General NBT Flashcards

1
Q

What is the purpose of Navy Blue Team?

A

Assess and evaluate the security posture of Navy networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Directive 527-1?

A

Guidance on INFOCON levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Appendix 12 to Appendix C OPORD 05-01?

A

DOD INFOCON execution procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DOD 8530-1?

A

Establishes CND certification and accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SURFORREDMAN (COMNAVSURF PAC INST 3502.3)?

A

Dictates NBT assesments and CND guide for afloat units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can be found on HTTS://SAILOR.NMCI.NAVY.MIL?

A

IAVA downloads, CND-OSE downloads, software patches, and baseline configs for ISNS/ADNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can be found on WWW.NCDOC.NAVY.SMIL.MIL?

A

Incident reports, FAMS, CTO’s, and DNS black hole list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can be found on INFOSEC.NAVY.MIL?

A

SIPRNET antivirus updates and VRAM link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can be found on WWW.CYBERCOM.SMIL.MIL?

A

INFOCON guidance and directives, CTO’s and CYBERCOM info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an IAVA?

A

Information Assurance Vulnerability Alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an IAVB?

A

Information Assurance Vulnerability Bulletin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an IAVT?

A

Information Assurance Vulnerability Technical Advisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a CTO?

A

Computer Tasking Order- Implements changes and dictates what can and cannot be done on networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of VRAM?

A

Assess and upload scans from scans from VRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is INFOCON?

A

The level of protection for information systems based on perceived or actual threats. Levels 1 (greatest) thru 5 (least).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NNWC

A

Naval Network Warfare Command. NETWARCOM Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

USCYBERCOM

A

Overall boss for anything cyber related. Phase 3 assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

USSTRATCOM

A

strategic operations. may impact cyber readiness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NSA

A

all SIGINT operations. NSA/CSS threat operations center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NCDOC

A

ISP and CND provider for the Navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ACERT

A

Army Cyber Emergency Readiness Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AFCERT

A

Air Force Cyber Emergency Readiness Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NCIS

A

Investigates cybercrimes for the Navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

MCNOSC

A

Marine Corp NCDOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

USCYBERFOR

A

Tenant Command of 10th Fleet. Phase 2 Assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

10th Fleet

A

Navy Element of CYBERCOM. Does inspections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Who is authorized to make changes to NON_POR equipment?

A

Ship’s IT’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Who is authorized to modify POR equipment?

A

Only the programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is the difference between Stage II and Stage III?

A

Stage II is completed by CYBERFOR. There is an assist and train report after assessment. Stage III is completed by CYBERCOM and is the final score.

30
Q

Why do assessment laptops require their own OU in ADUC? What happens if this is not done correctly?

A

Blocks inheritance and prevents Compose from pushing data to the laptop

31
Q

What is DNS traffic logging and why is it important during data analysis?

A

Shows possible beaconing to where and how often

32
Q

What is port security? How does this affect Blue Team assessments?

A

Where a switch port is assigned to a specific MAC address or computer. If port security is on, the Blue Team laptop will not be able to connect to the ships domain.

33
Q

Explain the relationship between the UNIX virtual machine and the windows host:

A

VM runs from Windows OS and allows for NMAP and Darkether scans. All collected data is held on windows C:/ drive

34
Q

How do you enable the shared folder on the VM?

A

In VM – VM settings – options – advanced options – select always enable – select the folder – APPLY

35
Q

What script is used to collect infrastructure device configurations?

A

Darkether_local

36
Q

What script is used to organize all XML output files into Multi Verse upload folder?

A

Darkether_run

37
Q

What is the purpose of NIPPER?

A

A tool to check configurations in Cisco IOS for vulnerabilities.

38
Q

What command line is used to shutdown/restart a machine?

A

INIT 0 and INIT 6

39
Q

What is Compose and how does it integrate with Windows and Active Directory?

A

SPAWAR specific software installed on top of windows

40
Q

What does SQL stand for?

A

Structured Query Language

41
Q

What is MySQL?

A

free program that interfaces with SQL databases

42
Q

What is MSSQL?

A

program used by HBSS. Made by Microsoft.

43
Q

What are the default security groups?

A

administrators, domain administrators, enterprise administrators, remote desktop users, and schema admins

44
Q

What is the purpose of the “host diagnostics” scan and what is it composed of?

A

Used to see which hosts in active directory are live. Remote registry, ping, DNS resolve, WMI, and admin shares.

45
Q

What is the difference between a Scan and a Payload?

A

Scan- network intensive, done with constant contact with host.
Payload- sent to a host, collects all requested data, then sends the information back to the requester.

46
Q

What are the important files created by the “NMAP_SCAN2.PL” scan?

A

XML port scans, device info, OS info

47
Q

What is XREF?

A

Cross reference file

48
Q

What is MULTIVERSE.JAR?

A

Java executable to launch multiverse

49
Q

What is an XCCDF file?

A

STIG data and checks baseline security for compliance

50
Q

Explain Windows user account scan?

A

Check for local user accounts on a windows host

51
Q

Explain virus definitions scan?

A

Checks to see if the most recent virus definitions are installed

52
Q

Explain windows software scan?

A

Checks which version of windows is installed

53
Q

Explain RECENTITEMS scan?

A

Checks recent items directory on a windows host

54
Q

What is Event Logs Plus?

A

Checks for event logs

55
Q

Explain Windows running process scan?

A

Checks all running processes on a windows host

56
Q

What is autorun enforcer?

A

Checks to see if auto runs are disabled

57
Q

Explain Autoruns payload:

A

Checks if host automatically runs devices or programs

58
Q

Explain XCCDF payload:

A

STIG checks and XREF scan

59
Q

Explain computer identification payload:

A

Collects host name and OS version

60
Q

Explain REGRAIDER payload:

A

Parses registry and collects specific registry keys

61
Q

Explain file audit plus payload:

A

Collects files with specific extensions

62
Q

Explain SNARF payload:

A

Collects MD5 hash values of files and checks for known goods

63
Q

Explain wireless connections payloads:

A

checks a host for enabled wireless devices

64
Q

Explain Handle payload:

A

collects handler information

65
Q

Explain REGDUMP payload:

A

Collects a hosts registry

66
Q

Explain LOGON status payload:

A

Checks current logons

67
Q

Explain open ports plus:

A

Checks open ports on a host and processes

68
Q

What payloads have to be executed in order to execute the cross-reference script?

A

CPE Name and XCCDF

69
Q

What is the Navy Blue Team Report composed of?

A

Ships Info, Team Member, Team Member contact info, score, violations, findings, mitigations, supporting documents, and comments

70
Q

What is Pythagoras?

A

The scoring criteria for blue team assessments

71
Q

What is the difference between a finding and a poor security practice?

A

FINDING- violated a CTO or instruction

POOR SECURITY PRACTICE- doesn’t violate any CTO or instruction but could be harmful to the network

72
Q

What is SNARF?

A

Scan Network And Report Findings. Only scans system root and C: FOR HASHES. Looks for malicious software. References “knowns”. Exe’s and DLL’s only.