Unit 4 Flashcards

1
Q

TIA standard ________________ specifies the minimum requirements for telecommunications infrastructure in regards to data centers and computer rooms.

A

TIA-942

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TIA standard __________ defines structured cabling system standards, for commercial offices and between switches in campus or campus-like environments.

A

TIA-568-D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

TIA-569-C is a Commercial Building Standard which standardizes specific pathway and ______ ______ and ___________ practices in support of telecommunications media and equipment within buildings.

A

Space design, construction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List what physical security requirements for a facility are dependent upon?

A
  1. Type and level of the information handled in a facility
  2. Type of equipment
  3. Mission of the unit
    4 Duty hours of the facility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List and define the three limited access areas.

A

Control Area- requires identification to get access- ex: base

Restricted Area- an area under military jurisdiction in which special security measure are employed- ex:flightlin

No Lone Zone- areas are required to be occupied by two or more appropriately cleared individuals who remain within sight of each other- ex: Classified burn or shred area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is your main role when it comes to facility security?

A

To know the requirements of my unit of assignment and apply common sense security practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What activities does OPSEC apply to?

A

Operation Security applies to all activities that prepare, sustain, or employ forces during all phases of operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OPSEC is the process of __________, _______________, and ______________ critical information indicating friendly actions associated with military operations and other activities.

A

Identifying, analyzing, and controlling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Failure to properly implement OPSEC measures can result in what four things?

A
  1. Serious Injury/death to personnel
  2. Damage to weapons systems, equipment, and facilities
  3. Loss of sensitive technologies
  4. Mission degradation or failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Critical information is best identified by _____________________ responsible for the planning and execution of the organization’s missions.

A

The individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A(n) __________ is a friendly detectable action and open source information that can be interpreted or pieced together by an adversary to derive critical information.

A

Indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one of the easiest ways for our adversaries to gather information about military operations?

A

Social Media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which IA protective measure is defined as restricting system maintenance to only authorized personnel?

A

Controlling Maintenance Activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Configuration Management

A

Ensure timely issuance and installation of software patches, system security enhancements, and configuration modifications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious Logic Protection

A

Protect information systems from malicious logic attacks(viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

User Awareness Training

A

All authorized users will receive initial IA orientation and annual awareness training to ensure they know, understand, and apply the IA requirements of Air Force information and information systems.

17
Q

COMSEC Protection results from applying what security measures?

A

Cryptosec, Transec, and Emission security

18
Q

_________________ is the use of coding systems to encrypt and decrypt information.

A

Cryptography

19
Q

When safeguarding COMSEC information, what three issues are considered as additional physical security threats?

A

Improper destruction of waste, improper handling, and unauthorized viewing or possession of COMSEC material

20
Q

What program is designed to identify vulnerabilities by studying incidents of unintentionally emitted signals and searching for ways to correct this significant problem?

A

TEMPEST

21
Q

Which Protected Distribution System (PDS) affords significant security protection to the telecommunication lines and how?

A

Hardened Distribution System. Alarmed carrier, hardened conduit, constantly viewed area

22
Q

All security measures taken to protect AF information systems fall under what security program?

A

COMPUSEC

23
Q

Unauthorized access involves an unauthorized person gaining access to _______ _______, _______, or the information stored and processed by a computer system

A

Computer hardware, software

24
Q

________ _________ is the primary means of preventing unauthorized access to a computer system.

A

Password Protection

25
Q

What is a second, more common threat to computer systems, and what 3 ways can it be conducted?

A

Malicious logic

Computer viruses, spyware, and steal-ware

26
Q

What is the most effective way to detect and eliminate viruses?

A

Antivirus software or virus scanners

27
Q

______, _________, _____________ results from any intentional deception designed to unlawfully deprive the Air Force of something of value

A

Fraud, Waste, and Abuse

28
Q

Which DoD system provides a structured, operational approach to uniformly increase or decrease a defensive posture, defends against unauthorized activity, and mitigate sustained damage to the Defense Information Infrastructure?

A

INFOCON

29
Q

How many INFOCON conditions are there?

A

5

30
Q

INFOCON _____________ is normal readiness

A

5

31
Q

INFOCON _____________is maximum readiness

A

1