click below
click below
Normal Size Small Size show me how
IT Fundamentals
Block 5 Unit 7 - 20 April 2023
Question | Answer |
---|---|
Which security program is designed for protection of confidentiality, integrity, and availability? ________ | COMPUSEC |
When downloading a program from the Internet, which integrity measure ensures that the file was not altered during the download? ________ | Hashing |
Permissions, backups, fault tolerance, and clustering are solutions that can ensure what goal of the CIA Triad? ________________________ | Availability |
What solution helps maintain Availability by having multiple servers acting as one unit in case of failure? ____________________ | Clustering |
This is intentional deception designed to unlawfully deprive the Air Force of something of value. _____________________________________________ | Fraud, Waste, and Abuse (FW&A) |
TEMPEST is concerned with identifying vulnerabilities in information systems that could lead to what? ____________________________________________________ | Compromising emanations and their possible interception |
EMI is given off by all electronic devices. True or False? ____________ | True |
TEMPEST was designed to identify vulnerabilities by studying incidents of intentionally/unintentionally emitted signals? ____________________ | Unintentionally |
All TEMPEST standards require a strict _________________ separation | red/black |
What type of cabling systems are not required to meet TEMPEST separation requirements? _________________________________ | Fiber Optics |
Information Protection consists of what three core security disciplines? | 1. Personnel Security 2. Industrial Security 3. Information Security |
INFOSEC is designed to identify and protect classified security information and _______. | Controlled Unclassified Information |
What provides the public the right to request access to records from any federal agency? | Freedom of Information Act (FOIA) |
What unclassified designation of information is exempt from mandatory release to the public because it could cause a foreseeable harm? ________ | Classified |
The Privacy Act of 1974 prescribes the management, ___________, handling and denial of access to records. | access |
Which classification of information could cause exceptionally grave damage to national security if released? _________ | Top Secret |
Information classified Secret, if disclosed, could cause how much damage to national security? _________ | serious |
Top Secret information may be transmitted through which method(s)? | Top Secret cryptographic system |
The purpose of OPSEC is to reduce mission vulnerabilities by eliminating or reducing adversary collection of _______. | critical information |
OPSEC applies to all activities that prepare, sustain, or employ forces during which phases of operations? | all phases |
Operations Security (OPSEC) is a process of identifying, analyzing, and controlling what kind of information? | critical information |
Indicators are open-source information that can be pieced together by an adversary to derive what? | critical information |
One of the easiest ways for adversaries to gather information about military operations is what? | social media |
Its okay to send critical information through text messages because it's private. True or False? | False |
________ protection results from applying security measures to communications systems handling classified information. | COMSEC |
The conversion of data into a form that cannot be easily understood is known as _______. | encryption |
The restoration of encrypted data to its original plan text is known as _______. | decryption |
Cryptography is the use of coding systems to _____________ and ____________information | encrypt and decrypt |
Crypto analysis is the science of trying to break what? | coding system |
What program results from the proper use of cryptographic systems? | cryptosecurity |
TRANSEC results from all measure designed to protect transmissions by means other than what? | crypto analysis |
General Services Administration safes help to maintain what aspect of COMSEC? _________ | physical security |