Login
Remember me
Register
Getvoice.org
Questions
Unanswered
Tags
Users
Ask a Question
Ask a Question
Recent questions tagged cyber
1
answer
According to DOD 8570.01-M, the IA technical category consists of how many levels?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
dod
technical-specifications
iam
1
answer
Indications of an incident fall into 2 categories
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
indicate-problem
incident
action
1
answer
IAW AR25-2 all new appointed cybersecurity workforce personnel must achieve appropriate qualifications
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
workforce
personnel
qualification
requirement
1
answer
A_____________ and ______________ are network infrastructure devices.
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
networking
infrastructure
device
firewall
server
domain
1
answer
How can I protect myself against fake antiviruses
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
protect
antivirus
computer-virus
software
credit-card
1
answer
In accordance with AR 25-2, whose responsibility is it to ensure all users receive initial and annual IA awareness
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
responsibility
iam
awareness
training
iaso
1
answer
Which of the following certification would satisfy IAM level II and IAM level III
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
certificate
iam-level
cissp
security
networking
1
answer
_____________your wireless data prevents anyone who might be able to access your network from viewing it.
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
wireless
data
networking
encrypt
1
answer
How often do all cybersecurity workforce personnel take the Cybersecurity Fundamental training IAW DA PAM 25-2-6.
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
workforce
personnel
fundamental-risk
training
1
answer
What are rootkits (Cybersecurity awareness)
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
rootkit
software
computer
knowledge
1
answer
SSID stands for (Cybersecurity awareness)
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
ssid
service-center
identification
1
answer
The two common denial-of-service attacks are
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
common-terminology
ddos
attack
botnet
1
answer
What is a Virtual Private Network used for
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
vpn
virtual
private
networking
employees
security
1
answer
What are the four objectives of planning for security
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
incident-objectives
planning
security
identification
monitor
1
answer
What is a Distributed Denial-of-Service attack?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
ddos
service-center
attack
machine
operation-plan
1
answer
Encryptions is a way to send a message in ____________
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
encrypt
sender
message
malicious-code
1
answer
What are the three main cloud computing service models
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
cloud
computing
service-center
saas
paas
iaas
1
answer
What is the current DoD repository for sharing security authorization packages and risk assessment data
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
dod
repository
security
authorization
risk-management
1
answer
Which of the following categories require a privileged access agreement?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
category
access-code
agreement
management
1
answer
A denial-of-service (DoS) attack occurs when legitimate _________ are unable to access ________
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
ddos
legitimate
networking
malicious-code
threat
information
1
answer
What does an Incident Response Plans allows for
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
incident
response
planning
security
damage
mitigation
1
answer
What is a hash function?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
hash
function
algorithm
message
document
1
answer
What does LAMP stands for?
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
lamp
linux
apache
php
1
answer
A precursor is a sign that an incident may occur in the future
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
true-or-false
cursor
signal
incident
future
1
answer
Individual networks may be affected by DoS attacks without being directly targeted
asked
in
Internet
by
voice
(
263k
points)
internet
internet-quiz
cyber
cyber-security
true-or-false
networking
individual
ddos
attack
Page:
1
2
3
4
...
16
next »
...