Networking Flashcards

1
Q

Purpose of CNO

A

Encompasses CNA, CND, CNE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CNA

A

Computer network attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CND

A

Computer network defense

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CNE

A

Computer network exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Infocon

A

Defense posture and response system for DOD info systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infocon 5

A

Normal readiness procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Infocon 4

A

Increased military vigilance procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Infocon 3

A

Enhanced readiness procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Infocon 2

A

Greater readiness procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Infocon 1

A

Maximum readiness procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

NCDOC

A

Navy cyber defense operations command - cyber security service provider , tracks and mitigates all viruses for the navy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

FLTNOC

A

Provides connectivity afloat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TNOSC

A

Regional detachment for FLTNOCs , provide same service as FLTNOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

NCTS

A

Provides connectivity for shore units

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

5 services provided by FLTNOCs

A

IP services, email, message traffic, VTC, voice comms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

N2N operations

A

NOC to NOC cutover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Authority for firewall policies

A

IAM ( information Assurance Manager )

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Instruction for computer network incident responses

A

CJCSM 6510

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

CAS

A

Web based application to post mission essential info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Application of NIAPS

A

Esoms, sked 3.2, CTA, fedlog, FSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Nipr

A

Access to unclassified information (world wide web)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Sipr

A

Secret information (interlink, CAS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Jwics

A

Top secret information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Centrix enclaves

A

Japan - US and Japan
Korea - US and Korea
CMFP - combines maritime forces, pacific
CNFC - coalition naval forces CENTCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
RadMerc
Classes and declasses information allowing users to transfer data between NIPR, SIPR, and JWICS.
26
Capabilities of GCCS-M
Comms 1 - controls input and output of all tracks Comms 2 - backup of comms 1 Intel - intel apps Websvr- connection to apps
27
Purpose of ASI
Coordinates downtime / maintenance window
28
Firewall log
Records info from packets that pass through or drop
29
Router log
On and off ship information
30
Server log
List of activities it performs
31
HTTP
Protocol for communication
32
HTTPS
Secure communications
33
File server
Holds and distributes files
34
Mail server
Email reception and forwarding
35
DNS server
Translate host names to IP addresses
36
Web server
Holds and delivers web pages
37
Print server
Manages directory and all print devices on the network
38
VLAN
Private network on switch port
39
RAID
Data redundancy
40
Ping
Signal to test connectivity
41
Trace route
Ping showing routers in router
42
IPCONFIG
List TCP/IP config
43
Telnet
Access computer remotely
44
Class A IP
1.x.x.x - 127.x.x.x
45
Class B Ip
127-191.x.x.x
46
Class C IP
192-223.x.x.x
47
Class D IP
224-254.x.x.x
48
How does RADMERC interface with GCCSM
Sanitizes information
49
Purpose of MIRC chat
Used on SIPR for ship to ship / ship to shore live chat
50
Loopback
Reroutes packets back to its source without intentional processing
51
Default gateway
Network point that acts as an entrance to another network
52
Private IP address
Cannot be used or accessed on public internet only local networks
53
APIPA
Automatic private internet protocol addressing - automatic self configuration of IPs
54
Domain name service
Provides translation from DNS to IP
55
Active directory
Repository for all windows components
56
Exchange server
Mail server
57
Outlook web access
Access to local email while at remote location
58
Port 20
FTP
59
Port 21
FTP
60
Port 22
SSH
61
Port 23
Telnet
62
Port 25
SMTP Mail
63
Port S3
DNS
64
Port 80
Http
65
Port 110
Mail post office protocol POP3
66
Port 443
Secure HTTPS
67
Application
software program that runs on your computer
68
Operating system
set of system software programs that regulate the way applications use computer hardware
69
Virus
malicious code
70
Worm
self replicates
71
Trojan
disguised malicious program
72
Backdoor
surreptitiously introduced into a computer system
73
Phishing
disguised as trustworthy entity to gain sensitive information
74
Network Enumeration
scans networks for vulnerabilities
75
Buffer overflow
program writes more info in the buffer then can fit in memory
76
SQL injection
accepts user input placed into SQL statement, doesn't filter out dangerous characters
77
Dictionary attack
entering every word in the dictionary as a password
78
Privilege Escalation
gain access to a resource that would be protected
79
Brute force attack
Trying every possible code / password until correct one is found
80
JWICS
Joint worldwide intelligence communications system - online network designed for TS/SCI
81
DoDN (GIG)
all DOD networks comprise of the GIG (global info Grid)
82
DISN
Defense information systems network
83
NMCI
Conus based internet contract / service
84
ONENET
oconus based internet contract / service
85
Machine language
instructions executed by a computer's CPU
86
Assembly Language
low level language for computer programing
87
Ring
Data goes around ring till info is found
88
Mesh
interconnects every device on network (expensive)
89
LAN
local area network
90
WAN
wide area network
91
MAN
metropolitan area network
92
GAN
Global area network (around the world)
93
OSI layer 7
Application
94
OSI layer 6
Presentation
95
OSI layer 5
Session
96
OSI layer 4
Transport
97
OSI layer 3
Network
98
OSI Layer 2
Data Link
99
OSI layer 1
Physical
100
TCP/ IP Model
Application, Transport, Internet, Network interface
101
Integrity
assurance info is not modified by unauthorized parties
102
Availability
Assurance of timely, reliable access to data
103
Non-Repudiation
Assurance that the sender's data has proof of delivery / receiver has proof of sender's ID
104
Authentication
assurance of ID of sender / receiver
105
Computer incidents (9)
``` Root level intrusion, User level intrusion Unsuccessful activity attempt, Denial of service, Non- Compliance activity, Reconnaissance Malicious logic, Investigating, Explained anomaly ```
106
Dod WWW security policy
appropriate use of the web to provide public info to a global audience
107
IAVA
information assurance vulnerability report -addresses severe network vulnerabilities
108
IAVB
information assurance vulnerability bulletin - new vulnerabilities that do not pose immediate risk
109
IAVT
information assurance vulnerability Technical advisories - low risk vulnerabilities
110
CTO
computer tasking order
111
NTD
navy telecommunications directive
112
service pack
periodically released update to software
113
vulnerability assessment
identify weakness in a network
114
what does the IAM do
responsible for ensuring all cybersecurity components are completed
115
Host
system or node
116
Application server
manages services and applications
117
Hub layer 1
connects segments of a LAN