Chapter 19 2013 Flashcards

0
Q

Consist of measures and controls that ensure confidentiality, integrity, and availability of information systems assets including hardware, software, firmware, and information being processed, stored, and communicated.

A

COMPUSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What are the three core disciplines of information assurance

A

COMSEC, COMPUSEC, Emissions Security (EMSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Examples of malicious logic attacks

A

Virus, worm, botnet, Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the maximum quantity of PII information that can be stored on removal devices

A

500 or more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who must report lost or suspected lost removal media containing sensitive information to immediately

A

Local security manager or IA office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IT threat that is received via email with embedded scripts or false links to provide access for hacker to control the users computer or install malicious logic

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Measures and controls taken to deny unauthorized persons information derived from information systems of the government related to national security and to ensure the authenticity of such information systems

A

Communication security (COMSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the difference between transmission security and Emissions security

A

Transmission security falls under COMSEC and protects against exploitation by means of cryptoanalysis.
EMSEC prevents interception and analysis of compromising emanations from crypto equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Process of identifying, analyzing, and controlling critical information

A

Operation security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Five steps of OPSEC

A

ID critical info, Analyse threats, analyze Vulnerabilities, Assess risk, Apply measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the five basic characteristics of OPSEC indicators

A

Signatures, associations, profiles, contrasts, exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The characteristic of an indicator that makes it identifiable or causes it to stand out

A

Signatures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Relationship of an indicator to other information or activities

A

Associations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The sum of signatures and associations in an activities profile

A

Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Differences observed between an activity standard profile and it’s most recent or current actions

A

Contrasts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When or for how long an indicator is observed

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Classification, safeguarding, and sanctions are all components of what

A

Information security (INFOSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the three levels of classification

A

Top secret, secret, and confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who may classify information

A

Secretary defense, secretaries of military departments, officials specifically delegated authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Document which details the original classification decision

A

Security classification guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What four separate and parallel systems can bring about the declassification of information

A

Original classifier decides the time, automatically declassified on 25th anniversary unless actions are taken to keep classified, reviewed for declassification upon request, reviewed in a systematic manner for declassification

21
Q

Which level classified information can be sent through the Postal Service or other authorized delivery service as long as receipts are used

A

Secret

22
Q

Who grants, denies, revokes security clearance eligibility

A

AFCAF, Air Force Central Adjudication Facility

23
Q

Where are security clearance records kept and who can access them?

A

In JPAS and unit security manager

24
Q

What are the four steps in determining effects required of integrated defense program

A

Criticality of installation assets, analyzing threats, assessing vulnerabilities, make prudent ID desicions

25
Q

The line that delineates the surface area of a base for the purpose of facilitating coordination and deconflictin of operations between adjacent units, formations, or areas.

A

(BB) Base Boundry

26
Q

An Air Force unique concept to describe the area of concern around and airbase

A

(BSZ) base security zone

27
Q

What is the command-and-control center for ID operations during routine and emergency operations

A

(BDOC) battle defense operation center

28
Q

How many desired effects does a commander strive toward in risk management

A

Nine (ADDAWDDDR)

29
Q

Achieved through intelligence analysis

A

Anticipate

30
Q

Achieved through professional and persistent execution of security tactics, techniques, and procedures

A

Deter

31
Q

Achieved through a variety of screening processes and observation technologies

A

Detect

32
Q

Achieved through cognizance, readiness, and awareness of all Air Force personnel and an understanding of threat TTP

A

Assess

33
Q

Achieved through standardized and reliable communications among and between units and personnel

A

Warn

34
Q

Achieved through a multitude of force applications relevant to the threat

A

Defeat

35
Q

Achieved through deliberate layers of defensive applications designed to progressively weaken or hinder the enemies effort

A

Delay

36
Q

Achieved through the coordinated and synchronized force application of all airmen in a unified effort against the enemy

A

Defend

37
Q

Achieved through prudent logistics and consequence management planning

A

Recover

38
Q

Who plays a part in the intelligence fusion cell action group

A

Security forces staff function and subject matter experts from OSI

39
Q

What does the intelligence fusion cell action group do

A

Conduct intelligence preparation for the operational environment

40
Q

Critical assessment, threat and vulnerability assessment, risk assessment, risk tolerance, countermeasures, decisions and implementation are the seven steps of what

A

Integrated Defense risk management process

41
Q

What protection level applies to assets that our nuclear weapons in storage, matted to the delivery system, or in transit; designated command, control, communication facilities; and aircraft designated to transport the president

A

PL1

42
Q

Protection level of non-nuclear alert forces; designate space and launch systems; expensive, few in number, one-of-a-kind systems or facilities; and intelligence-gathering systems

A

PL2

43
Q

Protection level of resources that are non-alert resources that can be generated to alert status, such as F-16s; selected C3 facilities, systems, and equipment; and non-launch critical or non-unique space launch systems

A

PL3

44
Q

Protection level of facility storing category one, two, or three sensitive conventional arms, ammunition, and explosives; fuels and liquid oxygen storage areas; and Air Force accounting and finance vault areas

A

PL4

45
Q

Within how many months of travel is the foreign travel briefing required

A

Three months

46
Q

What are the four threat areas of human intelligence

A

Espionage, subversion, sabotage, terrorism

47
Q

What is any action designed to undermine the military, economic, psychological, or political strength or morale of a regime

A

Subversion

48
Q

What are the four efforts of human intelligence

A

Interrogation, source operations, debriefing, document and media exploitation

49
Q

What is the act of questioning cooperating human resources to satisfy intelligence requirements, consistent with applicable law

A

Debriefing

50
Q

Who is the point of contact between the Air Force and the Secret Service to report threats against the president vice president all former presidents wives or widows foruegn heads of state

A

OSI