solution
A single, comprehensive approach is the best way to ensure that all personnel (users,
administrators, leadership, etc.) receive the cybersecurity education they need.
False
The Service cyber commands are under the _____________ of U.S. Strategic
Command (USSTRATCOM) and under the _____________ of U.S. Cyber Command's
(USCYBERCOM).
Combatant command; operational control
Those persons with little in the way of hacking skills that can access and use powerful
hacking tools are called _______________.
Script kiddies
The accomplishment of military missions inextricably depends upon networks and
information systems.
True
U.S. military networks are probed for vulnerabilities by adversaries ______________ of
times per day.
Millions
The principle difference between cyber attacks conducted by hackers and those
conducted by nation-states is the ______________ of the attack.
Objective
Which of the following is NOT part of the network casualty "response cycle?"
Attack
Insider threats are potent, mainly because ______________.
They already have trusted access to network resources
Efforts to hide or disguise the physical location of systems used to conduct a cyber
attack is normally performed during the ______________ phase of an attack.
Obfuscate
The military capability for maneuvering in cyberspace is called ______________.
Information operations
Information technology (IT) supply chain vulnerabilities are difficult to manage, because
______________. Select all that apply.
- Compromised devices appear normal and can pass routine quality assurance
inspections
- Malicious code can be inserted into a device's firmware
- Subversive die can be affixed to circuit boards during manufacture
- IT components are increasingly foreign made
The aggregate of individuals, organizations, and systems that collect, process,
disseminate or act on information is called ______________.
The Information Environment
Currently, the greatest threat in cyberspace is posed by ______________.
Advanced Persistent Threats
The continuing transformation of information as both a weapon and an enabler in
combat drives a warfighting capability that the Navy calls______________.