Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

3D052 CDC's Volume 1

Random non-URE related flash cards, including AFI's.

QuestionAnswer
This is defined as a collection of networks under common administration that share a common routing strategy. Autonomous system
What do you call it when you create smaller “subnetworks” off of your network by manipulating the subnet mask? Subnetting
This is a mechanism used to designate part of an IP address as the network field and part of it as the host field. Subnet mask
This is the act of implementing a different subnet mask on virtually every subnet on your network. Variable length mask
This AFPD establishes AF policy for responsibly acquiring, planning, and managing its information resources. Air Force Policy Directive (AFPD) 33–1, Information Resources Management.
This AFPD establishes the Air Force IA program to provide continuously for the availability, integrity, confidentiality, nonrepudiation, and authentication of information and ISs as an essential element to achieving the Air Force mission. AFPD 33–2, Information Assurance (IA).
Outlines standardized management practices and tells how to manage planning and implementation of communications and information systems and the base-level infrastructure. AFI 33–104, Base-Level Planning and Implementation.
This AFI implements Air Force Policy Directives (AFPD) 33–1, 33-2 and 10-6 by identifying responsibilities for supporting Air Force information technology equipment. AFI 33–112, Information Technology Hardware Asset Management.
It identifies responsibilities for management of commercial off-the-shelf (COTS) and Air Force-unique software acquired by the Air Force. AFI 33–114, Software Management.
This instruction provides the overarching policy, direction, and structure for the Air Force Global Information Grid (AF-GIG) and procedures necessary to manage the increasingly complex network environment. AFI 33–115, VOLUME 1, Network Operations (NETOPS).
This AFI provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks and the training and licensing of Air Force network users. AFI 33–115, VOLUME 2, Licensing Network Users and Certifying Network Professionals.
This AFI establishes electronic mail (e-mail) manager and user duties and responsibilities. It provides rules, standards, and guidance relating to the use of electronic messaging by the Air Force. AFI 33–119, Air Force Messaging.
This AFI provides general direction for implementation of IA and management of IA programs according to AFPD 33–2. AFI 33–200, Information Assurance (IA) Management.
Establishes Air Force Computer Security (COMPUSEC) requirements for IA. AFI 33–202 Volume 1, Network and Computer Security.
It implements Department of Defense Directive (DODD) 5200.28 and AFI 33–202, Computer Security. It provides identification and authentication computer security requirements for operational information systems. Air Force Manual (AFMAN) 33–223, Identification and Authentication
NOSC, AFRC and ANG NOSC, Functional Awareness Cell (FAC), ANG SIPRNET ROSC are all what tier of network management? Regional (Tier 2)
Active Duty, AFRC and ANG NCC, ANG ROSC, NCC-Deployed (NCC-D) SIPRNET System Administrators are a part of what tier of network management? Local (Tier 3)
What is the systems management mechanism that monitors and controls data collection for the purpose of data analysis and report generation on an OSI-based communications network? Network Management (NM)
This architecture combines the centralized and hierarchical architectures. Distributed architecture
This is the level of activity when no monitoring is accomplished. If the individual device or devices were configured for monitoring, the management server would ignore the device’s input. Inactive
This is the level of activity where network support personnel react to a problem after it has occurred yet no monitoring has been applied. Reactive
This is the level of activity where you are monitoring components but must interactively troubleshoot to eliminate the side-effect alarms and isolate problems to a root cause. Interactive
This is the level of activity where the automated monitoring components provide interactive problem analysis, giving a root cause alarm for the problem at-hand, and automatic restorative processes are in-place wherever possible to minimize downtime. Proactive
This is the process of obtaining data from the network and using that data to manage the setup of all managed network devices. Configuration management
This consists of the facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities. Performance management
This encompasses protecting sensitive information on devices attached to a data network by controlling access points to that information. Security management
This is the protection of your data network including all hardware, software and information. (Part of security management) Network security
This part of security management is responsible for the storage of all pertinent data associated with the data network with which it is associated. Network Management System
This involves measuring the usage of a network resource against a user or organization. The measurement establishes metrics, checks quotas, determines costs, and bills users. Accounting management
This is the process of identifying, locating, and correcting network problems. Fault management
Of the entire network management areas, which is probably the most important? (According to the text) Fault management
What increases network reliability by giving the network manager tools to quickly detect problems and initiate recovery procedures? Fault management
What is a standard set of rules defined for communications? A protocol.
This is defined as an extended MIB based on MIB-I and became a standard in RFC 1213. Management information base II
In a MIB tree structure, what are the two types of nodes? labeled and leaf.
What nodes in MIB may have subordinate nodes and which may not? Labeled nodes may have subordinate labeled nodes and/or leaf nodes (also known as objects), while leaf nodes never have subordinate nodes.
In MIB, this is used by the X.500 related label and leaf nodes. (Exists further up the tree structure) Directory
In MIB, this holds MIB-I (1) and MIB-II (2) standard label and leaf nodes, which are defined by RFC 1156 and 1213 respectively. Mgmt
Used to temporarily hold newly identified label or leaf nodes and are usually empty. Experimental
Reserved for vendor-related labels and leaf objects associated with specific manufactured equipment. Private
This can represent a workstation, client, network user, personal computer, server, printer, or other device attached to a data network. A node
What are the two categories of SNMP nodes? Manager and Agent
This uses the NM station to issue requests for information from managed nodes. The manager
This is responsible for monitoring, collecting, and reporting management data to the management system. The agent
Allows the manager to retrieve a large section of a table at once in SNMP. Get-Bulk
An SNMP agent uses a _______ _______ to receive and transport messages. transport stack
What SNMP community name is well-known to hackers as a default community name and can be used by a hacker to gain control of an asset? “public”
This application provides end-to-end, root-cause analysis of application, system, and network failures. SMARTS
Created by: eeds6126