disclosed to unauthorized individuals, processes, or devices. It is important to understand with confidentiality, access is granted or denied based upon rights or permissions.
Integrity
_____________________ is ensuring the accuracy of the information and having the controls in place to protect against destruction or unauthorized modification.
Availability
A loss of __________ is the disruption of access to or use of information or an information system.
Authentication
________________ is the verification of the identity of a person. It guarantees the authenticity of who signed the data so you can be sure who participated in a transaction and it was not forged by someone else.
Non-repudiation
________________ is the assurance a sender of data is provided with proof of delivery and the recipient is provided with proof of the sender's identity so neither can later deny having processed the data.
Information Assurance
The Cyber Surety Specialist must ensure _____________ _____________ policies fully support legal and regulatory requirements.
Communications Security (COMSEC) Management
The Cyber Surety Specialist performs ______________ ______________ duties in accordance with national and Department of Defense (DoD) directives.
Classified message incidents, classified file incidents, classified data spillage, unauthorized device connections
Audits and enforces the compliance of cybersecurity procedures and investigates security-related incidents to include COMSEC incidents, ________, _________,_________, __________, and unauthorized network access.
Administrative, physical, technical
Ensures appropriate _____________, __________, ___________ and safeguards are incorporated into all new and existing IS resources and protects IS resources from malicious activity.
Oversight, management
Responsible for ___________ or _____________ of installation cybersecurity awareness programs.
Rescission
Is an OPR action to remove the publication from circulation without being replaced by another publication.
Supersession
An action by which a new/revised publication is issued to replace the older version. Action to publish a new or revised publication includes the supersession action.
Supersedes, rescinds, removes
A publication becomes obsolete when another publication _____________ it, when the Office of Primary Responsibility (OPR) ____________ it, or when the Air Force Departmental Publishing Office (AFDPO) __________ it from the publishing web site because it is expired.
Office of Primary Responsibilities
To rescind a publication, ___________ must complete coordination and obtain certification and approval using the AF Form 673.
One
AF Policy Memorandums (AFPM) and Guidance Memorandums (GM) expire _______ year after the date of publication.
Military members, civilian employees
Certifying and approving officials for Air Force publications and forms must be either _________ or _________.
False
T/F The e-Publishing web site is open to the public, so only the classified titles of classified and restricted access products are provided, along with directions for accessing restricted web sites, and/or instructions on how to obtain copies from the OPR.
AF Cyber Tasking Order (AFCTO)
___________ are operational type orders issued to perform specific actions at specific time frames in support of AF and Joint requirements. AF CTOs are generally derived from USCYBERCOM orders and issued by AFCYBER via the 616 OC. Air Force Space Command (AFSPC)/CC or his/her delegated representative will issue AF CTOs directly (via 16 AF and the 616 OC) to direct the execution of cyberspace operations to protect and defend the AFIN.
AF Cyberspace Control Order (AFCC)
__________ are used to build/shape the portion of cyberspace to be employed in support of a Combatant Command (CCMD) operation or in response to adversary actions.
AF Time Compliance Network Order (AFTCNO)
These are downward-directed operations, security, or configuration management-related orders issued by the Air Force Network Operations Security Center (AFNOSC) or NOSCs.
Ideas, questions, discussions
The AF IACE serves as the primary cybersecurity/IA support resource for the Wing COMSEC Office and managers, providing a collaborative one-stop-shop for cybersecurity/IA _________, _________, ___________ and hosts dynamic content for information sharing.
ICAM, individual, resource, time, reason
_________________ is the set of security disciplines that allows an organization to: "Enable the right to access the right at the right for the right
Password, PIN, security question/answers
___________, ___________ and ___________ are examples of the Authentication Factors of Something you know.
ID badge, CAC, token
____________, _______________, ___________ is an example of the Authentication Factors of Something you have.
Fingerprint, retina, voice patterns
_________, _________, _________ is an example of the Authentication Factors of Something you are.
Active Directory (ADUC), Common Computing Environment (CCE), Global Content Delivery Service (GCDS)
The current Authorization Frameworks are?
COMPUSEC
_____________ includes all measures to safeguard ISs and information against sabotage, tampering, denial of service, espionage, fraud, misappropriation, misuse, or release to unauthorized persons.
Insider, outsider
Protect ISs from ___________ and ____________ threats by controlling physical access to the facilities and data by implementing procedures identified in Joint, DoD, AF publications, and organizationally created procedures.
Information System Security Manager (ISSM), Information System Security Officer (ISSO)
________________/______________ is responsible for the protection from threats by ensuring proper configuration of technical security mechanisms and establishing physical controls for the removal and secure storage of information from unattended ISs.
Classified, controlled, sensitive
Protect display devices to prevent inadvertent viewing of _____________ and _____________ or ___________ information by unauthorized users (e.g., away from windows, doorways, public areas).
Classified
Ensure the transmission of __________ information is encrypted using NSA-approved cryptography IAW AFMAN 17-1302, Communications Security (COMSEC) Operations, and CJCSI 6510.01.
STIGs
Mark and label all KVM switches (regardless of classification environment) to identify the switch position and the associated classification of the connected systems IAW the DISA Keyboard, Video, Mouse Switch Security _________.
True
T/F Partitioning security controls into common, hybrid, and system-specific controls can result in significant savings to organizations in implementation and assessment costs as well as a more consistent application of security controls organization-wide.
Virus, worm, trojan horse
Protect ISs from malicious logic attacks by applying a mix of human and technological preventative measures IAW the DISA STIGs and CJCSI 6510.01 to protect from the following.
Find, fix
The COMPUSEC Assessment is a ______________ and ___________ program review, essentially functioning as a staff assistance visit and therefore, strengthen the AF cybersecurity program.
Wing Cybersecurity Office (WCO)
The ________ will perform annual assessments of all units utilizing IT under the control of the base communications unit, including IT of tenant units.
ISSO/ISSM/ Commander Support Staff (CSS)
Assessments consist of an interview and site visit with the _________________
Detailed unit reports, follow-up reports, annual executive summaries
COMPUSEC Assessment Reports consist of__________, ___________, and _____________ .
Change Management
________________ ensures continuity of operations as changes are validated, approved, and implemented on Air Force networks.
eMASS
The _____________ is the automated Cyber Security Management tool designed to develop, collect and manage DoD Information Technology.
Availability, security
ACAS enhances the ___________ and ____________ of the DoD Information Network (DoDIN) by ensuring adherence to Information Assurance (IA) and Network Operations (NetOps) policies.
Security Content Automation Protocol (SCAP), software, configuration
______________ comprises a number of open standards that are widely used to enumerate ______________ flaws and __________________ issues related to security.
Environmental disruptions, human or machine errors, purposeful attack
Threats to information and information systems include:
Information security, security risks
It is imperative leaders at all levels of an organization understand their responsibilities for achieving adequate ____________ _____________ and for managing information system-related ______________ _______________.
RMF
The ______ provides a disciplined and structured process to perform AF IT security as well as risk management activities and to integrate those activities into the system development life cycle.
Dynamic
The RMF changes the traditional focus of Certification and Accreditation (C&A) as a static, procedural activity to a more __________ approach.
Life cycle risk management
RMF process encompasses____________ _______________ _______________ ________________ to determine and manage the residual cybersecurity risk to the AF created by the vulnerabilities and threats associated with objectives in military, intelligence, and business operations.
Internal
DoD organizations that use _____________ IT services must ensure the categorization of the IS delivering the service is appropriate to the needs of the DoD IS using the service.
Confidentiality, integrity, availability
DoD organizations that use external IT services provided by a non-DoD federal government agency must ensure the categorization of the IS delivering the service is appropriate to the ______________, _________________, and ______________ needs of the information and mission.
Three
FIPS Publication 199 defines __________ levels of potential impact on organizations or individuals should there be a breach of security.
Administrative Assistant to the Secretary of the Air Force (SAF/AA)
Works with the CISO to oversee the establishment of risk tolerance and security controls for IT owned by Headquarters Air Force (HAF) organizations without a functional CIO (HAF Portfolio).
Authorizing Official (AO)
The _____________ is the official with the authority responsible for accepting a level of risk for a system balanced with mission requirements.
Approval to connect
The AF Enterprise AO is the only authority permitted to grant an ________ to the Air Force Information Networks (AFIN).
Security Control Assessor (SCA)
The _______________ will periodically assess security controls employed within and inherited by the IT IAW the Information Security Continuous Monitoring strategy.
Security Controls Assessor Representative (SCAR)
This position may be an organic or contracted resource.
Agent of the Security Controls Assessor (ASCA)
The _________________ is a licensed 3rd-party agent assisting in assessment activities and provides an independent report for the SCA.
Communications Squadron Commander (CS/CC)
Serves as the PM or ISO for the base enclave and performs duties IAW DoDI 5000.02 and AFI 17-130.
Information System Security Manager (ISSM)
The _____________ is the primary cybersecurity technical advisor to the AO, PM, and ISO.
Information System Security Officer (ISSO)
The ____________ is responsible for ensuring the appropriate operational security posture is maintained for assigned IT.
Information Systems Security Engineer (ISSE)
The ______ is an individual, group, or organization responsible for conducting information system security engineering activities.
Information Owner (IO)/Steward
An organizational official with statutory, management, or operational authority for specified information and the responsibility for establishing the policies and procedures governing its generation, classification, collection, processing, dissemination, and disposal as defined in CNSSI No. 4009.
MAJCOM Cybersecurity Office or Function
The ______________ ____________ ____________ develops, implements, oversees, and maintains a MAJCOM cybersecurity program that adheres to cybersecurity architecture, requirements, objectives, policies, processes, and procedures.
User Representative (UR)
The ____________ is the individual or organization that represents operational and functional requirements of the user community for a particular system during the RMF process.
Initiation, development/acquisition, implementation/assessment, operation/maintenance, disposal
The five phases of the System Development Life Cycle are: ____________, _____________, ____________, ____________, ____________.
Prepare step
The purpose of the ________________ is to carry out essential activities at the organization, mission and business process, and information system levels of the enterprise to help prepare the organization to manage its security and privacy risks using the Risk Management Framework.
Security, privacy risk management
Identify and assign individuals to specific roles associated with _________ and _____________.
Risk management strategy
Establish a _____________ for the organization that includes a determination of risk tolerance.
TASK P-3 (Risk Assessment- Organization)
Which Prepare Task assesses organization-wide security and privacy risks and updates the risk assessment results on an ongoing basis?
Low, moderate, high
During categorization, the impact to confidentiality, integrity, and accessibility is categorized into one of three designations ___________, ___________, ______________ to address the impact of a loss.
Enterprise Mission Assurance Support Service (eMass)
PMs or ISOs deploying systems across DoD/AF Components will register the system and post the categorization checklist to?
XACTA Information Assurance Manager
Utilize ____________________________ on systems/networks certified to process, store, and transmit SCI or SAP/SAR related information (i.e. AFJWICS).
Common, system-specific, hybrid
There are three distinct types of designations related to the security controls. These designations include ____________ controls, _____________ controls, and ________________ controls.
Inheritable
Common controls are security controls whose implementation results in a security capability that is _________________ by one or more organizational information systems.
Information system owners
System-specific controls are the primary responsibility of ____________________________________ and their respective authorizing officials.
Common, system-specific
Organizations assign a hybrid status to security controls when one part of the control is ___________ and another part of the control is ___________________.
Implement
_____________________ the security controls specified in the security plan in accordance with DoD implementation guidance found on the KS.
Inheritance
Security controls that are available for _____________________ (e.g. common controls) by IS and PIT systems will be identified and have associated compliance status provided by hosting or connected systems
Develop, review, approve
___________________, ___________________, and ________________ a plan to assess the security controls.
SCA
The risk assessment will be used by the _____ to determine the level of overall system cybersecurity risk and as a basis for a recommendation for risk acceptance or denial.
Non-compliant (NC)
If vulnerabilities are found, the control is recorded as __________________ in the POA&M, with sufficient explanation.
Not applicable (NA)
Security controls that are not technically or procedurally relevant to the system, as determined by the AO, will be recorded as ___________ in the POA&M, with sufficient justification.
Security Assessment Report (SAR)
The status and results of all security control assessments in the control set will be recorded in the?
SCA, SAR
The ______________ must determine and document in _______________ the an assessment of overall system level of risk and identify the key drivers for the assessment.
CAT III
_________________ weaknesses will not prevent an ATO from being granted if the AO accepts the risk associated with the weaknesses.
DATO
If risk is determined to be unacceptable when compared to the mission assurance requirement, then the AO, in collaboration with all program stakeholders, will issue the authorization decision in the form of a _______________.
Authorization to Connect (ATC)
An ________________ is granted to allow a system to connect to the AFIN or DODIN.
Configuration changes, negatively
Continuously monitor the system or information environment for security-relevant events and ________________ that ________________ affect security posture.
Quality
Periodically assess the _____________ of security controls implementation against performance indicators.
Electronic System Security Assessment (ESSA)
The _______________________ provides commanders with an assessment as to the type and amount of information traversing Department of Defense (DOD) electronic communication systems that is at risk to adversary collection and exploitation.
Monitors, collects, analyzes
The AF _________, _________________, and ___________________ information from DOD electronic communications systems to determine if any critical or classified information transmitted via unsecured and unprotected systems could adversely affect US (and allied/coalition) operations.
AF OPSEC, Information Operations (IO), Red Teaming
CDA operations are an integral part of ___________, ______________, and _________________.
Effectiveness
Cyber Defense Analysis (CDA) is a very effective tool to identify real world problems that can adversely affect the warfighter's ______________.
AIM
Which Cyber Defense Analysis (CDA) mission identifies and report disclosed information that could be used to gain authorized access to compromise Air Force Networks and devices?
Focused Look Assessment
OPSEC PMs and members of the AF OPSEC Support Team (AF OST) can request a ____________ through their MAJCOM, DRU, or field operating agency (FOA).
Telephone, Email Communication, Radio Frequency (RF) Communications
Which ESSA monitoring capabilities are to a commander and the AF OST?
IbCs
_________ include collaborative tools such as social networking sites (SNS), social media, user-generated content, social software, e-mail, instant messaging, and discussion forums.
WRA
_______________ is the assessment of information posted on AF unclassified, owned, leased, or operated public and private web sites in order to minimize exploitation of AF information by adversaries that can negatively impact AF operations.
Consent to monitoring
Users of DOD electronic communications devices are to be notified the use of those devices constitutes ______________.
All computers
The notice and consent log-on banner, Attachment 2, must be installed on:
AF Form 4394, six months
Ensure users of the system have a valid ____________________ on file. The signed forms will be retained by the organizational Cybersecurity office or designated representative until ______________ after the user no longer requires access to the system.
DOD information systems, applications
The DOD Banner/User Agreement policy memorandum only applies to _______________ not ________________.
Portable Electronic Device (PED)
What is a non-stationary electronic apparatus with the capability of recording, storing, and/or transmitting information?
AF Form 4433, AF Form 4394
Any telecommunication devices not otherwise referenced must have a signed ___________ or __________ on file.
Remanence
______________ is the residual information remaining on storage media.
Remanence Security (REMSEC)
Actions taken to protect the confidentiality of information on information systems (to include infrastructure devices such as routers and switches).
Authorized, properly cleared
To protect against compromise, allow only __________ and _______________ persons with a need to know access to media containing classified and sensitive information.
Impractical, destruction
As the monetary cost of media decreases, the cost of sanitizing media may become _______________ and ________________ may become more cost effective.
Sanitization
Process to render access to target data on the media infeasible for a given level of effort.
Clear, purge, destroy
________________, _______________, and _______________ are actions that can be taken to sanitize media.
NSA, destroy
Only products listed on the __________________ Evaluated Products List (EPL) or received approval from NSA may be used to _____________________ classified information (to include media and devices.)
Degaussing
Applying a reversing magnetizing field to make magnetic media unreadable is know as?
Incinerate
Destruction using high heat/temperatures to reduce the media into ash.
Clear
__________ classified media before reuse and reuse only in a classified environment.
Donating, selling, destroying
Disposal is the process of reutilizing, transferring, _____________, __________, ____________, or other final removal of media from service.
Prohibited
Reuse of classified IS storage media in unclassified environments is __________.
Routers, switches, MFDs
Hardware such as _____________. _____________, ______________, etc., may contain multiple types of media and the sanitization methods are based on the type of media and the classification of the operational environment.
TEMPEST
__________ is defined as the investigation, study, and control of compromising emanations from telecommunications and automated information systems equipment.
Compromising emanations, adversary
___________________ are unintentional electronic signals that, if intercepted and analyzed by an _______________________, would disclose the classified information transferred, received, handled, or otherwise processed by any information-processing equipment/system and telecommunications systems.
Through space
Radiated Signals are electromagnetic or acoustic emissions of undesired signal data propagated _______________.
Zone B
Inspectable Space (IS) is 20 up to 100 meters.
Zone A
The "Best" Equipment Radiation Tempest Zone (ERTZ) Assignment is?
Zone C
Inspectable Space (IS) is More than 100 meters (best).
Protection, classified
RED is a designation applied to telecommunications and information systems, plus associated areas, circuits, components, equipment, and wire lines requiring _______________ during electrical transmission when ___________ signals are being processed.
Black
__________ is a designation applied to telecommunications and information systems, and to associated areas, circuits, components, equipment, and wire lines where unclassified or encrypted classified signals are processed.
Technical evaluation, vulnerabilities, threats, countermeasures
EMSEC Countermeasures Review is a _______________ of a facility where classified information will be processed and identifies the EMSEC _______________ and _____________, specifies the required inspectable space, determines the required EMSEC _______________, and ascertains the most cost-effective way to apply required countermeasures.
Certified TEMPEST Technical Authority (CTTA)
_________________ is an experienced, technically qualified government employee who meets established certification requirements to fulfill CTTA responsibilities.
Base
Wing TEMPEST Security Managers are the point of contact for all TEMPEST matters at the __________ level.
Wing TEMPEST Security Managers
Who provides training and assistance to unit TEMPEST Monitors as needed.
30
Unit TEMPEST Representatives must ensure TEMPEST Monitor training is received from the Base TEMPEST Manager within __________ days of appointment and as needed thereafter.
TEMPEST Information Messages (TIM)
_________________ are issued by the AF-CTTA to make time-critical changes to the Air Force TEMPEST process and publications, update requirements, and clarify guidance. Compliance with them are mandatory.
EMSEC Assessment, countermeasures review
___________ is a desktop analysis to determine whether an EMSEC _____________ is required or not.
Looking for a different version?
CBTs get updated every year. Search for the exact version you're taking (e.g. "cyber awareness 2025").
Search all study materials