• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/6

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

6 Cards in this Set

  • Front
  • Back

What is exempt from FOIA?

Exemption 1: Information that is classified to protect national security.




Exemption 2: Information related solely to the internal personnel rules and practices of an agency.




Exemption 3: Information that is prohibited from disclosure by another federal law.




Exemption 4: Information that concerns business trade secrets or other confidential commercial or financial information.




Exemption 9: Geological information on wells.




Exemption 8: Information that concerns the supervision of financial institutions.




Exemption 6: Information that, if disclosed, would invade another individual's personal privacy.

What are the goals of a table talk?

Demonstrate to management the ability of personnel to perform critical tasks, e.g. incident response




Evaluate the effectiveness of the plan and its implementation




Identify weaknesses or opportunities for improvement in process execution or design




Educate involved parties on critical details of the subject plan

What makes a good exercise?

Exercise multiple aspects of the subject plan




Require significant coordination and communication




Will be challenging, but not impossible

What is FOIA?

An Act to amend section 3 of the Administrative Procedure Act


This amendment was signed into law by President Lyndon B. Johnson, on July 4, 1966, and went into effect the following year.

FW policy use?

Identification of network applications deemed necessary




Identification of vulnerabilities associated with applications




•Cost-benefits analysis of methods for securing the applications




•Creation of applications traffic matrix showing protection method




•Creation of firewall ruleset based on applications traffic matrix




FWs–devices that control the flow of network traffic, e.g, by packet filtering

Intent of a fire wall russet matrix?

Creation of firewall ruleset based on applications traffic matrix