essay - Fspace is defined as a “…global domain within...

Info icon This preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Doctrine pertaining to cyberspace operations is as developed as that related to other forms of warfare (air or surface warfare). False Which of the following are elements of identity management? Select all that apply. Answer Options: A. Authorization B. Audit/compliance F. Authentication Maritime Cyberspace Operations - End of Lesson Test (question 3 of 8) In order to mount an effective response to its targeted capabilities, DOD must ______________. Select all that apply. Answer Options: C. decrease an adversary’s confidence in its capabilities D. increase confidence in its own systems ______________ is a tool, technique, or activity employed within a dimension of the Information Operations environment that can be used to create effects and operationally desired conditions. Answer Options: A. An information related capability Which of the following describe configuration management (CM)? Select all that apply. Answer Options: A. CM enables network operators to place strict controls on the hardware and software allowed to operate on a network. B. CM is a proven method of managing hardware and software vulnerabilities.
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Fspace is defined as a “…global domain within the ______________ environment…” Answer Options: A. information The aggregate of individuals Information environment Which of the following are attributes of cyberspace? Select all that apply. Answer Options: A. Entirely manmade B. Boundaries are difficult to determine C. Constantly changing Cyberspace operations are usually nested within the Information Operations cell on a Joint Force Commander’s staff. Answer Options: A. True Insider threats are potent, mainly because ______________. C. they already have trusted access to network resources Which of the following make defending military computer networks increasingly difficult? Select all that apply. Answer Options: A. diversity of security features B. multitude of operating systems C. difficulty in exercising configuration control D. expanding diversity of IP-enabled devices E. growing numbers of mobile and networked computing platforms...
View Full Document

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern