Information Assurance & Computer Network Defense Flashcards

1
Q

What is the ability to rapidly collect, process, and disseminate information while denying these capabilities to adversaries?

A

Information Superiority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the measures that protect and defend information and information systems by ensuring availability integrity, authentication, confidentiality and non-repudiation?

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What consists of actions and operations to defend computer systems and networks from unauthorized activities that degrade mission performance and adversely impact survivability?

A

Computer Network Defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What focuses on affecting human decision processes to achieve friendly objectives?

A

Information Operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What enables operations and intelligence collection to gather data from target or adversary automated information systems or networks?

A

Computer Network Exploitation (CNE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What provides globally interconnected capabilities, processes and personnel for collecting, processing, storing, disseminating and managing information for all DOD war-fighters, policy makers, and support personnel?

A

Global Information Grid (GIG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an organizational, procedural and technological construct for ensuring information superiority and enabling speed of command for the war-fighter?

A

NETOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What integrates the three primary functions of network management, information dissemination management (IDM) and IA?

A

NETOPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What provides visibility of extent and intensity of the activity, traffic, load and throughput potential, as well as detection of significant degradation of service?

A

Network Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does network management enable based on priority, system status and capacity?

A

Dynamic Rerouting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What integrates an organized, manned, equipped and trained workforce to guard, secure and secure information and information systems by providing the security services/attributes of availability, authentication, confidentiality, integrity and non-repudiation?

A

Information Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What provides the timely, reliable access to data and services for authorized users?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a security measure designed to establish the validity of a transmission, message or originator, or as a means of verifying an individual’s authorization to access specific categories of information?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What provides the assurance the information is not disclosed to unauthorized entities or processes?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the data?

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the quality of an information system reflecting the logical correctness and reliability of the operating system?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which instruction states all DOD information systems and networks will be certified and accredited IAW with DOD policy and guidance, currently the DOD Information Technology Security Certification and Accreditation Process (DITSCAP)?

A

DOD Instruction 5200.40

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Certification and accreditation (C&A) of information will comply with the requirements of what?

A

Director of Central Intelligence Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Who is responsible for developing and providing US military policy positions and concepts supporting CND and IA?

A

Chairmen of the Joint Chiefs of Staff

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the opportunity to make use of an information system (IS) resource?

A

Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What limits access to information system resources only to authorized users, programs, processes or other systems?

A

Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the process of tracing information system (IS) activities to a responsible source known as?

A

Accountability

23
Q

What is the formal declaration by a DAA that an information system (IS) is approved to operate in a particular security mode at an acceptable level of risk?

A

Accreditation

24
Q

What is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

A

Audit Trail

25
What are automated methods of authenticating or verifying an individual based upon a physical or behavioral characteristic?
Biometrics
26
What is the probability that a particular vulnerability will be exploited within an interacting population and adversely impact some members of that population?
Community Risk
27
What are teams composed of personnel with technical expertise and organic equipment that may deploy to assist remote sites in the restoration of computer services?
Computer Emergency Response Team
28
What are operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computers and networks themselves?
Computer Network Attack
29
What kind of plan is maintained for emergency response, backup operations, and post-disaster recovery for an information system, to ensure the availability of critical resources and to facilitate the continuity of operations in an emergency situation?
Contingency Plan
30
What physical and cyber-based systems are essential to the minimum operations of the economy and government?
Critical Infrastructures
31
What is the DOD consolidated worldwide enterprise level telecommunications infrastructure that provides the end-to-end information transfer network for supporting military operations?
Defense Information Systems Network
32
What is a type of incident resulting from any action or series of actions that prevents any part of an information system (IS) from functioning?
Distributed Denial of Service
33
Who is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk?
Designated Approving Authority
34
What is a collection of computing environments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security?
Enclave
35
What is an occurrence, not yet assessed, that may effect the performance of an IS?
Event
36
What is a system designed to defend against unauthorized access to or from a private network?
Firewall
37
What is the possibility that a particular threat will adversely impact an IS by exploiting a particular vulnerability?
Risk
38
What is a weakness in an information system, system security procedures, internal controls or implementation that could be exploited?
Vulnerability
39
What is a formal description and evaluation of vulnerabilities of an information system?
Vulnerability Assessment
40
What is a program recorded in permanent or semi-permanent computer memory?
Firmware
41
What is an information system (IS) assessed occurrence having actual or potentially adverse effects on an IS?
Incident
42
Which INFOCON level is described as a normal readiness of DOD information systems and networks?
Normal
43
What INFOCON level has increased intelligence watches and strengthened security measures of DOD information systems and networks?
Alpha
44
Which INFOCON level has a further increase in CND force readiness above that required for normal readiness?
Bravo
45
Which INFOCON level has a further increase in CND force readiness but less than maximum CND force readiness?
Charlie
46
Which INFOCON level is described as the maximum CND force force readiness?
Delta
47
Who is the individual responsible for the information assurance program of a DOD information system or organization?
Information Assurance Manager
48
Who is the individual responsible to the IAM for ensuring the appropriate operational IA posture is maintained for a DOD information system or organization?
Information Assurance Officer
49
What is the unauthorized act of bypassing the security mechanism of a system?
Intrusion
50
What is hardware, software or firmware capable of performing an unauthorized function on a information system?
Malicious Logic
51
Which type of threats described common hacker tools and techniques used in a non-sophisticated manner?
First Generation
52
Which type of threats describes non state-sponsored computer network attack, espionage or data theft?
Second Generation
53
Which type of threat describe state-sponsored computer network attack or espionage?
Third Generation