Help Desk / Miscellaneous Flashcards

1
Q

Steps to create CANES account [4]

A
  1. User completes Cyber Awareness training
  2. User creates SAAR-N Form
  3. SAAR-N Form is signed by ISSO and ISSM
  4. MCA01 > Active Directory > Users and Computers > CANES Users > USA Users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SAAR-N

A

System Authorization Access Request Navy
To record names, signatures, and Social Security Numbers for the purpose of validating the trustworthiness of Individuals requesting access to Department of Defense (DoD) systems and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISSM & ISSO

A

ISSM stands for Information Systems Security Manager, while an ISSO stands for Information Systems Security Officer.

An ISSM is responsible for managing the overall security program for information systems within a military organization. Their role involves risk management, ensuring compliance with security regulations, coordinating security training, and conducting security assessments.

On the other hand, an ISSO is responsible for the day-to-day operational security of information systems. They work closely with the ISSM and are involved in tasks such as system administration, incident response, vulnerability management, and security monitoring. ISSOs ensure that security controls are properly implemented, maintained, and monitored to protect the organization’s information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Default when creating NTCSS account

Boxes to check
Username
Classification

A

All users (3) no NTCSS
6 first of last name + first initial + middle initial = 8
Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

See the CAC certs running

A
  • Up Arrowhead
  • Red Eagle (Axway)
  • CA specific (three green certs overlapping)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

See the inserted CAC’s certs

A
  • Up Arrowhead
  • Active Client (Blue Apple Watch icon)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exchange: Create custom folder

A
  • Rules
  • New Rule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enable/ Disable exchange account

A
  • EX01
  • Exchange Admin Center
  • Connectivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you find the most comprehensive manual of the network that doesn’t include software products?

A
  • Share Drive
  • /CC DIV
  • Search most current version: SW4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Add person to email Distro from what server

A

EX01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three servers to add user to a group

A

Create (security) group in DC01
Manage (security) group in FS02
Distros EX01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Server and Software to push software and patches

A

CM01: SCCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To clear space and or fix NTCSS not connecting to database

A
  • Search pathway in CC DIV regedit
  • Delete user from local C drive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Teletypewriter Formats

A

Teletypewriters, often abbreviated as TTY, come in several formats, but the three main formats commonly used are:

  1. Baudot Code (5-bit Teletype): This was one of the earliest formats used for teletypewriters and used a 5-bit binary code. It was limited in the characters it could represent and had a slower data transmission speed compared to later formats.
  2. ASCII (American Standard Code for Information Interchange): ASCII-based teletypewriters became prevalent as ASCII encoding became the standard for text and data representation in computing. These TTYs could transmit a wider range of characters and symbols, making them more versatile.
  3. EBCDIC (Extended Binary Coded Decimal Interchange Code): EBCDIC-based teletypewriters were used in some IBM systems and other mainframes. EBCDIC is a character encoding that uses 8 bits per character and was primarily used in large-scale computing environments.

ASCII-based TTYs became the most widely adopted due to the compatibility with emerging computer systems and the broader character set it supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In radio communications, a parasitic element refers to

A

an element in an antenna system that is not connected directly to the transmitter or receiver but plays a critical role in influencing the antenna’s radiation pattern and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAVPERSCOM

A

Navy Personnel Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CNDSP

A

Computer network defense service providers (CNDSP) commonly consist of a Computer Emergency Response Team or Incident Response and Recovery Team (IRRT) and are closely associated with Network Operations and Security Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are Echelons?

A

There are different echelons within the United States Navy, each responsible for specific functions. Typically refers to the levels of a hierarchical structure or command organization. The specific responsibilities can vary depending on the context, such as military or organizational structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is IDCRC?

A

Naval Information Force Reserve (NIFR), formerly Information Dominance Corps Reserve Command (IDCRC), provides timely and valued Naval Information Force capabilities (Meteorology & Oceanography, Information Operations, Networks, Cryptology/SIGINT, Intelligence & Space) from the Reserve Component to meet Fleet and Joint operational requirements. Commander, Naval Information Force Reserve (CNIFR) and Reserve Deputy Commander, Naval Information Forces (NAVIFOR), is RDML Greg Emery.
Echelon III.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is ONI?

A

The Office of Naval Intelligence is America’s premier maritime intelligence service and a core element of the U.S. Navy’s Information Warfare Community. ONI possesses unmatched knowledge of the maritime operating environment and delivers penetrating understanding of threats to America’s security to national decision makers and the Fleet. Established in 1882, ONI is the nation’s longest-serving intelligence agency. Echelon III.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ITPR

A

Information Technology Procurement Request (ITPR) process.

Any purchase of $25,000 or more (including Government Purchase Card purchases) or that is National Defense Authorization Act (NDAA) related does require an ITPR submitted in the Navy Information Dominance Approval System (NAVIDAS).

Commands are required to track IT transactions of $25,000 or less to ensure auditability and comply with Service specific guidance.
There is no minimum threshold for the acquisition of cloud computing services, all of which require an ITPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FQDN

A

A fully qualified domain name, sometimes also referred to as an absolute domain name, is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System. It specifies all domain levels, including the top-level domain and the root zone.

.com is the top-level domain
mysite is the second-level domain
mysite.com is the domain name
www.mysite.com is the fully-qualified domain name (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

KIV 7

A

Data Link
Dual Simplex

24
Q

58M is for

A

UHF

25
Q

KYV 5M

A

EHF
HF
SATCOM

26
Q

Crypto devices from two communicating commands have to be

A

The same model in order to communicate

27
Q

Crypto receiving document

A

SF153

28
Q

AL code 6

A

Electronic keys

29
Q

What to use for reference other than for server product applications (example RSUPMAST)

A

IETM

30
Q

Duasything

A
  • File explorer
  • Right click
  • Properties
  • Change Computer name
31
Q

Create PST (Outlook)

A

To create a PST (Personal Storage Table) file in Outlook, follow these improved instructions:

  1. Open Outlook and navigate to the “Home” tab.
  2. Click on “New Items” in the toolbar.
  3. From the dropdown menu, select “More Items.”
  4. Choose “Outlook Data File” from the list.
  5. Follow the prompts to choose a location on your computer to save the PST file and name it.
  6. Click “OK” to create the PST file.
32
Q

To map PST

A

Import/ export
Open export
Use preselected options

33
Q

rsop

A

The rsop.msc command opens the Resultant Set of Policy (RSOP) tool on Windows systems. RSOP is used to display the group policy settings applied to a computer or user, providing a comprehensive overview of all policies currently in effect. This tool is helpful for troubleshooting Group Policy issues or for planning and verifying policy settings in an Active Directory environment. To use it, simply press Windows + R to open the Run dialog, type rsop.msc, and press Enter.

34
Q

IPPLAN file path

A

Search CANES INSTALL

35
Q

Get workstation around firewall

A

From Mrds02
sa.internal
line 1
show run int g2/0/19
conf t
(config) default int g2/0/19
“Interface GigabitEthernet 2/0/19 set to default configuration”
int g2/0/19
(config-if) switchport access vlan 182
end
#show run int g2/0/19

36
Q

Correct IP configuration for workstations (3)

A

subnet mask: 255.255.255.0
default gateway: 205.68.246.1
DNS servers: 205.68.246.6 205.68.246.7

37
Q

Who to contact when a computer has been placed in quarantine

A

NCDOC (for reporting malware)

38
Q

Power on script folder

A

Junotech

39
Q

If NTCSS account was created correctly next step is

A

Send user to Admin to finish activating account.

40
Q

To change user attribute employeeID

A

Search Active Directory manually/ by scrolling.

41
Q

VLAN for UPS and printers

A

184

42
Q

VLAN for workstations

A

182

43
Q

Data Center Racks locations

A

Sonar 1, Array 2, 3, 4, SNAP, SCCR3

44
Q

After script for new user creation

A

Open active directory search by name.last
Change display name to include (LAS XX)
Copy name to rename in list
Make member of

45
Q
A
46
Q

To access a UPS GUI you’ll need

A

Be connected to vlan 184
UPS IP address

47
Q

Who gives permission to destroy crypto

A

CO

48
Q

What is destroyed first during crypto destruction?

A

During the decommissioning of cryptographic equipment, the most volatile components, such as those classified as top secret, are usually destroyed first. This prioritizes the elimination of the most sensitive data and parts to prevent any potential security breaches.

49
Q

Provision a new computer

A
  1. Identify what port/drop you are going to use for provisioning
  2. Determine what switch port that drop is connected to
  3. Change the vlan of the identified Switchport
  4. Change the vlan of that switch port
  5. Provision the workstation

Make sure the DNS name you give it is not already in use by another workstation

Don’t forget to add it to the domain

Don’t forget to download SKED, RADM, NAVFIT and other applicable programs

Make sure it downloads all the windows updates

50
Q

Determine what switch port that drop is connected to (provisioning)

A
  1. Determine what switch port that drop is connected to

2a. Connect management laptop to port/drop
2b. Get the MAC address of the laptop by running ipconfig /all
2c. Write down the MAC address (physical address)

51
Q

Change the vlan of the identified Switchport (provisioning)

A
  1. Change the vlan of the identified Switchport
    3a. Open putty
    3b. Interface with the backbone router
    3c. Run command <show mac address-table | include (last four of the MAC address)>
    3d. This should give you the switch the device
    3e. Interface into that switch via putty
    3f. Run the command shown in step 3c
    3g. Write down the interface that it tells you. (DO NOT MODIFY THAT INTERFACE YET BECAUSE THATS THE ONE YOURE STILL CONNECTED TO)

Note A: if the commands do not give you any output you will need to look in ISE to determine what interface the port is on.

52
Q

Change the vlan of that switch port (provisioning)

A
  1. Change the vlan of that switch port
    4a. Connect management laptop to the management port
    4b. Log into the switch that you wrote down for step 3e
    4c. Enter global config with command <config>
    4d. Run the command <default interface (the interface you wrote down for step 3g.)>
    4e. To verify that the interface is not defaulted run <do sh run int(the interface you just defaulted)>
    4f. Interface into it with command <int (whatever the fuck it is)>
    4g. Run the following commands in order
    < Switchport mode access></config>

<Switchport access vlan 198>
(I think that’s the provisioning vlan but verify with the ip spreadsheet)

<no>
<description>
<end>
4h. To verify what you’ve done enter <do sh run int(whatever the interface was)
4i. To save your work run either
<copy>
<wr>
</wr></copy></end></description></no>

53
Q

Provision workstation after drop has been configured

A
  1. Provision the workstation
    5a. Connect the non provisioned workstation to the drop you were working on
    5b. Verify BIOS settings IAW IETM or the WOB CICD
    5c. PXE boot it

Make sure the DNS name you give it is not already in use by another workstation

Don’t forget to add it to the domain

Don’t forget to download SKED, RADM, NAVFIT and other applicable programs

Make sure it downloads all the windows updates

54
Q

Create .pst

A

Personal Storage Table or Outlook Data File
- New Items
- More Items
- Outlook Data File
- Standard is to save in H drive
- A new folder will appear in outlook for user to drop emails to save

55
Q

Create ODF

A

Outlook Data File or Personal Storage Table .pst
- New Items
- More Items
- Outlook Data File
- Standard is to save in H drive
- A new folder will appear in outlook for user to drop emails to save

56
Q
A
57
Q

Secure office trusted thin client is the server that allows for functionality of thin clients. When they first boot they reach out to SOTTC for their image. SOTTC uses SABI (secret and below interface also known as radiant mercury) to access the secret and SR enclaves so that the end user can access both unclass and secret with no risk of spillage.

A

Secure office trusted thin client is the server that allows for functionality of thin clients. When they first boot they reach out to SOTTC for their image. SOTTC uses SABI (secret and below interface also known as radiant mercury) to access the secret and SR enclaves so that the end user can access both unclass and secret with no risk of spillage.