SECNAVINST 5239.3B, DON IA POLICY Flashcards

1
Q

Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.

A

INFORMATION ASSURANCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who must complete DoD IA approved training as a condition of access?

A

All authorized users of DON Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who must control remote access to DON information systems and networks?

A

Commanders of DON organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary method for remote client-side authentication?

A

DoD PKI certificates, protected by a hardware token, such as the CAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

All computers used for remote access must have what approved protection including automated updates?

A

DoD approved antivirus and firewall protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Who will centrally manage and monitor DON IDS/IPS systems?

A

Navy Cyber Defense Operations Command(NCDOC) and Marine Corps Network Operations and Security
Center(MCNOSC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unless otherwise superseded by another SSIC, how long shall DON network audit records shall be retained for how long?

A

1 year (12 mos)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the preferred method to ensure confidentiality and integrity of remote connections?

A

Virtual Private Networks(VPNs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

All remote access to DON classified systems or networks shall utilize what approved COMSEC and keying material?

A

NSA-approved

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the primary identity credential support interoperable physical access to DON installations, facilities, buildings, and controlled spaces, and logon access to all unclassified DON networks?

A

Common access card(CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

All e-mail containing an attachment or embedded active content must contain what?

A

Digital Signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How often shall a Contingency Plan be exercised?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What process is designed to provide positive control of the vulnerability notification and corrective action process in the DoD?

A

Information Assurance Vulnerability Management(IAVM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How often shall all information systems must undergo information security reviews ?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the ability to maintain the confidentiality and integrity of DON classified information and unclassified information that has not been approved for public release?

A

Communications Security (COMSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who reports to the Secretary of the Navy(SECNAV) IA/CND issues and significant incidents?

A

DON CIO

17
Q

Who conducts all investigations regarding operations, practive programs, and related analyses of cyber incidents and targeting involving DON IT assets?

A

Director, NCIS

18
Q

Who collects, tracks, and reports threats to DON IT assets and disseminates the information to other law enforcement agencies, Department of Defense, Department of the Navy, DON CIO, and other national agencies as needed?

A

Director, NCIS