Shared Flashcard Set

Details

NSVT TEST 5
LAST TEST
69
Computer Networking
Professional
02/23/2013

Additional Computer Networking Flashcards

 


 

Cards

Term
ADMINISTRATIVE ACCESS REQUIRES THE MOST STRINGENT SECURITY CONTROLS REQUIRES ENCRYPTION ON COMMUNICATION CHANNELS BETWEEN REMOTE USER AND SYSTEM BEING ACCESSED.
Definition
TRUE
Term
WHAT IS A PERSONAL DIGITAL DEVICE
Definition
Term
WHAT IS A TEXT MESSAGE DEVICE
Definition
DEVICE THAT SENDS TWO WAY TXTS
Term
WHAT IS A BLACKBERRY DEVICE
Definition
DEVICE THAT WIRELESSLY EXCHANGES EMAIL.
Term
PERSONAL ELECTRONIC DEVICE.
Definition
Term
WHAT IS IKE
Definition
is an automated protocol to negotiate, create, and manage security associations
etween two computers.
Term
WHAT IS AH
Definition
AH, one of the IPSec security protocols, provides integrity protection for packet headers and data, as well as user authentication. It can optionally provide replay protection and access protection.
Term
WGAT US ESP
Definition
the second core of ipsec protocol. encrypts payload packet.
Term
WHAT IS AGGRESIVE?
Definition
negotiates the same security parameters as mainmode through three messages vice six. making it faster
Term
WHAT IS A QUICK MODE?
Definition
negotiates a shared ipsec policy. derives shared keying secret material
Term
RISK ANALYSIS DETERMINES THE RISK TO THE SYSTEM THE LIKELIHOOD SECURITY CONTROLS AND THE IMPACT.
Definition
Term
RISK MANAGEMENT PROCESS INCLUDES?
Definition
Term
WHAT PUBLICATION IS THE STANDARD FOR SECURITY CONFIGURATION OF FEDERAL INFORMATION AND INFORMATION SYSTEMS?
Definition
Term
WHAT IS HIGH RISK SOFTWARE
Definition
software that is not authorized unless written approval is granted.
Term
WHAT IS SOLUTION SECURITY ANALYSIS
Definition
Term
SF ,706,707,708,710, 711, 712
Definition
706 - TS LABEL
707 - S
708 - C
710 - U
711 - MAGNETIC MEDIA
712 - CLASSIFIED SCI
Term
WHAT ARE THE ROLES OF AN ISSM
Definition
Term
REUSING MAGNETIC MEDIA.
Definition
Term
WHAT IS THE CTTA
Definition
Term
IF AUTOMATED AUDITING IS NOT AVAILABLE, THE ISSM/SA MUST GET APPROVL FROM THE ISSPM/SCO TO CONDUCT MANUAL AUDITS.
Definition
Term
WHAT DOES THE EVALUATION ASSURANCE LEVELS [EAL] DO?
Definition
Term
HOW OFTEN DO YOU NEED TO REACCREDITED AN AN IS
Definition
Term
KNOW WHAT CERTIFICATION AND ACCREDITATION IS?
Definition
Term
WHAT TYPE OF ACCESS CONTROLS ARE THERE AND WHAT DO EACH OF THEM DO?
Definition
Term
HOW MANY LEVELS OF INFOCON ARE THERE AND WHAT ARE THEY?
Definition
Term
ALL INFORMATION ARE REPORTED TO THE LOCAL INFORMATION SYSTEMS SECURITY OFFICER, KNOWN AS THE ISSO
Definition
Term
KNOW THE DIFFERENCE BETWEEN INCIDENTS AND VIOLATIONS.
Definition
INCIDENTS- ATTEMPTS TO EXPLOIT A SECURITY SYSTEM
VIOLATIONS- FAILURE TO COMPLY WITH POLICIES AND PROCEDURES.
Term
WHAT ARE THE VARIOUS FACTORS OF PROTECTION LEVELS.
Definition
Term
WHAT ARE THE ROLES OF AN IAM
Definition
Term
WHAT HAPPENED IN 1996
Definition
HIPPA, federal credit act, and espionage act.
Term
WHAT HAPPENED IN 1950
Definition
Term
WHO DO YOU NEED PERMISSION FROM BEFORE MONITORING A INDIVIDUAL.
Definition
you need permision from the commanding officer with legal representation.
Term
WHAT IS THE PURPOSE OF MONITOR.
Definition
OBSERVATION OF ILLEGAL SOFTWARE INSTALLATION OR ANYTHING THAT COULD IMPACT A COMPUTER FACILITY.
Term
NAVCIRT ADDRESSES FIVE TYPES OF INCIDENTS
Definition
1: INTRUSIONS
2: MALICIOUS LOGIC INFECTIONS
3: PROBES
4: DOS
5: ATTEMPTED INTRUSIONS
Term
WHAT ARE AUTHORIZED ATTACKS
Definition
ATTACKS LIKE PEN TESTING
Term
DISA AGAIN WHAT DO THEY DEVELOP AND PROVIDE.
Definition
SECURITY CONFIGURATION AND GUIDANCE FOR IA AND IT PRODUCTS
Term
WHAT ARE TWO TYPES OF AUDIENCES
Definition
GENERAL USERS: NEED TO UNDERSTAND GOOD SECURITY PRECAUTIONS.

ADVANCED USERS:
Term
HOW CAN YOU MAKE TRAINING MORE EFFECTIVE
Definition
Term
WHAT ARE THE RESPONSIBILITIES OF THE ISSM
Definition
- To schedule periodic security testing
- To grant approval for systems to operate
- To implement disaster recovery plans
- To conduct contingency planning
Term
ISSM AND CONTINGENCY PLANNING
Definition
- To ensure that management realizes some services may not be provided or otherwise available during an emergency
- To obtain management agreement on the assumptions which the plan is based, including dependence on other organizations for assistance
- To communicate to management the existence of a plan and obtain approval of the plan
Term
WHAT IS A DISASTER
Definition
A disaster is a power outage, hardware failure, vandalism, fire, or natural disaster.
Term
WHAT ARE THE STEPS IN A RESTORATION PLAN FOR THE ISSM
Definition
CONDUCT A SECURITY RISK ASSESMENT
Term
KNOW THE DIFFERENCE BETWEEN CONTINGENCY PLAN AND RESTORATION PLAN
Definition
Term
PROCEDURES FOR DOCUMENT RESTORATION MUST BE DEVELOPED AND TESTED PERIODICALLY AT LEAST ANNUALLY
Definition
Term
HOW DO YOU ANNOTATE A CHANGE IN THE CONTINGENCY PLAN.
Definition
Term
WHAT IS CLIPPING LEVEL AND WHAT HAPPENS IF YOU EXCEED IT
Definition
Term
WHICH AUTOMATED TOOL CAN BE USED BY APPLICATIONS TO LOOK FOR EVIDENCE OF DATA TAMPERING
Definition
Term
USE OF ALARMS SIGNALS AND REPORTS BY DOD
Definition
Term
WHERE DO YOU REMOVE A VIRUS FROM
Definition
Eradication entails removing the cause of the incident. In the case of a virus incident, eradication simply requires removal of the virus from all systems and media. Anti-viral software usually does this.
Term
WHAT IS TEMPEST
Definition
U.S. government codename for a set of standards, for limiting electric or electromagnetic radiation emanations from electronic equipment such as microchips, monitors or printers. It is a counter-intelligence measure aimed at the prevention of radiation espionage.
Term
WHAT IS THE WEB-BASED APPLICATION USED TO TRACK IAVAS FOR DISA
Definition
Term
WHO HAS OVERALL RESPONSIBILITY FOR FOR THE IAVA PROGRAM
Definition
Term
WHAT IS CC/S/A'S
Definition
Combatant commands, Services and agencies (CC/S/As) ensure individual and organization accountability for implementing the IAVM program and protecting information systems.
Term
WHAT ARE THE OBJECTIVES OF ST&E
Definition
1. UNCOVER DESIGN AND OPERATIONAL FLAWS
2. DETERMIN THE ADEQUACY OF SECURITY MEASUREMENTS.
3. ASSESS THE DEGREE OF CONSISTENCY BETWEEN DOCUMENTATION AND IMPLIMENTATION.
Term
KNOW THE SEVERITY OF ALL THE IAVM
Definition
Term
WHAT IS THE PURPOSE OF MONITOR.
Definition
MONITORING ILLEGAL SOFTWARE INSTALLATION OR ANYTHING THAT CAN COMPROMISE A COMPUTER FACILITY
Term
NAVCIRT ADDRESSES FIVE TYPES OF INCIDENTS.
Definition
1. INTRUSION
2. MALICIOUS LOGICAL INFECTIONS
3. NETWORK PROBES
4. DOS
5. ATTEMPTED INTRUSIONS
Term
WHAT IS AN AUTHORIZED ATTACK
Definition
PENTESTING
Term
DISA AGAIN, WHAT DO THEY DEVELOPE AND PROVIDE
Definition
SECURITY CONFIGURATION AND GUIDANCE FOR IA AND IT PRODUCTS
Term
HOW CAN YOU MAKE TRAINING MORE EFFECTIVE.
Definition
Trainers can use actual incidents to illustrate the importance of computer security.
Term
WHAT ARE THE RESPONSIBILITIES OF THE ISSM
Definition
- To schedule periodic security testing
- To identify all critical systems
- To implement disaster recovery plans
- To conduct contingency planning
Term
ISSM AND CONTINGENCY PLANNING
Definition
- To ensure that management realizes some services may not be provided or otherwise available during an emergency
- To obtain management agreement on the assumptions which the plan is based, including dependence on other organizations for assistance
- To communicate to management the existence of a plan and obtain approval of the plan
Term
WHAT IS A DISASTER
Definition
computer security incident can result from a computer virus, other malicious code, or a system intruder, either an insider or an outsider
Term
WHAT ARE THE STEPS IN A RESTORATION PLAN FOR THE ISSM
Definition
Term
PROCEDURES FOR DOCUMENT RESTORATION MUST BE DEVELOPED AND TESTED PERIODICALLY
Definition
Term
KNOW THE DIFFERENCE BETWEEN CONTINGENCY PLAN AND RESTORATION PLAN
Definition
Term
HOW DO YOU ANNOTATE A CHANGE IN CONTINGINCY PLANNING?
Definition
Term
WHAT IS CLIPPING LEVEL AND WHAT HAPPENS WHEN YOU EXCEED IT.
Definition
A clipping level is a baseline of user activity that is considered a routine level of user errors.

When a clipping level is exceeded, a violation record is produced.
Term
WHICH AUTOMATED TOOL CAN BE USED BY APPLICATIONS TO LOOK FOR EVIDE
Definition
Supporting users have an ad free experience!