Information Assurance & Computer Network Defense Flashcards

1
Q

What is the ability to rapidly collect, process, and disseminate information while denying these capabilities to adversaries?

A

Information Superiority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the measures that protect and defend information and information systems by ensuring availability integrity, authentication, confidentiality and non-repudiation?

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What consists of actions and operations to defend computer systems and networks from unauthorized activities that degrade mission performance and adversely impact survivability?

A

Computer Network Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What focuses on affecting human decision processes to achieve friendly objectives?

A

Information Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What enables operations and intelligence collection to gather data from target or adversary automated information systems or networks?

A

Computer Network Exploitation (CNE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What provides globally interconnected capabilities, processes and personnel for collecting, processing, storing, disseminating and managing information for all DOD war-fighters, policy makers, and support personnel?

A

Global Information Grid (GIG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an organizational, procedural and technological construct for ensuring information superiority and enabling speed of command for the war-fighter?

A

NETOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What integrates the three primary functions of network management, information dissemination management (IDM) and IA?

A

NETOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What provides visibility of extent and intensity of the activity, traffic, load and throughput potential, as well as detection of significant degradation of service?

A

Network Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does network management enable based on priority, system status and capacity?

A

Dynamic Rerouting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What integrates an organized, manned, equipped and trained workforce to guard, secure and secure information and information systems by providing the security services/attributes of availability, authentication, confidentiality, integrity and non-repudiation?

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What provides the timely, reliable access to data and services for authorized users?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a security measure designed to establish the validity of a transmission, message or originator, or as a means of verifying an individual’s authorization to access specific categories of information?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What provides the assurance the information is not disclosed to unauthorized entities or processes?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data?

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the quality of an information system reflecting the logical correctness and reliability of the operating system?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which instruction states all DOD information systems and networks will be certified and accredited IAW with DOD policy and guidance, currently the DOD Information Technology Security Certification and Accreditation Process (DITSCAP)?

A

DOD Instruction 5200.40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Certification and accreditation (C&A) of information will comply with the requirements of what?

A

Director of Central Intelligence Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who is responsible for developing and providing US military policy positions and concepts supporting CND and IA?

A

Chairmen of the Joint Chiefs of Staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the opportunity to make use of an information system (IS) resource?

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What limits access to information system resources only to authorized users, programs, processes or other systems?

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the process of tracing information system (IS) activities to a responsible source known as?

A

Accountability

23
Q

What is the formal declaration by a DAA that an information system (IS) is approved to operate in a particular security mode at an acceptable level of risk?

A

Accreditation

24
Q

What is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

A

Audit Trail

25
Q

What are automated methods of authenticating or verifying an individual based upon a physical or behavioral characteristic?

A

Biometrics

26
Q

What is the probability that a particular vulnerability will be exploited within an interacting population and adversely impact some members of that population?

A

Community Risk

27
Q

What are teams composed of personnel with technical expertise and organic equipment that may deploy to assist remote sites in the restoration of computer services?

A

Computer Emergency Response Team

28
Q

What are operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computers and networks themselves?

A

Computer Network Attack

29
Q

What kind of plan is maintained for emergency response, backup operations, and post-disaster recovery for an information system, to ensure the availability of critical resources and to facilitate the continuity of operations in an emergency situation?

A

Contingency Plan

30
Q

What physical and cyber-based systems are essential to the minimum operations of the economy and government?

A

Critical Infrastructures

31
Q

What is the DOD consolidated worldwide enterprise level telecommunications infrastructure that provides the end-to-end information transfer network for supporting military operations?

A

Defense Information Systems Network

32
Q

What is a type of incident resulting from any action or series of actions that prevents any part of an information system (IS) from functioning?

A

Distributed Denial of Service

33
Q

Who is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk?

A

Designated Approving Authority

34
Q

What is a collection of computing environments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security?

A

Enclave

35
Q

What is an occurrence, not yet assessed, that may effect the performance of an IS?

A

Event

36
Q

What is a system designed to defend against unauthorized access to or from a private network?

A

Firewall

37
Q

What is the possibility that a particular threat will adversely impact an IS by exploiting a particular vulnerability?

A

Risk

38
Q

What is a weakness in an information system, system security procedures, internal controls or implementation that could be exploited?

A

Vulnerability

39
Q

What is a formal description and evaluation of vulnerabilities of an information system?

A

Vulnerability Assessment

40
Q

What is a program recorded in permanent or semi-permanent computer memory?

A

Firmware

41
Q

What is an information system (IS) assessed occurrence having actual or potentially adverse effects on an IS?

A

Incident

42
Q

Which INFOCON level is described as a normal readiness of DOD information systems and networks?

A

Normal

43
Q

What INFOCON level has increased intelligence watches and strengthened security measures of DOD information systems and networks?

A

Alpha

44
Q

Which INFOCON level has a further increase in CND force readiness above that required for normal readiness?

A

Bravo

45
Q

Which INFOCON level has a further increase in CND force readiness but less than maximum CND force readiness?

A

Charlie

46
Q

Which INFOCON level is described as the maximum CND force force readiness?

A

Delta

47
Q

Who is the individual responsible for the information assurance program of a DOD information system or organization?

A

Information Assurance Manager

48
Q

Who is the individual responsible to the IAM for ensuring the appropriate operational IA posture is maintained for a DOD information system or organization?

A

Information Assurance Officer

49
Q

What is the unauthorized act of bypassing the security mechanism of a system?

A

Intrusion

50
Q

What is hardware, software or firmware capable of performing an unauthorized function on a information system?

A

Malicious Logic

51
Q

Which type of threats described common hacker tools and techniques used in a non-sophisticated manner?

A

First Generation

52
Q

Which type of threats describes non state-sponsored computer network attack, espionage or data theft?

A

Second Generation

53
Q

Which type of threat describe state-sponsored computer network attack or espionage?

A

Third Generation