Help Desk / Miscellaneous Flashcards

(57 cards)

1
Q

Steps to create CANES account [4]

A
  1. User completes Cyber Awareness training
  2. User creates SAAR-N Form
  3. SAAR-N Form is signed by ISSO and ISSM
  4. MCA01 > Active Directory > Users and Computers > CANES Users > USA Users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SAAR-N

A

System Authorization Access Request Navy
To record names, signatures, and Social Security Numbers for the purpose of validating the trustworthiness of Individuals requesting access to Department of Defense (DoD) systems and information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ISSM & ISSO

A

ISSM stands for Information Systems Security Manager, while an ISSO stands for Information Systems Security Officer.

An ISSM is responsible for managing the overall security program for information systems within a military organization. Their role involves risk management, ensuring compliance with security regulations, coordinating security training, and conducting security assessments.

On the other hand, an ISSO is responsible for the day-to-day operational security of information systems. They work closely with the ISSM and are involved in tasks such as system administration, incident response, vulnerability management, and security monitoring. ISSOs ensure that security controls are properly implemented, maintained, and monitored to protect the organization’s information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Default when creating NTCSS account

Boxes to check
Username
Classification

A

All users (3) no NTCSS
6 first of last name + first initial + middle initial = 8
Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

See the CAC certs running

A
  • Up Arrowhead
  • Red Eagle (Axway)
  • CA specific (three green certs overlapping)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

See the inserted CAC’s certs

A
  • Up Arrowhead
  • Active Client (Blue Apple Watch icon)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Exchange: Create custom folder

A
  • Rules
  • New Rule
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Enable/ Disable exchange account

A
  • EX01
  • Exchange Admin Center
  • Connectivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you find the most comprehensive manual of the network that doesn’t include software products?

A
  • Share Drive
  • /CC DIV
  • Search most current version: SW4
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Add person to email Distro from what server

A

EX01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Three servers to add user to a group

A

Create (security) group in DC01
Manage (security) group in FS02
Distros EX01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Server and Software to push software and patches

A

CM01: SCCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

To clear space and or fix NTCSS not connecting to database

A
  • Search pathway in CC DIV regedit
  • Delete user from local C drive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Teletypewriter Formats

A

Teletypewriters, often abbreviated as TTY, come in several formats, but the three main formats commonly used are:

  1. Baudot Code (5-bit Teletype): This was one of the earliest formats used for teletypewriters and used a 5-bit binary code. It was limited in the characters it could represent and had a slower data transmission speed compared to later formats.
  2. ASCII (American Standard Code for Information Interchange): ASCII-based teletypewriters became prevalent as ASCII encoding became the standard for text and data representation in computing. These TTYs could transmit a wider range of characters and symbols, making them more versatile.
  3. EBCDIC (Extended Binary Coded Decimal Interchange Code): EBCDIC-based teletypewriters were used in some IBM systems and other mainframes. EBCDIC is a character encoding that uses 8 bits per character and was primarily used in large-scale computing environments.

ASCII-based TTYs became the most widely adopted due to the compatibility with emerging computer systems and the broader character set it supported.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In radio communications, a parasitic element refers to

A

an element in an antenna system that is not connected directly to the transmitter or receiver but plays a critical role in influencing the antenna’s radiation pattern and performance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NAVPERSCOM

A

Navy Personnel Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

CNDSP

A

Computer network defense service providers (CNDSP) commonly consist of a Computer Emergency Response Team or Incident Response and Recovery Team (IRRT) and are closely associated with Network Operations and Security Center.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are Echelons?

A

There are different echelons within the United States Navy, each responsible for specific functions. Typically refers to the levels of a hierarchical structure or command organization. The specific responsibilities can vary depending on the context, such as military or organizational structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is IDCRC?

A

Naval Information Force Reserve (NIFR), formerly Information Dominance Corps Reserve Command (IDCRC), provides timely and valued Naval Information Force capabilities (Meteorology & Oceanography, Information Operations, Networks, Cryptology/SIGINT, Intelligence & Space) from the Reserve Component to meet Fleet and Joint operational requirements. Commander, Naval Information Force Reserve (CNIFR) and Reserve Deputy Commander, Naval Information Forces (NAVIFOR), is RDML Greg Emery.
Echelon III.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is ONI?

A

The Office of Naval Intelligence is America’s premier maritime intelligence service and a core element of the U.S. Navy’s Information Warfare Community. ONI possesses unmatched knowledge of the maritime operating environment and delivers penetrating understanding of threats to America’s security to national decision makers and the Fleet. Established in 1882, ONI is the nation’s longest-serving intelligence agency. Echelon III.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ITPR

A

Information Technology Procurement Request (ITPR) process.

Any purchase of $25,000 or more (including Government Purchase Card purchases) or that is National Defense Authorization Act (NDAA) related does require an ITPR submitted in the Navy Information Dominance Approval System (NAVIDAS).

Commands are required to track IT transactions of $25,000 or less to ensure auditability and comply with Service specific guidance.
There is no minimum threshold for the acquisition of cloud computing services, all of which require an ITPR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FQDN

A

A fully qualified domain name, sometimes also referred to as an absolute domain name, is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System. It specifies all domain levels, including the top-level domain and the root zone.

.com is the top-level domain
mysite is the second-level domain
mysite.com is the domain name
www.mysite.com is the fully-qualified domain name (FQDN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

KIV 7

A

Data Link
Dual Simplex

24
Q

58M is for

25
KYV 5M
EHF HF SATCOM
26
Crypto devices from two communicating commands have to be
The same model in order to communicate
27
Crypto receiving document
SF153
28
AL code 6
Electronic keys
29
What to use for reference other than for server product applications (example RSUPMAST)
IETM
30
Duasything
- File explorer - Right click - Properties - Change Computer name
31
Create PST (Outlook)
To create a PST (Personal Storage Table) file in Outlook, follow these improved instructions: 1. Open Outlook and navigate to the "Home" tab. 2. Click on "New Items" in the toolbar. 3. From the dropdown menu, select "More Items." 4. Choose "Outlook Data File" from the list. 5. Follow the prompts to choose a location on your computer to save the PST file and name it. 6. Click "OK" to create the PST file.
32
To map PST
Import/ export Open export Use preselected options
33
rsop
The `rsop.msc` command opens the Resultant Set of Policy (RSOP) tool on Windows systems. RSOP is used to display the group policy settings applied to a computer or user, providing a comprehensive overview of all policies currently in effect. This tool is helpful for troubleshooting Group Policy issues or for planning and verifying policy settings in an Active Directory environment. To use it, simply press `Windows + R` to open the Run dialog, type `rsop.msc`, and press Enter.
34
IPPLAN file path
Search CANES INSTALL
35
Get workstation around firewall
From Mrds02 sa.internal line 1 show run int g2/0/19 conf t (config) default int g2/0/19 "Interface GigabitEthernet 2/0/19 set to default configuration" int g2/0/19 (config-if) switchport access vlan 182 end #show run int g2/0/19
36
Correct IP configuration for workstations (3)
subnet mask: 255.255.255.0 default gateway: 205.68.246.1 DNS servers: 205.68.246.6 205.68.246.7
37
Who to contact when a computer has been placed in quarantine
NCDOC (for reporting malware)
38
Power on script folder
Junotech
39
If NTCSS account was created correctly next step is
Send user to Admin to finish activating account.
40
To change user attribute employeeID
Search Active Directory manually/ by scrolling.
41
VLAN for UPS and printers
184
42
VLAN for workstations
182
43
Data Center Racks locations
Sonar 1, Array 2, 3, 4, SNAP, SCCR3
44
After script for new user creation
Open active directory search by name.last Change display name to include (LAS XX) Copy name to rename in list Make member of
45
46
To access a UPS GUI you’ll need
Be connected to vlan 184 UPS IP address
47
Who gives permission to destroy crypto
CO
48
What is destroyed first during crypto destruction?
During the decommissioning of cryptographic equipment, the most volatile components, such as those classified as top secret, are usually destroyed first. This prioritizes the elimination of the most sensitive data and parts to prevent any potential security breaches.
49
Provision a new computer
1. Identify what port/drop you are going to use for provisioning 2. Determine what switch port that drop is connected to 3. Change the vlan of the identified Switchport 4. Change the vlan of that switch port 5. Provision the workstation Make sure the DNS name you give it is not already in use by another workstation Don’t forget to add it to the domain Don’t forget to download SKED, RADM, NAVFIT and other applicable programs Make sure it downloads all the windows updates
50
Determine what switch port that drop is connected to (provisioning)
2. Determine what switch port that drop is connected to 2a. Connect management laptop to port/drop 2b. Get the MAC address of the laptop by running ipconfig /all 2c. Write down the MAC address (physical address)
51
Change the vlan of the identified Switchport (provisioning)
3. Change the vlan of the identified Switchport 3a. Open putty 3b. Interface with the backbone router 3c. Run command 3d. This should give you the switch the device 3e. Interface into that switch via putty 3f. Run the command shown in step 3c 3g. Write down the interface that it tells you. (DO NOT MODIFY THAT INTERFACE YET BECAUSE THATS THE ONE YOURE STILL CONNECTED TO) *Note A: if the commands do not give you any output you will need to look in ISE to determine what interface the port is on.*
52
Change the vlan of that switch port (provisioning)
4. Change the vlan of that switch port 4a. Connect management laptop to the management port 4b. Log into the switch that you wrote down for step 3e 4c. Enter global config with command 4d. Run the command 4e. To verify that the interface is not defaulted run 4f. Interface into it with command 4g. Run the following commands in order < Switchport mode access> (I think that’s the provisioning vlan but verify with the ip spreadsheet) 4h. To verify what you’ve done enter
53
Provision workstation after drop has been configured
5. Provision the workstation 5a. Connect the non provisioned workstation to the drop you were working on 5b. Verify BIOS settings IAW IETM or the WOB CICD 5c. PXE boot it Make sure the DNS name you give it is not already in use by another workstation Don’t forget to add it to the domain Don’t forget to download SKED, RADM, NAVFIT and other applicable programs Make sure it downloads all the windows updates
54
Create .pst
Personal Storage Table or Outlook Data File - New Items - More Items - Outlook Data File - Standard is to save in H drive - A new folder will appear in outlook for user to drop emails to save
55
Create ODF
Outlook Data File or Personal Storage Table .pst - New Items - More Items - Outlook Data File - Standard is to save in H drive - A new folder will appear in outlook for user to drop emails to save
56
57
Secure office trusted thin client is the server that allows for functionality of thin clients. When they first boot they reach out to SOTTC for their image. SOTTC uses SABI (secret and below interface also known as radiant mercury) to access the secret and SR enclaves so that the end user can access both unclass and secret with no risk of spillage.
Secure office trusted thin client is the server that allows for functionality of thin clients. When they first boot they reach out to SOTTC for their image. SOTTC uses SABI (secret and below interface also known as radiant mercury) to access the secret and SR enclaves so that the end user can access both unclass and secret with no risk of spillage.