PDF Download
COMPREHENSIVE REVIEW OF CYBERSECURITY CONCEPTS
FOR AIR FORCE ENGINEERING EXAM QUESTIONS
Actual Qs and Ans - Expert-Verified Explanation -Guaranteed passing score -100 Questions and Answers
-Format: Multiple-choice / Flashcard
Question 1: Title 10, US Code (Armed Forces)
Answer:
Provides the legal basis for the roles, missions, and organization of each of the services as well as the Department of Defense, guiding the structure and operations of the U.S. Armed Forces
Question 2: Active Directory (AD)
Answer:
Tool used by the 83rd Network Operations Squadron to store and manage network object information
Question 3: Cyberspace Parity
Answer:
Refers to the condition where no force controls cyberspace, emphasizing the complex and dynamic nature of cyberspace operations and security.
Question 4: Command Strategy
Answer:
Provides the link between national strategic guidance and joint planning, guiding the development and execution of military strategies and operations
Question 5: IMS
Answer:
An unclassified system providing access to the management enclave, logically segmenting Air Force Information Network (AFIN) network traffic for enhanced security
Question 6: DACO
Answer:
Directive Authority for Cyberspace Operations, providing strategic guidance and direction for cybersecurity initiatives and operations.
Question 7: Force Package
Answer:
Represents forces mutually supporting each other during the same vulnerability window, emphasizing coordinated and collaborative action in cyberspace operations.
Question 8: SIPRNet Enclave
Answer:
Hosts applications for ingesting network traffic, enabling operators to perform analysis and verification tasks, ensuring the security of sensitive information
Question 9: SIPRNet Gateways
Answer:
Security stacks implemented between the base SIPRNet Security Domain Points (SDPs) and the DoD SIPRNet, providing Intrusion Prevention System (IPS) and Intrusion Detection System (IDS) capabilities
Question 10: USAF Gateway Router - IP/Multi-Protocol Label Switching (MPLS)
Answer:
Provides point to cloud, scalable, and transport independent services, ensuring secure and efficient network operations
Question 11: Strategic guidance
Answer:
Provides long term and intermediate objectives, defines victory or success, and identifies forces, resources, and means to achieve objectives, guiding military planning and decision-making
Question 12: Cyber Mission Force
Answer:
U.S. Cyber Command's action arm, responsible for executing cyber operations to defend against and respond to cyber threats
Question 13: Perimeter Router
Answer:
A boundary router between SDP and firewall, controlling and securing network traffic in cyberspace operations.
Question 14: Respond (AFCYBER Mission Area)
Answer:
Involves detection of cyberspace incidents and countermeasures, outlining the critical focus on rapid response and mitigation in cybersecurity operations.
Question 15: FPCON Bravo
Answer:
A Force Protection Condition indicating an increased and predictable threat of terrorism, requiring heightened security measures
Question 16: Splunk
Answer:
A data analytic tool leveraged by operators to query data from gateway traffic and identify malicious vectors, enhancing cybersecurity measures
Question 17: Jus ad bello
Answer:
Principles governing acceptable use of force under international law, guiding military conduct in armed conflicts
Question 18: Enterprise Recursive Services (ERS)
Answer:
DISA Gateway capability for outbound DNS queries, enhancing network efficiency and security in cyberspace operations.
Question 19: Threat Intelligence
Answer:
Data collected to understand threat actor motives and behaviors, informing proactive cybersecurity measures and response strategies.
Question 20: Customary Law
Answer:
A limited set of rights that the community has agreed to follow, shaping cybersecurity practices and ethical standards.
Question 21: Defense Information Systems Agency (DISA)
Answer:
Manages DISN and associated subdomains, providing critical infrastructure and support for secure communications and data management.
Question 22: The principles of LOAC/Law of War
Answer:
Include military necessity, humanity, proportionality, distinction, and honor, guiding military conduct and behavior in armed conflicts
Question 23: 16th Air Force Commander's Hats
Answer:
Functions include ADCON, OPCON, and serving as JFHQ-Cyber representative, guiding decision-making and operations in cyberspace.
Question 24: Cyber Orders
Answer:
General term defining the types of orders issued for network operations and maintenance
Question 25: AFNGS
Answer:
An architecture consolidating the Air Force enclave to a few points of entry, enabling cyber weapon system processes and effects on traffic, ensuring comprehensive cybersecurity