The is the URE's from vol 2, edit code 02 which became active after 4 April 2013
Network assurance.
Network protection.
Boundary protection.
Information assurance.
Category I.
Category II.
Category III.
Category IV.
Category I.
Category II.
Category III.
Category IV.
Category I.
Category II.
Category III.
Category IV.
One.
Two.
Three.
Four.
12 hours.
24 hours.
48 hours.
72 hours.
Firewall.
Proxy server.
Intrusion detection system (IDS) software.
Automated security incident measurement (ASIM).
Switches.
Firewalls.
Routers.
Servers.
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
Active IDS.
Passive IDS.
Host-based IDS.
Network-based IDS.
Deploy one IDS for the entire network.
Deploy IDS on 50 percent of the network segments.
Consider using only a network-based IDS or host-based IDS.
Use a centralized management console for system management.
Can analyze any encrypted data if it is decrypted before reaching the target host
Consumes resources on the host it resides on and slows that device down.
Monitors log files for inadvisable settings or passwords.
Monitors traffic on the host on which it is installed.
Can decrypt data
Uses very few network resources
Monitors logs for policy violations.
Can analyze encrypted network traffic.
Host-based IDS.
Network-based IDS.
Hardware-based IDS.
Application-based IDS.
Active only.
Passive only.
Passive and active.
Neither passive nor active.
Entrance point.
Service point.
Protocol.
Port.
Presentation.
Transport.
Network.
Session.
File transfer protocol (FTP).
Domain name service (DNS).
Hypertext transfer protocol (HTTP).
Open system interconnection (OSI).
0–1023.
1024–23535.
23536–49151.
49152–65535.
7
20
23
53
21
22
60
80
Sweep scan.
Vanilla scan.
Fragment packet scan.
File transfer protocol (FTP) bounce scan.
Fragment packets.
Synchronous (SYN) scan.
User datagram protocol (UDP) scan.
Transmission control protocol (TCP) scan.
Monitor ports.
Keep ports open.
Keep ports closed.
Ensure all ports are used.
Maintain the AF PPS database.
Develop AF PPS policies and procedures.
Develop countermeasures on threats associated with PPS traversing the AF enclave boundaries.
Provide information on threats and vulnerabilities associated with PPS traversing the AF enclave boundaries.
Wait!
Here's an interesting quiz for you.