7A Flashcards

1
Q

___ ___ compliance ensures appropriate implementation of measures to protect all Air Force information system resources and information

A

Computer Security (COMPUSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The focus of COMPUSEC is on end-point security and ports, protocols, and services management ___ ___ ___.

A

within the AF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The COMPUSEC objective is to employ countermeasures designed for the protection of __, ___ and ___ of United States government information processed by Air Force ISs.

A

confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COMPUSEC includes all measures to ____ ISs and information against sabotage, tampering, denial of service, espionage, fraud, misappropriation, misuse, or release to unauthorized persons.

A

safeguard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Air Force Manual (AFMAN) ____, Computer Security (COMPUSEC) is the publication that implements the AF COMPUSEC program.

A

AFMAN 17-1301

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

COMPUSEC applies to __ __ ___ __ used to process, store, display, transmit, or protect AF information, regardless of classification or sensitivity, unless exempted through the risk management framework process.

A

all AF information technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

As an information technology professional, you work to achieve the fundamental goals of information security. Those fundamental goals are confidentiality, integrity, and availability— collectively termed
the __ ___ (not to be confused with the Central Intelligence Agency).

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

One of the goals of information security is to ensure _____ such that only authorized persons can gain access to information and are able to read the information.

A

confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which technologies keep information confidential?

A
  1. Access Control/Permissions
  2. Encryption
  3. Steganography
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following describes which technology that keeps information confidential?

Most network administrators secure information on the organization’s network by implementing permissions on the files and folders. This is known as building an access control list (ACL) on the files because the network administrator is controlling who can access the files. By setting permissions on the files and allowing only a specific group of users access to the files, you are helping to maintain confidentiality.

A

Access Control/Permissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The following describes which technology that keeps information confidential?

____ data puts the information in an unreadable format until an authorized person decrypts the data, which places it back in a readable format.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The following describes which technology that keeps information confidential?

___ is a method of hiding information, such as a text file, in a graphic file. The information is placed in the graphic file using a program, and a password is placed on the file. After sending the graphic to the intended receiver, the intended receiver would use the ___ application to read the information out of the file.

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Files can be encrypted at two levels—either encrypt the file in ___ or encrypt the file while it is in ____ from one location to another.

A

storage
transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The concept of ___ ___ (not to be confused with personal integrity, or ethics) is to ensure that when data is sent from a source to a destination, the information received at the destination has not been altered in transit. ___ ___ also means that if you store a file on a storage drive and open it later, you can be certain that the data has not been altered while in storage.

A

data integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What four things fall under integrity?

A
  1. Hashing
  2. Digital Signature
  3. Digital Certificate
  4. Nonrepudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following describes which integrity method?

To ensure data integrity when communicating over a network, the sending system runs the data through a mathematical algorithm, known as a ____ algorithm, which then generates an answer, known as the ____ value. This ____ value is then sent with the data. On the receiving end of the transmission, the destination system runs the data through the same mathematical algorithm to generate an answer (___ value). Once the destination system has its own calculated ___ value, it then compares that to the ___ value sent with the message—if they are the same, then it is assumed the data has not been altered.

A

Hashing

17
Q

The following describes which integrity method?

A ___ ___ is created on a message to prove the integrity of the sender of the message. Because the signature is created using a person’s private key and only that person has access to their private key, it proves the sender is who they say they are.

A

Digital Signature

18
Q

The following describes which integrity method?

A ___ ___ is an electronic file used to transport keys used to encrypt or digitally sign messages

A

Digital Certificate

19
Q

The following describes which integrity method?

___ is the concept of ensuring that someone cannot dispute that they sent a message or made a change, which adds to the integrity of the system. You can use digital signatures or auditing as a method to implement ___.

A

Nonrepudiation

20
Q

____, the third fundamental goal of information security in the CIA Triad, is the concept of ensuring that the information is available when the user wants it. This is an often-overlooked aspect of information security.

A

Availability

21
Q

What are the popular solutions used to help maintain availability?

A
  1. Permissions
  2. Backups
  3. Fault Tolerance
  4. Clustering
  5. Patching
22
Q

The following describes which solution to help maintain availability?

Implementing ____ on a resource is a way to ensure availability because if you limit who can delete the data, then chances are high it will still be available when needed.

A

Permissions

23
Q

The following describes which solution to help maintain availability?

Ensure you perform regular ___ of critical information so that if the data becomes corrupt or unavailable, you can restore it from ____.

A

Backups

24
Q

The following describes which solution to help maintain availability?

You can implement data redundancy solutions to ensure that if one of the hard drives fails, the other drives have a copy of the information. Having multiple drives work together in this way is known as RAID, or Redundant Array of Independent Disks. With RAID, if one of the drives fail, the other drives provide the missing data.

A

Fault Tolerance

25
Q

The following describes which solution to help maintain availability?

To ensure availability of services such as e-mail or database servers, you can use a high- availability solution such as ___. ___ allows you to have multiple servers acting as one unit so that if one server fails, the other server takes over the workload.

A

Clustering

26
Q

The following describes which solution to help maintain availability?

Keeping a system up to date by applying service packs and security hot fixes is known as ___. ____ a system helps reduce vulnerabilities in the system and reduces the chances of attack.

A

Patching

27
Q

Since computers are used so much for daily Air Force activities, they have presented new and pressing threats to security. Regardless of the threat or vulnerability, the Air Force COMPUSEC program
classifies these vulnerabilities as belonging to one of three categories:

A

unauthorized access, malicious logic and Fraud, Waste, and Abuse.

28
Q

The following describes which category of threat to security?

As the name implies, ___ ___ involves an unauthorized person gaining access to computer hardware, software, or the information stored and processed by a computer system.

A

unauthorized access

29
Q

The following describes which category of threat to security?

A second and more common threat to computer systems is ___ ___ (also known as malicious code), which includes computer viruses, spyware and steal-ware. ___ ___ is computer code (program) written with the intention of causing some form of problem for you and your computer system. These programs attempt to conceal themselves in your computer until a later time when they activate themselves and cause severe damage.

A

malicious logic

30
Q

The following describes which category of threat to security?

____ results from any intentional deception designed to unlawfully deprive the Air Force of something of value or to secure an individual a benefit, privilege, allowance, or consideration to which they are not entitled. Air Force computer resources frequently face this problem. It is your responsibility to safeguard all resources (not just computers) and prevent ___.

A

Fraud, Waste and Abuse

31
Q

Unauthorized access normally occurs in one of two ways: ____ (by a computer hacker) or ____ (where a person has gained physical access to the computer system and facility)

A

remotely
surreptitiously

32
Q

___ or ___ protection is the primary means of preventing unauthorized access to a computer system.

A

password or pin

33
Q

Writing your password down and hiding it beneath your desk calendar or sharing your password with another person is ___ ___.

A

strictly forbidden

34
Q

___ ___ ___ ___ is another way to protect computer systems from unauthorized access by applying physical security measures.

A

Secure Area Access Controls

35
Q

What are two examples of Fraud, Waste and Abuse?

A

Unauthorized Printing and Unauthorized Internet Use