Executes configuration commands from the terminal.
What is configure terminal
ADUC a powerful tool that simplifies the management of Active Directory environments, making it easier for administrators to perform common administrative tasks efficiently and effectively.
What is Active Directory Users and Computers (ADUC)
What command is used to list directory contents. By default, it displays the contents of the current directory, but you can also specify a different directory as an argument.
What is ls
What command conducts independent, cooperative vulnerability assessments, analysis of advanced Cyber threats, and continuous monitoring of Navy networks in order to reduce the Navy’s cyber-attack surface.
Navy Blue Team
what is a web-based tool used by the United States Navy to access and search for scientific and technical information. It provides Navy personnel with access to a wide range of resources, including journals, technical reports, conference proceedings, and other relevant materials.
ACAS
It will show system error messages, and display debug command output to monitor logs
What is terminal monitor
Is a server in a Windows Active Directory (AD) domain that authenticates users, stores user account information, and manages security policies for a domain.
What is a Domain Controller
What command is used to display the manual pages for other commands. You can use it to get detailed information about various commands, their options, and their usage.
man
What command is responsible for Navy IW force generation and delivery to naval and joint operational commanders; IW doctrine, policy and governance; training requirements; and community management.
NAVIFOR
what is a cybersecurity strategy that employs multiple layers of defense mechanisms to protect networks, systems, and data from cyber threats.
Defense In Depth
Displays detailed neighbor information
What is show ip ospf neighbor
Is a Microsoft Management Console (MMC) snap-in used to manage Group Policy in Windows environments
What is Group Policy Management Console (GPMC)
What command is used to create directories (folders). It allows you to create one or more directories at a time.
mkdir
What commands provide a centralized location where computer, telecommunications, or satellite networks systems are monitored and managed 24x7. It is the first line of defense against network disruptions and failures.
Fleet NOCs
This is also known as a Real-time Blackhole List (RBL) or a DNS blocklist, is a mechanism used to identify and block IP addresses known to be sources of spam, malware, or other malicious activities on the internet.
DNS Black Hole List
Shows the configured access lists on the router
show ip access-lists
It's a component of Microsoft Windows that provides a graphical user interface (GUI) and a framework for hosting administrative tools, also known as snap-ins.
What is Microsoft Management Console (MMC)
what command is used to display the full path of the current working directory.
pwd
What command is a combat support agency of the United States Department of Defense (DoD). It essentially functions as the IT and communications backbone for the entire DoD, providing critical infrastructure and services to various military branches, national-level leaders, and other mission partners.
DISA
This is a centralized information technology system used by the United States Department of Defense (DoD) for managing cybersecurity-related processes, including those related to Computer Network Defense (CND).
eMASS
What command shows connected CISCO devices
a Microsoft server role that allows administrators to manage the distribution of updates and patches released by Microsoft for Windows operating systems and other Microsoft products within an organization's network
What is WSUS
what command is used to read, modify, and dynamically configure kernel parameters at runtime. These parameters are typically located under `/proc/sys/`.
sysctl
What command serves as the Navy component command to U.S. Cyber Command, the Navy space component to U.S. Strategic Command, and the Navy’s Service Cryptologic Component Commander under the National Security Agency/Central Security Service.
COMTENTHFLT
This involves encapsulating one network protocol within another for secure transmission across an untrusted network, enhancing privacy and security.
Tunneling