Term
| Define and describe the purpose of Computer Network Operations (CNO) |
|
Definition
| Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks. |
|
|
Term
| Explain the need for authorization to conduct CAN |
|
Definition
| Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves |
|
|
Term
| Information Operations Condition (INFOCON) System |
|
Definition
| A defense system based on the status of information systems used to defend against computer network attacks. |
|
|
Term
|
Definition
| Attacks are taking place and the CND system is at max alertness. Any compromised systems are isolated from the rest of the network. |
|
|
Term
|
Definition
| An attack has taken place but the Computer Network Defense (CND) system is not at its highest alertness. Non-essential networks may be taken offline. |
|
|
Term
|
Definition
| A risk has been identified. Security review on important systems is priority. |
|
|
Term
|
Definition
| Increased risk of attack. Increase monitoring of all networks |
|
|
Term
|
Definition
| No apparent hostile activity against computer networks. |
|
|
Term
| Navy Cyber Defense Operations Command (NCDOC) |
|
Definition
| Oversees and monitors networks |
|
|
Term
| Fleet Network Operations Centers (FLTNOC) |
|
Definition
| Provides IP services to the fleet (PRNOC, UARNOC, ECRNOC, and IORNOC) |
|
|
Term
| Theater Network Operations and Security Center (TNOSC) |
|
Definition
| Single POC for regional customers |
|
|
Term
| Naval Computer and Telecommunications Station (NCTS) |
|
Definition
| Provides secure, reliable, and timely voice, video, and data services to U.S. Commands |
|
|
Term
| State the five services provided by FLTNOCs |
|
Definition
1. IP Services
2. Email
3. Message Traffic
4. VTC
5. Voice Comms |
|
|
Term
|
Definition
| Provides NOC to NOC Cutovers |
|
|
Term
| State the overall controlling authority for firewall policies |
|
Definition
| The overall controlling authority for firewall policies is the IAM (Information Assurance Manager) |
|
|
Term
| State the instruction that governs all computer network incident responses |
|
Definition
|
|
Term
| Collaboration at Sea (CAS) |
|
Definition
| Provides a web based application to post mission essential information to a large group of users with low bandwidth consumption |
|
|
Term
| Navy Integrated Application Suite (NIAPS) |
|
Definition
eSOMS (Tag-out Module)
SKED 3.2 (3M Program)
FSM (Food Service Management)
TORIS (Training Officer Database)
Web ATIS (Equipment Publication)
FEDLOG (Federal Logistics)
CTA (Career Tools Afloat) |
|
|
Term
| NIPR Network (Non-classified Internet Protocol Router Network) |
|
Definition
| Provides access to Unclassified Information (World Wide Web) |
|
|
Term
| SIPR Network (Secret Internet Protocol Router Network) |
|
Definition
| Provides access to Secret Information (Intellink, CAS, etc.) |
|
|
Term
| JWICS (Joint Worldwide Intelligence Communications System) |
|
Definition
| Provides access to TS/SCI Information |
|
|
Term
| Name the four CENTRIXS enclaves |
|
Definition
Japan – For the United States and Japan
Korea – For the United States and South Korea
CMFP – For the Combines Maritime Forces, Pacific
CNFC – For the Coalition Naval Forces CENTCOM |
|
|
Term
| Combined Enterprise Regional Information Exchange System (CENTRIXS) |
|
Definition
| A collection of classified coalition networks, called enclaves, that enable information sharing through the use of email and Web services, instant messaging or chat, the Common Operational Picture (COP) service, and Voice over IP (VoIP). |
|
|
Term
| Radiant Mercury (RADMERC) |
|
Definition
| It classes and declasses information allowing users to transfer data between NIPR, SIPR, and JWICS. |
|
|
Term
| capabilities of GCCS-M infrastructure |
|
Definition
COMMS1 Controls the input and output of all tracks
COMMS2 Backup of COMMS1
INTEL Utilizing INTEL apps
WEBSVR How you connect to the apps |
|
|
Term
| Authorized Service Interruption (ASI) |
|
Definition
| A coordinated downtime/maintenance window for infrastructure related activities with the potential of impacting the operation and/or availability of WAN services provided by DISA. |
|
|
Term
|
Definition
| To identify any traffic that passes through it by recording the information from packets that pass through or drop |
|
|
Term
|
Definition
| To identify any traffic that passes through by recording the on/off ship information |
|
|
Term
|
Definition
| To record a list of activities it performs |
|
|
Term
| Hypertext Transfer Protocol (HTTP) |
|
Definition
| A communications protocol for communication over a computer network, especially with wide deployment on the Internet. |
|
|
Term
| Hypertext Transfer Protocol Secure (HTTPS) |
|
Definition
A communications protocol for secure communication over a computer network, especially with wide deployment on the Internet. HTTP utilizing SSL/TLS |
|
|
Term
|
Definition
| Holds and distributes files |
|
|
Term
|
Definition
| Email reception and forwarding |
|
|
Term
|
Definition
| Translate host names to IP addresses |
|
|
Term
|
Definition
| Holds and delivers Web pages and content |
|
|
Term
|
Definition
| Manages directory and all print devices on the network |
|
|
Term
| Virtual Local Area Network (VLAN) |
|
Definition
| Allows users on different switch ports to participate in their own network |
|
|
Term
| Redundant Array of Independent Disks (RAID) |
|
Definition
| Provides data redundancy or performance improvement |
|
|
Term
|
Definition
| Signal sent to test connectivity |
|
|
Term
|
Definition
| Like a PING, but it shows all the different hops or routers in route |
|
|
Term
|
Definition
| Like a PING, but it shows all the different hops or routers in route |
|
|
Term
|
Definition
| Used to list TCP/IP configurations |
|
|
Term
|
Definition
| Used to access a computer remotely |
|
|
Term
| List the four IP classes and range used by DoD |
|
Definition
Class A
Class B
Class C
Class D |
|
|
Term
|
Definition
| IP Range: 1.X.X.X – 127.X.X.X |
|
|
Term
|
Definition
| IP Range: 127.X.X.X – 191.X.X.X |
|
|
Term
|
Definition
| IP Range: 192.X.X.X – 223.X.X.X |
|
|
Term
|
Definition
| IP Range: 224.X.X.X – 254.X.X.X |
|
|
Term
| Microsoft Internet Relay Chat (MIRC): |
|
Definition
| Used on SIPR for Ship to Ship and Ship to Shore Live-Time Chat |
|
|
Term
|
Definition
| Reroutes packets back to its source without intentional processing. Sometimes utilized to test a workstation’s NIC. |
|
|
Term
|
Definition
| A network point that acts as an entrance to another network. |
|
|
Term
| What is a private IP address?: |
|
Definition
| A private IP address cannot be used or accessed on the public Internet, but can be used on local networks. |
|
|
Term
| Automatic Private Internet Protocol Addressing (APIPA) |
|
Definition
| With APIPA, DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn’t available. |
|
|