300 EIWS Series Flashcards
DEFINE IA
INFORMATION OPERATIONS THAT PROTECT AND DEFEND DATA AND INFORMATION SYSTEMS
DEFINE CERTIFICATION
THE EVALUATION OF THE TECHNICAL AND NON TECHNICAL SECURITY FEATURES OF AN INFORMATION SYSTEM.
DEFINE ACCREDITATION
IS THE OFFICIAL MANAGEMENT DECISION TO OPERATE AN INFORMATION SYSTEM IN A SPECIFIED ENVIRONMENT
DEFINE DAA (DESIGNATED ACCREDITING AUTHORITY)
THE OFFICIAL WHO ASSUMES FORMAL RESPONSIBILITY FOR OPERATING A SYSTEM AT AN ACCEPTABLE LEVEL OF RISK.
DEFINE SYSTEM SECURITY PLAN
SUBMITTED WITH THE SYSTEM SECURITY AUTHORIZATION AGREEMENT
DEFINE SYSTEM SECURITY AUTHORIZATION AGREEMENT
DESCRIBES THE PLANNED SECURITY TASKS REQUIRED TO MEET SYSTEM OR NETWORK SECURITY REQUIREMENTS
DEFINE ATO (AUTHORITY TO OPERATE)
GRANTED AFTER SUCCESSFUL CERTIFICATION AND ACCREDITATION OR TO PERMIT A MAJOR CONVERSION OF A SYSTEM. GOOD FOR 3 YEARS.
DEFINE IATO
INTERIM APPROVAL TO OPERATE - CAN BE GRANTED FOR UP TO 180 DAYS
DEFINE CONFIGURATION MANAGEMENT
ACCOUNTS FOR ALL CHANGES TO A SITE OR INFORMATION SYSTEM DURING ITS DESIGN, DEVELOPMENT AND OPERATION CYCLE
DISCUSS SECURITY PROCEDURES INVOLVED WHEN PERFORMING CROSS DOMAIN TRANSFERS
REVIEW THE SECURITY ATTRIBUTES OF EACH SYSTEM TO DETERMINE ADDITIONAL SECURITY REQUIREMENTS TO BE IMPLEMENTED. DOCUMENT THE REQUIREMENTS AS PART OF THE ACCREDITATION.
DISCUSS RISK MANAGEMENT
ALLOWS IT MANAGERS TO BALANCE THE COST OF PROTECTIVE MEASURES WHILE ACHIEVING GAINS IN MISSON CAPABILITY
NAME THE FIVE ATTRIBUTES OF IA
CONFIDENTIALITY AUTHENTICATION AVAILABILITY NON REPUDIATION INTEGRITY
WHAT IS CONFIDENTIALITY
ASSURANCE THAT INFO IS NOT DISCLOSED TO UNAUTHORIZED PERSONS, PROCESSES OR DEVICES.
WHAT IS INTEGRITY
ASSURANCE THAT INFORMATION IS NOT MODIFIED BY UNAUTHORIZED PARTIES IN AN UNAUTHORIZED MANNER.
WHAT IS AVAILABILITY
ASSURANCE OF TIMLEY, RELIABLE ACCESS TO DATA AND INFORMATION SYSTEMS BY AUTHORIZED USERS
WHAT IS NON-REPUDIATION
ASSURANCE THAT THE SENDER OF DATA IS PROVIDED WITH PROOF OF DELIVERY AND THE RECIPIENT IS PROVIDED WITH PROOF OF SENDERS IDENTITY.
WHAT IS AUTHENTICATION
ASSURANCE OF THE IDENTITY OF AN EMAIL MESSAGE SENDER OR RECEIVER.
LIST THE NINE CATEGORIES OF COMPUTER INCIDENTS
MALICIOUS LOGIC USER LEVEL INTRUSION ROOT LEVEL INTRUSION DENIAL OF SERVICE EXPLAINED ANOMALY RECONNAISSANCE UNSUCCESSFUL ACTIVITY ATTEMPT NON COMPLIANCE ACTIVITY INVESTIGATING
EXPLAIN THE DOD WORLD WIDE WEB SECURITY POLICY
ALL WEBSITES MUST BE REGISTERED THROUGH THE NAVY WEB SITE REGISTRATION SYSTEM.
DEFINE IAVA
INFORMATION ASSURANCE VULNERABILITY ALERT
ADDRESSES SEVERE NETWORK VULNERABILITIES THAT POSE IMMEDIATE AND SEVERE THREATS TO DOD SYSTEMS
DEFINE IAVB
INFORMATION ASSURANCE VULNERABILITY BULLETIN - ADDRESSES NEW VULNERABILITIES THAT DO NOT POSE AN IMMEDIATE RISK TO DOD SYSTEMS
DEFINE IAVT
INFORMATION ASSURANCE VULNERABILITY TECHNOLOGY ADVISORY - VULNERABILITIES PRESENTED IN A TECHNICAL ADVISORY POSE A LOW RISK TO DOD SYSTEMS AND ACTION IS RECOMMENDED BUT NOT REQUIRED.
DEFINE CTO
COMPUTER TASKING ORDER - CHANGE TO A POLICY OF INFORMATION SYSTEMS
DEFINE NTD (NAVY TELECOMMUNICATION DIRECTIVE)
A DIRECTIVE UPDATING POLICY AND GUIDANCE ON A NETWORK
DEFINE SERVICE PACK
A COLLECTION OF UPDATES, FIXES OR ENHANCEMENTS TO A SOFTWARE PROGRAM DELIVERED IN THE FORM OF A SINGLE INSTALLABLE PACKAGE
DEFINE VULNERABILITY ASSESSMENT
EXAMINATION OF AN INFORMATION SYSTEM OR PRODUCT TO DETERMINE THE EFFICIENCY OF SECURITY MEASURES.
STATE THE DUTIES OF AN IAM
INFORMATION ASSURANCE MANAGER
OVERSEAS ALL IAO’S, ENSURES SECURITY INSTRUCTIONS, GUIDANCE AND SOPS ARE MAINTAINED AND IMPLEMENTED. OVERSEAS ALL IAVA’S, SECURITY MEASURES, EVALUATIONS, AND ACCREDITATION
DISA
DEFENSE INFORMATION SYSTEM AGENCY -
PROVIDES COMMAND AND CONTROL CAPABILITIES
NCDOC
NETWORK COMMUNICATIONS DEFENSE OPERATIONS COMMAND -
OVERSEAS AND MONITORS NETWORKS
TNOSC
THEATER NETWORK OPERATIONS AND SECURITY CENTER - SINGLE POC FOR REGIONAL CUSTOMERS
DEFINE AND STATE THE PURPOSE OF FLTNOC
THEATER NETWORK OPERATIONS AND SECURITY CENTER - SINGLE POC FOR REGIONAL CUSTOMERS
UARNOC
UNIFIED ATLANTIC REGIONAL NETWORK OPERATIONS CENTER NORFOLK VA
PRNOC
PACIFIC REGIONAL NETWORK OPERATIONS CENTER
HAWAII
ECRNOC
EUROPEAN CENTRAL REGIONAL NETWORK OPERATIONS CENTER - NAPLES
IORNOC
INDIAN OCEAN REGIONAL NETWORK OPERATIONS CENTER - BAHRAIN
EXPLAIN THE THREE THINGS THAT MUST BE MET TO RECEIVE IP SERVICES FROM FLTNOC
MUST HAVE INTERIM AUTHORITY TO OPERATE OR AUTHORITY TO OPERATE
SUBMIT AN IP SERVICE REQUEST MESSAGE
SUBMIT A VAILD SATELLITE ACCESS AUTHORIZATION
DEFINE N2N
NOC TO NOC CUTOVER
STATE THE CIB THAT PROVIDES GUIDANCE FOR IP SERVICE REQUESTS FOR NIPRNET/SIPRNET
CIB 3A
STATE THE CIB THAT PROVIDES GUIDANCE FOR IP SERVICE REQUESTS FOR
SI SERVICES
GLOBAL CIB 20H
NAME THE CONTROLLING AUTHORITY FOR NAVY FIREWALL POLICIES
DON CHIEF OF INFORMATION OFFICER
NAME THE INSTRUCTION THAT COVERS ALL COMPUTER AND NETWORK INCIDENT RESPONSES
OPNAVINST 2201.2
STATE THE LOCATION OF THE SINOC’S
SENSITIVE INFORMATION NETWORK OPERATIONS CENTER - NORFOLK AND HAWAII
STATE THE PURPOSE OF MOSS
MICROSOFT OFFICE SHARE POINT SERVER
A SERVER THAT RUNS SHAREPOINT
STATE THE PURPOSE OF CAS
COLLABORATION AT SEA -
REAL TIME BATTLE GROUP INTRANET
STATE THE PURPOSE OF JCA
JOINT SERVICE IMAGERY PROCESSING SYSTEM (JSIPS-N) CONCENTRATOR ARCHITECTURE (JCA)
FAST AND EFFICIENT DELIVERY OF INTEL IMAGERY /SECRET/ GENSER
DEFINE HOST/CLIENT
ANY NETWORK DEVICE WITH AN IP ADDRESS
DEFINE APPLICATION SERVER
CENTRAL POINT WHERE APPLICATIONS ARE HELD
DEFINE HUB
A DEVICE THAT CONNECTS ALL THE SEGMENTS OF THE NETWORK TOGETHER IN A STAR TOPOLOGY
DEFINE ROUTER
USES IP ADDRESS
DEFINE WAP
WIRELESS ACCESS POINT
ALLOWS MOBILE USERS TO CONNECT TO A WIRED NETWORK WIRELESSLY VIA RADIO FREQUENCY TECHNOLOGIES
DEFINE SWITCH
USES MAC ADDRESS
DEFINE PROXY SERVER
USED TO FILTER TRAFFIC AND CACHE WEBSITES
DEFINE FIREWALL
A COMBINATION OF HARDWARE AND SOFTWARE THAT PROTECTS A NETWORK FROM ATTACK BY HACKERS.
DEFINE VPN CONCENTRATOR
DEVICE THAT CREATES REMOTE ACCESS FOR VIRTUAL PRIVATE NETWORKS.
DEFINE REPEATER
GIVES YOU AN EXTENSION TO YOUR ETHERNET SEGMENT.
DEFINE THE DISTRIBUTION LAYER OF ROUTING
INCLUDES LAN BASED ROUTERS AND LAYER 3 SWITCHES. ENSURES PACKETS ARE ROUTED BETWEEN SUBNETS AND VLANS.
DEFINE THE CORE LAYER OF ROUTING
INCLUDES HIGH END SIWTCHES AND HIGH SPEED CABLES SUCH AS FIBER. CONCERNED WITH SPEED AND ENSURES RELIABLE DELIVERY OF PACKETS.
DEFINE TOPOLOGY
SHOWS HOW DATA NAVIGATES THROUGH ITS LAYOUT.
DEFINE BUS TOPOLOGY
TWO DISTINCT AND TERMINATED ENDS WITH EACH OF ITS COMPUTERS CONNECTED TO ONE UNBROKEN CABLE
DEFINE STAR TOPOLOGY
COMPUTERS ARE CONNECTED TO A CENTRAL POINT WITH THEIR OWN OR INDIVIDUAL WIRELESS CONNECTION.
DEFINE RING TOPOLOGY
COMPUTERS CONNECT DIRECTLY TO OTHER COMPUTERS WITHIN THE SAME NETWORK
DEFINE MESH TOPOLOGY
A PATH FROM EVERY MACHINE TO EVERY OTHER ON IN THE NETWORK
DEFINE LAN
LOCAL AREA NETWORK
COVERS A CERTAIN GEOGRAPHICAL LOCATION (EX: AN OFFICE BUILDING)