ET1 Grenninger Flashcards

1
Q

IA?

A

Information Operations that protect and defend data and IS by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. This includes providing restoration of IS by incorporating protection, detection, and reaction capabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ATO?

A

Authority to Operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

5 Attributes of IA?

A
Confidentiality
Integrity
Availability
Non-repudiation
Authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IAVT?

A

Info Assurance Vulnerability Technical Adivisory

An IAVA addresses severe network vulnerabilities resulting in immediate and potentially severe threats to DOD systems and information. Corrective action is of the highest priority due to the severity of the vulnerability risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Service Pack?

A

A service pack (in short SP) is a collection of updates, fixes and/or enhancements to a software program delivered in the form of a single installable package.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Purpose of Naval Intelligence

A

Naval intelligence provides evaluated intelligence on an adversary’s capabilities and intentions to support planning and operations at all levels of warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Three Categories of Intelligence?

A

Strategic
Operational
Tactical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PIR?

A

Priority Intelligence Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CCIR?

A

Commander Critical Information Requirement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Three Examples of Intelligence Briefs?

A

Geopolitics
Security
Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define OPSEC

A

It is a systematic, proven process that identifies, controls and protects sensitive but unclassified information about a mission, operation or activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

OPSEC 5 Steps for Planning?

A
ID Critical Info
Analyze Threat
Analyze Vulnerabilities
Assess Risk
Apply Countermeasures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Responsibilities of command OPSEC officer?

A

Administering the program
Advise the CO on OPSEC matters
Conduct OPSEC surveys, education and training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WRA?

A

Web Risk Assessment:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Red Cross Message?

A

AMCROSS messages contain information very personal to the intended recipient. Therefore, communications personnel will not discuss the contents of such a message with anyone and will limit the message distribution to the executive officer or an appointed alternate only. IMMEDIATE precedence maybe assigned to AMCROSS messages concerning death or serious illness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

River City?

A

OPSEC tool that limits communications.

17
Q

VTC?

A

VIdeo Teleconferencing

VTC technology is an extension or combination of television, which provides the audio and video communication aspect, and telephony or telecommunications which provides the addressable, bi-directional connectivity.

18
Q

GINGERBREAD?

A

Designed to alert all personnel monitoring over communications that a breach of security has been made over the network. The only answer that can be made is to terminate connections.

19
Q

Intrusion?

A

The intentional insertion of EM energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion.

20
Q

Spillage?

A

Data placed on an information system possessing insufficient security controls to protect the data at the required classification posing a risk to national security (e.g., SCI onto top secret, secret onto unclas, etc).

21
Q

State how often a CO is required to conduct a CMS inspection.

A

Unannounced spot checks are conducted at least quarterly. The CO may delegate no more than two of the four quarterly inspections to XO.

22
Q

SAER?

A

Security Access Eligibility Report- assists in making an affirmative determination that the person is an acceptable security risk.

23
Q

RAM?

A

RAM (Random Antiterrorism Measures), at a minimum, shall consist of the random implementation of higher FPCON measures in consideration of the local terrorist capabilities. Random use of other physical security measures should be used to supplement FPCON measures.

24
Q

Three Comsec Incidents?

A

Cryptographic
Personnel
Physical