Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Random non-URE related flash cards, including AFI's.

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show Autonomous system  
🗑
show Subnetting  
🗑
show Subnet mask  
🗑
This is the act of implementing a different subnet mask on virtually every subnet on your network.   show
🗑
This AFPD establishes AF policy for responsibly acquiring, planning, and managing its information resources.   show
🗑
This AFPD establishes the Air Force IA program to provide continuously for the availability, integrity, confidentiality, nonrepudiation, and authentication of information and ISs as an essential element to achieving the Air Force mission.   show
🗑
show AFI 33–104, Base-Level Planning and Implementation.  
🗑
show AFI 33–112, Information Technology Hardware Asset Management.  
🗑
It identifies responsibilities for management of commercial off-the-shelf (COTS) and Air Force-unique software acquired by the Air Force.   show
🗑
show AFI 33–115, VOLUME 1, Network Operations (NETOPS).  
🗑
show AFI 33–115, VOLUME 2, Licensing Network Users and Certifying Network Professionals.  
🗑
show AFI 33–119, Air Force Messaging.  
🗑
show AFI 33–200, Information Assurance (IA) Management.  
🗑
show AFI 33–202 Volume 1, Network and Computer Security.  
🗑
It implements Department of Defense Directive (DODD) 5200.28 and AFI 33–202, Computer Security. It provides identification and authentication computer security requirements for operational information systems.   show
🗑
NOSC, AFRC and ANG NOSC, Functional Awareness Cell (FAC), ANG SIPRNET ROSC are all what tier of network management?   show
🗑
Active Duty, AFRC and ANG NCC, ANG ROSC, NCC-Deployed (NCC-D) SIPRNET System Administrators are a part of what tier of network management?   show
🗑
What is the systems management mechanism that monitors and controls data collection for the purpose of data analysis and report generation on an OSI-based communications network?   show
🗑
This architecture combines the centralized and hierarchical architectures.   show
🗑
This is the level of activity when no monitoring is accomplished. If the individual device or devices were configured for monitoring, the management server would ignore the device’s input.   show
🗑
show Reactive  
🗑
show Interactive  
🗑
This is the level of activity where the automated monitoring components provide interactive problem analysis, giving a root cause alarm for the problem at-hand, and automatic restorative processes are in-place wherever possible to minimize downtime.   show
🗑
This is the process of obtaining data from the network and using that data to manage the setup of all managed network devices.   show
🗑
show Performance management  
🗑
This encompasses protecting sensitive information on devices attached to a data network by controlling access points to that information.   show
🗑
show Network security  
🗑
This part of security management is responsible for the storage of all pertinent data associated with the data network with which it is associated.   show
🗑
show Accounting management  
🗑
This is the process of identifying, locating, and correcting network problems.   show
🗑
Of the entire network management areas, which is probably the most important? (According to the text)   show
🗑
What increases network reliability by giving the network manager tools to quickly detect problems and initiate recovery procedures?   show
🗑
show A protocol.  
🗑
show Management information base II  
🗑
In a MIB tree structure, what are the two types of nodes?   show
🗑
What nodes in MIB may have subordinate nodes and which may not?   show
🗑
In MIB, this is used by the X.500 related label and leaf nodes. (Exists further up the tree structure)   show
🗑
In MIB, this holds MIB-I (1) and MIB-II (2) standard label and leaf nodes, which are defined by RFC 1156 and 1213 respectively.   show
🗑
Used to temporarily hold newly identified label or leaf nodes and are usually empty.   show
🗑
show Private  
🗑
show A node  
🗑
show Manager and Agent  
🗑
show The manager  
🗑
This is responsible for monitoring, collecting, and reporting management data to the management system.   show
🗑
Allows the manager to retrieve a large section of a table at once in SNMP.   show
🗑
An SNMP agent uses a _______ _______ to receive and transport messages.   show
🗑
What SNMP community name is well-known to hackers as a default community name and can be used by a hacker to gain control of an asset?   show
🗑
This application provides end-to-end, root-cause analysis of application, system, and network failures.   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: eeds6126
Popular Military sets