Unit 2b Flashcards

1
Q

Purpose of various incident and vulnerability reporting processes is to improve overall security posture of AF Enterprise Network (AFEN), AF information systems, and stand-alone computing devices through quick positive control and reporting of network as well as information system incidents

A

Incident Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Includes network/system incidents such as intrusions, scans, probes, and malicious logic events

A

Incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Weakness in information system, cryptographic system, or components that could be exploited

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

End users and AF network professionals must report all identified incidents and vulnerabilities, which groups should be informed?

A

Network Operations & Security Center (NOSC) and NCC personnel, Functional System Administrators (FSA), Work Group Managers, Information System Security Officers (ISSO), Information Systems Security Managers (ISSM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Mark all unclassified reports as “For Official Use Only” (FOUO) and
protect report from public distribution under Freedom of Information
Act.

A

Unclassified Report Guidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Include attempted entry, unauthorized entry, and attacks on information system

A

Incident Categories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Review of critical audit logs by network professionals

A

Incident Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NCCs, NOSCs, and AFNOSC record suspicious and unauthorized network as well as information systems access and activity

A

Incident Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ASIM sensors utilized to monitor various enclaves that make up AFEN

A

ASIM-Identified Incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

All end users accessing AFEN are required to report unusual network, information system, and stand-alone computing device events suspected to stem from some form of malicious logic

A

Malicious Logic Incidents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly