Shared Flashcard Set

Details

CDC'S 3D151 Volume 3
Volume 3 unit 1
41
Computer Networking
Not Applicable
03/04/2014

Additional Computer Networking Flashcards

 


 

Cards

Term
1. What is crosstalk and what are two ways to reduce it?
Definition
Occurs when a signal is induced into one circuit from another; physical separation of open wire pairs or
insulating conductors and twisting them together.
Term
2. What is the most commonly used cabling?
Definition
Unshielded twisted pair (UTP).
Term
3. What standard categorizes cabling?
Definition
ANSI/TIA/EIA–568.
Term
4. What principles does the ANSI/TIA/EIA–568–B standard address?
Definition
Subsystems of structured cabling, minimum requirements for telecommunications cabling, installation
methods and practices, connector and pin assignments, life span of a telecommunications cabling system
(should exceed 10 years), media types and performance specifications for horizontal and backbone cabling,
connecting hardware performance specifications, recommended topology and distances, and definitions of
cabling elements (horizontal cable, cross-connects, equipment rooms, etc).
Term
5. What test is performed to determine the time needed for the transmission of signal to travel the length of a single pair of wires?
Definition
Propagation delay.
Term
1. What are the six subsystems of a structured cabling system per ANSI/TIA/EIA–568–B?
Definition
. Entrance facilities, equipment rooms, backbone cabling, telecommunications rooms, horizontal cabling, and
work areas.
Term
2. What is the standard used for labeling cables?
Definition
ANSI/TIA/EIA–606–A.
Term
1. When must a secure means of information transference be used?
Definition
When information systems or networks that process classified national security information in more than
one controlled access area (CAA) require the transfer of that information between the CAAs.
Term
2. Who is legally responsible for the operation of the PDS and the security of the information traversing it?
Definition
The Designated Approval Authority (DAA).
Term
3. In the RED/BLACK concept, what are BLACK lines?
Definition
Lines that carry either encrypted classified or unclassified traffic.
Term
4. What is EMSEC?
Definition
The protection to deny unathorized personnel national security information of value that might be derived
from communications systems and cryptographic equipment and their compromising emanations.
Term
5. What is a CAA?
Definition
The complete building or facility area under direct physical control within which unauthorized persons are
denied unrestricted access and are either escorted by authorized persons or are under continuous physical or
electronic surveillance. In this area, only personnel authorized to the level of the classified information
being processed are allowed unescorted access.
Term
6. What does operating a PDS require?
Definition
Countinuous physical security integrity.
Term
7. What is a PDS line route inspection?
Definition
A close visual inspection of the PDS for signs of penetration, tampering, and any other anomaly that may
cause a deterioration of protection safeguards.
Term
1. Voice encryption telephone devices are designed for what?
Definition
To operate reliably with high-voice quality as both ordinary and secure telephones over the public switched
telephone network (PSTN).
Term
2. What is the difference between data and voice encryption?
Definition
Voice is encrypted before it leaves the source, and data is encrypted by an encryption device which is
separate from the source (e.g., a computer).
Term
3. What are the two basic components of cryptology?
Definition
An algorithm and a key.
Term
4. In an asymmetric system, all communications involve what?
Definition
Only public keys.
Term
5. In combination encryption, what are certificates?
Definition
Digitally signed data structures that bind the identity of the certificate holder to a public key.
Term
6. Explain a user’s browser to web server encryption sequence?
Definition
The web server gives the browser its public key. The browser encrypts transmissions to the web server with
the server’s public-key. The web server then uses its private-key to decrypt the client’s transmissions. The
browser also creates a public and private key and sends the web-server its public key. SSL uses third party
Certification Authorities to identify and authenticate web surfers and web servers.
Term
7. Explain Data Encryption Standard (DES).
Definition
It is a publicly known cryptographic algorithm that converts plaintext into ciphertext using a key that
consists of 64 bits. Of these, 56 bits are randomly generated and used directly by the algorithm. The extra
eight bits are used for error detection. The system uses algorithm operations that mix the data and keys
together.
Term
8. Why is Advanced Encryption System (AES) better than DES?
Definition
AES uses the Rijndael algorithm which utilizes 128-bit, 192-bit, and 256-bit key lengths, and DES only
uses 64-bits.
Term
9. What are the four types of encryption for telecommunications systems?
Definition
Wideband, narrowband, bulk and network.
Term
1. What is the definition of COMSEC?
Definition
The measures and controls taken to deny unauthorized persons information derived from information
systems of the US Government related to national security and ensure the authenticity of these information
systems.
Term
2. How does TRANSEC relate to COMSEC?
Definition
It is the component of COMSEC resulting from the application of measures designed to protect information
systems traffic from the interception and exploitation by means other than crypto-analysis.
Term
3. What is critical information?
Definition
Specific facts about friendly intentions, capabilities, and activities vitally needed by adversaries for them to
plan and act effectively to guarantee failure or unacceptable consequences for friendly mission
accomplishment.
Term
4. Explain the two-person integrity system.
Definition
It is a storage and handling system that prohibits access to COMSEC keying material to unaccompanied
individuals. TPI procedures require the presence of at least two authorized persons who both know TPI
procedures and can detect incorrect or unauthorized security procedures for the performed task.
Term
5. What is AFCOMSEC Form 16 used for?
Definition
. To account for and create an inventory of COMSEC material by short title, edition, accounting control
number, and quantity.
Term
6. What should you look for before you open a COMSEC package?
Definition
Make sure there is no evidence of tampering or forced entry.
Term
7. What is AF Form 1109 used for?
Definition
To record visitors into restricted areas.
Term
1. What is the newest generation of secure voice and data equipment designed for use on advanced
digital communications networks such as the Integrated Services Digital Network (ISDN)?
Definition
Secure Terminal Equipment (STE)
Term
2. What is the security core for the STE?
Definition
KOV-14 cryptographic card (Fortezza card).
Term
3. When not in use, how must the Fortezza card be stored?
Definition
Separately from the STE in an approved security container.
Term
4. In a KIV–7, what prevents unauthorized access and protects all internally stored keys?
Definition
A removable cryptographic ignition key (CIK).
Term
5. What happens in ESP tunnel mode?
Definition
The original IP datagram is placed in the encrypted portion of the ESP and that entire frame is placed
within a datagram having unencrypted IP headers.
Term
6. What are the maximum throughputs of the TACLANE–Classic and TACLANE–E100?
Definition
TACLANE Classic is 44.736 Mbps for ATM and 7 Mbps for IP, and TACLANE-E100 provides a
maximum aggregate throughput of 165 Mbps full-duplex, or 100 Mbps half-duplex.
Term
7. Where can a KG-175D get its IP address via DHCP?
Definition
From a DHCP server on either the ciphertext or plaintext side.
Term
8. Where can TACLANEs be used to overlay Secure Virtual Networks?
Definition
On top of existing public and private network infrastructures.
Term
1. What are fill devices used for?
Definition
Storing and loading cryptographic keying material.
Term
2. The AN/CYZ–10 is a single replacement for the common fill devices capable of doing what?
Definition
Receiving, storing, and transferring variables.
Term
3. What device functions like a PDA with a 400 MHz processor and Windows CE operating
system?
Definition
The AN/PYQ–10 Simple Key Loader (SKL).
Supporting users have an ad free experience!