100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Computer Network Defense Exam Questions and Answers Latest Update Graded A -

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
12-10-2024
Written in
2024/2025

Computer Network Defense Exam Questions and Answers Latest Update Graded A - USCYBERCOM - Answers DoD organization that plans, coordinates, integrates, syncs, and conducts active full-spectrum military cyberspace operations National Cyber Security Division (NCSD) - Answers Government organization that works collaboratively with public, private and international entities to secure cyberspace and America's cyber assets US Computer Emergency Readiness Team (US-CERT) - Answers Partnership between DHS and the public/private sectors charged with protecting our nation's Internet infrastructure by coordinating defense against and response to cyber attacks National Institute for Standards and Technologies (NIST) CSD - Answers Provides standards and technology to protect information systems against threats to the confidentiality of information, integrity of information and processes, and availability of information Common Vulnerabilities and Exposure (CVE) - Answers Academic organization that standardizes names for all publicly known vulnerabilities and security exposures Global Information Grid (GIG) - Answers Globally interconnected, integral part of the overall C&C structure that incorporates all other networks NIPRNET - Answers Unclassified but Sensitive Network SIPRNET - Answers Secret Network JWICS - Answers TS SCI Network DISA - Answers Agency responsible for planning, engineering, acquiring, fielding, and supporting global net-centric solutions for the war fighter Computer Network Defense Tasking Order (CTO) - Answers Provides guidance and direction to units under USCYBERCOM'S Operational Control Information Assurance Vulnerability Alert (IAVA) - Answers Address sever network vulnerabilities resulting in immediate and sever threats Information Assurance Vulnerability Bulletin (IAVB) - Answers Address new vulnerabilities that do not pose an immediate risk Technical Advisories (TA) - Answers Addresses vulnerabilities that are generally categorized as low-risk INFOCON 5 - Answers Routine NetOps, 180-day cycle, least severe INFOCON 4 - Answers Increased readiness in prep for ops or exercises, 90-day cycle INFOCON 3 - Answers Increased validation of information network and configuration, 60-day cycle INFOCON 2 - Answers Increased validation of information network and configuration, 30-day cycle INFOCON 1 - Answers Highest readiness condition, most severe, 15-day cycle Incident - Answers Assessed occurrence having actual or potentially adverse effects on an information system (every Event) Event - Answers Any observable occurrence in a system not yet assessed that may affect system performance Three Phases of Incident Handling Methodology - Answers Detect (antivirus, chain of custody), Analyze (Operation/Technical Impact), Respond (eradicate risk) IA Triad - Answers Confidentiality, Integrity, Availability Authentication - Answers The way you prove to the system that you are who you say you are Three Methods of Authentication - Answers Something you know, Something you have, Something you are Non-repudiation - Answers Proves that a message has been sent and received Implementation of Access Controls - Answers Administrative (written policies), Technical (firewalls, IDS), Physical (door locks, guards) Mandatory Access Control (MAC) - Answers A means of restricting access to objects based on the sensitivity of the information (clearance) Discretionary Access Control (DAC) - Answers Restriction of objects determined by the data owner Role-based Access Control (RAC) - Answers Based on an organization's roles or job functions (base to base change) Rule-based Access Control - Answers Relies on specific rules that are associate with an object (firewalls) Three Elements of Defense in Depth - Answers People, Technology, Operations Three Defense Focus Areas - Answers Network/Infrastructure, Enclave Boundaries (IDS), Computing Environment (PKIs) Passive Attacks - Answers Monitoring of unprotected communications Active Attacks - Answers Attempts to circumvent or break protection features, insert malicious code, or steal/modify information Insider Attacks - Answers Can be malicious or non-malicious Cryptosystem - Answers Device or mechanism that performs encryption Cipher Text - Answers Plain text that has been encrypted Cryptographic Algorithm - Answers Defines a mathematical function or process that determines operations Stream Cipher - Answers Encrypts on bit at a time Block Cipher - Answers Encrypts chunks at a time Key Space - Answers Refers to the key size itself pertaining to how many possible combinations there are Symmetric Key Algorithms - Answers Uses one key to perform both encryption and decryption Asymmetric Key Algorithms - Answers Uses a public key and private key on each end, for four keys total used Hash - Answers An algorithm that transforms any variable input and returns a fixed-size string Examples of Symmetric Key Algorithms - Answers DES variants, RC variants, Blowfish Examples of Asymmetric Key Algorithms - Answers RSA, Diffie Hellmen Examples of Message Digest Algorithms - Answers MD variants, SHA, Snefru Specification/Standard for Digital Certificates - Answers X.509 Secure Shell's Default Encryption - Answers 3DES SSL Default Port - Answers 443 SSL Client "Hello" Message Components - Answers Protocol Version (SSL2, TLS) Random Session ID Cipher Suite (RC4, MD5) Compression Method File Infector - Answers Virus that infects EXE and COM files, can be memory resident

Show more Read less
Institution
Computer Networking
Course
Computer Networking









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Computer Networking
Course
Computer Networking

Document information

Uploaded on
October 12, 2024
Number of pages
6
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Computer Network Defense Exam Questions and Answers Latest Update Graded A -

USCYBERCOM - Answers DoD organization that plans, coordinates, integrates, syncs, and conducts
active full-spectrum military cyberspace operations

National Cyber Security Division (NCSD) - Answers Government organization that works collaboratively
with public, private and international entities to secure cyberspace and America's cyber assets

US Computer Emergency Readiness Team (US-CERT) - Answers Partnership between DHS and the
public/private sectors charged with protecting our nation's Internet infrastructure by coordinating
defense against and response to cyber attacks

National Institute for Standards and Technologies (NIST) CSD - Answers Provides standards and
technology to protect information systems against threats to the confidentiality of information, integrity
of information and processes, and availability of information

Common Vulnerabilities and Exposure (CVE) - Answers Academic organization that standardizes names
for all publicly known vulnerabilities and security exposures

Global Information Grid (GIG) - Answers Globally interconnected, integral part of the overall C&C
structure that incorporates all other networks

NIPRNET - Answers Unclassified but Sensitive Network

SIPRNET - Answers Secret Network

JWICS - Answers TS SCI Network

DISA - Answers Agency responsible for planning, engineering, acquiring, fielding, and supporting global
net-centric solutions for the war fighter

Computer Network Defense Tasking Order (CTO) - Answers Provides guidance and direction to units
under USCYBERCOM'S Operational Control

Information Assurance Vulnerability Alert (IAVA) - Answers Address sever network vulnerabilities
resulting in immediate and sever threats

Information Assurance Vulnerability Bulletin (IAVB) - Answers Address new vulnerabilities that do not
pose an immediate risk

Technical Advisories (TA) - Answers Addresses vulnerabilities that are generally categorized as low-risk

INFOCON 5 - Answers Routine NetOps, 180-day cycle, least severe

INFOCON 4 - Answers Increased readiness in prep for ops or exercises, 90-day cycle

INFOCON 3 - Answers Increased validation of information network and configuration, 60-day cycle

, INFOCON 2 - Answers Increased validation of information network and configuration, 30-day cycle

INFOCON 1 - Answers Highest readiness condition, most severe, 15-day cycle

Incident - Answers Assessed occurrence having actual or potentially adverse effects on an information
system (every Event)

Event - Answers Any observable occurrence in a system not yet assessed that may affect system
performance

Three Phases of Incident Handling Methodology - Answers Detect (antivirus, chain of custody), Analyze
(Operation/Technical Impact), Respond (eradicate risk)

IA Triad - Answers Confidentiality, Integrity, Availability

Authentication - Answers The way you prove to the system that you are who you say you are

Three Methods of Authentication - Answers Something you know, Something you have, Something you
are

Non-repudiation - Answers Proves that a message has been sent and received

Implementation of Access Controls - Answers Administrative (written policies), Technical (firewalls, IDS),
Physical (door locks, guards)

Mandatory Access Control (MAC) - Answers A means of restricting access to objects based on the
sensitivity of the information (clearance)

Discretionary Access Control (DAC) - Answers Restriction of objects determined by the data owner

Role-based Access Control (RAC) - Answers Based on an organization's roles or job functions (base to
base change)

Rule-based Access Control - Answers Relies on specific rules that are associate with an object (firewalls)

Three Elements of Defense in Depth - Answers People, Technology, Operations

Three Defense Focus Areas - Answers Network/Infrastructure, Enclave Boundaries (IDS), Computing
Environment (PKIs)

Passive Attacks - Answers Monitoring of unprotected communications

Active Attacks - Answers Attempts to circumvent or break protection features, insert malicious code, or
steal/modify information

Insider Attacks - Answers Can be malicious or non-malicious

Cryptosystem - Answers Device or mechanism that performs encryption

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
337
Member since
1 year
Number of followers
16
Documents
28401
Last sold
14 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions