Book 3 Flashcards
Enlisted Information Warfare Specialist Command Specific (200 cards)
Active Directory Users and Computers Definition
stores users and accounts
Certificates Definition
Used with CAC, allows access to certain sites
Event Viewer Definition
Monitor events on local computer such as logon, open applications, etc
Computer Management Definition
Create local user, groups look at logs, shared folders
Security Templates Definition
Security templates provide standard security settings to use as a model for your security policies. They help you troubleshoot computers whose security policies are not in compliance with policy or are unknown. Security templates are inactive until imported into a Group Policy object or the Security Configuration and Analysis snap-in to MMC.
IP Security Policies Definition
Internet Protocol Security (IPSec) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. IPSec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality (encryption), and replay protection. The Microsoft implementation of IPSec is based on standards developed by the Internet Engineering Task Force (IETF) IPSec working group.
Describe Group Policy in Active Directory. (FIX)
Exchange Server, “New Distro Group”, “Add Members” Security Group (settings, file access) vs. Distro Group (mailing list)
a. Group Policy Applications for security
b. Group Policy applications to local, global, and universal security groups
c. Recommended security structure for group policy design
d. Use of the “No Over-ride” option for group policy
Describe the importance of enforcing a strong password policy.
Given enough encrypted data, time, and computing power, attackers can compromise almost any cryptographic system. You can prevent such attackers from succeeding by making the task of cracking the password as difficult as possible. Two key strategies to accomplish this are to require users to set complex passwords and to require users to change their passwords periodically, so that attackers do not have sufficient time to crack the complex encryption code.
Complex Passwords
You should set password policy to require complex passwords, which contain a combination of uppercase and lowercase letters, numbers, and symbols, and are typically a minimum of seven characters long or more for all accounts, including administrative accounts, such as local administrator, domain administrator, and enterprise administrator.
Discuss the configuration of password policy through Group Policy, including, minimum password length, maximum password age, password history, length, minimum password age, and password complexity requirements.
NCDOC utilizes Active Directory Users and Computers (ADUC) which allows administrators to set the password policy for the entire command. NCDOC currently requires the use of 15 characters to include upper case, lower case, numbers and special characters.
Define “Account Lockout Policy”.
Stays locked until manually unlocked by Systems. Three incorrect tries and your password “locks out” your account.
Describe the issues surrounding an account lockout policy.
The main issue surrounding an account lockout policy is if your account is locked out after N61 working hours and you are deemed essential personnel, you will have to contact the BWC and have he or she call the duty I.T. to come in and unlock your account. If your account is locked out during working hours a coworker will have to submit a trouble ticket for you to have your account unlocked
Discuss the configuration account lockout policy through Group Policy, including lockout threshold, lockout duration, and bad password count reset interval.
- The configuration account lockout policy is automatically carried out by Group Policy. If you enter the wrong password in 3 times your account will automatically be locked out and require a technician to manually unlock it.
- Lockout threshold refers to the number of failed sign-in attempts that will cause a user account to be locked.
Lockout duration refers determines the number of minutes a locked-out account remains locked out before automatically becoming unlocked. The available range is from 0 minutes through 99,999 minutes. If you set the account lockout duration to 0, the account will be locked out until an administrator explicitly unlocks it.
Network redundancy
process through which additional or alternate instances of network devices, equipment and communication mediums are installed within network infrastructure. It is a method for ensuring network availability in case of a network device or path failure and unavailability. As such, it provides a means of network failover.
File Servers
In computing, a fileserver is a computer attached to a network that has the primary purpose of providing a location for shared disk access, i.e. shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations.
Exchange
Microsoft Exchange Server is a calendaring and mail server developed by Microsoft that runs exclusively on the Microsoft Windows Server product line
Domain controllers
On Microsoft Servers, a domain controller (DC) is a server that responds to security authentication requests (logging in, checking permissions, etc.) within a Windows domain. A domain is a concept introduced in Windows NT whereby a user may be granted access to a number of computer resources with the use of a single username and password combination.
Differential Backup:
Differential backups are completed nightly.
Incremental Backup:
Not completed at NCDOC.
Full Backup:
Weekly with the exception of SQL(Daily) and Exchange (2 times a week).
Network media used at NCDOC:
Fiber optic and the type of associated connectors:
Fiber optic for classified
SC Duplex (Standard Connector x 2), ST (Straight tip), LC Duplex (Lucent Connector x 2), MTRJ (Mechanical Transfer Register Jack)
Network media used at NCDOC:
Cat 6
Unclassified
Network media used at NCDOC:
RJ45
Used for phones. An 8-pin/8-position plug or jack that is commonly used to connect computers onto Ethernet-based local area networks (LAN). Two wiring schemes–T568A and T568B–are used to terminate the twisted-pair cable onto the connector interface. RJ45 is the medium often used for unclassified use.
What is the IEEE standard associated with PNAC?
802.1x