Review Notes (Miscellaneous) Flashcards

review notes taken during review session

1
Q

What is the difference between “drop” and “deny”?

A

“drop” makes it disappear, “deny” means it is blocked

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you wanted to see the layer 3 int, AP access-lists, what cmd would you run?

A

“show ip interface”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Sniffer = tcpdump but no logging. True or False?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

determines what level of permissions will be given

A

RID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

dynamically assigns IP addresses to host machines

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

converts host name into a IP address

A

A Record (Host)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

points IP address to a name

A

PTR Record (pointer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

tracks TCP (FW design)

A

Stateful Inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

no client side changes (proxy)

A

intercept/transparent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

not automatic; requires input (proxy)

A

explicit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

repository of everything (Directory Services)

A

Active Directory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

user names, machine accounts and services are examples of what? (Directory Services)

A

object types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

alias, nicknames (Directory Services)

A

Canonical Name Record (CNAME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

re-directs DNS responses, prevents response to malware, virus, etc. (Directory Services)

A

Blackhole Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

list of offending servers and publish addresses of computers/networks in spam

A

Blackhole list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

stores information on alerts, loss, list, whats in network (HBSS)

A

Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

protects against Trojans, viruses (HBSS)

A

VSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

blocks/allows programs

A

Host Intrusion Prevention System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

controls/communicates changes occuring in IT environment

A

change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

removing a proxy from BASE and FW from computers would be an example of what service management?

A

change management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

“what I did”, tracking exact state of overall IT environment (service management)

A

config management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

data centers (day-to-day system management, deliver data)

A

Area Processing Center

23
Q

24 AF, output on AFIN changes, tracked by INOSCs

A

NOTAM

24
Q

16 GWs, unit that operates AFIN

A

26th NOS

25
Q

added layer of security, can segregate things that can be vulnerable?

A

DMZ

26
Q

guidelines that can help organizations implement best practices

A

ITIL

27
Q

interface, logical partition

A

Burb

28
Q

group up to 16 mailbox servers that host a set of instructions

A

DAG

29
Q

changes are document and authorized (service management)

A

change management)

30
Q

implement the authorized changes (service management)

A

release management

31
Q

updating after approved; document current state (service management)

A

config management

32
Q

controls network core services

A

Enterprise Service Unit (ESU)

33
Q

delivers core services

A

Area Processing Center (APC) - Data Center

34
Q

What division at 624 OC generates the orders?

A

624 OC

35
Q

Who is responsible for Step 6 Assessment?

A

Begins with Battle Damage Assessment (BDA) by Combat Operations Division (MOPs), completed by SRD (MOEs)

36
Q

two types of entities in JIE enterprise directory and IDAM?

A

person, non-person

37
Q

in active directory, what can be described as a blueprint that describes each object?

A

schema

38
Q

what remotely scans, accesses systems, characterizes emerging targets?

A

Cyberspace Surveillance Package (CSP)

39
Q

What should be used when external (untrusted/less trusted) sources needed to access one of your sensors?

A

DMZ

40
Q

CTO is updated daily. True or False?

A

True

41
Q

What is the situational awareness hub for Communications/Cyber functions on most bases?

A

Communication Focal Point

42
Q

Types of DCC - P missions?

A

Combat Cyber Patrol, Pursuit, Mission, Engagement

43
Q

Who manages the BlueCoat proxy?

A

INOSCs

44
Q

every base, handles day-to-day problems as they arise

A

Communications Focal Point (CFP)

45
Q

folks that provide onsite maintenance on base as issues aries

A

Client Systems Team

46
Q

which forces are reactive in nature?

A

Cyber Alert Patrol

47
Q

administrative action when someone takes a system down for MX

A

switchover

48
Q

when devices fails, service picked up by another device

A

failover

49
Q

mail flow to server (protocol)

A

SMTP

50
Q

mirrors mailbox on location machine (protocol)

A

IMAP

51
Q

allows users to send ON BEHALF of user log (permissions)

A

Send As

52
Q

allows user to do anything to a mailbox except send an email (permission)

A

Full Access

53
Q

resolves tier 2 incidents/tickets

A

INOSC