Sys Block 1 Flashcards

1
Q

Describe the characteristics of a flexpod

A

The flexpod platform is defined as a set of hardware and software products that serve as a foundation for data center deployments in an AOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the storage system used by flexpod

A

NetApp is a data storage system; it responds to network request from clients and fulfills them by writing data to or retrieving data from disk arrays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the characteristics of Oracle Server

A

The Oracle server host a single database instance referred to as the AODB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the function of a Iris server

A

Used by TBMCS to construct, Validate, manage , and distribute United States message text format message traffic, to include the ATO and the ACO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the different AOC weapon system baselines

A

-Requirements function baseline
-Allocated Baseline
-Product Baseline
-Test Baseline
-Release Baseline
-SiteBaseline
-JWICS baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACC AOC baseline changes approval authority ?

A

The change review board has the ultimate baseline change approval authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the purpose of System Administration (SAM)

A

This SUM identifies the architectural organization of TBMCS, provides list of TMMCS applications and numerous system admin procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe System Security Administration (SSA)

A

This SUM contains procedures for establishing and maintaining the system enclave security at both the system and user level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain virtual machine

A

A VM is a software computer that runs on an operating system and applications. When turned on a VM consumes physical resources of a ESXi Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purpose of ESXi server

A

Abstracts its resources into multiple VMs. Its the bare metal hypervisor OS on the ESXi Host that allows multiple VMs to run on the same server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the purpose of a data store

A

Storage location for virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the purpose of a data store

A

Storage location for virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purpose of vCenter Server

A

Windows based application that provides centralized management for the entire center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe vSpere web client

A

Primary method of interaction with the virtual environment. Its used to connect to vCenter Server systems and manage inventory objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Goal of AOC comm support

A

Goal is to ensure efferent flow of information into, through , and out of the AOC while ensuring the integrity and security of that information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Role of the CFP function

A

The CFP is the senior communications management function for the AOC and is a support staff for the ACOMS/CC. It consists of personnel who have a specific working knowledge of the AOC mission, oversees site operations, and provides direct C2 communications support to the AOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain the purpose of C2

A

To ensure servers, workstations, peripherals, communications devices, and software is online and available to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain the primary responsibility of data links

A

To help the ICO and ACOMS/CC plan, coordinate, establish, and maintain the multi tactical link network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Plans and programs purpose

A

Support the ACOMS/CC through monitoring the AOC baseline and tracking the fielding of new capabilities and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AOC as a Unit

A

Gives the commander , the Air Forces COMAFOR the ability to command and control C2 air operations. The AOC is the major C2 node and primary hub of the theater Air Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AOC as a Weapon System

A

Designated the AN/USQ-163 Falconer which includes equipment and interfaces to other C2 centers and systems to ensure AOC personnel effectively conduct air and space operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

3 groups of teams that make up AOC structure

A

Functional core teams
Speciality teams
Support Teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Purpose of ATO

A

Plan written in US message text format that task AirPower in support of joint air operations for a specific time period, normally 24 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Web based apps used for planning , re-planning, and ATO distribution

A

MCAMP is a TBMCS web based application used for air battle planning, replanning , and ATO dissemination

25
Q

Identify the 6 primary ACOMS functions

A

ACOMS/CC
CFP
C2
Networks
Data Links
Plans and Programs
Cyber Defense Functions

26
Q

CFP primary responsibility

A

Act as a single focal point that ensures user communication and system issues or problems are addressed and resolved

27
Q

Purpose of Netlogon service

A

Windows process that authenticates users, devices , and other services on a domain

28
Q

Purpose of drive mapping

A

Associating a local drive letter to a folder that is shared by another computer so that it can be accessed as if it is a local drive

29
Q

Purpose of drive mapping

A

Associating a local drive letter to a folder that is shared by another computer so that it can be accessed as if it is a local drive

30
Q

Identify commonly misconfigured TCP/IP properties

A

incorrect IP
Incorrect subnet mask
Incorrect Default Gateway
Must also point to the correct DNS

31
Q

Describe Citrix

A

A virtual desktop is an emulation of a hardware device that runs on a physical or virtual computer

32
Q

Authenticators for client systems logon and access to webase applications

A

Controlled by web logic and Active Directory . User must belong to web application groups in AD

33
Q

Purpose of Remote Desktop services

A

To display remote computers desktop when required

34
Q

Remote Desktop connections command

A

MSTSC.exe

35
Q

Purpose of AD

A

Provided a structured and centrally controllable computing environment within the AOC

36
Q

Describe domain controllers

A

The DC stored directory information, provides directory services, and authenticates users and computers

37
Q

Describe security groups

A

Provide an efficent way to assign permissions to shared resources on your network

38
Q

Purpose of AD group policy

A

To apply policy settings to computers and uses in an Active Directory domain

39
Q

Purpose of AD replication

A

Define the way updates are communicated between DC

40
Q

The service AD must use for name resolution

A

DNS is a name resolution and location service used to resolve computer names to addresses for connectivity purposes

41
Q

Purpose of dcdiag

A

Tool used to analyze the state of domain controllers in a forest or enterprise and reports any problems to assist with troubleshooting. It is a very effective tool for verifying the health of AD

42
Q

Which modes is needed when Active Directory is damaged that sys admin can’t log on

A

Directory service restore mode is used to logon to a DC ..

43
Q

Highest priority considerations in the AOC weapon system security architecture

A

Unauthorized access
Unauthorized modification
Denial or degradation of service
Unauthorized traffic
Unauthorized use

44
Q

Highest priority considerations in the AOC weapon system security architecture

A

Unauthorized access
Unauthorized modification
Denial or degradation of service
Unauthorized traffic
Unauthorized use

45
Q

Describe two general threat categories used to develop TBMCS security policy

A

Human Intentional - deliberate act against a resource
Human Un-Intentional- accidental or inadvertent damage to a resource

46
Q

Identify central authority for network security

A

Authentication and directory services acts as the central authority for network security

47
Q

Purpose of TBMSEC

A

Provided the default local security policy for each windows system

48
Q

TBMSEC policy concerns

A

System access
Auditing
Privilege rights
Security related registry settings
Registry keys access control list
File system ACLs

49
Q

DNS severs in an AOC

A

To provide address resolution between domain names and IP addresses …provide name resolution for requesting clients

50
Q

Most common type of DNS resource record

A

Host A record - contains the name of the host and its corresponding IP address

51
Q

Function of ping

A

Used to verify IP-level connectivity to another computer

52
Q

Identify dcdiag /test:dns command

A

Diagnostic tool used to verify the functionality of the DNS server it also runs to check the health of the DNS settings for the entire enterprise

53
Q

Identify nslookup command modes

A

Provides wealth of DNS serves diagnostic information and contains large command set

54
Q

Command used to display all current TCP/IP configuration values

A

Ipconfig/all

55
Q

Purpose of TBMENT

A

Provides the capability to populate AD with predefined organization consisting of multiple organizational units (OUs)

56
Q

Groups

A

Alert profiles
Application groups
J2ee roles
User groups

57
Q

Groups

A

Alert profiles
Application groups
J2ee roles
User groups

58
Q

Users

A

App users
Internal
Extrernal

59
Q

TBMENT functions

A

Setup TBMCS Structire
Import profiles
Import User Groups
Import Users
Remove TBMCS attributes
Remove groups and profiles
Undo last import
Circular Nested Group Checker
Export