Cyber Operator Flashcards

1
Q

In order to execute a file in Linux the file must _____.

A

Be executable, contain executable code, and you must have permission to execute it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

With a umask of 022, which of the following permissions are assigned when creating a new file?

A

rwxr-xr-x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Linux this file is used to store hashed passwords and readable only by root.

A

shadow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is a set of standards carrying out wireless local area networks.

A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Windows 7 command can be used to perform a soft shutdown?

A

shutdown /s /f /t 00

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A system that gathers and analyzes information from within a computer or a network, to identify
possible violations of security policy, including unauthorized access, as well as misuse is known as:

A

IDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the default MIP2 firewall state prior to being connected to the network?

A

enabled and not allowing incoming connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(U//FOUO) What are the three sub-missions of a Cyber Protection Team (CPT)?

A

Survey, Secure, Protect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Windows command can be used to configure the IP address either statically or to use Dynamic
Host Configuration Protocol (DHCP)?

A

netsh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(U//FOUO) Which document prioritizes and outlines the options and actions available, both technical
and procedural, to provide a greater level of mission assurance for the supported commander’s
mission through the consolidation of all squad recommendations?

A

Risk Mitigation Plan (RMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you stop a TCPdump capture?

A

Use Control-C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is NOT contained in the CVA/Hunter Air Force Tactics, Techniques and
Procedures (AFTTP) 3-1?

A

Commercial Manuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of crew logs?

A

To maintain an accurate and detailed record of all significant events

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ focus primarily on qualitative analysis of ISR employment to determine ISR contribution to
mission objectives.

A

Measures of Effectiveness (MOE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A program in which malicious or harmful code is contained inside apparently harmless programming
or data in such a way that it can get control and do its chosen form of damage is known as what?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

It is important to review _______________ during the sortie brief because it will affect the choice of
TTPs and the accomplishment of tactical tasks during sortie execution.

A

Intelligence Updates, Mission Partner Activity, Rules of Engagement, Crew and Mission Risks, All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

In Linux, how are trusted and target IP addresses added or removed?

A

By editing the /etc/trusted.hosts and /etc/target.hosts files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Techniques are __________.

A

Non-prescriptive ways or methods used to perform missions, functions or tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____ focus on task execution and quantitative mission achievement.

A

Measures of Performance (MOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following is the Linux command for securely copying a file from a remote machine to
your home directory?

A

scp 10.10.20.100:/ios/data/assess/file.txt /home/usr/

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Null sessions are __________.

A
an anonymous (no user, no password) connection to a freely accessible remote share called IPC$ on
Windows-based servers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Software applications that run automated tasks and can be remotely controlled, normally used in
DDoS are commonly referred to as what?

A

Bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

When validating DIP sensor processes what command verifies that the processes are running?

A

/usr/local/bin/checkstatus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What type of malware spreads from computer to computer and has the capability to travel without
any human action?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which bit allows execution of an application as a member of this group?

A

SGID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which interceptor platform consists of a single laptop, is used by one crew member and can run
limited VMs concurrently?

A

Mobile Interceptor Platform (MIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following Deployable Interceptor Platform (DIP) sub-components serves as a data
Collector and VM server?

A

DL-160

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

In VMware what do you press to exit a virtual environment?

A

CONTROL+ALT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following Deployable Interceptor Platform (DIP) sub-components is deployed on the
MPNet and primarily captures and stores network traffic?

A

Cywarfius sensor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following are the default ports for web traffic?

A

80 and 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the TCPdump option that saves the packet data to a file?

A

-w

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

(U//FOUO) Which Cyber Protection Team (CPT) squad analyzes the supporter commander’s identified
cyberspace dependencies, essential and critical assets and cyberspace key terrain (C-KT)?

A

Mission Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

A type of password cracking where a word list is used against a given encrypted password.

A

Dictionary Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is NOT a private or non-routable IP address?

A

172.168.1.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In Linux, user account information is contained in which file?

A

/etc/passwd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Where are the Bro sensor logs kept?

A

DIP2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Which vi command will bring you into insert mode?

A

I

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which of the following is NOT a tasking document used for CVA/Hunter missions?

A

Task Management Tool (TMT) Tasker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which interceptor platform consists of Cywarfius sensors, Informaiton Operations Platform (IOP), and
fits in a hardened case?

A

Deployable Interceptor Platform (DIP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How is the encrypted partition unmounted?

A

Double click the “UnMount…” desktop icon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

PowerShell Cmdlets follow which naming convention?

A

Verb-noun

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

A path that contains the root directory and all subdirectories of the location is called?

A

Absolute Path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What could you use to redirect the output of a program to the input of another program on the
command line?

A

Pipe (|)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
Which of the following documents contains an abbreviated version of the amplified Ops Manual
Technical Order (TO-1)?
A

CVA/Hunter Cybercrew Checklists / Crew Aides

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Which command will allow you to run TCPdump to monitor activity on a particular subnet?

A

tcpdump -w traffic net 10.10.20.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which of the following is NOT a rule for CVA/Hunter emergency procedures?

A

Act Immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which of the following is the default port for SMTP?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is a smurf attack?

A

Large amount of ICMP echo traffic to a network broadcast address with a spoofed source IP set to a victim
Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following is the default port for Telnet?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

In Windows, what command will enable the firewall and block incoming connections?

A

> netsh firewall set opmode enable disable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What does the following nmap scan do. nmap -O 10.10.20.1

A

Determines the OS of the machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Traffic capture tools such as TCPdump and Wireshark provide _____ accountability of actions
performed on the weapon system.

A

Logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

When validating GIP functionality which of the following are operator responsibilities during initial
weapon system configuration? (I) Verify connectivity to an operational VM; (II) Modify Access
Control Lists (ACLs); (III) Install ArchSight Linux management console;
(IV) Verify that an operational VM has the appropriate IP in accordance with SPINS

A

I and IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

A file has an octal value of 755 this means:

A

The owner can read, write and execute; the group can read and execute; others can read and execute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A coworker uses the smb_share.pl to create a share. You are on a windows machine and using the net use command to mount the share. What user do you use when attempting to mount the share?

A

root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which drive letter is used for the encrypted partition?

A

X:\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of the following Deployable Interceptor Platform (DIP) sub-components primarily serves as a
deployable network intrusion detection system?

A

IOP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What type of information in a tactical level mission tasking document describes communication
requirements and reporting?

A

Communication Contracts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What could you use to redirect the output of a program to a file on the command line?

A

Greater than symbol (>)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which of the following is the Cisco IOS command to copy the running configuration to the starting
Configuration?

A

copy run start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the Unix environment variable which automatically sets file permissions on newly created
Files?

A

UMASK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG),
information and mission impact pertaining to

A

SECRET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Traceroute executes by ___________.

A

increasing the time-to-live value of each successive batch of packets sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

A software system that consists of a program or combination of several programs designed to hide or
obscure the fact that a system has been compromised is known as what?

A

A rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

(U//FOUO) Which Cyber Protection Team (CPT) squad detects, illuminates and defeats previously
unknown adversary activity within a specified area of responsibility?

A

Discovery and Counter Infiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is the SAM (Security Accounts Manager) file?

A

A database stored as a registry file containing users’ passwords in a hashed format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What does the broadcast address do?

A

Allows for information to be sent to all machines on a given subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

A malfunction is designated an emergency when ___________.

A

individual troubleshooting efforts do not result in a weapon system fix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is a Tactics Improvement Proposal (TIP)?

A

Comprehensive idea to improve the military capability of a fielded system, overcome a tactical deficiency or
meet an emerging operational need

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What does the following command do: C:> psexec \10.10.20.1 cmd

A

Launches an interactive command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

FTP uses which of the following ports?

A

20 and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Tactics are ______.

A

The employment and ordered arrangement of forces in relation to each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which vi command will delete one line?

A

dd

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following is NOT a primary purpose of a Tactics Improvement Proposal?

A

To request modification or acquisition of hardware or software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Which of the following items must be covered in a change over brief?

A

Factors of the current operational/tactical situation, Critical reports and findings from ending sortie, Active and planned mission partner activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

(U//FOUO) Which Cyber Protection Team (CPT) squad assesses an organization’s security posture
by closely resembling adversary offensive cyberspace activities in their processes and execution?

A

Cyber Threat Emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

What are the two major DIP assembly components?

A

Server (DIP1) and Sensor (DIP2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Two types of IDS are:

A

Network-based (NIDS) and host-based (HIDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What is the iptable option to clear all firewall rules?

A

-F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is not a default chain for iptables?

A

ACCEPT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following octal codes allow a file to execute as the owner of that file?

A

4777

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which iptables target denies a packet and does not send back a rejection?

A

DROP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What is the technique whereby the sender of a packet can specify the route that a packet should take
through the network?

A

Source routing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which of the following is NOT contained on the PEX sortie details report

A

Go/No Go Status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

According to the communication contract shown, once maintenance implements a fix, who is
responsible of assigning an operator to conduct an operational check to determine the weapon system
Status?

A

cyberspace operations controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

How is the encrypted partition mounted?

A

Double click the “Mount X Drive” desktop icon and enter the password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

The accuracy of IPs and MAC addresses are of critical safety concern because _________ .

A

They are used as targeting information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Which of the following is the Linux command for logging into 10.10.20.100 as assessor?

A

ssh assessor@10.10.20.100

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which of the following are key elements in a tactical level mission tasking document?

A

CVA/Hunter IP Ranges, Rules of Engagement (RoE), Cyberspace Key Terrain (C-KT), Tactical Objectives, All of the Above

90
Q

Which vi command will allow you to save and quit?

A

:wq

91
Q

You want to create a new share using the smb_share.pl script. You attempt to execute the command
but is tells you the “command is not found”. What might be the cause?

A

You did not mount the encrypted partition

92
Q

Using Wireshark to follow a TCP Stream means:

A

You can view data from a TCP conversation

93
Q

Exploitation of a valid computer session where an attacker takes over a session between two
computers is known as what?

A

Session Hijacking

94
Q

(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG), a
report on vulnerabilities associated with a specific NIPR AF information system has what
Classification?

A

CONFIDENTIAL

95
Q

Which bit allows the execution of an application as the owner of that file?

A

SUID

96
Q

Which of the following is the proper way to ensure you are green on your CIF Go/No Go?

A

complete and sign off the CIF in PEX before the sortie

97
Q

Which of the following Nmap commands would perform a ping sweep of 10.10.20.0/24 subnet,
without resolving IP addresses to hostnames?

A

nmap -n -sn 10.10.20.0/24

98
Q

In Linux, which of the following represent the current directory you are in?

A

A single dot (.)

99
Q

Which of the following is NOT a purpose of a sortie debrief?

A

Determine whom to attribute mission failures

100
Q

You just performed a FIN scan with nmap against a target. The machine sends back no response for
a particular port. This means that the port is _____.

A

Open

101
Q

Which command can be used to perform a soft shutdown of a Linux machine?

A

init 0

102
Q

Which directory normally holds log files?

A

/var/log

103
Q

For Ubuntu Linux, what command is used to turn off the firewall?

A

fw_iptables.pl allow -i eth0

104
Q

You are logged into the Linux side of the clone, which command gives you a root shell?

A

sudo -s

105
Q

What type of information in a tactical level mission tasking document describes the agreement with
the mission partner on what cybercrew actions are approved during CVA/Hunter missions?

A

Rules of Engagement (RoE)

106
Q

Which Linux command is used to connect to a share?

A

mount

107
Q

Which vi command will delete one character?

A

x

108
Q

With a umask of 002, which of the following permissions will be assigned when creating a new
Directory?

A

rwxrwxr-x

109
Q

Writing hidden messages in such a way that no-one, apart from the sender and intended recipient,
suspects the existense of the message, a form of security through obscurity is known as what?

A

Steganography

110
Q

Procedures are __________.

A

Standard, detailed steps that prescribe how to perform specific tasks.

111
Q

Which interceptor platform consists of Thin Clients, a BladeCenter, is use by multiple crew members
and contains multiple NICs plus Lights-out Management?

A

Garrison Interceptor Platform (GIP)

112
Q

Which of the following are NOT part of proper safety procedures?

A

Replace components inside the equipment to prevent mission failure.

113
Q

Which of the following is NOT a purpose of a CVA/Hunter cybercrew checklist / crew aid?

A

Replaces the amplified TO-1

114
Q

Which of the following octal codes allow a file to execute as the group of that file?

A

2777

115
Q

The environment variable that contains a list of directories the shell will look for commands is called:

A

PATH

116
Q

Which of the following steps come before accessing the Virtual Machines on the MIP2?

A

Mounting the encrypted drive

117
Q

On a Cisco IOS device, which of the following symbols corresponds to Privileged EXEC (enable)
Mode?

A

#

118
Q

How many usable IP addresses are there in a C class network?

A

254

119
Q

Which key do you use in vi to return to command mode?

A

Esc

120
Q

Which is the octal value for the owner can write; the group can read and execute; others can read?

A

254

121
Q

Which of the following is NOT a valid PowerShell command for viewing help information?

A

read-help

122
Q

Which command in Linux, displays the default gateway?

A

route

123
Q

Which of the following is the Linux command for securely logging into 10.10.20.100 as assessor?

A

ssh 10.10.20.100

124
Q

In Linux, a hidden file starts with a _____.

A

period

125
Q

A path that begins from the user’s current location is called:

A

Relative Path

126
Q

According to the communication contract shown what does the operations controller do when a crew
member notifies them via the chat program that they have a maintenance issue?

A

The operations controller communicates to both maintenance and the crew commander by issuing a
maintenance ticket.

127
Q

Admin$ serves as ____________.

A

the hidden share that points to the windows folder

128
Q

Which of the following does not describe the clone?

A

A computer you can install any software you need without authorization to complete your mission

129
Q

(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG),
information pertaining to cyberspace operations functions and processes with reference to mission,
capability or location has what classification?

A

UNCLASSIFIED//FOR OFFICIAL USE ONLY

130
Q

Which Windows command is used to connect to a share?

A

net use

131
Q

Which port should be allowed through the firewall in order to enable file sharing?

A

445

132
Q

(U//FOUO) Which Cyber Protection Team (CPT) squad performs targeted evaluations to review the
effectiveness of the current cyber security program and provides reviews of cyber assets based on
DOD policies and regulations?

A

Cyber Readiness

133
Q

A type of attack where a multitude of compromised systems attack a single target, thereby causing
denial of service for users of the targeted system is known as what?

A

Distributed Denial Of Service

134
Q
When validating DIP sensor processes what running processes must be verified?
I. Bro
II. Snort
III. tcpdump
IV. nessus
A

I, II and III

135
Q

(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG),
descriptions of cyberspace operations, functions, processes, systems and tools associated with
standard commercial capabilities without reference to mission, capability or location have what
Classification?

A

UNCLASSIFIED

136
Q

(U//FOUO) Which document outlines the residual mission risks and illustrates how CPT capabilities
will be integrated into and coordinated with the local cyberspace defenders to enhance the cyberspace
defense of a supported commander’s mission?

A

Mission Defense Plan (MDP)

137
Q

In Windows, which command can be used to change the hostname?

A

wmic

138
Q

Which of the following documents contains weapon system capabilities and limitations as well as
threat considerations?

A

CVA/Hunter Air Force Tactics, Techniques and Procedures 3-1

139
Q

In Red Hat Linux, what command will turn the firewall on and not allow incoming connections?

A

firewall

140
Q

The Xmas scan with nmap means:

A

The FIN, PSH, URG flags are set

141
Q

You press CONTROL+ALT+_____ to log into a locked Windows virtual machine.

A

INSERT

142
Q

Which command sets a file to be executable?

A

chmod +x file

143
Q

Which is the octal value such that the owner can read and execute;,the group can write and execute
and others can execute?

A

531

144
Q

You have just used the smb_share.pl script to create a shared directory for the team. Where is that
directory created on your system?

A

In the working directory

145
Q

A file has an octal value of 644 this means:

A

The owner can read and write; the group can read; others can read

146
Q

What is a “NTFS Alternate Data Stream”?

A

A separate buffer to hold information on a per file bases found on a Windows machine

147
Q

In classful network design, in which class network is 191.50.0.0 defined?

A

Class B

148
Q

If you are unable to successfully connect to a share using a Linux machine, which file could you
check to verify the share configurations?

A

/etc/samba/smb.conf

149
Q

Which of the following describes authorities for foreign intelligence operations?

A

Title 50

150
Q

Which of the following is the default port for DNS?

A

53

151
Q

(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG),
association of an IP address which poses a threat to national security to a foreign nation is at what
Classification?

A

SECRET

152
Q

During a debrief, determining the debrief focal point (DFP) is ___________.

A

a process of determining aspects of mission planning and execution impeding achievement of tactical
Objectives.

153
Q

In Linux, which file contains the system’s network parameters such as IP address, subnet mask and
default gateway?

A

/etc/network/interfaces

154
Q

Which of the following documents describes general CVA/Hunter equipment maintenance
Procedures?

A

CVA/Hunter Technical Order (TO-2)

155
Q

Which netstat option displays all connections and listening ports?

A

-a

156
Q

Which of the following are default NETBIOS ports?

A

137, 139, and 445

157
Q

Which of the following is NOT a required element of a mission/sortie brief?

A

Crew Information Files (CIF)

158
Q

The Nmap option “-O” performs what function?

A

OS detection

159
Q

____ is an open-source and/or licensed signature driven IDS that requires specific syntax to be
followed in order for the signature to be deployed to the sensor successfully.

A

Snort

160
Q

Which of the following is NOT a reason to review weapon system status during a sortie brief?

A

The operator will be primarily responsible for fixing major weapon system issues.

161
Q

How is mounting to a local drive within a virtual machine accomplished using Vmware?

A

In the VMware GUI click ‘VM Setting’ then ‘Shared Folders’ and add the drive’s file path

162
Q

A type of password cracking where each possible combination of letters, numbers, and etc. are used
to find the passsword.

A

Brute Force

163
Q

On a Cisco IOS device, which of the following symbols corresponds to User EXEC mode?

A

>

164
Q

Which of the following is the default port for POP3?

A

110

165
Q

What are the responsibilities of an oncoming crew member during a crew change over brief?

A

Ensure change over checklists are accomplished, Ask questions as applicable to ensure mission effectiveness, Remain attentive to crew commander change over briefing, All of the above

166
Q

You are traveling with your clone. While boarding the plane, a flight attendant states that the laptop
must be stowed below. What should you do?

A

Remove the hard drive from the computer prior to handing over the laptop

167
Q

In Linux, you can search for a file with which two commands?

A

find and locate

168
Q

What is a SYN Flood?

A

Using up all processes on a particular system, starting a handshake but not finishing

169
Q

Software for privilege users is located in which directory?

A

sbin

170
Q

What type of virtual machine network adapter configuration creates a private network that is
completely contained within the host computer?

A

Host-Only

171
Q
Select the correct order of steps in a debrief. (I) Determine the Root Cause (RC) of the Debrief Focal
Point (DFP); (II) Develop the Lesson Learned (LL) with and Instructional Fix (IF) to address the
Root Cause (RC); (III) Determine Contributing Factors (CF) related to the Debrief Focal Point (DFP);
(IV) Reconstruct an event and identify the Debrief Focal; Point (DFP)
A

IV, III, I, II

172
Q

Which of the following is NOT a key element in a tactical level mission tasking document?

A

Tactics, Techniques and Procedures (TTPs)

173
Q

Tactics, Techniques and Procedures (TTPs) are _______ in nature.

A

authoritative

174
Q

What net command do you use to start the server service?

A

net start server

175
Q

TCP stands for

A

Transmission Control Protocol

176
Q

Which of the following best describes the order of precedence for iptables’ rules in Linux?

A

Individual reject, accept, block all

177
Q

Flooding a switch with numerous requests causing the switch to lose track of which MAC address is
on which port, thus causing it to reset into learning mode is known as what?

A

MAC Flooding

178
Q

Why is it important to keep operator notes and crew logs?

A

It provides a record of activity that can be reviewed to deconflict issues involving the crew and the mission
Partner

179
Q

Which is connection-oriented protocol?

A

TCP

180
Q

What Linux command prints the current network configuration to the screen?

A

ifconfig

181
Q

A type of computer security vulnerability typically found in web applications which allow code
injection by malicious web users into the pages viewed by others is known as:

A

cross-site scripting

182
Q

Which of the following is NOT an element of a mission/sortie brief?

A

Squadron Announcements

183
Q

What is a netmask?

A

A 32-bit number used to divide an IP address into subnets

184
Q

During a debrief, determining an instructional fix is ___________ .

A

a process of determining how to prevent a debrief focal point from happening again.

185
Q

The purpose of ___ is to serve as a network based IDS used to monitor MPNETs in a passive (nonblock)
Mode.

A

Bro

186
Q

Which properties of the Windows VM network device must be on in order to allow the creation of a
mission share?

A

“Client for Microsoft Networks” and “File and Printer Sharing for Microsoft Networks”

187
Q

In classful network design, which class is 126.0.0.0 network defined in?

A

Class A

188
Q

Which vi command will quit?

A

:q

189
Q

In Linux, what is the difference between permanent and temporary IP address configuration?

A

A permanent IP configuration ensures the host will reboot with the same IP whereas temporary does not

190
Q

Configuration files are normally located in which directory?

A

etc

191
Q

Which of the following is NOT part of the procedures to sign a crew information file (CIF)?

A

Email Stan Eval that CIF has been signed off

192
Q

Which of the following is the default port for SNMP?

A

161

193
Q

(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG),
information and mission impact pertaining to the availability of services or network outages for AF
information systems has what classification?

A

SECRET

194
Q

Which of the following IS a tasking document used for CVA/Hunter missions?

A

Cyber Tasking Order (CTO)

195
Q

During a debrief, event reconstruction is ____________

A

a process of looking back at the mission and determining the facts/observations

196
Q

What is a Teardrop DoS attack?

A

Sending mangled IP fragments with overlapping, oversized, payloads to the target machine

197
Q

In Windows, what command will enable the firewall and allow exceptions?

A

> netsh firewall set opmode enable enable

198
Q

In BASH script, which is an acceptable first line to the file?

A

!/bin/bash

199
Q

What is the Windows SAM?

A

A database stored as a registry file containing users passwords in a hashed format

200
Q

Which of the following is a tool that analyzes ICMP probe responses to perform OS fingerprinting?

A

xprobe2

201
Q

A covert channel is ______________.

A

the transfer of information hidden within the medium of a legitimate communications channel.

202
Q

Who is responsible for the configuration management of the MIP2 clone image?

A

A member of the maintenance flight

203
Q

Which of the following describes authorities for national guard?

A

Title 32

204
Q

You have mounted the encrypted partition in Linux, where is the ‘working directory’ located?

A

/ios/data/assess

205
Q

Which of the following commands will securely copy a file from your machine to a remote machine?

A

scp file user@remoteIP:/tmp

206
Q

The ___ is a collection of servers and devices that provide sustainment, maintenance, and support
for CVA/Hunter remote operation.

A

GIP

207
Q

How does a hub function?

A

Any message that comes in one port is sent to all ports

208
Q

(U//FOUO) Which Cyber Protection Team (CPT) squad conducts terrain mapping and works closely
with the organic network operators and defenders to plan, train, and deploy mitigations?

A

Cyber Support

209
Q

Linux is ____ .

A

case sensitive

210
Q

Which directory contains virtual files with kernel information?

A

proc

211
Q

What is Nessus?

A

A vulnerability scanner

212
Q

UDP Stands for ________.

A

User Datagram Protocol

213
Q

A malfunction is characterized by _____________.

A

Any weapon system component degradation limited to an individual’s VM or host.

214
Q

Which of the following provides authority for active duty warfighting?

A

Title 10

215
Q

A TCP Null scan with nmap means:

A

No flags are set

216
Q

Which of the following is not a Layer 3 protocol used by Cisco IOS devices?

A

STP

217
Q

Which of the following is a rule for CVA/Hunter emergency procedures?

A

Maintain Control

218
Q

A special text string for describing a search pattern is known as what?

A

Regular Expression

219
Q

What protocol is not vulnerable to sniffing?

A

ssh

220
Q

In Ubuntu Linux, what command is used to enable the firewall?

A

fw_iptables.pl enable -i eth0

221
Q

Broadcasting fake ARP messages with the aim is to associate the attacker’s MAC address with the IP
address of another node is known as what?

A

ARP Spoofing

222
Q

An intrusion detection system that is behaving actively, meaning it can block traffic in real-time, is
commonly referred to as:

A

Intrusion prevention system