Maintenance Cyber Discipline Training

1. True or False: An “Attack Surface” consists of specific access points where malware can be introduced or an adversary can gain access.
Answer: True

2. A separation between the maintenance computer, weapons system, an outside world is as a/an ______.
Answer: B) Air Gap

3. A portable maintenance aid (PMA) is an example of a/an ______.
Answer: B) Direct-attached

4. Match the following.
Answer: B, C, A

5. True or False: Nuisance malware is intentional and targeted specifically towards an Air Force system by an adversary.
Answer: B) False

6. Identify an example of attack surface on a computer.
Answer: D) All of the above

7. True or False: Defense in Depth refers to the practice of using several defensive layers of protective measures to safeguard our weapons systems.
Answer: A) True

8. Equipment risk include.
Answer: E) All of the above

9. True or False: Read only is the safest media to use when controlling data transfer risk.
Answer: A) True

10. True or False: It is okay to assume that external systems are clean because someone else should have already ran the scans?
Answer: B) False