Maintenance Cyber Discipline
True or False: An "attack surface" consists of specific access points where malware can be introduced or an adversary can gain access.
A separation between the maintenance computer, weapon system, and outside world is known as a/an _____.
A portable maintenance aid (PMA) is an example of a/an _____.
True or False: Nuissance malware is intentional and targeted specifically towards an Air Force system by an adversary.
Identify an example of an attack surface on a computer:
True or False: Defense in Depth refers to the practice of using several defensive layers of protective measures to safeguard our weapons systems.
Equipment risks include:
True or False: Read-only is the safest media to use when controlling data transfer risk.
True or False: It is ok to assume that external systems are clean becausne else should have already ran the scans.
Which procedure applies to cellphone/mp3 player
Which procedure applies to notification of virus?
Which procedure applies to disc from manufacturer.