Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
6 Cards in this Set
- Front
- Back
Approved Methods to destroy classified HD?
|
Multilation
|
|
Define Firewalls, Net Ranger, IDS Real Secure?
|
Firewalls - Filter Information in/out LAN
Net Ranger - Diagnose Problems IDS - Software/Hardware Intrusion detection either passive or active on the LAN or on a Workstation. |
|
What is the purpose of Fleet Firewall?
|
Secure the environment through a Fleet NOC
|
|
What is the difference between Boundary 1 and Boundary 2 Firewalls?
|
Boundary 1 - Protects within the network and outside network.\
Boundary 2 - Protects from within only |
|
What are the Incident Reporting Requirements?
|
Gather information regarding attack
Report the incident Wait for response Take corrective action |
|
What is Tempest?
|
Reduces electromagnetic emmissions
|