7.4.2.1.1. Insider Threats Flashcards

1
Q

What is a server-based, web-accessible program part of the Microsoft Office suite?

A

SharePoint

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How many distinct EIM capabilities does SharePoint offer?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EIM

A

Enterprise Information Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which SharePoint workflow requests agreement from all involved parties?

A

Approval Workflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many workflow capabilities are available to you on a SharePoint Server?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a insider/ internal threat?

A

Threat originating inside a company, government agency, or institution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What refers to measures and controls taken to deny unauthorized persons information derived from info systems of the US Government related to national security, and to ensure the authenticity of such info systems?

A

COMPUSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An unauthorized user attempts to gain as much info about the network as possible before launching other more serious types of attacks.

A

Reconnaissance Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An individual attempts to gain unauthorized access of computer resources

A

Access Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is the unauthorized transfer of data outside an organization and is a significant concern with data leakage.

A

Data Theft / Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anyone who has legitimate access to an organization’s internal resources, but exploits this access for personal gain or damage against the organization.

A

Malicious Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Program that replicates by attaching itself to other programs.

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malicious programs that are carried to your computer by email.

A

Email-Borne Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computer software use to prevent, detect, and remove malicious computer viruses

A

Antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one email virus protection?

Scans email transactions for viruses before forwarding to an SMTP Servers for delivery.

A

Symantec Mail Security for SMTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some Virus Indicators?

A
  • The computer runs more slowly.
  • The computer stops responding or locks up often.
  • The computer crashes or restarts every few minutes.
  • Applications on the computer don’t work correctly.
  • Disks or disk drives are inaccessible.
  • Unable to print correctly.
  • Unusual error messages.
  • Menus and dialog boxes are distorted.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some Virus Prevention Methods?

A
  • Ensure all software is included in C&A
  • Do not use trial or demo software
  • Do not allow use of foreign country software not meeting restrictions laid out by Buy American Act and Trade Agreements Act
  • Consult contracting prior to purchase
  • Only use antivirus tools and signature files obtained from AFNOC/NSD web site
  • Ensure only one type antivirus installed at a time
  • Don’t use private media in Gov system
  • Scan removable and fixed media
  • report all attacks
18
Q

AF Threat Advisory Roles

A

Provides development and employment support for network sensors and network defense weapons systems

  • Provides computer and network threat awareness, analysis, and intelligence support
  • Reports to AFNOC and NOSCs all backdoors and unauthorized connections to AF networks discovered during course of Operations
19
Q

What cyberspace weapon system ensures unfettered access, mission assurance and joint warfighter use of networks and information processing systems to accomplish worldwide operations?

A

AF Cyber Command and Control Mission System

20
Q

What is a program?

A

Set of instructions that are developed and written to perform a specific set of tasks on a computer system

21
Q

what is low-level languages?

A

code that is easily and readily executed by the computer without and assistance from any other program

22
Q

What is High-level languages?

A

code must be executed through programs such as interpreters or compilers which translate the code in order for the computing machine to understand and process the inputs from the user.

23
Q

An interpretive, interactive, and functional array programming language

A

APL

24
Q

Is a combination of high level and low level languages that supports procedural, generic, object-oriented programming and data abstraction

A

C++

25
Q

A multi-paradigm programming language that supports imperative, generic, and object-oriented programming

A

C Sharp

26
Q

High level interpreted programming language that support dynamic programming providing text processing facilities

A

Perl

27
Q

These programs are implemented by utilizing an interpreter to execute the source code directly by translating the source code into an intermediate representation

A

Interpreted Programming Language

28
Q

This language is used in desktop publishing, known as a page description language

A

PostScript

29
Q

This is an object-oriented language developed by Sun Microsystem and maybe utilized on any virtual machine

A

JAVA

30
Q

Microsoft’s Command line shell and a scripting language. It works in collaboration with Microsoft .NET Framework by means of executables

A

Windows PowerShell

31
Q

These programs will require the use of a compiler for execution of code. translates source code into machine code and implement the instructions of the programming language

A

Compiled Programming Language

32
Q

Draws pictures on the screen with which you interact using a mouse or similar device

A

Graphical User Interface (GUI)

33
Q

Explain the use of the binary digital numbering system and practice conversions with reference to the following term: Binary Numbering System (Binary Notation)

A

Mathematical computation based on powers of two. The binary numbering system is composed of two digits (1 and 0). Binary notation operations in Base 2. Each digit in binary number represents two bits.

34
Q

Mathematical computation based on powers of two. The binary numbering system is composed of two digits (1 and 0). Binary notation operations in Base 2. Each digit in binary number represents two bits.

A

Mathematical computation based on powers of 16. The hexadecimal numbering system is composed of 16 units (decimal numbers 0-9 and letters A-F for decimal numbers 10-15). Hexadecimal notation operates in Base 16. Each digit in a hexadecimal number represents four bits.

35
Q

hexadecimal

A

Hexadecimal (or hex) is a base 16 system used to simplify how binary is represented. A hex digit can be any of the following 16 digits: 0 1 2 3 4 5 6 7 8 9 A B C D E F.
Each hex digit reflects a 4-bit binary sequence.

36
Q

hex to binary

A

1-convert hex to denary
2-convert denary to binary

e.g : 4 D
/ \
4 13
/ \
0100 1101
37
Q

binary to hex

A

1- convert binary to denary
2- convert denary to hex

e.g : 1011 1011
/ \
11 11
/ \
B B
38
Q

binary-hex conversions

A
binary hexadecimal
0000 0
0001 1
0010 2
0011 3
0100 4
0101 5
0110 6
0111 7
1000 8
1001 9
01000001 A
01000010 B
01000011  C
01000100  D
01000101  E
01000110 F
39
Q

What is the process called that examines a system to identify, model, and document the different activities that transforms data, stores data, external entities that send data into the system or receive data from a system, and the routes data has taken?

A

Data Flow

40
Q

_______ is a sequence of events (input, processing, output, storage) involved in the data flow process.

A

Information Processing Cycle