Shared Flashcard Set

Details

Cyber Surety Volume 1
n/a
78
Other
Not Applicable
12/26/2012

Additional Other Flashcards

 


 

Cards

Term

The cyber surety journeyman manages all of the folowing programs except...

 

COMPUSEC

INFOSEC

EMSEC

COMSEC

Definition
INFOSEC
Term
What is the fourth step in the operational risk management(ORM) process?
Definition
Make decisions based on cost vs. benefit.
Term
What is the minimum lethal milli-ampre current.
Definition
50 milli-ampres
Term
Which type of network typically provides wireless broadband services?
Definition
Wireless Wide Area Network (WWAN)
Term
To use VPN products, obtain interim approval from?
Definition
Services and Integration Division (SAF/XC)
Term
Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
Definition
Fiber Optic
Term
In which Network does every device have exactly two neighbors?
Definition
Ring
Term
Which network integrates multiple topologies?
Definition
Tree
Term
Which class of Internet protocol addresses is used for very large networks?
Definition
A
Term
Which protocol has the job of verifying the correct delivery of data from client to server?
Definition
Transmission Control Protocol (TCP)
Term
Which protocol is and Internet Engineering Task Force (IETF) standard design to reduce the administration burden and complexity of configuring hosts on a TCP/IP-based network?
Definition
Dynamic Host Configuration Protocol (DHCP)
Term
As the migration to the Internet Protocol (IP) V6 continues, many organizations rely upon what to compensate for the lack of usable IP addresses?
Definition
Subnetting
Term
The sequence of leading bits in an internet protocol used to identify the network portion of an IP address is called?
Definition
Routing Prefix
Term
Breaking down the packets addresses to act as a gateway to allow traffic to pass between networks involves what transition technology?
Definition
Dual Layer
Term
Setting up a secure point to point communication is called?
Definition
Tunneling
Term
Network resources must be consistently controlled and monitored to control access to the network while...
Definition
minimizing risks posed by various cyberspace threats.
Term
When coupled with standard network policy, the standard desktop configuration (SDC) substantially...
Definition
improves network security.
Term
To make it possible for replacement administrators to accomplish the same tasks as their predecessors, administrators must be in the habit of...
Definition
keeping complete and accurate documentation of all configuration changes.
Term
With the consolidation of several Network Operations and Security Centers (NOSC), the airforce...
Definition
achieves near end-to-end command and control capability.
Term
Which WiFi standard is the slowest yet least expensive?
Definition
802.11b
Term
Which wireless encryption standard originally intended to create a wireless security platform that would perform as securely as traditional wired network by providing data encryption?
Definition
Wired Equivalency Privacy (WEP)
Term
What shall be assigned to all Department of Defense information systems that is directly associated with the importance of information contained relative to achieving DOD goals and objectives?
Definition
Mission assurance category.
Term
Requirements for availability and integrity are associated with...
Definition
mission assurance
Term
Who is responsible for verifying proper security clearances and background checks prior to granting access to Air Force Global Information Grid (AF GIG)?
Definition
IAO and Security Manager
Term
Initial information assurance (IA) awareness for all network users ensures all of the following except that users...
Definition
have met investigation requirements.
Term
Which common access card (CAC) certificate would be used to sign an enlisted performance report?
Definition
Identification
Term
With what agency must the contract manager validate a contractor emplyee's need to obtain a government PKI certificate?
Definition
Local Registration Authority/Trusted Authority (LRA/TA)
Term
When network password composition rules are not automatically enforced, what process should network administrators use to enforce password stringency?
Definition
Cracking
Term
Report loss or suspected loss of removable media containing controlled unclassified information (CUI) or personally identifiable information (PII) according to reporting procedures in which Air Force Instruction (AFI)?
Definition

AFI 33-138 Enterprise Network Operations Notification and Tracking

 

Term
Which Air Force Instruction guides security policy and guidelines and government contractors?
Definition
AFI 31-601 Industrial Security Program Management
Term
What type of access is given to remote users who access, download, or upload data?
Definition
End-User access
Term
What type of access is given to remote users who perform trouble shooting, configuration,changes, or systems reviews?
Definition
Administrative
Term
When ever possible, in which environment would you run the Unix Apache server?
Definition
chroot
Term
To improve system security, several services that are on many Unix systems can be disabled except...
Definition
rfinger
Term
When vulnerabilities are discovered within the Windows operating system and its other products, Microsoft releases...
Definition
Bulletins
Term
A companion file virus is one that...
Definition
renames the original file and writes itself with the original files name.
Term

To virus protect your system, make sure you perform all of the following steps except...

  • Log off your computer daily
  • Install the latest updates and service packs.
  • Update your anti-virus software.
  • watch for files with .exe, .bat, and .scr attachments.
Definition
Log off your computer daily.
Term
By providing users with the necessary level of access to perform their jobs, you are...
Definition
using least privilege principle.
Term
What category is an incident in which an unauthorized person gained user-level privileges on an Air Force computer/information system/network device?
Definition
Category II
Term
What category is an incident in which an Air Force computer/informtion system/network was denied use due to an overwheliming volume of unauthorized network traffic? 
Definition
Category IV
Term
 What is the lowest level information condition (INFOCON)?
Definition
Level 5 is the lowest
Term
All agencies/organizations implement information condition (INFO CON) measures except?
Definition
Air Force network operating center network control division
Term
What type of certificate authenticates the identity of a user?
Definition
Digital
Term
What should be implemented on desktop systems connected to the critical networks to prevent unauthorized people from gaining control of the system when the system is powered up?
Definition
BIOS password
Term
Who reviews information assurance assistance program (IAAP) reports and has the final authority to downgrade IAAP report ratings when it is clear that incidents or deviations are involved?
Definition
Headquarters Air Force Integration Center (HQ AFNIC)
Term
Which agency conducts assessments of wing information assurance (IA) programs using AF Form 4160 every 2 years or sooner?
Definition
Major Commands
Term
Threats that include flaws in building construction, improper implementation of utilities, inadequate wiring, and poor housekeeping can be best classified as what type of threat?
Definition
Environmental
Term
Dagaussing with an NSA approved degausser is the only way to clear which media type?
Definition
Magnetic tapes
Term
No procedures exist for cleaning which type of media?
Definition
Programmable read-only memory and optical media.
Term

 An example of when Sanitization and declassification are not appropriate is when?

 

Definition
When changing modes of operation or prior to reuse.
Term
Sanitizing sealed disks, removable disk packs, magnetic bubble memory, core memory, and flash memory is not complete until how many passes with a degausser?
Definition
Six
Term
The corre ctivity of a Type II extended range degausser is
Definition
751-1000 Oe
Term
How often must a degausser be recertified for the first two years of operation?
Definition
Every 6 months
Term
From which media type must you remove the outer chassis and electronic circuit boards whe npractical prior to destroying?
Definition
Core memory.
Term
To ensure integrity of the overwriting process, overwriting software must have the following functions and capabilities except?
Definition
Providing a validation cetificate indicating that the procedure was completed properly.
Term
When overwriting hard drives, examine what minimum percentage to verify the overwriting process?
Definition
20%
Term
What standard form label is used as a data descriptor label?
Definition
711
Term
Who has the authority to impose restrictions upon, and prohibit the use of, government owned removable information systems storage media for classified systems or networks?
Definition
Designated approving authority.
Term
For in-transit storage, an installation commander can authorize what classification to be kept on the flight line?
Definition
Confidential and Secret.
Term
Which Air Force Systems Security Instruction (AFSSI) provides the overall implementation of Department of Defense's (DOD) TEMPEST program for the Air Force? 
Definition
7701
Term
Emissions Security (EMSEC) reassessments are made when any of the following take place except what?
Definition
Begining to process clasified information.
Term
In basic circuit theory, if the power source is disconnected or if there is a break in the wire, then there is a loss of
Definition
Signal
Term
The main source of compromising emanations is the result of ...
Definition
Nature
Term
A facility with an inspectable space of more than 20 meters but less than 100 meters would be considered to be in what facility zone?
Definition
B
Term
Equipment with an equipment radiation TEMPEST zone (ERTZ) OF 20 TO 100 meters would be considered to be in what equipment zone?
Definition
C
Term
A Protective Distribution System (PDS) is usually installed between two...
Definition
Controlled access areas (CAA)
Term
Before selecting a protective distribution system (PDS), with what two entities must the requesting agency consider other communication security (COMSEC) solutions first?
Definition
Communications and information system oficer (CSO) and system telecommunications engineering manager (STEM)
Term
Who is the final authority granting approval to operate a protective distribution system (PDS)?
Definition
Information systems offcer (ISO)
Term
Within how many minutes should an individual respond if a protective distribution system (PDS) alarm is activated?
Definition
15
Term
What is the risk outcome that results in the physical loss of assets rendering them inoperable and usually requiring replacement?
Definition
Destruction
Term
What is the risk outcome that results in the loss of services provided by the operation of an information systrem (IS) forr a period of time?
Definition
Denial of service
Term
In which phase of the Department of Defense information assurance certification and accreditation process (DIACAP) does the AF-DAA review the recommendations and issue an approving/authorization to operate (ATO)?
Definition
III
Term
Cyber Surety specialists do not review information system audit logs to...
Definition
report fraud waste and abuse.
Term
Automated security incident measurement (ASIM) transcripts are controlled and are only released with approval from?
Definition
Air Force network operations center (AFNOC)
Supporting users have an ad free experience!