Mob A: Common Core
Mod B: Basic Networking
Mod C: Foundational Concepts
Mod D: Linux Fundamentals
Mod E: Cyber Ops
100

This communication system used flags to send commands.

what is the wig-wag system

100

This layer handles logical addressing and routing of data between networks.

What is the Network Layer?

100

This  is a critical component of Army cybersecurity, encompassing actions taken within to defend networks or systems.

What is DCO-IDM

100

This command provide the users with detail information about another command.

What is man.

100

This is what SOC stands for.

what is Security Operation Center.

200

This military branch finds it's origin in the signal corp.

What is the Air Force.

200

This protocol prevents loops in a switched network by creating a loop-free logical topology.

What is STP (Spanning Tree Protocol)?

200

These are trusted personnel with legitimate access that pose great risk to the organization.

What is insider threat?

200

This files stores encrypted user password hashes and password aging information.

What is shadow file.

200

These are how many tiers  in a SOC.

what is 3 tiers

300

Cher Ami earned this award for saving the "Lost Battalion"

Distinguished Service Cross

300

This protocol is used for diagnostics and error reporting in IP networks, and is used by the ping command.

What is ICMP (Internet Control Message Protocol)?

300

This DA Pam covers Officer Professional Development and Career Management 

What is DA PAM 600-3

300

This essential component of an operating system acts as the bridge between hardware and applications, and is what Linux fundamentally is.

What is a kernel.

300

This tier is where an incident responder is located.

What is tier 2

400

What army command centralized global Command, Control, Communications, and Computers  (C4).

What is NETCOM

400

This is the administrative distance of OSPF.

What is 110?

400

These are the 7 stages of the cyber kill chain.

What is Recon, Weaponization, Delivery, exploitation, installation, C2, and Actions on objective.

400

This command will delete a directory and everything in it.

What is rm -r

400

This system collect and filter data, and detect, classify, analyze and investigate threats.

What is a SIEM

500

These two operations are conducted by the signal corp.

DODIN Operations and DCO

500

This is a Cisco-proprietary Layer 2 protocol used to discover information about neighboring Cisco devices.

What is CDP (Cisco Discovery Protocol)?

500

This is the purpose of the 5th stage of the cyber attack chain.

What is establish persistent access.

500

This are the rights for the group in a file with the permissions of 653. 

What is Read and Execute

500

This function produces a 160 bit hashed message.

what is SHA-1