Block 2 - Unit 6 Flashcards
______________________ attacks occur when more requests are sent to a machine (host) than it can handle
Denial of Service - DoS
______________________ attacks allow access to some resources that your machine should not provide to the attacker
Unauthorized access
Executing commands illicitly occurs when a(n) ___________ and ____________ person executes commands on a server
Unknown and untrusted
The two types of destructive behavior are ______ _______ and _______ ___________
Data diddling and Data destruction
The destructive behavior where the attacker changes entries in records is known as _______ __________
Data diddling
The destructive behavior where the attacker deletes files is known as _______ _________
Data destruction
Securing the mechanisms of the internet include _______________, ____________ and ________________
- Securing the protocols
- Improving Internet routing
- Improving management
Which mechanism’s goal for securing the internet ensures the reliability and security of three key protocols?
Securing the protocols
Which mechanism’s goal for securing the internet promotes increased use of address verification and out-of-band management
Improving Internet routing
What benefit is gained by improving address verification?
The source of a DoS attack could be determined
Which vulnerability preventive measure incorporates reducing the number of software vulnerabilities?
Reduce and remediate software vulnerabilities
The identity management objective that alerts the recipient of unauthorized modification to cyber information is called __________ ____________
Data integrity
What goal of identity management protects data from unauthorized review?
Confidentiality
What goal of identity management verifies you are who you say you are?
Authentication and Identification
How does the Air Force meet the goals of identity management?
DoD Public Key Infrastructure - PKI and Common Access Card - CAC