Information Assurance πŸ˜” Flashcards

1
Q

What is IA

A

Measures that protect and defend information and information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does IA assure

A

Availability , integrity, authentication, confidentiality, non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electronic spillage

A

higher classified material is within a lower authorized domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

organizations that conduct vulnerability assessments

A

NIOC Norfolk, NAVY red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS

A

intrusion detection system.
Active - IPS -can stop intruder
Passive - IDS - can’t stop intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malicious code

A

unauthorized code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zombie

A

computer connected to internet compromised by a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bot

A

controls the zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero day exploit

A

number of days to stop known vulnerability is 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

spyware

A

software enabling user to obtain secret information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

logic bomb

A

software that sets off a malicious function when specified conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

keylogger

A

records key strokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ATO

A

approval to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IATO

A

interim approval to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAO

A

information Assurance officer

ensures appropriate operational IA posture is maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CSI

A

Cyber security inspection

16
Q

Malicious code

A

Code in software intended for undesired effects

16
Q

Mitigation

A

Action reducing effect of network attack

16
Q

Penetration

A

Unauthorized attack bypassing security

16
Q

Probe

A

Learn networks vulnerability

16
Q

Port scan

A

Scans network for open ports for exploitation

16
Q

Pki

A

Public key infrastructure

17
Q

IAM

A

Information assurance manager - ENS Celaya

18
Q

IAO

A

Information assurance officer - ITC WILLIAMS

19
Q

Navy blue team

A

Solidifies naval networks

19
Q

Navy red team

A

Stimulates network attacks

20
Q

IDS

A

Intrusion detection

21
Q

IPS

A

Intrusion Prevention System

22
Q

HBSS

A

Host based security system - detect and counter real time threats

23
Q

Anti virus

A

Computer software to prevent detect and remove malware

24
Q

JTT

A

Joint tactical terminal

25
Q

River city affects

A

Email and internet

26
Q

Secrel

A

Secret releasable - used to share secret data with allied nations

27
Q

Social engineering

A

Manipulating people to give up confidential info

28
Q

VPN

A

Virtual Private Network - secure encrypted tunnel to transmit data

29
Q

Hub

A

Connection point for device to a network

30
Q

Switch

A

Smarter multi port connection point for devices to network

31
Q

Router

A

Forwards data packets along a network

32
Q

Dadms

A

Listing of all authorized software for navy networks