NAVEDTRA 14222, INFORMATION SYSTEMS TECHNICIAN TRAINING SERIES MODULE 1-ADMINISTRATION AND SECURITY Flashcards

1
Q

What are defined as things that can destroy your assets?

A

Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are defined as weaknesses that can be exploited?

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which process involves assessing risks, determining loss potential estimates, and selecting countermeasures appropriate to prevent, detect, minimize, and recover from successful attacks and adverse events?

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What provide for the continuation of an activity’s mission during abnormal operating conditions?

A

Contingency plans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many areas of consideration are there for the Navy’s AIS security program?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who serves as the primary point of contact for all matters relating to Command AIS security?

A

Information Systems Security Manager (ISSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the safe rule of thumb that the temperature and humidity of the computer facility should be?

A

72 degrees F, +/- 2 degrees, and a humidity of 55%, +/- 5%

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can provide auxiliary power for your equipment in an area where there are frequent brownouts?

A

Uninterrupted Power Source (UPS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Within how many feet must fire extinguishers be placed from computer equipment?

A

50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which security mode is a computer system said to be in when the central facility and all of the connected peripheral devices and remote terminals are protected in accordance with the requirements for the highest classification category and type of material then contained in the system?

A

System High

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which security mode is a computer system said to be in when the central facility and all of the connected peripheral devices and remote terminals are exclusively used and controlled by specific users or group of users having a security clearance and need-to-know for processing of a particular category and type of classified material?

A

Dedicated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What imposed numerous requirements upon federal agencies to prevent the misuse of data about individuals, respect its confidentiality, and preserve its integrity?

A

Privacy Act of 1974

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many days or less is working copy media retained for?

A

180

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

As a rule of thumb, interception of electromagnetic emanations beyond how many yards is very difficult?

A

325

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What provide a means of detecting and announcing proximity or intrusion that endangers or may endanger the security of a command?

A

Intrusion Detection System (IDSs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How often should a security survey of the AIS facility area be conducted by the AIS technical manager?

A

Annually

17
Q

How many different types of contingency plans makeup a COOP security program for an AIS facility?

A

3

18
Q

Which publication provides guidelines for use by all Navy organizations in implementing any security safeguards that they must adopt to implement the Privacy Act?

A

SECNAVINST 5239.3

19
Q

Which publication implements the Privacy Act and personal privacy and rights of individuals regarding their personal records?

A

SECNAVINST 5211.5

20
Q

Who is responsible for administering and supervising the execution of the Privacy Act within the Department of the Navy?

A

CNO

21
Q

What is the status accorded to data that requires protection from unauthorized disclosure?

A

Confidentiality

22
Q

What is the state that exists when data agrees with the source from which it is derived, and when it has not been either accidentally or maliciously altered, disclosed, or destroyed?

A

Integrity

23
Q

How many different categories are the safeguards that provide data protection grouped into?

A

3