NAVEDTRA 14222, INFORMATION SYSTEMS TECHNICIAN TRAINING SERIES MODULE 1-ADMINISTRATION AND SECURITY Flashcards
What are defined as things that can destroy your assets?
Threats
What are defined as weaknesses that can be exploited?
Vulnerabilities
Which process involves assessing risks, determining loss potential estimates, and selecting countermeasures appropriate to prevent, detect, minimize, and recover from successful attacks and adverse events?
Risk management
What provide for the continuation of an activity’s mission during abnormal operating conditions?
Contingency plans
How many areas of consideration are there for the Navy’s AIS security program?
5
Who serves as the primary point of contact for all matters relating to Command AIS security?
Information Systems Security Manager (ISSM)
What is the safe rule of thumb that the temperature and humidity of the computer facility should be?
72 degrees Fahrenheit, +/- 2 degrees, and a humidity of 55%, +/- 5%
What can provide auxiliary power for your equipment in an area where there are frequent brownouts?
Uninterrupted Power Source (UPS)
Within how many feet must fire extinguishers be placed from computer equipment?
50
Which security mode is a computer system said to be in when the central facility and all of the connected peripheral devices and remote terminals are protected in accordance with the requirements for the highest classification category and type of material then contained in the system?
System High
Which security mode is a computer said to be in when the central facility and all of the connected peripheral devices and remote terminals are exclusively used and controlled by specific users or groups of users having a security clearance and need-to-know for the processing of a particular category and type of classified material?
Dedicated
What imposed numerous requirements upon federal agencies to prevent the misuse of data about individuals, respect its confidentiality, and preserve its integrity?
Privacy Act of 1974
How many days or less is working copy media retained for?
180
As a rule of thumb, interception of electromagnetic emanations beyond how many yards is very difficult?
325
What provide a means of detecting and announcing proximity or intrusion that endangers or may endanger the security of a command?
Intrusion Detection Systems (IDSs)