• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/59

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

59 Cards in this Set

  • Front
  • Back

Software is often divided into two categories:

_________and ________ software.

system and application

The legal right granted to an author or inventor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work

Copyright

Contracts between the software publisher and the user that defines and limits the software use

License Agreements

This allows the purchasing organization to use multiple copies of a specific COTS software program, usually up to a specified number

Enterprise License

Agreements such as contracts or blanket purchase agreements

Enterprise Software Agreement (ESA)

It is incumbent on the United States to ensure its own practices as a purchaser and user of computer software are _______ ________.

beyond reproach

Unauthorized copying or distribution of copyrighted software

Software piracy!

Using subscription licensed software past the expiration date

Subscription Licensing piracy

Where one attempts to copy the product


and packaging so that it looks like an original

Counterfeiting

A small piece of software designed to fix problems or to update a computer program and/or its supporting data

Software patch

Used to fix bugs, replace graphics and improve usability or performance of computer.

Software patch

The primary method of fixing security vulnerabilities in software

Security patch

Currently Microsoft® releases their security patches _____ __ ______.

once a month.

Microsoft® refers to general bug fixes that replace current code with revised code to fix one thing in particular as a ______, and refers to fixes for security problems as ______.


Fix (hot-fix); patches

The means by which Windows product updates are distributed.

Service releases

Service packs are _______ -- each new service pack contains all the fixes in previous Service packs.

Cumulative

Computer programs that attempt to identify, neutralize or eliminate malicious software

Anti-virus software programs

Air Force defines ______ _____ as hardware, software or firmware that is intentionally introduced into an information system for an unauthorized purpose (e.g., virus).

Malicious logic

Policies and procedures of e-mail are outlined in


__________, User Responsibilities and Guidance for Information Systems.

AFMAN 33-152

Communications determined necessary in the interest of the Federal Government

Official Use

System-generated email address assigned to Air Force members for the duration of their Air Force career.

E4L (Email for Life)

A _____ ______ _____ is an Outlook data file that stores your messages and other items on your computer.



Not subject to mailbox ____ ____.

Personal Folders file (.pst); size limits

The Air Force maintains and supports two types of Web pages and sites: ______ and _______.

Public Web Pages/Sites; Private Web Pages/Sites (.mil and .gov)

Includes a combination of hardware, software, policies, and procedures and ability to authenticate and protect certificates and digitally sign electronic mail and documents.

Public Key Infrastructure (PKI)

Digital signatures are as ______ ______ as handwritten signatures

Legally binding

The Department of Defense (DOD) PKI has two basic components: _______ ________ and ______ _______.

certificate management and user registration

Credit card-sized ID card that contains an integrated circuit chip, a magnetic strip, bar code, and photo.

Common Access Card (CAC)

The ______ ______ ______ is where the certificates/ keys reside inside a CAC.

integrated circuit chip

The _____ is used to digitally sign e-mail, travel orders, travel vouchers and other documents, and establish secure web-based sessions. Not just your ID.

CAC

The goal of all ___ ____ ____ is to ensure lost data, no matter how it got lost, can be recovered _____, efficiently, and as ______ as possible

Data backup jobs; quickly; completely

A way to manage your disk drives so that you can create one logical drive from two or more physical drives.

RAID

When using ____ ____ __, data is stored simultaneously to both physical drives being used.




This method is called “______” and it boosts performance.

RAID Level 0; "striping"

RAID Level 1(RAID 1) is called “______”.

"Mirroring"

All data saved to one drive is reflected on the other giving the system a built in back up.

"Mirroring"

Four separate drives are used combining mirror and striping. This allows for much more reliability and is suitable for both data and program drives

RAID Level 0+1(RAID 10)

Three or more drives are needed to implement this version of RAID




The biggest advantage to this RAID level: the hard drives become "____" ______.

RAID Level 5 (RAID 5); "hot" swappable

Another name for what you put your backed-up


data on.

Media

The choice of media is based on three things: ____, ____, and ____.

Size, cost, and speed

Most backups rely on _____ or _____ _____ to


determine what files are supposed to be backed up.

Markers or archive flags

This backup type backs up all the selected files and folders.

Full or Normal Backup

Backup type where only selected files and folders that have changed (have the archive flag set) are backed up.

Differential Backup

Backup type where only backup selected files and folders that have the archive flag set and then clears the archive flag.

Incremental Backup

Backup type where all selected files and folders that changed during the day are back-up.

Daily Backup

A change applied to an asset to correct weakness described by a vulnerability.

Security patch

Primary method of fixing security vulnerabilities in software.

Security patch

What is the responsibility of the 83d Network Operations Squadrons, commonly known as INOSC East and INOSC West?

Updating antivirus servers

True/False




The Air Force does not use automatic update features.

True




The updates must first be tested to ensure they will not "break" our workstations.

________ is defined as a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a _____ _____ or a violation of the system's security policy.

Vulnerability; Security breach

_____ _____ are composed of routine changes, minor bug fixes, enhancements, and sometimes, new applications.

Service packs

Policies and procedures of E-mail are outlined in __________, User Responsibilities and Guidance for Information Systems

AFMAN 33-152

_________ ________ encompasses a set of capabilities that includes usernames/passwords, PKI, CAC, and biometrics.

Identity Management

The most commonly-used method to identify and authenticate a user's identity.

Username/password

This Air Force document governs Computer Security, specifically password creation guidance.

AFMAN 33-282

What are the two basic components of PKI?

Certificate Management & User Registration

One of the key tools to maintain data on a workstation.

Data backup

It is good business practice to store backed-up data ______.

Offsite

_____ is another name for what you put your backed-up data on.

Media

What is the most common media type to store back-up data?

Tape.




It has decent speed and is reasonably priced.

Most back-ups rely on ______ or _____ ______ to determine what files are supposed to be backed-up.

Markers or archive flags