Block 1 Day 3

studied byStudied by 2 people
0.0(0)
learn
LearnA personalized and smart learning plan
exam
Practice TestTake a test on your terms and definitions
spaced repetition
Spaced RepetitionScientifically backed study method
heart puzzle
Matching GameHow quick can you match all your cards?
flashcards
FlashcardsStudy terms and definitions

1 / 11

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

12 Terms

1

Change Management (CM)

ensures continuity of operations by validating, approving, and implementing changes on AF networks.

New cards
2

Work Order Management

software solution that allows managers to effectively track and manage all work order information through a single dashboard

New cards
3

Incident and Change Requests

Incident is an unplanned interruption or reduction in quality to an IT service, a Change is the addition

New cards
4

Remedy

Customer relationship tool used to track issues or problems faced using incident mngt tickets

New cards
5

IAO Express

specifically developed to help address the most common requests made to the Enterprise Service Desk (ESD)

New cards
6

Xacta

Suite of enterprise cyber risk management and compliance automation solutions

New cards
7

Enterprise Mission Assurance Support Service (eMASS)

automated cyber security tool to develop, collect and manage DoD Information technology

New cards
8

RMF Knowledge Service (KS)

Provides DoD RMF users ready access to up to date RMF policy and Guidance, online - web based resource

New cards
9

Information Technology Investment Portfolio Suite (ITIPS)

designed to support IT Budget submission requirements of the Air Force

New cards
10

DISA STIGs

help protect against the unauthorized access to or loss of the enormous amount of sensitive, confidential data the AF processes each day

New cards
11

Assured Compliance Assessment Solution (ACAS)

automatically identifies configuration vulnerabilities

New cards
12

Vulnerability Management System (VMS)

DoD IS used to record, track and disseminate critical vulnerability information throughout the DoD Enterprise Network

New cards

Explore top notes

note Note
studied byStudied by 43 people
736 days ago
5.0(2)
note Note
studied byStudied by 16 people
628 days ago
5.0(2)
note Note
studied byStudied by 21 people
667 days ago
5.0(1)
note Note
studied byStudied by 100 people
661 days ago
5.0(2)
note Note
studied byStudied by 7 people
859 days ago
5.0(1)
note Note
studied byStudied by 59 people
845 days ago
5.0(2)
note Note
studied byStudied by 2 people
20 days ago
5.0(1)
note Note
studied byStudied by 34 people
668 days ago
5.0(1)

Explore top flashcards

flashcards Flashcard (23)
studied byStudied by 3 people
89 days ago
4.0(1)
flashcards Flashcard (23)
studied byStudied by 52 people
796 days ago
5.0(4)
flashcards Flashcard (133)
studied byStudied by 174 people
779 days ago
5.0(6)
flashcards Flashcard (112)
studied byStudied by 157 people
112 days ago
5.0(2)
flashcards Flashcard (100)
studied byStudied by 2 people
57 days ago
5.0(1)
flashcards Flashcard (33)
studied byStudied by 12 people
23 days ago
5.0(1)
flashcards Flashcard (92)
studied byStudied by 145 people
449 days ago
5.0(2)
flashcards Flashcard (20)
studied byStudied by 1 person
6 days ago
5.0(1)
robot