3-49.
3-50.
3-51.
3-52.
An attempt by the enemy to
enter U.S. or allied
communications systems and
simulate traffic with the
intent to confuse and
deceive.
1.
A
2.
B
3.
C
4.
D
The deliberate use of
electromagnetic signals with
the objective of impairing
communications circuits.
1. A
2. B
3. C
4. D
Usually a nondeliberate
electrical disturbance that
unintentionally prevents the
effective use of a
frequency.
1. A
2. B
3. C
4. D
Which of the following
statements best describes
the overall goal of AIS
security?
1.
2.
3.
4.
To take all reasonable
measures to protect AIS
assets
To prevent data and
programs from being
destroyed or sabotaged
To keep unauthorized
personnel out of your
AIS facility
To take whatever
measures are necessary
to protect equipment and
people
3-53.
3-54.
3-55.
3-56.
3-57.
Which of the following
assets is NOT considered
AIS asset?
1.
People
2.
Hardware
3.
Software
4.
Environment
an
In AIS security terminology,
what term is used for the
things that can destroy AIS
assets?
1.
Threats
2.
Probability
3.
Vulnerability
4.
Countermeasures
To express the cost of a
loss or abuse from an
adverse event over time,
what AIS security term is
used?
1.
Risk
2.
Likelihood
3.
Vulnerability
4.
Countermeasure
In AIS security, risks are
usually expressed in which
of the following terms?
1.
Days
2.
Dollars
3.
Equipment
4.
Personnel
In AIS security terminology,
the controls to lessen or
eliminate known threats and
vulnerabilities are called
1.
physical barriers
2.
security routines
3.
backup procedures
4.
countermeasures
27