• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/120

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

120 Cards in this Set

  • Front
  • Back
APPS Server
Application Server
FP Server
File and Print Server
SOP
Standard Operating Procedures
This type of back up all selected files and directories and clears the archives attributes
Full Backup
The type of back up, the software backs up only the files or directories that have changed since the last Full or Incremental Backup. Clears the archive attributes
Incremental Backup
This type of backup is the same as an Incremental backup, however the software doesn't clear the archive attribute, thus all the files and directories that have changed since the previous Full are backed up
Differential Backup
After the backup process runs, Backup Exec does what?
runs the verification process and displays a message upon completion indicating whether it was successful or failed
Best Practices for Back ups
Clean tape drives
Make sure you back up all users
And Public folders daily
Run a backup of all data on all drives so you can recover it in the event of a disaster
What is the best resource for locating server backup documentation
TISCOM
Which application should be used to schedule all types of server backups?
Symantec Backup exec
An Incremental backup provides which advantage over a Differential Backup?
It uses less space on the backup media
Which if the following is not a best practice of backups?
NOT BACKING UP ALL USERS FOLDERS DAILY
What is the final step to properly configure a server?
Document this procedure in accordance with your unit's SOP
Data can be stored on a variety of media such as...
Tapes, Cards, or Disks
If...
Operating system was installed or re-installed
Then restore..
All data. perform "Restore All Data" procedure using the "Restore all data" job aid
If...
Non-system partition installed or re-installed
Then restore...
Select data. Perform " Restore selected data" procedure using the "Restore Selected data" job aid
If...
Non-system data was lost
Then restore...
Select data. Perform " Restore selected data" procedure using the "Restore Selected data" job aid
An Application server handles which tasks?
All server based software application on a USCG workstation
Which utility is used by the USCG to conduct backups for computer systems?
Symantec Backup Exec
Which file attributes are cleared by a Full backup?
Archive
What is an advantage of a Differential Backup in comparison to an Incremental Backup?
Less time for restores to occur
What determines the extent of data restoration when it's lost?
The magnitude of lost data
What happens when a shared folder is deleted?
The share is lost and folder must be shared again.
What will happen if a share is not recreated after a successful restore?
User can not access the files from the network
If non-system data is lost, which job aid should be used to perform a restore?
Restore selected data
Prior to documenting that a restore of all data has been completed, the technician should?
verify the restoration.
What is ISM?
Information Systems Management
When is Symantec Backup Exec installed?
The software is installed and configured during the initial build of the server.
Practice a restore on a _____ server to make sure that the tapes are good.
Test bed
When assessing documentation, several thing must be considered: Name them.
Currency
Applicability
Intended Audience
This group has the authority to provide direction and tasking to all CG units in the event of an IA incident or threat to the infrastructure?
TISCOM CGIA
An important part of document research is determining what situations apply to you at your unit
Applicability
What are the 5 W's method to determine applicability?
Who
What
Where
When
Why
There are several different audiences to consider for Intended Audience. Name them.
Users
Administrators
Power Users
Command Cadre
What does it mean to ensure you have the most up-to-date policy documents so that the proper AIS posture can be out in place?
Currency
Users are required to receive a new AIS User Acknowledgement Brief and sign a User Acknowledgement Form. What's the form?
CG-5500A
The Brief consist of what four main sections
References
Executive Summary
User Responsibilities
Conclusion
The references in the AIS User Acknowledgement Brief match those in what?
Performance Qualification factor 5.C.01.
Each user shall adhere to all practices contained within this brief in order to safeguard against breaches of AIS security
Executive Summary
This section of the acknowledgement brief is the largest and most robust and much of the user's time should be focused here.
User responsibility
This section ______ also identifies that the AIS User Acknowledgement conforms with what?
user responsibility

DoD CIO Memorandum of May 9, 2008
Action which MUST be taken prior to granting access to the CGDN+ or any other Government Information System
Conclusion
This was initiated in 1999 and updated in 2006 by the DoD.
INFOCON
System to provide a framework for an increase in measurable readiness of Government networks to match operational priorities
INFOCON
Routine network operations
INFOCON 5
Increases NetOps readiness for exercises
INFOCON 4
Further increases NetOps readiness by increasing the frequency of validation
INFOCON 3
Further increases in frequency of validation; hot spare equipment reduces downtime; impact could be significant
INFOCON 2
Highest readiness condition which addresses intrusion techniques that cannot be identified
INFOCON 1
This critical process allows the system and network admin a means to measurably restore confidence
Baselining
Specific procedures for each level of INFOCON can be found where
Chapter 4 Strategic Command Directive (SD) 527-1
Once an AIS discrepancy or Information System Incident is discovered it is imperative that proper reporting methods to who?
CGCIRT
Incident response team
What types of events are considered incidents?
Attempts to gain unauthoriszed access
Denial of Service
Changes to system hardware, firmware, software
Malicious code and viruses
Most documentation of AIS security is conducted via what?
Audit logs
This person is responsible to the DAA for ensuring security of an Information System throughout its life cycle
ISSO
Information System Security Officer
A baseline report template can be downloaded from what website
CGIA
An event of condition with the potential to affect the security of an IT system is known as a security?
Firewall
A system designed to provide secure access to services, resources, or data for computers, telephones or LAN
Access control system
Types of restricted areas
Exclusion
Limited
Controlled
Most secure type of restricted area
Exclusion Area
Is the second most secure type of restricted area
Limited Area
The least secure type of restricted area
Controlled Area
What is the first layers of protection at a unit
Key and lock control
List the personnel that may fill the role as key control officer:
Commissioned Officers
Chief Warrant Officers
Enlisted (E-6 or above)
Civilian (GS-7 or above)
How many types of key are there protected by the key control system?
8
When keys are not is use they shall be kept in a repository container of at least what?
20-gauge steel or material equivalent strength
In an event of lost, misplaced or stolen keys, all locks that could be operated by that key must what?
Be replaced or re-keyed immediately
Who is responsible for the implementation of the Loss/Crime Prevention Program (controlled spaces)
Command Security Officer
Visitor logs for CG IT systems shall be maintained on file and available for review for _____
One year
What does SIPRNET stand for?
Secure Internet Protocol Router Network
SIPRNET Users and Administrators must hold what type of clearance?
SECRET
What are attached to SIPRNET that are considered classified at all times?
Hard drives
Where do you NOT place a label on a SIPRNET hard drive?
Over the serial number
You do not need to be an addressee to observe SIPRNET_____
chat
All data on the SIPRNET must be considered _____ unless specifically marked otherwise.
NATO secret
All classified magnetic media shall be accounted for the assignment of a/an _____ and label
Inventory Control Number
The disposition of all classified material should be handled by the ______
CSO
What are two ways to document items destined for DRMS?
ETID DD-1348-2
DTID DD-1348-A
What does DRMS stand for?
Defense Utilization & Marketing Service
What is required certifying that the hard drive has been removed or sanitized?
DLIS Label 1867
Which executive order allows the donation of IT equipment to local schools?
12999
Examples of software overwriting tools are:
No Trace
Data Eraser
UniShred Pro
CleanDrive
Sanitizer
A DRMS turn-in must be documented using what form?
DD-1348
If the hard drive is removed from the workstation, it is acceptable to use the chassis's _____when filling out the DLIS 1867
Serial number
The donation of IT equipment to local schools is permitted by
Executive order 12999
You've been tasked with researching degaussing equipment for you unit's unclassified systems IT security system. refer to what?
DIAP
Defense-wide Information Assurance Program
An improper ground can cause what kind of problems
Crosstalk
Faulty Trunk operation
Single line or trunk faults
Dropped connections
Fading, intermittent, or one way audio transmission
Reduction is an overall grounding method which minimizes EMI emissions.
EMI Electromagnetic interference reduction
This system is essential for the proper operation of many types of telecommunication and communication equipment
Signal reference grounding
Color code: Hot, 115 VAC
Black
Color code: Neutral, return path from hot wires
White
Color code: Ground
Green/Bare
Name 2 types of circuit protection devices
Fused, current protection device
Fuseless, voltage limiting device
Is usually 2 foot length of #24 or #26 AWG Copper cable at least two sizes smaller than the conductors being used
Fused protection
Protection for:
Gas tubes
Solid state devices
Fuseless Protection
Insulated
Copper
No smaller than AWG No.14
Run straight as possible
Grounding conductor
Nearest available electrode system
Buried ring ground
concrete encased electrode
Metal frame of a building
Suitable grounds
The purpose of _____ is to provide a reliable low impedance path to ground for unwanted current
bonding
Name 2 types of Bonding Classification
Direct
Indirect
Used when metals to be bonded cannot be places in direct contact
Indirect bonding
Permanent, metal to metal joint achieved by welding or brazing
Direct bonding
Unacceptable bonds
Soldered joints
Sheet metal screws or screw threads
Dissimilar metals
Acceptable bonds
lock-threaded devices with conductive gaskets
Riveted joints
Tie rods
What does TMGB stand for?
Telecommunications main Grounding busbar
The resistance of installed ground rods should exceed ___ ohms, per _______
25 ohms, National Electric Code
A commercially established method for joining steel railway track, reinforcing bar, copper bus bars and earth and lightening conductors
exothermic welding
A type of 'weld' or connection that uses a crimp tool, die, and a tap or connector
irreversible compression
A unique numbering & lettering designation for each element of the telecommunications infrastructure
Identifiers
A collection of information about or related to a specific element of the telecommunication infrastructure
Records
Are connection between identifiers and records and between different records
Linkages
BCx
CDxxx
CTxxx
Cxxx
Bonding conductor
Conduit
Cable tray
Cable, coppper
EFxxx
Erxxx
Fxxx
GBxxx
Entrance Facility
Equipment room
Fiber
Grounding busbar
HHxxx
ICxxx
Jxxx
MCxxx
Handhole
Intermediate cross connect
Jack
Main cross connect
MHxxx
PBxxx
SExxx
SLxxx
Man or maintenance hole
Pull box
Service entrance
Sleeve
Sxxx
TCxxx
TGBxxx
TMGBxxx
WAxxx
Splice
Telecommunications closet
Telecommunications grounding busbar
Telecommunications main grounding busbar
Work area
List 3 items found within the self-contained box of a DVL
The computer
Touch screen
Monitor
What does a DVL do?
Digitizes and stores incoming voice signals
How many hours of voice can be recorded on a single Magneto Optical (MO) disk?
460
How many ways can an operator or technician condict a system self test on the DVL?
2
What is the most common request received by CG IT's regarding the DVL?
Add a circuit