Information Assurance πŸ˜” Flashcards

1
Q

What is IA

A

Measures that protect and defend information and information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does IA assure

A

Availability , integrity, authentication, confidentiality, non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Electronic spillage

A

higher classified material is within a lower authorized domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

organizations that conduct vulnerability assessments

A

NIOC Norfolk, NAVY red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IDS

A

intrusion detection system.
Active - IPS -can stop intruder
Passive - IDS - can’t stop intruder

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malicious code

A

unauthorized code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zombie

A

computer connected to internet compromised by a hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Bot

A

controls the zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero day exploit

A

number of days to stop known vulnerability is 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

spyware

A

software enabling user to obtain secret information about a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

logic bomb

A

software that sets off a malicious function when specified conditions are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

keylogger

A

records key strokes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ATO

A

approval to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IATO

A

interim approval to operate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IAO

A

information Assurance officer

ensures appropriate operational IA posture is maintained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

CSI

A

Cyber security inspection

16
Q

Malicious code

A

Code in software intended for undesired effects

16
Q

Mitigation

A

Action reducing effect of network attack

16
Q

Penetration

A

Unauthorized attack bypassing security

16
Q

Probe

A

Learn networks vulnerability

16
Q

Port scan

A

Scans network for open ports for exploitation

16
Q

Pki

A

Public key infrastructure

17
Q

IAM

A

Information assurance manager - ENS Celaya

18
Q

IAO

A

Information assurance officer - ITC WILLIAMS

19
Navy blue team
Solidifies naval networks
19
Navy red team
Stimulates network attacks
20
IDS
Intrusion detection
21
IPS
Intrusion Prevention System
22
HBSS
Host based security system - detect and counter real time threats
23
Anti virus
Computer software to prevent detect and remove malware
24
JTT
Joint tactical terminal
25
River city affects
Email and internet
26
Secrel
Secret releasable - used to share secret data with allied nations
27
Social engineering
Manipulating people to give up confidential info
28
VPN
Virtual Private Network - secure encrypted tunnel to transmit data
29
Hub
Connection point for device to a network
30
Switch
Smarter multi port connection point for devices to network
31
Router
Forwards data packets along a network
32
Dadms
Listing of all authorized software for navy networks