This is what the acronym VRAM stands for.
What is Vulnerability Remediation Asset Manager?
The individual responsible for the IA program of a DoD information system or organization. Interchangeably with the IA title "Information Systems Security Manager (ISSM)".
Who is the Information Assurance Manager (IAM)?
A portable, user-controlled, physical device used to generate, store, and protect cryptographic information, and to perform cryptographic functions. Hint: Used for access to our Classified Network.
What is a Token?
This is what you use if you are running out of mailbox storage, but need to save your emails.
What is an Outlook Data File, or pst?
In regards to safety, this holds all the information and procedures for handling and working with chemicals.
What is the Material Safety Data Sheet (MSDS)?
This is what the acronym ACAS stands for.
What is Assured Compliance Assessment Solution?
The title of the person authorizing a transfer from SIPR to NIPR.
(Must know what acronym means for points).
Who is a Removable Media Representative (RMR)?
A fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details often for malicious reasons by disguising as a trustworthy entity in an e-mail.
What is a phishing attempt?
This Standard Form is the Activity Security Checklist.
What is the SF701?
This command representative serves as an advisor to the CO regarding drug and alcohol use and abuse within the command.
Points awarded for knowing the title and name of the person.
Who is Drug and Alcohol Program Advisor (DAPA)?
(Name subject to change)
This is the type of vulnerability that is reported on the daily 12 o'clock reports.
What are CAT 1 vulnerabilities?
Using a CAC and Pin or a SIPR PKI token and pin to get onto the network is referred to as this type of authentication.
Hint: Something you know and something you have.
What is two-factor authentication?
Applied to emails to provide message integrity, message authentication, and non-repudiation.
What is a digital signature?
A computer or device that is designed to block unauthorized protocols while allowing authorized protocols to pass through.
What is a Firewall?
An unduly familiar personal relationship between an officer member and an enlisted member that does not respect the difference in rank or grade. Relationships between officer members and between enlisted members that are prejudicial to good order and discipline or of a nature to bring discredit on the Naval service are unduly familiar.
What is fraternization?
This is the vulnerability scanner used on SecRel.
What is Retina?
The official management decision issued by a DAA or PAA to authorize operation of an information system and to explicitly accept the residual risk to agency operations.
Hint: DIVO sends us these to save.
What is Authority to Operate (ATO)?
DOUBLE POINTS
A computer worm believed to have been developed by the US and Israel that was used in 2010 to attack the supervisory control and data acquisition systems of Iran's nuclear development program.
What is Stuxnet?
This is the range for Super High Frequency (SHF).
What is 3-30 GHz?
This is the EVAL instruction.
What is Bupersinst 1610.10D?
This is the vulnerability scanner used for unclass and classified systems. Sometimes referred to as two different names. Give both names.
What are Nessus and ACAS scanners?
Instruction OPNAV 5239/14 (Rev 9/2011) governs this form that will be inspected during the upcoming CCC drill.
What is the SYSTEM AUTHORIZATION ACCESS REQUEST NAVY (SAAR-N) form?
A type of penetration testing that simulates an external hacking or cyber warfare attack
What is Black Box?
This service is a standard technology for managing the names of Web sites and other Internet domains to their perspective IP address.
What is Domain Name Service (DNS)?
Double Points
This is USS CARL VINSON's Motto and what it means.
What is Vis Per Mare, meaning Strength from the Sea?