Networking Flashcards

1
Q

Purpose of CNO

A

Encompasses CNA, CND, CNE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CNA

A

Computer network attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CND

A

Computer network defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CNE

A

Computer network exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Infocon

A

Defense posture and response system for DOD info systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infocon 5

A

Normal readiness procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infocon 4

A

Increased military vigilance procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Infocon 3

A

Enhanced readiness procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Infocon 2

A

Greater readiness procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Infocon 1

A

Maximum readiness procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NCDOC

A

Navy cyber defense operations command - cyber security service provider , tracks and mitigates all viruses for the navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FLTNOC

A

Provides connectivity afloat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TNOSC

A

Regional detachment for FLTNOCs , provide same service as FLTNOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NCTS

A

Provides connectivity for shore units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

5 services provided by FLTNOCs

A

IP services, email, message traffic, VTC, voice comms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

N2N operations

A

NOC to NOC cutover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authority for firewall policies

A

IAM ( information Assurance Manager )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Instruction for computer network incident responses

A

CJCSM 6510

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAS

A

Web based application to post mission essential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Application of NIAPS

A

Esoms, sked 3.2, CTA, fedlog, FSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Nipr

A

Access to unclassified information (world wide web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Sipr

A

Secret information (interlink, CAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Jwics

A

Top secret information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Centrix enclaves

A

Japan - US and Japan
Korea - US and Korea
CMFP - combines maritime forces, pacific
CNFC - coalition naval forces CENTCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

RadMerc

A

Classes and declasses information allowing users to transfer data between NIPR, SIPR, and JWICS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Capabilities of GCCS-M

A

Comms 1 - controls input and output of all tracks
Comms 2 - backup of comms 1
Intel - intel apps
Websvr- connection to apps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Purpose of ASI

A

Coordinates downtime / maintenance window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Firewall log

A

Records info from packets that pass through or drop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Router log

A

On and off ship information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Server log

A

List of activities it performs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

HTTP

A

Protocol for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

HTTPS

A

Secure communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

File server

A

Holds and distributes files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Mail server

A

Email reception and forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

DNS server

A

Translate host names to IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Web server

A

Holds and delivers web pages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Print server

A

Manages directory and all print devices on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

VLAN

A

Private network on switch port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

RAID

A

Data redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Ping

A

Signal to test connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Trace route

A

Ping showing routers in router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

IPCONFIG

A

List TCP/IP config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Telnet

A

Access computer remotely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Class A IP

A

1.x.x.x - 127.x.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Class B Ip

A

127-191.x.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Class C IP

A

192-223.x.x.x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Class D IP

A

224-254.x.x.x

48
Q

How does RADMERC interface with GCCSM

A

Sanitizes information

49
Q

Purpose of MIRC chat

A

Used on SIPR for ship to ship / ship to shore live chat

50
Q

Loopback

A

Reroutes packets back to its source without intentional processing

51
Q

Default gateway

A

Network point that acts as an entrance to another network

52
Q

Private IP address

A

Cannot be used or accessed on public internet only local networks

53
Q

APIPA

A

Automatic private internet protocol addressing - automatic self configuration of IPs

54
Q

Domain name service

A

Provides translation from DNS to IP

55
Q

Active directory

A

Repository for all windows components

56
Q

Exchange server

A

Mail server

57
Q

Outlook web access

A

Access to local email while at remote location

58
Q

Port 20

A

FTP

59
Q

Port 21

A

FTP

60
Q

Port 22

A

SSH

61
Q

Port 23

A

Telnet

62
Q

Port 25

A

SMTP Mail

63
Q

Port S3

A

DNS

64
Q

Port 80

A

Http

65
Q

Port 110

A

Mail post office protocol POP3

66
Q

Port 443

A

Secure HTTPS

67
Q

Application

A

software program that runs on your computer

68
Q

Operating system

A

set of system software programs that regulate the way applications use computer hardware

69
Q

Virus

A

malicious code

70
Q

Worm

A

self replicates

71
Q

Trojan

A

disguised malicious program

72
Q

Backdoor

A

surreptitiously introduced into a computer system

73
Q

Phishing

A

disguised as trustworthy entity to gain sensitive information

74
Q

Network Enumeration

A

scans networks for vulnerabilities

75
Q

Buffer overflow

A

program writes more info in the buffer then can fit in memory

76
Q

SQL injection

A

accepts user input placed into SQL statement, doesn’t filter out dangerous characters

77
Q

Dictionary attack

A

entering every word in the dictionary as a password

78
Q

Privilege Escalation

A

gain access to a resource that would be protected

79
Q

Brute force attack

A

Trying every possible code / password until correct one is found

80
Q

JWICS

A

Joint worldwide intelligence communications system - online network designed for TS/SCI

81
Q

DoDN (GIG)

A

all DOD networks comprise of the GIG (global info Grid)

82
Q

DISN

A

Defense information systems network

83
Q

NMCI

A

Conus based internet contract / service

84
Q

ONENET

A

oconus based internet contract / service

85
Q

Machine language

A

instructions executed by a computer’s CPU

86
Q

Assembly Language

A

low level language for computer programing

87
Q

Ring

A

Data goes around ring till info is found

88
Q

Mesh

A

interconnects every device on network (expensive)

89
Q

LAN

A

local area network

90
Q

WAN

A

wide area network

91
Q

MAN

A

metropolitan area network

92
Q

GAN

A

Global area network (around the world)

93
Q

OSI layer 7

A

Application

94
Q

OSI layer 6

A

Presentation

95
Q

OSI layer 5

A

Session

96
Q

OSI layer 4

A

Transport

97
Q

OSI layer 3

A

Network

98
Q

OSI Layer 2

A

Data Link

99
Q

OSI layer 1

A

Physical

100
Q

TCP/ IP Model

A

Application, Transport, Internet, Network interface

101
Q

Integrity

A

assurance info is not modified by unauthorized parties

102
Q

Availability

A

Assurance of timely, reliable access to data

103
Q

Non-Repudiation

A

Assurance that the sender’s data has proof of delivery / receiver has proof of sender’s ID

104
Q

Authentication

A

assurance of ID of sender / receiver

105
Q

Computer incidents (9)

A
Root level intrusion, User level intrusion
Unsuccessful activity attempt,
Denial of service,
Non- Compliance activity,
Reconnaissance
Malicious logic,
Investigating,
Explained anomaly
106
Q

Dod WWW security policy

A

appropriate use of the web to provide public info to a global audience

107
Q

IAVA

A

information assurance vulnerability report -addresses severe network vulnerabilities

108
Q

IAVB

A

information assurance vulnerability bulletin - new vulnerabilities that do not pose immediate risk

109
Q

IAVT

A

information assurance vulnerability Technical advisories - low risk vulnerabilities

110
Q

CTO

A

computer tasking order

111
Q

NTD

A

navy telecommunications directive

112
Q

service pack

A

periodically released update to software

113
Q

vulnerability assessment

A

identify weakness in a network

114
Q

what does the IAM do

A

responsible for ensuring all cybersecurity components are completed

115
Q

Host

A

system or node

116
Q

Application server

A

manages services and applications

117
Q

Hub layer 1

A

connects segments of a LAN