Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Random non-URE related flash cards, including AFI's.

        Help!  

Question
Answer
This is defined as a collection of networks under common administration that share a common routing strategy.   show
🗑
show Subnetting  
🗑
show Subnet mask  
🗑
This is the act of implementing a different subnet mask on virtually every subnet on your network.   show
🗑
show Air Force Policy Directive (AFPD) 33–1, Information Resources Management.  
🗑
show AFPD 33–2, Information Assurance (IA).  
🗑
show AFI 33–104, Base-Level Planning and Implementation.  
🗑
This AFI implements Air Force Policy Directives (AFPD) 33–1, 33-2 and 10-6 by identifying responsibilities for supporting Air Force information technology equipment.   show
🗑
It identifies responsibilities for management of commercial off-the-shelf (COTS) and Air Force-unique software acquired by the Air Force.   show
🗑
This instruction provides the overarching policy, direction, and structure for the Air Force Global Information Grid (AF-GIG) and procedures necessary to manage the increasingly complex network environment.   show
🗑
This AFI provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks and the training and licensing of Air Force network users.   show
🗑
This AFI establishes electronic mail (e-mail) manager and user duties and responsibilities. It provides rules, standards, and guidance relating to the use of electronic messaging by the Air Force.   show
🗑
show AFI 33–200, Information Assurance (IA) Management.  
🗑
show AFI 33–202 Volume 1, Network and Computer Security.  
🗑
show Air Force Manual (AFMAN) 33–223, Identification and Authentication  
🗑
NOSC, AFRC and ANG NOSC, Functional Awareness Cell (FAC), ANG SIPRNET ROSC are all what tier of network management?   show
🗑
Active Duty, AFRC and ANG NCC, ANG ROSC, NCC-Deployed (NCC-D) SIPRNET System Administrators are a part of what tier of network management?   show
🗑
show Network Management (NM)  
🗑
show Distributed architecture  
🗑
This is the level of activity when no monitoring is accomplished. If the individual device or devices were configured for monitoring, the management server would ignore the device’s input.   show
🗑
show Reactive  
🗑
This is the level of activity where you are monitoring components but must interactively troubleshoot to eliminate the side-effect alarms and isolate problems to a root cause.   show
🗑
show Proactive  
🗑
This is the process of obtaining data from the network and using that data to manage the setup of all managed network devices.   show
🗑
This consists of the facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities.   show
🗑
This encompasses protecting sensitive information on devices attached to a data network by controlling access points to that information.   show
🗑
show Network security  
🗑
show Network Management System  
🗑
This involves measuring the usage of a network resource against a user or organization. The measurement establishes metrics, checks quotas, determines costs, and bills users.   show
🗑
This is the process of identifying, locating, and correcting network problems.   show
🗑
Of the entire network management areas, which is probably the most important? (According to the text)   show
🗑
What increases network reliability by giving the network manager tools to quickly detect problems and initiate recovery procedures?   show
🗑
What is a standard set of rules defined for communications?   show
🗑
show Management information base II  
🗑
show labeled and leaf.  
🗑
What nodes in MIB may have subordinate nodes and which may not?   show
🗑
In MIB, this is used by the X.500 related label and leaf nodes. (Exists further up the tree structure)   show
🗑
In MIB, this holds MIB-I (1) and MIB-II (2) standard label and leaf nodes, which are defined by RFC 1156 and 1213 respectively.   show
🗑
Used to temporarily hold newly identified label or leaf nodes and are usually empty.   show
🗑
show Private  
🗑
show A node  
🗑
show Manager and Agent  
🗑
show The manager  
🗑
show The agent  
🗑
show Get-Bulk  
🗑
show transport stack  
🗑
show “public”  
🗑
This application provides end-to-end, root-cause analysis of application, system, and network failures.   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: eeds6126
Popular Military sets