Review Notes (Miscellaneous) Flashcards

review notes taken during review session

1
Q

What is the difference between “drop” and “deny”?

A

“drop” makes it disappear, “deny” means it is blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you wanted to see the layer 3 int, AP access-lists, what cmd would you run?

A

“show ip interface”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sniffer = tcpdump but no logging. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

determines what level of permissions will be given

A

RID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

dynamically assigns IP addresses to host machines

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

converts host name into a IP address

A

A Record (Host)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

points IP address to a name

A

PTR Record (pointer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

tracks TCP (FW design)

A

Stateful Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

no client side changes (proxy)

A

intercept/transparent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

not automatic; requires input (proxy)

A

explicit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

repository of everything (Directory Services)

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

user names, machine accounts and services are examples of what? (Directory Services)

A

object types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

alias, nicknames (Directory Services)

A

Canonical Name Record (CNAME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

re-directs DNS responses, prevents response to malware, virus, etc. (Directory Services)

A

Blackhole Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

list of offending servers and publish addresses of computers/networks in spam

A

Blackhole list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

stores information on alerts, loss, list, whats in network (HBSS)

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

protects against Trojans, viruses (HBSS)

A

VSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

blocks/allows programs

A

Host Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

controls/communicates changes occuring in IT environment

A

change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

removing a proxy from BASE and FW from computers would be an example of what service management?

A

change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

“what I did”, tracking exact state of overall IT environment (service management)

A

config management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

data centers (day-to-day system management, deliver data)

A

Area Processing Center

23
Q

24 AF, output on AFIN changes, tracked by INOSCs

24
Q

16 GWs, unit that operates AFIN

25
added layer of security, can segregate things that can be vulnerable?
DMZ
26
guidelines that can help organizations implement best practices
ITIL
27
interface, logical partition
Burb
28
group up to 16 mailbox servers that host a set of instructions
DAG
29
changes are document and authorized (service management)
change management)
30
implement the authorized changes (service management)
release management
31
updating after approved; document current state (service management)
config management
32
controls network core services
Enterprise Service Unit (ESU)
33
delivers core services
Area Processing Center (APC) - Data Center
34
What division at 624 OC generates the orders?
624 OC
35
Who is responsible for Step 6 Assessment?
Begins with Battle Damage Assessment (BDA) by Combat Operations Division (MOPs), completed by SRD (MOEs)
36
two types of entities in JIE enterprise directory and IDAM?
person, non-person
37
in active directory, what can be described as a blueprint that describes each object?
schema
38
what remotely scans, accesses systems, characterizes emerging targets?
Cyberspace Surveillance Package (CSP)
39
What should be used when external (untrusted/less trusted) sources needed to access one of your sensors?
DMZ
40
CTO is updated daily. True or False?
True
41
What is the situational awareness hub for Communications/Cyber functions on most bases?
Communication Focal Point
42
Types of DCC - P missions?
Combat Cyber Patrol, Pursuit, Mission, Engagement
43
Who manages the BlueCoat proxy?
INOSCs
44
every base, handles day-to-day problems as they arise
Communications Focal Point (CFP)
45
folks that provide onsite maintenance on base as issues aries
Client Systems Team
46
which forces are reactive in nature?
Cyber Alert Patrol
47
administrative action when someone takes a system down for MX
switchover
48
when devices fails, service picked up by another device
failover
49
mail flow to server (protocol)
SMTP
50
mirrors mailbox on location machine (protocol)
IMAP
51
allows users to send ON BEHALF of user log (permissions)
Send As
52
allows user to do anything to a mailbox except send an email (permission)
Full Access
53
resolves tier 2 incidents/tickets
INOSC