205 Information and Technology Flashcards
Identify the term IDS and explain its purpose
Intrusion Detection System: software that automates the intrusion detection process i.e. cameras
Identify the term IPS and explain its purpose
Intrusion Prevention System: software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents
What is the purpose of eRequestor?
Self-help web-based tool designed to give customers the ability to submit and receive feedback on their IT issues.
Define PKI and its importance
Public Key Infrastructure - verifies that users are, in fact, who they say they are. Provides confirmation that documents have not been tampered with or altered.
What does “product” refer to when filling out a request for systems?
Refers to the account that is being requested.
What is required to terminate systems access when a civilian, military, or government contractor departs DIA?
Systems Access will terminate all necessary accounts once the employee’s status is terminated in eZHR
How are data spills and IA incidents reported?
To the Information Assurance office by phone/email.
What are Trusted Agents?
Representative who conducts SCI Certification Test and Evaluation in accordance with regulation.
What training is required by DIA for information assurance/computer users?
- IA Awareness Training for General Users
- DoD IA Awareness
- Federal Information Systems Security Awareness
What is CDS?
Cross Domain Services or Cross Domain Solutions - refers to the *exchange of data or info between domains of different classification.
Define “data spills”
Classified data being transmitted or transferred to a lower classification system or Malicious Code Activity
Define CNA
Computer Network Attack: Operations to disrupt, deny, degrade, or destroy information resident on computers and computer networks or the computers and networks themselves.
Define CND
Computer Network Defense: Actions taken to protect, monitor, analyze, detect and respond to unauthorized activity within DoD information systems and computer networks.
State the purpose of the DoD IAVA process
IAVA: Information Assurance Vulnerability Attack. Supports the protection of DoD systems against known or identified vulnerabilities.
State the function(s) of the CIO
CIO: Chief Information Officer. Leads the technical efforts of a global team of IT professionals responsible for the IT assets, resources, capabilities, and servies supporting IC customers worldwide.