NST Chap 19 Flashcards

1
Q

Information assurance refers to the measures that protect and defen information and information systems by ensuring their availability, integrity, confidentiality, authentication, and

A

Nonrepudidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When accessing internet based capabilities using Federal Govenment resources in an authorized personal or unofficial capacity, individuals shall comply with operations security guidance in AFI

A

10-701

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The AF implements and maintains the information assurance program to ____ its information and information technology assets

A

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security applies to

A

All members of the aF at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An information system in any telecommunications and or computer related equipment or ______ or subsystem o equipment

A

Interconnected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ______ is an action, device, procedure, technique, or other measure that reduces the vulnerability to an acceptable and manageable level

A

Countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remember, not all threats to our national security are conventional in

A

Nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The air force must protect information systems including network servers from

A

Malicious logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Devices that are information systems, such as portable electronic devices are classified as

A

Mobile computing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A component of communications security resulting from the provision and proper use of technically sound cryptosystems is

A

Cryptosecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The level of security classification expected with the unauthorized disclosure of information that could cause exceptionally grave danger to national security is

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The level of unauthorized disclosure of information that could cause serious damage to national security is

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer security consists of measures and controls that ensure confidential, integrity, availability of

A

Information system assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Opsec is the process of identifying critical friendly information and ____ friendly actions related to operations, acquisitions, and other activities

A

Analyzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OPSEC strives to eliminate or reduce to an acceptable level the vulnerabilities of friendly information to the adversary

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A goal of OPSEC is to identify information and _______ relating to mission capabilities, limitations, and intentions in order to prevent exploitation by potential adversaries

A

Observable actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The type of mail service used for transmitting classified or sensitive unclassified information is _____ mail

A

Registered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The level of unauthorized disclosure of information that could cause damage to national security is

A

Confedential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Communication security physical security results from all physical measures necessary to safeguard ______ from access are observation by unauthorized persons

A

Classified equipment, material, and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OPSEC is a process and not a collection of specific rules and instructions that ____ applied to every operation

A

Can be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

All measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of intelligence -bearing signals is ______ security

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OPSEC is incorporated into day to day activities to ensure a seamless transition to deny potential exploitation of _____ and observable actions

A

Contingency operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The individual responsible for OPSEC awareness throughout their organizations and for integrating the OPSEC process throughout all mission areas is the

A

Commander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The OPSEC process consists of _____ distinct steps

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Original classification is the initial decision that an item of information could cause ____ to the national security

A

Damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Banner lines are conspicuously placed at the top and bottom of the outside of the front cover title page, first page, and on the outside of the back cover or last of each classified document. Where can examples of these be found?

A

DoDM 5200.01 Volume 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Do not use public computing facilities or services to process government owned ______ information

A

Unclassified, sensitive, or classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The most commonly used controlled unclassified information category in the AF and DoD is

A

For Official Use Only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

ID does not stand alone to protect personnel and resources, planners create an effective security program by coordinating with other

A

DoD and AF programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Classification markings must be

A

Conspicuous

31
Q

The final responsibility for determining whether an individual has a valid need to access information designated for Official Use Only status ress with the

A

Person having authorized possession of the controlled information

32
Q

Markings and designations serve the purpose of indicating the ____ of classification assigned to the information

A

Level

33
Q

The overal classification will be marked, stamped, or affixed on the ____ cover

A

Front

34
Q

Classified information must be protected at all times either by _____ it in an approved device or facility or having it under the personal observation and control of an authorized individual

A

Storing

35
Q

A _____ analysis incorporates all factors of a terrorist groups existence, capability, intentions, history, and targeting

A

Threat

36
Q

The ____ is the area from which a threat can launch an attack against base personnel and resources or acft approaching or departing the base

A

Base security zone

37
Q

Classified documents must be marked with

A

One of the three levels of classification, and the agency, office of origin, and date

38
Q

Air force embers are subject to serious penalties if classified information is

A

Purposely or negligently disclosed or comprimised

39
Q

The AF policy within industrial security is to identify in its classified contracts specific government information and sensitive resources that must be protected against compromise or loss

A

While entrusted to industry

40
Q

The synchronization of integrated defense operations with emergency and consequence management activities articulated in applicable AF and DoD publications is the responsibility of the ____ commander

A

Defense Force

41
Q

When removing classified documents from storage, they must be

A

Kept under constant surveillance and protected, and covered with a classified document cover sheet

42
Q

OPSEC methodology provides a step by step analysis of operations and behavior from an adversary’s perspective, thereby assessing how _____ may be exploited

A

Vulnerabilities

43
Q

The base defense operations center is the command and control center for integrated defense operations during routine and

A

Emergency operations

44
Q

The integrated defense effect that is achieved through deliberate layers of defensive applications designed to progressively weaken or hinder the enemy’s effort is

A

Delay

45
Q

The integrated defense risk management process that is the most important step is

A

Step 7

46
Q

Outside the united states, AFOSI coordinates its the CIA and the _____ when appropriate.

A

FBI

47
Q

The type of information to repot to the secret service concerning the protection of the president and others includes information that reveals a plot to cause a civil disturbance or ______

A

Terrorist act

48
Q

In regards to incident reporting, contact means any _______ of information directed to an individual, including solicited or unsolicited telephone calls, email, radio contact, and face to face meetings.

A

Exchange

49
Q

The personnel security program involves determining the trustworthiness of individuals before they have access to classified information or are being assigned

A

To sensitive duties

50
Q

The human intelligence effort that is the systematic effort to produce information to answer specific collection requirement by direct and indirect questioning techniques of a person who is in the custody of the forces conducting the questioning is

A

Interrogation

51
Q

The ______ initiates and conducts all CI investigations, operations, collections, and other related activities for the Air Force

A

AFOSI

52
Q

Information on personnel security program management is found in AFI

A

31-501

53
Q

Anyone finding classified material out of proper control must take custody of and ___ the material

A

Safeguard

54
Q

Implementation and compliance with industrial security procedures is ensured by the

A

Installation commander

55
Q

The instructions that govern the industrial security program management are contained in AFI

A

31-601

56
Q

The human intelligence effort that is designated and fully trained military human intelligence collection personnel may develop information through the elicitation of sources, to include ‘walk-in’ sources, is

A

Source operations

57
Q

The human intelligence effort that is the process of questioning cooperation human sources to satisfy intelligence requirements is

A

Debriefing

58
Q

Security protection level that is assigned to those resources for which loss, theft, destruction, misuse, or compromise would gravely harm the strategic capability of the US is

A

PL1

59
Q

Security protection level that is assigned to nonnuclear alert forces is

A

PL2

60
Q

Personnel security clearances are recorded in the

A

Joint personnel adjudication system (JPAS)

61
Q

The purpose of ____ is to reduce the vulnerability of AF missions from successful adversary collection and exploitation of critical information.

A

OPSEC

62
Q

No alert resources or weapon systems that can be generated to alert status are assigned security level _______ status

A

PL3

63
Q

The term protection of the president, includes not only the president himself, but

A

Widows of past presidents, the president or vice president elect, and any foreign head of state who is visiting the united states

64
Q

Operational effectiveness is enhanced when ____ apply opsec from the earliest stages of planning.

A

Commanders and decision makers

65
Q

The integrated defense effect that is achieved through intelligence analysis is

A

Anticipate

66
Q

The integrated defense effect that is achieved through cognizance, readiness, and awareness of all AF personnel and an understanding of Threat, Tactics, Techniques, and Procedures is

A

Assess

67
Q

Ideally, defense forces receive such good intelligence they are able to anticipate any and all threats, and the proffered method used is to

A

Deter

68
Q

A person may not have access to classified information unless determined to have the proper security clearance and

A

Need to know

69
Q

If ____ info appears in the public media, dod personnel must be careful not to make any statement or comment that would confirm the accuracy or verify the status of the info

A

Classified

70
Q

The security level assigned to resources for which the loss or theft destruction or misuse or comprimise would damage US war fighting capability is

A

PL3

71
Q

The three basic rules for AT personal protection is being alert, keeping a low profile, and

A

Being unpredictable

72
Q

The point of contact between the air force and the us secret service is the

A

AFOSI

73
Q

The act of obtaining, delivering, transmitting, communication, or receiving information about the national defense with the intent or reason to believe the info may be used to injure the US or to the advantage of any foreign nation, is

A

Espionage