Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
59 Cards in this Set
- Front
- Back
Software is often divided into two categories: _________and ________ software. |
system and application
|
|
The legal right granted to an author or inventor to exclusive publication, production, sale, or distribution of a literary, musical, dramatic, or artistic work |
Copyright
|
|
Contracts between the software publisher and the user that defines and limits the software use |
License Agreements |
|
This allows the purchasing organization to use multiple copies of a specific COTS software program, usually up to a specified number |
Enterprise License |
|
Agreements such as contracts or blanket purchase agreements |
Enterprise Software Agreement (ESA) |
|
It is incumbent on the United States to ensure its own practices as a purchaser and user of computer software are _______ ________. |
beyond reproach
|
|
Unauthorized copying or distribution of copyrighted software |
Software piracy!
|
|
Using subscription licensed software past the expiration date |
Subscription Licensing piracy |
|
Where one attempts to copy the product and packaging so that it looks like an original |
Counterfeiting |
|
A small piece of software designed to fix problems or to update a computer program and/or its supporting data |
Software patch
|
|
Used to fix bugs, replace graphics and improve usability or performance of computer. |
Software patch
|
|
The primary method of fixing security vulnerabilities in software |
Security patch
|
|
Currently Microsoft® releases their security patches _____ __ ______. |
once a month.
|
|
Microsoft® refers to general bug fixes that replace current code with revised code to fix one thing in particular as a ______, and refers to fixes for security problems as ______. |
Fix (hot-fix); patches
|
|
The means by which Windows product updates are distributed. |
Service releases |
|
Service packs are _______ -- each new service pack contains all the fixes in previous Service packs. |
Cumulative
|
|
Computer programs that attempt to identify, neutralize or eliminate malicious software |
Anti-virus software programs |
|
Air Force defines ______ _____ as hardware, software or firmware that is intentionally introduced into an information system for an unauthorized purpose (e.g., virus). |
Malicious logic
|
|
Policies and procedures of e-mail are outlined in __________, User Responsibilities and Guidance for Information Systems. |
AFMAN 33-152
|
|
Communications determined necessary in the interest of the Federal Government |
Official Use |
|
System-generated email address assigned to Air Force members for the duration of their Air Force career. |
E4L (Email for Life) |
|
A _____ ______ _____ is an Outlook data file that stores your messages and other items on your computer. Not subject to mailbox ____ ____. |
Personal Folders file (.pst); size limits
|
|
The Air Force maintains and supports two types of Web pages and sites: ______ and _______. |
Public Web Pages/Sites; Private Web Pages/Sites (.mil and .gov) |
|
Includes a combination of hardware, software, policies, and procedures and ability to authenticate and protect certificates and digitally sign electronic mail and documents. |
Public Key Infrastructure (PKI) |
|
Digital signatures are as ______ ______ as handwritten signatures |
Legally binding
|
|
The Department of Defense (DOD) PKI has two basic components: _______ ________ and ______ _______. |
certificate management and user registration
|
|
Credit card-sized ID card that contains an integrated circuit chip, a magnetic strip, bar code, and photo. |
Common Access Card (CAC) |
|
The ______ ______ ______ is where the certificates/ keys reside inside a CAC. |
integrated circuit chip
|
|
The _____ is used to digitally sign e-mail, travel orders, travel vouchers and other documents, and establish secure web-based sessions. Not just your ID. |
CAC
|
|
The goal of all ___ ____ ____ is to ensure lost data, no matter how it got lost, can be recovered _____, efficiently, and as ______ as possible |
Data backup jobs; quickly; completely
|
|
A way to manage your disk drives so that you can create one logical drive from two or more physical drives. |
RAID |
|
When using ____ ____ __, data is stored simultaneously to both physical drives being used. This method is called “______” and it boosts performance. |
RAID Level 0; "striping"
|
|
RAID Level 1(RAID 1) is called “______”. |
"Mirroring"
|
|
All data saved to one drive is reflected on the other giving the system a built in back up. |
"Mirroring"
|
|
Four separate drives are used combining mirror and striping. This allows for much more reliability and is suitable for both data and program drives |
RAID Level 0+1(RAID 10) |
|
Three or more drives are needed to implement this version of RAID The biggest advantage to this RAID level: the hard drives become "____" ______. |
RAID Level 5 (RAID 5); "hot" swappable |
|
Another name for what you put your backed-up data on. |
Media
|
|
The choice of media is based on three things: ____, ____, and ____. |
Size, cost, and speed
|
|
Most backups rely on _____ or _____ _____ to determine what files are supposed to be backed up. |
Markers or archive flags
|
|
This backup type backs up all the selected files and folders. |
Full or Normal Backup |
|
Backup type where only selected files and folders that have changed (have the archive flag set) are backed up. |
Differential Backup |
|
Backup type where only backup selected files and folders that have the archive flag set and then clears the archive flag.
|
Incremental Backup |
|
Backup type where all selected files and folders that changed during the day are back-up. |
Daily Backup |
|
A change applied to an asset to correct weakness described by a vulnerability. |
Security patch |
|
Primary method of fixing security vulnerabilities in software. |
Security patch |
|
What is the responsibility of the 83d Network Operations Squadrons, commonly known as INOSC East and INOSC West? |
Updating antivirus servers |
|
True/False The Air Force does not use automatic update features. |
True The updates must first be tested to ensure they will not "break" our workstations. |
|
________ is defined as a flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised (accidentally triggered or intentionally exploited) and result in a _____ _____ or a violation of the system's security policy. |
Vulnerability; Security breach |
|
_____ _____ are composed of routine changes, minor bug fixes, enhancements, and sometimes, new applications. |
Service packs |
|
Policies and procedures of E-mail are outlined in __________, User Responsibilities and Guidance for Information Systems |
AFMAN 33-152 |
|
_________ ________ encompasses a set of capabilities that includes usernames/passwords, PKI, CAC, and biometrics. |
Identity Management |
|
The most commonly-used method to identify and authenticate a user's identity. |
Username/password |
|
This Air Force document governs Computer Security, specifically password creation guidance. |
AFMAN 33-282 |
|
What are the two basic components of PKI? |
Certificate Management & User Registration |
|
One of the key tools to maintain data on a workstation. |
Data backup |
|
It is good business practice to store backed-up data ______. |
Offsite |
|
_____ is another name for what you put your backed-up data on. |
Media |
|
What is the most common media type to store back-up data? |
Tape. It has decent speed and is reasonably priced. |
|
Most back-ups rely on ______ or _____ ______ to determine what files are supposed to be backed-up. |
Markers or archive flags |