• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/61

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

61 Cards in this Set

  • Front
  • Back
JTF-GNO
Joint Task Force Global Network Operations (dissolved into USCC)
Functions of JTF-GNO
Plan, coordinates, integrates, synchronizes and conducts activities to direct the operations and defense of GIG.
Relationship between NNWC and USCC
USCC pushes out orders and directives to DoD and NNWC pushes them out to the Navy.
Navy's Level 3 accredited CNDSP
NCDOC
JTF-GNO reports to?
US Stratcom
CNDS/CA
CND SP accredidation
Central Manager for all DoD Enterprise incident sets
DISA
Area coordinators for NCDOC and NNWC
SWO, BWC, CNDWO
TACON of NCDOC
CO 10th Fleet
Who handle's electronic spillage issues?
NNWC/NCDOC
Happens when Electronic spillage happens at NCDOC?
Watch creates ticket, notify IAM and SSO.
CNA
operations to disrupt, deny, degrade or destroy information resident on computers and networks or the hardware itself.
Incident handling as applied to CNO
Protect
Monitor, analyze, detect
Respond
Four phases of CNDS Certification and Accreditation
Registration
Verification
Validation
Post Accreditation
CCIR
Commander's Critical Informational Requirements
NAR
Network Analysis Report
Steps of NAR
Assessment
Research
Analysis
Reporting
CA
provides initial analysis of usual activity, threats or mass malware outbreaks on the Navy networks.
Firewalls used by Navy
Network
Host
Hybrid
IDS
passive system designed to monitor network activity and operates in promiscuous mode
IPS
active system that monitors network activity and makes attempts to stop potential attacks and operates in inline mode
Thinnet
10Base2 coaxial cable with BNC connectors 10Mbps IEEE 802.3 standard
Classes of ip ranges
1.0.0.0 - 126.255.255.255
128.0.0.0 - 191.255.255.255
192.0.0.0 - 223.255.255.255
Layer 1 OSI Model
Physical
Layer 2 OSI Model
Data Link
Layer 3 OSI Model
Network
Layer 4 OSI Model
Transport
Layer 5 OSI Model
Session
Layer 6 OSI Model
Presentation
Layer 7 OSI Model
Application
OSI Model transfer thing
Bits
Frames
Packets
Segments
Data
Layer 1 TCP/IP Model
Network Interface
Layer 2 TCP/IP Model
Internet
Layer 3 TCP/IP Model
Transport
Layer 4 TCP/IP Model
Application
Types of Fiber mode
Single Mode
Multi Mode
Most secure transmission medium
Fiber optic
Vulnerability
Weakness that could potentially be taken advantage of by an attacker
Exploit
act of taking advantage of a vulnerability
attachment filtering
-file name or extension
-MIME content type
CIA
Confidentiality
Integrity
Availability
Log file analysis
helps organizations to better realize the value of their existing security infrastructure
RC-4
most commonly used stream cipher SSL and WEP
RC-6
symmetric key block cipher
SHA-1
Secure Hash Algorithm cyrptologic hash function
AES
Advanced Encryption Standard symmetric key encryption standard
BLOWFISH
keyed symmetric block cipher
3-DES IRT
Triple Data Encryption Algorithm, block cipher
CSM
GS-11 or above, or an officer appointed by the CO
Duties of CSM
-develops written command information and personnel security procedures, including emergency plan
-ensures all personnel execute a SF 312 prior to granting access to classified information
P -Priority
3 hours
O -Immediate
30 minutes
Z -Flash
10 minutes
R Routine
24 hours
Current system for transmitting naval message
C21OX/ AMHS/NICE/NREMS
PLA
address Naval message to specific commands
Difference between IPV4 and IPV6
number of IPs
Active Directory
-provides domain services, rights management services, federation services
-windows server, gives out-of-the-box functionality
-centrally configure administer system, user, and application settings.
token ring
-LAN technology which resides in Data-link layer of the OSI model
-3 byte frame called a token that travels around the ring
-IEEE 802.5
IEEE
Institute of Electrical and Electronics Engineers
IEEE purpose
-foster technological innovation and excellence for the benefit of humanity
-create a set of standards for the interoperability of equipment and software to enable sharing of information
-802-11 standard for wireless networking