General Operator Flashcards

1
Q

Mission of N.B.T.

A

To assess and evaluate the security posture of Naval Networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

IBTV

A

Requested by command. Command pays all expenses. Purpose is to train!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IBTV Stage II

A

Train and Assist IFOR. Used to help command fix any security hits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IBTV Stage III

A

Actual inspection used to score command (OCA assess network as is!)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 Host Diagnostics

A
  1. Ping (Test Connection)
  2. Resolve DNS (ID’s Host IPs)
  3. WMI (Win Management Interface)
  4. Admin Share (Test Access)
  5. Remote Registries (Test Remote Access)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Blue Scope Services

A

P.S. Exec (Secondary Connection)

WMI (Primary connection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to connect to Blue Scope

A

Username?
IP?
Port?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Difference between Linux Host and Windows Virtual Machine?

A

Linux Host: All findings stored here

Win VM: Blue Scope Runs on…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of creating an input file for NMAP?

A

So it knows what to scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

XSLTPROC:

A

Command to convert the NMAP.xml to html file. Enables easy reading of data for operator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Purpose of Nipper Tool?

A

Router Configuration. TELNET NOT Enabled!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Courier Card/Letter

A

Card: allows the carrying of classified material when out of area travel is not required
Letter: allows you to carry classified material on commercial travel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Letter of Transmittal (LOT)

A

Used for inventory of all gear. Point of contact is required to sign at the site verifying the arrival of all equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Creating an OU

A

Properties, Group Policy Tab, Check Block Inheritance. We use for User and Computer Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the Attila Command?

A

Script on Linux (File path of data location) Anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Scans/Deploys

A
Browser Info
Virus Definitions
Windows User Accounts
USB Detect
Open Source

*Active scans use more bandwidth and run from bluescope. Deploys= Send to host machines, and host machines send back.

17
Q

What do we use to analyze data?

A
Blue Scope (Collects)
Sequel (Holds)
Network Bench (Reviews)
18
Q

Deploys

A

Snarf

Browser Info

19
Q

Configure Payloads in Blue Scope

A

Use config button

20
Q

Know Pythagoras path….

A

Stage II scoring sheet that we no longer use

21
Q

Everyone Group vs Authenticated Group

A

Everyone group can be seen by anyone and the authenticated group only specific authenticated people.

22
Q

How to start/stop SQL service?

A

Sudo service mysqld start/stop

23
Q

5 sections of a report Explain Each

A
  1. Executive Summary
  2. Key Findings
  3. Analyst Comments
  4. Tables
  5. Score Sheet
  6. Mitigating guides/documents
  7. POC Forsight
24
Q

NAT/Bridged

A

NAT: The ship’s network sees IP/MAC addresses as one for both the laptop and the VM. **Preferred method
Bridged: The ship’s network sees TWO IP/MAC address for both the laptop and the VM. *Is set as default.

25
Q

What is the function of VRAM and what is stored there?

A

Vulnerability Asset Scanner… The web repository for compliance scans. MUST HAVE 80% of workstations scanned. It checks IAVAs

26
Q

Basic Sequel Query

A
  • Select From {Table}
27
Q

Pythagorus

A

Stage II scoring sheet. no longer use… localhost/cgi bin/Pythagoras.pl