
Information Assurance in a Government DoD (GROUP 7)
Authored by Mark Feguro
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
what is the primary reason Information Assurance (IA) is crucial for the Department of Defense (DoD)?
Enhancing office productivity and efficiency.
Complying with international privacy laws.
Ensuring the protection of national security
To increase the budget for the technology department.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following frameworks is mentioned as a guide for the DoD's IA strategy?
Six Sigma
COBIT (Control Objectives for Information and Related Technologies)
The Risk Management Framework (RMF)
ITIL (Information Technology Infrastructure Library)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A breach in DoD systems could cause 'real-world damage' because these systems are:
Easily replaceable with commercial alternatives.
High-stakes, controlling weapons and logistics.
only relevant to software developmentPrimarily used for public relations.
Monitored by international watchdogs.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an 'Advanced Persistent Threat' (APT) as mentioned in the context of cyberwarfare?
A type of hardware malfunction in defense systems.
A common computer virus that is easily detected.
A physical security breach at a military facility.
A sophisticated, long-term cyberattack, often by a nation-state.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the core principle of the DoD's Information Assurance strategy?
A risk-based approach applied throughout a system's life cycle.
A compliance-based approach focused only on federal laws.
An outsourced approach relying on third-party security firms.
A reactive approach that responds to breaches after they occur.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A 'zero-day exploit' is a vulnerability that:
Is exploited before the developers are aware of it.
Can be blocked by any standard antivirus software.
Is known to developers but has not been patched yet.
Only affects systems that have not been updated in a year.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT listed as an area where Information Assurance is implemented?
Surveillance drones
Satellite communications
Battlefield networks
Civilian social media platforms
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?