Q1. AFM _______________ Chapter -3 deals with Password Security.
(a) 82-4 (b) 82-5 (c) 10-1 (d) All of these Q2. On PAF Secure LAN, password should be having a minimum ____ characters length. (a) 5 (b) 7 (c) 8 (d) 12 Q3. Data encryption software is _______________. (a) Post Guard (b) PAF Crypt (c) PAF Mail (d) All of these Q4. Passwords on non-Secure LANs / isolated PCs should be having a Minimum of _______ characters length. (a) 5 (b) 7 (c) 8 (d) 9 Q5. Passwords related to information systems are to be shared to unauthorized users. True / False Q6. Any observance of ICT violation must be reported to respective Unit ISO, NOC AHQ Islamabad and Directorate of ________________. (a) IS (Cmd) (b) IS (Dev) (c) Dte of NCW (d) Dte of CyW Q7. Personnel desirous of publishing their own websites are to follow procedure in accordance with Chapter-11 of AFM__________. (a) 10-1 (b) 82-3 (c) 82-4 (d) 82-5 Q8. Devices containing Top Secret / Secret (Accountable, Copy numbered or Sensitive) information to be dealt with in accordance with AFO 20-25 and AFM ______. (a) 12-1 (b) 10-1 (c) 82-4 (d) 82-5 Q9. Official mail classified as “Secret (copy numbered) and Top Secret” will be transmitted through PAF Mail v2. True / Flase Q10. Official mail classified as “Secret (not copy numbered) and below secret” will be transmitted through _____________. (a) E-Courier (b) PAF Mail (c) Post Gaurd (d) All of these Q11. Minor security incidents (SI) would be handled locally by the respective Director / Commanding Officer and reported as described in the Incident Reporting Procedure. True / False Q12. Only Registered USB used for data transfer in own Unit / sections PC for Official use. True / False Q13. Online IT Complaint System available on PAF Intranet, under SW APP tab in ______________. (a) Admin (b) Support (c) OPS (d) C4I Q14. AFO ________ Security of Information Systems in PAF. (a) 12-1 (b) 10-1 (c) 82-4 (d) 82-5 Q15. Users having ownership of information, application or physical asset would be considered as _____________. (a) Owners (b) Users (c) Administrators (d) Custodians Q16. AFM 12-1 Chapter_______ deals with incident handling / management. (a) 5 (b) 9 (c) 10 (d) 12 Q17. Report the incident by raising a form given at AFM 12-1 Appendix ____ and sending it to the Directorate of Cyber Warfare. (a) A (b) B (c) C (d) D Q18. Users handling or processing data of their respective domain. (a) Admin (b) Custodian (c) Managers (d) Application Owners Q19. ___________ are the Users designated by their respective Unit / Dte for managing registered ESDs and ensure smooth functioning of PCs of respective Unit. (a) ISOs (b) Custodian (c) Data Owners (d) Application Owners Q20. All organizations outside the PAF and accessing the PAF Intranet limited / restricted version through access control policy. (a) Non-Secure LAN (b) Extra-net LAN (c) Secure-net (d) Isolated LAN