CANES 2 Flashcards

1
Q

Main references for CANES Core

A

CANES SW4 IETM – EE689-2X-IEM-004- AN/USQ-208C(V)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

C5ISR

A

Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) consists of:

A

Navy Command, Control, Communications, Computers, Combat Systems, Intelligence, Surveillance, and Reconnaissance (C5ISR) consists of:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 CANES online resources

A

Naval Information Warfare Systems Command (NAVWAR) Acquisition Integrated Logistics Online Repository (SAILOR)
Navy Enterprise Service Desk (NESD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CDS provides

A

Cross Domain Solutions (CDS) provides client access to the UNCLAS, SR, and SECRET enclaves
CDS Transfer Guard provides the capability to disseminate data from systems accredited at the same or lower classification levels
Sanitizes and downgrades data for release to systems withdifferent classification levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fault Isolation Strategy Six Step Process:

A
  • Recognize symptom(s)
  • Define symptom(s)
  • List probable faulty function
  • Localize the faulty function
  • Localize trouble to the faulty component
  • Analyze the failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The hardware components used in CANES can be broken down into the following four functional areas:

A

Data Processing
Data Storage
Data Transfer
Power Distribution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Servers are installed in the CANES equipment racks and provide VMware vSAN storage for hoste apps and virtual machines.

A

The HP DL380 G10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of this is the Witness server and is installed in the SECRET enclave only. It enables MAC-1 failover/failback to occur automatically.
As such it is considered critical equipment and must always remain powered on.

A

HP DL20 G10 this unit is located in the VTC rack (Unit 51 or 52) depending on the installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A

Most likely not connected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The Line Console 0 (con 0) in the Cisco IOS represents the physical console port, and is configured via the Line Interface:

A

Access the Line Interface from Global Config Mode by typing: Line Con 0 followed by the Enter key
Changing the Line Interface configuration without required proper approvals in not authorized
To verify the configuration is unchanged from baseline settings
From Privileged EXEC mode type: show running-config | begin line
Compare the Line Con 0 configs to the ship’s network template

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Viewing Local Accounts
Cisco Switch and Router

A

From Privilege EXEC mode, type: show run | include username
Verify local accounts list and privilege level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Cisco Default Privilege Levels

A

Level 0: log out, enable, disable, help, and exit commands
Level 1: Read-only access
Level 15: Full router or switch control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Cisco Local Account Creation

A

From Global Config mode, type: Username <new> privilege <privilege> password <new></new></privilege></new>

Local Account Deletion
From Global Config mode, type: no username <username></username>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Show Running Config | Section OSPF

A

command shows the OSPF section of the running configuration
Results can be used to compare baseline settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Show IP OSPF Neighbors

A

command shows the state of adjacency; OSPF requires full adjacency to function
Results show ip address ospf neighbors’ connecting interface – the CANES Border Firewall interface that connects to the Backbone router-switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Show IP OSPF Interface

A

command: shows OSPF information per interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Show IP OSPF Database

A

command: shows all router IDs in the OSPF area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Show IP Route

A

command: shows directly connected, static, link local, and OSPF learned network routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Exchange Troubleshooting
The _____ Diagram is a helpful resource when errors occur

A

Exchange Troubleshooting
The Email and Calendar Service Troubleshooting Fault Isolation Diagram is a helpful resource when errors occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Exchange Toolbox is installed on

A

CANES EX01/02 and IAEXET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

It is a Microsoft Management Console (MMC) snap-in that you can use to view information about and act on queues and messages in queues

A

Exchange Toolbox includes Queue Viewer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

System Admins can use Queue Viewer to perform the following actions

A

Remove messages
Suspend messages
Resume messages
Redirect messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Accessing Queue Viewer

A

Log in to IAEXET with System Administrator credentials
Navigate to Start > Microsoft Server Exchange 2016 > Exchange Toolbox and click on Queue Viewer
Click on Queue Viewer under Mailflow Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Exchange Troubleshooting (cont.)
There are five areas of importance

A

Network
Hardware
Services
Configurations
Off ship Connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Exchange Troubleshooting
Configuration Items to monitor from the Security Information and Event Management (SIEM) or the Systems Center Operations Management (SCOM) dashboard

A

Mail transport - Replication
Name resolution service
Encryption Service - Processes
Message Application Programming Interface (MAPI) and Mail submission
Active Directory Remote Procedure Call (RPC) Access
Directory Inquiry
Rights management
Alternate client access for Standard Mail Transfer Protocol (SMTP) Clients
Active directory Global catalogue
EdgeSync
Hub transport
Directory Queries
Lightweight Directory Access Protocol (LDAP) global catalogue queries
Registry access
Clustering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

CANES is preconfigured to support the implementation of River City procedures in all enclaves
There are four OPSECON groups

A

OPSECON 1 - CO, XO, CMC, TAO
OPSECON 2 - OPS, EMO, CHENG
OPSECON 3 - All Officers, All Chiefs
OPSECON 4 - E-6 and Junior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Generating and Exporting ACAS Report to VRAM

A

From ACAS SecurityCenter, navigate to Scans > Active Scans and select desired scan to upload
Select Post Scan and then select the report configured to publish
Click Submit to save the scan, and then navigate to Reporting Report > Results to access report
Select report and click Download to save locally with a meaningful name
Select Submit button and a dialog box is displayed, indicating the upload has been sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Server that bypasses wsav

A

ADNS

30
Q

Encryption for CANES

A

Symantec Endpoint Encryption Manager > Symantec Endpoint Encryption Software Setup > Removable Media Encryption is used to restore removable drive encryption to reimaged computers

31
Q

Disk encryption recovery with BitLocker:

A

BitLocker Recovery Key is found under Active Directory Users and Computers (ADUC) in the Trusted Platform Module (TPM)
Access the ADUC <FQDN> CANES Users and Computers > Computers
Select the computer and click on the BitLocker Recovery tab to find the BitLocker Recovery Key</FQDN>

32
Q

All Federal DoD information systems are required to use devices protected by the _____ and maintain encryption standard of _____ encryption Federal Information Processing Standards (FIPS)-140-2n

A

All Federal DoD information systems are required to use devices protected by the TPM and maintain encryption standard of AES 256-bit encryption Federal Information Processing Standards (FIPS)-140-2n

33
Q

SEE

A

Symantec Endpoint Encryption

34
Q

Is used for hard drive encryption

A

Bitlocker

35
Q

Is used for removable media encryption

A

WinZip Secure Burn

36
Q

DAR

A

Data at rest

37
Q

Three Bitlocker status

A

Protection Status 0 – Protection OFF
Protection Status 1 – Protection ON (Unlocked)
Protection Status 2 – Protection ON (Locked)

38
Q

is used to restore removable drive encryption to reimaged computers

A

Symantec Endpoint Encryption Manager > Symantec Endpoint Encryption Software Setup > Removable Media Encryption

39
Q

NCVI

A

Navy Certificate Validation Infrastructure

40
Q

CLO

A

Cryptographic Logon

41
Q

UNCLAS enclave CLO logon uses certificates on

A

the CAC

42
Q

SECRET enclave CLO logon uses a

A

Secret Internet Protocol Router Network (SIPRNet) Token

43
Q

3 ways to login wsav CLI

A
  • Putty: port 22 SSH (wsav.<FQDN>)</FQDN>
  • vSphere: remote MRDS, vcsa select UNCLASS_WSAV
  • Remote MRDS: Cisco WSAV Management Console Shortcut
44
Q

SCSM

A

Microsoft system Center Service Manager software that manages incidents and problems

45
Q

View the connectors that transfer data to SCSM

A

MRDS01 > Microsoft System Center > Service Manager Console > Administration > Connectors

46
Q

SCOM

A

System Center Operations Manager

47
Q

SCOM uses _____ to monitor communication channels between an agent and its management server

A

If heartbeats stop, no data is transmitted to the management server
A heartbeat is a packet of data sent by an agent every 60 seconds
Three missed heartbeats generate an alert, prompting the management server to ping the computer
If the computer does not respond to the ping, an alert is generated

48
Q

MECM

A

Microsoft Endpoint Configuration Manager

49
Q

Are groups of devices or users that can be created so they can be managed as a group

A

Collections

50
Q

MECM dashboards have several options to visually represent system data

A

Navigate to MECM > Monitoring > Overview > Client Status > Client > Activity Dashboard

51
Q

SIEM and SAM are the names of Virtual Machines (VMs).
What are the applications installed on those VMs?

A

Sentinel Server and Sentinel Agent Manager are the applications installed on those VMs.

52
Q

SIEM heartbeat checking

A

Checks heartbeat every five minutes
Analysis begins after 12 mins of no heartbeat
Unknown status after 18 days of no heartbeat

53
Q

Sentinel is the security and system log collector and

A

analyzer application for CANES.

54
Q

for SW4 is the addition of two VMs

A

New in NetIQ SIEM

55
Q

Microsoft System Center > Operations Console.
If the Server name field is blank

A

type: EM01 and click Connect.

56
Q

Troubleshooting VoSIP/VoIP Phones – Basic and Factory Reset (cont.)
Prerequisites for Factory Reset and steps

A

For SCI enclave, the phone must be on a DHCP-enabled network
For SCI enclave, a valid TFTP server must be set in DHCP option 150 or option 66
The term62.default.loads file or the term42.default.loads and the files specified in that file should be available on the TFTP server that is specified by the DHCP packet
Unplug the power cable from the phone and then plug it back in
While the phone is powering up, and before the speaker button flashes on and off, press and hold #
Continue to hold # until each line button flashes (amber) on and off in sequence
Release # and press 123456789*0#
Once the factory reset is completed, perform the steps in the IETM for Manual Cisco SCI VoIP Phone Configuration

57
Q

VTC

A

Video Teleconference

58
Q

Force-Level ships support VTC on:

A

UNCLAS
SECRET
Sensitive Compartmented Information (SCI)

59
Q

CANES VTC service includes the Cisco Precision High Definition (HD) camera that works with the

A

Cisco WEBEX CODEC in SW4 to provide full teleconferencing services to CANES

60
Q

VTC interfaces with Network Operations Center (NOC), Broadcast Control Authority (BCA), and

A

Force-level platforms to exchange audio and video

61
Q

All SCI VTCs, except for the SCI VTC testing conducted by the Global Helpdesk, are scheduled through the

A

Joint Worldwide Intelligence Communications System (JWICS) VTC Scheduling system via http://vcwizard.dodiis.ic.gov
Download Rules of Engagement and VTC Scheduling guides
Open a web browser and navigate to: http://www.jwics.ic.gov
Download the VTC Scheduling Guide by clicking VTC Engineering > Documents tab > VTC Scheduling Guide
This document will assist with navigating the scheduling wizard to set up an SCI VTC

62
Q

VTC VLANs

A

UNCLAS: VLAN 183
SECRET: VLAN 283
SCI: VLAN 513 (Force-level ships only)
SCI: VLAN 520 (Force-level ships only)

63
Q

VTC Operations

A

Most teleconferences will use a gatekeeper, meaning participants will call into a central location to join the conference
It may be necessary to bypass the gatekeeper to do a point-to-point teleconference
Before any underway, the VTC should be tested to ensure that all equipment and the connectivity of the system is in good working order
Prior to any scheduled VTC, testing of the equipment should be done the day prior and at least 30 minutes before the call
River City conditions may have to be made to control how much bandwidth a platform uses during a VTC

64
Q

World Wide Web Publishing service

A

is required for web browsing

65
Q

Half of people by name have issues with exchange

A

check the databases are mounted in ex01 and ex02

65
Q

A new user doesn’t have access to USA User folders

A

User nationality might be wrong and the account has to be made again

66
Q

Where to edit river city?

A

MRDS01 > WSAV

67
Q

Web App doesn’t open

A

check the service WWW

68
Q

Server time is out of sync

A

restart “Windows Time” service. run command w32tm /resync

69
Q

Remote Procedure Call Error

A

Check network adapter from vSphere vcsa

Example in replication error check RODC

70
Q

Quickest trouble shoot procedure when server goes down

A

Restart from last snapshot in vShere vcsa

71
Q

Quickest trouble shoot procedure when server goes down

A

Restart from last snapshot in vShere vcsa