CANES Flashcards

1
Q

Directive that Defines measures that protect information and information systems
Ensures Availability, Integrity, Authentication, Confidentiality, non-repudiation
Includes measures to provide restoration of information
Protection, Detection, Reaction
Successful protection of assets requires:
Compliance
Understanding Vulnerabilities

A

Cybersecurity DoD 8500.01 Directive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

To WSUS patch administration steps

A

Login to CM01
From the Windows Start Menu open Windows Administrative Tools
Windows Server Update Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How to Modify Times for Automated synchronization in Windows Server Update Services (WSUS)

A

In the left pane of the WSUS management console, expand CM01, and select Options > Synchronization Schedule

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Add WSUS email notifications

A

In the left pane of the WSUS management console, expand the node labeled with the computer name and select Options. All available options appear in the center pane.
Select e-mail notifications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Add user to the WSUS Domain Administrators Group

A

Windows Administrative Tools > Computer Management
System tools > Local Users and Groups > Groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Set the WSUS Server to Autonomous Mode

A

From WSUS, expand the node, Options, Update Source and Proxy Server, Update Source, Synchronize from another Windows Server Update Services Server radio button.
Ensure This server is a replica of the upstream server checkbox is NOT selected and click OK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How to filter WSUS Update Reporting Views

A

Expand Updates node > All Updates > Actions > New Update View > Select Properties

View appears in the tree view pane under Updates, it displays like the standard views, in the center pane when selected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What server to access WSUS from

A

CM01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Log in to Exchange Admin Center

A

From MRDS01 desktop, double-click the Exchange Administrative Center (EAC) icon

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Set up email forwarding

A

From EAC > Set up an email contact > Recipients > mailboxes > Select user > edit > mailbox features > Mail flow View details > Enable forwarding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

EAC

A

Exchange Administrative Center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Set up an email contact

A

From EAC, select recipients in the left pane and select contacts from the top menu. Click the Add (+) icon, select Mail contact
First Name, Last Name, Display Name, Name, Alias, External email address (address to forward to)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Log in to Exchange Toolbox and use Queue Viewer

A

Remote IAEXET > Windows Star Menu > Microsoft Exchange Server 2016 > Exchange Toolbox > Queue Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Suspend in Queue Viewer do?

A

Prevents the email from leaving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

River City

A

OP SEC CON
4 everyone access
3 Chiefs
2 DH
1 Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

HBSS

A

Host Based Security System: Provides tools to prevent, detect track, report, and remediate malicious computer-related activities and incidents across all Department of Defense (DoD) networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

McAfee Agent and Modules

A

McAfee Agent
McAfee Host Intrusion Prevention System (HIPS)
McAfee Rogue System Detection
McAfee Policy Auditor
McAfee Asset Baseline Module
McAfee VirusScan Enterprise (VSE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Is available only in extreme cases; can be initiated by the shipboard admin and will disable HIPS on entire network

A

SADR “Killswitch”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SADR

A

Super Agent Distributed Repository (SADR) HBSS Configuration
CANES security uses SADR HBSS configuration on unclassified and SECRET networks. HBSS on the Secret Releasable (SR) and Sensitive Compartmented Information (SCI) networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

SADR Servers

A

UNCLAS and SECRET enclaves each have two CANES SADR Servers (SADR01 and SADR02) that connect to the HBSS ePO Ashore server
Provide load balancing and fault tolerance
All CANES HBSS policies on UNCLAS and SECRET networks located on the Ashore HBSS Server
Access to Ashore HBSS Server via web interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Circumstances required to use killswitch:

A

No access to Shore HBSS server - No way to modify
HIPS interfering with functionality of a system or programs on a system that has official mission requirements
Several systems need to have HIPS disabled, and individually unlocking the HIPS Client User Interface (UI) is not feasible

Shipboard admins are provided HIPS Client UI password to unlock individual computers for troubleshooting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

VRAM

A

Vulnerability Remediation Asset Manager (VRAM)
Stores Assured Compliance Assessment Solution (ACAS) scans for:
Nonsecure Internet Protocol Router Network (NIPRNET)/UNCLAS
SECRET Internet Protocol Router Network (SIPRNET)/SECRET
ACAS personnel ensure assets (scanned IPs) are properly categorized

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which VM supports the synchronization of Microsoft Outlook with a PDA?

A

(Personal Device Assistant) BES/BUEM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which Linux command is used to report the amount of disk space that files or directories occupy?

A

du

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

For which two enclaves can ACAS be configured to automatically send reports to VRAM?

A

UNCLASS and SECRET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which DoD document identifies cybersecurity work in Special Area categories?

A

8140.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

PMS

A

Planned Maintenance System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

FBR

A

Feedback Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

OPANAVIST PMS

A

4790.4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

TFBR for discrepancies

A

CAT B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

CANES have two types of user

A

Admin and non-admin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

When forest-level enterprise access is needed

A

Enterprise Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

sa da na wa admin role email nomenclature

A

adminrole.first.last@FQDN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Service accounts

A

allows one application to access another, mainly system management applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

xxx.internals should be

A

Stored safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Security technology that enables delegated administration for anything that can be managed with PowerShell.

A

Just Enough Administration (JEA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Security principle and technology aimed at minimizing the risk associated with privileged access.

A

Just In time-Administration (JITA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Tier 0, 1, and 2 administrators

A

0 Domain/enterprise 1 Server 2 Workstaton

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Juno Techonologies

A

Scripts, for example to create an account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Canes account creation script server location

A

MCA01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Password complexity enforced by what server

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Chapter for proper shutdown

A

Chapter 4, IETM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

MECM

A

Microsoft Endpoint Configuration Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What type of hypervisor is run by ESXi

A

type 1 or bare metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

DCUI

A

Lowest level interface to ESXi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

DISA Services

A

Cybersecurity, Network Connetions, Testing, Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

C5ISR

A

Navy Command, Control, Communications, Computers, Combat Systems, Intelligense,, surveillance, and Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Primary Technical framework supporting Network Centric Operations (NCO)

A

Global Information Grid (GIG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Services by DISA

A

Quality Assurance Enterprise Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Provides end-to-end connectivity throughout the submarine

A

SubLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Provides Secret and Unclassified Local Area Networks within the ship and allows aess to DISN

A

ISNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Provides sharing of information with different groups of nations at the SECRET level and below.

A

SR Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Allows ships at sea protected and reliable access to special intelligence and SCI data

A

SCI Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Transport link between NCTANPS PAC; NCTS San diego ; NCTAMS LANT; NCTS Naples, Italy and NCTS Bahrain?

A

Circuit-to-Packet (CTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Low probability for intercept and high chance of surviving a nuclear blast?

A

EHF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Provides a transit path off the ship for onvoard secure voice, data, and video?

A

Automated Digital Network System (ADNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which system is a set of meteorology and oceanography forecast, database, and decision aid tools for weather forecasting?

A

Naval Integrated Tactical Environment Subsystem (NITES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which system supports the use of vending machines aboard ships?

A

Navy Cash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Provide supor for all NAVY C5ISR services

A

The NCTAMSs and NCTSs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Afloat and ashore networks provide connectivity

A

within a ship, ship-to ship , and ship-to-shore

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Allow information to travel to and from a ship via the ADNS.

A

RF transports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

How to swap EXSi hosts

A

In maintenance mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Wording in the application for turning off

A

Power off = corrupt Shut down = gracefully

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Redundant array of independent disks used by CANES

A

CANES 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Device backup displayed by

A

SCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

AAA

A

This stands for Authentication, Authorization, and Accounting. It’s a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services. These processes are important for network management and security:
Authentication verifies who a user is.
Authorization determines what a user is allowed to do.
Accounting keeps track of what the user does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What systems are used to login with a CAC to a network device?

A

AAA RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Manages access to networks and networked resources efficiently and securely.

A

AAA RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

RADIUS

A

(Remote Authentication Dial-In User Service) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for users who connect and use a network service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Service allows files to be sent from one host/node to another while maintaining data integrity

A

File transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which enclave is designed to interoperate with coalition partners such as NATO

A

SR Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which wevsite for C4I systems provides a single point of customer service

A

Navy 311

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

A scalable method of managed network devices to synchronize to an accurate time source is provided by

A

NTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

CANES Routers and switches LAN Design

A

CANES Two-Tier: -Collapsed Core/ Distribution -Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

In a switch, blinking amber vs solid amber

A

Blinking amber: fault with network module, power supply or fan module. Solid amber: Configuration Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

ISE

A

Identity Service Engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

A CANES client successful connection requires:

A

-Device registered as CANES asset, indicated by being member of Active Directory domain - Cisco Network Admissions Control (NAC) Agent loadeed and enabled - Device MAC address added to the ISE Endpoint Management Identity Group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Three types of Router

A

-Cisco Integrated Service Router (ISR) - Cisco Integrated Services Digital Network (ISDN) Gateway - Cisco Adaptive Security Appliance (ASA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Cisco ISDN Gateway

A

-Provides CANES with HD video conferencing capabilities - Inegrates between IP and ISDN networks - Specific to VTC service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

The Cisco Switch contains two sets of IOS images for every feature and version

A

One set contains only the IOS image file extension .bin; The other set contains an IOS image plus a web-based device manager extension .tar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Each privileged account will need a separate

A

SAAR-N form completed and submitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What type of script is “CANES Create User”

A

Juno Technologies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

What tabs are required to create a user

A

General and Organization (+Exchange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Give the user access to all tabs in the Exchange Management Center and all drop-down menu options for Exchange Databases in the Create User tool

A

Add account to the Organization Management and Recipient Management Directory Groups by editing member of in Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Before running Vmware Tools

A

check the service is running

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

From where to run Vmware Tools

A

MRDS01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

cd in command line to get to Vmware Tools

A

cd \Program Files\Vmware\Vmware Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Command from cd \Program Files\Vmware\Vmware Tools

A

VmwareToolboxCmd.exe stat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Commands available in VMwareToolbox.Cmd.exe stat

A

hosttime speed ballon swap memlimit memres cpures cpulimit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

hosttime

A

date and tine of host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

speed [command]

A

displays the CPU speed in MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

ballon

A

memory reclaim from the virtual machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

some actions possible from vcsa html 5 suit

A

VM startup shutdown Snapshots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

How to place EXSi in maintenance mode for swapping

A

From left panel right-click the esx and the workstation icon will get yellow strips once it’s completed. Check “More Tasks”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Application to configure Switch

A

Putty name follow structure: U-BB-RTR-102

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Initial commands in PuTTy to configure switch

A

adm.network password enable password config t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

To display the most current backup file

A

show flash: | include backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

To overwrite the current startup-config file with the backup configuration file

A

copy backupfile.bak startup-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

After copy backupfile.bak startup-config confirm the destination filename:

A

startup-config // x bytes will be copied, proceed with // reload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Can provide time via triangulation

A

GPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Statrum level 1 time servers provide time for CANES network Connect to one of four

A

GPS IRIG-B PPS 10 MHZ

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

For 3 dimentional position how many satellites do you need

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Provides email, contact, and calendar synchronization for handgeld Commercial Mobile Devices

A

BlackBerry Unified Endpoint Manager (BUEM) 12.10 MR1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

What services to check when handheld devices are not working

A

Verify BES/BUEM services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

A Proxy works as a

A

funnel for all ips and web traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

CANES employs the following proxy server:

A

Cisco Web Security Appliance Virtual (WSAV) proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Supports regular checking of percentage of decrypted traffic to ensure sizing in consistent with initial install

A

WSAV logs (Advanced Web Security Reporting log management) Another method of checking decrypted traffic regularly is via simple bash or PowerShell commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

Determines whether CANES users are accessing the network on an authorized, policy-compliant device

A

Identity Service Engine (ISE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Assigns services based on the user role, group, and associated policy.

A

Identity Service Engine (ISE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Provides Remote Authentication Dial-In User Service (RADIUS) services to the network

A

Identity Service Engine (ISE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

System Administrators can use Active Directory usernames and passwords to log in to _____ while being authenticated by Active Directory via the RADIUS server

A

Identity Service Engine (ISE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Standatd defining how to provide authentication for devices that connect with other devices on Local Area Networks (LANs)

A

IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

Used to authenticate non-IEEE 802.1X devices such as network printer, workstations, and Cisco IP phones

A

MAC Authentication Bypass for Bypassing IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

Learns an endpoint’s MAC address from the switch of the connecting device or an administrator can prepopulate the ISE server’s MAB database before the device is connected

A

MAC Authentication Bypass for Bypassing IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

EXEC mode is denoted by

A

The pound sign (#) at the end of the prompt in EXEC mode indicates that the user has entered Privileged EXEC mode, also known as Enable mode. This contrasts with User EXEC mode, which is indicated by a greater-than sign (>) and allows access to a more limited set of commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

In the context of network equipment such as Cisco routers and switches, EXEC mode refers to

A

the command-line interface environment where users can execute privileged commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Synchronize the timeserver in RHEL

A

Remote into YUM. Use “sudo chronyc -a sources”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Fron DC01 ping the hostname. For the Timeserver by typing

A

w32tm /query /status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Log on to Cisco Prime Infrastructure

A

From MRDS01 https://pi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

username for Cisco Prime Infrastructure

A

root

121
Q

How to manage wireless devices

A

Log on to Cisco Prime Infrastructure

122
Q

service to restart as common trouble shoot step equivalent to signing in and out

A

Windows Explorer

123
Q

FSMO

A

Flexible Single Master Operation

124
Q

FSMO what does these roles permit?

A

These roles permit only one domain controller update access to a specific part of the Active Directory database

125
Q

Five FSMO roles can be trasferred to any domain controller in the CANES Active Directory domain, what server has all five roles by default?

A

DC01 is assigned all five roles by default

126
Q

FSMO roles

A

Schema Master, Domain Naming Master, Relative ID (RID), Primeary Domain Controller (PDC), Infrastructure Master

127
Q

FSMO Role: Domain Naming Master

A

Makes changes to the domain naming space of the directory; adds and removes domains from the directory

128
Q

FSMO Role: Relative ID (RID)

A

Processes RID pool requests for DCs withinn the domain; RIDs are unique identifiers associated to Active Directory objects

129
Q

FSMO Role: Primary Domain Controller (PDC)

A

Is the Network Time Protocol (NTP) authoritative source; account password changes and authentication failures replicate to the PDC emulator first.

130
Q

FSMO Role: Infrastructure Master

A

Updates cross-domain references when an object in one domain is referenced by an object in another domain.\

131
Q

FSMO Role: Schema Master

A

Performs updates to the directory schema

132
Q

Network shared folders on CANES FS01: HomeShare

A

is a user shared drive that redirects CANES users local profile folders

133
Q

Network shared folders on CANES FS01: Share

A

is the general network share location for CANES user file and folder storage

134
Q

Network shared folders on CANES FS01: Software

A

contains CANES domain software repository used by CANES automation scripts and other domain services such as Microsoft System Center Configuration Manager (SCCM)

135
Q

SCCM

A

Miscrosoft System Center Configuration Manager

136
Q

Correct PMS with

A

Feedback Report

137
Q

Sync to accurate time source

A

NTP

138
Q

Number of switch rack is determined by the size of the unit

A

Edge switch racks

139
Q

Service allows files from server to server

A

File Transfer service

140
Q

What enclave is for intelligece and crypto analyst

A

SCI

141
Q

Routers CANES software 3

A

Cisco

142
Q

Chapter 2 of the IETM

A

Safety precautions

143
Q

Stratum level is a reference clock

A

Statrum 0

144
Q

What administrator account is for network devices

A

NA

145
Q

PDA server health

A

SCSM

146
Q

Protocol AAA Canes

A

Radius

147
Q

Virtual NIC in vitual machines what connects the VINIX?

A

Virtual Switch

148
Q

FSMO Role: Infrastructure Master

A

Updates cross-domain references when an object in one domain is referenced by an object in another domain.

149
Q

Large group of storage devices

A

Array

150
Q

Type of virtualization allows you to use a program over another computer

A

Application Virtualization

151
Q

Control IP traffic within a network

A

Switch

152
Q

Chapter of the IETM overall nature of the system

A

Chapter 1

153
Q

Submarines use for firewall

A

5525

154
Q

Lowest probable of intercept, survives nuclear

A

EHF

155
Q

Wireless Access Point Cisco manager

A

WLC wireless LAN controller

156
Q

Enclave that supports across domain solutions

A

Secret

157
Q

Proxy server

A

WSAV

158
Q

Back up and Storage system

A

IBM 35 12

159
Q

Server feature secures CANES workstations Active Directory to assign

A

Group policy

160
Q

VM feature VM machine from one host to another

A

vMotions

161
Q

Number of switch rack is determined by the size of the unit

A

Edge switch racks

162
Q

Directory Service

A

Required by Linux servers fo sharing administrative configuraion data as well as non-administrative data, such as telephone and e-mail directories

163
Q

Shell

A

The operatin system layer that interprets commands received from the applications layer.

164
Q

The operating system layer htat schedules various processes and tasks, and manages other vita functions like file management and storage.

A

Kernel

165
Q

A program that is loaded into memory when the computer boots up, The core of Linux, controlling the allocation of available hardware resources.

A

Includes the necessary programs to talk to all the devices connected to it. The Linux Kernel

166
Q

A multi-level, hierchical system called a directory tree. There are 15 standard directories in the root directory, which is designated by a forward slash (/)

A

Linux Standard File Structure

167
Q

To properly log out of the Linux shell, users must

A

type :”logout” or “exit” at the command prompt

168
Q

reports the amount of disk space that specified files or directories occupy.

A

du

169
Q

creates a new directory in the current or a named directory

A

mkdir

170
Q

Searches text or a given file for lines containing a match to a given strings or words

A

grep

171
Q

Creates archives of files for backup, transfer, or storage purposes

A

tar

172
Q

Lists the files in the current directory or a named directory

A

ls

173
Q

Displays information about a named command, including all of its available options

A

man

174
Q

The Linux syslog report provides users with information related to all of the following

A
  • system errors * dates and times of backups * unauthorized access attempts
175
Q

Print (display) the path of the current working directory

A

pwd

176
Q

The tar command does not perform compression. However,

A

compression utilities can be used to compress archives created with tar

177
Q

Command in Linux to display current system time

A

$ date +”%T”

178
Q

Command for a dynamic, real-time view of the running system?

A

top

179
Q

Command to sed four copies of the text files “issues.txt” to a printer named “main_printer” which is not the dafult printer

A

lp -n 4 issues.txt -d main_printer

180
Q

Broadcasts an IP address to each machine on a network to identify the associated mac address

A

arp

181
Q

A software utility designed to schedule a variety of jobs, or tasks, to run once or on a recurring basis at specified times or intervals

A

Cron

182
Q

Files that are lists of other files, used to organize files

A

Domain Sockets

183
Q

Ordinary data files, such as text files, image files, executable files, etc

A

Regular Files

184
Q

References that point to other files

A

Directories

185
Q

Special files that connect the output of one process to the input of another

A

Symbolic Links

186
Q

Special files that allowtwo-way communication between two processes.

A

Named Pipes

187
Q

Files that facilitate the communication between hardware and software

A

Device files

188
Q

Command to make a mirror image of a system hard drive on a different hard drive

A

dd

189
Q

Command seraches for a specific string of characters or words in a named file or files

A

grep

190
Q

What does the user need to do before mounting a filesystem to a currently accessible filesystem in Linux

A

Determine the device name associated with the particular storage device using the fdisk command and identify or create a mount point for the device.

191
Q

Agile Core Services ACS Software automation capabilities

A

Continuous improvements and extensions to capabilities, Catch erros quickly and continuosly, Integrate new application code, Obrain end user feedback

192
Q

In SW1 and SW2 variants, ACS is referred to as

A

Afloat Core Services

193
Q

ACS in SW3 and beyond is currently fielded on

A

several large deck platforms

194
Q

Two major components of ACS

A

ACS Common Services (ACS-C) ACS Data Analytics Services (ACS-DA)

195
Q

Exchange Toolbox is installed on

A

CANES EX01/02 and IAEXET

196
Q

Exchange Toobox includes _____, which is a MMC snap-in that you can use to vidw information about and act on queues and messages in queues

A

Queue Viewer

197
Q

System Admins can use Queeue Viewer to perform the following actions:

A

Remove Messages, Suspend Messages, Resume Messages, Redirect Messages

198
Q

Are the software used to establish connections and obtain user information required to transfer files

A

FileZilla Client and FileZilla Server

199
Q

FileZilla is located on:

A

IAEXET for SW1/SW2
WEB for SW3/SW4

200
Q

FileZilla provides the File Transfer Protocol (FTP) and File Transfer Protocol Secure (FTPS) for hosted and connected systems such as:

A

Global Broadcast Service (GBS)
Theater Battle Management Core Systems (TBMCS)
Distributed Common Ground System-Navy (DCGS-N)

201
Q

FTP is used to

A

transfer files between hosts and or servers and does not require authentication

202
Q

FTPS is secured using

A

Transport Layer Security (TLS), data is encrypted in transit

203
Q

Secure File Transfer Protocol (SFTP) uses

A

Secure Shell Protocol (SSH) to secure FTP transfers

204
Q

Trivial File Transfer Protocol (TFTP) uses

A

User Datagram Protocol (UDP) for FTP transfers which means the data is less reliable, but faster

205
Q

Generate a single certificate in on Navy Certificate validation Infrastructure (NCVI)

A

Remote MCA01
AIC Tools
right click Generate single Certificate
Run as Administrator
Single Certificate
CANESComputer
The Enter Device Name screen appears
Type name of certificate

206
Q

Path to save Certificate created from AIC Tool

A

\ds\Software\DomainCerts\certs

207
Q

Verify a .rsp file

A

Run .cmd as administrator
open _cert.rsp with notepad verify –Begin Certificate– and –End Certificate– header and footer

208
Q

Add an FTP User

A

\web\F$\FTP\DDGXX
New Folder
sa.<first>.<last></last></first>

209
Q

Enable FTP User

A

Remote into MCA01
Active Directory Users and Computers
CANES Groups
FTP Users
Members
Add user name for the Sys Adm account you created

210
Q

Add WEB to Site Manager

A

MCA01
FileZilla FTP client
Filezilla
File > Site Manager
New Site: “WEB”

211
Q

Verify the user’s FTP access

A

down arrow next to Site Manager icon WEB
Connectivity to the FTP server is established when Status: Directory listing successful is displayed

212
Q

VoIP connection type

A

TCP to establish UDP to conduct the call. Because TCP because it is too heavy for real time applications.

213
Q

Prerequisites for installation and configuration of VOIP and VOSIP

A
  • Identity Services Engine (ISE) Configured network End User Access (EUA) with Power over Ethernet (PoE) capability or a 100VAC wall receptacle
  • CANES fully configured Cisco Unified Communication Manager (CUCM)
  • Connectivity to the Network Operations Center (NOC) with 8kbps bandwidth or higher
  • Automated Digital Network System (ADNS) Increment III SP4
  • Verify Access Control Lists (ACLs) have been created in the firewall on both inbound and outbound interfaces for phone to connect to the NOC
  • Record of Media Access Control (MAC) addresses of all VoIP phones
214
Q

XMPP

A

Extensible Messaging and Presence Protocol (XMPP)
Provides open standard for interoperability with Department of Defense (DoD) users
Required to exchange text-based messages
Resides on the chat server
Supports external chat sessions

215
Q

Swift Chat

A

Full-featured instant messaging client for internal communication:
Uses XMPP protocol
Open-source IM client
Supports different platforms
Provides strong security
Allows end users to share files

216
Q

Mako Chat Server/Client

A

Enables warfighter’s client to maintain better connections to chat servers
Located at shore-based command centers or on ships
Provides authentication, encryption, and login security features
Enables XMPP users to connect directly to Mako servers
Used on SECRET enclave to increase security based on:
Transitional architecture
Certificate credentials
Strong user authorization requirements
Solid information encryption software

217
Q

VTC

A

Video Teleconference

218
Q

VTC

A
  • Combination of locations
    Host connection points and are the gatekeeper:
  • Naval Computer and Telecommunications Station (NCTS) Hampton Roads (UARNOC)
  • Naval Computer and Telecommunications Area Master Station (NCTAMS) PAC (Makalapa)
    Connects to the gatekeeper with CRITICOM Integrated Secure Encryption Console (ISEC) switch
219
Q

System Management Tools Benefits

A

Goal is to recognize all system administrator responsibilities and to choose one or more methods for verifying target objectives or tasks necessary
Interactivity
Tools work best when integrated with one another
Complexity
Granular interpretations of data presentation
Multiple dashboard and widget options
Innovations
Custom reports
Graphic dashboard options
Granular filters
Remote access

220
Q

Main reference for Incident Management

A

CANES SW4 IETM, EE689-2X-IEM-004 AN/USQ-208C(V)

221
Q

Main reference for CANES in C5ISR

A

Naval Telecommunications Procedures (NTP) 4(E) Naval Communications, Naval Network Warfare Command, 18 January 2008.

222
Q

Main refence for Platform Variants

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

223
Q

Main reference for CANES Computing Environment

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

224
Q

Main reference for Security Enclaves

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
DDG Production IP Plan SW4, IPPLAN_DDG_CG-HW2.0-SW4.0-V1.0

225
Q

Main reference for Technical Documentation

A

CANES SW4 IETM, EE689-2X-IEM-004-AN/USQ-208C(V)
NAVY 311, https://navy311.navy.mil
SAILOR, https://sailor.navy.mil

226
Q

Main reference for Planned Maintenance System

A

CANES IETM SW4 – EE689-2X-IEM-004-AN/USQ-208C(V)
Ship’s Maintenance and Material Management (3-M) System, OPNAVINST 4790.4

227
Q

Main reference for Account Management

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
COMPACFLINST 5230.1A, Fleet Functional Area Manager/Fleet Applications and Solutions Team Program, 5230.1A 13 MAR 2018

228
Q

Main reference for CANES Services

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
COMPACFLINST 5230.1A, Fleet Functional Area Manager/Fleet Applications and Solutions Team Program, 5230.1A 13 MAR 2018

229
Q

Main reference for Virtualization

A

CANES SW4 IETM, EE689-2X-IEM-004-AN/USQ-208C(V)
CANES Network Maintenance Addendum, AN/USQ-208(V)
VMWare vSphere Virtual Machine Administration, https://docs.vmware.com

230
Q

Main reference for CANES Web Proxy Servers

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

231
Q

Main reference for Storage Area Networks

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
vSAN Planning and Deployment – VMware vSphere 6.7, https://docs.vmware.com/

232
Q

Main reference for Network Device Management

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
CICD SW3 End User Access Switch Configuration, CICD-PMW160-CANES-000243
CICD SW3 Pre-Production, CICD-PMW160-CANES-000238
DISA Network Device Management, SRG (V)
DISA Network Devices, STIG (V)
DISA Network Infrastructure Policy, STIG (V)
Cisco ASA Series General Operations CLI Configuration Guide, https://www.cisco.com/c/en/us/td/docs/security/asa/asa96/configuration/general/asa-96-general-config.html

233
Q

Main references for CANES Switch and Router Operations

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Cisco 3900 Series, 2900 Series, and 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide

234
Q

Main reference for Firewalls

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
CICD SW1 CISCO ASA Firewall - CICD-CICD-PMW160-CANES-000080
CICD SW1.2 CISCO ASA Firewall - CICD-CICD-PMW160-CANES-000175
CICD SW2 CISCO ASA 5525x- Firewall and Firepower Software Installation and Configuration - CICD-PMW160-CANES-000197
CICD SW3 CISCO ASA 5525x- Firewall and Firepower Software Installation and Configuration - CICD-PMW160-CANES-000254

235
Q

Main reference for Network Time Protocol

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

236
Q

Main reference for Wireless Access

A

CANES SW4 IETM, EE689-2X-IEM-004-AN/USQ-208C(V)
CICD SW4 Wireless LAN Controller Configuration, CICD-PMW160-CANES-000332
CICD SW4 Submarine NIPR/SIPR Wireless LAN (SWLAN), CICD-PMW160-CANES-000353

237
Q

Main reference for Mobile Device Management

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

238
Q

Main reference for CANES Web Proxy Servers

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

239
Q

Main reference for Cisco Identity Services Engine

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Cisco Identity Services User Guide
Cisco Identity Services Administrator Guide
Cisco Identity Services Command Line Interface (CLI) Reference Guide

240
Q

Main reference for Windows Workstation

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
https://docs.microsoft.com/en-us/windows/resources/
https://support.microsoft.com/en-us/windows#ID0EAABAAA=Windows_10

241
Q

Main reference for Windows Server

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Microsoft Docs Windows Server, https://docs.microsoft.com/en-us/learn/browse/?roles=administrator&expanded=windows&products=windows-server

242
Q

Main reference for Red Hat Enterprise Linux

A

Linux Security Technical Implementation Guide
Red Hat Enterprise Linux 7 System Administrator’s Guide

243
Q

Main reference for Service Account Management

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

244
Q

Main reference for ACS

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Afloat Core Services (ACS) Developer’s Interface Guide, ACS-A060-DIG-(V)

245
Q

Main reference for WSUS

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Concept of Operations (CONOPS), Windows Semi-Annual Channel Release for CANES, 2017-001735 Version . 11, 30MAR2018
Concept of Operations (CONOPS) Windows Semi-Annual Channel Release for CANES, SW2.0.X.0, 2017- 001735 Version 1.6, 09DEC2019

246
Q

Main reference for Windows Exchange and Mail Service

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

247
Q

Main reference for Security Service Architecture

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Cybersecurity, DODI 8500.01, Change 1, October 7, 2019
Cyberspace Information Technology and Cybersecurity Workforce Management and Qualification Manual, SECNAV M-5239.2 (series)
Cyberspace Workforce Management, DoD Directive 8140.01
DOD National Industrial Security Program (NIST) Operating Manual, DoD 5220.22-M, May 18, 2016
DODI Network Management (NM), DoDI 8410.03, Change 1, July 19, 2017

248
Q

Main reference to HBSS Host Based Security System

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
U.S. Navy Host Based Security System (HBSS) ePolicy Orchestrator (ePO) Afloat Consolidation Concept of Operations (CONOPS), Version 7, 18 September 2015

249
Q

Main reference for ACAS Assured Compliance Assessment Solution

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
CANES ACAS and VRAM Fleet SOP, SOP-PMW-160-CANES-00001
Configuration Item Configuration Document (CICD) Assured Compliance Assessment Solution (ACAS) Server Configuration for SR/SCI, CICD-PMW160-CANES-000258

250
Q

Main reference for VRAM

A

ACAS Server Configuration for SR/SCI SW4- CICD-PMW160-CANES-000330
CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

251
Q

Main reference for NCVI Navy Certificate Validation Infrastructure

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
NAVY CERTIFICATE VALIDATION INFRASTRUCTURE, CICD-PMW160-CANES-000358 SW4

252
Q

Main reference for File Transfer Service

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
CANES Network Manager’s Guide, EE689-2X-GYD-020(V)
MIL-STD- 1780 Military Standard File Transfer Protocol
CISCO Introduction to client FTP, https://www.cisco.com/c/en/us/td/docs/ios/sw_upgrades/interlink/r2_0/user/ugftpc1.html#wp199177

253
Q

Main reference for Cross domain Solutions

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

254
Q

Main reference for VoIP Operations

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
CICD SW4 Voice over IP (VoIP) Telephone, CICD-PMW160-CANES-000355

255
Q

Main reference for Chat Operation

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Mako CANES Software 3.0 Installation and Operation Guide, Version 1.1.5

256
Q

Main reference for VTC Device (Video Teleconference)

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

257
Q

Main reference for VTC Operation

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

258
Q

Main reference for VDS (Video Distribution Service)

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
CANES Network Manager’s Guide, EE689-2X-GYD-020
Developer’s Interface Guide (DIG) for Consolidated Afloat Networks and Enterprise Services (CANES), CVN-DDG-LHA-CG MOC-LSD-LCC
Configuration Item Configuration Document (CICD) Video Distribution System SW 4.0, CICD-PMW160-CANES-000342

259
Q

Main reference for System Management

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Cyberspace Information Technology and Cybersecurity Workforce Management and Qualification Manual, SECNAV M-5239.2
Department of the Navy Information Systems Security (INFOSEC) Program, SECNAVINST 5239.3
Microsoft System Center Resources, https://www.microsoft.com/en-us/systemcenter/resources

260
Q

Main reference for Incident Management

A

CANES SW4 IETM, EE689-2X-IEM-004- AN/USQ-208C(V)
Navy Information Forces Navy Process Reference Model, COMNAVIFOR M-2620.2
Cyberspace Information Technology and Cybersecurity Workforce Management and Qualification Manual, SECNAV M-5239.2
Department of the Navy Information Systems Security (INFOSEC) Program, SECNAVINST 5239.3
Microsoft System Center Resources, https://www.microsoft.com/en-us/systemcenter/resources
CYBER-1 (Series) Incident Management
DEPARTMENT OF THE NAVY COMPUTER NETWORK INCIDENT RESPONSE AND REPORTING REQUIREMENTS SECNAVINST 5239.19 (series)

261
Q

Main reference for Event Management

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
Cyber Incident Handling Program 2012, CJCSM 6510.01B
Cybersecurity Activities Support to DoD Information Network Operations, DODI 8530.01
Committee on National Security Systems Instruction, CNSSI No. 1010
CICD SW3 System Management Suite, CICD-PMW160-CANES-000255
Computer Security Incident Handling Guide, NIST SP 800-61

262
Q

Main references for Configuration and Release Management

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
COMNAVIFOR, M-2620.2 NAVY INFORMATION FORCES NAVY PROCESS REFERENCE MODEL
COMNAVIFOR, M-5239.2D COMMANDER’S CYBERSECURITY MANUAL
SECNAVINST, M-5239
System Center, HTTPS://WWW.MICROSOFT.COM/EN-US/SYSTEM-CENTER
CYBER-1 (REV E), SUBMARINE FORCE CYBERSECURITY MANUAL

263
Q

Main references for SIEM (Security Information and Event Management)

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
COMNAVIFOR M-2620.2, Navy Information Forces Navy Process Reference Model
COMNAVIFOR M-5239.2D Commander’s Cybersecurity Manual
SECNAVINST M-5239
Sentinel Administrator Guide
Sentinel User Guide

264
Q

Main references for Fault Isolation Strategy

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)
CANES Network Manager’s Guide, EE689-2X-GYD-020

265
Q

Main reference for Remove and Replace

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

266
Q

Main reference for Watchstanding Procedures

A

CANES SW4 IETM – EE689-2X-IEM-004-AN/USQ-208C(V)

267
Q

SIEM software is

A

NetIQ Sentinel Application in SW3/4 NetIQ Security Center in SW1/2

268
Q

Six Steps troubleshooting procedure

A
  • Recognize Symptom
  • Define Symptom
  • List Probable Faulty Functions
  • Localize Faulty Functions
  • Localize Trouble to the Faulty Component
  • Failure Analysis
269
Q

First consideration for remove and replace (Planning Considerations)

A

Documentation is the first consideration for remove and replace

270
Q

What does EDP do?

A

Electronic Data Processing (EDP) Installs, maintains, and repairs Navy’s afloat tactical systems: GCCS-M TBMCS NITES DCGS-N

271
Q

Process Incidents Using SCSM, get to Service Manager Console

A

Remote into MRDS01 > Microsoft System Center > Service Manager Console > IM01 connect

272
Q

Process Incidents Using SCSM, once in Service Manager Console

A

IM01 connect > from the bottom left pane Work Items > Incident Management > All Incidents

273
Q

Process Incidents Using SCSM, once in Incident Management

A

All incidents > Create Incident > From all incidents IR8 (SharePoint)

274
Q

Portion that supports ACS hosting management applications

A

Platform as a Service

275
Q

System to prevent Host based instructions

A

HBBS

276
Q

VTC

A

unclass secret

277
Q

How often updates

A

everyday

278
Q

All of them

A

File Transfer Service

279
Q

Removal device first documentation

A

Documentation

280
Q

For Scans

A

Nessus

281
Q

Operational test new vender products

A

DoD

282
Q

Validate users PKI

A

Desktop Validator

283
Q

Type of account to access another application

A

Service Account

284
Q

Edge Trasnsport Role

A

IAEXET

285
Q

Access service use

A

TTC

286
Q

Tool for tracking incidents

A

VM Service Manager

287
Q

chat authentification encrition

A

Macon

288
Q

Server

A

BU

289
Q

Bridges

A

MCU

290
Q

Installs, maintains, and repairs Navy’s afloat tactical systems: GCCS-M TBMCS NITES DCGS-N

A

EDP

291
Q

System

A

Microsoft System Center

292
Q

Convert analog and digital to IP

A

CODEC

293
Q

SCOM recommended starting point

A

CANES System Summary Dashboard

294
Q

Endpoint Security Software

A

SIEM

295
Q

3 step

A

List probable

296
Q

Basic computer skills

A

authorized user

297
Q

Enclave result uploaded

A

Unclass SIPR SR

298
Q

Which Service distribute video

A

VDS

299
Q
A