• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/49

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

49 Cards in this Set

  • Front
  • Back
what is a measure used to verify the eligibility of a subject and the ability of the subject to access certain info?
authentication
what are 3 primary ways to authenticate ones self?
something you know, are, have.
knowledge based identification and authentication methods require the user to provide something you?
know
the AF requires a network password to be atleast how many characters long?
9
what regulation covers remanence security?
AFSSI 8580
storage media that retains data after power is removed is considered?
sensitive
which standard form is used to annotate storage media has been sanitized?
711
who can declassify storage media that has been sanitized?
Infomation Owner
what is the process of physically damaging the media to render is unusable in a computer and render the data on the media irretrievable by any known exploitation methods?
destroying
what is the process of erasing magnetic media by reducing the magnetic flux to virtual zero by applying a reverse magnetizing field?
Degaussing
what is the preferred method of sanitizing magnetic media?
Degaussing
what is a comprehensive evaluation and validation of an air force info system to establish the degree to which it complies with assigned info assurance controls based on standardized procedures?
Certification
what is a formal declaration by a designated approving official (DAA) that an info system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk?
Accredidation
what is the DOD process for certifying and accrediting info systems to operate on the global info grid (GIG)?
Department of Defense Information Assurance Certification and Accreditation Process (DIACAP)
what documentation is required to permanently connect to the global info grid system?
Authorization to Operate (ATO)
what doc signifies that a system is not allowed to connect to the global info grid?
Denial of Authorization to Operate (DATO)
what process, along with AFI 33-210, air force certification and accredidation (C&A) program (AFCAP), provides the basic framework of the certification and accredidation?
Information Technology (IT) lean reengineering
what do you call the consolidated list of requirements that a program office must adhere to when fielding a system?
department of defense info technology system cert and accreditation process (DITSCAP)
what is the database of record for registering all systems and applications?
DITSCAP
what is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security policy?
Enclave
how many non-secure internet protocol router network (NIPRNET) gateways does the af possess?
16
which agency must approve all info protection tools prior to their use?
HQ USAF
what device is placed outside the boundary protection mechanism to monitor all attempted attacks?
Intrusion Detection System (IDS)
what are examples of network attacks that bypass the firewall?
Tunneling and application based attacks
what is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?
Tunneling
a base web server that inferfaces with the public must be placed in what area of a base network?
DMZ
what is the simplest and least expensive way to stop an inappropriate netowork address?
packet filtering
what type of firewall consists of a screening router and a set of rules that accept or reject a message based on information int he messages header (a packet): the source address, the destination, and the port?
Packet Filtering
what type of firewall is used to separate secure sites, networks, or network segments from less secure areas?
Bastion Host
what type of firewall generates audit trails of all network related activity for monitoring and intrusion detection purposes?
Bastion Host
what network dvice performs regorous examinations of systems to identify weaknesses that might allow security violations?
Vulnerability Scanners
what action represents one of the greatest vulnerabilities to internal networks?
network connected computer systems with modems that make calls to accept calls from the public switched network
what do you call a current and percieved capability, intention, or attack, directed to cause denial of service?
threat
an ainformation system on your network that is not to require the use of a common access card or password would be considered a?
vulnerability
a program that replicates by attaching itself to a program is a?
virus
what type of malicious logic can form large networks that can be used to launch a varitety of attacks without an info systems owners knowledge?
bot
what type of malicious logic can become active on an information system without the need to infect a file?
worm
what is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers?
Public Key Infrastructure (PKI)
what is an electronic document that officially links together a user's identity with his public key?
PKI certificate
what is a file that is kept with you and will allow you to decrypt files encrypted specifically for you using your openly available encryption code?
private key
what is an electronic document that officially links together a users identity with his public key?
PKI certificate
Which component of the PKI responsible for establishing, authenticating, maintaining, and revoking certificates?
certificate authority
the 2 ways key establishment can occur are key?
transfer and aggreement
which public key algorithm is exclusively a key establishment protocol?
diffie and hellman
what is the primary unclassified PKI token for individual PKI keys and certificates in the air force?
CAC
which team provides a communication link between forces securing the area and setting up support facilities?
initial communications support teams
sustained communications support becomes a part of the deployment if it exceeds how many days?
30 days
who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contigency?
sustained communications support teams
what program is known as a state of the are ground to ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base?
Theater Deployable Communications (TDC)