When does the ISSM contact CNDSP organization?
Module 4, Lesson 1, Section 1
when provided with virus infected flash media
If possible what mode should USB thumb drives be set to?
Module 4, Lesson 1, Section 1
Read Only Mode
What protection mechanism functions at the information system entry/exit points, at workstations, & servers, on the network to detect & eradicate.
Module 4, Lesson 1, Section 11
Malicious Code
What support organization are you required to contact if you are unable to complete credentialed scan of a POR system.
Module 4, Lesson 1, Section 3
NAVY311
What DOD process is designed to provide positive control of the vulnerability notification and corrective action?
Module 4, Lesson 1, Section 2
IAVM
What is UBE implantation?
Module 5, Lesson 1, Section 1
forces each account to use a form of identity verification by selecting "smart card interactive logon"
What diagram should be uploaded to eMASS as a human readable file type?
Module 7, Lesson 1, Section 2
System Assessment Boundary
Once SOVT is completed, who must sign the SOVT documentation verifying that the system operates as designed and accepts responsibility?
Module 4, Lesson 1, Section 4
Command personnel
What is Plan Implementation?
Module 4, Lesson 1, Section 8
anticipation of natural disaster events, national security emergencies, hostile acts that disturb operations at Navy Organizations, activities, or commands.
The Navy MEFS supports the SECNAV, CNO, and the CMC, and what other function?
Module 4, Lesson 1, Section 8
Responds to tasking and offers information necessary to facilitate Navy operations worldwide
Properly accounted for, marked, transport, and secured at all times at the highest level of classified information processed applies to what type of item?
Module 4, Lesson 1, Section 6
Government-owned external hard drives
T/F. Commands must establish a comprehensive vulnerability management process that includes the systematic identification and mitigation of software and hardware vulnerabilities in place which must be addressed all vulnerabilities.
Module 4, Lesson 1, Section 4
True
What technique can render target data recovery infeasible or unable to use?
Module 4, Lesson 1, Section 7
Destroying
Who duties are to develop procedures to conduct random & periodic inspections of accredited sites.
Module 4, Lesson 1, Section 9
AO
What is the purpose of the IPS application?
Module 4, Lesson 1, Section 10
to uses patterns of behavior known as signatures to Identify and prevent malicious activity
What eMASS workflow is used by RMF stakeholders review systems.
Module 7, Lesson 1, Section 1
PAC
You should place a system in this status if A/V signatures cannot be verified.
Module 4, Lesson 1, Section 11
Disconnected.
Administrators must adapt which type of methodology is used ensure patches are properly applied across the network, regardless of the software patching technology in use.
Module 4, Lesson 1, Section 3
Scan-patch-scan
What official validates a person is authorized to receive a token, verifies their identity/confirms his or her clearance, & SIPR account.
Module 5, Lesson 1, Section 2
LRA
What repository serves as the primary reporting mechanism for submitting reportable events and incidents to USCYBERCOM
Module 6, Lesson 1, Section 1
JIMS
What is the purpose of Monitoring security control
Module 4, Lesson 1, Section 5
determines the impact of proposed or actual changes to the IS and its environment of operation
During CCRI audit, you are expected to have no less than which authenticated scan success rate percentage?
Module 4, Lesson 1, Section 5
95
This specific signature of behavior activity modifies applications/system resources, & could indicate a benign security risk or attempt to access sensitive system information.
Module 4, Lesson 1, Section 10
What category of activity results in a Denial of Service (DoS) incident?
Module 6, Lesson 1, Section 1
4
Describe Mission Assurance Category (MAC) I
Module 4, Lesson 1, Section 2
The consequences of a compromise or loss of availability will cause immediate and sustained damage.