A
B
C
D
E
100

When does the ISSM contact CNDSP organization?

Module 4, Lesson 1, Section 1

when provided with virus infected flash media

100

If possible what mode should USB thumb drives be set to?  

Module 4, Lesson 1, Section 1

Read Only Mode

100

What protection mechanism functions at the information system entry/exit points, at workstations, & servers, on the network to detect & eradicate.

Module 4, Lesson 1, Section 11  

Malicious Code 

100

What support organization are you required to contact if you are unable to complete credentialed scan of a POR system.

Module 4, Lesson 1, Section 3

NAVY311

100

What DOD process is designed to provide positive control of the vulnerability notification and corrective action?

Module 4, Lesson 1, Section 2

IAVM

200

What is UBE implantation? 

Module 5, Lesson 1, Section 1

forces each account to use a form of identity verification by selecting "smart card interactive logon"

200

What diagram should be uploaded to eMASS as a human readable file type?

Module 7, Lesson 1, Section 2

System Assessment Boundary

200

Once SOVT is completed, who must sign the SOVT documentation verifying that the system operates as designed and accepts responsibility?

Module 4, Lesson 1, Section 4

Command personnel

200

What is Plan Implementation?

Module 4, Lesson 1, Section 8

anticipation of natural disaster events, national security emergencies, hostile acts that disturb operations at Navy Organizations, activities, or commands.  

200

The Navy MEFS supports the SECNAV, CNO, and the CMC, and what other function?

Module 4, Lesson 1, Section 8

Responds to tasking and offers information necessary to facilitate Navy operations worldwide

300

Properly accounted for, marked, transport, and secured at all times at the highest level of classified information processed applies to what type of item?

Module 4, Lesson 1, Section 6

Government-owned external hard drives

300

T/F. Commands must establish a comprehensive vulnerability management process that includes the systematic identification and mitigation of software and hardware vulnerabilities in place which must be addressed all vulnerabilities. 

Module 4, Lesson 1, Section 4

True

300

What technique can render target data recovery infeasible or unable to use?

Module 4, Lesson 1, Section 7

Destroying

300

Who duties are to develop procedures to conduct random & periodic inspections of accredited sites.  

 Module 4, Lesson 1, Section 9

AO

300

What is the purpose of the IPS application?

Module 4, Lesson 1, Section 10

to uses patterns of behavior known as signatures to Identify and prevent malicious activity

400

What eMASS workflow is used by RMF stakeholders review systems.  

Module 7, Lesson 1, Section 1

PAC

400

You should place a system in this status if A/V signatures cannot be verified.

Module 4, Lesson 1, Section 11

Disconnected. 

400

Administrators must adapt which type of methodology is used ensure patches are properly applied across the network, regardless of the software patching technology in use.

Module 4, Lesson 1, Section 3


Scan-patch-scan

400

What official validates a person is authorized to receive a token, verifies their identity/confirms his or her clearance, & SIPR account.

Module 5, Lesson 1, Section 2

LRA 

400

What repository serves as the primary reporting mechanism for submitting reportable events and incidents to USCYBERCOM

Module 6, Lesson 1, Section 1

JIMS

500

What is the purpose of Monitoring security control 

Module 4, Lesson 1, Section 5

determines the impact of proposed or actual changes to the IS and its environment of operation

500

During CCRI audit, you are expected to have no less than which authenticated scan success rate percentage?

Module 4, Lesson 1, Section 5

95

500

This specific signature of behavior activity modifies applications/system resources, & could indicate a benign security risk or attempt to access sensitive system information. 

Module 4, Lesson 1, Section 10

Information Signature
500

What category of activity results in a Denial of Service (DoS) incident?

Module 6, Lesson 1, Section 1

4

500

Describe Mission Assurance Category (MAC) I

Module 4, Lesson 1, Section 2

The consequences of a compromise or loss of availability will cause immediate and sustained damage.