NST Chap 19 Flashcards Preview

WAPS Testing > NST Chap 19 > Flashcards

Flashcards in NST Chap 19 Deck (73):
1

Information assurance refers to the measures that protect and defen information and information systems by ensuring their availability, integrity, confidentiality, authentication, and

Nonrepudidation

2

When accessing internet based capabilities using Federal Govenment resources in an authorized personal or unofficial capacity, individuals shall comply with operations security guidance in AFI

10-701

3

The AF implements and maintains the information assurance program to ____ its information and information technology assets

Secure

4

Security applies to

All members of the aF at all times

5

An information system in any telecommunications and or computer related equipment or ______ or subsystem o equipment

Interconnected system

6

A ______ is an action, device, procedure, technique, or other measure that reduces the vulnerability to an acceptable and manageable level

Countermeasure

7

Remember, not all threats to our national security are conventional in

Nature

8

The air force must protect information systems including network servers from

Malicious logic

9

Devices that are information systems, such as portable electronic devices are classified as

Mobile computing devices

10

A component of communications security resulting from the provision and proper use of technically sound cryptosystems is

Cryptosecurity

11

The level of security classification expected with the unauthorized disclosure of information that could cause exceptionally grave danger to national security is

Top Secret

12

The level of unauthorized disclosure of information that could cause serious damage to national security is

Secret

13

Computer security consists of measures and controls that ensure confidential, integrity, availability of

Information system assets

14

Opsec is the process of identifying critical friendly information and ____ friendly actions related to operations, acquisitions, and other activities

Analyzing

15

OPSEC strives to eliminate or reduce to an acceptable level the vulnerabilities of friendly information to the adversary

Exploitation

16

A goal of OPSEC is to identify information and _______ relating to mission capabilities, limitations, and intentions in order to prevent exploitation by potential adversaries

Observable actions

17

The type of mail service used for transmitting classified or sensitive unclassified information is _____ mail

Registered

18

The level of unauthorized disclosure of information that could cause damage to national security is

Confedential

19

Communication security physical security results from all physical measures necessary to safeguard ______ from access are observation by unauthorized persons

Classified equipment, material, and information

20

OPSEC is a process and not a collection of specific rules and instructions that ____ applied to every operation

Can be

21

All measures taken to deny unauthorized persons information of value that might be derived from intercept and analysis of intelligence -bearing signals is ______ security

TEMPEST

22

OPSEC is incorporated into day to day activities to ensure a seamless transition to deny potential exploitation of _____ and observable actions

Contingency operations

23

The individual responsible for OPSEC awareness throughout their organizations and for integrating the OPSEC process throughout all mission areas is the

Commander

24

The OPSEC process consists of _____ distinct steps

5

25

Original classification is the initial decision that an item of information could cause ____ to the national security

Damage

26

Banner lines are conspicuously placed at the top and bottom of the outside of the front cover title page, first page, and on the outside of the back cover or last of each classified document. Where can examples of these be found?

DoDM 5200.01 Volume 2

27

Do not use public computing facilities or services to process government owned ______ information

Unclassified, sensitive, or classified

28

The most commonly used controlled unclassified information category in the AF and DoD is

For Official Use Only

29

ID does not stand alone to protect personnel and resources, planners create an effective security program by coordinating with other

DoD and AF programs

30

Classification markings must be

Conspicuous

31

The final responsibility for determining whether an individual has a valid need to access information designated for Official Use Only status ress with the

Person having authorized possession of the controlled information

32

Markings and designations serve the purpose of indicating the ____ of classification assigned to the information

Level

33

The overal classification will be marked, stamped, or affixed on the ____ cover

Front

34

Classified information must be protected at all times either by _____ it in an approved device or facility or having it under the personal observation and control of an authorized individual

Storing

35

A _____ analysis incorporates all factors of a terrorist groups existence, capability, intentions, history, and targeting

Threat

36

The ____ is the area from which a threat can launch an attack against base personnel and resources or acft approaching or departing the base

Base security zone

37

Classified documents must be marked with

One of the three levels of classification, and the agency, office of origin, and date

38

Air force embers are subject to serious penalties if classified information is

Purposely or negligently disclosed or comprimised

39

The AF policy within industrial security is to identify in its classified contracts specific government information and sensitive resources that must be protected against compromise or loss

While entrusted to industry

40

The synchronization of integrated defense operations with emergency and consequence management activities articulated in applicable AF and DoD publications is the responsibility of the ____ commander

Defense Force

41

When removing classified documents from storage, they must be

Kept under constant surveillance and protected, and covered with a classified document cover sheet

42

OPSEC methodology provides a step by step analysis of operations and behavior from an adversary's perspective, thereby assessing how _____ may be exploited

Vulnerabilities

43

The base defense operations center is the command and control center for integrated defense operations during routine and

Emergency operations

44

The integrated defense effect that is achieved through deliberate layers of defensive applications designed to progressively weaken or hinder the enemy's effort is

Delay

45

The integrated defense risk management process that is the most important step is

Step 7

46

Outside the united states, AFOSI coordinates its the CIA and the _____ when appropriate.

FBI

47

The type of information to repot to the secret service concerning the protection of the president and others includes information that reveals a plot to cause a civil disturbance or ______

Terrorist act

48

In regards to incident reporting, contact means any _______ of information directed to an individual, including solicited or unsolicited telephone calls, email, radio contact, and face to face meetings.

Exchange

49

The personnel security program involves determining the trustworthiness of individuals before they have access to classified information or are being assigned

To sensitive duties

50

The human intelligence effort that is the systematic effort to produce information to answer specific collection requirement by direct and indirect questioning techniques of a person who is in the custody of the forces conducting the questioning is

Interrogation

51

The ______ initiates and conducts all CI investigations, operations, collections, and other related activities for the Air Force

AFOSI

52

Information on personnel security program management is found in AFI

31-501

53

Anyone finding classified material out of proper control must take custody of and ___ the material

Safeguard

54

Implementation and compliance with industrial security procedures is ensured by the

Installation commander

55

The instructions that govern the industrial security program management are contained in AFI

31-601

56

The human intelligence effort that is designated and fully trained military human intelligence collection personnel may develop information through the elicitation of sources, to include 'walk-in' sources, is

Source operations

57

The human intelligence effort that is the process of questioning cooperation human sources to satisfy intelligence requirements is

Debriefing

58

Security protection level that is assigned to those resources for which loss, theft, destruction, misuse, or compromise would gravely harm the strategic capability of the US is

PL1

59

Security protection level that is assigned to nonnuclear alert forces is

PL2

60

Personnel security clearances are recorded in the

Joint personnel adjudication system (JPAS)

61

The purpose of ____ is to reduce the vulnerability of AF missions from successful adversary collection and exploitation of critical information.

OPSEC

62

No alert resources or weapon systems that can be generated to alert status are assigned security level _______ status

PL3

63

The term protection of the president, includes not only the president himself, but

Widows of past presidents, the president or vice president elect, and any foreign head of state who is visiting the united states

64

Operational effectiveness is enhanced when ____ apply opsec from the earliest stages of planning.

Commanders and decision makers

65

The integrated defense effect that is achieved through intelligence analysis is

Anticipate

66

The integrated defense effect that is achieved through cognizance, readiness, and awareness of all AF personnel and an understanding of Threat, Tactics, Techniques, and Procedures is

Assess

67

Ideally, defense forces receive such good intelligence they are able to anticipate any and all threats, and the proffered method used is to

Deter

68

A person may not have access to classified information unless determined to have the proper security clearance and

Need to know

69

If ____ info appears in the public media, dod personnel must be careful not to make any statement or comment that would confirm the accuracy or verify the status of the info

Classified

70

The security level assigned to resources for which the loss or theft destruction or misuse or comprimise would damage US war fighting capability is

PL3

71

The three basic rules for AT personal protection is being alert, keeping a low profile, and

Being unpredictable

72

The point of contact between the air force and the us secret service is the

AFOSI

73

The act of obtaining, delivering, transmitting, communication, or receiving information about the national defense with the intent or reason to believe the info may be used to injure the US or to the advantage of any foreign nation, is

Espionage