IDW: Network/IA Flashcards

0
Q

How many networks do we have onboard?

A

6: NIPR, SIPR, CENTRIX, JWICS, PPLAN, MCMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What is defense in depth in regards to IA?

A

A concept of multi-layered security; multi layers to prove that you are authorized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the biggest threat to the network and how do we mitigate it?

A

User awareness and training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is compliance in regards to patching?

A

If a computer on the network isn’t fully patched then there’s a loophole that can be exploited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does inventory effect compliance?

A

If you don’t know where a non-compliant computer is, you can’t fix it and have vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the ISSM and their responsibilities?

A

Information Systems Security Manager; serves as the point of contact for all command IA matters and implements IA program. Designated in writing by CO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the ISSO and their responsibilities?

A

Designated system administrator for a system (GCCS, AIS, TMIP). They oversee compliance inventories and other requirements assigned by ISSM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TASO responsibilities

A

Share drive folder and file management

SAAR form management

Cyber Awareness training management

Evaluate and report security vulnerabilities and problems

Complete and maintain inventories of all IT equipment

Notify ADP of equipment changes

Train and submit division requests for new equipment.

Ensure electrical safety checks conducted

Inform ADP of personnel changes

Assist with creating Outlook PST files

Assist uses in mapping drives

Assist Combat Systems with (Information Security) IS inspections

Communicate news from meetings with leadership.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a network violation?

A

Auto-forwarding Navy email to commercial email

Bypass firewalls

Use unauthorized software

Relocate or change equipment

Upload/download files

Using personal hardware

Misuse of IT resourcesto adversely reflect on Navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are spillage procedures?

A

Report to CoC, electronic spillage report must go out every 24hrs to every command involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What’s NETSEC responsible for?

A

All data security,assurance policy, network configuration management, spillage reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How often is anti-virus done

A

7 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What did Private Manning do?

A

Copied classified classified info and uploaded to Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What did Edward Snowden do?

A

Copied classified material to external hard drive and released it to the public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information Assurance

A

Practice of assuring information and managing risks related to the use, storage, and transmission of information or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Interim Authority To Operate

A

Has authorized termination date within 180 days; can’t have consecutive IATO totaling more than 360 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Authority To Operate (ATO)

A

Issued for 3 years; DAA authorized to run Information Systems at an acceptable level of risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Public-key infrastructure (PKI)

A

Crypto technique that enables users to communicate on an insecure public network verify users identity by digital signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Information Assurance Vulnerability Alert (IAVA)

A

Announcement of a computer vulnerability notification. IAVA’s require acknowledgement and compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Public-key infrastructure (PKI)

A

Crypto technique that allows users to securely communicate on an insecure network using digital signatures to verify.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Information Assurance Vulnerability Bulletin (IAVB)

A

Announcement of a computer vulnerability. IAVBs require acknowledgement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Information Assurance Vulnerability Technical (IAVT)

A

Announcement of a computer vulnerability. IAVT require notification only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Computer Tracking Order (CTO)

A

Document sent out to change network posture of the fleet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Information Assurance Manager (IAM)

A

Responsible for ensuring commands Information Systems are operated, used, maintained and disposed of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Virus

A

Harmful program in disguise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Worm

A

Self-replicating sub-viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Network Enumeration

A

Process of extracting valid account or exported resource names from systems using active connections and desires queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Trojans

A

Harmful program disguised as a legit application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Network Enumeration

A

Extracting valid account or exported resource names from systems using active connections and desires queries

30
Q

SQL Injection

A

Code injection technique; used to attack data-driven applications.

31
Q

Privilege Escalation

A

Using a flaw to increase privilege level

32
Q

Social Engineering

A

Deception to get sensitive information.

33
Q

Host-Based Security System

A

Can detect and counter, in real time, against known cyber threats.

33
Q

Dictionary attack

A

Using all words in dictionary to crack a code

34
Q

Brute Force Attack

A

Using all possible methods to crack a code

35
Q

Assured Compliance Assessment Solution (ACAS)

A

Used to scan the network for compliance of the latest patches in conjunction with VRAM.

36
Q

Information Operation Condition (INFOCON)

A

5 levels; 1 is most dangerous and 5 is least dangerous. We are currently at 3.

37
Q

Electronic Spillage

A

Placing sensitive material on a less sensitive network. Ex. Can’t go from high to low.

38
Q

Navy Cyber Defense Operations Command (NCDOC)

A

Ensuring proper internet usage on-board USN Afloat Commands.

39
Q

MSG Server

A

Provides 2 basic services on an enterprise firewall and a web proxy/cache server.

40
Q

Non-classified Internet Protocol Router Network (NIPRNET)

A

Unclassified network. Ex: Facebook

41
Q

Secret Internet Protocol Router Network (SIPRNET)

A

Classified network.

42
Q

Joint Worldwide Intelligence Communications Systems (JWICS)

A

TS/SCI network

43
Q

Virtual Local Area Network (VLAN)

A

Group of workstations, servers and network devices that appear to be on the same LAN despite geographical location

44
Q

Domain Name System

A

Converting computer host names and domain names into IP addresses.

45
Q

Dynamic Host Control Protocol (DHCP)

A

Provides IP addresses to computers.

46
Q

Domain Controllers

A

Run Active Directory, Dynamic Host Configuration Protocol (DHCP), Domain Name System. We have 2 per network

47
Q

Active Directory

A

Used to create, manage and edit objects on the network.

48
Q

IPv4 address space

A

32 bit field and can support up to 4.3 billion IP addresses.

49
Q

IPv6

A

Uses 128 bit addresses.

50
Q

Common UDP/TCP Ports

A

20/21 - File Transfer Protocol (20 is data, 21 is control)

23 - Telnet

25 - Simple Mail Transfer Protocol

80 - Hypertext Transfer Protocol

443 - Hypertext Transfer Protocol w/ Secure Sockets Layer

51
Q

Web Tier

A

Aka Web User Groups. Used to control bandwidth.

52
Q

Web Tier

A

Web User Groups. Used to control bandwidth. We have 3 (low, medium and high)

53
Q

DOS Commands

A

Ping: Used to reach the ability of a host on a IP network.

Trace Route: used to determine the path taken to a destination across a network.

IPCONFIG: Tool used to view network interface configurations.

54
Q

Navy Information Application Product Suite (NIAPS)

A

Deliver maintenance, logistics, administrative, training and management applications to users at sea.

NKO Afloat, FEDLOG, Distance Support

55
Q

Navy Tactical Command Support System (NTCSS)

A

Provides a full range of of standardized mission support ADP hardware and software.

56
Q

NTCSS Applications include:

A

R-Supply: Relation supply provides Navy and Marines tools and functions needed to perform daily tasks.

OMMS-NG (Organizational Maintenance Management System-Next Generation: Provides quick, convenient access to the maintenance information needed for readiness

R-ADM (Relational Administrative Data Management): Personnel management

NALCOMIS (Naval Logistics Command Management Information System): Provides aviation maintenance and material management with information.

57
Q

TMIP-M (Theater Medical Information Program-Maritime)

A

AHLTA: Utilized for sick call information and dr’s notes

SAMS: Holds shot records, and transit data off ship to NMO

58
Q

FLTNOC (Fleet Network Operations Centers)

A

ECRNOC: European; Naples, Italy

IONOC: Indian Ocean; Bahrain.

PRNOC: Pacific; Wahiawa, HI

UARNOC: Unified Atlantic; Norfolk, VA

59
Q

DCGS-N (Distributed Common Ground System-Navy):

A

Provides real time imagery in support of fleet intelligence.

60
Q

CENTRIXS (Combined Enterprise Regional Information Exchange System):

A

Global data network for U.S. and petter forces to share classified operational and intelligence information.

61
Q

GCCS-M (Global Command and Combat System-Maritime)

A

Provides afloat joint and allied commanders a single integrated C4I with intelligence and environmental information.

62
Q

Who is the ships Information Assurance Manager (IAM)

A

LT Johnson and ITC Brown

63
Q

How many layers are there in the OSI model

A

7

64
Q

Layer 1 of OSI Model

A

Physical

65
Q

Layer 2 of OSI Model

A

Data Link

66
Q

Layer 3 of OSI Model

A

Network

67
Q

Layer 4 of OSI Model

A

Transport

68
Q

Layer 5 of OSI Model

A

Session

69
Q

Layer 6 of OSI Model

A

Presentation

70
Q

Layer 7 of OSI Model

A

Application