Shared Flashcard Set

Details

3D052 V1 Self Test Questions
Volume 1 Self Test Questions Complete
114
Computer Networking
Professional
04/24/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
Internetwork
Definition
A set of networks connected by routers
Term
What does a heterogeneous network environment consist of?
Definition
Computer systems from different vendors that run different OS and Communication protocols.
Term
Homogenous Network
Definition
A network of components from the same vendor or compatible equipment that all run under the same OS or NOS
Term
Which type of network (homo vs hetero) is more common?
Definition
Heterogeneous
Term
What is a communications network that serves users within a confined geographical area?
Definition
LAN
Term
What type of network usually provides services for 2 to 10 users?
Definition
Peer to Peer
Term
How many users does a single server network normally service?
Definition
10 - 50
Term
What type of netowrk can service 1000+ users?
Definition
Enterprise
Term
What is used for addressing on a physically connected network to identify network nodes?
Definition
MAC Address
Term
What is the numbering system that computers use to represent data?
Definition
Binary
Term
Within IP addressing, how many bits are used and how are they broken down?
Definition
32-bit IP address is broken into 4 sets of 8 bits
Term
What mechanism is used to designate a part of an IP address as the network address, and other parts as the host address?
Definition
Network, Subnet, Host
Term
What is the primary reason for subnetting in IPv4?
Definition
Improve efficency in using a limited number of available address spaces and to improve security
Term
What bits in an IP address are routers mainly concerned with?
Definition
Network/Subnet Field
Term
What does AFPD-33-1, Information Resources Mangement, establishes policy on?
Definition
responsibly acquiring, planning, and managing its information resources
Term
AFI 33-104, Base-Level Planning and Implementation, outlines what actions?
Definition
Standard management practices and tells how to manage planning and implementation of comm and info systems and the base level infrastructure
Term
What are 3 areas of distibuted responsibilitiy does the DIICC consist of?
Definition
Global, Regional and Local levels
Term
What is Network Management (NM)?
Definition
The systems management mechanism that monitors and controls data collection for the purpose of data analysis and report generation on an OSI-based communication network
Term
What is a NM server?
Definition
A bundle of application software designed to significantly improve network efficiency and productivity
Term
Where should the NM server be located?
Definition
Place the server itself in an area that is controlled strictly by the NCC
Term
What are the 3 most common NM architectures?
Definition
Centralized - 1 computer system at a location responsible for all NM duties
Term
What are the 4 levels of activity that one must understand before applying management to specific services or devices>
Definition
Inactive, Reactive, Interactive, Proactive
Term
What is configuration management?
Definition
The process of obtaining data from the network and using that data to manage setup all management netowrk devices
Term
What are the two features built into an NMS that alleviate manually configuring a networks devices?
Definition
Automatic Discovery and Auto -Mapping
Term
What does performance management consist of?
Definition
Consists of the facilities needed to evaluate behavior of network objective and effectiveness of comm activities
Term
What are the two functional categories of performance management?
Definition
Monitoring and Tuning
Term
What is Secuity Management?
Definition
Protecting sensitive information on devices attached to a data network by controlling access points to that information
Term
What are the 2 subsections of security management?
Definition
Netowrk Security and NMS
Term
What is fault management?
Definition
The process of identifying, locating, and correcting network problems
Term
What is the difference between a fault and an error?
Definition
Faults - abnormal conditions require NCC to take action to correct or repair
Term
What are some drawbacks to ICMP pinging as a NM tool?
Definition
Unreliable delivery of packets. Need for polling, limited info derived from responses
Term
What is MIB?
Definition
Hierarchical, structured format that defines the NM information available from network devices
Term
What are the 2 parts of the labeled node?
Definition
Object Identifier (OID) and Short text description
Term
What are the 2 types of nodes that make up the MIB tree?
Definition
Labeled and Leaf
Term
What are the differences between the 2 types of nodes that make of the MIB tree?
Definition
Labeled - May have subordinate labled/leaf node
Term
What are some examples of what a node in SNMP can represent?
Definition
Workstation, client, network user, personal computer, server, printer, etc
Term
Describe each of the 2 categories of SNMP.
Definition
Manager - Uses the NM station to issue requests for information from managed nodes
Term
What does the Get operation do?
Definition
Retrieves the value of one specific instance of manag. information
Term
What is a trap?
Definition
Unsolicited message from an agent to the manager
Term
What are community names?
Definition
Group that contains at least one agent and one management system
Term
What are 2 types of community names?
Definition
Read (Get) and Write (Set)
Term
What do the two hierarchies provided by the CIM descirbe?
Definition
Physical - Real world components
Term
What are the 3 methods ofcreating a representation of a network topology within the domain managers repository?
Definition
Auto Discovery, Manual and Topology Discover
Term
What are the 3 main components of SMARTS?
Definition
Domain Manager, Broker, Clients
Term
What is the primary console in SMARTS and what does it display?
Definition
Monitoring console - the results of the domain manager's correlation alrams
Term
What are 2 factors that determine if a SMARTS map is opened with read-write access or with read-only access?
Definition
1- only 1 user can have a specific map opened with R&W access at any one time
Term
What are the 3 types of notifications used in SMARTS?
Definition
Problem, Compound Event, Symptomatic Event
Term
What are the primary capabilities provieded by a protocol analyzer?
Definition
to monitor the traffic on a segment or domain are collision at a time
Term
What is the recommended minimum amount of time to acquire netowrk information to establish a performance baseline?
Definition
24 hours
Term
What function of the protocal analyzer excludes specific type of frames?
Definition
Capture filter
Term
On the protocol analyzer, what menu isbest used to report errors that occur at thephysical layer such as bad FCS, short frames, and jabbers?
Definition
MAC Node Statistics
Term
On the protocol analyzer, what kind of information does the connection statistics menu provide?
Definition
The bandwith utilization and the number of connections that related to specific nodes
Term
What are the 3 types of active tests tha are conducted with a protocol analyzer?
Definition
Ping, tracert, traffic generator
Term
What is identification as it pertains to information protection?
Definition
Proces of proving that a subject is what the subject claims to be
Term
What is authentication as it pertains to information protection?
Definition
A measure used to verify the eligibility of a subject and the ability of the subject to access certain informaiton
Term
On an AF network, what is your passowrd requried to have in it?
Definition
9 characters long, 2 upper/lower, 2 numbers, and 2 special
Term
Where are biometrics based authentication and identification generally used, and why?
Definition
provide very high levels of security, more expensive, reserved for areas that require very high level of security
Term
What is the biggest risk with a possession based system for identifying and authenticating yourself?
Definition
risk of counterfeiting
Term
Why would you use a combination of methods for identifying and authenticating yourself?
Definition
substantially increase the security of an IA system
Term
What are the 3 methods of providing strong authentication?
Definition
Biometric & possession based, cryptographically protected, and using one time passwords
Term
Where can you find specific guidance concernging remanence security?
Definition
AFSSI 8580, Remanence Security
Term
What is remancence security?
Definition
the use of prescirbed safeguards and controls to prevent reconstruction/disclosure of sensitive/classfied information to persons who dont have prper clearance or need to know for the information
Term
When something is sanitized, is it automatically declassified?
Definition
no
Term
Until when must you retain classification controls?
Definition
until the media is sanitized, declassified, or destroyed in an approved manner
Term
When does the information owner of storage media declassifiy the media?
Definition
after the information owner provides evidence that no information resides on the media, the information owner can declassify the media by removing the classification markings
Term
When is destroying storage media NOT necessary?
Definition
If the media is sanitized and declassified
Term
What must you ensure when you are degaussing storage media?
Definition
coercivity strength of the magnetic field generated by the degausser is strong enough to return the mag media to its zero state
Term
Which AFI governs AFCAP?
Definition
AFI 33-210
Term
What is the biggest difference between DIACAP and previous processes?
Definition
It tracks every IS and network from inception to retirement
Term
What 2 publications provide the basic framework of the C&A process?
Definition
IT lean reengineering process and AFI 33-210
Term
What is the SISSU checklist?
Definition
consolidated list of requirements covering each of those areas that a program office must adhere to when developing and fielding a system
Term
What are the most common AF circuit-enclaves?
Definition
the base networks
Term
What are the SIPRNET, and NIPRNET, and how does the SIPRNET differ from the NIPRNET?
Definition
SIPR does not provide acces to the internet or any other lower classificaiton networks
Term
What is the name of the concept that DOD uses in network defense?
Definition
Defense-in-depth
Term
Where would a network monitoring device such as an ASIM be placed in relation to the netowrk?
Definition
placed outside the boundary protection mechanism to monitor all attempted attacks
Term
Describe tunneling.
Definition
encapsulating a message inside a 2nd message that will pass thorugh the firewall
Term
What kind of servers would typically befound in a DMZ?
Definition
all servers in a netowrk enclave that interface with the internet
Term
What is the simplest an dleast expensive type of firewall?
Definition
Packet Filtering Firewall
Term
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?
Definition
Bastion Host
Term
Describe the 2 categories that security related access controls fall into?
Definition
Technical and Administrative controls
Term
Regardless of the source of the threat, what is it usually targeting?
Definition
A vulnerability or weakness in the network
Term
How does a virus activiate?
Definition
the infected program must execute, activating the virus
Term
Describe botnets
Definition
Group of computers that have been infected by bots under the control of a person or group
Term
How is a Trojan horse different from a regular virus?
Definition
it does not replicate itself
Term
What step is taken before an IS is connected to the AFGIG?
Definition
Baseline configuration applied to the prior
Term
What does the PKI enable users of basically unsecured public networks to do?
Definition
to securely and privately exchange data through the use of public and private crypto key pars obtained and shared through a trusted authority
Term
Describe a symmetric central server architecture
Definition
where each entity in the community shares a secret key with the central server
Term
What do users use to verify that a particular public key belongs to a particular user?
Definition
PKI certificate
Term
What is a CA responsible for
Definition
establishing, authenticating, maintaining, revoking certs and hardware
Term
What are the 2 ways that key establishment can occur?
Definition
Key transfer and key agreement
Term
Key transfer
Definition
one entity generates the symmetric key and sends it to the other etity
Term
Key agreement
Definition
both entities jointly contribute to the genereation of the symmetric key
Term
How long should ECDSA and ECDH keys be to provide adequate security for the medium-to-long term?
Definition
at least 192 bits long
Term
What was the fundamental premise in the original formulation of public-key cryptography?
Definition
2 strangers should be able to communicate securely
Term
What does the PKI user population trust CA authorities to do?
Definition
Perform the function of binding a public key to a given identity
Term
What are the 4 configurations for CA servers?
Definition
Enterprise root CA,
Term
What happens when a cert on a CRL is used?
Definition
it will be rejected
Term
What is the difference between a software token and a hardware token?
Definition
HW token - built in security ofsome sort that must be entered to use the cert/keys
Term
3 types of certs?
Definition
Identity, email signing, encryption
Term
What does the global directory service providce for?
Definition
the ability to search for individiuals, access information about them
Term
What does middleware allow the use of?
Definition
a wide variety of customers to access a single DB, translating diverse input into something the DB can understand
Term
What does combat-ready communications and information forces provide?
Definition
first-in capabilities to support peacetime through combat operations worldwide
Term
Who plans, engineers, deploys, and employs support for all air and space forces?
Definition
Communications and Information (C&I) professionals
Term
Why do we have quicker response times, an efficient use of resources, and more effective training than previous Air and Space Expeditionary Force deployments?
Definition
Versatiility and Flexability
Term
Within what time frames are initial communications support designed to proved basic communications to a bare base operations?
Definition
24-72 hours of deployment notification
Term
What are the 3 major components in the TDC program?
Definition
LMST, ICAP, NCC-D
Term
What program is a state-of-the-art groundcommunications infrastructure that is designed to replace existing older communications systems?
Definition
TDC program
Term
Is TDC-ICAP used in initial communications support or sustained communications support?
Definition
Yes
Term
What concept allows planners to scale the netowrk to meet the needs of deployments ranging from a few subscribers to a full wing, or even a Joint AF Command Component?
Definition
Building Block Concept
Term
What is the conduit that ties all the LANs together and provides the interface to other networks?
Definition
the base hub (MAN)
Term
Which phase of the deployment cycle is all the preparation done?
Definition
Pre-deployment
Term
What order indicates that your unit may deploy?
Definition
The warning order
Term
Which pahse in the deplyment cycle do you enter after disembarking from your transportation?
Definition
Establish Resources
Term
In which phase of the deployment cycle do you replace and or repair worn equipment and replenish supplies?
Definition
Reconstitute
Supporting users have an ad free experience!