Section 17D--Information Access, Cyber Security, and Mobility Flashcards

1
Q

What time period must system of records notices be published in the federal register to allow the public to comment?

A

30-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When may Department of Defense personnel disclose records to other federal government agencies or individuals?

A

When a discloser of records is a “routine use” published in the system of records notices or as authorized by a Privacy Act exception

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What mandatory time limits does the Freedom of Information Act impose to either deny the request or release the requested records?

A

20 workdays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which publication provides specific policy and procedures and Freedom of Information Act and for guidance on disclosing records to the public?

A

DoDM 5400.07-R and AFMAN 33-302

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What disciplines comprise Cybersecurity?

A

a) Air Force Risk Management Framework
b) IT controls/countermeasures
c) Communications security
d) TEMPEST (formerly EMSEC)
e) Af Assessment and Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What disciplines comprise Cybersecurity?

A

a) Air Force Risk Management Framework
b) IT controls/countermeasures
c) Communications security
d) TEMPEST (formerly EMSEC)
e) AF Assessment and Authorizatio Cybersecurity Workforce Improvement Program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which AFI describes risk management and cybersecurity as representations of dynamic, multi-disciplinary sets of challenges?

A

AFI 17-130, Cybersecurity Program Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ensured when cybersecurity capabilities are balanced, including safety, reliability, interoperability, and ease of use, while maximizing performance, as well as promoting transparency and interoperability with USAF mission partners?

A

Opertional agility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the five functions of the Air Force Cybersecurity Program

A

1) identify
2) Protect
3) Detect
4) Respond
5) Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

T or F? Limited personal use may be of any duration and frequency as long as it does not adversely affect performance of official duties, overburden systems, or reflect adversely on the USAF or DOD

A

Falce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are three steps involved in protecting information systems from viruses and other forms of malicious logic? These steps include a combination of human and technological countermeasures to ensure the protection is maintained throughout the lifecycle of the information system.

A

1) infection
2) Detection
3) Reaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What refers to measures and controls taken to deny unauthorized persons information derived from information systems of hte US GOvernment related to national security and to ensure the authenticity of such information systems?

A

Communications security COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What results from applying security measures to communications and information systems generating, handling, storing, processing, or using classified or sensitive information, the loss of which could adversely affect national security interests?

A

Communications security protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is communications security resulting from the use of all physical measures necessary to safeguard communications security material from access by unauthorized persons?

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the area in which it would be difficult for an adversary with specialized equipment to attempt to intercept compromising emanations without being detected?

A

Inspectable space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly