Barge Duty IT Flashcards

(333 cards)

1
Q

Hypervisors Type-1 and Type-2

A

Hypervisors are critical components of virtualization technology.

Type-1 hypervisors, often called bare-metal hypervisors, run directly on the physical hardware without needing an underlying operating system.

Type-2 hypervisors, also known as hosted hypervisors, operate within a conventional operating system, using it as an intermediary layer between the hardware and virtual machines.

While Type-2 hypervisors are easier to set up for testing and development on personal computers, they introduce additional overhead due to the host OS, resulting in lower performance and resource efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PuTTy

A

PuTTY is widely used terminal emulator and network file transfer application that manages and troubleshoots remote systems and devices. It is known for its simplicity and reliability, making it a popular choice for establishing secure and non-secure connections to a wide range of devices and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 basic troubleshooting steps

A
  • Check the antenna is clear
  • Taclane Security Association
  • Verify Update Service Advisory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Taclane stands for

A

“Tactical Local Area Network Encryption.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TACLANE is a family of network encryption devices used by the United States government and its military agencies to…

A

secure and protect classified and sensitive information in communication networks. The term “TACLANE” is an acronym that stands for “Tactical Local Area Network Encryption.”

TACLANE devices are manufactured by General Dynamics Mission Systems, a prominent defense and aerospace company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unisphere VM management
Compared to
NAS

A

Unisphere VM management is a specialized tool for managing storage resources within virtualized environments, particularly those using Dell EMC storage solutions. In contrast, NAS (Network Attached Storage) is a more general-purpose technology focused on providing file-level storage and file sharing capabilities over a network, catering to a broader range of use cases beyond virtualization. The choice between the two depends on the specific storage and data sharing requirements of an organization or environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is EMC within the storage solution context

A

In 2016, Dell Inc. acquired EMC Corporation, forming Dell Technologies. As a result, the EMC brand name is now often associated with Dell EMC, which is the division of Dell Technologies that focuses on data storage, data protection, and other enterprise IT solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ESXi NIPR address

A

205.68.246.244

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ESXi SIPR address

A

205.2.183.244

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NAS NIPR address

A

205.68.246.241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NAS SIPR address

A

205.2.183.241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ESXi NAS, NIPR and SIPR address

A

ESXi
- NIPR 205.68.246.244
- SIPR 205.2.183.244
NAS
- NIPR 205.68.246.241
- SIPR 205.2.183.241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TACLANES Key Installer
Address

A

172.16.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Miscellaneous Printer Port

A

184

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Printer server & Share drive

A

FS01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Log into NIPR ESXi using domain name

A

https://vcsa.ddg82.navy.mil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Loss of Power
3 most general steps

A
  • Turn Off Network
  • Report to CDO
  • Stand by for stable power (CDO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3 ways to find a printer (already in network)

A
  1. Printers & Scanners
    Or
    If printer was not listed
  2. — \fs01 browse
    — Find with directory feature
    Or
  3. — “Add manually”
    — Select a shared printer by name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

9 parts+ of F/L2

A
  1. Precedence
  2. LMF
  3. Classification 4 characters
  4. CIC
    (space)
  5. OSRI
  6. SSN
    (space)
  7. JDTOF
    (-)
  8. 3’s redundancy
    (- -)
  9. DSRI
    .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ASCII
- what does it stand for?
- what is it?
- how many?

A
  1. American Standard Code for Information Interchange
  2. Character encoding format for text
  3. 128 characters/ control codes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AMCROSS [4]

A
  • Somebody passed away
  • Triad signatures required
  • Advanced Routing Log
  • Not public traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

3 References for sending messages

A

NTP 3(J)
NTP 4(E)
JANAP 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

OSRI
DSRI
SSN

A

Originating Station Routing Indicator
Destination Station Routing Indicator
Station Sequence Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Publication for in depth info on F/L 2

A

JANAP 128

JANAP 128, also known as Joint Army-Navy-Air Force Publication 128, is a set of regulations and procedures for the handling and reporting of naval and maritime incidents, events, and encounters. JANAP 128 provides guidance for standardizing the collection and reporting of data related to naval and aerial encounters, including those involving foreign military forces or other maritime activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
CIC FRI
Content Indicator Code Fleet Routing Indicator
26
MCS AUTODIN
Message Conversion System Automatic Digital Network
27
OSRI is identified by
An assigned AUTODIN or FRI
28
When SSN left blank the number will be provided by
GateGuard
29
CANES backup
BU01
30
Three systems we use to get ip services while on the ship
NMT: Navy Multi band Terminal Provides SHF EHF ATIP: stands for Advanced Technology for Information Processing. It is a method of data transmission that uses advanced algorithms and techniques to improve the speed and efficiency of communication EHF. CBSP: Comercial Broadband Satellite Program. Provides up services using SHF.
31
NMT
The Navy Multiband Terminal (NMT) is a secure satellite communication system used by the United States Navy to establish reliable and secure communication **links, particularly in naval vessels at sea.** NMT is designed to support voice, data, and video communication for naval operations, including command and control, intelligence, surveillance, reconnaissance, and more.
32
SHD
Special Handling Designator
33
PLA to RI
Plain Language Address to Routing Indicator Converts regular address to computer readable.
34
A DSRI ending in SUU indicates that [2]
The PLA to RI lookup will be performed by NAVCOMPARS or MCS before delivered
35
NAVCOMPARS
Naval Communications Processing and Routing System (NAVCOMPARS): A Model for Broadcast Performance Analysis.
36
MCS
MESSAGE CONVERSION SYSTEM (MCS) The primary purpose of the Regional MCS is to provide PLA-to-Routing Indicator (RI) look up and assignment. After receiving a message from the host NOVA System, the Regional MCS will validate the message, assign the appropriate RI(s) and return the message to NOVA for delivery. The Defense Message System-Message Conversion System the Defense (DMS-MCS) is operational at the DISA DTH located at Fort Detrick MD. The DMS-MCS is comprised of the Message Conversion System Message Processor (MCSMP), the MCS Directory Component (MDC), the Central Directory Component (CDC), and the Update Authority Component (UAC).
37
Inventory procedure Look at _____ & _____ verify _____
Look at serial numbers and quantity; verify key
38
White Pinnacle Precedence and what to do
Flash (z) Take to triad
39
General CIC
ZYUW
40
-Personal For- (commander) Message [2]
- Forward to CO, be succinct - “Personal For” folder (not for Lassen Traffic)
41
F/L 4 [2]
- Security Warning - ZNR UUUUU or ZNY CCCCC
42
F/L 10
Group count
43
F/L 5
Priority _ Day Time Month Year R 120830Z JUN23
44
After F/L 11
After break (BT) The first line of F/L 12 is the classification “spelled out” and any special instructions
45
NAS Username and password [4 components]
La raíz no Ve Navy
46
Steps to receive to send messages
- Hard copy signed by CO - Verify message CWO server - Log into “Outgoing Message Release Logs” - Sign when charge taken - Sign when sent - Print comeback receipt - Signed in log for come back
47
Last 7 servers to shut down
- FS01 - SQ01 - EX02 - EX01 - DC02 - YUM - DC01
48
FS01
Share Drive Print Server
49
SQ01
Data Base POR (Program of Record) NSIPS SKED aflog (FSM ROM) NIAPS
50
Turn off Tac Lane
Two power off buttons Left tac lane power Right tac lane power
51
Releasing Authority And lifecycle of keys
CONAUTH
52
CONAUTH | And four things they are responsible for
Controlling Authority (CONAUTH) is defined as the command designated as responsible for directing the establishment of a cryptonet/circuit and managing the operational use and control of keying material assigned to that cryptonet/circuit. **The CONAUTH is responsible for evaluating COMSEC incidents and authorizing the issuance, destruction and transfer of COMSEC material under their cognizance.**
53
STATUS OF COMSEC MATERIAL:
The **authorized period of use** for COMSEC material is defined by its status (i.e.. one of three possible conditions) Status for COMSEC material is assigned at the direction of the CONAUTH or originator of the material.
54
In the context of the CMCS, each item of traditional COMSEC material is controlled or managed by a designated official known as a
A CONAUTH is responsible for evaluating COMSEC incidents and authorizing the issue/destruction of COMSEC material under their control. By definition, a CONAUTH is the command which has designated responsibility for directing the establishment and operation of a cryptonet/circuit and managing the operational use and control of keying material assigned to a cryptonet/circuit. CONAUTH responsibilities are detailed in Annex C. For modern (asymmetric key), there is no Controlling Authority. The responsibilities are performed by a Command Authority.
55
Local key
CMS-25
56
To shut down host [3]
- Login ESXi GUI - Click host - Click shutdown button
57
Bring network back on
- *Power stability* declared by CDO - Power on UPS wait approx 30 minutes to have 60%+ - NASs will come on by themselves if not disconnected - Wait until you can ping NAS - ESXis have a small red power button - Bring the servers back on in reverse order NIPR and SIPR side - Check YUM is sync - Check services to be running
58
Sync YUM and DC01 [9]
- Remote YUM - Command Prompt - ra.scom.scx.mnt - (shift 1st square no shift 2nd square) x2 - Elevate to root - Check synced system clocks - Resync - Query - Check DC01 is synchronized
59
How to check services are running [4]
- Right click windows icon - Computer management - *Services* tab - All *Startup Automatic* have to be running
60
Elevate to root (linux)
sudo su - **sudo** (space) **su** (space) **-**
61
At YUM root level, check to what are the system clocks synced to.
chronyc -a sources -v **chronyc** (space) **-a** (space) **sources** (space) **-v**
62
[Command line] **-v** meaning
Verbose Output: When you run a command with the “-v” option, it might display extra information, messages, or logs that help you understand what the command is doing. This can be especially useful for debugging or troubleshooting.
63
[Command line] **-a** meaning
In the context of command-line parameters and options, the “-a” typically stands for “all” or “append” depending on the specific command or program you are using.
64
NTP and Chrony
Chrony is an open-source computer program and network time protocol (NTP) client and server used to synchronize the system clocks of computers in a network.
65
From W32Time, command to resync NTP
**w32tm /resync /force**
66
Explain **w32tm /resync /force**
1. w32tm: This is the Windows Time service command-line tool used for configuring and monitoring time-related settings. 2. /resync: This option instructs the Windows Time service to initiate a time synchronization attempt with its configured time source. It contacts the time source and adjusts the system clock if necessary to bring it into alignment with the time source. 3. /force: This option is used to force an immediate synchronization, bypassing the normal synchronization schedule. It ensures that the synchronization process occurs as soon as the command is executed.
67
PDC
Primary domain controller The concept of the Primary Domain Controller (PDC) was significant in older versions of Windows, especially Windows NT, where it played a central role in user authentication and directory services. However, with the introduction of Active Directory in Windows 2000 and later versions, the role of the PDC evolved into the PDC Emulator FSMO role, and the multi-master replication model eliminated the need for a single, dedicated PDC.
68
Query and display the source from which the Windows Time service (W32Time) is currently synchronizing the system clock.
**w32tm /query /source**
69
Explain **w32tm /query /source**
When you run this command, you will receive output indicating the **source of time synchronization**, which can include: • An NTP (Network Time Protocol) server address or domain name, indicating that the system is synchronizing its time with an NTP server. • The name of a hardware time source or **reference clock** if the system is using a hardware-based timekeeping source. • “Local CMOS Clock,” which means the system is using its own hardware clock (CMOS clock) as the time source.
70
Check where DC01 is getting its time from [4]
- ESXi GUI - Remote into DC01 - Windows Command Prompt - Query and display time source
71
NTP
Network Timing Protocol OR Naval Telecommunications Procedures
72
Query and display time clients currently sync to W32Time
**w32tm /query /clients**
73
**w32tm /query /clients** vs **w32tm /query /source**
1. **w32tm /query /clients:** - **Purpose:** This command is used to query and display information about the time clients that are currently synchronized with the local system acting as a time server. - **Use Case:** This command is helpful when you want to identify devices or systems in your network that depend on the local system for time synchronization. It helps you monitor which clients are synchronized with the local time server. 2. **w32tm /query /source:** - **Purpose:** This command is used to query and display information about the current time synchronization source from which the local system is obtaining its time. - **Use Case:** This command is useful for verifying where the local system is obtaining its time updates from. It helps you ensure that the system is correctly configured to synchronize with a reliable time source, such as an NTP server. In summary, "w32tm /query /clients" provides information about the clients synchronized with the local system, while "w32tm /query /source" informs you about the source from which the local system is synchronizing its time. They serve different monitoring and diagnostic purposes in managing time synchronization in a Windows environment.
74
LMF
Language and Media Format
75
NTP 3 (J)
The purpose of Naval Telecommunications Procedures (NTP) 3, **TELECOMMUNICATIONS USER MANUAL**, is to provide procedures governing preparation and electronic delivery of organizational naval messages using the **Naval Computer and Telecommunications System (NCTS).** NTP 3 is applicable to U.S. Navy, Marine Corps, and Coast Guard activities.
76
NTP 4 (E) Who developed it ?
This document was developed through a collaborative effort with Fleet, Numbered Fleet, Type Commanders, and other components of the **Naval Netwar Forcenet Enterprise (NNFE)**
77
JANAP 128 applies to what system?
This publication prescribes the operating procedures and practices applicable to the **Defense Communications System (DCS) Automatic Digital Network (AUTODIN)**, and to other US record communications networks as specifically authorized by respective controlling authorities. JANAP 128, also known as Joint Army-Navy-Air Force Publication 128, is a set of regulations and procedures for the handling and reporting of naval and maritime incidents, events, and encounters. JANAP 128 provides guidance for standardizing the **collection and reporting of data related to naval and aerial encounters, including those involving foreign military forces or other maritime activities.**
78
Difference between w32tm and chronyc
You would use "chronyc -a sources -v" on Linux systems (YUM) with Chrony for time source information, and "w32tm /query /source" on Windows systems to check the time synchronization source.
79
(LINUX) If you want to obtain information about a specific NTP source, you would use the sourcestats command followed by the name or IP address of the specific source, like this:
chronyc sourcestats *(less than)*source_name_or_ip *(greater than)*
80
What is C4l in the Navy?
Navy **Command, Control, Communications, Computers and Intelligence (C4I)** consists of policies, procedures, and systems that allow the Navy to conduct command and control using computer systems that are interconnected via different communications links for the *purpose* of *sharing operational intelligence.*
81
Shut Down Steps [7]
1. Log into ESXi GUI (244) 2. Shut down all but last 7, 5 by 5 3. Shut down last 7 4. Power Off Host (click on shutdown button) 5. Power Off NAS system > service tasks > shutdown & storage system Execute > Switches Routers 6. Power off UPSs 7. Power off tac lanes | Same for SIPR and NIPR ## Footnote Last seven: FS01 SQ01 EX02 EX01 DC02 YUM DC01
82
Set up static IP for printer [5]
- Go to production plan (Top of column: Default gateway) - Scroll to DNS Servers DC01 DC02 - Note Hostname & IPv4 (default gateway) (In printer) - Login > admin > 1111 > Device *down* > connectivity > Ethernet - IPv4 (Enter from production plan)
83
Add printer to server [3] - server - program - navigate
- FS01 - Print management Windows key + *R* printmanagement.msc - Action > Add printer > TCP/IP > Auto detect > IP address > Printer/Share Name Name > from Production Plan
84
NGCN (CIC)
CASREP
85
EX01 EX02
Exchange Service (email)
86
DC01 DC02
Group Policy Active Directory
87
VLAN Clients Port
182
88
Troubleshoot RSUPMAST [3]
NTCSS Clear login Reset server
89
Watch turnover items [9] Turnover Sheet Checklist
1. Clean Space/ Trash 2. Inventory 3. Visitor Log 4. Print (12 o clock Muster) 5. 701 Active Security Checklist 702 safe open close 6. (Pass down) Ongoing Issues/ trouble tickets 7. Upcoming events 8. Message log/ Message Traffic Public Folder 9. MSL (Master Station Log) EKMS: keys to load/ destroy
90
How often taclane supersedes
Every 30 days
91
Who has to be notified about new month
KOAM
92
Who gives the keys to the operators
KOAM
93
KOAM
KMI (Key Management Infrastructure) Operating Account Manager
94
When to load tac lane keys
2 days before end of month They roll automatically If not IP services lost
95
Flooding
Prioritize getting out
96
What is VCSA in VMware
VMware vCenter Server Appliance Preconfigured Virtual Appliance provided by VMware that runs vCenter Server central management software for VMware vSphere environments Linux based
97
MSL - Signing - Beginning of - Turnover time - End of
Master Station Log - CHOPS: initials - 000Z BORD - 1100Z Turnover - 2359Z EORD
98
*X*ORD
Of Ray Day
99
4 letters that include all the VMs
VCSA
100
First thing in case of fire
Set Alarm
101
Provisioning
install "factory" image
102
VM for home page
WEB
103
FQDN
Fully Qualified Domain Name
104
YUM
Time Server from NOC (Network Operation Center) DC01 pulls time from YUM and disperses it to everyone
105
NTCSS
Navy Tactical Command Support System Assists in managing logistics, maintenance, supply chain operations, personnel financial aspects
106
If NTCSS (radm) is not working [3]
Check user log, clear, reboot
107
Crypto device for IP Services
KG-175D
108
SITREP
Situational report: behavioral, DUI, suicidal. Doesn't get "push"'d
109
Name of folder for messages that will be sent & how to upload
Public folder > Message Release Save ..CC DIV > Message Release> Year Month Import OIX > batch import > browse > upload
110
Troubleshoot email Services Tool Application CLI
Check if it is internal or external 1 - Services: microsoft exchange "Running" 2 - Exchange toolbox -- 0s across the board 3 - Exchange admin center -- Servers > database > status: "mounted" 4 - Exchange Management Shell -- Test-EdgeSynchronization Sync Status: Normal Restart Server?
111
CWO email inbox to what public folder at turn over?
LASSEN’s MESSAGE TRAFFIC
112
SF 702
The Standard Form (SF) 702 Security Container Check Sheet provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information.
113
What is EKMS?
Electronic Key Management System An interoperable collection of systems that automate the planning, ordering, generating, distributing, storing, filling, using, and destroying of electronic key and management of other types of COMSEC material. See key management infrastructure (KMI).
114
KMI
Key Management Infrastructure The framework and services that provide the generation, production, storage, protection, distribution, control, tracking, and destruction for all cryptographic keying material, symmetric keys as well as public keys and public key certificates.
115
SF 701
The SF 701 Form, also known as the **Activity Security Checklist**, is a document used by various organizations, particularly government agencies and branches of the military, to ensure that **all security measures have been appropriately taken** at the end of the day or shift.
116
MSL in only in what network
SIPR
117
CANES
Consolidated Afloat Networks and Enterprise Services
118
ACAS SC01 Server
The ACAS SC01 server is comprised of the following software components: Nessus (NS), an active scanner and SecurityCenter (SC), which manages Nessus
119
Back Up Servers (BU01)
BU01 provides the enclave with backup and restore services via the Veeam application
120
Veeam
Veeam Software is a US-based information technology company that develops software for backup, disaster recovery, and data protection. Veeam's products are designed for virtual, cloud-native, SaaS, Kubernetes, and physical workloads.
121
Chat Server (CS01)
CS01 provides collaboration service using OpenFire via Swift client, Skype for Business (SEC only), Sametime Connect (SR only) and Mako Chat (SEC and SCI) Openfire is an open-source real-time collaboration (RTC) server based on the XMPP (Extensible Messaging and Presence Protocol) protocol.
122
Sametime Connect
IBM Sametime Connect is a software that allows users to collaborate in real time through instant messaging. It offers a range of real-time collaboration services, including voice, data, and video
123
Mako Chat
Mako Chat is a tactical chat solution developed by Asynchrony Hubzone LLC that meets the needs of the Naval Afloat user. It provides client and server technology that meets Information Assurance (IA) requirements. MakoChat is used in shipboard tactical environments.
124
CM01
System Center Configuration Manager (SCCM) is hosted on Windows server CM01. SCCM provides a unified management console with an automated set of administrative tools to **1- Deploy software, protect data, monitor health, and enforce compliance across all devices. 2- Provides Windows Update Services (WSUS) 3- Desktop/laptop provisioning.**
125
WSUS
WSUS is also known as Windows Server Update Services, and its first version is called Server Update Services (SUS). It helps distribute updates, fixes, and other types of releases available from Microsoft Update.
126
Collaboration at Sea (CAS) Classification and server
The CAS (SEC) and CS01 (SR) servers provide ship-to-ship and ship-to-shore collaboration services.
127
CAS
A global collaborative application that uses the SIPRNET and Secret Releasable (SREL) CENTRIXS networks. It provides chat rooms, email, and standardized group websites. CAS is based on the IBM / Lotus collaboration toolset and is used by planning groups to support operations with coalition partners.
128
Domain Controllers
A domain is a set of network resources (computers, applications, printers, etc.) assigned to a specific group of users in a local network. An authorized user need only logon to the domain to gain access to these resources. The resources can be located on one or many servers and/or workstations throughout the network. The domain controller is a device that controls access to the domain and its resources. **CANES networks have three domain controllers, DC01, DC02 and RODC**. A domain controller is a server loaded with the Windows Server 2016 software and configured or assigned to perform the domain controller function. A server is assigned as domain controller during the process of loading the Windows Server 2016 operating system.
129
EM01/02
Systems Center Operations Manager (SCOM) is hosted on EM01 and EM02. SCOM is used for network management and monitors the health and performance of everything from servers to individual applications in Microsoft Windows environments.
130
Exchange Server (EX01/EX02) [2]
Exchange servers, EX01 and EX02 provide email and calendaring services.
131
FS01
FS01 provides file and print services and hosts the Definitive Software Library, the Home drives and the Share drive.
132
IAEXET [6]
- Server Information Assurance Exchange Edge Transport Server provides: - email edge transport - DHCP - endpoint protection (DAR, excluding SR) - Rivercity (email) services. - IAEXET also provides RADIUS for the SR enclave only.
133
IM01/02
System Center Service Manager (SCSM) provides built-in processes for incident and problem resolution, change control, and asset lifecycle management.
134
IPSMGT What enclaves?
Intrusion Prevention System The purpose of IPSMGT is to detect and prevent malicious network activity in the UNC and SEC enclaves.
135
ISE01/02 What does it provide for certain networks
Identity Services Engine (ISE) determines whether users are accessing the network on an authorized, policy-compliant device. It establishes user identity, location, and access history. ISE assigns services based on the assigned user role, group, and associated policy. ISE grants authenticated users access to specific segments of the network or specific applications and services, or both based on authentication results. ISE applies to the SEC and UNC enclaves only and provides RADIUS services to the network.
136
MCA01
Server MCA01 (Tier 0) provides administrators with MS Active Directory tools required to administer to the domain and is the Management Certificate Authority server.
137
MRDS01 and MRDS02 (Tier 1)
provide administrators with the access and tools required to manage server applications.
138
Prime Infrastructural (PI)
PI is used to administer the wireless network.
139
Public Key Infrastructure (PKI) Server Provides [6]
The PKI server provides Public Key Infrastructure services for the UNC, SEC and SCI enclaves. A Public Key Infrastructure (PKI) server is a component within a PKI that manages the generation, distribution, storage, and verification of digital keys and certificates. The PKI is a system that enables secure communication and authentication over a network, typically the internet. Key components of a PKI server include: 1. **Certificate Authority (CA):** The CA is a fundamental part of the PKI server. It issues digital certificates, which bind public keys to individuals or entities, thereby establishing the authenticity of the public key. 2. **Registration Authority (RA):** The RA is responsible for authenticating users and entities before they are issued digital certificates by the CA. It acts as a verifier of the information provided during the certificate registration process. 3. **Certificate Repository:** The PKI server often includes a repository for storing issued certificates. This allows entities to access and verify the authenticity of certificates. 4. **Key Generation and Storage:** The PKI server generates key pairs (public and private keys) for users or devices. It securely stores private keys and distributes public keys as part of digital certificates. 5. **Certificate Revocation:** The PKI server manages the revocation of certificates in case they are compromised or no longer valid. This is crucial for maintaining the security of the PKI. 6. **Certificate Revocation List (CRL):** The CRL is a list maintained by the PKI server that contains information about certificates that have been revoked before their expiration date. In summary, a PKI server plays a central role in establishing and maintaining the trust and security of digital communications by managing the lifecycle of digital certificates and keys within a public key infrastructure.
140
Terminal Servers RDS01/02
RDS01 and RDS02 provide a workstation environment to the Trusted Thin Clients (TTC) in the UNC, SEC, and SR enclaves only.
141
RODC
RODC is a read only domain controller can’t make edits or changed to server
142
Host Based Security System (HBSS) Server (SADR01/02) | developed to do what for what system? Advantage/ characteristic?
The CANES HBSS was developed to **detect and prevent intrusion and exploitation of Department of the Navy (DoN) Information Systems (IS)** with minimal configuration and administration from the fleet IT and Cyber security personnel.
143
SAM/Security Information Event Monitoring (SIEM) Server
Server SAM and SIEM host the Sentinel application and is the CANES Security Incident and Event Management It is designed to aggregate log files and events from appliances, devices and operating systems with installed Sentinel agents and applications configured to forward their logs to the Sentinel Enterprise server. **(SEIM take logs and SAM stores logs)**
144
SQL Server (SQ01)
CANES provides a Structured Query Language (SQL) Server hosting environment, SQ01, where hosted applications can create and use database and database-coded interfaces. SQ01 is a secured pre-hardened baseline environment, consisting of Microsoft SQL Server Management Studio. CANES deploys SQ01 host as dedicated database services for hosting POR Applications.
145
VCSA
Virtualization services are provided by server VCSA The vCenter Server Appliance is a preconfigured Linux virtual machine, which is optimized for running VMware vCenter Server® and the associated services on Linux.
146
WEB
WEB provides remote desktop licensing, DHCP (UNC and SEC only), SharePoint (except SR), RADIUS (SR only) and Domino (SR only) services.
147
WSAV
Cisco Web Security Appliance virtual
148
Yellowdog Updater Modified (YUM) Server
YUM allows automatic updates, package and dependency management, on RPM-based distributions (Linux). YUM works with software repositories (collections of packages), which can be accessed locally or over a network connection. YUM also provides NTP services.
149
CDSA Only serves one enclave via
The Cross Domain Solution Access (CDSA) server (SECRET only) provides cross domain access via Trusted Thin Clients (TTC) to all enclaves with the exception of SCI.
150
Cross Domain Solution Guard (CDSG)
The CDSG servers provide the function of allowing appropriate information to be transferred between security domains while ensuring the transfer is controlled by the rules set up for the transfers.
151
SABI recides in what device?
Secret and Below Interoperability Server. The SABI in the Secret enclave resides on HP DL380 G10 (HP DL380 G9 for LHD 6 only) server. SABI provides **NTP to the CANES SR and Secret networks** from the authoritative timing source on the CANES Unclassified network.
152
NAS system shutdown path
Service > Service Tasks > Shutdown storage system > Execute Then switches and routers
153
Commands to change port interface (vlan)
config t int gi x/x/x do show run int gi x/x/x switchport access vlan 184 | vlan 184 printer and miscellaneous “Do” bc you are inside config t
154
Add printer in correct VLAN to FS01
In FS01 - Print Management - Action - Add printer - TCP IP - Auto detect - IP Address - Printer Name - Share Name - (Same as Production IP Plan)
155
Find printer that is in network
Printer and Scanners Select a shared printer by name \\fs01 browse Find w/ directory feature
156
Exchange Management Shell command to verify sync status
Test -EdgeSynchronization The command "Test-EdgeSynchronization" in Exchange Management Shell is used to verify the synchronization status between an Exchange Mailbox server and an Edge Transport server. This cmdlet helps ensure that the Edge Subscription, which establishes a secure communication channel between the Mailbox server and the Edge Transport server, is functioning properly. Running this command checks for the synchronization status, and it's commonly used for troubleshooting and monitoring purposes to confirm that the Edge Transport server is up to date with the configuration and changes made on the Mailbox server. If everything is in order, it should return information indicating successful synchronization.
157
How to load key to SKL
1- Netman laptop 2- Connect to taclane 3- user: comp.installer 4- 172.16.0.1 5- Key management 6- PKK chain info 7- SSD PPK chain 8- enable SSO contra 1 al 9 9- go to SKL 10- click on key and load
158
Lost message
Login OIX Organizational messages Quick search (DTG preferred)
159
LDAP
LDAP, or Lightweight Directory Access Protocol, is a widely utilized application protocol for managing distributed directory information services. Key aspects include its **focus on directory services: - Hierarchical structure akin to a tree, client-server model - Storage of information as attributes associated with entries - Common uses in user authentication and authorization - Robust security features.** LDAP is standardized through RFC documents, ensuring interoperability, and is a foundational technology in identity management, playing a vital role in organizing and accessing information in enterprise environments.
160
Get comeback copy for lost message
* Login OIX * Organizational messages * Quick search (DTG preferred) * fwd to self
161
The distinction between tier 1 and tier 0 administrators
The distinction between tier 1 and tier 0 administrators can vary based on the specific organizational structure or context, but generally, the terms are associated with different levels of administrative access and responsibilities: 1. Tier 1 Administrator: • Often considered entry-level or first-level support. • Handles basic user inquiries, troubleshooting, and routine tasks. • Typically works on straightforward issues and escalates more complex problems to higher-tier support. • Has limited access to critical systems and sensitive information. 2. Tier 0 Administrator: • Usually represents the highest level of administrative access. • Has extensive privileges and responsibilities, often overseeing system architecture, security, and critical infrastructure. • Manages and configures core systems, networks, and security protocols. • Often involved in strategic decision-making regarding IT infrastructure and policies.
162
IIS
Internet Information Services. Manageable Web server for hosting anything on the Web for Servers' services. Requires credentials like an user.
163
Other way to see back up status?
Mailbox folder “Backup”
164
Last replication for TMIP
- Remote into TMIP - Pass from note - Mirth - check for errors
165
What is NSIPS
The Navy Standard Integrated Personnel System (NSIPS) is the Navy’s single, field-entry, electronic pay and personnel system for all USN/USNR Sailors. This web-enabled, **Enterprise Resource Planning (ERP)** system offers Sailors 24-hour access to their **Electronic Service Record (ESR)**, training data, and career counseling records. NSIPS is available world-wide, both ashore and afloat.
166
NSIPS server replica
- From management laptop - NSIPS shortcut
167
Obtain a device's switch interface [8]
1. Obtain mac address 2. Utilize a management laptop. 3. Connect the printer to the Ethernet network. 4. Access PuTTy to interface with the network. 5. Choose the BB router 101. 6. Enter the username 'tradorpuntored'. 7. Log in to the switch's IP address. 8. Once logged in, use the command: 'show mac address -table' pipe the "include" 4 last digits of MAC address
168
Load Key [10]
1. Open NetMan laptop while connected to the TACLANE. 2. Log in with the username 'comp.installer'. 3. Navigate to 172.16.0.10. (verify network connection if needed) 4. Access key management. 5. Select "PPK Chain Info." 6. Choose "SSD PPK Chain." 7. Enable Single Sign-On (SSO) (uno al nueve.) 8. On SKL click key and load 9. DS101 to DS101 & "ok" x2 10. On laptop verify match and save
169
Get YUM time source
chronyc -a sources -v
170
comp.installer IP address
172.16.0.10
171
The private IPv4 address ranges defined by RFC 1918 are:
- 10.0.0.0 to 10.255.255.255 (10.0.0.0/8) - 172.16.0.0 to 172.31.255.255 (172.16.0.0/12) - 192.168.0.0 to 192.168.255.255 (192.168.0.0/16) It is commonly used for local area networks (LANs).
172
What is 127.0.0.1
Loopback address commonly referred to as "local host" used to access a device's own network services/
173
ITPR
IT Procurement Request
174
How do you verify NAS health? [5]
- Storage - Pools - Barge Storage Pools Properties - View/edit - Drives
175
At turn on will assign a new IP address
Dynamic Host Configuration Protocol (DHCP) is a network protocol that automatically assigns IP addresses and other network configuration information to devices on a network, facilitating efficient and automated network setup.
176
IIS manager
IIS Manager is a tool that helps manage web servers. It provides access to configuration settings, user data, membership, and runtime diagnostic information. IIS Manager also has a **Remote Administration feature** that allows users to manage sites and web server features through the same user interface.
177
ipconfig /all and 3 of the things it gives you
"ipconfig /all" is a Windows command that displays detailed information about a computer's network configurations, including IP address, subnet mask, gateway, DNS servers, and more.
178
What if a virtual machine has a banner that reads "patching OU" [6]
- DC01 Active Directory - Staging - Patching - Move to CANES users and computers - CANES member servers - Choose a server SQL to Exchange IAEXET to EX01 or EX02
179
ISE
Identity Service Endpoint: entry security The Identity Service Endpoint is a specific URL or address where authentication and identity-related services are provided, allowing systems or applications to **verify and manage user identities.**
180
EM01 holds what application
SCOM performance monitoring (System Center Operations Manager)
181
vlan 999
In a black hole VLAN setup, any device or port associated with that VLAN will not forward traffic to any other devices or networks. Instead, all incoming traffic to the black hole VLAN is silently discarded. This can be a security measure to contain or isolate potentially malicious or unwanted traffic.
182
chronyc -a sources -v
Used to display detailed information about the sources (servers) synchronized with the Chrony time synchronization service, including additional verbose details.
183
PuTTy login
trador punto red
184
Command after patching a server
gpupdate /force
185
What to start before EX01/02 services
IAEXET
186
Muster Report
- NTCSS Desktop Client - RADM - Absences - Muster Management - CS CC - DD MMM YYYY time - Fill mustering PO and Officer
187
TPI for what keys in SKL
Two Person Integrity for Top Secret only
188
Where do you put "USS LASSEN" to get comeback copy
Before first break
189
What is CM01 for
Updates through WSUS
190
What will client computers have to do once a service is restored
Restart
191
What is a comeback copy message and what to do with it
OIX receipt, print, sign and remove previous day in folder
192
Where can you find the Barge LAN power off procedure
Data (F:) on management computer, netman
193
Message precedence and times
R P O Z 6h 3h 30m 10m
194
What is YUM |relation to SIPR
Timer server that pulls from the NOC. DC01 pulls time from YUM and disperses to NIPR. SABI pulls to secret YUM.
195
Times for signing material condition
0615 1615
196
Flooding
Prioritize getting out
197
When to load taclane keys
2 days before end of month. They roll automatically. Failure will result in IP services lost.
198
Who gives the keys to load to the operator?
KOAM
199
Who must know about new month?
KOAM
200
-Personal For-
Commander message. Forward to CO, be succinct. Put in "personal for" folder, not for Lassen Traffic.
201
To check backups
BU01 -> VEAM -> backup & replication -> last 24 hrs -> look for "success" / (part of cyber report)
202
In what F/L can you find precedence levels
F/L 2 & F/L 5 (w/DTG)
203
"Push" message traffic
Move mail from CWO email inbox to Lassen's message traffic, public folder At least every hour.
204
RSUPMAST basic troubleshooting
Reset server, clear login (NTCSS)
205
VCSA in VMware
vCenter Server Appliance (VCSA) serves as a centralized management platform for VMware virtualized environments, allowing users to **administer and control multiple ESXi hosts and their virtual machines.** It includes features like resource management, performance monitoring, and centralized deployment. VCSA is a more streamlined and scalable alternative to the traditional Windows-based vCenter Server. VCSA is optimized for running VMware vCenter Server® and the associated services on Linux.
206
Taclane GUI address
172.16.0.1
207
Releasing authority for messages
Department Head and above For CASREPS, only CO
208
7 Layers of OSI Model
1- Physical 2- Data Link 3- Network 4- Transport 5- Session 6- Presentation 7- Application
209
1. Physical Layer
The physical layer is responsible for the physical cable or wireless connection between network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of the raw data, which is simply a series of 0s and 1s, while taking care of bit rate control.
210
2. Data Link Layer
The data link layer establishes and terminates a connection between two physically-connected nodes on a network. It breaks up packets into frames and sends them from source to destination. This layer is composed of two parts—Logical Link Control (LLC), which identifies network protocols, performs error checking and synchronizes frames, and Media Access Control (MAC) which uses MAC addresses to connect devices and define permissions to transmit and receive data.
211
3. Network Layer
The network layer has two main functions. One is breaking up segments into network packets, and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network. The network layer uses network addresses (typically Internet Protocol addresses) to route packets to a destination node.
212
4. Transport Layer
The transport layer takes data transferred in the session layer and breaks it into “segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end, turning it back into data that can be used by the session layer. The transport layer carries out flow control, sending data at a rate that matches the connection speed of the receiving device, and error control, checking if data was received incorrectly and if not, requesting it again.
213
5th Layer (OSI model)
The session layer creates communication channels, called sessions, between devices. It is responsible for opening sessions, ensuring they remain open and functional while data is being transferred, and closing them when communication ends. The session layer can also set checkpoints during a data transfer—if the session is interrupted, devices can resume data transfer from the last checkpoint.
214
6. Presentation Layer
The presentation layer prepares data for the application layer. It defines **how two devices should encode, encrypt, and compress data** so it is received correctly on the other end. The presentation layer takes any data transmitted by the application layer and prepares it for transmission over the session layer.
215
7. Application Layer [5 examples]
The application layer is used by end-user software such as web browsers and email clients. It provides protocols that allow software to send and receive information and present meaningful data to users. A few examples of application layer protocols are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).
216
Steps for Fire [6]
- Fire Alarm - Power Panel Off (external if necessary) - Try CO2 - Get SKL & Inventory - Lock safe and vault - Log visitors
217
WSUS Server
CM01 Windows Server Update Services.
218
Verify antivirus update
Up arrowhead > McAfee > Endpoint Security > up arrowhead > about > AmCore date
219
Inventory equipment
Taclanes and keys, SKL and key
220
Application for WSUS
SCCM (System Center Configuration Manager) adds value to the WSUS product with the addition of features like remote control of devices and active monitoring. It relies on WSUS to run as a foundation and execute necessary patching, and provides extended features for users
221
Contents of the MSL excel [4]
- MSL - Messages involving the Lassen - Turn over process - References
222
If certificate not in Intermediate Certificator
- Right click - All tasks - Import - CC DIV/ 1.Certs - click click click
223
Open as admin Powershell mmc.exe -s file
aa/ remove s certificate computer account Intermediate Certificate gpupdate /force CC Div /cub CND-OSE
224
Command to force synchronization between EX01 EX02 & IAEXET
Start-EdgeSynchronization -Force
225
Checking if mail is flowing between servers
Test-Mailflow
226
Cyber Awareness location
\\Shareserver1\Share\FY-24 Cyber Awareness
227
ESXi Events
Hosts > Monitor > Events (tabs)
228
Where to find PLAD list?
\\Shareserver1\Share\3. COMBAT SYSTEMS\CC DIV\Message Release
229
After the first BT
UNCLAS C O N F I D E N T I A L SECRET TOP SECRET
230
Low and High side
Low Side = NIPR High Side = SIPR
231
Map a server
On file explorer, right click, map **\\server_name\share**
232
F/L 5
DTG P DDXXXX MMMYY - P precedence - D day of month - X zulu time - Z zulu - M month - Y year
233
EFTO
Encrypt for Transmission Only
234
ZNR ZNY
ZNR UUUUU —For off-line encrypted messagesand classified messages transmitted in the clear ZNY EEEEE —For unclassified EFTO messages ZNY, followed by CCCCC, SSSSS, or TTTTT —For Confidential, Secret, or Top Secretmessages, respectively.
235
F/L 4
ZNR UUUUU ZNY CCCCC
236
Troubleshoot CAC not being detected
Check Cisco AnyConnect widget in the up arrowhead Switch from SmartCardEAP to EAP chaining
237
What is the difference between Exchange Management Shell and Exchange Admin Center?
Exchange Management Shell is a command-line interface focused on automation and advanced administrative tasks, while Exchange Admin Center is a web-based graphical interface designed for simplified management and ease of use.
238
Restore deleted files | 4 steps
In BU01 - VEAM backup and replication - Inventory - Virtual Infrastructure - Standalone Hosts | Up to 3 days ago
239
Superseded less often than monthly
Firefly Vector Set Modern Key | Superseded every 13 months ## Footnote Firefly is a U.S. National Security Agency public-key key exchange protocol, used in EKMS, the STU-III secure telephone, and several other U.S. cryptographic systems.
240
Firefly
U.S. National Security Agency **public-key key exchange protocol**, used in EKMS, the STU-III secure telephone, and several other U.S. cryptographic systems.
241
What are some POR | SQ01
AWN: submit jobs Sked: submit maintenace
242
Rack of routers and taclanes
243
What server encrypts within the network?
IAEXET with the application Symantec
244
Functions of IAEXET [3]
- Transport email - DHCP - Symantec
245
Trouble ticket folder file path
3. COMBAT SYSTEMS\CC DIV\2 CYBER\00. 2024 Cyber\5. Trouble Ticket Log
246
How do UPS transfer power
Left to right and the up the NAS (auto powering it on)
247
From Switch to Pier Box
Switch > Firewall > PT router ADNS > Taclane > CT Router ADNS > Pier Box
248
Command that analyzes the state of domain controllers (DC) in a forest or enterprise and reports any problems to help in troubleshooting. | Frequently used with NTP servers
DCDiag.exe
249
How to replicate servers [2]
- DC01 - Active Directory Site & services - "Default first site name" - from left menu NTDS Setting - replicate now - DC01 & DC02 ``` ``` - command line as admin - repadmin /syncall - repadm /repull
250
What is a proxy server?
A proxy server is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online.
251
Microsoft Exchange Transport provides [2]
MSExchangeTransport Provides SMTP server and transport stack.
252
SMTP server
An SMTP server, which stands for Simple Mail Transfer Protocol server, is a software application that handles the sending, receiving, and routing of email messages over a network.
253
The transport stack
The transport stack, also known as the network protocol stack, refers to a set of protocols and layers that work together to enable communication between devices over a network. It provides a standardized framework for transmitting data between different systems. The transport stack typically includes protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), which handle the reliable and unreliable delivery of data packets, respectively. The transport stack, also known as the network protocol stack, refers to a set of protocols and layers that work together to enable communication between devices over a network. It provides a standardized framework for transmitting data between different systems. The transport stack typically includes protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), which handle the reliable and unreliable delivery of data packets, respectively.
254
What is a bad result for w32tm /query /source What do you want to see instead?
bad: local CMOS good: NTP,0X1
255
local CMOS
(Complementary Metal-Oxide-Semiconductor). The local CMOS refers to a small portion of memory on a computer's motherboard that stores the system's hardware configuration settings, including the date and time
256
About how long does each light last in the UPS?
15-20 minutes
257
What level of RAID is ESXi?
RAID 5: RAID 5 consists of block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but one be present to operate. Upon failure of a single drive, subsequent reads can be calculated from the distributed parity such that no data is lost.[5] RAID 5 requires at least three disks
258
How long does NAS take to come up?
40 minutes
259
Where to find Local USB error
DLP (Data Loss Prevention) Endpoint Console (McAfee) delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and through removable storage devices.
260
VLAN for navy cash, SCI, SSIL
VLAN 161
261
Management of priviledges for laptops VLAN
VLAN 180
262
Telephone internet (VoIP) VLAN
VLAN 183
263
VoIP
Voice over Internet Protocol (VoIP) integrates voice and vieo communications over the internet.
264
Miscellaneous Printer VLAN
VLAN 184
265
Provisioning VLAN
VLAN 198
266
Clients VLAN
VLAN 182
267
Domain name for 205.68.246.244
https://vcsa.ddg82.navy.mil
268
SOPA watch bill comes out when
Tuesday every week
269
Process to turn SKL on
- Press power on button - Login
270
The transmitter must generate a _____ of sufficient _____ at the desired _____
The transmitter must generate a radio frequency signal of sufficient power at the desired frequency
271
SERMC
Southeast Regional Maintenance Center (SERMC)
272
Command used to retrieve information about the digital certificates that are installed on an Exchange server.
The "Get-ExchangeCertificate" is a PowerShell cmdlet used in Microsoft Exchange Server.
273
Provides the primary functions of proxying the web browser, implementing the Operation Security Condition (OPSECON) rule set, blocking unauthorized applications’ client-server reach-back communications (phoning home), and monitoring internal applications that use ports 80 and 443, and other ports, for other-than HTTP and HTTPS protocols.
Cisco Web Security Appliance virtual (WSAV)
274
The CANES **app** and **server** that was developed to detect and prevent intrusion and exploitation of Department of the Navy (DoN) Information Systems (IS) with minimal configuration and administration from the fleet IT and Cyber security personnel.
Host Based Security System (HBSS) Server (SADR01/02)
275
A server model produced by Hewlett Packard Enterprise. It's part of the ProLiant DL (rack-optimized) series and is designed for various data center workloads. Its name indicates it's the 10th generation of this server model. It is known for its performance, security, and flexibility, making it suitable for a range of applications in enterprise environments.
The DL380 G10 refers to the HPE ProLiant DL380 Gen10 HPE Hewlett Packard Enterprise
276
WSAV provides the primary functions of
**proxying the web browser, implementing the Operation Security Condition (OPSECON) rule set**, blocking unauthorized applications’ client-server reach-back communications (phoning home), and monitoring internal applications that use ports 80 and 443, and other ports, for other-than HTTP and HTTPS protocols.
277
What is a VMware virtualized environment?
A VMware virtualized environment utilizes VMware virtualization technology to create and manage virtual machines (VMs) on physical hardware, enabling multiple instances on a single server. VMware tools like **ESXi and vCenter Server facilitate VM creation, management, and monitoring.** This approach enhances resource utilization, flexibility, and scalability by allowing independent operation of multiple operating systems and applications on a single physical machine.
278
Two Hypervisor types with VMware
1. Bare-Metal Hypervisor (Type 1 Hypervisor): In a bare-metal deployment, VMware ESXi is installed directly on the physical hardware without the need for a host operating system. This type of hypervisor is often preferred for production environments, as it provides better performance and resource utilization. 2. Hosted Hypervisor (Type 2 Hypervisor): Alternatively, VMware Workstation or Fusion, which are Type 2 hypervisors, can be installed on top of an existing operating system (host OS). This approach is common for development, testing, or desktop virtualization scenarios.
279
Model produced by Hewlett Packard Enterprise (HPE). It is part of the ProLiant DL (rack-optimized) series and represents the 9th generation of this server model. For ______ only
HP DL380 G9 for LHD 6 only
280
ESXi Type?
ESXi stands for “Elastic Sky X Integrated.” However, it’s more commonly referred to as “ESXi,” and it is the hypervisor developed by VMware for its virtualization platform. ESXi is a type-1 hypervisor, meaning it runs directly on the bare-metal hardware without the need for an underlying operating system.
281
RADIUS [3]
RADIUS stands for "Remote Authentication Dial-In User Service." RADIUS services provide centralized **authentication, authorization, and accounting for network access control**, ensuring secure and managed user interactions within a network.
282
Microsoft System Center: This is a _____ __ __________ _____ that includes various components such as …
Microsoft System Center: This is a suite of management tools that includes various components such as SCCM, System Center Operations Manager (SCOM), System Center Virtual Machine Manager (SCVMM), and more.
283
It is a Windows command that displays detailed information about a computer's network configurations, including IP address, subnet mask, gateway, DNS servers, and more.
ipconfig /all
284
The focus of NTP-4 Echo
(**Naval Communications**) is to provide a basic manual addressing **C4I** concepts and capabilities in the U.S. Navy.
285
Prescribes the minimum policies for issuing, accounting, handling, safeguarding, and disposing of COMSEC (Communications Security) material; more specialized, focusing specifically on electronic key management.
EKMS-1E
286
Prescribes the minimum policies for accounting, disposing, handling, issuing, and safeguarding of COMSEC (Communications Security) material; has a broader scope, including centralized materiel services with key management being just one component of its coverage.
CMS-1A
287
EKMS-1E
Prescribes the minimum policies for issuing, accounting, handling, safeguarding, and disposing of COMSEC (Communications Security) material; more specialized, focusing specifically on electronic key management.
288
CMS-1A
Prescribes the minimum policies for accounting, disposing, handling,issuing, and safeguarding of COMSEC (Communications Security) material; has a broader scope, including centralized materiel services with key management being just one component of its coverage.
289
From what server does Exchange Server PowerShell (Exchange Management Shell) has to be ran?
EX01 or EX02
290
Name of Exchange CLI
Exchange Server PowerShell (Exchange Management Shell)
291
Command to see ipconfig of a specific device within current interface
show mac address-table | include xxxx recommended xxxx = last four of mac address
292
This command sequence enters the interface configuration mode for the GigabitEthernet interface specified by "x/x/x" and then displays the running configuration for that interface.
int gi x/x/x do show run int gi x/x/x
293
What is email edge transportation?
"Email edge transportation" typically refers to the process of transporting email messages between different network boundaries or edges, often involving email security measures at the network perimeter. It may include tasks like filtering, scanning for malware, and controlling the flow of emails entering or leaving a network.
294
Help desk for Navy ITs email
navy311@navy.mil Specify the extent of the damage, impacted users, and include as many relevant details as possible.
295
What permissions to give when creating RADM account?
After filling all details on the right, (Confidentiality = unclassified) radm and r-supply: all users
296
What permissions are not given to all users when creating radm account and why?
RADM (only ITs) OMSNG (not used)
297
Confirms power is stable
CSOW / CDO
298
It provides an approximation the calculated time when normal functionality will be restored.
Estimated Time of Restoration (ETR) is an estimation indicating when a service or system is expected to be fully operational after an outage or disruption.
299
File path to IETM
S:\3. COMBAT SYSTEMS\CC DIV\CANES\CANES_SW3_R4_IETM\N6600100592 Open with Chrome
300
COMSEC MATERIAL REPORT
SF153
301
It is used by federal government agencies to report destruction, hand receipt, transfer, inventory and other transactions.
Standard Form 153 (SF-153) is a COMSEC Material Report
302
CMS-25
Local key destruction
303
Command to use if w32tm /resync fails
w32tm /config /syncfromflags:domheir It sets the synchronization source flags to prioritize the domain hierarchy (domheir) for time synchronization. This means the system will synchronize its time with a domain controller in the domain hierarchy.
304
YUM shell login
ra.scom.scx.mnt
305
AMCROSS log
Advanced Routing Log
306
Lassen's OSRI
RHOVHJM
307
Lassen's DSRI
RUOIBBB
308
SQ01 importance
SQL plays a pivotal role in managing and interacting with databases, making it indispensable in virtual server environments where data storage, retrieval, and integrity are critical aspects of operations.
309
show ip ospf neighbor
The command "show ip ospf neighbor" is typically used in networking environments with OSPF (Open Shortest Path First) routing protocol. When executed on a router or networking device, this command displays information about the router IDs, state of the OSPF neighbors, the type of adjacency, and the communication status between routers participating in OSPF.
310
OSPF |& algorithm
Open Shortest Path First Open Shortest Path First (OSPF) is a routing protocol used in computer networks to find the most efficient path for data packets as they traverse a network. It’s based on a **link-state routing algorithm**, where routers exchange information about their network connections and use this information to build a topology map. OSPF then calculates the shortest path to each destination, considering factors like link cost.
311
link-state routing algorithm
In a link-state routing protocol, each router in the network maintains a detailed and up-to-date map of the entire network. This map includes information about the state of each link (connection) in the network.
312
Login and Command to verify ADNS
tradorpuntored venavy show ip ospf neighbor
313
Cisco command to verify IP
To verify IP information on a specific interface of a Cisco router, you can use the following command: show ip interface Replace with the actual interface identifier, such as “GigabitEthernet0/0” or “FastEthernet1/0”. This command will provide detailed information about the specified interface, including its IP address, status, protocol, and other relevant details.
314
This command will display details about all tunnel interfaces on the router
show interface tunnel This command will display details about all tunnel interfaces on the router, including their numbers, IP configurations, and operational status. If you are looking for information about a specific tunnel, you may need to check the configuration or use additional commands specific to the type of tunnel, such as GRE or IPsec.
315
Address for intranet nsips
https://nsipswebafloat.ddg82.navy.mil
316
Servers that host SKED
PMS SKED Server SQ01
317
ATO definition
The Authorization to Operate (ATO) is crucial for the US Federal Government and the Department of Defense (DoD). It represents an official management decision granted by a senior organizational official. The ATO **Cybersecurity decision authorizes the operation of an information system and explicitly acknowledges the associated risks** to agency operations, assets, individuals, other organizations, and the nation.
318
To know which key belongs to what enclave
Controlling Authority (CONAUTH) Message
319
Clients can’t print post reboot
Start services in FS01 access print spooler service 1. Select Windows logo key + R to open Run. 2. Type: services. msc, and select OK. 3. Right-click Spooler. 4. Select Start.
320
Tunnel 220
Taking IP services from shore
321
Troubleshoot Exchange web-based option
Servers > database > status: "mounted" Exchange Admin Center (EAC) is a web-based management console provided by Microsoft provides a user-friendly interface with different modules and tools to efficiently manage Exchange Server deployments. Allows administrators to manage mailboxes, configure email policies, monitor server health, and troubleshooting issues.
322
Troubleshoot Exchange diagnostic tool option
0s across the board Exchange Toolbox is a collection of diagnostic and troubleshooting tools. It is a separate application that can be installed on a server running Exchange Server includes various tools such as the Message Tracking tool, Mail Flow Troubleshooter, and Queue Viewer: Mail flow, message tracking, database health, and other aspects of Exchange Server.
323
Compare Exchange Admin Center with Exchange Management Console
EAC offers a more advanced and flexible management experience with a broader range of features, while EMC is limited to older versions of Exchange Server and has a more traditional interface. It is recommended to use EAC for managing newer versions of Exchange Server.
324
Troubleshoot Exchange services option
From EX01 or EX02 computer management verify all automatically started services are running.
325
Troubleshoot Exchange CLI option
The Exchange Management Shell is built on Windows PowerShell technology and provides a powerful command-line interface that enables the automation of Exchange administration tasks. You can use the Exchange Management Shell to manage every aspect of Exchange. For example, you can create email accounts, create Send connectors and Receive connectors, configure mailbox database properties, and manage distribution groups. You can use the Exchange Management Shell to perform every task that's available in the Exchange graphical management tools, plus things that you can't do there (for example, bulk operations). In fact, when you do something in the Exchange admin center (EAC), the Exchange Control Panel (ECP), or the Exchange Management Console (EMC), it's the Exchange Management Shell that does the work behind the scenes.
326
ECP (Exchange)
Exchange Control Panel (ECP) provides a user-friendly interface accessible through a web browser, allowing users to access and modify their mailbox settings, such as changing passwords, setting up email forwarding, managing distribution groups, and configuring out-of-office messages.
327
What is group policy?
Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft's Active Directory to implement specific configurations for users and computers. Group Policy is primarily a security tool, and can be used to apply security settings to users and computers.
328
To resubscribe to transport server (IAEXET)
Remove-EdgeSubscription EdgeTransportServerIdentity
329
What is Axway Validation Authority (VA) Suite?
Axway Validation Authority (VA) Suite is a comprehensive software solution designed to help organizations **manage and automate the process of digital certificate** lifecycle management for CAC and servers.
330
OWA (email)
Outlook Web Access
331
Services need to be check at start up [8]
a. Outlook (and send a test email from your phone to radio@ddg82.navy.mil) b. Sked c. RADM d. Internet explorer e. AWN f. NSIPS g. Share drive (While you're at it print a test page) h. Verify IP services
332
One way to fix mfom
Restart DC01 (fix replication)
333
Verify replication for TMIP, NSIPS and Navy Cash
- Navy Cash — It is verified only by DISVO - TMIP — MIRTH - NSIPS — Management computer — Remote launch NSIPS VM — Use shortcut “21956”