Skip to content

Maintenance Cyber Discipline

🔹

True or False: An "attack surface" consists of specific access points where malware can be introduced or an adversary can gain access.

True
False

🔹

A separation between the maintenance computer, weapon system, and outside world is known as a/an _____.

attack surface
air gap
data cartridge
none of these

🔹

A portable maintenance aid (PMA) is an example of a/an _____.

indirect-attached
direct-attached

🔹

True or False: Nuissance malware is intentional and targeted specifically towards an Air Force system by an adversary.

True
False

🔹

Identify an example of an attack surface on a computer:

supply chain
air gap media
radio frequency
all of these

🔹

True or False: Defense in Depth refers to the practice of using several defensive layers of protective measures to safeguard our weapons systems.

True
False

🔹

Equipment risks include:

shared user accounts
unauthorized software
software/hardware configuration changes
lack of virus scanning
all of these

🔹

True or False: Read-only is the safest media to use when controlling data transfer risk.

True
False

🔹

True or False: It is ok to assume that external systems are clean becausne else should have already ran the scans.

True
False

🔹

Which procedure applies to cellphone/mp3 player

scan before use
refrain from connecting to a PMA
report incident immediately

🔹

Which procedure applies to notification of virus?

scan before use
refrain from connecting to a PMA
report incident immediately

🔹

Which procedure applies to disc from manufacturer.

scan before use
refrain from connecting to a PMA
report incident immediately