Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

IT Fundamentals

Block 5 Unit 7 - 20 April 2023

QuestionAnswer
Which security program is designed for protection of confidentiality, integrity, and availability? ________ COMPUSEC
When downloading a program from the Internet, which integrity measure ensures that the file was not altered during the download? ________ Hashing
Permissions, backups, fault tolerance, and clustering are solutions that can ensure what goal of the CIA Triad? ________________________ Availability
What solution helps maintain Availability by having multiple servers acting as one unit in case of failure? ____________________ Clustering
This is intentional deception designed to unlawfully deprive the Air Force of something of value. _____________________________________________ Fraud, Waste, and Abuse (FW&A)
TEMPEST is concerned with identifying vulnerabilities in information systems that could lead to what? ____________________________________________________ Compromising emanations and their possible interception
EMI is given off by all electronic devices. True or False? ____________ True
TEMPEST was designed to identify vulnerabilities by studying incidents of intentionally/unintentionally emitted signals? ____________________ Unintentionally
All TEMPEST standards require a strict _________________ separation red/black
What type of cabling systems are not required to meet TEMPEST separation requirements? _________________________________ Fiber Optics
Information Protection consists of what three core security disciplines? 1. Personnel Security 2. Industrial Security 3. Information Security
INFOSEC is designed to identify and protect classified security information and _______. Controlled Unclassified Information
What provides the public the right to request access to records from any federal agency? Freedom of Information Act (FOIA)
What unclassified designation of information is exempt from mandatory release to the public because it could cause a foreseeable harm? ________ Classified
The Privacy Act of 1974 prescribes the management, ___________, handling and denial of access to records. access
Which classification of information could cause exceptionally grave damage to national security if released? _________ Top Secret
Information classified Secret, if disclosed, could cause how much damage to national security? _________ serious
Top Secret information may be transmitted through which method(s)? Top Secret cryptographic system
The purpose of OPSEC is to reduce mission vulnerabilities by eliminating or reducing adversary collection of _______. critical information
OPSEC applies to all activities that prepare, sustain, or employ forces during which phases of operations? all phases
Operations Security (OPSEC) is a process of identifying, analyzing, and controlling what kind of information? critical information
Indicators are open-source information that can be pieced together by an adversary to derive what? critical information
One of the easiest ways for adversaries to gather information about military operations is what? social media
Its okay to send critical information through text messages because it's private. True or False? False
________ protection results from applying security measures to communications systems handling classified information. COMSEC
The conversion of data into a form that cannot be easily understood is known as _______. encryption
The restoration of encrypted data to its original plan text is known as _______. decryption
Cryptography is the use of coding systems to _____________ and ____________information encrypt and decrypt
Crypto analysis is the science of trying to break what? coding system
What program results from the proper use of cryptographic systems? cryptosecurity
TRANSEC results from all measure designed to protect transmissions by means other than what? crypto analysis
General Services Administration safes help to maintain what aspect of COMSEC? _________ physical security
Created by: merrellm
Popular Military sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards