{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

3D1X1 Volume 3 Chap 2 Flashcards

(22 cards)

1
Q

What is symmetric systems and the advantages

A

It’s a secret key and has great speed but the key can be compromised during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Asymmetric systems and advantages and what is public and private keys

A

They are two keys public and private but they used a lot of time to decrypt long message … Public key is used for encryption and private key is used for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Verifies your identity message origin and content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificates

A

Digitally signed data structures that bind the identity of the cert holder to a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public key infrastructure (PKI)

A

A set of hardware, software, policies, and procedures used by CAs to create, manage, store, distribute, and revoke digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Repositories

A

Online facilities where CAs post certificates and certificate statues info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure socket later (SSL)

A

Internet protocol that allows protocols like http FTP and telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is 3DES

A

Uses 3 algorithms … E individual keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Skipjack

A

Symmetric encryption/decryption that users 80 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is AES and what did it replace

A

It replace DES as the government standard in 2002 because it uses 128 bit 192 bit and 256 bit key lengths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is COMSEC

A

Deny unauthorized persons information derived from information systems of the U.S. Government related to national security and ensure the authenticity of these information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What form is used for COMSEC package and how many?

A

SF 153 COMSEC Material Report and 3 of these forms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SF 702?

A

Security container check sheet … Annotates opening and closing of the secure container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is AF Form 1109?

A

Visitor register log which is used to record visitors into restricted areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the security core of the STE

A

KOV-14 (Fortezza card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the difference between PSTN AND ISDN?

A

PSTN - is a standard telephone line

ISDN - is a high speed digital line capable of sending data at 128 Kpbs

17
Q

What can be removed from the KIV-7 cryptographic device ?

A

Cryptographic ignition key (CIK) and prevents unauthorized access and protects all internally stored keys and has the highest classification level of the keying material

18
Q

How many TACLANE ARE THERE?

A

TACLANE Classic
TACLANE -E100
KG-175D TACLANE micro

19
Q

What is the KOI-18 general purpose tape reader

A

A hand held paper tape reader fill device for loading crypt keys into security devices. It can read 8 lever paper or polyester tape and is battery powered with no internal memory and loads different key lengths like 128 keys

20
Q

Integrated maintenance day system (IMDS)

A

Used for tracking purposes and uses REMIS permits base level logistics data to be rolled up to the AF level

21
Q

What is Asset inventory management (AIM)

A

Part of AFEMS and is used for tracking purposes

22
Q

What is AFI 33-119

A

Guidance for messaging email accounts etc