H02X Flashcards

0
Q

H17: Select from a list of distracters the title of the public law that requires each federal agency to develop, document, and implement an agency wide program to provide information security for the information and information systems that support the operations and assets of the agency

A

Public Law 107-347 / Title III – Federal Information Security Management Act (FISMA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

H17: Identify the four groups that IA policies can be categorized

A

Senior IA Management Policy Statement
Regulatory
Advisory
Informative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

H17: Identify the Department of Defense (DoD) level policy that defines the Defense-in-Depth Information Assurance (IA) Architecture

A

?
DoDD 8500.1 (Information Assurance)
DODI 8500.2 (Information Assurance Implementation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

H17: Identify the four categories of Department of Defense (DoD) information systems

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

H17: Identify the five supporting elements of Information Assurance in accordance with Department of Defense Directive (DoDD) 8500.1 (Information Assurance) and the Committee on National Security Systems Instruction (CNSSI)

A
Availability
Authentication
Confidentiality
Non-repudiation
Integrity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

H17: Identify the DoD level policy that addresses the formulation of an Information Assurance (IA) Baseline

A

DODI 8500.2 (Information Assurance Implementation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

H17: Select from a list of distracters the Marine Corps Order (MCO) that establishes the Marine Corps Information Assurance Program (MCIAP)

A

MCO 5239.2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

H17: State in writing the definition of a Marine Corps Enterprise Network (MCEN) Operational Directive

A

MCEN Operational directive messages will assign network related actions that must be taken by recipient commands. Frequently, these messages will specify a deadline for accomplishing the directed actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

H17: State in writing the definition of a Marine Corps Enterprise Network (MCEN) Advisory

A

MCEN advisory messages will disseminate valuable information or deliver recommendations for consideration by local commanders relative to network management, operations, security and defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

H18: Correctly match a Marine Corps Information Assurance Workforce (IAW) role to its corresponding responsibility

A

.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

H18: Select from a list of distracters the annual training requirement mandated for all Information Systems (IS) users

A

All Information Systems users should receive Awareness and Refresher Training – Currently CYBERM0000 on MarineNet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

H20: Select from a list of distractors the definition of an event as it relates to incident response

A

Any observable occurrence in a system and/or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

H20: Select from a list of distracters the definition of an incident as it relates to incident response

A

an adverse event in an information system and/or network or the threat of the occurrence of such an event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

H20: Select from a list of distracters the eight categories of an incident

A
Malicious code
Unauthorized access
Inappropriate usage
Service disruption
Espionage
Hoaxes
Spillages
Multiple category
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

H20: Select from a list of distracters the six components of an Incident Response Policy

A
Preparation
Detection
Containment
Eradication
Recovery
Follow–Up
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

H20: Select from a list of distracters the definition of an audit

A

An independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures, and to recommend necessary changes in controls, policies, or procedures.

16
Q

H20: Identify how to conduct evidence processing

A
Immediate Action
Policy or legal?
Notification
Documentation
Chain of custody
17
Q

H21: Select from a list of distracters the purpose of the Department of Defense (DoD) Information Operations Condition (INFOCON) System

A

The INFOCON system provides a framework within which the Commander USSTRATCOM (CDRUSSTRATCOM), regional commanders, service chiefs, base, post, camp, station, vessel commanders, or agency directors can increase the measurable readiness of their networks to match operational priorities. The major change is a shift in strategy from a threat focus to a readiness focus.

*INFOCON 5 is normal readiness and INFOCON 1 is maximum readiness.

18
Q

H22: Select from a list of distracters the purpose of the Department of Defense (DoD) Information Assurance Vulnerability Management (IAVM) Program

A

To provide management over mitigating vulnerabilities that are found in DoD information systems.

19
Q

H22: Select from a list of distracters the three different functions of the DoD Information Assurance Vulnerability Management (IAVM) Program

A

Information Assurance Vulnerability Alert (IAVA)
Information Assurance Vulnerability Bulletin (IAVB)
Technical Advisory (TA)

20
Q

H22: Summarize in writing the eight steps associated with the Marine Corps Information Assurance Vulnerability Management (IAVM)

A

Step 1. DISA identifies vulnerabilities of significance to the DoD and reports them to the JTF-GNO. JTF-GNO promulgates this IAVM information via Formal Message to Service Components and Combatant Commands. The three types released are IAVA, IAVB and TA.

Step 2. The MCNOSC acknowledges receipt of IAVA and IAVB within five working days to JTF-GNO. TA messages do not require acknowledgment of receipt. The MCNOSC will then conduct an initial technical assessment of the IAVM message to determine its applicability to Marine Corps Networks.

Step 3. MCNOSC issues a USMC IAVM formal message. The MCNOSC will issue IAVM messages, which will be tailored to the specific information technology environment of the Marine Corps. Therefore, on occasion, IAVB and TA messages may be republished to the Marine Corps with compliance and reporting requirements. All IAVAs, IAVBs, and TAs with mandated compliance requirements will be disseminated by the MCNOSC as MCEN Operational Directive (OpDir) messages. Messages with no mandated compliance requirements will be released as MCEN Advisory Messages. IAVM messages will be disseminated throughout the Marine Corps, via the Defense Messaging System (DMS), Aumoted Message Handling System (AMHS), and AUTODIN for appropriate action. The MCNOSC shall also provide copies of these messages via e-mail to EDS (NMCI) at the same time of release to the Marine Corps.

Step 4. Configuration Control Authorities (Program Groups at MARCORSYSCOM) issue approval to apply IAVM corrective actions to Centrally Managed Systems.

Step 5: Implementation of IAVM Message corrective Actions. All Marine Corps organizations and the NMCI vendor shall take appropriate action on IAVM messages.

Step 6. Units report IAVM compliance status information or submit extension requests. Reporting of IAVM compliance is a third echelon reporting responsibility for Marine Corps Assets in NMCI AOR, non-NMCI managed assets and Deployed Networks. Centrally Managed Systems shall report compliance to the MCNOSC. Reporting shall include all information requested in the Operational Directive.

Step 7. Compliance Verification - The MCNOSC will validate MCEN compliance via vulnerability analysis tools and report these results to the Marine Corps DAA.

Step 8. The MCNOSC will compile and submit an aggregated Service component report of IAVM compliance and extensions to JTF-GNO. This shall be accomplished by the JTF-GNO within the specified deadline established by the JTF-GNO. This in most cases is 30 days from the date issued.

21
Q

H23: Identify the elements of the tactical Certification & Accreditation process workflow

A
  1. MEF IAM receives packet from unit
  2. MCNOSC INS Q&A
  3. C4 C&A/DAA reviews the package and issues IATO
  4. Necessary documents issued to DISA SCAO
22
Q

H23: Identify the Certification & Accreditation enclosures and required documents

A
Exercise request letter
Endorsement letters from each CAR starting with the MSC through the MEF
Information Systems Security Plan (ISSP)
IAM/IAO Appointment Letter
C4 Systems List
C4 Applications list 
Detailed Diagrams
23
Q

H03: State in writing the five core capabilities of Information Operations

A
Military Information Support Operations (MISO)
Military Deception 
Operations Security (OPSEC) 
Electronic Warfare (EW)  
Cyberspace Operations (CO)
24
Q

H03: Define Department of Defense (DoD) Information Network Operations (DINO)

A

Operations to build, design, configure, secure, operate, maintain, and sustain Department of Defense networks to create and preserve information assurance on the Department of Defense Information Network

25
Q

H03: Define Defensive Cyberspace Operations (DCO)

A

Operations passive and active, intended to preserve the ability to utilize friendly cyberspace capabilities and protect data, networks, and net-centric capabilities. Included within DCO is DCO- response action (DCO-RA)

26
Q

H03: Define Offensive Cyberspace Operations (OCO)

A

Operations intended to project power by the application of force in and through cyberspace.