107: Cyber Security Flashcards

1
Q

107.1a
Define IA

A

Information Assurance (IA)

measures that protect & defend information/information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

107.1b
Define DCO

A

Defense Cyberspace Operations (DCO)

operations intended to preserve the ability to utilize friendly cyberspace capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

107.1c
Define OCO

A

Offensive Cyberspace Operations (OCO)

operations intended to project power in and through cyberspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

107.2a
Define Certification

A

the authorization to operate Information Systems (IS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

107.2b
Define Accreditation

A

process in which certification of competency, authority, and credibility is presented

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

107.2c
Define DAA

A

Designated Approving Authority (DAA)

responsible for authorizing a system’s operation based on an acceptable risk posture

is now called Navy Authorizing Official (NOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

107.2d
Define System Security Plan

A

prepared formal document that describes the security controls in place or planned

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

107.2e
Define ATO

A

Authority To Operate (ATO)

official management decision to operate an Information System (IS)

may be issued for up to 3 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

107.2f
Define IATO

A

Interim Authority to Operate (IATO)

limited authorization to operate under specific terms and conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

107.2g
Define Configuration Management

A

management of all changes to an information system during its lifecycle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

107.3
Discuss the security procedures involved when performing cross-domain transfers

A
  • maintain life-cycle security management
  • appoint in writing individual(s) to oversee day-to-day security management & processes
  • report security incidents to the local Information Assurance Manager
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

107.4
Discuss risk management

A

the process that balances operational and economic costs of protective measures to achieve mission capability

effective risk management reduces risk assumed by all systems to an acceptable level for operational use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

107.5
Describe the 5 attributes of cybersecurity
a. Confidentiality
b. Integrity
c. Availability
d. Non-repudiation
e. Authentication

A

a. assurance of no unauthorized disclosure of information
b. protection against unauthorized modification or destruction of information
c. timely, reliable access to data and information systems for authorized users
d. proof of data delivery & proof of sender’s identity
e. assurance of user identity & established validity of a transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

107.6
List and define 9 categories of computer incidents

A

1- Root Level Intrusion: unauthorized privileged access
2- User Level Intrusion: unauthorized non-privileged access
3- Denial of Service: disrupts normal functionality
4- Malicious Logic: installation of software by adversaries with malicious intentions
5- Unsuccessful Activity Attempt: deliberate attempts to gain unauthorized access
6- Non-Compliance Activity: increased risk as a result of action/inaction of authorized users
7- Reconnaissance: information gathering to characterize DoD systems
8- Investigating: potentially malicious or anomalous activity deemed suspicious
9- Explained Anomaly: suspicious events that are later determined to be non-malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

107.7
Describe the DoN World Wide Web Security Policy

A
  • all DoN websites must have a clearly articulated purpose
  • may only contain unclassified material that is approved for public release
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

107.8a
Define IAVA

A

Information Assurance Vulnerability Alert (IAVA)

alert that addresses severe network vulnerabilities & corrective actions

17
Q

107.8b
Define IAVB

A

Information Assurance Vulnerability Bulletin (IAVB)

addresses new vulnerabilities that do not pose immediate risk

18
Q

107.8c
Define CTO

A

Communications Tasking Order (CTO)

promulgates mandatory changes in standing instructions on how communications are handled

19
Q

107.8d
Define NTD

A

Navy Telecommunications Directive (NTD)

order or direction about a certain IT function that needs to be complied with

20
Q
A