Compliance
Network
Programs/Policies
Security
Roles/Responsibilities
100


Who responsibility is it to report lost/stolen flash drive?

Lesson 4.1.1

User responsibilities 

100

Failure to comply with vulnerability reporting can affect which area?


Lesson 4.1.3

ATO

100

What is the Navy's preferred method of destruction for unclass/classified hard drives?

Lesson 4.1.7

shipping to NSA 

100

What application displays the details about the attack that generated an alert including a description of the attack?

Lesson 4.1.10

Intrusion detection alerts 

100

What tier includes buses, posts, camps, and stations managing and controlling information networks, ISs, and services, either deployed or fixed at DoD installations?

Lesson 6.1.1

III

200

What time frame should you set as ISSM to detect multiple attempts to use removable media within DLP? 

Lesson 4.1.1

48 HRS

200

What scanning software is a component of ACAS?

Lesson 4.1.4

NESSUS

200

 This process applies across all continuity efforts to identify and assess potential hazards, determine what levels of risk are acceptable, prioritize and allocate resources among organizations?

Lesson 4.1.8

Risk Management

200

What is the periodicity antivirus definitions are required to be maintained?

Lesson 4.1.11

7 days

200

eMASS consumes outputs from external vendor scanning tools and maps results to information systems through what application?

Lesson 7.1.1

Asset manager

300


Which personnel are responsible for monitoring sites, or site groups to ensure the security posture of the networks are being maintained
Lesson 4.1.2

Staff Users

300

Which process addresses the likelihood and magnitude of harm, or destruction of the IS and the information it processes, stores, or transmits?

Lesson 4.1.5

Risk assessment

300

What broad scope of activities designed IS plan should be utilized to sustain and recover critical system services following an emergency event

Lesson 4.1.8

IS contingency planning

300

What status should a system be in if antivirus signatures cannot be verified?

Lesson 4.1.11

Locked out 

300

What type of reporting designed to assist with the handling of incidents and provides fixes to mitigate the operational and/or technical impact of an incident

Lesson 6.1.1

Technical Reporting 

400

What confidentiality impact level can cause severe or catastrophic adverse effect on organizational operations, assets, individuals, organizations, or the national security interests of the U.S.

Lesson 4.1.2

High

400

What is the process of systematic notification, identification, deployment, installation, and verification of operating system and application software code revision?

Lesson 4.1.5

Patch Management 

400

This procedures ensures that the identification, reporting, and investigation of violations of DTA are documented?

Lesson 4.1.10

Training and incident handling 

400

DOD PKI provide what type of service that supports escrow and recovery of private keys associated with encryption certificates?

Lesson 5.1.1

Key recovery

400

A Systems Security Plan diagram includes which of the following except:

Internal/external interfaces, ports/protocols, services, and MAC address

Lesson 7.1.2

MAC Address 

500


Which activity must ISSMs track and report to leadership to ensure proper reports

Lesson 4.1.2

CTO Compliance 

500

What is the layer of defense that inspects user actions regarding sensitive content in their work environment?

Lesson 4.1.6

Data Loss Prevention

500

What system prevents applications from executing pieces of code and from crossing in to the memory space of another running program?

Lesson 4.1.10

Host-based application blocking

500

Which process is defined as a user authentication to the network using DOD PKI certificates on a hardware token?

Lesson 5.1.2

CLO

500

Who job is it to continuously monitors the system or information environment for security-relevant events?

Lesson 7.1.3

ISSM

M
e
n
u