Random non-URE related flash cards, including AFI's.
Help!
|
|
||||
---|---|---|---|---|---|
This is defined as a collection of networks under common administration that share a common routing strategy. | show 🗑
|
||||
show | Subnetting
🗑
|
||||
show | Subnet mask
🗑
|
||||
This is the act of implementing a different subnet mask on virtually every subnet on your network. | show 🗑
|
||||
show | Air Force Policy Directive (AFPD) 33–1, Information Resources Management.
🗑
|
||||
show | AFPD 33–2, Information Assurance (IA).
🗑
|
||||
show | AFI 33–104, Base-Level Planning and Implementation.
🗑
|
||||
This AFI implements Air Force Policy Directives (AFPD) 33–1, 33-2 and 10-6 by identifying responsibilities for supporting Air Force information technology equipment. | show 🗑
|
||||
It identifies responsibilities for management of commercial off-the-shelf (COTS) and Air Force-unique software acquired by the Air Force. | show 🗑
|
||||
This instruction provides the overarching policy, direction, and structure for the Air Force Global Information Grid (AF-GIG) and procedures necessary to manage the increasingly complex network environment. | show 🗑
|
||||
This AFI provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks and the training and licensing of Air Force network users. | show 🗑
|
||||
This AFI establishes electronic mail (e-mail) manager and user duties and responsibilities. It provides rules, standards, and guidance relating to the use of electronic messaging by the Air Force. | show 🗑
|
||||
show | AFI 33–200, Information Assurance (IA) Management.
🗑
|
||||
show | AFI 33–202 Volume 1, Network and Computer Security.
🗑
|
||||
show | Air Force Manual (AFMAN) 33–223, Identification and Authentication
🗑
|
||||
NOSC, AFRC and ANG NOSC, Functional Awareness Cell (FAC), ANG SIPRNET ROSC are all what tier of network management? | show 🗑
|
||||
Active Duty, AFRC and ANG NCC, ANG ROSC, NCC-Deployed (NCC-D) SIPRNET System Administrators are a part of what tier of network management? | show 🗑
|
||||
show | Network Management (NM)
🗑
|
||||
show | Distributed architecture
🗑
|
||||
This is the level of activity when no monitoring is accomplished. If the individual device or devices were configured for monitoring, the management server would ignore the device’s input. | show 🗑
|
||||
show | Reactive
🗑
|
||||
This is the level of activity where you are monitoring components but must interactively troubleshoot to eliminate the side-effect alarms and isolate problems to a root cause. | show 🗑
|
||||
show | Proactive
🗑
|
||||
This is the process of obtaining data from the network and using that data to manage the setup of all managed network devices. | show 🗑
|
||||
This consists of the facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities. | show 🗑
|
||||
This encompasses protecting sensitive information on devices attached to a data network by controlling access points to that information. | show 🗑
|
||||
show | Network security
🗑
|
||||
show | Network Management System
🗑
|
||||
This involves measuring the usage of a network resource against a user or organization. The measurement establishes metrics, checks quotas, determines costs, and bills users. | show 🗑
|
||||
This is the process of identifying, locating, and correcting network problems. | show 🗑
|
||||
Of the entire network management areas, which is probably the most important? (According to the text) | show 🗑
|
||||
What increases network reliability by giving the network manager tools to quickly detect problems and initiate recovery procedures? | show 🗑
|
||||
What is a standard set of rules defined for communications? | show 🗑
|
||||
show | Management information base II
🗑
|
||||
show | labeled and leaf.
🗑
|
||||
What nodes in MIB may have subordinate nodes and which may not? | show 🗑
|
||||
In MIB, this is used by the X.500 related label and leaf nodes. (Exists further up the tree structure) | show 🗑
|
||||
In MIB, this holds MIB-I (1) and MIB-II (2) standard label and leaf nodes, which are defined by RFC 1156 and 1213 respectively. | show 🗑
|
||||
Used to temporarily hold newly identified label or leaf nodes and are usually empty. | show 🗑
|
||||
show | Private
🗑
|
||||
show | A node
🗑
|
||||
show | Manager and Agent
🗑
|
||||
show | The manager
🗑
|
||||
show | The agent
🗑
|
||||
show | Get-Bulk
🗑
|
||||
show | transport stack
🗑
|
||||
show | “public”
🗑
|
||||
This application provides end-to-end, root-cause analysis of application, system, and network failures. | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
eeds6126
Popular Military sets