Term
What wireless device is used for exchanging two-way emails, is a secure/multipurpose Internet mail extension and NSA-approved device for sensitive but unclassified information within DoD? |
|
Definition
|
|
Term
What VPN Architecture does not require secondary authentication? |
|
Definition
|
|
Term
Which encapsulation protocols allows authentication of the sender? |
|
Definition
Authentication Header (AH) |
|
|
Term
Which encapsulation protocols supports authentication of the sender and encryption of data? |
|
Definition
Encapsulating Security Protocol (ESP) |
|
|
Term
What is an automated protocol to negotiate, create and manage security associations Between two computers? |
|
Definition
Internet Key Exchange (IKE) |
|
|
Term
IKE SAs are established in two phases. What is the only mode in phase two? |
|
Definition
|
|
Term
The Risk Management process includes what? |
|
Definition
Risk Assessment Risk Mitigation Evaluation and Continual Assesment |
|
|
Term
What publication is the Standards for Security Categories of Federal Information and Information Systems? |
|
Definition
|
|
Term
Who must give written approval for high risk software before use? |
|
Definition
|
|
Term
What is the solution security analysis? |
|
Definition
should be conducted during certification and accreditation proccess |
|
|
Term
The ISSM is responsible for developing what? |
|
Definition
locally needed backup plans that consider data-production rates and data-loss risks when under development |
|
|
Term
What does CTTA stand for? |
|
Definition
Certified Tempest Technical Authority |
|
|
Term
All facilities processing Sensitive Compartmental Information(SCI) will be reviewed by what for initial TEMPEST accreditation? |
|
Definition
Certified Tempest Technical Authority(CTTA) |
|
|
Term
What does CC/S/A stand for? |
|
Definition
Combatant commands, services and agencies |
|
|
Term
|
Definition
|
|
Term
What are the objectives of ST&E? |
|
Definition
to uncover design, implementation and operational flaws that could allow the violation of security policy, determine the adequacy of security mechanisms, assurances and other properties to enforce the security policy, and assess the degree of consistency between the system documentation and its implementation. |
|
|
Term
What are the INFOCON levels? |
|
Definition
Normal Alpha Bravo Charle Delta |
|
|
Term
|
Definition
Calls for maximum CND force readiness |
|
|
Term
Do administrative login errors require a reportable incident? |
|
Definition
|
|
Term
|
Definition
Failure to comply with policy |
|
|
Term
What are some ways to protect a work station? |
|
Definition
|
|
Term
What are the various factors of protection levels? |
|
Definition
Clearance levels Need to know formal access |
|
|
Term
|
Definition
A baseline of user activity that is considered a routine level of user errors |
|
|
Term
What happens when you exceed a clipping level? |
|
Definition
A violation record is produced |
|
|
Term
Which criteria does the DoD require alarms, signals and reports? |
|
Definition
System techs are trained periodically |
|
|
Term
What is critical infrastructure? |
|
Definition
any asset that the incapacitation or destruction of which would have a negative impact on the IS |
|
|
Term
Which DoD-Cert is Just a notification? |
|
Definition
|
|
Term
|
Definition
Evaluation Assurance Levels, convenient reference for the amount of analysis and testing performed on a product. |
|
|
Term
How often do you need to re-accredited an IS? |
|
Definition
|
|
Term
What is the difference between certification and accreditation? |
|
Definition
Certification = validation Accreditation = approval |
|
|
Term
What are the three access controls? |
|
Definition
|
|
Term
|
Definition
has to be authorized by owner |
|
|
Term
Where do you remove a virus from? |
|
Definition
|
|
Term
What is the significance of 1996? |
|
Definition
|
|
Term
What is the Economic Espionage act? |
|
Definition
Protects intellectual property and prevents the theft of trade secrets |
|
|
Term
What is penetration testing used for? |
|
Definition
|
|
Term
Type analysis performed during testing is tempest for what? |
|
Definition
|
|
Term
What are two types of audience? |
|
Definition
|
|
Term
How can you make training more effective? |
|
Definition
targeting specific audience |
|
|
Term
What are two ways the security inspections can be performed? |
|
Definition
|
|
Term
What should be done when reviewing incident data? |
|
Definition
Review security logs internal and external policies and report to IAO |
|
|
Term
Is it the responsibility of the ISSM to review and approve contingency plan? |
|
Definition
|
|
Term
What are the responsibilities of the ISSM? |
|
Definition
Periodically scheduled security training Disaster recovery Conduct contingency plan |
|
|
Term
|
Definition
Data Compromise and spillage |
|
|
Term
Using Data analyzers and sniffers, can you make a permanent record of network activity? |
|
Definition
|
|
Term
If automated auditing is not available, the ISSM/SA must get approval from who, to conduct manual audits? |
|
Definition
|
|
Term
What determines the risk to the system, the likelihood security controls may not work and the impact? |
|
Definition
|
|
Term
What is high risk software? |
|
Definition
public domain, demonstration software, and embedded software not obtainded through official channels |
|
|
Term
Which access requires the most stringent security controls? |
|
Definition
|
|
Term
Which automated tool can be used by applications to look for evidence of data tampering? |
|
Definition
Use of alarms, signals, and reports by DoD |
|
|
Term
What is the purpose of monitoring? |
|
Definition
identify security events that could impact the operations of a computer facility. |
|
|
Term
What is the web-based application used to track IAVAs for DISA? |
|
Definition
Vulnerability Compliance Tracking System |
|
|
Term
What does DISA stand for? |
|
Definition
Defense Information Systems Agency |
|
|
Term
|
Definition
responsible for implementing the guidance internally, as well as having overall responsibility for the IAVA process throughout DoD |
|
|
Term
What does DISA develop and provide? |
|
Definition
security configuration guidance for IA and IA-enabled IT products in coordination with the Director of the National Security Agency, or NSA |
|
|