Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
61 Cards in this Set
- Front
- Back
JTF-GNO
|
Joint Task Force Global Network Operations (dissolved into USCC)
|
|
Functions of JTF-GNO
|
Plan, coordinates, integrates, synchronizes and conducts activities to direct the operations and defense of GIG.
|
|
Relationship between NNWC and USCC
|
USCC pushes out orders and directives to DoD and NNWC pushes them out to the Navy.
|
|
Navy's Level 3 accredited CNDSP
|
NCDOC
|
|
JTF-GNO reports to?
|
US Stratcom
|
|
CNDS/CA
|
CND SP accredidation
|
|
Central Manager for all DoD Enterprise incident sets
|
DISA
|
|
Area coordinators for NCDOC and NNWC
|
SWO, BWC, CNDWO
|
|
TACON of NCDOC
|
CO 10th Fleet
|
|
Who handle's electronic spillage issues?
|
NNWC/NCDOC
|
|
Happens when Electronic spillage happens at NCDOC?
|
Watch creates ticket, notify IAM and SSO.
|
|
CNA
|
operations to disrupt, deny, degrade or destroy information resident on computers and networks or the hardware itself.
|
|
Incident handling as applied to CNO
|
Protect
Monitor, analyze, detect Respond |
|
Four phases of CNDS Certification and Accreditation
|
Registration
Verification Validation Post Accreditation |
|
CCIR
|
Commander's Critical Informational Requirements
|
|
NAR
|
Network Analysis Report
|
|
Steps of NAR
|
Assessment
Research Analysis Reporting |
|
CA
|
provides initial analysis of usual activity, threats or mass malware outbreaks on the Navy networks.
|
|
Firewalls used by Navy
|
Network
Host Hybrid |
|
IDS
|
passive system designed to monitor network activity and operates in promiscuous mode
|
|
IPS
|
active system that monitors network activity and makes attempts to stop potential attacks and operates in inline mode
|
|
Thinnet
|
10Base2 coaxial cable with BNC connectors 10Mbps IEEE 802.3 standard
|
|
Classes of ip ranges
|
1.0.0.0 - 126.255.255.255
128.0.0.0 - 191.255.255.255 192.0.0.0 - 223.255.255.255 |
|
Layer 1 OSI Model
|
Physical
|
|
Layer 2 OSI Model
|
Data Link
|
|
Layer 3 OSI Model
|
Network
|
|
Layer 4 OSI Model
|
Transport
|
|
Layer 5 OSI Model
|
Session
|
|
Layer 6 OSI Model
|
Presentation
|
|
Layer 7 OSI Model
|
Application
|
|
OSI Model transfer thing
|
Bits
Frames Packets Segments Data |
|
Layer 1 TCP/IP Model
|
Network Interface
|
|
Layer 2 TCP/IP Model
|
Internet
|
|
Layer 3 TCP/IP Model
|
Transport
|
|
Layer 4 TCP/IP Model
|
Application
|
|
Types of Fiber mode
|
Single Mode
Multi Mode |
|
Most secure transmission medium
|
Fiber optic
|
|
Vulnerability
|
Weakness that could potentially be taken advantage of by an attacker
|
|
Exploit
|
act of taking advantage of a vulnerability
|
|
attachment filtering
|
-file name or extension
-MIME content type |
|
CIA
|
Confidentiality
Integrity Availability |
|
Log file analysis
|
helps organizations to better realize the value of their existing security infrastructure
|
|
RC-4
|
most commonly used stream cipher SSL and WEP
|
|
RC-6
|
symmetric key block cipher
|
|
SHA-1
|
Secure Hash Algorithm cyrptologic hash function
|
|
AES
|
Advanced Encryption Standard symmetric key encryption standard
|
|
BLOWFISH
|
keyed symmetric block cipher
|
|
3-DES IRT
|
Triple Data Encryption Algorithm, block cipher
|
|
CSM
|
GS-11 or above, or an officer appointed by the CO
|
|
Duties of CSM
|
-develops written command information and personnel security procedures, including emergency plan
-ensures all personnel execute a SF 312 prior to granting access to classified information |
|
P -Priority
|
3 hours
|
|
O -Immediate
|
30 minutes
|
|
Z -Flash
|
10 minutes
|
|
R Routine
|
24 hours
|
|
Current system for transmitting naval message
|
C21OX/ AMHS/NICE/NREMS
|
|
PLA
|
address Naval message to specific commands
|
|
Difference between IPV4 and IPV6
|
number of IPs
|
|
Active Directory
|
-provides domain services, rights management services, federation services
-windows server, gives out-of-the-box functionality -centrally configure administer system, user, and application settings. |
|
token ring
|
-LAN technology which resides in Data-link layer of the OSI model
-3 byte frame called a token that travels around the ring -IEEE 802.5 |
|
IEEE
|
Institute of Electrical and Electronics Engineers
|
|
IEEE purpose
|
-foster technological innovation and excellence for the benefit of humanity
-create a set of standards for the interoperability of equipment and software to enable sharing of information -802-11 standard for wireless networking |