SAAR/ AUP
ATCTS
Accounts
Active Directory
CIA Triad/PKI/OU
Security/Distribution Groups and GPO
Exchange Server​
100

What is the Army IT User Access Agreement used for?

To allow access to Department of Defense (DoD) information systems.


100

What does ATCTS stand for? 

Army Training and Certification Tracking System (ATCTS)

100

What is a user account?  

An identity created for a person in a computer or computing system

100

What is Active Directory?

Active Directory (AD) is an umbrella term for a collection of Windows Services used to manage, a primarily Windows environments.

100

What is the purpose of an Organizational Unit?

OUs are used to group objects, such as users, groups, computers, and other OUs, for administrative purposes

100

What is Group Policy

Group Policy is a feature of Windows that facilitates a wide variety of advanced settings that system administrators can use to control the working environment of users and computers in Active Directory

100

First ever email sent was when?

1971; sent by Ray Tomlinson

200

What is the name of a DD Form 2875?

System Authorization Access Request (SAAR)

200

Who has access to ATCTS?

Military personnel, DoD Civilians and Contractors

200

What are the three types of User Accounts?

Visitor/Guest User Account: primarily used for people who need temporary use of a computer

Standard User Account: utilized for everyday users of an organization

Privileged User Account: provide the most control over a computer and should only be used when necessary

200

What is responsible for authenticating users and devices on the network?

 Domain Controller (DC)

200

What does PKI stand for? 

Public key infrastructure

200

What is the difference between a permission and a right?

Permission: Assigned to the security group for the shared resource, determines level of access

Rights: Automatically assigned/granted to you upon getting an account or access to a system.

200

What is Microsoft Exchange Server?

Microsoft Exchange is an email server (service) that runs on a Windows Server operating system

300

What training is submitted with the DD Form 2875?

Cyber Awareness Training  

300

What is the purpose of ATCTS?

Provides managers at all levels a report and manage their IA Workforce and General User population training and certification statistics and a summary report of certification voucher distribution

300

What does decommission mean?

To permanently remove an account is to Decommission it. Deleting an account is permanent and cannot be undone. The account’s profile information and settings are completely removed.

300

What is a domain in AD? 

A domain is a partition in an Active Directory forest that refers to any group of users, workstations, and devices that share different types of data via network resources. NOTE: These are referred to as OBJECTS in AD Some other functions of the domain

300

What does the acronym CIA stand for?

  • Confidentiality: protection of information in the system so that an unauthorized person cannot access it

  • Integrity: The protection of system data from intentional or accidental unauthorized changes; ensuring data is trustworthy and untampered 

  • Availability: the guaranty that a computer system is available or accessible by an authorized user whenever it is needed; maintaining data accessibility 

300

What are the three types of Security Groups?

Universal, Global, and Domain Local

300

What is Microsoft Outlook?

Microsoft Outlook is a Microsoft email client/application.

400

Name the parts of an Army IT User Access Agreement:

Part I-Acknowledgement and consent 

Part II- Information System Access

Part III- Acknowledgement with Signature

400

Describe the benefits of ATCTS:

  • Automates tracking users' certifications

  • Allows users and IA users to link Certifications (Security +, Network+, CISSP)

  • Allows ATCTS managers to look at users in domain profile

400

What reasons would cause you to Decommission a User Account?

Permanent Change of Station (PCS)

Expiration Term of Service (ETS) 

Retirement

400

List some AD Service Accounts Best Practices (5).

  1. Keep access limited.

  1. Create service accounts from scratch.

  2. Do not use templates or prior created accounts.

  3. Control password configuration.

  4. Enable auditing.


400

What are the two types of Cryptographic algorithms?

Symmetric Encryption 

Asymmetric Encryption

400

What is the difference between a dynamic and a regular distribution group?

Dynamic distribution group is based on a set of filters or conditions

Regular distribution group is set manually

400

What is Exchange Admin Center (EAC)?

The EAC is a web-based management console for managing Exchange Server

500

Define revocability as it pertains to the Army IT User Access Agreement:

Revocability is Access to Army resources is a revocable privilege and is subject to content monitoring and security testing.

500

Describe the benefits of ATCTS:

  • Database that holds all users’ network required documents

  • Cyber Awareness Training

  • Army IT User Access Agreement

  • Stores the DD2875 

500

What does modifying an account consist of?

Changing, altering, enabling, or disabling an account

500

Describe a forest and a tree:

A Forest is a collection of one or more Domain Trees that share a common logical structure, directory schema. Domains in the same forest are automatically linked with two-way, transitive trust relationships. 

A Tree is made up of several domains that share a common configuration, forming a contiguous namespace.

500

What is the difference between Symmetric and Asymmetric Encryption?

Symmetric Encryption: Use a shared key to encrypt and decrypt a message. 

Asymmetric Encryption: Requires a private key decrypt and a public key encrypt. 

500

What are some common uses of Symmetric Encryption and Asymmetric Encryption? 

Symmetric: Banking and Data storage 

Asymmetric: Digital Signatures and Blockchains

500

What does Microsoft Outlook offer?

Offers email, global address book/list, calendar, meeting scheduling, and task management