General NBT Flashcards

(72 cards)

1
Q

What is the purpose of Navy Blue Team?

A

Assess and evaluate the security posture of Navy networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Directive 527-1?

A

Guidance on INFOCON levels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Appendix 12 to Appendix C OPORD 05-01?

A

DOD INFOCON execution procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is DOD 8530-1?

A

Establishes CND certification and accreditation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SURFORREDMAN (COMNAVSURF PAC INST 3502.3)?

A

Dictates NBT assesments and CND guide for afloat units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What can be found on HTTS://SAILOR.NMCI.NAVY.MIL?

A

IAVA downloads, CND-OSE downloads, software patches, and baseline configs for ISNS/ADNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can be found on WWW.NCDOC.NAVY.SMIL.MIL?

A

Incident reports, FAMS, CTO’s, and DNS black hole list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can be found on INFOSEC.NAVY.MIL?

A

SIPRNET antivirus updates and VRAM link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can be found on WWW.CYBERCOM.SMIL.MIL?

A

INFOCON guidance and directives, CTO’s and CYBERCOM info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an IAVA?

A

Information Assurance Vulnerability Alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an IAVB?

A

Information Assurance Vulnerability Bulletin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an IAVT?

A

Information Assurance Vulnerability Technical Advisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a CTO?

A

Computer Tasking Order- Implements changes and dictates what can and cannot be done on networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the function of VRAM?

A

Assess and upload scans from scans from VRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is INFOCON?

A

The level of protection for information systems based on perceived or actual threats. Levels 1 (greatest) thru 5 (least).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NNWC

A

Naval Network Warfare Command. NETWARCOM Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

USCYBERCOM

A

Overall boss for anything cyber related. Phase 3 assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

USSTRATCOM

A

strategic operations. may impact cyber readiness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

NSA

A

all SIGINT operations. NSA/CSS threat operations center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

NCDOC

A

ISP and CND provider for the Navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ACERT

A

Army Cyber Emergency Readiness Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AFCERT

A

Air Force Cyber Emergency Readiness Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

NCIS

A

Investigates cybercrimes for the Navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

MCNOSC

A

Marine Corp NCDOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
USCYBERFOR
Tenant Command of 10th Fleet. Phase 2 Assessments.
26
10th Fleet
Navy Element of CYBERCOM. Does inspections.
27
Who is authorized to make changes to NON_POR equipment?
Ship's IT's
28
Who is authorized to modify POR equipment?
Only the programmer
29
What is the difference between Stage II and Stage III?
Stage II is completed by CYBERFOR. There is an assist and train report after assessment. Stage III is completed by CYBERCOM and is the final score.
30
Why do assessment laptops require their own OU in ADUC? What happens if this is not done correctly?
Blocks inheritance and prevents Compose from pushing data to the laptop
31
What is DNS traffic logging and why is it important during data analysis?
Shows possible beaconing to where and how often
32
What is port security? How does this affect Blue Team assessments?
Where a switch port is assigned to a specific MAC address or computer. If port security is on, the Blue Team laptop will not be able to connect to the ships domain.
33
Explain the relationship between the UNIX virtual machine and the windows host:
VM runs from Windows OS and allows for NMAP and Darkether scans. All collected data is held on windows C:/ drive
34
How do you enable the shared folder on the VM?
In VM -- VM settings -- options -- advanced options -- select always enable -- select the folder -- APPLY
35
What script is used to collect infrastructure device configurations?
Darkether_local
36
What script is used to organize all XML output files into Multi Verse upload folder?
Darkether_run
37
What is the purpose of NIPPER?
A tool to check configurations in Cisco IOS for vulnerabilities.
38
What command line is used to shutdown/restart a machine?
INIT 0 and INIT 6
39
What is Compose and how does it integrate with Windows and Active Directory?
SPAWAR specific software installed on top of windows
40
What does SQL stand for?
Structured Query Language
41
What is MySQL?
free program that interfaces with SQL databases
42
What is MSSQL?
program used by HBSS. Made by Microsoft.
43
What are the default security groups?
administrators, domain administrators, enterprise administrators, remote desktop users, and schema admins
44
What is the purpose of the "host diagnostics" scan and what is it composed of?
Used to see which hosts in active directory are live. Remote registry, ping, DNS resolve, WMI, and admin shares.
45
What is the difference between a Scan and a Payload?
Scan- network intensive, done with constant contact with host. Payload- sent to a host, collects all requested data, then sends the information back to the requester.
46
What are the important files created by the "NMAP_SCAN2.PL" scan?
XML port scans, device info, OS info
47
What is XREF?
Cross reference file
48
What is MULTIVERSE.JAR?
Java executable to launch multiverse
49
What is an XCCDF file?
STIG data and checks baseline security for compliance
50
Explain Windows user account scan?
Check for local user accounts on a windows host
51
Explain virus definitions scan?
Checks to see if the most recent virus definitions are installed
52
Explain windows software scan?
Checks which version of windows is installed
53
Explain RECENTITEMS scan?
Checks recent items directory on a windows host
54
What is Event Logs Plus?
Checks for event logs
55
Explain Windows running process scan?
Checks all running processes on a windows host
56
What is autorun enforcer?
Checks to see if auto runs are disabled
57
Explain Autoruns payload:
Checks if host automatically runs devices or programs
58
Explain XCCDF payload:
STIG checks and XREF scan
59
Explain computer identification payload:
Collects host name and OS version
60
Explain REGRAIDER payload:
Parses registry and collects specific registry keys
61
Explain file audit plus payload:
Collects files with specific extensions
62
Explain SNARF payload:
Collects MD5 hash values of files and checks for known goods
63
Explain wireless connections payloads:
checks a host for enabled wireless devices
64
Explain Handle payload:
collects handler information
65
Explain REGDUMP payload:
Collects a hosts registry
66
Explain LOGON status payload:
Checks current logons
67
Explain open ports plus:
Checks open ports on a host and processes
68
What payloads have to be executed in order to execute the cross-reference script?
CPE Name and XCCDF
69
What is the Navy Blue Team Report composed of?
Ships Info, Team Member, Team Member contact info, score, violations, findings, mitigations, supporting documents, and comments
70
What is Pythagoras?
The scoring criteria for blue team assessments
71
What is the difference between a finding and a poor security practice?
FINDING- violated a CTO or instruction | POOR SECURITY PRACTICE- doesn't violate any CTO or instruction but could be harmful to the network
72
What is SNARF?
Scan Network And Report Findings. Only scans system root and C: FOR HASHES. Looks for malicious software. References "knowns". Exe's and DLL's only.