• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/55

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

55 Cards in this Set

  • Front
  • Back
WHAT IS THE CONCEPT OF ORM?
Is a decision making tool used by personnel at all levels to increase effectiveness by identifying, assessing, and managing risks. By reducing the potential for loss, the probability of a successful mission is increased.
Minimizes risks to acceptable levels.
WHAT ARE THE STEPS OF ORM?
1. IDENTIFY HAZARDS
2. ASSESSING HAZARDS
3. MAKE RISK DECISIONS
4. IMPLEMENT CONTROLS
5. SUPERVISE
EXPLAIN THE SEVERITY CODES
CATEGORY I: LOSS OF ABILITY TO ACCOMPLISH THE MISSION
CATEGORY II: SIGNIFICANTLY DEGRADED MISSION CAPABILITY OR UNIT READINESS
CATEGORY III: DEGRADED MISSION CAPABILITY OR UNIT READINESS
CATEGORY IV: LITTLE OR NO ADVERSE IMPACT ON MISSION CAPABILITY OR UNIT READINESS
4 CATEGORIES OF MISSION PROBABILITY
CATEGORY A: LIKELY TO OCCUR, IMMEDIATELY OR WITHIN A SHORT PERIOD OF TIME.
CATEGORY B: PROBABLY WILL OCCUR IN TIME.
CATEGORY C: MAY OCCUR IN TIME.
CATEGORY D: UNLIKELY TO OCCUR, BUT NOT IMPOSSIBLE.
WHAT ARE THE RAC CODES
1. CRITICAL
2. SERIOUS
3. MODERATE
4. MINOR
5. NEGLIGIBLE
WHAT IS CID'S MISSION AND VISION?
TO DELIVER FULL SPECTRUM CYBER INFORMATION WARFARE, AND INTELLIGENCE TRANING TO ACHIEVE DECISION SUPERIORITY.

DRIVING GLOBAL INFORMAITON DOMINANCE FOR OUR NATION BY PROVIDING AN INNOVATIVE AND ADAPTIVE INFORMATION FORCE.
EXPLAIN THE ORGANIZATIONAL STRUCTURE AND TRAINING
CID
NMITC
FITC
CID UNIT
CID DET
CID LS
EXPLAIN THE ROLE AND RESPONSIBILITY OF THE CRYPTOLOGIC RESOURCE COORDINATOR
MANAGE DIRECT SUPPORT ELEMENTS WITHIN THE TASK FORCE; COORDINATES COVERAGE PLANS; DIRECTS REPORTING RESPONSIBILITIES FOR ALL CRYPTOLOGIC RESOURCES ASSIGNED TO THE OPERATIONAL COMMANDER.
WHAT IS CNA?
Computer Network Attack (CNA): actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves.
WHAT IS CNE?
Computer Network Exploitation (CNE): enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks.
WHAT IS GIG?
Global Information Grid (GIG): the globally interconnected, end-to-end set of information capabilities, and associated processes for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel;
WHAT IS CND?
Computer Network Defense (CND): actions taken to protect, monitor, analyze, detect, and respond to unauthorized activity within the DoD information systems and computer networks.
WHAT IS INFORMATION SECURITY
THE PROTECTION OF INFORMATION AND INFORMATION SYSTEMS FROM UNAUTHORIZED USE.
WHAT IS DEFENSE IN DEPTH?
The DON-preferred security strategy whereby layers of protection establish an adequate security posture for a system. The strategy is based on the concept that attacks that must penetrate multiple protection layers of the system are less likely to be successful.
WHAT IS A INCIDENT?
In Information Operations, an assessed event of attempted entry, unauthorized entry, or an information attack on an automated information system.
WHAT IS TIER ONE (GLOBAL)?
Provides DOD-wide CND operational direction or support to Combatant Command, Service, Agency and field activities.
WHAT IS TIER TWO (REGIONAL/THEATER)?
Provides DOD component-wide operational direction or support and responds to direction from Tier One.
WHAT IS TIER THREE (LOCAL)?
Provides local operational direction or support and responds to direction from a designated Tier Two entity
WHAT ARE THREE SERVICES OF CND?
PMADR
1. PROTECT
2. MONITOR, ANALYZE, DETECT
3. RESPONSE
WHAT IS NCDOC?
Navy Cyber Defense Operations Command (NCDOC) is the Navy’s Computer Network Defense Service Provider (CNDSP) and is governed under policy as outlined in DoD O-8530.1M, DoDI O-8530.2, CJCSM 6510.01 and NETWARCOM Instruction 5450.4.
LIST 3 TYPES OF FIREWALLS.
Packet Filtering: only examines traffic based on the packet header.
Stateful Packet Filtering: works at the network and transport layers (on the OSI model) by examining the packet header.
Application Proxies: is the most sophisticated firewall type. In addition to the features of both packet filters and stateful packet filters, it contains both a server and a client process for each protocol they support.
EXPLAIN WHAT IS AN INTRUSION DETECTION SYSTEM?
Is a device that attempts to detect intrusion into a computer or network by observation or audit.
WHAT IS A IPS?
An IPS goes one step further than an IDS and not only detects attacks but attempts to prevent them as well.
WHAT IS RC4?
(Rivest Cipher 4)- a popular streaming symmetric-key algorithm
WHAT IS RSA?
(Rivest Shamir Adleman)- an improved public-key cryptography algorithm that enables secure digital signatures
WHAT IS BLOWFISH?
A derivative of DES to try to address susceptibility to brute-force attacks
WHAT IS DES?
(Data Encryption Standard)- a symmetric-key algorithm developed by the U.S. Government in the 1970s and was formerly in use in a variety of TCP/IP applications. DES used a 64-bit block and a 56-bit key. Over time, the 56-bit key made DES susceptible to brute-force attacks.
WHAT IS THE RESPONSIBILITIES OF THE EKMS MANAGER?
EKMS Manager is responsible to the Staff COMSEC Responsibility Officer (SCMSRO) for the proper management and security of all Communications Security (COMSEC) material held at the command, and serves as the SCMSRO’s primary advisor on EKMS account management
WHAT IS A ACCOUNT CLERK?
is an individual who is designated by the CO to assist the EKMS Manager and Alternate (s) with routine administrative account matters. The appointment is not mandatory, but is at the discretion of the CO.
WHAT IS A EKMS CENTRAL FACILITY?
The Electronic Key Management System Central Facility (EKMS CF) functions primarily as a high volume key generation and distribution center.
WITH COMSEC WHAT IS THE RESPONSIBILITY OF THE DON?
administers its own CMCS, which includes Navy, Marine Corps, Coast Guard, and Military Sealift Command (MSC) EKMS Accounts. The DON system implements national policy, publishes procedures, establishes its own EKMS accounts and serves as a Service Authority (SERVAUTH) for COMSEC material.
WHAT IS THE CNO? WITH COMSEC?
has overall responsibility and authority for implementation of National COMSEC policy within the DON.
WHAT IS COMNAVNETWARCOM?
Implements the DON COMSEC PROGRAM
WHAT IS THE DIRECTOR OF COMMUNICATION SECURITY MATERIAL SYSTEMS?
administers the DON COMSEC program and is the SERVAUTH for Department Of the Navy.
WHAT ARE 3 TYPES OF COMSEC INCIDENTS?
CRYPTOGRAPHIC: COMPROMISED, SUPERSEDED, DEFECTIVE, PREVIOUSLY USED AND NOT MEANT FOR REUSE.
PERSONNEL: KNOWN AND SUSPECTED DEFECTION, KNOWN AND SUSPECTED ESPIONAGE.
PHYSICAL: THE PHYSICAL LOSS OF COMSEC MATERIAL.
WHAT IS TPI?
Two Person Integrity (TPI) is a system of handling and storing COMSEC, designed to prevent single person access.
WHAT IS ELECTRON SPILLAGE?
Electronic spillage is defined as data placed on an IT system possessing insufficient information security controls to protect the data at the required classification
WHAT IS ARE THE MOST COMMON IP ADDRESS RANGES?
The three most common Internet Protocol (IP) address classes are A, B, and C.
WHAT IS A PRIVAT IP ADDRESS?
Private IP address- the Internet Assigned Numbers Authority (IANA) has reserved certain IP addresses as private addresses for use with internal web sites or intranets. These addresses are not routable on the public Internet, but are meant for devices that reside behind a router or other network Address Translation (NAT) device or proxy server.
WHAT ARE THREE TYPE OF CONNECTION MEDIA?
COPPER CABLING: USES ELECTRICAL SIGNALS TO TRANSMIT DATA BETWEEN DEVICES.
FIBER-OPTIC CABLING: USES GLASS OR PLASTIC WIRE, ALSO CALLED FIBER, TO CARRY INFORMATION AS LIGHT PULSES.
WIRELESS CONNECTION: USES RADIO SIGNALS, INFRARED TECHNOLOGY OR SATELLITE TRANSMISSIONS.
WHAT IS DHCP?
a software utility that automatically assigns IP addresses to client devices in a network.
WHAT IS DNS?
a system that provides a way to map friendly hostnames or uniform resource locater (URL) to IP address
WHAT IS ACTIVE DIRECTORY?
A more flexible, directory service-based approach to network design allows for large distributed network environments that have a common centralized authority for network security
WHAT IS EXCHANGE SERVER?
Microsoft Exchange server is the server side of a client-server, collaborative application with major features to include: electronic mail, calendaring, contacts, and tasks. Exchange server is integrated with Active Directory and uses Active Directory as the storage mechanism for its data.
WHAT IS OWA?
Outlook Web Access (OWA):
used to access email, calendars, contacts, tasks and other mailbox content when access to Microsoft Outlook desktop is unavailable.
THREE USER MODES WITHIN THE COMMERCIAL AND INDUSTRIAL SECURITY COMPANY(CISCO) INTERNETWORK OPERATING SYSTEM (IOS) AND EXPLAIN HOW THEY ARE INDICATED.
USER MODE- THE FIRST MODE A USER HAS ACCESS TO AFTER LOGGING INTO THE ROUTER.
PRIVILEGE MODE-THE MODE ALLOWS USERS TO VIEW THE SYSTEM CONFIGURATION, RESTART THE SYSTEM, AND ENTER CONFIGURATION MODE.
CONFIGURATION MODE-THE MODE ALLOWS USERS TO MODIFY THE RUNNING SYSTEMS CONFIGURATION.
PORT 53
PORT 80
PORT 110
PORT 443
DNS
HTTP
POP
HTTPS
WHAT IS PING?
is a computer network administration utility used to test the reach ability of a host on an Internet Protocol (IP) network and to measure the round-trip time for messages sent from the originating host to a destination computer. The name comes from active sonar terminology.
WHAT IS TRACEROUTE?
is a computer network tool for measuring the route path and transit times of packets across an Internet Protocol (IP) network.
WHAT IS TELNET?
is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection.
WHAT DIRECTED NET?
WHEN OPERATING REQUIREMENTS DICTATE THAT NET STATIONS OBTAIN NET CONTROL STATION (NECOS) PERMISSION PRIOR TO TRANSMITTING, NECOS WILL CONTROL THE NET AS A DIRECTED NET.
WHAT FREE NET?
When operating conditions permit, the NECOS may direct that the net be operated as a free net.
WHAT IS THE RESPONSIBILITIES OF NECOS?
Expedite traffic flow on the net; Maintain circuit discipline; Limit transmissions to the essential minimum; Resolving disputes incident to message handling; Determine procedural discrepancies and initiate corrective action;
Conduct a roll call of stations after each frequency shift, Emission Control (EMCON) permitting
WHAT IS CIA AND CIB?
Communication Information Advisory (CIA)/Bulletin (CIB):
These bulletins are promulgated by the NCTAMS to provide accurate and readily accessible reference information on specific tactical communications subjects;
WHAT IS FTP?
Fleet Telecommunications Procedures (FTP):
These publications are issued by the NCTAMS to promulgate standard telecommunications procedures for use by communications personnel operating in a particular ocean area;