Book 2 Flashcards

NCDOC Platform Specific

1
Q

State the function of JTF-GNO and discuss their relationship with NNWC

A

Plans, coordinates, integrates, synchronizes, and conducts activities to direct the operations and defense of specified DoD information networks. USCYBERCOM issues Orders & Directives to DoD and NNWC pushes them out to the Navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who is currently designated as the Navy’s Level 2 accredited CNDSP?

A

NCDOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State who JTF-GNO reports to directly:

A

USSTRATCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain what a CNDS Certification Authority (CNDS/CA) is.

A

Responsible for CNDSP Accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain who the central manager for all DoD Enterprise incident sets is.

A

DISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State who the Area Coordinators are for NCDOC and NNWC.

A

SWO, BWC, and DCOWO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State who has TACON of NCDOC watch floor personnel and is responsible directly to the Commanding Officer, Operations Officer, and the Commander USSTRATCOM, via the JTF-GNO Network Defense Watch Officer.

A

Commanding Officer of 10th Fleet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the DoD agency that is tasked with handling Electronic Spillage issues and incidents.

A

NCDOC/NNWC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the event of Electronic Spillage originating at NCDOC, list the personnel or agencies that should be contacted in order.

A

NCDOC watch standers create ticket. ISSM and SSO is informed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State who has tactical control over NCDOC and NNWC:

A

10th Fleet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

JTF-GNO is dual-hatted IRT CND operations at NCDOC and NNWC. Explain what these two positions are.

A

CO is commander of NCDOC and CTF 1020 (NIOCS, NCTAMS, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

State who, by direction of the Operations Officer, is responsible to the Commanding Officer for the assignment and general supervision of all NCDOC watch standers.

A

SWO (Senior Watch Officer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the duties and responsibilities of the Senior Watch Officer (SWO)

A

Manning of the watch, delegate tasks to DCOWO, as well as liaise with BWC from NNWC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Computer Network Attack (CNA).

A

Operations to disrupt, deny, degrade, or destroy information resident on computers and computer networks or the computers and networks themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the standard reporting procedures for reporting a computer network incident

A

Depends on the type of incident as to overall mitigation, however, CER is created, analysis is conducted of activity, PCAP is pulled as necessary, and upon QC, an NCD is created and passed to Incident Handling to be communicated to site for remediation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define deconfliction as it applies to CND operations

A

Deconfliction is the communication that occurs between NCDOC and satellite locations (other NIOCs, EDU sites, etc.) to ensure that duplicate efforts are eliminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define Incident Handling as it applies to Computer Network Operations (CNO).

A

Provides CND with the following:
1. Protect
2. Monitor, analyze, and detect
3. Respond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List the four phases of CNDS Certification and Accreditation:
Phase 1

A

Registration: initiates the CNDS C&A process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

List the four phases of CNDS Certification and Accreditation:
Phase 2

A

Verification: includes activities related to the on-site C&A evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List the four phases of CNDS Certification and Accreditation:
Phase 3

A

Validation: the evaluation team prepares a Deficiency Report and a Certification Report for CNDSICA review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

List the four phases of CNDS Certification and Accreditation:
Phase 4

A

Post Accreditation: includes activities by the Provider to maintain C&A status, monitor changes to the CNDS mission, and prepare and apply for recertification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

State what the Commander’s Critical Information Requirements (CCIR) identify

A

Identify events that require immediate or time-sensitive reporting or notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

State what a NAR is, and name what department creates and maintains them.

A

Network Analysis Report, Threat Analysis is typically tasked with their creation and maintenance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

List the four steps in creating a Network Analysts Report

A
  1. Assessment
  2. Research
  3. Analysis
  4. Reporting
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Explain what a Cyber Alert is (CA).

A

Provides initial analysis of unusual activity, threats, or mass malware outbreaks on the Navy Network. This type of report serves as a time sensitive notification for mitigation of potential threats, and may include preliminary, unfinished assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Name where listings of all NAR’s, CA’s, and CCIR’s can be found?

A

Within the SIPR Threat Analysis share folder.

27
Q

List the 3 firewall types used to protect Navy Networks

A
  1. Network firewalls
  2. Host-based firewalls
  3. Hybrid firewalls (combination of network & host-based)
28
Q

Explain what an Intrusion Detection System is (IDS) and what mode it functions in.

A

Is a passive system designed to monitor network activity and operates in promiscuous mode.

29
Q

Explain what an Intrusion Prevention System is (IPS) and what mode it functions in.

A

Is an active system that monitors network activity and makes attempts to stop potential attacks and operates in inline mode

30
Q

State what Thinnet (10Base2) is.

A

Uses coaxial cable with BNC connectors. Maximum transmission speed of 10Mbps, IEEE 802.3 standard.

31
Q

Class A IP Range

A

1.0.0.0 to 126.255.255.25

32
Q

Class B IP Range

A

128.0.0.0 to 191.255.255.255

33
Q

Class C IP Range

A

192.0.0.0 to 223.255.255.255

34
Q

OSI to TCP/IP:
Transportation

A

Transportation

35
Q

OSI to TCP/IP:
DATA

A

Application, Presentation, Session

36
Q

OSI to TCP/IP:
Internet

A

Network

37
Q

OSI to TCP/IP:
Network Interface

A

Physical & Data Link

38
Q

List 2 types of fiber mode.

A
  1. Single-mode Fiber
  2. Multi-mode Fiber
39
Q

Name the most secure transmission medium

A

Fiber optics

40
Q

Explain the difference between Vulnerability and Exploit.

A
  1. Vulnerability is a weakness that could potentially be taken advantage of by an attacker.
  2. Exploit is the act of taking advantage of a vulnerability.
41
Q

Describe two methods of attachment filtering

A
  1. Filtering based on file name or file name extension.
  2. Filtering based on file MIME content type.
42
Q

With reference to network security, explain what is meant by CIA.

A
  1. Confidentiality
  2. Integrity
  3. Availability
43
Q

Explain the importance of log file analysis

A

Looking at logs proactively helps organizations to better realize the value of their existing security infrastructure

44
Q

State why Network Defense important

A

To manage and protect information through logical security with system configurations, passwords & data encryption

45
Q

Define “Defense in Depth”.

A

A practical strategy for achieving Information Assurance in today’s highly networked environments. It is a “best practices” strategy. Add Layers of security.

46
Q

State the current reporting system for IAVM compliancy

A

Vulnerability Remediation Asset Manager (VRAM)

47
Q

Define RC-4

A

most used stream cipher use in protocols such as SSL and WEP

48
Q

Define RC-6

A

symmetric key block cipher derived from RC-5. Meets AES requirements and supports 128, 192, and 256-bit keys. 128-bit block size.

49
Q

Define SHA-1

A

Secure Hash Algorithm. Cryptographic hash function designed by NSA, most widely used of the SHA has functions. Produces 160-bit message digest

50
Q

Define AES

A

Advanced Encryption Standard. Symmetric-key encryption standard. Comprises three block ciphers, AES-128, AES-192, and AES-256. Originally published as Rijndael, which was a 128-bit block size

51
Q

Define Blowfish

A

a keyed, symmetric block cipher. 64-bit block size with a variable key length from 1 bit up to 448 bits

52
Q

3-DES IRT

A

Triple Data Encryption Algorithm, block cipher which applies the Data Encryption Standard (DES). Uses a key bundle which uses three keys, each of 56 bits. Encrypts one block of 64 bits of data.

53
Q

List the most commonly known types and columns of Log Server File Analysis (Splunk)

A

a. Date
b. Time
c. Source IP address
d. Destination IP address
e. Domain Name
f. HTTP Response Code
g. URI
h. Port
i. Protocol

54
Q

State who has overall responsibility of Information Assurance Vulnerability Management (IAVM)

A

Assistant Secretary of Defense (Networks & Information Integration)

55
Q

Who can serve as the Command Security Manager:

A

a. Every command in the Navy and Marine Corps eligible to receive classified information is required to designate a security manager in writing.
b. Anyone who is a GS-11 or above, or an officer appointed by the Commanding Officer can be a CSM. The CO must sign a designation letter officially appointing someone to be responsible as the CSM.

56
Q

Command Security Manager duties.

A

a. Serves as the commanding officer’s advisor and direct representative in matters pertaining to the security of classified information held at the command as well as the eligibility of personnel to access classified information and to be assigned to sensitive duties.
b. Develops written command information and personnel security procedures, including an emergency plan which integrates emergency destruction bills where required.
c. Formulates and coordinates the command’s security awareness and education program.
d. Ensures all personnel execute a Classified Information Nondisclosure Agreement (SF 312) prior to granting initial access to classified information.

57
Q

Define the following message codes
(R),(P),(O),(Z)

A

A. R Routine – within 6 hours
B. P Priority – within 3 hours
C. O Immediate – within 30 minutes
D. Z Flash – within 10 minutes

58
Q

Name the current system for transmitting naval messages.

A

C2OIX

59
Q

State what a Plain Language Address is (PLA) and what its purpose is.

A

Used to address Naval Messages to specific commands

60
Q

State the primary difference between IPV-4 and IPV-6.

A

IPV-6 offers a larger number of IP addresses than IPV-4

61
Q

Give the purpose of Active Directory.

A

Provides Domain Services, Rights Management Services, Federation Services, Certificate Services, and Lightweight Directory Services. Integrated with Windows Server, gives out-of-the-box functionality needed to centrally configure and administer system, user, and application settings.

62
Q

State the purpose of the token ring protocol and the IEEE standard associated with it.

A

Token ring LAN technology is a local area network protocol which resides at the data-link layer of the OSI model. It uses a special three-byte frame called a token that travels around the ring. One system transmits what it needs to and passes that information and the token to the next computer in line until its data reaches its destination. This is one of the oldest data communication protocols and utilizes IEEE 802.5.

63
Q

State what IEEE is and state its purpose.

A

IEEE’s (Institute of Electrical and Electronics Engineers) core purpose is to foster technological innovation and excellence for the benefit of humanity. The main function of IEEE is to create a set of standards for the interoperability of equipment and software to enable the sharing of information. This includes the prominent IEEE 802.11 standards for wireless networking.