• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/53

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

53 Cards in this Set

  • Front
  • Back
What is an occurrence, not yet assessed, that may effect the performance of an IS?
Event
What kind of plan is maintained for emergency response, backup operations, and post disaster recovery fo an information system, to ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation?
Contigency Plan
What provides visibility of extent and intensity of the activity, traffic, load and throughput potential, as well as detection of significant degradation of service?
Network Mangement
What enables operations and intelligence collection to gather data from target of adversary automated information systems or networks?
Computer Network Exploitation (CNE)
What integrates an organized, manned, equipped and trained workforce to guard, secure and secure information and information systems by providing the security services/attributes of availability, authentication, confidentiality, integrity and non-repudation?
Information Assurance
Which INFOCON level is described as a normal readiness of DOD information systems and networks?
Normal
What does network management enable based on priority, system status and capacity?
Dynamic rerouting
What is the ability to rapidly collect, process and disseminate information while denying these cpabilities to adversaries?
Information Superiority
What provides globally interconnected capabilities, processes and personnel for collecting, processing, storing, disseminating and managing information for all DOD war-fighters, policy makers, and support personnel?
Global Computer Grid (GCG)
Who is responsible for developing and providing US military policy, positions and concepts supporting CND and IA?
Chairman of the Joint Chiefs of Staff
what is the probability that a particular vulnerability will be exploited within an interacting population and adversely impact some members of that popluation.?
Community Risk
Which type of threats describes non state-sponsored computer network attack, espionage or data theft?
Second Generation
Which INFOCON level has a further increase in CND force readiness above that required for normal readiness?
Bravo
What focuses on affecting human decision processes to achieve friendly objectives?
Information Operations
What integrates the 3 primary functions of network management, information dissemination management (IDM) and IA?
NETOPS
What are teams composed of personnel with the technical expertise and organic equipment that may deploy to assist remote sites in the restoration of computer services?
Computer Emergency Respose Team.
What is the opportunity to make use of an information system (IS) resource?
Access
What limits access to information system resources only to authorized users, programs, processes or other systems?
Access Control
What is the assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data?
Non-Repudiation
What is DOD consolidated worldwide enterprise level telecommunications infrastructure that provides the end-to-end information transfer network for supporting military operations?
Defense Information System Network.
What is the formal description and evaluation of vulnerabilities of an information system?
Vulnerability Assessment
What is the quaility of an information system reflecting the logical correctness and reliability of the operating system?
Integrity
Which INFOCON level is described as the maximum CND force readiness?
Delta
What provides the timely, reliable access to data and services for authorized users?
Availability
What is the possibility that a particular threat will adversely impact as IS by exploiting a particular vulnerability?
Risk
What is hardware, software or firmware capable of performing an unauthorized function on an information system?
Malicious Logic
Who is the individual responsible for the information assurance program of a DOD information system or organization?
Information Assurance Manager
What is the formal declaration by a DAA that an information system (IS) is approved to operate in a particular security mode at an acceptable level of risk?
Accreditation
Certification and accreditation (C&A) of information systems that process Top Secret Sensitive Compartmented Information will comply with requirements of what?
Director of Central Intelligence Directive
Which type of threats describes common hacker tools and techniques used in a non-sophisticated manner?
First Generation
Who is the official with authority to formally assume responsibility for operating a system at an acceptable level of risk?
Designated Approving Authority
What is an information system (IS) assessed occurrence having actual or potentially adverse effects on an IS?
Incident
Who is the individual responsible to the IAM for ensuring the appropriate operational IA posture is maintained for a DOD information system or organization?
Information Assurance Officer
Which INFOCON level has the further increase in CND force readiness but less than maximum CND force readiness?
Charlie
What are operations to disrupt, deny, degrade or destroy information resident in computers and networks themselves?
Computer Network Attack
What is a collection of computing environments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security?
Enclave
What provides the assurance the information is not disclosed to unathorized entities or processes?
Confidentiality
What is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?
Audit Trail
What is a security measure designed to establish the validity of a transmission, message or originator, or as a means of verifying an individual's authorization to access specific categories of information?
Authentication
Which type of threats described state-sponsored computer network attack or espionage?
Third Generation
Which INFOCON level has increased intelligence watches and strengthened security measures of DOD information systems and networks?
Alpha
What is a type of incident resulting from any action or series of actions that prevents any part of an information system (IS) from functioning?
Distributed Denial of Service
What is a weakness in an information system, system security procedures, internal control or implementation that could be exploited?
Vulnerability
What consists of actions and operations to defend computer systems and networks from unauthorized activities that degrade mission performance and adversely impact survivability?
Computer Network Defense
What is system designed to defend against unauthorized access to or from a private network?
Firewall
What is the unauthorized act of bypassing the security mechanism of a system?
Intrusion
What is a program recorded in permanent of semi-permanent computer memory?
Firmware
What physical and cyber-based systems are essential to the minimum operations of the economy and government?
Critical Infrastructures
Which instruction states all DOD information systems and networks will be certified and accredited IAW with the DOD policy and guidance, currently the DOD Information Technology Security Certification and Accreditation Process (DITSCAP)
DOD Instruction 5200.40
What are automated methods of authenticating or verifying an individual based upon a physical or behaavioral characteristic?
Biometrics
What are the measures that protect and defend information and information system by ensuring availability integrity, authentication, confidentiality and non-repudiation?
Information Assurance
What is process of tracing information system (IS) activities to a responsible source know as?
Accountability
What is an organizational, procedural and technological construct for ensuring information superiority and enabling speed of command for the war-fighter?
NETOPS