INFORMATION ASSURANCE Flashcards

1
Q

What is Information Assurance?

A

Measures that protect and defend information and information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is DAA?

A

Designated Approving Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is ATO?

A

Approval to Operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is IATO?

A

Interim Approval to Operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Configuration Management?

A

Controlling changes to a system’s hardware and software; ensuring such changes will not lead to decreased security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many attributes of IA are there and what are they?

A
5;
Confidentiality
Integrity
Authentication
Non-Repudiation
Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Confidentiality?

A

INFORMATION IS NOT DISCLOSED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Availability?

A

TIMELY, RELIABLE ACCESS TO DATA AND INFORMATION SYSTEMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Non-Repudiation?

A

PROOF OF AUTHENTICATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Authentication?

A

PROOF OF IDENTITY. “WHO YOU SAY YOU ARE”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Integrity?

A

INFORMATION IS NOT MODIFIED.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many categories of Computer Incidents are there?

A

9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Give an example of a Root Level Intrusion:

A

Unauthorized Privileged Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give an example of a User Lever Intrusion:

A

Unauthorized NON-Privileged Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Denial of Service?

A

Activity that impairs or halts functionality of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Malicious Logic?

A

Installation of malicious software

17
Q

What does IAVA stand for?

A

Information Assurance Vulnerability Alert

18
Q

What does IAVB stand for?

A

Information Assurance Vulnerability Bulletin

19
Q

What does IAVT stand for?

A

Information Assurance Vulnerability Technical Advisory

20
Q

What does CTO stand for?

A

Computer Tasking Order

21
Q

What does NTD stand for?

A

Navy Telecommunications Directive

22
Q

What is a Service Pack?

A

A group of different patches, fixes, and updates

23
Q

What is the difference between a vulnerability and a threat?

A

Vulnerability is a weakness; Threat exploits a vulnerability