| Term 
 
        | Define and describe the purpose of Computer Network Operations (CNO) |  | Definition 
 
        | Includes actions taken via computer networks to protect, monitor, analyze, detect and respond to network attacks, intrusions, disruptions or other unauthorized actions that would compromise or cripple defense information systems and networks. |  | 
        |  | 
        
        | Term 
 
        | Explain the need for authorization to conduct CAN |  | Definition 
 
        | Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves |  | 
        |  | 
        
        | Term 
 
        | Information Operations Condition (INFOCON) System |  | Definition 
 
        | A defense system based on the status of information systems used to defend against computer network attacks. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Attacks are taking place and the CND system is at max alertness. Any compromised systems are isolated from the rest of the network. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | An attack has taken place but the Computer Network Defense (CND) system is not at its highest alertness. Non-essential networks may be taken offline. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A risk has been identified. Security review on important systems is priority. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Increased risk of attack. Increase monitoring of all networks |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | No apparent hostile activity against computer networks. |  | 
        |  | 
        
        | Term 
 
        | Navy Cyber Defense Operations Command (NCDOC) |  | Definition 
 
        | Oversees and monitors networks |  | 
        |  | 
        
        | Term 
 
        | Fleet Network Operations Centers (FLTNOC) |  | Definition 
 
        | Provides IP services to the fleet (PRNOC, UARNOC, ECRNOC, and IORNOC) |  | 
        |  | 
        
        | Term 
 
        | Theater Network Operations and Security Center (TNOSC) |  | Definition 
 
        | Single POC for regional customers |  | 
        |  | 
        
        | Term 
 
        | Naval Computer and Telecommunications Station (NCTS) |  | Definition 
 
        | Provides secure, reliable, and timely voice, video, and data services to U.S. Commands |  | 
        |  | 
        
        | Term 
 
        | State the five services provided by FLTNOCs |  | Definition 
 
        | 1. IP Services 
 2. Email
 
 3. Message Traffic
 
 4. VTC
 
 5. Voice Comms
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Provides NOC to NOC Cutovers |  | 
        |  | 
        
        | Term 
 
        | State the overall controlling authority for firewall policies |  | Definition 
 
        | The overall controlling authority for firewall policies is the IAM (Information Assurance Manager) |  | 
        |  | 
        
        | Term 
 
        | State the instruction that governs all computer network incident responses |  | Definition 
 | 
        |  | 
        
        | Term 
 
        | Collaboration at Sea (CAS) |  | Definition 
 
        | Provides a web based application to post mission essential information to a large group of users with low bandwidth consumption |  | 
        |  | 
        
        | Term 
 
        | Navy Integrated Application Suite (NIAPS) |  | Definition 
 
        | eSOMS (Tag-out Module) 
 SKED 3.2 (3M Program)
 
 FSM (Food Service Management)
 
 TORIS (Training Officer Database)
 
 Web ATIS (Equipment Publication)
 
 FEDLOG (Federal Logistics)
 
 CTA (Career Tools Afloat)
 |  | 
        |  | 
        
        | Term 
 
        | NIPR Network (Non-classified Internet Protocol Router Network) |  | Definition 
 
        | Provides access to Unclassified Information (World Wide Web) |  | 
        |  | 
        
        | Term 
 
        | SIPR Network (Secret Internet Protocol Router Network) |  | Definition 
 
        | Provides access to Secret Information (Intellink, CAS, etc.) |  | 
        |  | 
        
        | Term 
 
        | JWICS (Joint Worldwide Intelligence Communications System) |  | Definition 
 
        | Provides access to TS/SCI Information |  | 
        |  | 
        
        | Term 
 
        | Name the four CENTRIXS enclaves |  | Definition 
 
        | Japan – For the United States and Japan 
 Korea – For the United States and South Korea
 
 CMFP – For the Combines Maritime Forces, Pacific
 
 CNFC – For the Coalition Naval Forces CENTCOM
 |  | 
        |  | 
        
        | Term 
 
        | Combined Enterprise Regional Information Exchange System (CENTRIXS) |  | Definition 
 
        | A collection of classified coalition networks, called enclaves, that enable information sharing through the use of email and Web services, instant messaging or chat, the Common Operational Picture (COP) service, and Voice over IP (VoIP). |  | 
        |  | 
        
        | Term 
 
        | Radiant Mercury (RADMERC) |  | Definition 
 
        | It classes and declasses information allowing users to transfer data between NIPR, SIPR, and JWICS. |  | 
        |  | 
        
        | Term 
 
        | capabilities of GCCS-M infrastructure |  | Definition 
 
        | COMMS1 Controls the input and output of all tracks
 
 COMMS2
 Backup of COMMS1
 
 INTEL
 Utilizing INTEL apps
 
 WEBSVR
 How you connect to the apps
 |  | 
        |  | 
        
        | Term 
 
        | Authorized Service Interruption (ASI) |  | Definition 
 
        | A coordinated downtime/maintenance window for infrastructure related activities with the potential of impacting the operation and/or availability of WAN services provided by DISA. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | To identify any traffic that passes through it by recording the information from packets that pass through or drop |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | To identify any traffic that passes through by recording the on/off ship information |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | To record a list of activities it performs |  | 
        |  | 
        
        | Term 
 
        | Hypertext Transfer Protocol (HTTP) |  | Definition 
 
        | A communications protocol for communication over a computer network, especially with wide deployment on the Internet. |  | 
        |  | 
        
        | Term 
 
        | Hypertext Transfer Protocol Secure (HTTPS) |  | Definition 
 
        | A communications protocol for secure communication over a computer network, especially with wide deployment on the Internet. HTTP utilizing SSL/TLS
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Holds and distributes files |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Email reception and forwarding |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Translate host names to IP addresses |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Holds and delivers Web pages and content |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Manages directory and all print devices on the network |  | 
        |  | 
        
        | Term 
 
        | Virtual Local Area Network (VLAN) |  | Definition 
 
        | Allows users on different switch ports to participate in their own network |  | 
        |  | 
        
        | Term 
 
        | Redundant Array of Independent Disks (RAID) |  | Definition 
 
        | Provides data redundancy or performance improvement |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Signal sent to test connectivity |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Like a PING, but it shows all the different hops or routers in route |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Like a PING, but it shows all the different hops or routers in route |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Used to list TCP/IP configurations |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Used to access a computer remotely |  | 
        |  | 
        
        | Term 
 
        | List the four IP classes and range used by DoD |  | Definition 
 
        | Class A 
 Class B
 
 Class C
 
 Class D
 |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | IP Range: 1.X.X.X – 127.X.X.X |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | IP Range: 127.X.X.X – 191.X.X.X |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | IP Range: 192.X.X.X – 223.X.X.X |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | IP Range: 224.X.X.X – 254.X.X.X |  | 
        |  | 
        
        | Term 
 
        | Microsoft Internet Relay Chat (MIRC): |  | Definition 
 
        | Used on SIPR for Ship to Ship and Ship to Shore Live-Time Chat |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | Reroutes packets back to its source without intentional processing. Sometimes utilized to test a workstation’s NIC. |  | 
        |  | 
        
        | Term 
 | Definition 
 
        | A network point that acts as an entrance to another network. |  | 
        |  | 
        
        | Term 
 
        | What is a private IP address?: |  | Definition 
 
        | A private IP address cannot be used or accessed on the public Internet, but can be used on local networks. |  | 
        |  | 
        
        | Term 
 
        | Automatic Private Internet Protocol Addressing (APIPA) |  | Definition 
 
        | With APIPA, DHCP clients can automatically self-configure an IP address and subnet mask when a DHCP server isn’t available. |  | 
        |  |