Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
120 Cards in this Set
- Front
- Back
APPS Server
|
Application Server
|
|
FP Server
|
File and Print Server
|
|
SOP
|
Standard Operating Procedures
|
|
This type of back up all selected files and directories and clears the archives attributes
|
Full Backup
|
|
The type of back up, the software backs up only the files or directories that have changed since the last Full or Incremental Backup. Clears the archive attributes
|
Incremental Backup
|
|
This type of backup is the same as an Incremental backup, however the software doesn't clear the archive attribute, thus all the files and directories that have changed since the previous Full are backed up
|
Differential Backup
|
|
After the backup process runs, Backup Exec does what?
|
runs the verification process and displays a message upon completion indicating whether it was successful or failed
|
|
Best Practices for Back ups
|
Clean tape drives
Make sure you back up all users And Public folders daily Run a backup of all data on all drives so you can recover it in the event of a disaster |
|
What is the best resource for locating server backup documentation
|
TISCOM
|
|
Which application should be used to schedule all types of server backups?
|
Symantec Backup exec
|
|
An Incremental backup provides which advantage over a Differential Backup?
|
It uses less space on the backup media
|
|
Which if the following is not a best practice of backups?
|
NOT BACKING UP ALL USERS FOLDERS DAILY
|
|
What is the final step to properly configure a server?
|
Document this procedure in accordance with your unit's SOP
|
|
Data can be stored on a variety of media such as...
|
Tapes, Cards, or Disks
|
|
If...
Operating system was installed or re-installed |
Then restore..
All data. perform "Restore All Data" procedure using the "Restore all data" job aid |
|
If...
Non-system partition installed or re-installed |
Then restore...
Select data. Perform " Restore selected data" procedure using the "Restore Selected data" job aid |
|
If...
Non-system data was lost |
Then restore...
Select data. Perform " Restore selected data" procedure using the "Restore Selected data" job aid |
|
An Application server handles which tasks?
|
All server based software application on a USCG workstation
|
|
Which utility is used by the USCG to conduct backups for computer systems?
|
Symantec Backup Exec
|
|
Which file attributes are cleared by a Full backup?
|
Archive
|
|
What is an advantage of a Differential Backup in comparison to an Incremental Backup?
|
Less time for restores to occur
|
|
What determines the extent of data restoration when it's lost?
|
The magnitude of lost data
|
|
What happens when a shared folder is deleted?
|
The share is lost and folder must be shared again.
|
|
What will happen if a share is not recreated after a successful restore?
|
User can not access the files from the network
|
|
If non-system data is lost, which job aid should be used to perform a restore?
|
Restore selected data
|
|
Prior to documenting that a restore of all data has been completed, the technician should?
|
verify the restoration.
|
|
What is ISM?
|
Information Systems Management
|
|
When is Symantec Backup Exec installed?
|
The software is installed and configured during the initial build of the server.
|
|
Practice a restore on a _____ server to make sure that the tapes are good.
|
Test bed
|
|
When assessing documentation, several thing must be considered: Name them.
|
Currency
Applicability Intended Audience |
|
This group has the authority to provide direction and tasking to all CG units in the event of an IA incident or threat to the infrastructure?
|
TISCOM CGIA
|
|
An important part of document research is determining what situations apply to you at your unit
|
Applicability
|
|
What are the 5 W's method to determine applicability?
|
Who
What Where When Why |
|
There are several different audiences to consider for Intended Audience. Name them.
|
Users
Administrators Power Users Command Cadre |
|
What does it mean to ensure you have the most up-to-date policy documents so that the proper AIS posture can be out in place?
|
Currency
|
|
Users are required to receive a new AIS User Acknowledgement Brief and sign a User Acknowledgement Form. What's the form?
|
CG-5500A
|
|
The Brief consist of what four main sections
|
References
Executive Summary User Responsibilities Conclusion |
|
The references in the AIS User Acknowledgement Brief match those in what?
|
Performance Qualification factor 5.C.01.
|
|
Each user shall adhere to all practices contained within this brief in order to safeguard against breaches of AIS security
|
Executive Summary
|
|
This section of the acknowledgement brief is the largest and most robust and much of the user's time should be focused here.
|
User responsibility
|
|
This section ______ also identifies that the AIS User Acknowledgement conforms with what?
|
user responsibility
DoD CIO Memorandum of May 9, 2008 |
|
Action which MUST be taken prior to granting access to the CGDN+ or any other Government Information System
|
Conclusion
|
|
This was initiated in 1999 and updated in 2006 by the DoD.
|
INFOCON
|
|
System to provide a framework for an increase in measurable readiness of Government networks to match operational priorities
|
INFOCON
|
|
Routine network operations
|
INFOCON 5
|
|
Increases NetOps readiness for exercises
|
INFOCON 4
|
|
Further increases NetOps readiness by increasing the frequency of validation
|
INFOCON 3
|
|
Further increases in frequency of validation; hot spare equipment reduces downtime; impact could be significant
|
INFOCON 2
|
|
Highest readiness condition which addresses intrusion techniques that cannot be identified
|
INFOCON 1
|
|
This critical process allows the system and network admin a means to measurably restore confidence
|
Baselining
|
|
Specific procedures for each level of INFOCON can be found where
|
Chapter 4 Strategic Command Directive (SD) 527-1
|
|
Once an AIS discrepancy or Information System Incident is discovered it is imperative that proper reporting methods to who?
|
CGCIRT
Incident response team |
|
What types of events are considered incidents?
|
Attempts to gain unauthoriszed access
Denial of Service Changes to system hardware, firmware, software Malicious code and viruses |
|
Most documentation of AIS security is conducted via what?
|
Audit logs
|
|
This person is responsible to the DAA for ensuring security of an Information System throughout its life cycle
|
ISSO
Information System Security Officer |
|
A baseline report template can be downloaded from what website
|
CGIA
|
|
An event of condition with the potential to affect the security of an IT system is known as a security?
|
Firewall
|
|
A system designed to provide secure access to services, resources, or data for computers, telephones or LAN
|
Access control system
|
|
Types of restricted areas
|
Exclusion
Limited Controlled |
|
Most secure type of restricted area
|
Exclusion Area
|
|
Is the second most secure type of restricted area
|
Limited Area
|
|
The least secure type of restricted area
|
Controlled Area
|
|
What is the first layers of protection at a unit
|
Key and lock control
|
|
List the personnel that may fill the role as key control officer:
|
Commissioned Officers
Chief Warrant Officers Enlisted (E-6 or above) Civilian (GS-7 or above) |
|
How many types of key are there protected by the key control system?
|
8
|
|
When keys are not is use they shall be kept in a repository container of at least what?
|
20-gauge steel or material equivalent strength
|
|
In an event of lost, misplaced or stolen keys, all locks that could be operated by that key must what?
|
Be replaced or re-keyed immediately
|
|
Who is responsible for the implementation of the Loss/Crime Prevention Program (controlled spaces)
|
Command Security Officer
|
|
Visitor logs for CG IT systems shall be maintained on file and available for review for _____
|
One year
|
|
What does SIPRNET stand for?
|
Secure Internet Protocol Router Network
|
|
SIPRNET Users and Administrators must hold what type of clearance?
|
SECRET
|
|
What are attached to SIPRNET that are considered classified at all times?
|
Hard drives
|
|
Where do you NOT place a label on a SIPRNET hard drive?
|
Over the serial number
|
|
You do not need to be an addressee to observe SIPRNET_____
|
chat
|
|
All data on the SIPRNET must be considered _____ unless specifically marked otherwise.
|
NATO secret
|
|
All classified magnetic media shall be accounted for the assignment of a/an _____ and label
|
Inventory Control Number
|
|
The disposition of all classified material should be handled by the ______
|
CSO
|
|
What are two ways to document items destined for DRMS?
|
ETID DD-1348-2
DTID DD-1348-A |
|
What does DRMS stand for?
|
Defense Utilization & Marketing Service
|
|
What is required certifying that the hard drive has been removed or sanitized?
|
DLIS Label 1867
|
|
Which executive order allows the donation of IT equipment to local schools?
|
12999
|
|
Examples of software overwriting tools are:
|
No Trace
Data Eraser UniShred Pro CleanDrive Sanitizer |
|
A DRMS turn-in must be documented using what form?
|
DD-1348
|
|
If the hard drive is removed from the workstation, it is acceptable to use the chassis's _____when filling out the DLIS 1867
|
Serial number
|
|
The donation of IT equipment to local schools is permitted by
|
Executive order 12999
|
|
You've been tasked with researching degaussing equipment for you unit's unclassified systems IT security system. refer to what?
|
DIAP
Defense-wide Information Assurance Program |
|
An improper ground can cause what kind of problems
|
Crosstalk
Faulty Trunk operation Single line or trunk faults Dropped connections Fading, intermittent, or one way audio transmission |
|
Reduction is an overall grounding method which minimizes EMI emissions.
|
EMI Electromagnetic interference reduction
|
|
This system is essential for the proper operation of many types of telecommunication and communication equipment
|
Signal reference grounding
|
|
Color code: Hot, 115 VAC
|
Black
|
|
Color code: Neutral, return path from hot wires
|
White
|
|
Color code: Ground
|
Green/Bare
|
|
Name 2 types of circuit protection devices
|
Fused, current protection device
Fuseless, voltage limiting device |
|
Is usually 2 foot length of #24 or #26 AWG Copper cable at least two sizes smaller than the conductors being used
|
Fused protection
|
|
Protection for:
Gas tubes Solid state devices |
Fuseless Protection
|
|
Insulated
Copper No smaller than AWG No.14 Run straight as possible |
Grounding conductor
|
|
Nearest available electrode system
Buried ring ground concrete encased electrode Metal frame of a building |
Suitable grounds
|
|
The purpose of _____ is to provide a reliable low impedance path to ground for unwanted current
|
bonding
|
|
Name 2 types of Bonding Classification
|
Direct
Indirect |
|
Used when metals to be bonded cannot be places in direct contact
|
Indirect bonding
|
|
Permanent, metal to metal joint achieved by welding or brazing
|
Direct bonding
|
|
Unacceptable bonds
|
Soldered joints
Sheet metal screws or screw threads Dissimilar metals |
|
Acceptable bonds
|
lock-threaded devices with conductive gaskets
Riveted joints Tie rods |
|
What does TMGB stand for?
|
Telecommunications main Grounding busbar
|
|
The resistance of installed ground rods should exceed ___ ohms, per _______
|
25 ohms, National Electric Code
|
|
A commercially established method for joining steel railway track, reinforcing bar, copper bus bars and earth and lightening conductors
|
exothermic welding
|
|
A type of 'weld' or connection that uses a crimp tool, die, and a tap or connector
|
irreversible compression
|
|
A unique numbering & lettering designation for each element of the telecommunications infrastructure
|
Identifiers
|
|
A collection of information about or related to a specific element of the telecommunication infrastructure
|
Records
|
|
Are connection between identifiers and records and between different records
|
Linkages
|
|
BCx
CDxxx CTxxx Cxxx |
Bonding conductor
Conduit Cable tray Cable, coppper |
|
EFxxx
Erxxx Fxxx GBxxx |
Entrance Facility
Equipment room Fiber Grounding busbar |
|
HHxxx
ICxxx Jxxx MCxxx |
Handhole
Intermediate cross connect Jack Main cross connect |
|
MHxxx
PBxxx SExxx SLxxx |
Man or maintenance hole
Pull box Service entrance Sleeve |
|
Sxxx
TCxxx TGBxxx TMGBxxx WAxxx |
Splice
Telecommunications closet Telecommunications grounding busbar Telecommunications main grounding busbar Work area |
|
List 3 items found within the self-contained box of a DVL
|
The computer
Touch screen Monitor |
|
What does a DVL do?
|
Digitizes and stores incoming voice signals
|
|
How many hours of voice can be recorded on a single Magneto Optical (MO) disk?
|
460
|
|
How many ways can an operator or technician condict a system self test on the DVL?
|
2
|
|
What is the most common request received by CG IT's regarding the DVL?
|
Add a circuit
|