NST Chap 19 Flashcards

1
Q

Information assurance refers to the measures that protect and defen information and information systems by ensuring their availability, integrity, confidentiality, authentication, and

A

Nonrepudidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When accessing internet based capabilities using Federal Govenment resources in an authorized personal or unofficial capacity, individuals shall comply with operations security guidance in AFI

A

10-701

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The AF implements and maintains the information assurance program to ____ its information and information technology assets

A

Secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security applies to

A

All members of the aF at all times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An information system in any telecommunications and or computer related equipment or ______ or subsystem o equipment

A

Interconnected system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ______ is an action, device, procedure, technique, or other measure that reduces the vulnerability to an acceptable and manageable level

A

Countermeasure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Remember, not all threats to our national security are conventional in

A

Nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The air force must protect information systems including network servers from

A

Malicious logic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Devices that are information systems, such as portable electronic devices are classified as

A

Mobile computing devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A component of communications security resulting from the provision and proper use of technically sound cryptosystems is

A

Cryptosecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The level of security classification expected with the unauthorized disclosure of information that could cause exceptionally grave danger to national security is

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The level of unauthorized disclosure of information that could cause serious damage to national security is

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Computer security consists of measures and controls that ensure confidential, integrity, availability of

A

Information system assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Opsec is the process of identifying critical friendly information and ____ friendly actions related to operations, acquisitions, and other activities

A

Analyzing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OPSEC strives to eliminate or reduce to an acceptable level the vulnerabilities of friendly information to the adversary

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A goal of OPSEC is to identify information and _______ relating to mission capabilities, limitations, and intentions in order to prevent exploitation by potential adversaries

A

Observable actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The type of mail service used for transmitting classified or sensitive unclassified information is _____ mail

A

Registered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The level of unauthorized disclosure of information that could cause damage to national security is

A

Confedential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Communication security physical security results from all physical measures necessary to safeguard ______ from access are observation by unauthorized persons

A

Classified equipment, material, and information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

OPSEC is a process and not a collection of specific rules and instructions that ____ applied to every operation

A

Can be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

All measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of intelligence -bearing signals is ______ security

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

OPSEC is incorporated into day to day activities to ensure a seamless transition to deny potential exploitation of _____ and observable actions

A

Contingency operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The individual responsible for OPSEC awareness throughout their organizations and for integrating the OPSEC process throughout all mission areas is the

A

Commander

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The OPSEC process consists of _____ distinct steps

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Original classification is the initial decision that an item of information could cause ____ to the national security
Damage
26
Banner lines are conspicuously placed at the top and bottom of the outside of the front cover title page, first page, and on the outside of the back cover or last of each classified document. Where can examples of these be found?
DoDM 5200.01 Volume 2
27
Do not use public computing facilities or services to process government owned ______ information
Unclassified, sensitive, or classified
28
The most commonly used controlled unclassified information category in the AF and DoD is
For Official Use Only
29
ID does not stand alone to protect personnel and resources, planners create an effective security program by coordinating with other
DoD and AF programs
30
Classification markings must be
Conspicuous
31
The final responsibility for determining whether an individual has a valid need to access information designated for Official Use Only status ress with the
Person having authorized possession of the controlled information
32
Markings and designations serve the purpose of indicating the ____ of classification assigned to the information
Level
33
The overal classification will be marked, stamped, or affixed on the ____ cover
Front
34
Classified information must be protected at all times either by _____ it in an approved device or facility or having it under the personal observation and control of an authorized individual
Storing
35
A _____ analysis incorporates all factors of a terrorist groups existence, capability, intentions, history, and targeting
Threat
36
The ____ is the area from which a threat can launch an attack against base personnel and resources or acft approaching or departing the base
Base security zone
37
Classified documents must be marked with
One of the three levels of classification, and the agency, office of origin, and date
38
Air force embers are subject to serious penalties if classified information is
Purposely or negligently disclosed or comprimised
39
The AF policy within industrial security is to identify in its classified contracts specific government information and sensitive resources that must be protected against compromise or loss
While entrusted to industry
40
The synchronization of integrated defense operations with emergency and consequence management activities articulated in applicable AF and DoD publications is the responsibility of the ____ commander
Defense Force
41
When removing classified documents from storage, they must be
Kept under constant surveillance and protected, and covered with a classified document cover sheet
42
OPSEC methodology provides a step by step analysis of operations and behavior from an adversary's perspective, thereby assessing how _____ may be exploited
Vulnerabilities
43
The base defense operations center is the command and control center for integrated defense operations during routine and
Emergency operations
44
The integrated defense effect that is achieved through deliberate layers of defensive applications designed to progressively weaken or hinder the enemy's effort is
Delay
45
The integrated defense risk management process that is the most important step is
Step 7
46
Outside the united states, AFOSI coordinates its the CIA and the _____ when appropriate.
FBI
47
The type of information to repot to the secret service concerning the protection of the president and others includes information that reveals a plot to cause a civil disturbance or ______
Terrorist act
48
In regards to incident reporting, contact means any _______ of information directed to an individual, including solicited or unsolicited telephone calls, email, radio contact, and face to face meetings.
Exchange
49
The personnel security program involves determining the trustworthiness of individuals before they have access to classified information or are being assigned
To sensitive duties
50
The human intelligence effort that is the systematic effort to produce information to answer specific collection requirement by direct and indirect questioning techniques of a person who is in the custody of the forces conducting the questioning is
Interrogation
51
The ______ initiates and conducts all CI investigations, operations, collections, and other related activities for the Air Force
AFOSI
52
Information on personnel security program management is found in AFI
31-501
53
Anyone finding classified material out of proper control must take custody of and ___ the material
Safeguard
54
Implementation and compliance with industrial security procedures is ensured by the
Installation commander
55
The instructions that govern the industrial security program management are contained in AFI
31-601
56
The human intelligence effort that is designated and fully trained military human intelligence collection personnel may develop information through the elicitation of sources, to include 'walk-in' sources, is
Source operations
57
The human intelligence effort that is the process of questioning cooperation human sources to satisfy intelligence requirements is
Debriefing
58
Security protection level that is assigned to those resources for which loss, theft, destruction, misuse, or compromise would gravely harm the strategic capability of the US is
PL1
59
Security protection level that is assigned to nonnuclear alert forces is
PL2
60
Personnel security clearances are recorded in the
Joint personnel adjudication system (JPAS)
61
The purpose of ____ is to reduce the vulnerability of AF missions from successful adversary collection and exploitation of critical information.
OPSEC
62
No alert resources or weapon systems that can be generated to alert status are assigned security level _______ status
PL3
63
The term protection of the president, includes not only the president himself, but
Widows of past presidents, the president or vice president elect, and any foreign head of state who is visiting the united states
64
Operational effectiveness is enhanced when ____ apply opsec from the earliest stages of planning.
Commanders and decision makers
65
The integrated defense effect that is achieved through intelligence analysis is
Anticipate
66
The integrated defense effect that is achieved through cognizance, readiness, and awareness of all AF personnel and an understanding of Threat, Tactics, Techniques, and Procedures is
Assess
67
Ideally, defense forces receive such good intelligence they are able to anticipate any and all threats, and the proffered method used is to
Deter
68
A person may not have access to classified information unless determined to have the proper security clearance and
Need to know
69
If ____ info appears in the public media, dod personnel must be careful not to make any statement or comment that would confirm the accuracy or verify the status of the info
Classified
70
The security level assigned to resources for which the loss or theft destruction or misuse or comprimise would damage US war fighting capability is
PL3
71
The three basic rules for AT personal protection is being alert, keeping a low profile, and
Being unpredictable
72
The point of contact between the air force and the us secret service is the
AFOSI
73
The act of obtaining, delivering, transmitting, communication, or receiving information about the national defense with the intent or reason to believe the info may be used to injure the US or to the advantage of any foreign nation, is
Espionage