UNIT 9 Flashcards Preview

UCT Test #1 > UNIT 9 > Flashcards

Flashcards in UNIT 9 Deck (14):
1

Five National Cyberspace Security Protocols

National Cyberspace Security Response System
National Cyberspace Security Threat and Vulner. Red.
National Cyberspace Security Awareness and Training
Securing Govt. Cyberspace
National Security and International Cyberspace Security Cooperation

2

According to Information Transport Systems (ITS), netD must provide the follwoing

Boundary protection
Intrusion/misuse detection
Internal Control
Access preservation
Authentication/encryption

3

What is the primary detection tool deployed across the Air Force Enterprise Network (AFEN)

Automated Security Incident Measurement (ASIM)

4

What are used to identify and report vulnerabiliteis at the host and network level to project networks directly managed by the NCC?

Internal Controls

5

Provides the capability to control the number of application session while preserving access to the base network

Access Preservation

6

Hosted on the SIPRNET and is a repository for all approved information systems utilized in the Air Force.

(PPS) Ports, Protocols and Services Database /Matrix

7

What enables system admins to have complete visibility to what is happening on their networks through pre-defined reports

Host Based Security Systems (HBSS)

8

HBSS examples

ePO ePolicy Orchestrator
Host Intrusion Prevention System (HIPS)
Device Control Module (DCM)
Policy Auditor (PA)
Rogue System Detection (RSD)

9

A piece of software that grabs all of the traffic flowing into and out of a computer attached to a network.

Sniffer

10

A barrier to keep those with less than friendly intentions away from your IS whether internal or external to your network.

Firewall

11

Used to allow remote access into otherwise private networks and resources

VPN

12

Two forms of encryption

Symmetric and asymmetric

13

____ key encryption is asymmetric and uses two keys ..public to encrypt and private to decrypt the data

Public

14

____key encryption uses is symmetric and uses only one secret key to perform encryption and decryption

Private