Week 1 Flashcards

(67 cards)

1
Q

Computer environment connected to one or more internal networks under control of a single authority.

A

Enclave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does an enclave consist of?

A
  • incident detection and response
  • key management
  • delivery of application
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are two environments of an enclave?

A

NE: networking environment
CE: computing environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give an example of a network environment

A

Switches, routers, networking backbone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What kind of users are at IAT Level 2 and what do they do?

A

SYSADMINS. They focus on threats and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a high priority alert that needs to be fixed by a certain date?

A

IAVA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are he two categories of threats?

A

Environmental

Human

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a vulnerability?

A

A weakness that has the POTENTIAL to be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many DIsA severity codes are there?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which DISA severity code is the most severe?

A

CAT 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many days do you have to fix a CAT 2?

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many days do you have to fix a CAT 3?

A

180

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many days do you have to fix a CAT 4?

A

1 year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who tries to exploit vulnerabilities on a system or network?

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What kind of people encore fear?

A

Cyber terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is self replicating and needs to be attached to something in order to affect a system?

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is self-propagating and does NOT need any user interaction?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a time and code related virus?

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an attempt to get credit card details and whatnot via email?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a prompt to forward emails?

A

Internet hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some password crackers,

A

Dictionary (thesaurus)

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are actions that need to be taken to continue operations if a disaster happens. Before during and after.

A

Contingency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the steps of risk management?

A

Assessment
Mitigation
Evaluation and continual assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the first step of risk management?

A

Assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the second step of risk management?
Mitigation
26
What is the third step of risk management?
Evaluation and continual assessment
27
What is step of risk assessment and what does it do?
Control Recommendations. It reduces the risk to an IS to an acceptable level of risk
28
What is the purpose of risk mitigation?
The analysis of safeguards
29
What does configuration management do?
Manage the effects of changes or differences in configurations in a network
30
What are the CM Steps?
``` Identify Change Evaluate Change Request Implement Decision Implement Approved Change Request Continuous Monitoring ```
31
What kind of fields does EMCON reduce?
Electromagnetic and acoustic
32
How often should scans be done?
Monthly
33
What CTO states how often scans should be done?
CTO 11-16
34
What are the two scanning tools?
ACAS | SCCVI
35
What is ACAS?
A SCAP compliant tool that meets federal requirements
36
What are the two components of ACAS?
Security Center Admin Suite | Nessus Professional Scanner
37
what is a government owned database for vulnerabilities?
NVD: national vulnerability database
38
What is a non-government vulnerability database?
OSVDB: open source vulnerability database
39
What is FISMA 2002?
DOH is responsible for federal systems guidance and security baselines
40
What kind of custom role are accessible to every organization within their security container?
Admin user
41
What would you find in an attribute set? Or what would kind of information would you enter?
Unit name Region AOR
42
What file types are reports generated?
.pdf .csv .rtf
43
Where are results from ACAS uploaded to?
VRAM: vulnerability remediation asset manager
44
What are the types of CASREPS?
Initial Update Correct Cancel
45
What are the troubleshooting steps?
1. Symptom Recognition 2. Symptom Elaboration 3. Listing the Probable Faulty Functions 4. Localize the Probable Faulty Function 5. Localize the Probably Faulty Component 6. Failure Analysis
46
What are two ways to fix a problem?
Alleviate: temporary fix Remediate: permanent fix
47
What should a trouble ticket include?
``` Name Location Cause Event Date Error code Systems affected If there is any fix or not ```
48
What is done at the application later of the TCP/IP model?
- Facilitate communications between software and lower level network services - session connection and data encryption
49
What layer provides the application layer with session and data gram communication services?
Transport Layer
50
What is stateless and transfers HTML documents?
HTTP
51
What is stateless and gets IPs from the host name?
DNS
52
What does ARP do?
Gets MAC address from IP address
53
In network mapping, what is done to get ports, procedures, and policies of a network?
OS fingerprinting
54
How does a hacker try and maintain access once in the system?
Covert channels Backdoors Rootkits
55
Who does the hacking? Legally? In the military?
NIOC
56
Two types of information gathering
Passive | Active
57
Provide some examples of passive information gathering
Web search Job searching Social networking
58
Provide some examples of active information gathering
Requires probing | SMTP headers
59
What must audit records include and how long are they kept for?
``` Kept for 1 year minimum Events Remote system access Audit files access Password hanged Device settings ```
60
What UNIX command is used to change permissions?
chmod
61
What does a SF-702 do?
Open/close check sheet for space or safe
62
What is an SF-70 used for?
Security checklist, daily check requirements
63
What are the three levels of COMSEC destruction?
Emergency Precautionary Plan Emergency Relocation Plan Emergency Destruction Plan
64
What SF is the UNCLASS sticker?
SF-710
65
What SF is the SECRET sticker?
SF-707
66
What can be done to assist in the EAP process?
- make as much as possible electronic - consolidate - reduce amount of material on hand
67
An unread notification on ACAS will show up as what?
Blue Dot