Sys Block 1 Flashcards

(59 cards)

1
Q

Describe the characteristics of a flexpod

A

The flexpod platform is defined as a set of hardware and software products that serve as a foundation for data center deployments in an AOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe the storage system used by flexpod

A

NetApp is a data storage system; it responds to network request from clients and fulfills them by writing data to or retrieving data from disk arrays

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe the characteristics of Oracle Server

A

The Oracle server host a single database instance referred to as the AODB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the function of a Iris server

A

Used by TBMCS to construct, Validate, manage , and distribute United States message text format message traffic, to include the ATO and the ACO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe the different AOC weapon system baselines

A

-Requirements function baseline
-Allocated Baseline
-Product Baseline
-Test Baseline
-Release Baseline
-SiteBaseline
-JWICS baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACC AOC baseline changes approval authority ?

A

The change review board has the ultimate baseline change approval authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain the purpose of System Administration (SAM)

A

This SUM identifies the architectural organization of TBMCS, provides list of TMMCS applications and numerous system admin procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe System Security Administration (SSA)

A

This SUM contains procedures for establishing and maintaining the system enclave security at both the system and user level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain virtual machine

A

A VM is a software computer that runs on an operating system and applications. When turned on a VM consumes physical resources of a ESXi Server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Purpose of ESXi server

A

Abstracts its resources into multiple VMs. Its the bare metal hypervisor OS on the ESXi Host that allows multiple VMs to run on the same server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain the purpose of a data store

A

Storage location for virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain the purpose of a data store

A

Storage location for virtual machines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Purpose of vCenter Server

A

Windows based application that provides centralized management for the entire center

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe vSpere web client

A

Primary method of interaction with the virtual environment. Its used to connect to vCenter Server systems and manage inventory objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Goal of AOC comm support

A

Goal is to ensure efferent flow of information into, through , and out of the AOC while ensuring the integrity and security of that information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Role of the CFP function

A

The CFP is the senior communications management function for the AOC and is a support staff for the ACOMS/CC. It consists of personnel who have a specific working knowledge of the AOC mission, oversees site operations, and provides direct C2 communications support to the AOC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain the purpose of C2

A

To ensure servers, workstations, peripherals, communications devices, and software is online and available to the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Explain the primary responsibility of data links

A

To help the ICO and ACOMS/CC plan, coordinate, establish, and maintain the multi tactical link network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Plans and programs purpose

A

Support the ACOMS/CC through monitoring the AOC baseline and tracking the fielding of new capabilities and applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AOC as a Unit

A

Gives the commander , the Air Forces COMAFOR the ability to command and control C2 air operations. The AOC is the major C2 node and primary hub of the theater Air Control System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AOC as a Weapon System

A

Designated the AN/USQ-163 Falconer which includes equipment and interfaces to other C2 centers and systems to ensure AOC personnel effectively conduct air and space operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

3 groups of teams that make up AOC structure

A

Functional core teams
Speciality teams
Support Teams

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Purpose of ATO

A

Plan written in US message text format that task AirPower in support of joint air operations for a specific time period, normally 24 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Web based apps used for planning , re-planning, and ATO distribution

A

MCAMP is a TBMCS web based application used for air battle planning, replanning , and ATO dissemination

25
Identify the 6 primary ACOMS functions
ACOMS/CC CFP C2 Networks Data Links Plans and Programs Cyber Defense Functions
26
CFP primary responsibility
Act as a single focal point that ensures user communication and system issues or problems are addressed and resolved
27
Purpose of Netlogon service
Windows process that authenticates users, devices , and other services on a domain
28
Purpose of drive mapping
Associating a local drive letter to a folder that is shared by another computer so that it can be accessed as if it is a local drive
29
Purpose of drive mapping
Associating a local drive letter to a folder that is shared by another computer so that it can be accessed as if it is a local drive
30
Identify commonly misconfigured TCP/IP properties
incorrect IP Incorrect subnet mask Incorrect Default Gateway Must also point to the correct DNS
31
Describe Citrix
A virtual desktop is an emulation of a hardware device that runs on a physical or virtual computer
32
Authenticators for client systems logon and access to webase applications
Controlled by web logic and Active Directory . User must belong to web application groups in AD
33
Purpose of Remote Desktop services
To display remote computers desktop when required
34
Remote Desktop connections command
MSTSC.exe
35
Purpose of AD
Provided a structured and centrally controllable computing environment within the AOC
36
Describe domain controllers
The DC stored directory information, provides directory services, and authenticates users and computers
37
Describe security groups
Provide an efficent way to assign permissions to shared resources on your network
38
Purpose of AD group policy
To apply policy settings to computers and uses in an Active Directory domain
39
Purpose of AD replication
Define the way updates are communicated between DC
40
The service AD must use for name resolution
DNS is a name resolution and location service used to resolve computer names to addresses for connectivity purposes
41
Purpose of dcdiag
Tool used to analyze the state of domain controllers in a forest or enterprise and reports any problems to assist with troubleshooting. It is a very effective tool for verifying the health of AD
42
Which modes is needed when Active Directory is damaged that sys admin can’t log on
Directory service restore mode is used to logon to a DC ..
43
Highest priority considerations in the AOC weapon system security architecture
Unauthorized access Unauthorized modification Denial or degradation of service Unauthorized traffic Unauthorized use
44
Highest priority considerations in the AOC weapon system security architecture
Unauthorized access Unauthorized modification Denial or degradation of service Unauthorized traffic Unauthorized use
45
Describe two general threat categories used to develop TBMCS security policy
Human Intentional - deliberate act against a resource Human Un-Intentional- accidental or inadvertent damage to a resource
46
Identify central authority for network security
Authentication and directory services acts as the central authority for network security
47
Purpose of TBMSEC
Provided the default local security policy for each windows system
48
TBMSEC policy concerns
System access Auditing Privilege rights Security related registry settings Registry keys access control list File system ACLs
49
DNS severs in an AOC
To provide address resolution between domain names and IP addresses …provide name resolution for requesting clients
50
Most common type of DNS resource record
Host A record - contains the name of the host and its corresponding IP address
51
Function of ping
Used to verify IP-level connectivity to another computer
52
Identify dcdiag /test:dns command
Diagnostic tool used to verify the functionality of the DNS server it also runs to check the health of the DNS settings for the entire enterprise
53
Identify nslookup command modes
Provides wealth of DNS serves diagnostic information and contains large command set
54
Command used to display all current TCP/IP configuration values
Ipconfig/all
55
Purpose of TBMENT
Provides the capability to populate AD with predefined organization consisting of multiple organizational units (OUs)
56
Groups
Alert profiles Application groups J2ee roles User groups
57
Groups
Alert profiles Application groups J2ee roles User groups
58
Users
App users Internal Extrernal
59
TBMENT functions
Setup TBMCS Structire Import profiles Import User Groups Import Users Remove TBMCS attributes Remove groups and profiles Undo last import Circular Nested Group Checker Export