This communication system used flags to send commands.
what is the wig-wag system
This layer handles logical addressing and routing of data between networks.
What is the Network Layer?
This is a critical component of Army cybersecurity, encompassing actions taken within to defend networks or systems.
What is DCO-IDM
This command provide the users with detail information about another command.
What is man.
This is what SOC stands for.
what is Security Operation Center.
This military branch finds it's origin in the signal corp.
What is the Air Force.
This protocol prevents loops in a switched network by creating a loop-free logical topology.
What is STP (Spanning Tree Protocol)?
These are trusted personnel with legitimate access that pose great risk to the organization.
What is insider threat?
This files stores encrypted user password hashes and password aging information.
What is shadow file.
These are how many tiers in a SOC.
what is 3 tiers
Cher Ami earned this award for saving the "Lost Battalion"
Distinguished Service Cross
This protocol is used for diagnostics and error reporting in IP networks, and is used by the ping command.
What is ICMP (Internet Control Message Protocol)?
This DA Pam covers Officer Professional Development and Career Management
What is DA PAM 600-3
This essential component of an operating system acts as the bridge between hardware and applications, and is what Linux fundamentally is.
What is a kernel.
This tier is where an incident responder is located.
What is tier 2
What army command centralized global Command, Control, Communications, and Computers (C4).
What is NETCOM
This is the administrative distance of OSPF.
What is 110?
These are the 7 stages of the cyber kill chain.
What is Recon, Weaponization, Delivery, exploitation, installation, C2, and Actions on objective.
This command will delete a directory and everything in it.
What is rm -r
This system collect and filter data, and detect, classify, analyze and investigate threats.
What is a SIEM
These two operations are conducted by the signal corp.
DODIN Operations and DCO
This is a Cisco-proprietary Layer 2 protocol used to discover information about neighboring Cisco devices.
What is CDP (Cisco Discovery Protocol)?
This is the purpose of the 5th stage of the cyber attack chain.
What is establish persistent access.
This are the rights for the group in a file with the permissions of 653.
What is Read and Execute
This function produces a 160 bit hashed message.
what is SHA-1