Barge Duty IT Flashcards

1
Q

Hypervisors Type-1 and Type-2

A

Hypervisors are critical components of virtualization technology.

Type-1 hypervisors, often called bare-metal hypervisors, run directly on the physical hardware without needing an underlying operating system.

Type-2 hypervisors, also known as hosted hypervisors, operate within a conventional operating system, using it as an intermediary layer between the hardware and virtual machines.

While Type-2 hypervisors are easier to set up for testing and development on personal computers, they introduce additional overhead due to the host OS, resulting in lower performance and resource efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PuTTy

A

PuTTY is widely used terminal emulator and network file transfer application that manages and troubleshoots remote systems and devices. It is known for its simplicity and reliability, making it a popular choice for establishing secure and non-secure connections to a wide range of devices and servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 basic troubleshooting steps

A
  • Check the antenna is clear
  • Taclane Security Association
  • Verify Update Service Advisory
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Taclane stands for

A

“Tactical Local Area Network Encryption.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TACLANE is a family of network encryption devices used by the United States government and its military agencies to…

A

secure and protect classified and sensitive information in communication networks. The term “TACLANE” is an acronym that stands for “Tactical Local Area Network Encryption.”

TACLANE devices are manufactured by General Dynamics Mission Systems, a prominent defense and aerospace company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unisphere VM management
Compared to
NAS

A

Unisphere VM management is a specialized tool for managing storage resources within virtualized environments, particularly those using Dell EMC storage solutions. In contrast, NAS (Network Attached Storage) is a more general-purpose technology focused on providing file-level storage and file sharing capabilities over a network, catering to a broader range of use cases beyond virtualization. The choice between the two depends on the specific storage and data sharing requirements of an organization or environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is EMC within the storage solution context

A

In 2016, Dell Inc. acquired EMC Corporation, forming Dell Technologies. As a result, the EMC brand name is now often associated with Dell EMC, which is the division of Dell Technologies that focuses on data storage, data protection, and other enterprise IT solutions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ESXi NIPR address

A

205.68.246.244

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ESXi SIPR address

A

205.2.183.244

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

NAS NIPR address

A

205.68.246.241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NAS SIPR address

A

205.2.183.241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ESXi NAS, NIPR and SIPR address

A

ESXi
- NIPR 205.68.246.244
- SIPR 205.2.183.244
NAS
- NIPR 205.68.246.241
- SIPR 205.2.183.241

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TACLANES Key Installer
Address

A

172.16.0.1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Miscellaneous Printer Port

A

184

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Printer server & Share drive

A

FS01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Log into NIPR ESXi using domain name

A

https://vcsa.ddg82.navy.mil

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Loss of Power
3 most general steps

A
  • Turn Off Network
  • Report to CDO
  • Stand by for stable power (CDO)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

3 ways to find a printer (already in network)

A
  1. Printers & Scanners
    Or
    If printer was not listed
  2. — \fs01 browse
    — Find with directory feature
    Or
  3. — “Add manually”
    — Select a shared printer by name
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

9 parts+ of F/L2

A
  1. Precedence
  2. LMF
  3. Classification 4 characters
  4. CIC
    (space)
  5. OSRI
  6. SSN
    (space)
  7. JDTOF
    (-)
  8. 3’s redundancy
    (- -)
  9. DSRI
    .
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

ASCII
- what does it stand for?
- what is it?
- how many?

A
  1. American Standard Code for Information Interchange
  2. Character encoding format for text
  3. 128 characters/ control codes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AMCROSS [4]

A
  • Somebody passed away
  • Triad signatures required
  • Advanced Routing Log
  • Not public traffic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

3 References for sending messages

A

NTP 3(J)
NTP 4(E)
JANAP 128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

OSRI
DSRI
SSN

A

Originating Station Routing Indicator
Destination Station Routing Indicator
Station Sequence Number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Publication for in depth info on F/L 2

A

JANAP 128

JANAP 128, also known as Joint Army-Navy-Air Force Publication 128, is a set of regulations and procedures for the handling and reporting of naval and maritime incidents, events, and encounters. JANAP 128 provides guidance for standardizing the collection and reporting of data related to naval and aerial encounters, including those involving foreign military forces or other maritime activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

CIC
FRI

A

Content Indicator Code
Fleet Routing Indicator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

MCS
AUTODIN

A

Message Conversion System
Automatic Digital Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

OSRI is identified by

A

An assigned AUTODIN or
FRI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When SSN left blank the number will be provided by

A

GateGuard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

CANES backup

A

BU01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Three systems we use to get ip services while on the ship

A

NMT: Navy Multi band Terminal
Provides SHF EHF

ATIP: stands for Advanced Technology for Information Processing. It is a method of data transmission that uses advanced algorithms and techniques to improve the speed and efficiency of communication EHF.

CBSP: Comercial Broadband Satellite Program. Provides up services using SHF.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

NMT

A

The Navy Multiband Terminal (NMT) is a secure satellite communication system used by the United States Navy to establish reliable and secure communication links, particularly in naval vessels at sea. NMT is designed to support voice, data, and video communication for naval operations, including command and control, intelligence, surveillance, reconnaissance, and more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

SHD

A

Special Handling Designator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

PLA to RI

A

Plain Language Address to Routing Indicator

Converts regular address to computer readable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

A DSRI ending in SUU indicates that [2]

A

The PLA to RI lookup will be performed by NAVCOMPARS or MCS before delivered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

NAVCOMPARS

A

Naval Communications Processing and Routing System (NAVCOMPARS): A Model for Broadcast Performance Analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

MCS

A

MESSAGE CONVERSION SYSTEM (MCS)

The primary purpose of the Regional MCS is to provide PLA-to-Routing Indicator (RI) look up and assignment. After receiving a message from the host NOVA System, the Regional MCS will validate the message, assign the appropriate RI(s) and return the message to NOVA for delivery.

The Defense Message System-Message Conversion System
the Defense
(DMS-MCS) is operational at the DISA DTH located at Fort Detrick
MD. The DMS-MCS is comprised of the Message Conversion System Message Processor (MCSMP), the MCS Directory Component (MDC), the Central Directory Component (CDC), and the Update Authority Component (UAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Inventory procedure
Look at _____ & _____ verify _____

A

Look at serial numbers and quantity; verify key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

White Pinnacle
Precedence and what to do

A

Flash (z)
Take to triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

General CIC

A

ZYUW

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

-Personal For- (commander)
Message [2]

A
  • Forward to CO, be succinct
  • “Personal For” folder (not for Lassen Traffic)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

F/L 4 [2]

A
  • Security Warning
  • ZNR UUUUU or ZNY CCCCC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

F/L 10

A

Group count

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

F/L 5

A

Priority _ Day Time Month Year

R 120830Z JUN23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

After F/L 11

A

After break (BT)
The first line of F/L 12 is the classification “spelled out” and any special instructions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

NAS
Username and password [4 components]

A

La raíz no
Ve Navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Steps to receive to send messages

A
  • Hard copy signed by CO
  • Verify message CWO server
  • Log into “Outgoing Message Release Logs”
  • Sign when charge taken
  • Sign when sent
  • Print comeback receipt
  • Signed in log for come back
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Last 7 servers to shut down

A
  • FS01
  • SQ01
  • EX02
  • EX01
  • DC02
  • YUM
  • DC01
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

FS01

A

Share Drive
Print Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SQ01

A

Data Base
POR (Program of Record)
NSIPS SKED aflog (FSM ROM) NIAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Turn off Tac Lane

A

Two power off buttons
Left tac lane power
Right tac lane power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Releasing Authority
And lifecycle of keys

A

CONAUTH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

CONAUTH

And four things they are responsible for

A

Controlling Authority (CONAUTH) is defined as the command designated as responsible for directing the establishment of a cryptonet/circuit and managing the operational use and control of keying material assigned to that cryptonet/circuit.

The CONAUTH is responsible for evaluating COMSEC incidents and authorizing the issuance, destruction and transfer of COMSEC material under their cognizance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

STATUS OF COMSEC MATERIAL:

A

The authorized period of use for COMSEC material is
defined by its status (i.e.. one of three possible conditions)
Status for COMSEC material is assigned at the direction of the
CONAUTH or originator of the material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

In the context of the
CMCS, each item of traditional COMSEC material is controlled or managed by a designated official known as a

A

A CONAUTH is responsible for evaluating COMSEC incidents and authorizing the issue/destruction of COMSEC material under their control.
By definition, a CONAUTH is the command which has designated responsibility for directing the establishment and operation of a cryptonet/circuit and managing the operational use and control of keying material assigned to a cryptonet/circuit. CONAUTH responsibilities are detailed in Annex C. For modern (asymmetric key), there is no Controlling Authority. The responsibilities are performed by a Command Authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Local key

A

CMS-25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

To shut down host [3]

A
  • Login ESXi GUI
  • Click host
  • Click shutdown button
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Bring network back on

A
  • Power stability declared by CDO
  • Power on UPS wait approx 30 minutes to have 60%+
  • NASs will come on by themselves if not disconnected
  • Wait until you can ping NAS
  • ESXis have a small red power button
  • Bring the servers back on in reverse order NIPR and SIPR side
  • Check YUM is sync
  • Check services to be running
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Sync YUM and DC01 [9]

A
  • Remote YUM
  • Command Prompt
  • ra.scom.scx.mnt
  • (shift 1st square no shift 2nd square) x2
  • Elevate to root
  • Check synced system clocks
  • Resync
  • Query
  • Check DC01 is synchronized
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

How to check services are running [4]

A
  • Right click windows icon
  • Computer management
  • Services tab
  • All Startup Automatic have to be running
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Elevate to root (linux)

A

sudo su -

sudo (space) su (space) -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

At YUM root level, check to what are the system clocks synced to.

A

chronyc -a sources -v

chronyc (space) -a (space) sources (space) -v

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

[Command line] -v meaning

A

Verbose Output: When you run a command with the “-v” option, it might display extra information, messages, or logs that help you understand what the command is doing. This can be especially useful for debugging or troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

[Command line] -a meaning

A

In the context of command-line parameters and options, the “-a” typically stands for “all” or “append” depending on the specific command or program you are using.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

NTP and Chrony

A

Chrony is an open-source computer program and network time protocol (NTP) client and server used to synchronize the system clocks of computers in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

From W32Time, command to resync NTP

A

w32tm /resync /force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Explain w32tm /resync /force

A
  1. w32tm: This is the Windows Time service command-line tool used for configuring and monitoring time-related settings.
  2. /resync: This option instructs the Windows Time service to initiate a time synchronization attempt with its configured time source. It contacts the time source and adjusts the system clock if necessary to bring it into alignment with the time source.
  3. /force: This option is used to force an immediate synchronization, bypassing the normal synchronization schedule. It ensures that the synchronization process occurs as soon as the command is executed.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

PDC

A

Primary domain controller

The concept of the Primary Domain Controller (PDC) was significant in older versions of Windows, especially Windows NT, where it played a central role in user authentication and directory services. However, with the introduction of Active Directory in Windows 2000 and later versions, the role of the PDC evolved into the PDC Emulator FSMO role, and the multi-master replication model eliminated the need for a single, dedicated PDC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Query and display the source from which the Windows Time service (W32Time) is currently synchronizing the system clock.

A

w32tm /query /source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Explain w32tm /query /source

A

When you run this command, you will receive output indicating the source of time synchronization, which can include:

•	An NTP (Network Time Protocol) server address or domain name, indicating that the system is synchronizing its time with an NTP server.
•	The name of a hardware time source or **reference clock** if the system is using a hardware-based timekeeping source.
•	“Local CMOS Clock,” which means the system is using its own hardware clock (CMOS clock) as the time source.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Check where DC01 is getting its time from [4]

A
  • ESXi GUI
  • Remote into DC01
  • Windows Command Prompt
  • Query and display time source
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

NTP

A

Network Timing Protocol
OR
Naval Telecommunications Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Query and display time clients currently sync to W32Time

A

w32tm /query /clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

w32tm /query /clients

vs

w32tm /query /source

A
  1. w32tm /query /clients:
    • Purpose: This command is used to query and display information about the time clients that are currently synchronized with the local system acting as a time server.
    • Use Case: This command is helpful when you want to identify devices or systems in your network that depend on the local system for time synchronization. It helps you monitor which clients are synchronized with the local time server.
  2. w32tm /query /source:
    • Purpose: This command is used to query and display information about the current time synchronization source from which the local system is obtaining its time.
    • Use Case: This command is useful for verifying where the local system is obtaining its time updates from. It helps you ensure that the system is correctly configured to synchronize with a reliable time source, such as an NTP server.

In summary, “w32tm /query /clients” provides information about the clients synchronized with the local system, while “w32tm /query /source” informs you about the source from which the local system is synchronizing its time. They serve different monitoring and diagnostic purposes in managing time synchronization in a Windows environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

LMF

A

Language and Media Format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

NTP 3 (J)

A

The purpose of Naval Telecommunications Procedures (NTP) 3, TELECOMMUNICATIONS USER MANUAL, is to provide procedures governing preparation and electronic delivery of organizational naval messages using the Naval Computer and Telecommunications System (NCTS).

NTP 3 is applicable to U.S. Navy, Marine Corps, and Coast Guard activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

NTP 4 (E)
Who developed it ?

A

This document was developed through a collaborative effort with Fleet, Numbered Fleet, Type Commanders, and other components of the Naval Netwar Forcenet Enterprise (NNFE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

JANAP 128 applies to what system?

A

This publication prescribes the operating procedures and practices applicable to the Defense Communications System (DCS) Automatic Digital Network (AUTODIN), and to other US record communications networks as specifically authorized by respective controlling authorities.

JANAP 128, also known as Joint Army-Navy-Air Force Publication 128, is a set of regulations and procedures for the handling and reporting of naval and maritime incidents, events, and encounters. JANAP 128 provides guidance for standardizing the collection and reporting of data related to naval and aerial encounters, including those involving foreign military forces or other maritime activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Difference between w32tm and chronyc

A

You would use “chronyc -a sources -v” on Linux systems (YUM) with Chrony for time source information, and “w32tm /query /source” on Windows systems to check the time synchronization source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

(LINUX) If you want to obtain information about a specific NTP source, you would use the sourcestats command followed by the name or IP address of the specific source, like this:

A

chronyc sourcestats
(less than)source_name_or_ip (greater than)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What is C4l in the Navy?

A

Navy Command, Control, Communications, Computers and Intelligence (C4I) consists of policies, procedures, and systems that allow the Navy to conduct command and control using computer systems that are interconnected via different communications links for the purpose of sharing operational intelligence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Shut Down Steps [7]

A
  1. Log into ESXi GUI (244)
  2. Shut down all but last 7, 5 by 5
  3. Shut down last 7
  4. Power Off Host (click on shutdown button)
  5. Power Off NAS system > service tasks > shutdown & storage system Execute > Switches Routers
  6. Power off UPSs
  7. Power off tac lanes

Same for SIPR and NIPR

Last seven: FS01 SQ01 EX02 EX01 DC02 YUM DC01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Set up static IP for printer [5]

A
  • Go to production plan
    (Top of column: Default gateway)
  • Scroll to DNS Servers DC01 DC02
  • Note Hostname & IPv4 (default gateway)
    (In printer)
  • Login > admin > 1111 > Device down > connectivity > Ethernet
  • IPv4 (Enter from production plan)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Add printer to server [3]
- server
- program
- navigate

A
  • FS01
  • Print management Windows key + R printmanagement.msc
  • Action > Add printer > TCP/IP > Auto detect > IP address > Printer/Share Name Name > from Production Plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

NGCN (CIC)

A

CASREP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

EX01 EX02

A

Exchange Service (email)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

DC01 DC02

A

Group Policy Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

VLAN Clients Port

A

182

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

Troubleshoot RSUPMAST [3]

A

NTCSS
Clear login
Reset server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Watch turnover items [9]
Turnover Sheet Checklist

A
  1. Clean Space/ Trash
  2. Inventory
  3. Visitor Log
  4. Print (12 o clock Muster)
  5. 701 Active Security Checklist 702 safe open close
  6. (Pass down) Ongoing Issues/ trouble tickets
  7. Upcoming events
  8. Message log/ Message Traffic Public Folder
  9. MSL (Master Station Log) EKMS: keys to load/ destroy
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

How often taclane supersedes

A

Every 30 days

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Who has to be notified about new month

A

KOAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Who gives the keys to the operators

A

KOAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

KOAM

A

KMI (Key Management Infrastructure) Operating Account Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

When to load tac lane keys

A

2 days before end of month
They roll automatically
If not IP services lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Flooding

A

Prioritize getting out

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What is VCSA in VMware

A

VMware vCenter Server Appliance

Preconfigured Virtual Appliance provided by VMware that runs vCenter Server central management software for VMware vSphere environments Linux based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

MSL
- Signing
- Beginning of
- Turnover time
- End of

A

Master Station Log
- CHOPS: initials
- 000Z BORD
- 1100Z Turnover
- 2359Z EORD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

XORD

A

Of Ray Day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

4 letters that include all the VMs

A

VCSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

First thing in case of fire

A

Set Alarm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Provisioning

A

install “factory” image

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

VM for home page

A

WEB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

FQDN

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

YUM

A

Time Server from NOC (Network Operation Center)
DC01 pulls time from YUM
and disperses it to everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

NTCSS

A

Navy Tactical Command Support System

Assists in managing logistics, maintenance, supply chain operations, personnel financial aspects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

If NTCSS (radm) is not working [3]

A

Check user log, clear, reboot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Crypto device for IP Services

A

KG-175D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

SITREP

A

Situational report: behavioral, DUI, suicidal.
Doesn’t get “push”‘d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Name of folder for messages that will be sent & how to upload

A

Public folder > Message Release

Save
..CC DIV > Message Release> Year Month

Import
OIX > batch import > browse > upload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Troubleshoot email

Services
Tool
Application
CLI

A

Check if it is internal or external
1 - Services: microsoft exchange “Running”
2 - Exchange toolbox
– 0s across the board
3 - Exchange admin center
– Servers > database > status: “mounted”
4 - Exchange Management Shell
– Test-EdgeSynchronization
Sync Status: Normal

Restart Server?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

CWO email inbox to what public folder at turn over?

A

LASSEN’s MESSAGE TRAFFIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

SF 702

A

The Standard Form (SF) 702 Security Container Check Sheet provides a record of the names and times that persons have opened, closed and checked a particular container that holds classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

What is EKMS?

A

Electronic Key Management System

An interoperable collection of systems that automate the planning, ordering, generating, distributing, storing, filling, using, and destroying of electronic key and management of other types of COMSEC material. See key management infrastructure (KMI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

KMI

A

Key Management Infrastructure

The framework and services that provide the generation, production, storage, protection, distribution, control, tracking, and destruction for all cryptographic keying material, symmetric keys as well as public keys and public key certificates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

SF 701

A

The SF 701 Form, also known as the Activity Security Checklist, is a document used by various organizations, particularly government agencies and branches of the military, to ensure that all security measures have been appropriately taken at the end of the day or shift.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

MSL in only in what network

A

SIPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

CANES

A

Consolidated Afloat Networks and Enterprise Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

ACAS SC01 Server

A

The ACAS SC01 server is comprised of the following software components: Nessus (NS), an active scanner and SecurityCenter (SC), which manages Nessus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Back Up Servers (BU01)

A

BU01 provides the enclave with backup and restore services via the Veeam application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

Veeam

A

Veeam Software is a US-based information technology company that develops software for backup, disaster recovery, and data protection. Veeam’s products are designed for virtual, cloud-native, SaaS, Kubernetes, and physical workloads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Chat Server (CS01)

A

CS01 provides collaboration service using OpenFire via Swift client, Skype for Business (SEC only), Sametime Connect (SR only) and Mako Chat (SEC and SCI)

Openfire is an open-source real-time collaboration (RTC) server based on the XMPP (Extensible Messaging and Presence Protocol) protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Sametime Connect

A

IBM Sametime Connect is a software that allows users to collaborate in real time through instant messaging. It offers a range of real-time collaboration services, including voice, data, and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Mako Chat

A

Mako Chat is a tactical chat solution developed by Asynchrony Hubzone LLC that meets the needs of the Naval Afloat user. It provides client and server technology that meets Information Assurance (IA) requirements. MakoChat is used in shipboard tactical environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

CM01

A

System Center Configuration Manager (SCCM) is hosted on Windows server CM01. SCCM provides a unified management console with an automated set of administrative tools to
1- Deploy software, protect data, monitor health, and enforce compliance across all devices.
2- Provides Windows Update Services (WSUS)
3- Desktop/laptop provisioning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

WSUS

A

WSUS is also known as Windows Server Update Services, and its first version is called Server Update Services (SUS). It helps distribute updates, fixes, and other types of releases available from Microsoft Update.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Collaboration at Sea (CAS)
Classification and server

A

The CAS (SEC) and CS01 (SR) servers provide ship-to-ship and ship-to-shore collaboration services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

CAS

A

A global collaborative application that uses the SIPRNET and Secret Releasable (SREL) CENTRIXS networks. It provides chat rooms, email, and standardized group websites. CAS is based on the IBM / Lotus collaboration toolset and is used by planning groups to support operations with coalition partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Domain Controllers

A

A domain is a set of network resources (computers, applications, printers, etc.) assigned to a specific group of users in a local network. An authorized user need only logon to the domain to gain access to these resources. The resources can be located on one or many servers and/or workstations throughout the network. The domain controller is a device that controls access to the domain and its resources. CANES networks have three domain controllers, DC01, DC02 and RODC. A domain controller is a server loaded with the Windows Server 2016 software and configured or assigned to perform the domain controller function. A server is assigned as domain controller during the process of loading the Windows Server 2016 operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

EM01/02

A

Systems Center Operations Manager (SCOM) is hosted on EM01 and EM02. SCOM is used for network management and monitors the health and performance of everything from servers to individual applications in Microsoft Windows environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

Exchange Server (EX01/EX02) [2]

A

Exchange servers, EX01 and EX02 provide email and calendaring services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

FS01

A

FS01 provides file and print services and hosts the Definitive Software Library, the Home drives and the Share drive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

IAEXET [6]

A
  • Server Information Assurance Exchange Edge Transport Server provides:
  • email edge transport
  • DHCP
  • endpoint protection (DAR, excluding SR)
  • Rivercity (email) services.
  • IAEXET also provides RADIUS for the SR enclave only.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

IM01/02

A

System Center Service Manager (SCSM) provides built-in processes for incident and problem resolution, change control, and asset lifecycle management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

IPSMGT

What enclaves?

A

Intrusion Prevention System

The purpose of IPSMGT is to detect and prevent malicious network activity in the UNC and SEC enclaves.

135
Q

ISE01/02

What does it provide for certain networks

A

Identity Services Engine (ISE) determines whether users are accessing the network on an authorized, policy-compliant device. It establishes user identity, location, and access history. ISE assigns services based on the assigned user role, group, and associated policy. ISE grants authenticated users access to specific segments of the network or specific applications and services, or both based on authentication results. ISE applies to the SEC and UNC enclaves only and provides RADIUS services to the network.

136
Q

MCA01

A

Server MCA01 (Tier 0) provides administrators with MS Active Directory tools required to administer to the domain and is the Management Certificate Authority server.

137
Q

MRDS01 and MRDS02 (Tier 1)

A

provide administrators with the access and tools required to manage server applications.

138
Q

Prime Infrastructural (PI)

A

PI is used to administer the wireless network.

139
Q

Public Key Infrastructure (PKI) Server
Provides [6]

A

The PKI server provides Public Key Infrastructure services for the UNC, SEC and SCI enclaves.

A Public Key Infrastructure (PKI) server is a component within a PKI that manages the generation, distribution, storage, and verification of digital keys and certificates. The PKI is a system that enables secure communication and authentication over a network, typically the internet.

Key components of a PKI server include:

  1. Certificate Authority (CA): The CA is a fundamental part of the PKI server. It issues digital certificates, which bind public keys to individuals or entities, thereby establishing the authenticity of the public key.
  2. Registration Authority (RA): The RA is responsible for authenticating users and entities before they are issued digital certificates by the CA. It acts as a verifier of the information provided during the certificate registration process.
  3. Certificate Repository: The PKI server often includes a repository for storing issued certificates. This allows entities to access and verify the authenticity of certificates.
  4. Key Generation and Storage: The PKI server generates key pairs (public and private keys) for users or devices. It securely stores private keys and distributes public keys as part of digital certificates.
  5. Certificate Revocation: The PKI server manages the revocation of certificates in case they are compromised or no longer valid. This is crucial for maintaining the security of the PKI.
  6. Certificate Revocation List (CRL): The CRL is a list maintained by the PKI server that contains information about certificates that have been revoked before their expiration date.

In summary, a PKI server plays a central role in establishing and maintaining the trust and security of digital communications by managing the lifecycle of digital certificates and keys within a public key infrastructure.

140
Q

Terminal Servers RDS01/02

A

RDS01 and RDS02 provide a workstation environment to the Trusted Thin Clients (TTC) in the UNC, SEC, and SR enclaves only.

141
Q

RODC

A

RODC is a read only domain controller can’t make edits or changed to server

142
Q

Host Based Security System (HBSS) Server (SADR01/02)

developed to do what for what system?
Advantage/ characteristic?

A

The CANES HBSS was developed to detect and prevent intrusion and exploitation of Department of the Navy (DoN) Information Systems (IS) with minimal configuration and administration from the fleet IT and Cyber security personnel.

143
Q

SAM/Security Information Event Monitoring (SIEM) Server

A

Server SAM and SIEM host the Sentinel application and is the CANES Security Incident and Event Management It is designed to aggregate log files and events from appliances, devices and operating systems with installed Sentinel agents and applications configured to forward their logs to the Sentinel Enterprise server. (SEIM take logs and SAM stores logs)

144
Q

SQL Server (SQ01)

A

CANES provides a Structured Query Language (SQL) Server hosting environment, SQ01, where hosted applications can create and use database and database-coded interfaces. SQ01 is a secured pre-hardened baseline environment, consisting of Microsoft SQL Server Management Studio. CANES deploys SQ01 host as dedicated database services for hosting POR Applications.

145
Q

VCSA

A

Virtualization services are provided by server VCSA
The vCenter Server Appliance is a preconfigured Linux virtual machine, which is optimized for running VMware vCenter Server® and the associated services on Linux.

146
Q

WEB

A

WEB provides remote desktop licensing, DHCP (UNC and SEC only), SharePoint (except SR), RADIUS (SR only) and Domino (SR only) services.

147
Q

WSAV

A

Cisco Web Security Appliance virtual

148
Q

Yellowdog Updater Modified (YUM) Server

A

YUM allows automatic updates, package and dependency management, on RPM-based distributions (Linux). YUM works with software repositories (collections of packages), which can be accessed locally or over a network connection. YUM also provides NTP services.

149
Q

CDSA
Only serves one enclave
via

A

The Cross Domain Solution Access (CDSA) server (SECRET only) provides cross domain access via Trusted Thin Clients (TTC) to all enclaves with the exception of SCI.

150
Q

Cross Domain Solution Guard (CDSG)

A

The CDSG servers provide the function of allowing appropriate information to be transferred between security domains while ensuring the transfer is controlled by the rules set up for the transfers.

151
Q

SABI
recides in what device?

A

Secret and Below Interoperability Server. The SABI in the Secret enclave resides on HP DL380 G10 (HP DL380 G9 for LHD 6 only) server. SABI provides NTP to the CANES SR and Secret networks from the authoritative timing source on the CANES Unclassified network.

152
Q

NAS system shutdown path

A

Service > Service Tasks > Shutdown storage system > Execute

Then switches and routers

153
Q

Commands to change port interface

A

config t
int gi x/x/x
do show run int gi x/x/x
switchport access vlan 184

vlan 184 printer and miscellaneous
“Do” bc you are inside config t

154
Q

Add printer in correct VLAN to FS01

A

In FS01
- Print Management
- Action
- Add printer
- TCP IP
- Auto detect
- IP Address
- Printer Name
- Share Name
- (Same as Production IP Plan)

155
Q

Find printer that is in network

A

Printer and Scanners
Select a shared printer by name \fs01 browse
Find w/ directory feature

156
Q

Exchange Management Shell command to verify sync status

A

Test -EdgeSynchronization

The command “Test-EdgeSynchronization” in Exchange Management Shell is used to verify the synchronization status between an Exchange Mailbox server and an Edge Transport server. This cmdlet helps ensure that the Edge Subscription, which establishes a secure communication channel between the Mailbox server and the Edge Transport server, is functioning properly.

Running this command checks for the synchronization status, and it’s commonly used for troubleshooting and monitoring purposes to confirm that the Edge Transport server is up to date with the configuration and changes made on the Mailbox server. If everything is in order, it should return information indicating successful synchronization.

157
Q

How to load key to SKL

A

1- Netman laptop
2- Connect to taclane
3- user: comp.installer
4- 172.16.0.1
5- Key management
6- PKK chain info
7- SSD PPK chain
8- enable SSO contra 1 al 9
9- go to SKL
10- click on key and load

158
Q

Lost message

A

Login OIX
Organizational messages
Quick search (DTG preferred)

159
Q

LDAP

A

LDAP, or Lightweight Directory Access Protocol, is a widely utilized application protocol for managing distributed directory information services. Key aspects include its focus on directory services:
- Hierarchical structure akin to a tree, client-server model
- Storage of information as attributes associated with entries
- Common uses in user authentication and authorization
- Robust security features.

LDAP is standardized through RFC documents, ensuring interoperability, and is a foundational technology in identity management, playing a vital role in organizing and accessing information in enterprise environments.

160
Q

Get comeback copy for lost message

A
  • Login OIX
  • Organizational messages
  • Quick search (DTG preferred)
  • fwd to self
161
Q

The distinction between tier 1 and tier 0 administrators

A

The distinction between tier 1 and tier 0 administrators can vary based on the specific organizational structure or context, but generally, the terms are associated with different levels of administrative access and responsibilities:

1.	Tier 1 Administrator:
•	Often considered entry-level or first-level support.
•	Handles basic user inquiries, troubleshooting, and routine tasks.
•	Typically works on straightforward issues and escalates more complex problems to higher-tier support.
•	Has limited access to critical systems and sensitive information.
2.	Tier 0 Administrator:
•	Usually represents the highest level of administrative access.
•	Has extensive privileges and responsibilities, often overseeing system architecture, security, and critical infrastructure.
•	Manages and configures core systems, networks, and security protocols.
•	Often involved in strategic decision-making regarding IT infrastructure and policies.
162
Q

IIS

A

Internet Information Services. Manageable Web server for hosting anything on the Web for Servers’ services. Requires credentials like an user.

163
Q

Other way to see back up status?

A

Mailbox folder “Backup”

164
Q

Last replication for TMIP

A
  • Remote into TMIP
  • Pass from note
  • Mirth
  • check for errors
165
Q

What is NSIPS

A

The Navy Standard Integrated Personnel System (NSIPS) is the Navy’s single, field-entry, electronic pay and personnel system for all USN/USNR Sailors. This web-enabled, Enterprise Resource Planning (ERP) system offers Sailors 24-hour access to their Electronic Service Record (ESR), training data, and career counseling records. NSIPS is available world-wide, both ashore and afloat.

166
Q

NSIPS server replica

A
  • From management laptop
  • NSIPS shortcut
167
Q

Obtain a device’s switch interface [8]

A
  1. Obtain mac address
  2. Utilize a management laptop.
  3. Connect the printer to the Ethernet network.
  4. Access PuTTy to interface with the network.
  5. Choose the BB router 101.
  6. Enter the username ‘tradorpuntored’.
  7. Log in to the switch’s IP address.
  8. Once logged in, use the command: ‘show mac address -table’ pipe the “include” 4 last digits of MAC address
168
Q

Load Key [10]

A
  1. Open NetMan laptop while connected to the TACLANE.
  2. Log in with the username ‘comp.installer’.
  3. Navigate to 172.16.0.10. (verify network connection if needed)
  4. Access key management.
  5. Select “PPK Chain Info.”
  6. Choose “SSD PPK Chain.”
  7. Enable Single Sign-On (SSO) (uno al nueve.)
  8. On SKL click key and load
  9. DS101 to DS101 & “ok” x2
  10. On laptop verify match and save
169
Q

Get YUM time source

A

chronyc -a sources -v

170
Q

comp.installer IP address

A

172.16.0.10

171
Q

The private IPv4 address ranges defined by RFC 1918 are:

A
  • 10.0.0.0 to 10.255.255.255 (10.0.0.0/8)
  • 172.16.0.0 to 172.31.255.255 (172.16.0.0/12)
  • 192.168.0.0 to 192.168.255.255 (192.168.0.0/16)
    It is commonly used for local area networks (LANs).
172
Q

What is 127.0.0.1

A

Loopback address commonly referred to as “local host” used to access a device’s own network services/

173
Q

ITPR

A

IT Procurement Request

174
Q

How do you verify NAS health? [5]

A
  • Storage
  • Pools
  • Barge Storage Pools Properties
  • View/edit
  • Drives
175
Q

At turn on will assign a new IP address

A

Dynamic Host Configuration Protocol (DHCP) is a network protocol that automatically assigns IP addresses and other network configuration information to devices on a network, facilitating efficient and automated network setup.

176
Q

IIS manager

A

IIS Manager is a tool that helps manage web servers. It provides access to configuration settings, user data, membership, and runtime diagnostic information.
IIS Manager also has a Remote Administration feature that allows users to manage sites and web server features through the same user interface.

177
Q

ipconfig /all
and 3 of the things it gives you

A

“ipconfig /all” is a Windows command that displays detailed information about a computer’s network configurations, including IP address, subnet mask, gateway, DNS servers, and more.

178
Q

What if a virtual machine has a banner that reads “patching OU” [6]

A
  • DC01 Active Directory
  • Staging
  • Patching
  • Move to CANES users and computers
  • CANES member servers
  • Choose a server
    SQL to Exchange
    IAEXET to EX01 or EX02
179
Q

ISE

A

Identity Service Endpoint: entry security

The Identity Service Endpoint is a specific URL or address where authentication and identity-related services are provided, allowing systems or applications to verify and manage user identities.

180
Q

EM01 holds what application

A

SCOM performance monitoring (System Center Operations Manager)

181
Q

vlan 999

A

In a black hole VLAN setup, any device or port associated with that VLAN will not forward traffic to any other devices or networks. Instead, all incoming traffic to the black hole VLAN is silently discarded. This can be a security measure to contain or isolate potentially malicious or unwanted traffic.

182
Q

chronyc -a sources -v

A

Used to display detailed information about the sources (servers) synchronized with the Chrony time synchronization service, including additional verbose details.

183
Q

PuTTy login

A

trador punto red

184
Q

Command after patching a server

A

gpupdate /force

185
Q

What to start before EX01/02 services

A

IAEXET

186
Q

Muster Report

A
  • NTCSS Desktop Client
  • RADM
  • Absences
  • Muster Management
  • CS CC
  • DD MMM YYYY time
  • Fill mustering PO and Officer
187
Q

TPI for what keys in SKL

A

Two Person Integrity for Top Secret only

188
Q

Where do you put “USS LASSEN” to get comeback copy

A

Before first break

189
Q

What is CM01 for

A

Updates through WSUS

190
Q

What will client computers have to do once a service is restored

A

Restart

191
Q

What is a comeback copy message and what to do with it

A

OIX receipt, print, sign and remove previous day in folder

192
Q

Where can you find the Barge LAN power off procedure

A

Data (F:) on management computer, netman

193
Q

Message precedence and times

A

R P O Z 6h 3h 30m 10m

194
Q

What is YUM
|relation to SIPR

A

Timer server that pulls from the NOC. DC01 pulls time from YUM and disperses to NIPR. SABI pulls to secret YUM.

195
Q

Times for signing material condition

A

0615
1615

196
Q

Flooding

A

Prioritize getting out

197
Q

When to load taclane keys

A

2 days before end of month. They roll automatically. Failure will result in IP services lost.

198
Q

Who gives the keys to load to the operator?

A

KOAM

199
Q

Who must know about new month?

A

KOAM

200
Q

-Personal For-

A

Commander message. Forward to CO, be succinct. Put in “personal for” folder, not for Lassen Traffic.

201
Q

To check backups

A

BU01 -> VEAM -> backup & replication -> last 24 hrs -> look for “success” / (part of cyber report)

202
Q

In what F/L can you find precedence levels

A

F/L 2 & F/L 5 (w/DTG)

203
Q

“Push” message traffic

A

Move mail from CWO email inbox to Lassen’s message traffic, public folder
At least every hour.

204
Q

RSUPMAST basic troubleshooting

A

Reset server, clear login (NTCSS)

205
Q

VCSA in VMware

A

vCenter Server Appliance (VCSA) serves as a centralized management platform for VMware virtualized environments, allowing users to administer and control multiple ESXi hosts and their virtual machines. It includes features like resource management, performance monitoring, and centralized deployment. VCSA is a more streamlined and scalable alternative to the traditional Windows-based vCenter Server.
VCSA is optimized for running VMware vCenter Server® and the associated services on Linux.

206
Q

Taclane GUI address

A

172.16.0.1

207
Q

Releasing authority for messages

A

Department Head and above
For CASREPS, only CO

208
Q

7 Layers of OSI Model

A

1- Physical
2- Data Link
3- Network
4- Transport
5- Session
6- Presentation
7- Application

209
Q
  1. Physical Layer
A

The physical layer is responsible for the physical cable or wireless connection between network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of the raw data, which is simply a series of 0s and 1s, while taking care of bit rate control.

210
Q
  1. Data Link Layer
A

The data link layer establishes and terminates a connection between two physically-connected nodes on a network. It breaks up packets into frames and sends them from source to destination. This layer is composed of two parts—Logical Link Control (LLC), which identifies network protocols, performs error checking and synchronizes frames, and Media Access Control (MAC) which uses MAC addresses to connect devices and define permissions to transmit and receive data.

211
Q
  1. Network Layer
A

The network layer has two main functions. One is breaking up segments into network packets, and reassembling the packets on the receiving end. The other is routing packets by discovering the best path across a physical network. The network layer uses network addresses (typically Internet Protocol addresses) to route packets to a destination node.

212
Q
  1. Transport Layer
A

The transport layer takes data transferred in the session layer and breaks it into “segments” on the transmitting end. It is responsible for reassembling the segments on the receiving end, turning it back into data that can be used by the session layer. The transport layer carries out flow control, sending data at a rate that matches the connection speed of the receiving device, and error control, checking if data was received incorrectly and if not, requesting it again.

213
Q

5th Layer (OSI model)

A

The session layer creates communication channels, called sessions, between devices. It is responsible for opening sessions, ensuring they remain open and functional while data is being transferred, and closing them when communication ends. The session layer can also set checkpoints during a data transfer—if the session is interrupted, devices can resume data transfer from the last checkpoint.

214
Q
  1. Presentation Layer
A

The presentation layer prepares data for the application layer. It defines how two devices should encode, encrypt, and compress data so it is received correctly on the other end. The presentation layer takes any data transmitted by the application layer and prepares it for transmission over the session layer.

215
Q
  1. Application Layer [5 examples]
A

The application layer is used by end-user software such as web browsers and email clients. It provides protocols that allow software to send and receive information and present meaningful data to users. A few examples of application layer protocols are the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer Protocol (SMTP), and Domain Name System (DNS).

216
Q

Steps for Fire [6]

A
  • Fire Alarm
  • Power Panel Off (external if necessary)
  • Try CO2
  • Get SKL & Inventory
  • Lock safe and vault
  • Log visitors
217
Q

WSUS Server

A

CM01 Windows Server Update Services.

218
Q

Verify antivirus update

A

Up arrowhead > McAfee > Endpoint Security > up arrowhead > about > AmCore date

219
Q

Inventory equipment

A

Taclanes and keys, SKL and key

220
Q

Application for WSUS

A

SCCM (System Center Configuration Manager) adds value to the WSUS product with the addition of features like remote control of devices and active monitoring. It relies on WSUS to run as a foundation and execute necessary patching, and provides extended features for users

221
Q

Contents of the MSL excel [4]

A
  • MSL
  • Messages involving the Lassen
  • Turn over process
  • References
222
Q

If certificate not in Intermediate Certificator

A
  • Right click
  • All tasks
  • Import
  • CC DIV/ 1.Certs
  • click click click
223
Q

Open as admin Powershell
mmc.exe -s
file

A

aa/ remove s
certificate
computer account
Intermediate
Certificate
gpupdate /force
CC Div /cub
CND-OSE

224
Q

Command to force synchronization between EX01 EX02 & IAEXET

A

Start-EdgeSynchronization -Force

225
Q

Checking if mail is flowing between servers

A

Test-Mailflow

226
Q

Cyber Awareness location

A

\Shareserver1\Share\FY-24 Cyber Awareness

227
Q

ESXi Events

A

Hosts > Monitor > Events (tabs)

228
Q

Where to find PLAD list?

A

\Shareserver1\Share\3. COMBAT SYSTEMS\CC DIV\Message Release

229
Q

After the first BT

A

UNCLAS
C O N F I D E N T I A L
SECRET
TOP SECRET

230
Q

Low and High side

A

Low Side = NIPR
High Side = SIPR

231
Q

Map a server

A

On file explorer, right click, map
\server_name\share

232
Q

F/L 5

A

DTG

P DDXXXX MMMYY

  • P precedence
  • D day of month
  • X zulu time
  • Z zulu
  • M month
  • Y year
233
Q

EFTO

A

Encrypt for Transmission Only

234
Q

ZNR ZNY

A

ZNR UUUUU —For off-line encrypted messagesand classified messages transmitted in the clear

ZNY EEEEE —For unclassified EFTO messages

ZNY, followed by CCCCC, SSSSS, or TTTTT —For Confidential, Secret, or Top Secretmessages, respectively.

235
Q

F/L 4

A

ZNR UUUUU
ZNY CCCCC

236
Q

Troubleshoot CAC not being detected

A

Check Cisco AnyConnect widget
in the up arrowhead

Switch from SmartCardEAP to EAP chaining

237
Q

What is the difference between Exchange Management Shell and Exchange Admin Center?

A

Exchange Management Shell is a command-line interface focused on automation and advanced administrative tasks, while Exchange Admin Center is a web-based graphical interface designed for simplified management and ease of use.

238
Q

Restore deleted files

4 steps

A

In BU01
- VEAM backup and replication
- Inventory
- Virtual Infrastructure
- Standalone Hosts

Up to 3 days ago

239
Q

Superseded less often than monthly

A

Firefly Vector Set
Modern Key

Superseded every 13 months

Firefly is a U.S. National Security Agency public-key key exchange protocol, used in EKMS, the STU-III secure telephone, and several other U.S. cryptographic systems.

240
Q

Firefly

A

U.S. National Security Agency public-key key exchange protocol, used in EKMS, the STU-III secure telephone, and several other U.S. cryptographic systems.

241
Q

What are some POR

SQ01

A

AWN: submit jobs
Sked: submit maintenace

242
Q

Rack of routers and taclanes

A
243
Q

What server encrypts within the network?

A

IAEXET with the application Symantec

244
Q

Functions of IAEXET [3]

A
  • Transport email
  • DHCP
  • Symantec
245
Q

Trouble ticket folder file path

A
  1. COMBAT SYSTEMS\CC DIV\2 CYBER\00. 2024 Cyber\5. Trouble Ticket Log
246
Q

How do UPS transfer power

A

Left to right and the up the NAS (auto powering it on)

247
Q

From Switch to Pier Box

A

Switch > Firewall > PT router ADNS > Taclane > CT Router ADNS > Pier Box

248
Q

Command that analyzes the state of domain controllers (DC) in a forest or enterprise and reports any problems to help in troubleshooting.

Frequently used with NTP servers

A

DCDiag.exe

249
Q

How to replicate servers [2]

A
  • DC01
  • Active Directory Site & services
  • “Default first site name”
  • from left menu NTDS Setting
  • replicate now
  • DC01 & DC02
    ~~~

~~~
- command line as admin
- repadmin /syncall
- repadm /repull

250
Q

What is a proxy server?

A

A proxy server is a system or router that provides a gateway between users and the internet. Therefore, it helps prevent cyber attackers from entering a private network. It is a server, referred to as an “intermediary” because it goes between end-users and the web pages they visit online.

251
Q

Microsoft Exchange Transport provides [2]

A

MSExchangeTransport
Provides SMTP server and transport stack.

252
Q

SMTP server

A

An SMTP server, which stands for Simple Mail Transfer Protocol server, is a software application that handles the sending, receiving, and routing of email messages over a network.

253
Q

The transport stack

A

The transport stack, also known as the network protocol stack, refers to a set of protocols and layers that work together to enable communication between devices over a network. It provides a standardized framework for transmitting data between different systems. The transport stack typically includes protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), which handle the reliable and unreliable delivery of data packets, respectively.
The transport stack, also known as the network protocol stack, refers to a set of protocols and layers that work together to enable communication between devices over a network. It provides a standardized framework for transmitting data between different systems. The transport stack typically includes protocols such as TCP (Transmission Control Protocol) and UDP (User Datagram Protocol), which handle the reliable and unreliable delivery of data packets, respectively.

254
Q

What is a bad result for w32tm /query /source
What do you want to see instead?

A

bad: local CMOS
good: NTP,0X1

255
Q

local CMOS

A

(Complementary Metal-Oxide-Semiconductor). The local CMOS refers to a small portion of memory on a computer’s motherboard that stores the system’s hardware configuration settings, including the date and time

256
Q

About how long does each light last in the UPS?

A

15-20 minutes

257
Q

What level of RAID is ESXi?

A

RAID 5: RAID 5 consists of block-level striping with distributed parity. Unlike in RAID 4, parity information is distributed among the drives. It requires that all drives but one be present to operate. Upon failure of a single drive, subsequent reads can be calculated from the distributed parity such that no data is lost.[5] RAID 5 requires at least three disks

258
Q

How long does NAS take to come up?

A

40 minutes

259
Q

Where to find Local USB error

A

DLP (Data Loss Prevention) Endpoint Console (McAfee) delivers unrivaled protection against theft and accidental disclosure of confidential data. This protection works across networks, through applications, and through removable storage devices.

260
Q

VLAN for navy cash, SCI, SSIL

A

VLAN 161

261
Q

Management of priviledges for laptops VLAN

A

VLAN 180

262
Q

Telephone internet
(VoIP) VLAN

A

VLAN 183

263
Q

VoIP

A

Voice over Internet Protocol (VoIP) integrates voice and vieo communications over the internet.

264
Q

Miscellaneous Printer VLAN

A

VLAN 184

265
Q

Provisioning VLAN

A

VLAN 198

266
Q

Clients VLAN

A

VLAN 182

267
Q

Domain name for 205.68.246.244

A

https://vcsa.ddg82.navy.mil

268
Q

SOPA watch bill comes out when

A

Tuesday every week

269
Q

Process to turn SKL on

A
  • Press power on button
  • Login
270
Q

The transmitter must generate a _____ of sufficient _____ at the desired _____

A

The transmitter must generate a radio frequency signal of sufficient power at the desired frequency

271
Q

SERMC

A

Southeast Regional Maintenance Center (SERMC)

272
Q

Command used to retrieve information about the digital certificates that are installed on an Exchange server.

A

The “Get-ExchangeCertificate” is a PowerShell cmdlet used in Microsoft Exchange Server.

273
Q

Provides the primary functions of proxying the web browser, implementing the Operation Security Condition (OPSECON) rule set, blocking unauthorized applications’ client-server reach-back communications (phoning home), and monitoring internal applications that use ports 80 and 443, and other ports, for other-than HTTP and HTTPS protocols.

A

Cisco Web Security Appliance virtual (WSAV)

274
Q

The CANES app and server that was developed to detect and prevent intrusion and exploitation of Department of the Navy (DoN) Information Systems (IS) with minimal configuration and administration from the fleet IT and Cyber security personnel.

A

Host Based Security System (HBSS) Server (SADR01/02)

275
Q

A server model produced by Hewlett Packard Enterprise. It’s part of the
ProLiant DL (rack-optimized) series and is designed for various data center workloads. Its name indicates it’s the 10th generation of this server model. It is known for its performance, security, and flexibility, making it suitable for a range of applications in enterprise environments.

A

The DL380 G10 refers to the HPE ProLiant DL380 Gen10

HPE Hewlett Packard Enterprise

276
Q

WSAV provides the primary functions of

A

proxying the web browser, implementing the Operation Security Condition (OPSECON) rule set, blocking unauthorized applications’ client-server reach-back communications (phoning home), and monitoring internal applications that use ports 80 and 443, and other ports, for other-than HTTP and HTTPS protocols.

277
Q

What is a VMware virtualized environment?

A

A VMware virtualized environment utilizes VMware virtualization technology to create and manage virtual machines (VMs) on physical hardware, enabling multiple instances on a single server. VMware tools like ESXi and vCenter Server facilitate VM creation, management, and monitoring. This approach enhances resource utilization, flexibility, and scalability by allowing independent operation of multiple operating systems and applications on a single physical machine.

278
Q

Two Hypervisor types with VMware

A
  1. Bare-Metal Hypervisor (Type 1 Hypervisor): In a bare-metal deployment, VMware ESXi is installed directly on the physical hardware without the need for a host operating system. This type of hypervisor is often preferred for production environments, as it provides better performance and resource utilization.
  2. Hosted Hypervisor (Type 2 Hypervisor): Alternatively, VMware Workstation or Fusion, which are Type 2 hypervisors, can be installed on top of an existing operating system (host OS). This approach is common for development, testing, or desktop virtualization scenarios.
279
Q

Model produced by Hewlett Packard Enterprise (HPE). It is part of the ProLiant DL (rack-optimized) series and represents the 9th generation of this server model.

For ______ only

A

HP DL380 G9 for LHD 6 only

280
Q

ESXi
Type?

A

ESXi stands for “Elastic Sky X Integrated.” However, it’s more commonly referred to as “ESXi,” and it is the hypervisor developed by VMware for its virtualization platform. ESXi is a type-1 hypervisor, meaning it runs directly on the bare-metal hardware without the need for an underlying operating system.

281
Q

RADIUS [3]

A

RADIUS stands for “Remote Authentication Dial-In User Service.”

RADIUS services provide centralized authentication, authorization, and accounting for network access control, ensuring secure and managed user interactions within a network.

282
Q

Microsoft System Center: This is a _____ __ __________ _____ that includes various components such as …

A

Microsoft System Center: This is a suite of management tools that includes various components such as SCCM, System Center Operations Manager (SCOM), System Center Virtual Machine Manager (SCVMM), and more.

283
Q

It is a Windows command that displays detailed information about a computer’s network configurations, including IP address, subnet mask, gateway, DNS servers, and more.

A

ipconfig /all

284
Q

The focus of NTP-4 Echo

A

(Naval Communications) is to provide a basic manual addressing C4I concepts and capabilities in the U.S. Navy.

285
Q

Prescribes the minimum policies for
issuing, accounting, handling, safeguarding, and disposing of
COMSEC (Communications Security) material; more specialized, focusing specifically on electronic key management.

A

EKMS-1E

286
Q

Prescribes the minimum policies for accounting, disposing, handling,
issuing, and safeguarding of COMSEC (Communications Security) material; has a broader scope, including centralized materiel services with key management being just one component of its coverage.

A

CMS-1A

287
Q

EKMS-1E

A

Prescribes the minimum policies for
issuing, accounting, handling, safeguarding, and disposing of
COMSEC (Communications Security) material; more specialized, focusing specifically on electronic key management.

288
Q

CMS-1A

A

Prescribes the minimum policies for accounting, disposing, handling,issuing, and safeguarding of COMSEC (Communications Security) material; has a broader scope, including centralized materiel services with key management being just one component of its coverage.

289
Q

From what server does Exchange Server PowerShell (Exchange Management Shell) has to be ran?

A

EX01 or EX02

290
Q

Name of Exchange CLI

A

Exchange Server PowerShell (Exchange Management Shell)

291
Q

Command to see ipconfig of a specific device within current interface

A

show mac address-table | include xxxx
recommended xxxx = last four of mac address

292
Q

This command sequence enters the interface configuration mode for the GigabitEthernet interface specified by “x/x/x” and then displays the running configuration for that interface.

A

int gi x/x/x
do show run int gi x/x/x

293
Q

What is email edge transportation?

A

“Email edge transportation” typically refers to the process of transporting email messages between different network boundaries or edges, often involving email security measures at the network perimeter. It may include tasks like filtering, scanning for malware, and controlling the flow of emails entering or leaving a network.

294
Q

Help desk for Navy ITs email

A

navy311@navy.mil

Specify the extent of the damage, impacted users, and include as many relevant details as possible.

295
Q

What permissions to give when creating RADM account?

A

After filling all details on the right,
(Confidentiality = unclassified)

radm and r-supply: all users

296
Q

What permissions are not given to all users when creating radm account and why?

A

RADM (only ITs)
OMSNG (not used)

297
Q

Confirms power is stable

A

CSOW / CDO

298
Q

It provides an approximation the calculated time when normal functionality will be restored.

A

Estimated Time of Restoration (ETR) is an estimation indicating when a service or system is expected to be fully operational after an outage or disruption.

299
Q

File path to IETM

A

S:\3. COMBAT SYSTEMS\CC DIV\CANES\CANES_SW3_R4_IETM\N6600100592

Open with Chrome

300
Q

COMSEC MATERIAL REPORT

A

SF153

301
Q

It is used by federal government agencies to report destruction, hand receipt, transfer, inventory and other transactions.

A

Standard Form 153 (SF-153) is a COMSEC Material Report

302
Q

CMS-25

A

Local key destruction

303
Q

Command to use if w32tm /resync fails

A

w32tm /config /syncfromflags:domheir

It sets the synchronization source flags to prioritize the domain hierarchy (domheir) for time synchronization. This means the system will synchronize its time with a domain controller in the domain hierarchy.

304
Q

YUM shell login

A

ra.scom.scx.mnt

305
Q

AMCROSS log

A

Advanced Routing Log

306
Q

Lassen’s OSRI

A

RHOVHJM

307
Q

Lassen’s DSRI

A

RUOIBBB

308
Q

SQ01 importance

A

SQL plays a pivotal role in managing and interacting with databases, making it indispensable in virtual server environments where data storage, retrieval, and integrity are critical aspects of operations.

309
Q

show ip ospf neighbor

A

The command “show ip ospf neighbor” is typically used in networking environments with OSPF (Open Shortest Path First) routing protocol. When executed on a router or networking device, this command displays information about the router IDs, state of the OSPF neighbors, the type of adjacency, and the communication status between routers participating in OSPF.

310
Q

OSPF
|& algorithm

A

Open Shortest Path First

Open Shortest Path First (OSPF) is a routing protocol used in computer networks to find the most efficient path for data packets as they traverse a network. It’s based on a link-state routing algorithm, where routers exchange information about their network connections and use this information to build a topology map. OSPF then calculates the shortest path to each destination, considering factors like link cost.

311
Q

link-state routing algorithm

A

In a link-state routing protocol, each router in the network maintains a detailed and up-to-date map of the entire network. This map includes information about the state of each link (connection) in the network.

312
Q

Login and Command to verify ADNS

A

tradorpuntored
venavy

show ip ospf neighbor

313
Q

Cisco command to verify IP

A

To verify IP information on a specific interface of a Cisco router, you can use the following command:

show ip interface <interface></interface>

Replace <interface> with the actual interface identifier, such as “GigabitEthernet0/0” or “FastEthernet1/0”. This command will provide detailed information about the specified interface, including its IP address, status, protocol, and other relevant details.</interface>

314
Q

This command will display details about all tunnel interfaces on the router

A

show interface tunnel

This command will display details about all tunnel interfaces on the router, including their numbers, IP configurations, and operational status. If you are looking for information about a specific tunnel, you may need to check the configuration or use additional commands specific to the type of tunnel, such as GRE or IPsec.

315
Q

Address for intranet nsips

A

https://nsipswebafloat.ddg82.navy.mil

316
Q

Servers that host SKED

A

PMS SKED Server
SQ01

317
Q

ATO definition

A

The Authorization to Operate (ATO) is crucial for the US Federal Government and the Department of Defense (DoD). It represents an official management decision granted by a senior organizational official. The ATO Cybersecurity decision authorizes the operation of an information system and explicitly acknowledges the associated risks to agency operations, assets, individuals, other organizations, and the nation.

318
Q

To know which key belongs to what enclave

A

Controlling Authority (CONAUTH) Message

319
Q

Clients can’t print post reboot

A

Start services in FS01
access print spooler service
1. Select Windows logo key + R to open Run.
2. Type: services. msc, and select OK.
3. Right-click Spooler.
4. Select Start.

320
Q

Tunnel 220

A

Taking IP services from shore

321
Q

Troubleshoot Exchange web-based option

A

Servers > database > status: “mounted”

Exchange Admin Center (EAC) is a web-based management console provided by Microsoft provides a user-friendly interface with different modules and tools to efficiently manage Exchange Server deployments. Allows administrators to manage mailboxes, configure email policies, monitor server health, and troubleshooting issues.

322
Q

Troubleshoot Exchange diagnostic tool option

A

0s across the board

Exchange Toolbox is a collection of diagnostic and troubleshooting tools. It is a separate application that can be installed on a server running Exchange Server includes various tools such as the Message Tracking tool, Mail Flow Troubleshooter, and Queue Viewer:
Mail flow, message tracking, database health, and other aspects of Exchange Server.

323
Q

Compare Exchange Admin Center with Exchange Management Console

A

EAC offers a more advanced and flexible management experience with a broader range of features, while EMC is limited to older versions of Exchange Server and has a more traditional interface. It is recommended to use EAC for managing newer versions of Exchange Server.

324
Q

Troubleshoot Exchange services option

A

From EX01 or EX02 computer management verify all automatically started services are running.

325
Q

Troubleshoot Exchange CLI option

A

The Exchange Management Shell is built on Windows PowerShell technology and provides a powerful command-line interface that enables the automation of Exchange administration tasks. You can use the Exchange Management Shell to manage every aspect of Exchange. For example, you can create email accounts, create Send connectors and Receive connectors, configure mailbox database properties, and manage distribution groups.

You can use the Exchange Management Shell to perform every task that’s available in the Exchange graphical management tools, plus things that you can’t do there (for example, bulk operations). In fact, when you do something in the Exchange admin center (EAC), the Exchange Control Panel (ECP), or the Exchange Management Console (EMC), it’s the Exchange Management Shell that does the work behind the scenes.

326
Q

ECP (Exchange)

A

Exchange Control Panel (ECP) provides a user-friendly interface accessible through a web browser, allowing users to access and modify their mailbox settings, such as changing passwords, setting up email forwarding, managing distribution groups, and configuring out-of-office messages.

327
Q

What is group policy?

A

Group Policy is a hierarchical infrastructure that allows a network administrator in charge of Microsoft’s Active Directory to implement specific configurations for users and computers. Group Policy is primarily a security tool, and can be used to apply security settings to users and computers.

328
Q

To resubscribe to transport server (IAEXET)

A

Remove-EdgeSubscription EdgeTransportServerIdentity

329
Q

What is Axway Validation Authority (VA) Suite?

A

Axway Validation Authority (VA) Suite is a comprehensive software solution designed to help organizations manage and automate the process of digital certificate lifecycle management for CAC and servers.

330
Q

OWA (email)

A

Outlook Web Access

331
Q

Services need to be check at start up [8]

A

a. Outlook (and send a test email from your phone to radio@ddg82.navy.mil)
b. Sked
c. RADM
d. Internet explorer
e. AWN
f. NSIPS
g. Share drive (While you’re at it print a test page)
h. Verify IP services

332
Q

One way to fix mfom

A

Restart DC01 (fix replication)

333
Q

Verify replication for
TMIP, NSIPS and Navy Cash

A
  • Navy Cash
    — It is verified only by DISVO
  • TMIP
    — MIRTH
  • NSIPS
    — Management computer
    — Remote launch NSIPS VM
    — Use shortcut “21956”