Shared Flashcard Set

Details

3D052 Vol. 1 URE's
Volume 1 Unit Reveiw Exercises
100
Computer Networking
Professional
08/26/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
What is the minimum number of computers needed for a computer network?
Definition
2
Term
What is a privately-owned network whose access is restricted to authorized personnel is
called?
Definition
Intranetwork.
Term
What type of network environments consist of computer systems from different vendors that
run different operating systems and communication protocols?
Definition
Heterogeneous network
Term
What type of network is made up of components from the same vendor or compatible
equipment that all run under the same operating system or network operating system?
Definition
Homogeneous network.
Term
What is a communications network that serves users within a confined geographical area?
Definition
Local area network (LAN)
Term
What type of communications network links a broad geographical region?
Definition
Wide area network (WAN)
Term
What type of communications network links different interconnected networks over an
unlimited geographical region?
Definition
Global area network (GAN)
Term
How many users are normally in a peer-to-peer network?
Definition
2-10
Term
How many users are in a single-server network?
Definition
10-50
Term
How many users are in a multi-server network?
Definition
50-250
Term
How many users are in a multi-server high-speed backbone network?
Definition
250-1000
Term
What type of communications network links geographically dispersed offices in other cities
or around the globe?
Definition
Enterprise network
Term
What is used to identify network nodes on a physically connected network?
Definition
Media access control list
Term
How many octets is the standard internet protocol broken down into?
Definition
4
Term
What is the binary equivalent to the dotted decimal number 96?
Definition
01100000
Term
What is the host id of internet protocol (IP) address 131.10.230.120/24?
Definition
131.10.230.0
Term
What is the host id of internet protocol (IP) address 131.10.230.120/24?
Definition
0.0.0.120
Term
How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask?
Definition
64
Term
What series of Air Force instruction series covers communications and information?
Definition
33
Term
What Air Force instruction provides policy, direction, and structure for the Air Force global
information grid (AF-GIG)?
Definition
AFI-33-115v1
Term
According to the Air Force network structure, what tier is the Air Force network operations
center (AFNOSC)?
Definition
1
Term
What network entity provides reliable, secure networks and network services for base level
customers?
Definition
Network control center
Term
What is defined as a bundle of application software designed to significantly improve
network efficiency and productivity?
Definition
network management server
Term
Which of the following are the three most common network management architectures?
Definition
Centralized, hierarchical, and distributed
Term
What network architecture has a network management platform on one computer system at
a location that is responsible for all network management duties?
Definition
Centralized
Term
What network architecture uses multiple systems for network management, with one system
acting as a central server and the others working as clients?
Definition
Hierarchical
Term
What level of network management activity are you working at when you as the network
manager are monitoring and troubleshooting components to eliminate the side-effect alarms and
isolate problems to a root cause?
Definition
Interactive
Term
What level of network management activity are you working at when the automated
monitoring of components provides problem analysis, giving a root cause alarm for the problem
at-hand?
Definition
Proactive
Term
Performance management can be broke into what two separate functional categories?
Definition
Monitoring and tuning
Term
Which function of performance management tracks historical data by tracking activities on
the network?
Definition
Monitoring
Term
What network management area is concerned with controlling access points to information?
Definition
Security
Term
What is the established to distinguish between errors that fall within a normal range and
excessive errors because of a fault?
Definition
Tolerance parameters
Term
Network management protocols are designed (in most cases) to reside above what layer of
the operational system interface (OSI) model?
Definition
Session
Term
What is a hierarchical structured format that defines the network management information
available from network devices?
Definition
Management information base
Term
What area of the simple network management protocol (SNMP) tree structure is reserved
for vendors related label and leaf objects associated with specific manufactured equipment?
Definition
Private
Term
What simple network management protocol (SNMP) node is responsible for monitoring,
collecting and reporting management data to the management system?
Definition
Agent
Term
What operational simple network management protocol (SNMP) message asks for a
specific instance of management information?
Definition
Get
Term
What operational simple network management protocol (SNMP) message is used to retrieve
multiple pieces of information with minimal overhead?
Definition
GetNext
Term
What operational simple network management protocol (SNMP) message is used to modify
the value of one or more instances of management information?
Definition
Set
Term
What operational simple network management protocol (SNMP) message is an unsolicited
message from an agent to the manager?
Definition
Trap
Term
What is the type of probe that collects inter-device connectivity information using
proprietary topology management information bases (MIB)?
Definition
Neighbor probe
Term
What is the centerpiece of a systems management automated report tracking system
(SMARTS) application?
Definition
Domain manager
Term
What component of the systems management automated report tracking system (SMARTS)
application contains knowledge of available domain managers?
Definition
Broker
Term
What are the three types of systems management automated report tracking system
(SMARTS) notifications?
Definition
Compound events, problems, and symptomatic events
Term
What color on the systems management automated report tracking system (SMARTS)
alarm log indicates one or more events?
Definition
Purple
Term
How many different categories of information does the performance monitor provide you
about your network?
Definition
21
Term
What device provides a capability for digital network diagnostics and developing
communications software?
Definition
Protocal Analyzer
Term
What provides information concerning the network utilization and frame errors that are
related to a specific protocol?
Definition
Protocol statistics
Term
What reports errors that occur at the physical layer such as bad frame check sequence
(FCS), short frames, and jabbers?
Definition
Media access control(MAC) node statistics
Term
What automatically runs in the background when the protocol analyzer application is
activated?
Definition
Node discovery
Term
What provides information concerning the bandwidth utilization and the number of
connections that are related to specific nodes?
Definition
Connection statistics
Term
What is a measure used to verify the eligibility of a subject and the ability of the subject to
access certain information?
Definition
Authentication
Term
What are three primary ways to authenticate one-self?
Definition
Something you know, something you have, or something you are
Term
Knowledge-based identification and authentication methods require the user to provide
something you
Definition
know
Term
The Air Force requires a network password to be at least how many characters long?
Definition
9
Term
What regulation covers remanence security?
Definition
AFSSI 8580
Term
Storage media that retains data after power is removed is considered
Definition
sensitive
Term
Which standard form is used to annotate storage media has been sanitized?
Definition
711
Term
Who can declassify storage media that has been sanitized?
Definition
Information owner
Term
What is the process of physically damaging the media to render it unusable in a computer
and render the data on the media irretrievable by any known exploitation methods?
Definition
Destroying
Term
What is the process of erasing magnetic media by reducing the magnetic flux to virtual zero
by applying a reverse magnetizing field?
Definition
Degaussing
Term
What is the preferred method of sanitizing magnetic media?
Definition
Degaussing
Term
What is a comprehensive evaluation and validation of an Air Force information system (IS)
to establish the degree to which it complies with assigned information assurance (IA) controls
based on standardized procedures?
Definition
Certification
Term
What is a formal declaration by a designated approving official (DAA) that an information
system is approved to operate in a particular security mode using a prescribed set of safeguards at
an acceptable level of risk?
Definition
Accredidation
Term
What is the Department of Defense process for certifying and accrediting information
systems to operate on the global information grid (GIG)?
Definition
Department of Defense Information Assurance Certification and Accreditation Process (DIACAP)
Term
What documentation is required to permanently connect to the global information grid
(GIG) system?
Definition
Authorized to operate (ATO)
Term
What documentation signifies that a system is not allowed to connect to the global
information grid (GIG)?
Definition
Denial of authorization to operate (DATO)
Term
What process, along with AFI 33–210, Air Force Certification and Accreditation (C&A)
Program (AFCAP), provides the basic framework of the certification & accreditation (C&A)?
Definition
Information technology (IT) lean reengineering
Term
What do you call the consolidated list of requirements that a program office must adhere to
when fielding a system?
Definition
Security, interoperability, supportability, sustainability, and usability (SISSU)
Term
What is the database of record for registering all systems and applications?
Definition
Enterprose information technology data repository (EITDR)
Term
What is a collection of computing environments connected by one or more internal
networks under the control of a single approval authority and security policy?
Definition
Enclave
Term
How many non-secure internet protocol router network (NIPRNet) gateways does the Air
Force possess?
Definition
16
Term
Which agency must approve all information protection tools prior to their use?
Definition
Headquarters USAF (HQ USAF)
Term
What device is placed outside the boundary protection mechanism to monitor all attempted
attacks?
Definition
Intrusion detection system (IDS)
Term
What are examples of network attacks that bypass the firewall?
Definition
Tunneling and application-based attacks
Term
What is the intrusion practice of encapsulating a message that would be rejected by the
firewall inside a second message that will pass through the firewall?
Definition
Tunneling
Term
A base web-server that interfaces with the public must be placed in what area of a base
network?
Definition
De-militarized zone (DMZ)
Term
What is the simplest and least expensive way to stop inappropriate network addresses?
Definition
Packet filtering
Term
What type of firewall consists of a screening router and a set of rules that accept or reject a
message based on information in the message’s header (a packet): the source address, the
destination address, and the port?
Definition
Packet filtering
Term
What type of firewall is used to separate secure sites, networks, or network segments from
less secure areas?
Definition
Bastion host
Term
What type of firewall generates audit trails of all network-related activity for monitoring
and intrusion detection purposes?
Definition
Bastion host
Term
What network device performs rigorous examinations of systems to identify weaknesses
that might allow security violations?
Definition
Vulnerability scanners
Term
What action represents one of the greatest vulnerabilities to internal networks?
Definition
Network-connected computer system with modems that make calls to and accept calls from the public- switched network
Term
What do you call a current and perceived capability, intention, or attack, directed to cause
denial of service?
Definition
Threat
Term
An information system on your network that is not set to require the use of a common
access card (CAC) or password would be considered a
Definition
vulnerability
Term
A program that replicates by attaching itself to a program is a
Definition
virus
Term
What type of malicious logic can form large networks that can be used to launch a variety
of attacks without an information system owner’s knowledge?
Definition
Bot
Term
What type of malicious logic can become active on an information system without the need
to infect a file?
Definition
Worm
Term
What is a cryptographic key and certificate delivery system that makes possible secure
electronic transactions and exchanges of sensitive information between relative strangers?
Definition
Public key infrastructure (PKI)
Term
What can be used to encrypt a message so that it can only be decrypted by the recipient?
Definition
Public key
Term
What is a file that is kept with you and will allow you to decrypt files encrypted specifically
for you using your openly available encryption code?
Definition
Private key
Term
What is an electronic document that officially links together a user’s identity with his public
key?
Definition
Public key infrastructure (PKI) certificate
Term
Which component of the public key infrastructure (PKI) is responsible for establishing,
authenticating, maintaining, and revoking certificates?
Definition
Certificate authority
Term
The two ways key establishment can occur are key
Definition
transfer and agreement
Term
Which public key algorithm is exclusively a key establishment protocol?
Definition
Diffe and Hellman
Term
What is the primary unclassified public key infrastructure (PKI) token for individual PKI
keys and certificates in the Air Force?
Definition
Common Access Card (CAC)
Term
Which team provides a communication link between forces securing the area and setting up
support facilities?
Definition
Initial communications support teams
Term
Sustained communications support becomes a part of the deployment if it exceeds
Definition
30 days
Term
Who provides uninterrupted flow of mission critical information to field and in-garrison
units for the duration of a contingency?
Definition
Sustained communications support teams
Term
What program is known as a state of the art ground-to-ground communications
infrastructure designed to provide base level full spectrum communications to the commander
and all agencies on base?
Definition
Theater deployable communication (TDC)
Supporting users have an ad free experience!