Term
Define and describe the purpose of Computer Network Operations (CNO) |
|
Definition
Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks. |
|
|
Term
Explain the need for authorization to conduct CAN |
|
Definition
Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves |
|
|
Term
Information Operations Condition (INFOCON) System |
|
Definition
A defense system based on the status of information systems used to defend against computer network attacks. |
|
|
Term
|
Definition
Attacks are taking place and the CND system is at max alertness. Any compromised systems are isolated from the rest of the network. |
|
|
Term
|
Definition
An attack has taken place but the Computer Network Defense (CND) system is not at its highest alertness. Non-essential networks may be taken offline. |
|
|
Term
|
Definition
A risk has been identified. Security review on important systems is priority. |
|
|
Term
|
Definition
Increased risk of attack. Increase monitoring of all networks |
|
|
Term
|
Definition
No apparent hostile activity against computer networks. |
|
|
Term
Navy Cyber Defense Operations Command (NCDOC) |
|
Definition
Oversees and monitors networks |
|
|
Term
Fleet Network Operations Centers (FLTNOC) |
|
Definition
Provides IP services to the fleet (PRNOC, UARNOC, ECRNOC, and IORNOC) |
|
|
Term
Theater Network Operations and Security Center (TNOSC) |
|
Definition
Single POC for regional customers |
|
|
Term
Naval Computer and Telecommunications Station (NCTS) |
|
Definition
Provides secure, reliable, and timely voice, video, and data services to U.S. Commands |
|
|
Term
State the five services provided by FLTNOCs |
|
Definition
1. IP Services
2. Email
3. Message Traffic
4. VTC
5. Voice Comms |
|
|
Term
|
Definition
Provides NOC to NOC Cutovers |
|
|
Term
State the overall controlling authority for firewall policies |
|
Definition
The overall controlling authority for firewall policies is the IAM (Information Assurance Manager) |
|
|
Term
State the instruction that governs all computer network incident responses |
|
Definition
|
|
Term
Collaboration at Sea (CAS) |
|
Definition
Provides a web based application to post mission essential information to a large group of users with low bandwidth consumption |
|
|
Term
Navy Integrated Application Suite (NIAPS) |
|
Definition
eSOMS (Tag-out Module)
SKED 3.2 (3M Program)
FSM (Food Service Management)
TORIS (Training Officer Database)
Web ATIS (Equipment Publication)
FEDLOG (Federal Logistics)
CTA (Career Tools Afloat) |
|
|
Term
NIPR Network (Non-classified Internet Protocol Router Network) |
|
Definition
Provides access to Unclassified Information (World Wide Web) |
|
|
Term
SIPR Network (Secret Internet Protocol Router Network) |
|
Definition
Provides access to Secret Information (Intellink, CAS, etc.) |
|
|
Term
JWICS (Joint Worldwide Intelligence Communications System) |
|
Definition
Provides access to TS/SCI Information |
|
|
Term
Name the four CENTRIXS enclaves |
|
Definition
Japan – For the United States and Japan
Korea – For the United States and South Korea
CMFP – For the Combines Maritime Forces, Pacific
CNFC – For the Coalition Naval Forces CENTCOM |
|
|
Term
Combined Enterprise Regional Information Exchange System (CENTRIXS) |
|
Definition
A collection of classified coalition networks, called enclaves, that enable information sharing through the use of email and Web services, instant messaging or chat, the Common Operational Picture (COP) service, and Voice over IP (VoIP). |
|
|
Term
Radiant Mercury (RADMERC) |
|
Definition
It classes and declasses information allowing users to transfer data between NIPR, SIPR, and JWICS. |
|
|
Term
capabilities of GCCS-M infrastructure |
|
Definition
COMMS1 Controls the input and output of all tracks
COMMS2 Backup of COMMS1
INTEL Utilizing INTEL apps
WEBSVR How you connect to the apps |
|
|
Term
Authorized Service Interruption (ASI) |
|
Definition
A coordinated downtime/maintenance window for infrastructure related activities with the potential of impacting the operation and/or availability of WAN services provided by DISA. |
|
|
Term
|
Definition
To identify any traffic that passes through it by recording the information from packets that pass through or drop |
|
|
Term
|
Definition
To identify any traffic that passes through by recording the on/off ship information |
|
|
Term
|
Definition
To record a list of activities it performs |
|
|
Term
Hypertext Transfer Protocol (HTTP) |
|
Definition
A communications protocol for communication over a computer network, especially with wide deployment on the Internet. |
|
|
Term
Hypertext Transfer Protocol Secure (HTTPS) |
|
Definition
A communications protocol for secure communication over a computer network, especially with wide deployment on the Internet. HTTP utilizing SSL/TLS |
|
|
Term
|
Definition
Holds and distributes files |
|
|
Term
|
Definition
Email reception and forwarding |
|
|
Term
|
Definition
Translate host names to IP addresses |
|
|
Term
|
Definition
Holds and delivers Web pages and content |
|
|
Term
|
Definition
Manages directory and all print devices on the network |
|
|
Term
Virtual Local Area Network (VLAN) |
|
Definition
Allows users on different switch ports to participate in their own network |
|
|
Term
Redundant Array of Independent Disks (RAID) |
|
Definition
Provides data redundancy or performance improvement |
|
|
Term
|
Definition
Signal sent to test connectivity |
|
|
Term
|
Definition
Like a PING, but it shows all the different hops or routers in route |
|
|
Term
|
Definition
Like a PING, but it shows all the different hops or routers in route |
|
|
Term
|
Definition
Used to list TCP/IP configurations |
|
|
Term
|
Definition
Used to access a computer remotely |
|
|
Term
List the four IP classes and range used by DoD |
|
Definition
Class A
Class B
Class C
Class D |
|
|
Term
|
Definition
IP Range: 1.X.X.X – 127.X.X.X |
|
|
Term
|
Definition
IP Range: 127.X.X.X – 191.X.X.X |
|
|
Term
|
Definition
IP Range: 192.X.X.X – 223.X.X.X |
|
|
Term
|
Definition
IP Range: 224.X.X.X – 254.X.X.X |
|
|
Term
Microsoft Internet Relay Chat (MIRC): |
|
Definition
Used on SIPR for Ship to Ship and Ship to Shore Live-Time Chat |
|
|
Term
|
Definition
Reroutes packets back to its source without intentional processing. Sometimes utilized to test a workstation’s NIC. |
|
|
Term
|
Definition
A network point that acts as an entrance to another network. |
|
|
Term
What is a private IP address?: |
|
Definition
A private IP address cannot be used or accessed on the public Internet, but can be used on local networks. |
|
|
Term
Automatic Private Internet Protocol Addressing (APIPA) |
|
Definition
With APIPA, DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn’t available. |
|
|