Objective 3d Flashcards

1
Q

Defined as a weakness in an information system, cryptographic system, or components that could be exploited

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Using common, well-known code, software, operating systems, or hardware increases probability an attacker can exploit

A

Familiarity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Using weak passwords can be easily discovered using brute force

A

Password Management Flaws

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Programs that do not check user input can allow for unintended or direct execution of commands or SQL statements

A

Unchecked User Inputs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software packages that scan systems or networks for weaknesses

A

AF Vulnerability Assessment Tools (VATs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Automatically identifies configuration vulnerabilities threatening the security of DoD’s computer systems

A

Assured Compliance Assessment Solutions (ACAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Single Console access used by ACAS to manage Nessus scans at the enterprise network level, provides real-time detection of anomalies and critical events

A

Security Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Comprehensive vulnerability scanner which performs configuration scans of servers, network devices, and databases to test for specific policy settings and compliance

A

Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Monitors the network in real-time, searches out new hosts, applications, and vulnerabilities

A

Passive Vulnerability Scanner (PVS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DoD information system used to record, track, and disseminate critical vulnerability information

A

Vulnerability Management System (VMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Provide system and network administrators with proactive tools that can be used to identify vulnerabilities before an adversary can find them

A

Security Scans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Can detect out-of-date software, validate compliance, deviation from security policies.

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Piece of software designed to update or fix problems with a computer program or its supporting data

A

Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Applied to stand alone machine; time consuming, tedius

A

Local Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Uses an automated means to apply patches or

security fixes. Most efficient

A

Remote Patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Change applied to an asset to correct the weakness described by a vulnerability

A

Security Fix

17
Q

Prohibits the disclosure of information from a system
of records absent the written consent of the subject individuals unless the disclosure is pursuant of the twelve statutory exceptions

A

Privacy Act

18
Q

The intentional misleading or deceitful conduct that

deprives the Government of its resources or rights

A

Fraud

19
Q

The extravagant, careless or needless expenditure of

Government resources, resulting from improper or deficient practices, systems, controls or decisions

A

Waste

20
Q

The intentional, wrongful or improper use of Government resources

A

Abuse