click below
click below
Normal Size Small Size show me how
IT Fundamentals
Block 5 Unit 7 - 20 April 2023
| Question | Answer |
|---|---|
| Which security program is designed for protection of confidentiality, integrity, and availability? ________ | COMPUSEC |
| When downloading a program from the Internet, which integrity measure ensures that the file was not altered during the download? ________ | Hashing |
| Permissions, backups, fault tolerance, and clustering are solutions that can ensure what goal of the CIA Triad? ________________________ | Availability |
| What solution helps maintain Availability by having multiple servers acting as one unit in case of failure? ____________________ | Clustering |
| This is intentional deception designed to unlawfully deprive the Air Force of something of value. _____________________________________________ | Fraud, Waste, and Abuse (FW&A) |
| TEMPEST is concerned with identifying vulnerabilities in information systems that could lead to what? ____________________________________________________ | Compromising emanations and their possible interception |
| EMI is given off by all electronic devices. True or False? ____________ | True |
| TEMPEST was designed to identify vulnerabilities by studying incidents of intentionally/unintentionally emitted signals? ____________________ | Unintentionally |
| All TEMPEST standards require a strict _________________ separation | red/black |
| What type of cabling systems are not required to meet TEMPEST separation requirements? _________________________________ | Fiber Optics |
| Information Protection consists of what three core security disciplines? | 1. Personnel Security 2. Industrial Security 3. Information Security |
| INFOSEC is designed to identify and protect classified security information and _______. | Controlled Unclassified Information |
| What provides the public the right to request access to records from any federal agency? | Freedom of Information Act (FOIA) |
| What unclassified designation of information is exempt from mandatory release to the public because it could cause a foreseeable harm? ________ | Classified |
| The Privacy Act of 1974 prescribes the management, ___________, handling and denial of access to records. | access |
| Which classification of information could cause exceptionally grave damage to national security if released? _________ | Top Secret |
| Information classified Secret, if disclosed, could cause how much damage to national security? _________ | serious |
| Top Secret information may be transmitted through which method(s)? | Top Secret cryptographic system |
| The purpose of OPSEC is to reduce mission vulnerabilities by eliminating or reducing adversary collection of _______. | critical information |
| OPSEC applies to all activities that prepare, sustain, or employ forces during which phases of operations? | all phases |
| Operations Security (OPSEC) is a process of identifying, analyzing, and controlling what kind of information? | critical information |
| Indicators are open-source information that can be pieced together by an adversary to derive what? | critical information |
| One of the easiest ways for adversaries to gather information about military operations is what? | social media |
| Its okay to send critical information through text messages because it's private. True or False? | False |
| ________ protection results from applying security measures to communications systems handling classified information. | COMSEC |
| The conversion of data into a form that cannot be easily understood is known as _______. | encryption |
| The restoration of encrypted data to its original plan text is known as _______. | decryption |
| Cryptography is the use of coding systems to _____________ and ____________information | encrypt and decrypt |
| Crypto analysis is the science of trying to break what? | coding system |
| What program results from the proper use of cryptographic systems? | cryptosecurity |
| TRANSEC results from all measure designed to protect transmissions by means other than what? | crypto analysis |
| General Services Administration safes help to maintain what aspect of COMSEC? _________ | physical security |