click below
click below
Normal Size Small Size show me how
3D052 CDC's Volume 1
Random non-URE related flash cards, including AFI's.
Question | Answer |
---|---|
This is defined as a collection of networks under common administration that share a common routing strategy. | Autonomous system |
What do you call it when you create smaller “subnetworks” off of your network by manipulating the subnet mask? | Subnetting |
This is a mechanism used to designate part of an IP address as the network field and part of it as the host field. | Subnet mask |
This is the act of implementing a different subnet mask on virtually every subnet on your network. | Variable length mask |
This AFPD establishes AF policy for responsibly acquiring, planning, and managing its information resources. | Air Force Policy Directive (AFPD) 33–1, Information Resources Management. |
This AFPD establishes the Air Force IA program to provide continuously for the availability, integrity, confidentiality, nonrepudiation, and authentication of information and ISs as an essential element to achieving the Air Force mission. | AFPD 33–2, Information Assurance (IA). |
Outlines standardized management practices and tells how to manage planning and implementation of communications and information systems and the base-level infrastructure. | AFI 33–104, Base-Level Planning and Implementation. |
This AFI implements Air Force Policy Directives (AFPD) 33–1, 33-2 and 10-6 by identifying responsibilities for supporting Air Force information technology equipment. | AFI 33–112, Information Technology Hardware Asset Management. |
It identifies responsibilities for management of commercial off-the-shelf (COTS) and Air Force-unique software acquired by the Air Force. | AFI 33–114, Software Management. |
This instruction provides the overarching policy, direction, and structure for the Air Force Global Information Grid (AF-GIG) and procedures necessary to manage the increasingly complex network environment. | AFI 33–115, VOLUME 1, Network Operations (NETOPS). |
This AFI provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks and the training and licensing of Air Force network users. | AFI 33–115, VOLUME 2, Licensing Network Users and Certifying Network Professionals. |
This AFI establishes electronic mail (e-mail) manager and user duties and responsibilities. It provides rules, standards, and guidance relating to the use of electronic messaging by the Air Force. | AFI 33–119, Air Force Messaging. |
This AFI provides general direction for implementation of IA and management of IA programs according to AFPD 33–2. | AFI 33–200, Information Assurance (IA) Management. |
Establishes Air Force Computer Security (COMPUSEC) requirements for IA. | AFI 33–202 Volume 1, Network and Computer Security. |
It implements Department of Defense Directive (DODD) 5200.28 and AFI 33–202, Computer Security. It provides identification and authentication computer security requirements for operational information systems. | Air Force Manual (AFMAN) 33–223, Identification and Authentication |
NOSC, AFRC and ANG NOSC, Functional Awareness Cell (FAC), ANG SIPRNET ROSC are all what tier of network management? | Regional (Tier 2) |
Active Duty, AFRC and ANG NCC, ANG ROSC, NCC-Deployed (NCC-D) SIPRNET System Administrators are a part of what tier of network management? | Local (Tier 3) |
What is the systems management mechanism that monitors and controls data collection for the purpose of data analysis and report generation on an OSI-based communications network? | Network Management (NM) |
This architecture combines the centralized and hierarchical architectures. | Distributed architecture |
This is the level of activity when no monitoring is accomplished. If the individual device or devices were configured for monitoring, the management server would ignore the device’s input. | Inactive |
This is the level of activity where network support personnel react to a problem after it has occurred yet no monitoring has been applied. | Reactive |
This is the level of activity where you are monitoring components but must interactively troubleshoot to eliminate the side-effect alarms and isolate problems to a root cause. | Interactive |
This is the level of activity where the automated monitoring components provide interactive problem analysis, giving a root cause alarm for the problem at-hand, and automatic restorative processes are in-place wherever possible to minimize downtime. | Proactive |
This is the process of obtaining data from the network and using that data to manage the setup of all managed network devices. | Configuration management |
This consists of the facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities. | Performance management |
This encompasses protecting sensitive information on devices attached to a data network by controlling access points to that information. | Security management |
This is the protection of your data network including all hardware, software and information. (Part of security management) | Network security |
This part of security management is responsible for the storage of all pertinent data associated with the data network with which it is associated. | Network Management System |
This involves measuring the usage of a network resource against a user or organization. The measurement establishes metrics, checks quotas, determines costs, and bills users. | Accounting management |
This is the process of identifying, locating, and correcting network problems. | Fault management |
Of the entire network management areas, which is probably the most important? (According to the text) | Fault management |
What increases network reliability by giving the network manager tools to quickly detect problems and initiate recovery procedures? | Fault management |
What is a standard set of rules defined for communications? | A protocol. |
This is defined as an extended MIB based on MIB-I and became a standard in RFC 1213. | Management information base II |
In a MIB tree structure, what are the two types of nodes? | labeled and leaf. |
What nodes in MIB may have subordinate nodes and which may not? | Labeled nodes may have subordinate labeled nodes and/or leaf nodes (also known as objects), while leaf nodes never have subordinate nodes. |
In MIB, this is used by the X.500 related label and leaf nodes. (Exists further up the tree structure) | Directory |
In MIB, this holds MIB-I (1) and MIB-II (2) standard label and leaf nodes, which are defined by RFC 1156 and 1213 respectively. | Mgmt |
Used to temporarily hold newly identified label or leaf nodes and are usually empty. | Experimental |
Reserved for vendor-related labels and leaf objects associated with specific manufactured equipment. | Private |
This can represent a workstation, client, network user, personal computer, server, printer, or other device attached to a data network. | A node |
What are the two categories of SNMP nodes? | Manager and Agent |
This uses the NM station to issue requests for information from managed nodes. | The manager |
This is responsible for monitoring, collecting, and reporting management data to the management system. | The agent |
Allows the manager to retrieve a large section of a table at once in SNMP. | Get-Bulk |
An SNMP agent uses a _______ _______ to receive and transport messages. | transport stack |
What SNMP community name is well-known to hackers as a default community name and can be used by a hacker to gain control of an asset? | “public” |
This application provides end-to-end, root-cause analysis of application, system, and network failures. | SMARTS |