click below
click below
Normal Size Small Size show me how
IT Fundamentals
Block 1 Unit 3 - Mar 2023
| Question | Answer |
|---|---|
| _____________ establishes policy and may provide general procedures for implementing policy. | DoDIs (42) |
| _____________ consist of procedures that usually contains examples for performing specific tasks, may be separated into volumes, and may contain a policy section. | DoDMs (43) |
| _________________________provides and implements guidance and procedures on policies dictated by Air Force Policy Directive, DODIs, DODMs and other policy documents. | AFIs (44) |
| _____________are consensus-based industry standards for a wide variety of Information and Communication Technologies (ICT) products. | TIA Standards (45) |
| _________is a defense standard that establishes uniform engineering and technical requirements for military-unique or substantially modified commercial processes,procedures, practices, and methods. | MIL STD (47) |
| A ____________ is a Department of Defense security standard that is managed by the Defense Information Management Agency (DISA). | STIG (48) |
| ____________ vulnerabilities can allow unauthorized access to classified data or facilities, and can lead to a denial of service or access. | CAT I |
| _____________ vulnerabilities can result in loss of confidentiality, availability, or integrity. | CAT II |
| ______________ vulnerabilities degrades measures to protect against loss of confidentiality,availability, or integrity. | CAT III |
| How are STIGS viewed? __________________________________________________ | STIG Viewer from STIG site |