NAVMACS Flashcards
In the NAVMACS system, passes information from one enclave to another
Radiant Mercury (RM)
5510.60N
OPNAVINST 5510.60N is a Chief of Naval Operations Instruction that outlines security policy direction and provides standardized procedural guidance for the protection of classified information and Controlled Unclassified Information (CUI) within the custody of the Chief of Naval Operations and the Office of the Chief of Naval Operations.
If fan is overheating in NAVMACS rack make sure the plates
Are on to allow proper airflow
What CPU is a spare in the NAVMACS rack?
CPU4, between CPU1 and CPU2
Doesn’t have a Radiant Mercury (RM) card
VLAN to connect AN/SYQ-26(V)7
VLAN SSIL-1
Documentation for AN/SYQ-26(V)7 only in what side of the enclaves
High Side
Full name of Victor 7
AN/SYQ-26(V)7
What are the J1B and J1A in Victor 7?
J1B auxpowers the printer
J1A is the main power for the rest of the rack
Power on procedure for V7
1- At the middle bottom of the rack start with the switch
2- then button immediately over
3- Hold the top circular button to the very left (from the 4-button cluster)
4- At the top switch everything up
5- Open racks to turn CPUs On
6- Turn on the monitors
(Reverse the steps to power it off)
Device for TS messages on CWO desk
MAD II
CUDIXS always uses what antenna
Trashcans (OE-82)
CVE [cyber security]
Common Vulnerabilities and Exposures is a list of publicly disclosed computer security flaws. When a vulnerability is discovered, it can be reported to the CVE program, which assigns it a unique identifier (CVE ID). This system helps standardize the way security vulnerabilities are identified and referred to, facilitating the sharing of data across different security tools and services.
Nessus
Nessus is a widely used cybersecurity scanning tool developed by Tenable Network Security. It is designed to perform comprehensive vulnerability assessments by scanning network devices, systems, and applications to identify security weaknesses, such as misconfigurations, outdated software, and vulnerabilities to known exploits.
Open Ports [cyber security]
Open Ports refer to network ports on computers or other devices that are configured to accept connections or data packets. While necessary for normal operation and communication, open ports can also provide potential entry points for unauthorized access if they are not securely managed.
ACAS
(Assured Compliance Assessment Solution) is a suite of software tools provided by Tenable, Inc., for the U.S. Department of Defense (DoD). ACAS is built around the Nessus scanner and is designed for automated vulnerability scanning, configuration assessment, application scanning, and compliance checking. It is the standardized solution for the DoD to ensure the security and compliance of its IT systems against both internal and external threats.
IDS
An Intrusion Detection System (IDS) is a tool that monitors networks or systems for malicious activity or policy violations, reporting detected issues for response.
RBAA
A Role-Based Attribute Authority (RBAA) in the context of cybersecurity and access control systems is an entity responsible for assigning attributes to users based on their roles within an organization. These attributes are used to enforce access control policies, determining what resources a user can access based on their role. RBAA simplifies management of permissions and access rights by linking them to roles rather than individual users, enhancing security and efficiency.
VRAM
To upload all security cyber scans from all POR (one stop shop)
To get information about the version of NAVMACS II
Applications > Documentation > System Information
DPVS
Distributed Plads Verification System: hold PLADs
How to build a Distro
Distribution lists are built in User Database in Applications
FAM
Fleet Advisory Message
How to find the manual for NAVMACS
Applications > Documentation
During message composing explainer key in NAVMACS
F1
Only place to delete messages in NAVMACS
Message Log OPINT
Organize Screens in NAVMACS rack
Applications > Utilities > Settings >Devices
121.5 MHz
This frequency is used as the international air distress frequency for emergency communication involving aircraft. It’s used for emergency situations, such as when an aircraft is in distress, to facilitate search and rescue operations.
243.0 MHz
This is the military equivalent of the 121.5 MHz emergency frequency, used primarily by military aircraft for emergency communications and distress signals.
In NAVMACS, routes messages given certain key words
Profiler
NAVMACS sys adm username
nm_sa
What value is adjusted when creating a user account for foreigners
(SRC/SHD) BFLPY
OTO (NAVMACS)
Operator To Operator
Troubleshooting NAVMACS when a connection was up and, with no changes in parameters, drops
Call NCTAMS to ask for a remote link test
1- Purpose of NAVMACS II
Transfer GENSER
2- Does not have Radiant Mercury
AV2
3- UPS function in V7
Filters main power and back up
4- T/F UPS distributes power main and aux
True
5- V7 processor layout
D. Starts with Radiant Mercury
6- MAD II
audible visual TS NMP
7- Battle Short
C. Switch to override temperature sensor
8- J1B
AUX = Printer
9- Switches
D. 1,2,3 NO CAC
10- Video switches
Two monitors = two switches
11- V7 3 LANS
Top Secret LAN
Control LAN
Secret LAN
12- CPU1 in V7
RM on non-RAID RHEL
13- V7 TS NMP
Communicates to what?
External Top Secret Serial Circuits
14- V7 RM processor
what for? (Big picture)
A. prevents spillage
15- RAID acronym
Redundant Array of Independent Disks
16- Secret NMP C2OIX protocol
SMTP
17- If C2OIX interface down
From Secret NMP RM and TS NMP over CUDIXS
18- UHF SATCOM circuit connected local NCTAMS
CUDIXS
19- UHF LOS or HF Long Haul Circuit
FPT (TTY)
20- Primary path for TS
CUDIXS
21-Primary path for Secret
C2OIX
22- SATCOM circuit receive only
FLT BCST
23- Common to all comms circuits
Encryption
24-V7 PKI cert for C2OIX
Secret NMP (NOT TS NMP)
25- Update, improve eliminate vulnerability
D. Patch
26- Built-in module RHEL auto-control access-based access control
SELinux
27- Security feature digitally signing outgoing SIPR C2OIX
B. PKI
28- COTs tool scanning
C. ACAS
29- Security feature McAfee ePoly Orchestrator (ePO)
ENSL
Environmental Security and Logistics System
30- To enable McAfee Agent ePO host DB must 1st created
True
31- Monitors malicious activity/ policy violator
IDS
32- Security Center
holds what?
Component to ACAS ship or shore NESSUS
33- Could prevent user from sending a message
Both B & C = User does not exist or does not have the authority
34- NAVMACS GUI ZKP
Command List
35- Create and Manage circuits
B. Circuit Control
36- Order NAVMACS message search
REIAS Relay Exclusive Inclusive All Shotgun
37- NAVMACS version
Documentation
38- How often password
B. 60 days
39- email address C2OIX circuit
navmacs@navmacs
40- automatically reroutes based on key words
Profiler
41- TS NMP and MAD II is set active occurs next
Syncs Alerts
42- DPVS PLA DB T/F
T
43- TS NMP receives NTP from NTP server
False
44- RM rule access system, objects, logs, security
role
A. Sys adm
45- RM records all security-related actions
A. Audit log
46- Only Rm Sys Adm and Audit Adm may access audit records
T
47- Only RM Security Adm can manually archive audit
F
48- reasons RM Software backup
D. All
49- Command to check LAN TS NMP and MAD II connection
ping
50- Interfaces TS and Secret NMP
RM