Cyber Operator Flashcards
(222 cards)
In order to execute a file in Linux the file must _____.
Be executable, contain executable code, and you must have permission to execute it
With a umask of 022, which of the following permissions are assigned when creating a new file?
rwxr-xr-x
In Linux this file is used to store hashed passwords and readable only by root.
shadow
This is a set of standards carrying out wireless local area networks.
IEEE 802.11
Which Windows 7 command can be used to perform a soft shutdown?
shutdown /s /f /t 00
A system that gathers and analyzes information from within a computer or a network, to identify
possible violations of security policy, including unauthorized access, as well as misuse is known as:
IDS
What is the default MIP2 firewall state prior to being connected to the network?
enabled and not allowing incoming connections
(U//FOUO) What are the three sub-missions of a Cyber Protection Team (CPT)?
Survey, Secure, Protect
Which Windows command can be used to configure the IP address either statically or to use Dynamic
Host Configuration Protocol (DHCP)?
netsh
(U//FOUO) Which document prioritizes and outlines the options and actions available, both technical
and procedural, to provide a greater level of mission assurance for the supported commander’s
mission through the consolidation of all squad recommendations?
Risk Mitigation Plan (RMP)
How can you stop a TCPdump capture?
Use Control-C
Which of the following is NOT contained in the CVA/Hunter Air Force Tactics, Techniques and
Procedures (AFTTP) 3-1?
Commercial Manuals
What is the purpose of crew logs?
To maintain an accurate and detailed record of all significant events
_____ focus primarily on qualitative analysis of ISR employment to determine ISR contribution to
mission objectives.
Measures of Effectiveness (MOE)
A program in which malicious or harmful code is contained inside apparently harmless programming
or data in such a way that it can get control and do its chosen form of damage is known as what?
Trojan
It is important to review _______________ during the sortie brief because it will affect the choice of
TTPs and the accomplishment of tactical tasks during sortie execution.
Intelligence Updates, Mission Partner Activity, Rules of Engagement, Crew and Mission Risks, All of the above
In Linux, how are trusted and target IP addresses added or removed?
By editing the /etc/trusted.hosts and /etc/target.hosts files
Techniques are __________.
Non-prescriptive ways or methods used to perform missions, functions or tasks
_____ focus on task execution and quantitative mission achievement.
Measures of Performance (MOP)
Which of the following is the Linux command for securely copying a file from a remote machine to
your home directory?
scp 10.10.20.100:/ios/data/assess/file.txt /home/usr/
Null sessions are __________.
an anonymous (no user, no password) connection to a freely accessible remote share called IPC$ on Windows-based servers.
Software applications that run automated tasks and can be remotely controlled, normally used in
DDoS are commonly referred to as what?
Bots
When validating DIP sensor processes what command verifies that the processes are running?
/usr/local/bin/checkstatus
What type of malware spreads from computer to computer and has the capability to travel without
any human action?
Worm