6A Flashcards

1
Q

Cybersecurity experts estimate that ___% of cyber-attacks could be defeated by implementing basic cyber hygiene and sharing best practices, according to the DoD’s principal cyber advisor.

A

90%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ ___ refers to the practices and steps that maintain system health and improve online security.

A

Cyber hygiene

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

___ monitor data packets passing through them, and either allow or
disallow network traffic through to the internal network.

A

Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Typically, firewalls are managed by an organization’s network ____.

A

administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An organization’s administrators should enforce standardized antivirus software installation across the network. For antivirus software to be effective, updated ___ ___ should be regularly pushed
out to users to protect their systems.

A

virus definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Antivirus software should regularly perform ___ ___ to ensure the system does not contain any malicious software. Users should allow these scans to happen and not interfere with them

A

security scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Administrators should scan all the devices and applications on the network from a central point on a ___ ___, and remotely patch and deactivate as necessary.

A

regular basis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On the Air Force network most users will typically use their common access card (CAC) paired with a PIN. However, many systems and websites require the use of usernames and passwords. In such cases, you should create and maintain ___ and ___ passwords to protect your accounts.

A

long and complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Industry recommendation is for passwords to have the following:

A
  • Minimum 18 characters in length. Longer is better.
  • Include numbers, symbols, capital letters and lower-case letters. A mix of characters is stronger.
  • Don’t use a word that would be in a dictionary. These are easy to crack.
  • Don’t rely on obvious substitutions. Replacing a single letter in a dictionary word with a number is obvious and easy to crack.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All of that said, it may be difficult for someone to remember a password of random characters like “3o(t&gSp&3hZ4#t97!.” This is a strong password, but if you must save it to a document or write it
down…?

A

it is not secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Additionally, it is important to not use the ___ ___ for multiple services.

A

same password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Again, personal password-management software is useful for handling the legwork of password creation and use. These secure wallets are ___ and ___ by a single master password.

A

encrypted and protected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software patches, including operating system updates, are often issued to address security problems. Enable automatic software updates to make sure your software is kept up to date. Typically, ___ ___ are required on Windows OS machines. Restart your device regularly to apply the updates.

A

hardware resets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Consider periodically backing up your important data. This data should be stored offline, meaning on a storage device that can be detached from your computer. On DoD computers, however, removable storage is typically not permitted. In these cases, back up your data in multiple locations, such as ___ ___ and shared network drives.

A

cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Yes, ___ ___ can be long and complex, but they tell you how the sites maintain accuracy, access, security, and control of the personal information they collect; how the site uses the information,
and whether information is provided to third parties.

A

privacy policies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Before you dispose of a computer, get rid of all the personal information stored on it. Use a __ __ __ to overwrite the entire hard drive.

A

wipe utility program

17
Q

Before you dispose of a mobile device, check your owner’s manual, the service provider’s website, or the device manufacturer’s website for information on how to delete information permanently, and how
to save or transfer information to a new device. Remove the memory or ____ card from a mobile device.

A

subscriber identity module (SIM)