Part 6 Flashcards
What is the service that allows hardware and software access and information transfer between different security domains or levels of classification either manually or automatically?
Cross Domain Services / Multi-Layer System
CDS/MLS
What eliminates the need for multiple workstations to access different enclaves?
Secure Office Trusted Thin Client (SOTTC)
What is used to restrict the data flow from applications and users to the management resources in each enclave?
Virtual Routing and Forwarding (VRF)
On CANES, encryption methods for laptops with SECNET 54 devices attached utilizing SECRET wireless need what compartment?
HAIPE-compliant devices
How many wireless access points do platforms hosting CANES with CISCO Aironet 1242 AG have?
30
What are the 4 accounts of HBSS?
Sqlsrvusr: used for local log on for the SQL service
Sqlsrvagt: used for local log on for the SQL Server Agent service
Eposql: this account is built into SQL Server Management, and is the account that ePO uses to “talk” to the MSSQL database
Proxy.epo: this AD account is used for Master Repository replication and other off-ship communications
Which account does ePO use to talk to SQL?
Eposql
Which account does HBSS use for off ship communication?
Proxy.epo
In the CANES implementation, rogue sensors must be installed on which following servers?
BU01, BU02, MTS, VC01, WEB
Which server should NOT have a rogue sensor as it is a DHCP server and has conflicts with the Threat Management Gateway (TMG)?
IAEXET
What is the name of the agent that handles audit records?
NetIQ
Which appliance controls access to the CANES network?
Identity Service Engine (ISE)
What applies local security at the end of its software installation and provides an automated way to apply the local security portion by itself?
Security Configuration Module (SCM)
What term signifies that the system is secured to the highest degree possible, while still allowing for the operational environment in which the systems must function?
Hardening
Where is Symantec Endpoint Security Manager installed?
Ex01
Symantic Mail Security for Microsoft Exchange (SMSME) scans email messages that pass through the exchange server and protects the exchange server from what?
Threats (virus, worms, Trojan horses, DOS
Security risks (adware, spyware)
Unwanted content
Unsolicited email (spam)
What kind of server is the Threat Management Gateway (TMG)?
Member server not a domain server
What can you set to limit internal users access to the internet?
River City
What is a predefined access rule that protects networks by blocking all traffic that is not explicitly allowed by other, user defined l, access rules and is always processed last?
Default Deny Rule
What products is installed and configured manually and if the product has a broad scope or is a client application, then Microsoft SCCM is used to deploy the product and the configuration is automated?
Operating Environment applications
CANES architecture has how many SADRs?
2
What has state-of-the-art antivirus software, was built to secure virtual infrastructure, anti-spyware, firewall and intrusion prevention?
Symantic Endpoint Manager (SEM)
If you have an inspection and some portion of a POR system failed or needs correction what do you do?
Contact the POR for changes to the configuration
What is a trading security concern for routers and switches?
An attacker could console in and reconfigure the router or switch or control the routing and switching.
What are concerns in traditional security?
Access control Storage media Password storage Physical security Emergency procedures Personal electronic devices Wireless devices Classified material handling
Which CE verifies CND?
CE-06
Which CE demonstrates cyber ops casualty and incident response procedures?
CE-11
How many stages are there in a CCRI?
3
What are the stages of a CCRI?
Admin review
TAV
Inspection CSI
What is a stage 2 ccri looking at?
5 IA facets as well as the stage 1 findings
How long is the stage 3?
5 days
What does the McAfee Whitelisting of Rogues check portion of the inspection look at?
List of exceptions
What are the two HIP categories?
HIP firewall policy is enabled
Firewall Connection Aware Group / Location Aware Group (FCAG/LAG) prevents cross Domain violations
What systems need a waiver?
Systems that are not or cannot be configured to have HBSS installed.
What were two significant attacks to DOD networks?
Operation Rolling Tide, Task Force Cyber Awakening