Week 1 Flashcards

1
Q

Computer environment connected to one or more internal networks under control of a single authority.

A

Enclave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does an enclave consist of?

A
  • incident detection and response
  • key management
  • delivery of application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are two environments of an enclave?

A

NE: networking environment
CE: computing environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give an example of a network environment

A

Switches, routers, networking backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of users are at IAT Level 2 and what do they do?

A

SYSADMINS. They focus on threats and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a high priority alert that needs to be fixed by a certain date?

A

IAVA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are he two categories of threats?

A

Environmental

Human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a vulnerability?

A

A weakness that has the POTENTIAL to be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many DIsA severity codes are there?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which DISA severity code is the most severe?

A

CAT 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many days do you have to fix a CAT 2?

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many days do you have to fix a CAT 3?

A

180

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many days do you have to fix a CAT 4?

A

1 year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who tries to exploit vulnerabilities on a system or network?

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What kind of people encore fear?

A

Cyber terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is self replicating and needs to be attached to something in order to affect a system?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is self-propagating and does NOT need any user interaction?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a time and code related virus?

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an attempt to get credit card details and whatnot via email?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a prompt to forward emails?

A

Internet hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some password crackers,

A

Dictionary (thesaurus)

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are actions that need to be taken to continue operations if a disaster happens. Before during and after.

A

Contingency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the steps of risk management?

A

Assessment
Mitigation
Evaluation and continual assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the first step of risk management?

A

Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the second step of risk management?

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the third step of risk management?

A

Evaluation and continual assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is step of risk assessment and what does it do?

A

Control Recommendations. It reduces the risk to an IS to an acceptable level of risk

28
Q

What is the purpose of risk mitigation?

A

The analysis of safeguards

29
Q

What does configuration management do?

A

Manage the effects of changes or differences in configurations in a network

30
Q

What are the CM Steps?

A
Identify Change
Evaluate Change Request
Implement Decision
Implement Approved Change Request
Continuous Monitoring
31
Q

What kind of fields does EMCON reduce?

A

Electromagnetic and acoustic

32
Q

How often should scans be done?

A

Monthly

33
Q

What CTO states how often scans should be done?

A

CTO 11-16

34
Q

What are the two scanning tools?

A

ACAS

SCCVI

35
Q

What is ACAS?

A

A SCAP compliant tool that meets federal requirements

36
Q

What are the two components of ACAS?

A

Security Center Admin Suite

Nessus Professional Scanner

37
Q

what is a government owned database for vulnerabilities?

A

NVD: national vulnerability database

38
Q

What is a non-government vulnerability database?

A

OSVDB: open source vulnerability database

39
Q

What is FISMA 2002?

A

DOH is responsible for federal systems guidance and security baselines

40
Q

What kind of custom role are accessible to every organization within their security container?

A

Admin user

41
Q

What would you find in an attribute set? Or what would kind of information would you enter?

A

Unit name
Region
AOR

42
Q

What file types are reports generated?

A

.pdf
.csv
.rtf

43
Q

Where are results from ACAS uploaded to?

A

VRAM: vulnerability remediation asset manager

44
Q

What are the types of CASREPS?

A

Initial
Update
Correct
Cancel

45
Q

What are the troubleshooting steps?

A
  1. Symptom Recognition
  2. Symptom Elaboration
  3. Listing the Probable Faulty Functions
  4. Localize the Probable Faulty Function
  5. Localize the Probably Faulty Component
  6. Failure Analysis
46
Q

What are two ways to fix a problem?

A

Alleviate: temporary fix
Remediate: permanent fix

47
Q

What should a trouble ticket include?

A
Name
Location
Cause
Event
Date
Error code
Systems affected
If there is any fix or not
48
Q

What is done at the application later of the TCP/IP model?

A
  • Facilitate communications between software and lower level network services
  • session connection and data encryption
49
Q

What layer provides the application layer with session and data gram communication services?

A

Transport Layer

50
Q

What is stateless and transfers HTML documents?

A

HTTP

51
Q

What is stateless and gets IPs from the host name?

A

DNS

52
Q

What does ARP do?

A

Gets MAC address from IP address

53
Q

In network mapping, what is done to get ports, procedures, and policies of a network?

A

OS fingerprinting

54
Q

How does a hacker try and maintain access once in the system?

A

Covert channels
Backdoors
Rootkits

55
Q

Who does the hacking? Legally? In the military?

A

NIOC

56
Q

Two types of information gathering

A

Passive

Active

57
Q

Provide some examples of passive information gathering

A

Web search
Job searching
Social networking

58
Q

Provide some examples of active information gathering

A

Requires probing

SMTP headers

59
Q

What must audit records include and how long are they kept for?

A
Kept for 1 year minimum
Events
Remote system access
Audit files access
Password hanged
Device settings
60
Q

What UNIX command is used to change permissions?

A

chmod

61
Q

What does a SF-702 do?

A

Open/close check sheet for space or safe

62
Q

What is an SF-70 used for?

A

Security checklist, daily check requirements

63
Q

What are the three levels of COMSEC destruction?

A

Emergency Precautionary Plan
Emergency Relocation Plan
Emergency Destruction Plan

64
Q

What SF is the UNCLASS sticker?

A

SF-710

65
Q

What SF is the SECRET sticker?

A

SF-707

66
Q

What can be done to assist in the EAP process?

A
  • make as much as possible electronic
  • consolidate
  • reduce amount of material on hand
67
Q

An unread notification on ACAS will show up as what?

A

Blue Dot