5f. SMTP Relays
6a. Vulnerability Assessments
6b. Access a Device via a Console
6d. Conflicts with Host Base Security
7a. Intrusion Detection
100
These three items are part of the core networking services in the AFEN.
What are SMTP, Mail Relay System, and Microsoft Exchange Post Office.
100
These are generally defined as a weakness in an information system, cryptographic system, or components that could be exploited.
What are vulnerabilities?
100
These are the two methods used to access a vulnerability assessment tool.
What are GUI and CLI?
100
In Jan 2006, the AF began implementing this to significantly improve our network security and reduce costs.
What is the Federal Desktop Core Configuration (FDCC)?
100
This is an unauthorized penetration of your enterprise's network, or an individual machine address in your assigned domain.
What is a network intrusion?
200
These servers connect to an internal switch, which is located on the trusted side of the firewall. The Exchange Server and Domain Controller are connected to the same internal switch.
What is the Mail Relay Server?
200
Vulnerabilities are usually found and reported through the use of these.
What are Vulnerability Assessment Tools (VATs)?
200
This is the built-in Windows utility for starting a console connection.
What is Remote Desktop Connection?
200
This is a piece of software running on a single host that can restrict incoming and outgoing network activity for that host only.
What is a host-based firewall?
200
A system that scans, audits, and monitors the security infrastructure for signs of attacks in progress.
What is an Intrusion Detection System (IDS)?
300
This is the first line of defense against e-mail borne viruses on the CITS network.
What is Symantec Mail Security (SMS) (SMTP)?
300
It is this person's decision whether or not to proceed further with an investigation.
Who is the Commander?
300
This is the Windows (CMD) command you type on the CLI to start a console connection.
What is "mstsc"?
300
The firewalls managed by this entity will be configured to implicitly deny traffic unless explicitly permitted via access control list entries or an IP filter supporting an approved AIS/mission requirement.
Who is the INOSC?
300
This type of IDS uses network resources.
What is a Network Based IDS (NIDS)?
400
These are what users use to compose and read mail messages. AT&T's /bin/mail was the first of these for UNIX systems.
What are user agents?
400
A type of illegal act involving obtaining of something of value through willful misrepresentation.
What is fraud?
400
This is the parameter you use on the CLI to specify the computer name you are attempting to access.
What is /v? Example: "mstsc /v: REMOTEPC"
400
This is the name for something that occurs with local or host firewall configuration are opposed to network firewall configuration or group policy settings.
What is a conflict?
400
A HIDS uses a what of system objects that it should monitor.
What is a database?
500
These are hosts that either processes or forwards mail for the domain name.
What is a mail exchanger?
500
This type of information is defined as any information which the loss, misuse, unauthorized access to, or modification of could adversely affect the national interest or conduct of federal programs, or the privacy to which individuals are entitled to under the Privacy Act, but which has not been specifically authorized to be secret by an Executive Order or Act of Congress.
What is sensitive information?
500
BONUS (outside of material): This is the most common utility used to start a CLI connection with another computer on a UNIX system?
What is SSH?
500
These people have a vast responsibility to keep their systems and the data on those systems safe from misapplication.
Who are system administrators?
500
These are the three primary types of signatures a NIDS checks for.
What are string signatures, port signatures, and header signatures?
M
e
n
u