Podcast
Questions and Answers
Which of the following best describes a cross domain violation (CDV)?
Which of the following best describes a cross domain violation (CDV)?
- When an information system or device is placed on a network without authorization (correct)
- When a communication path is created between authorized networks
- When a classified network is compromised by malicious software
- When an unclassified network is compromised by malicious software
What is the potential impact of an unmitigated CDV?
What is the potential impact of an unmitigated CDV?
- Increased vulnerability of both systems and the network (correct)
- No impact on the vulnerability of the systems and network
- Decreased vulnerability of both systems and the network
- Enhanced security measures for the systems and network
Which of the following best defines a cross domain violation (CDV)?
Which of the following best defines a cross domain violation (CDV)?
- A situation where an information system is placed on a network without authorization
- A situation where a network is compromised by malicious software
- A situation where a device is placed on a network without authorization
- A situation where an information system or device is placed on an unauthorized network or medium (correct)
Why are CDVs a concern for classified networks?
Why are CDVs a concern for classified networks?
What is the potential risk of an unmitigated CDV?
What is the potential risk of an unmitigated CDV?
Why are CDVs a concern for classified networks?
Why are CDVs a concern for classified networks?
True or false: Plugging personal devices into U.S. Government systems can create vulnerabilities?
True or false: Plugging personal devices into U.S. Government systems can create vulnerabilities?
True or false: During the "handshake" period of a device plugged into a computer, a virus or malware can infect the computer?
True or false: During the "handshake" period of a device plugged into a computer, a virus or malware can infect the computer?
True or false: Personal devices can be charged on personal computers or with USB wall or car chargers?
True or false: Personal devices can be charged on personal computers or with USB wall or car chargers?
True or false: Plugging an iPhone into a computer for a quick charge is a cross domain violation?
True or false: Plugging an iPhone into a computer for a quick charge is a cross domain violation?
True or false: Cross domain violations can introduce malicious data onto a U.S. Government network?
True or false: Cross domain violations can introduce malicious data onto a U.S. Government network?
True or false: Plugging an iPhone into a computer for a quick charge is a cross domain violation?
True or false: Plugging an iPhone into a computer for a quick charge is a cross domain violation?
True or false: Personal devices can be charged on personal computers or with USB wall or car chargers?
True or false: Personal devices can be charged on personal computers or with USB wall or car chargers?
True or false: During the 'handshake' period of a device plugged into a computer, a virus or malware can infect the computer?
True or false: During the 'handshake' period of a device plugged into a computer, a virus or malware can infect the computer?
True or false: Plugging personal devices into U.S. Government systems can create vulnerabilities?
True or false: Plugging personal devices into U.S. Government systems can create vulnerabilities?
True or false: Cross domain violations can introduce malicious data onto a U.S. Government network?
True or false: Cross domain violations can introduce malicious data onto a U.S. Government network?