Help Desk / Miscellaneous Flashcards
Steps to create CANES account [4]
- User completes Cyber Awareness training
- User creates SAAR-N Form
- SAAR-N Form is signed by ISSO and ISSM
- MCA01 > Active Directory > Users and Computers > CANES Users > USA Users
SAAR-N
System Authorization Access Request Navy
To record names, signatures, and Social Security Numbers for the purpose of validating the trustworthiness of Individuals requesting access to Department of Defense (DoD) systems and information.
ISSM & ISSO
ISSM stands for Information Systems Security Manager, while an ISSO stands for Information Systems Security Officer.
An ISSM is responsible for managing the overall security program for information systems within a military organization. Their role involves risk management, ensuring compliance with security regulations, coordinating security training, and conducting security assessments.
On the other hand, an ISSO is responsible for the day-to-day operational security of information systems. They work closely with the ISSM and are involved in tasks such as system administration, incident response, vulnerability management, and security monitoring. ISSOs ensure that security controls are properly implemented, maintained, and monitored to protect the organization’s information systems.
Default when creating NTCSS account
Boxes to check
Username
Classification
All users (3) no NTCSS
6 first of last name + first initial + middle initial = 8
Unclassified
See the CAC certs running
- Up Arrowhead
- Red Eagle (Axway)
- CA specific (three green certs overlapping)
See the inserted CAC’s certs
- Up Arrowhead
- Active Client (Blue Apple Watch icon)
Exchange: Create custom folder
- Rules
- New Rule
Enable/ Disable exchange account
- EX01
- Exchange Admin Center
- Connectivity
How do you find the most comprehensive manual of the network that doesn’t include software products?
- Share Drive
- /CC DIV
- Search most current version: SW4
Add person to email Distro from what server
EX01
Three servers to add user to a group
Create (security) group in DC01
Manage (security) group in FS02
Distros EX01
Server and Software to push software and patches
CM01: SCCM
To clear space and or fix NTCSS not connecting to database
- Search pathway in CC DIV regedit
- Delete user from local C drive
Teletypewriter Formats
Teletypewriters, often abbreviated as TTY, come in several formats, but the three main formats commonly used are:
- Baudot Code (5-bit Teletype): This was one of the earliest formats used for teletypewriters and used a 5-bit binary code. It was limited in the characters it could represent and had a slower data transmission speed compared to later formats.
- ASCII (American Standard Code for Information Interchange): ASCII-based teletypewriters became prevalent as ASCII encoding became the standard for text and data representation in computing. These TTYs could transmit a wider range of characters and symbols, making them more versatile.
- EBCDIC (Extended Binary Coded Decimal Interchange Code): EBCDIC-based teletypewriters were used in some IBM systems and other mainframes. EBCDIC is a character encoding that uses 8 bits per character and was primarily used in large-scale computing environments.
ASCII-based TTYs became the most widely adopted due to the compatibility with emerging computer systems and the broader character set it supported.
In radio communications, a parasitic element refers to
an element in an antenna system that is not connected directly to the transmitter or receiver but plays a critical role in influencing the antenna’s radiation pattern and performance.
NAVPERSCOM
Navy Personnel Command
CNDSP
Computer network defense service providers (CNDSP) commonly consist of a Computer Emergency Response Team or Incident Response and Recovery Team (IRRT) and are closely associated with Network Operations and Security Center.
What are Echelons?
There are different echelons within the United States Navy, each responsible for specific functions. Typically refers to the levels of a hierarchical structure or command organization. The specific responsibilities can vary depending on the context, such as military or organizational structures.
What is IDCRC?
Naval Information Force Reserve (NIFR), formerly Information Dominance Corps Reserve Command (IDCRC), provides timely and valued Naval Information Force capabilities (Meteorology & Oceanography, Information Operations, Networks, Cryptology/SIGINT, Intelligence & Space) from the Reserve Component to meet Fleet and Joint operational requirements. Commander, Naval Information Force Reserve (CNIFR) and Reserve Deputy Commander, Naval Information Forces (NAVIFOR), is RDML Greg Emery.
Echelon III.
What is ONI?
The Office of Naval Intelligence is America’s premier maritime intelligence service and a core element of the U.S. Navy’s Information Warfare Community. ONI possesses unmatched knowledge of the maritime operating environment and delivers penetrating understanding of threats to America’s security to national decision makers and the Fleet. Established in 1882, ONI is the nation’s longest-serving intelligence agency. Echelon III.
ITPR
Information Technology Procurement Request (ITPR) process.
Any purchase of $25,000 or more (including Government Purchase Card purchases) or that is National Defense Authorization Act (NDAA) related does require an ITPR submitted in the Navy Information Dominance Approval System (NAVIDAS).
Commands are required to track IT transactions of $25,000 or less to ensure auditability and comply with Service specific guidance.
There is no minimum threshold for the acquisition of cloud computing services, all of which require an ITPR.
FQDN
A fully qualified domain name, sometimes also referred to as an absolute domain name, is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System. It specifies all domain levels, including the top-level domain and the root zone.
.com is the top-level domain
mysite is the second-level domain
mysite.com is the domain name
www.mysite.com is the fully-qualified domain name (FQDN)
KIV 7
Data Link
Dual Simplex
58M is for
UHF
KYV 5M
EHF
HF
SATCOM
Crypto devices from two communicating commands have to be
The same model in order to communicate
Crypto receiving document
SF153
AL code 6
Electronic keys
What to use for reference other than for server product applications (example RSUPMAST)
IETM
Duasything
- File explorer
- Right click
- Properties
- Change Computer name
Create PST (Outlook)
To create a PST (Personal Storage Table) file in Outlook, follow these improved instructions:
- Open Outlook and navigate to the “Home” tab.
- Click on “New Items” in the toolbar.
- From the dropdown menu, select “More Items.”
- Choose “Outlook Data File” from the list.
- Follow the prompts to choose a location on your computer to save the PST file and name it.
- Click “OK” to create the PST file.
To map PST
Import/ export
Open export
Use preselected options
rsop
The rsop.msc
command opens the Resultant Set of Policy (RSOP) tool on Windows systems. RSOP is used to display the group policy settings applied to a computer or user, providing a comprehensive overview of all policies currently in effect. This tool is helpful for troubleshooting Group Policy issues or for planning and verifying policy settings in an Active Directory environment. To use it, simply press Windows + R
to open the Run dialog, type rsop.msc
, and press Enter.
IPPLAN file path
Search CANES INSTALL
Get workstation around firewall
From Mrds02
sa.internal
line 1
show run int g2/0/19
conf t
(config) default int g2/0/19
“Interface GigabitEthernet 2/0/19 set to default configuration”
int g2/0/19
(config-if) switchport access vlan 182
end
#show run int g2/0/19
Correct IP configuration for workstations (3)
subnet mask: 255.255.255.0
default gateway: 205.68.246.1
DNS servers: 205.68.246.6 205.68.246.7
Who to contact when a computer has been placed in quarantine
NCDOC (for reporting malware)
Power on script folder
Junotech
If NTCSS account was created correctly next step is
Send user to Admin to finish activating account.
To change user attribute employeeID
Search Active Directory manually/ by scrolling.
VLAN for UPS and printers
184
VLAN for workstations
182
Data Center Racks locations
Sonar 1, Array 2, 3, 4, SNAP, SCCR3
After script for new user creation
Open active directory search by name.last
Change display name to include (LAS XX)
Copy name to rename in list
Make member of
To access a UPS GUI you’ll need
Be connected to vlan 184
UPS IP address
Who gives permission to destroy crypto
CO
What is destroyed first during crypto destruction?
During the decommissioning of cryptographic equipment, the most volatile components, such as those classified as top secret, are usually destroyed first. This prioritizes the elimination of the most sensitive data and parts to prevent any potential security breaches.
Provision a new computer
- Identify what port/drop you are going to use for provisioning
- Determine what switch port that drop is connected to
- Change the vlan of the identified Switchport
- Change the vlan of that switch port
- Provision the workstation
Make sure the DNS name you give it is not already in use by another workstation
Don’t forget to add it to the domain
Don’t forget to download SKED, RADM, NAVFIT and other applicable programs
Make sure it downloads all the windows updates
Determine what switch port that drop is connected to (provisioning)
- Determine what switch port that drop is connected to
2a. Connect management laptop to port/drop
2b. Get the MAC address of the laptop by running ipconfig /all
2c. Write down the MAC address (physical address)
Change the vlan of the identified Switchport (provisioning)
- Change the vlan of the identified Switchport
3a. Open putty
3b. Interface with the backbone router
3c. Run command <show mac address-table | include (last four of the MAC address)>
3d. This should give you the switch the device
3e. Interface into that switch via putty
3f. Run the command shown in step 3c
3g. Write down the interface that it tells you. (DO NOT MODIFY THAT INTERFACE YET BECAUSE THATS THE ONE YOURE STILL CONNECTED TO)
Note A: if the commands do not give you any output you will need to look in ISE to determine what interface the port is on.
Change the vlan of that switch port (provisioning)
- Change the vlan of that switch port
4a. Connect management laptop to the management port
4b. Log into the switch that you wrote down for step 3e
4c. Enter global config with command <config>
4d. Run the command <default interface (the interface you wrote down for step 3g.)>
4e. To verify that the interface is not defaulted run <do sh run int(the interface you just defaulted)>
4f. Interface into it with command <int (whatever the fuck it is)>
4g. Run the following commands in order
< Switchport mode access></config>
<Switchport access vlan 198>
(I think that’s the provisioning vlan but verify with the ip spreadsheet)
<no>
<description>
<end>
4h. To verify what you’ve done enter <do sh run int(whatever the interface was)
4i. To save your work run either
<copy>
<wr>
</wr></copy></end></description></no>
Provision workstation after drop has been configured
- Provision the workstation
5a. Connect the non provisioned workstation to the drop you were working on
5b. Verify BIOS settings IAW IETM or the WOB CICD
5c. PXE boot it
Make sure the DNS name you give it is not already in use by another workstation
Don’t forget to add it to the domain
Don’t forget to download SKED, RADM, NAVFIT and other applicable programs
Make sure it downloads all the windows updates
Create .pst
Personal Storage Table or Outlook Data File
- New Items
- More Items
- Outlook Data File
- Standard is to save in H drive
- A new folder will appear in outlook for user to drop emails to save
Create ODF
Outlook Data File or Personal Storage Table .pst
- New Items
- More Items
- Outlook Data File
- Standard is to save in H drive
- A new folder will appear in outlook for user to drop emails to save
Secure office trusted thin client is the server that allows for functionality of thin clients. When they first boot they reach out to SOTTC for their image. SOTTC uses SABI (secret and below interface also known as radiant mercury) to access the secret and SR enclaves so that the end user can access both unclass and secret with no risk of spillage.
Secure office trusted thin client is the server that allows for functionality of thin clients. When they first boot they reach out to SOTTC for their image. SOTTC uses SABI (secret and below interface also known as radiant mercury) to access the secret and SR enclaves so that the end user can access both unclass and secret with no risk of spillage.