?
??
???
????
?????
100

what the army it user access agreement used for ?

the army it user agreement is a requirement within the policy established in AR 25-2, Army Cybersecurity; and the proponent agency Office of army chief information officer to allow access to department of defense ( DoD ) information 

100

how many parts are there in an Army User Access Agreement ?

3

100

Name the parts of an Army IT User Access Agreement?

Part I- Acknowledgement and consent 

Part II- Information System Access

Part III- Acknowledgment With Signature 



100

Define revocability as it pertais to Army IT User Access Agreement 

army resources is a revocable privilege and s subject to content monitoring and security testing.

100

Whats the purpose of the Cyber Awareness challenge 

is to influence behavior, focusing on actions that authorized users can engage to mitigate threats and vulnerabilities to Dod Information systems.

200

 whats SAAR ?

System Authorization Access Request 

200

what is the name of a DD Form 2875

SAAR

200

How many parts are on a DD Form 2875

there are 4 parts to a dd form 2875

200

what training is submitted with the DD Form 2875?

Cyber Awareness Training

200

What are the 4 parts to a DD Form 2875?

Establishing and modifying User id 

Endorsement from the users Supervisor or Government sponsor

Verification of back ground or clearance

Specifically identify the access required by the user 



300

whats ATCTS?

Army Train and Certification Tracking System

300

ATCTS provides ?

It provides managers at all levels:

capability to report and manage their IA Workforce

general user population training 

certification statistics

summary report of certification voucher distribution 

300

The information Assurance (IA) workforce consists of personal with information system privileged access?

admin or root 

working IA functions 

technical 

Management 

computer network defense service provider 

architect and engineer positions

300

who has access to ATCTS 

Military personal , DoD civilians and Contractors

300

What is Active Directory ?

is an umbrella term for a collection of windows services used to manage a primarily Window environments.

400

what is AD DS?

Active Directory Domain Services 


(a server with AD DS installed is referred as a Domain Controller(DC))

400

What is dc Responsible for ?

its responsible for authenticating users and devices on the network.

400

why is AD important?

it allows a IT Department to store information about their network in a logical structure.

400

what are the 4 different AD structures 

Forest -->tree-->domain-->Organizational unit(OU)

from biggest to smallest-->

400

What is the CIA Triad?

Confidentiality :protection of info in the system so that an unauthorized person cannot access it 

Integrity : the protections of system data from intentional or accidental unauthorize changes ensuring data is trustworthy or untampered 

Availability: the guarantee that a computer system is available or accessible by an authorized user whenever it is needed; Maintaining data accessibility 

500

what is Public Key Infrastructure (PKI)?


(1990s)to help with encryption keys through the issuance and management of digital certificates. its done to protect senstive data and provide a unique digital identifies for users , deices , applications, secure end to end comunications

500

What are CASs?


Certification Authorities are responsible for creating digital certificates. they own the policies , practices and procedures for vetting recipients and issuing the certificates. the certificates are basically the drivers license and the CAs is the DMV.

500

What are cryptographic Algorithms ?

highly complex mathematical formulas used to encrypt and decrypt messages.

500

What are two types of encryption methods?

Asymmetric- Requires a private key to decrypt and public key encrypt(Better Security)(requires digital signatures)(BlockChain)(public key infrastructure)

Symmetric- uses a shared key to encrypt and decrypt a message (banking)(data storage)

500

What is a User Account ?

is an identity created for a person in a computer or computing system.