NAVMACS Flashcards

(83 cards)

1
Q

In the NAVMACS system, passes information from one enclave to another

A

Radiant Mercury (RM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

5510.60N

A

OPNAVINST 5510.60N is a Chief of Naval Operations Instruction that outlines security policy direction and provides standardized procedural guidance for the protection of classified information and Controlled Unclassified Information (CUI) within the custody of the Chief of Naval Operations and the Office of the Chief of Naval Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

If fan is overheating in NAVMACS rack make sure the plates

A

Are on to allow proper airflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What CPU is a spare in the NAVMACS rack?

A

CPU4, between CPU1 and CPU2
Doesn’t have a Radiant Mercury (RM) card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

VLAN to connect AN/SYQ-26(V)7

A

VLAN SSIL-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Documentation for AN/SYQ-26(V)7 only in what side of the enclaves

A

High Side

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Full name of Victor 7

A

AN/SYQ-26(V)7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the J1B and J1A in Victor 7?

A

J1B auxpowers the printer
J1A is the main power for the rest of the rack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Power on procedure for V7

A

1- At the middle bottom of the rack start with the switch
2- then button immediately over
3- Hold the top circular button to the very left (from the 4-button cluster)
4- At the top switch everything up
5- Open racks to turn CPUs On
6- Turn on the monitors
(Reverse the steps to power it off)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Device for TS messages on CWO desk

A

MAD II

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CUDIXS always uses what antenna

A

Trashcans (OE-82)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

CVE [cyber security]

A

Common Vulnerabilities and Exposures is a list of publicly disclosed computer security flaws. When a vulnerability is discovered, it can be reported to the CVE program, which assigns it a unique identifier (CVE ID). This system helps standardize the way security vulnerabilities are identified and referred to, facilitating the sharing of data across different security tools and services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Nessus

A

Nessus is a widely used cybersecurity scanning tool developed by Tenable Network Security. It is designed to perform comprehensive vulnerability assessments by scanning network devices, systems, and applications to identify security weaknesses, such as misconfigurations, outdated software, and vulnerabilities to known exploits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Open Ports [cyber security]

A

Open Ports refer to network ports on computers or other devices that are configured to accept connections or data packets. While necessary for normal operation and communication, open ports can also provide potential entry points for unauthorized access if they are not securely managed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ACAS

A

(Assured Compliance Assessment Solution) is a suite of software tools provided by Tenable, Inc., for the U.S. Department of Defense (DoD). ACAS is built around the Nessus scanner and is designed for automated vulnerability scanning, configuration assessment, application scanning, and compliance checking. It is the standardized solution for the DoD to ensure the security and compliance of its IT systems against both internal and external threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IDS

A

An Intrusion Detection System (IDS) is a tool that monitors networks or systems for malicious activity or policy violations, reporting detected issues for response.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

RBAA

A

A Role-Based Attribute Authority (RBAA) in the context of cybersecurity and access control systems is an entity responsible for assigning attributes to users based on their roles within an organization. These attributes are used to enforce access control policies, determining what resources a user can access based on their role. RBAA simplifies management of permissions and access rights by linking them to roles rather than individual users, enhancing security and efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

VRAM

A

To upload all security cyber scans from all POR (one stop shop)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

To get information about the version of NAVMACS II

A

Applications > Documentation > System Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DPVS

A

Distributed Plads Verification System: hold PLADs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How to build a Distro

A

Distribution lists are built in User Database in Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

FAM

A

Fleet Advisory Message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

How to find the manual for NAVMACS

A

Applications > Documentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

During message composing explainer key in NAVMACS

A

F1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Only place to delete messages in NAVMACS
Message Log OPINT
26
Organize Screens in NAVMACS rack
Applications > Utilities > Settings >Devices
27
121.5 MHz
This frequency is used as the international air distress frequency for emergency communication involving aircraft. It's used for emergency situations, such as when an aircraft is in distress, to facilitate search and rescue operations.
28
243.0 MHz
This is the military equivalent of the 121.5 MHz emergency frequency, used primarily by military aircraft for emergency communications and distress signals.
29
In NAVMACS, routes messages given certain key words
Profiler
30
NAVMACS sys adm username
nm_sa
31
What value is adjusted when creating a user account for foreigners
(SRC/SHD) BFLPY
32
OTO (NAVMACS)
Operator To Operator
33
Troubleshooting NAVMACS when a connection was up and, with no changes in parameters, drops
Call NCTAMS to ask for a **remote link test**
34
1- Purpose of NAVMACS II
Transfer GENSER
35
2- Does not have Radiant Mercury
AV2
36
3- UPS function in V7
Filters main power and back up
37
4- T/F UPS distributes power main and aux
True
38
5- V7 processor layout
D. Starts with Radiant Mercury
39
6- MAD II
audible visual TS NMP
40
7- Battle Short
C. Switch to override temperature sensor
41
8- J1B
AUX = Printer
42
9- Switches
D. 1,2,3 NO CAC
43
10- Video switches
Two monitors = two switches
44
11- V7 3 LANS
Top Secret LAN Control LAN Secret LAN
45
12- CPU1 in V7
RM on non-RAID RHEL
46
13- V7 TS NMP | Communicates to what?
External Top Secret Serial Circuits
47
14- V7 RM processor | what for? (Big picture)
A. prevents spillage
48
15- RAID acronym
Redundant Array of Independent Disks
49
16- Secret NMP C2OIX protocol
SMTP
50
17- If C2OIX interface down
From Secret NMP RM and TS NMP over CUDIXS
51
18- UHF SATCOM circuit connected local NCTAMS
CUDIXS
52
19- UHF LOS or HF Long Haul Circuit
FPT (TTY)
53
20- Primary path for TS
CUDIXS
54
21-Primary path for Secret
C2OIX
55
22- SATCOM circuit receive only
FLT BCST
56
23- Common to all comms circuits
Encryption
57
24-V7 PKI cert for C2OIX
Secret NMP (NOT TS NMP)
58
25- Update, improve eliminate vulnerability
D. Patch
59
26- Built-in module RHEL auto-control access-based access control
SELinux
60
27- Security feature digitally signing outgoing SIPR C2OIX
B. PKI
61
28- COTs tool scanning
C. ACAS
62
29- Security feature McAfee ePoly Orchestrator (ePO)
ENSL Environmental Security and Logistics System
63
30- To enable McAfee Agent ePO host DB must 1st created
True
64
31- Monitors malicious activity/ policy violator
IDS
65
32- Security Center | holds what?
Component to ACAS ship or shore NESSUS
66
33- Could prevent user from sending a message
Both B & C = User does not exist or does not have the authority
67
34- NAVMACS GUI ZKP
Command List
68
35- Create and Manage circuits
B. Circuit Control
69
36- Order NAVMACS message search
REIAS Relay Exclusive Inclusive All Shotgun
70
37- NAVMACS version
Documentation
71
38- How often password
B. 60 days
72
39- email address C2OIX circuit
navmacs@navmacs
73
40- automatically reroutes based on key words
Profiler
74
41- TS NMP and MAD II is set active occurs next
Syncs Alerts
75
42- DPVS PLA DB T/F
T
76
43- TS NMP receives NTP from NTP server
False
77
44- RM rule access system, objects, logs, security | role
A. Sys adm
78
45- RM records all security-related actions
A. Audit log
79
46- Only Rm Sys Adm and Audit Adm may access audit records
T
80
47- Only RM Security Adm can manually archive audit
F
81
48- reasons RM Software backup
D. All
82
49- Command to check LAN TS NMP and MAD II connection
ping
83
50- Interfaces TS and Secret NMP
RM