Block 2 Unit 4 Flashcards
__ attcks occur when more requests are sent to a machine(host) than it can handle
DOS
____________ attacks allow access to some resources that your machine should not provide to the attacker
Unauthorized access
Executing commands illicitly occurs when a ___ and _________ person executes commands on a server.
unknown, untrusted
The two types of destructive behavior are ______ and ____________.
data diddling
data destruction
The destructive behavior where the attacker changes entries in records is known as?
Data Diddling
The destructive behavior where the attacker deletes file is known as?
Data Destruction
securing the mechanism of the internet include?
securing the protocols, improving internet routing and improving management
Which mechanism’s of the internet ensures the reliability and security of three key protocols?
Secure the Protocols
Which mechanism’s goal for securing the internet promotes increased use of address verification and out-of- band management?
Improve internet routing
What benefit is gained by improving address verification?
Identify the source of DOS attacks
Which vulnerability preventive measure incorporates reducing the number of software vulnerabilities?
Reduce and remediate software vulnerabilities
The identity management objective that alerts the recipient of unauthorized modification to cyber info is called?
Data Integrity
What goal of identity management protects data from unauthorized review?
Confidentiality
What goal of identity management verifies you are who you say you are?
Authentication and ID
How does the Air Force meet the goals of identity management?
DOD PKI and CAC