Cyber Operator Flashcards
In order to execute a file in Linux the file must _____.
Be executable, contain executable code, and you must have permission to execute it
With a umask of 022, which of the following permissions are assigned when creating a new file?
rwxr-xr-x
In Linux this file is used to store hashed passwords and readable only by root.
shadow
This is a set of standards carrying out wireless local area networks.
IEEE 802.11
Which Windows 7 command can be used to perform a soft shutdown?
shutdown /s /f /t 00
A system that gathers and analyzes information from within a computer or a network, to identify
possible violations of security policy, including unauthorized access, as well as misuse is known as:
IDS
What is the default MIP2 firewall state prior to being connected to the network?
enabled and not allowing incoming connections
(U//FOUO) What are the three sub-missions of a Cyber Protection Team (CPT)?
Survey, Secure, Protect
Which Windows command can be used to configure the IP address either statically or to use Dynamic
Host Configuration Protocol (DHCP)?
netsh
(U//FOUO) Which document prioritizes and outlines the options and actions available, both technical
and procedural, to provide a greater level of mission assurance for the supported commander’s
mission through the consolidation of all squad recommendations?
Risk Mitigation Plan (RMP)
How can you stop a TCPdump capture?
Use Control-C
Which of the following is NOT contained in the CVA/Hunter Air Force Tactics, Techniques and
Procedures (AFTTP) 3-1?
Commercial Manuals
What is the purpose of crew logs?
To maintain an accurate and detailed record of all significant events
_____ focus primarily on qualitative analysis of ISR employment to determine ISR contribution to
mission objectives.
Measures of Effectiveness (MOE)
A program in which malicious or harmful code is contained inside apparently harmless programming
or data in such a way that it can get control and do its chosen form of damage is known as what?
Trojan
It is important to review _______________ during the sortie brief because it will affect the choice of
TTPs and the accomplishment of tactical tasks during sortie execution.
Intelligence Updates, Mission Partner Activity, Rules of Engagement, Crew and Mission Risks, All of the above
In Linux, how are trusted and target IP addresses added or removed?
By editing the /etc/trusted.hosts and /etc/target.hosts files
Techniques are __________.
Non-prescriptive ways or methods used to perform missions, functions or tasks
_____ focus on task execution and quantitative mission achievement.
Measures of Performance (MOP)
Which of the following is the Linux command for securely copying a file from a remote machine to
your home directory?
scp 10.10.20.100:/ios/data/assess/file.txt /home/usr/
Null sessions are __________.
an anonymous (no user, no password) connection to a freely accessible remote share called IPC$ on Windows-based servers.
Software applications that run automated tasks and can be remotely controlled, normally used in
DDoS are commonly referred to as what?
Bots
When validating DIP sensor processes what command verifies that the processes are running?
/usr/local/bin/checkstatus
What type of malware spreads from computer to computer and has the capability to travel without
any human action?
Worm
Which bit allows execution of an application as a member of this group?
SGID
Which interceptor platform consists of a single laptop, is used by one crew member and can run
limited VMs concurrently?
Mobile Interceptor Platform (MIP)
Which of the following Deployable Interceptor Platform (DIP) sub-components serves as a data
Collector and VM server?
DL-160
In VMware what do you press to exit a virtual environment?
CONTROL+ALT
Which of the following Deployable Interceptor Platform (DIP) sub-components is deployed on the
MPNet and primarily captures and stores network traffic?
Cywarfius sensor
Which of the following are the default ports for web traffic?
80 and 443
What is the TCPdump option that saves the packet data to a file?
-w
(U//FOUO) Which Cyber Protection Team (CPT) squad analyzes the supporter commander’s identified
cyberspace dependencies, essential and critical assets and cyberspace key terrain (C-KT)?
Mission Protection
A type of password cracking where a word list is used against a given encrypted password.
Dictionary Attack
Which of the following is NOT a private or non-routable IP address?
172.168.1.1
In Linux, user account information is contained in which file?
/etc/passwd
Where are the Bro sensor logs kept?
DIP2
Which vi command will bring you into insert mode?
I
Which of the following is NOT a tasking document used for CVA/Hunter missions?
Task Management Tool (TMT) Tasker
Which interceptor platform consists of Cywarfius sensors, Informaiton Operations Platform (IOP), and
fits in a hardened case?
Deployable Interceptor Platform (DIP)
How is the encrypted partition unmounted?
Double click the “UnMount…” desktop icon
PowerShell Cmdlets follow which naming convention?
Verb-noun
A path that contains the root directory and all subdirectories of the location is called?
Absolute Path
What could you use to redirect the output of a program to the input of another program on the
command line?
Pipe (|)
Which of the following documents contains an abbreviated version of the amplified Ops Manual Technical Order (TO-1)?
CVA/Hunter Cybercrew Checklists / Crew Aides
Which command will allow you to run TCPdump to monitor activity on a particular subnet?
tcpdump -w traffic net 10.10.20.0/24
Which of the following is NOT a rule for CVA/Hunter emergency procedures?
Act Immediately
Which of the following is the default port for SMTP?
25
What is a smurf attack?
Large amount of ICMP echo traffic to a network broadcast address with a spoofed source IP set to a victim
Host
Which of the following is the default port for Telnet?
23
In Windows, what command will enable the firewall and block incoming connections?
> netsh firewall set opmode enable disable
What does the following nmap scan do. nmap -O 10.10.20.1
Determines the OS of the machine
Traffic capture tools such as TCPdump and Wireshark provide _____ accountability of actions
performed on the weapon system.
Logical
When validating GIP functionality which of the following are operator responsibilities during initial
weapon system configuration? (I) Verify connectivity to an operational VM; (II) Modify Access
Control Lists (ACLs); (III) Install ArchSight Linux management console;
(IV) Verify that an operational VM has the appropriate IP in accordance with SPINS
I and IV
A file has an octal value of 755 this means:
The owner can read, write and execute; the group can read and execute; others can read and execute
A coworker uses the smb_share.pl to create a share. You are on a windows machine and using the net use command to mount the share. What user do you use when attempting to mount the share?
root
Which drive letter is used for the encrypted partition?
X:\
Which of the following Deployable Interceptor Platform (DIP) sub-components primarily serves as a
deployable network intrusion detection system?
IOP
What type of information in a tactical level mission tasking document describes communication
requirements and reporting?
Communication Contracts
What could you use to redirect the output of a program to a file on the command line?
Greater than symbol (>)
Which of the following is the Cisco IOS command to copy the running configuration to the starting
Configuration?
copy run start
What is the Unix environment variable which automatically sets file permissions on newly created
Files?
UMASK
(U//FOUO) According to the AFSPC Cyberspace Operations Security Classification Guide (SCG),
information and mission impact pertaining to
SECRET
Traceroute executes by ___________.
increasing the time-to-live value of each successive batch of packets sent
A software system that consists of a program or combination of several programs designed to hide or
obscure the fact that a system has been compromised is known as what?
A rootkit
(U//FOUO) Which Cyber Protection Team (CPT) squad detects, illuminates and defeats previously
unknown adversary activity within a specified area of responsibility?
Discovery and Counter Infiltration
What is the SAM (Security Accounts Manager) file?
A database stored as a registry file containing users’ passwords in a hashed format
What does the broadcast address do?
Allows for information to be sent to all machines on a given subnet
A malfunction is designated an emergency when ___________.
individual troubleshooting efforts do not result in a weapon system fix.
What is a Tactics Improvement Proposal (TIP)?
Comprehensive idea to improve the military capability of a fielded system, overcome a tactical deficiency or
meet an emerging operational need
What does the following command do: C:> psexec \10.10.20.1 cmd
Launches an interactive command prompt
FTP uses which of the following ports?
20 and 21
Tactics are ______.
The employment and ordered arrangement of forces in relation to each other.
Which vi command will delete one line?
dd
Which of the following is NOT a primary purpose of a Tactics Improvement Proposal?
To request modification or acquisition of hardware or software
Which of the following items must be covered in a change over brief?
Factors of the current operational/tactical situation, Critical reports and findings from ending sortie, Active and planned mission partner activity
(U//FOUO) Which Cyber Protection Team (CPT) squad assesses an organization’s security posture
by closely resembling adversary offensive cyberspace activities in their processes and execution?
Cyber Threat Emulation
What are the two major DIP assembly components?
Server (DIP1) and Sensor (DIP2)
Two types of IDS are:
Network-based (NIDS) and host-based (HIDS)
What is the iptable option to clear all firewall rules?
-F
What is not a default chain for iptables?
ACCEPT
Which of the following octal codes allow a file to execute as the owner of that file?
4777
Which iptables target denies a packet and does not send back a rejection?
DROP
What is the technique whereby the sender of a packet can specify the route that a packet should take
through the network?
Source routing
Which of the following is NOT contained on the PEX sortie details report
Go/No Go Status
According to the communication contract shown, once maintenance implements a fix, who is
responsible of assigning an operator to conduct an operational check to determine the weapon system
Status?
cyberspace operations controller
How is the encrypted partition mounted?
Double click the “Mount X Drive” desktop icon and enter the password
The accuracy of IPs and MAC addresses are of critical safety concern because _________ .
They are used as targeting information
Which of the following is the Linux command for logging into 10.10.20.100 as assessor?
ssh assessor@10.10.20.100