Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
53 Cards in this Set
- Front
- Back
What is an occurrence, not yet assessed, that may effect the performance of an IS?
|
Event
|
|
What kind of plan is maintained for emergency response, backup operations, and post disaster recovery fo an information system, to ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation?
|
Contigency Plan
|
|
What provides visibility of extent and intensity of the activity, traffic, load and throughput potential, as well as detection of significant degradation of service?
|
Network Mangement
|
|
What enables operations and intelligence collection to gather data from target of adversary automated information systems or networks?
|
Computer Network Exploitation (CNE)
|
|
What integrates an organized, manned, equipped and trained workforce to guard, secure and secure information and information systems by providing the security services/attributes of availability, authentication, confidentiality, integrity and non-repudation?
|
Information Assurance
|
|
Which INFOCON level is described as a normal readiness of DOD information systems and networks?
|
Normal
|
|
What does network management enable based on priority, system status and capacity?
|
Dynamic rerouting
|
|
What is the ability to rapidly collect, process and disseminate information while denying these cpabilities to adversaries?
|
Information Superiority
|
|
What provides globally interconnected capabilities, processes and personnel for collecting, processing, storing, disseminating and managing information for all DOD war-fighters, policy makers, and support personnel?
|
Global Computer Grid (GCG)
|
|
Who is responsible for developing and providing US military policy, positions and concepts supporting CND and IA?
|
Chairman of the Joint Chiefs of Staff
|
|
what is the probability that a particular vulnerability will be exploited within an interacting population and adversely impact some members of that popluation.?
|
Community Risk
|
|
Which type of threats describes non state-sponsored computer network attack, espionage or data theft?
|
Second Generation
|
|
Which INFOCON level has a further increase in CND force readiness above that required for normal readiness?
|
Bravo
|
|
What focuses on affecting human decision processes to achieve friendly objectives?
|
Information Operations
|
|
What integrates the 3 primary functions of network management, information dissemination management (IDM) and IA?
|
NETOPS
|
|
What are teams composed of personnel with the technical expertise and organic equipment that may deploy to assist remote sites in the restoration of computer services?
|
Computer Emergency Respose Team.
|
|
What is the opportunity to make use of an information system (IS) resource?
|
Access
|
|
What limits access to information system resources only to authorized users, programs, processes or other systems?
|
Access Control
|
|
What is the assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data?
|
Non-Repudiation
|
|
What is DOD consolidated worldwide enterprise level telecommunications infrastructure that provides the end-to-end information transfer network for supporting military operations?
|
Defense Information System Network.
|
|
What is the formal description and evaluation of vulnerabilities of an information system?
|
Vulnerability Assessment
|
|
What is the quaility of an information system reflecting the logical correctness and reliability of the operating system?
|
Integrity
|
|
Which INFOCON level is described as the maximum CND force readiness?
|
Delta
|
|
What provides the timely, reliable access to data and services for authorized users?
|
Availability
|
|
What is the possibility that a particular threat will adversely impact as IS by exploiting a particular vulnerability?
|
Risk
|
|
What is hardware, software or firmware capable of performing an unauthorized function on an information system?
|
Malicious Logic
|
|
Who is the individual responsible for the information assurance program of a DOD information system or organization?
|
Information Assurance Manager
|
|
What is the formal declaration by a DAA that an information system (IS) is approved to operate in a particular security mode at an acceptable level of risk?
|
Accreditation
|
|
Certification and accreditation (C&A) of information systems that process Top Secret Sensitive Compartmented Information will comply with requirements of what?
|
Director of Central Intelligence Directive
|
|
Which type of threats describes common hacker tools and techniques used in a non-sophisticated manner?
|
First Generation
|
|
Who is the official with authority to formally assume responsibility for operating a system at an acceptable level of risk?
|
Designated Approving Authority
|
|
What is an information system (IS) assessed occurrence having actual or potentially adverse effects on an IS?
|
Incident
|
|
Who is the individual responsible to the IAM for ensuring the appropriate operational IA posture is maintained for a DOD information system or organization?
|
Information Assurance Officer
|
|
Which INFOCON level has the further increase in CND force readiness but less than maximum CND force readiness?
|
Charlie
|
|
What are operations to disrupt, deny, degrade or destroy information resident in computers and networks themselves?
|
Computer Network Attack
|
|
What is a collection of computing environments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security?
|
Enclave
|
|
What provides the assurance the information is not disclosed to unathorized entities or processes?
|
Confidentiality
|
|
What is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?
|
Audit Trail
|
|
What is a security measure designed to establish the validity of a transmission, message or originator, or as a means of verifying an individual's authorization to access specific categories of information?
|
Authentication
|
|
Which type of threats described state-sponsored computer network attack or espionage?
|
Third Generation
|
|
Which INFOCON level has increased intelligence watches and strengthened security measures of DOD information systems and networks?
|
Alpha
|
|
What is a type of incident resulting from any action or series of actions that prevents any part of an information system (IS) from functioning?
|
Distributed Denial of Service
|
|
What is a weakness in an information system, system security procedures, internal control or implementation that could be exploited?
|
Vulnerability
|
|
What consists of actions and operations to defend computer systems and networks from unauthorized activities that degrade mission performance and adversely impact survivability?
|
Computer Network Defense
|
|
What is system designed to defend against unauthorized access to or from a private network?
|
Firewall
|
|
What is the unauthorized act of bypassing the security mechanism of a system?
|
Intrusion
|
|
What is a program recorded in permanent of semi-permanent computer memory?
|
Firmware
|
|
What physical and cyber-based systems are essential to the minimum operations of the economy and government?
|
Critical Infrastructures
|
|
Which instruction states all DOD information systems and networks will be certified and accredited IAW with the DOD policy and guidance, currently the DOD Information Technology Security Certification and Accreditation Process (DITSCAP)
|
DOD Instruction 5200.40
|
|
What are automated methods of authenticating or verifying an individual based upon a physical or behaavioral characteristic?
|
Biometrics
|
|
What are the measures that protect and defend information and information system by ensuring availability integrity, authentication, confidentiality and non-repudiation?
|
Information Assurance
|
|
What is process of tracing information system (IS) activities to a responsible source know as?
|
Accountability
|
|
What is an organizational, procedural and technological construct for ensuring information superiority and enabling speed of command for the war-fighter?
|
NETOPS
|