Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

3D052 Volume 1 - Flashcards for 3D052 Vol. 1 CDC

        Help!  

Question
Answer
What is the minimum number of computers needed for a computer network?   show
🗑
show Intranetwork  
🗑
show Heterogeneous network  
🗑
show Homogeneous network  
🗑
(001) What is a communications network that serves users within a confined geographical area?   show
🗑
show MAN  
🗑
show GAN  
🗑
show 2-10  
🗑
(001) How many users are in a single-server network?   show
🗑
show 50-250  
🗑
show 250-1000  
🗑
(001) What type of communications network links geographically dispersed offices in other cities or around the globe?   show
🗑
show MAC  
🗑
show 4  
🗑
show 0110000  
🗑
(002) What is the network id of internet protocol (IP) address 131.10.230.120/24?   show
🗑
show 0.0.0.120  
🗑
show 64  
🗑
show 33  
🗑
(003) What Air Force instruction provides policy, direction, and structure for the Air Force global information grid (AF-GIG)?   show
🗑
According to the Air Force network structure, what tier is the Air Force network operations center (AFNOSC)?   show
🗑
(003) What network entity provides reliable, secure networks and network services for base level customers?   show
🗑
(004) What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?   show
🗑
show Centralized, hierarchical, and distributed  
🗑
show Centralized  
🗑
(004) What network architecture uses multiple systems for network management, with one system acting as a central server and the others working as clients?   show
🗑
show Interactive  
🗑
show Proactive  
🗑
show Monitoring and tuning  
🗑
show Monitoring  
🗑
show Security  
🗑
(005) What is the established to distinguish between errors that fall within a normal range and excessive errors because of a fault?   show
🗑
show Session  
🗑
(006) What is a hierarchical structured format that defines the network management information available from network devices?   show
🗑
show Private  
🗑
show Agent  
🗑
(006) What operational simple network management protocol (SNMP) message asks for a specific instance of management information?   show
🗑
(006) What operational simple network management protocol (SNMP) message is used to retrieve multiple pieces of information with minimal overhead?   show
🗑
show Set  
🗑
(006) What operational simple network management protocol (SNMP) message is an unsolicited message from an agent to the manager?   show
🗑
show Neighbor Probe  
🗑
(007) What is the centerpiece of a systems management automated report tracking system (SMARTS) application?   show
🗑
(007) What component of the systems management automated report tracking system (SMARTS) application contains knowledge of available domain managers?   show
🗑
show Compound events, problems, and symptomatic events  
🗑
(007) What color on the systems management automated report tracking system (SMARTS) alarm log indicates one or more events?   show
🗑
show 21  
🗑
(008) What device provides a capability for digital network diagnostics and developing communications software?   show
🗑
show Protocol statistics  
🗑
show Media access control (MAC) node statistics  
🗑
show Node discovery  
🗑
show Connection Statistics  
🗑
(009) What is a measure used to verify the eligibility of a subject and the ability of the subject to access certain information?   show
🗑
(009) What are three primary ways to authenticate one-self?   show
🗑
show know  
🗑
show 9  
🗑
show AFSSI 8580  
🗑
(010) Storage media that retains data after power is removed is considered   show
🗑
(010) Which standard form is used to annotate storage media has been sanitized?   show
🗑
(010) Who can declassify storage media that has been sanitized?   show
🗑
show Destroying  
🗑
show Degaussing  
🗑
(010) What is the preferred method of sanitizing magnetic media?   show
🗑
(011) What is a comprehensive evaluation and validation of an Air Force information system (IS) to establish the degree to which it complies with assigned information assurance (IA) controls based on standardized procedures?   show
🗑
show Accreditation  
🗑
show DIACAP  
🗑
(011) What documentation is required to permanently connect to the global information grid (GIG) system?   show
🗑
(011) What documentation signifies that a system is not allowed to connect to the global information grid (GIG)?   show
🗑
(011) What process, along with AFI 33–210, Air Force Certification and Accreditation (C&A) Program (AFCAP), provides the basic framework of the certification & accreditation (C&A)?   show
🗑
show SISSU (Security, interoperability, supportability, sustainability, and usability  
🗑
show EITDR (Enterprise information technology data repository  
🗑
show Enclave  
🗑
show 16  
🗑
show HQ USAF  
🗑
show Intrusion detection system  
🗑
(012) What are examples of network attacks that bypass the firewall?   show
🗑
show Tunneling  
🗑
(012) A base web-server that interfaces with the public must be placed in what area of a base network?   show
🗑
(012) What is the simplest and least expensive way to stop inappropriate network addresses?   show
🗑
show Packet filtering  
🗑
show Bastion Host  
🗑
(012) What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes?   show
🗑
show Vulnerability scanners  
🗑
show Network-connected computer systems with modems that make calls to and accept calls from the public-switched network  
🗑
(012) What do you call a current and perceived capability, intention, or attack, directed to cause denial of service?   show
🗑
(012) An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a   show
🗑
show Virus  
🗑
show Bot  
🗑
show Worm  
🗑
(013) What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers?   show
🗑
show Public Key  
🗑
(014) What is a file that is kept with you and will allow you to decrypt files encrypted specifically for you using your openly available encryption code?   show
🗑
show PKI certificate  
🗑
show CA (Certificate Authority)  
🗑
(015) The two ways key establishment can occur are key   show
🗑
(015) Which public key algorithm is exclusively a key establishment protocol?   show
🗑
(016) What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force?   show
🗑
(017) Which team provides a communication link between forces securing the area and setting up support facilities?   show
🗑
show 30 Days  
🗑
show Sustained communications support teams  
🗑
(018) What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base?   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: madgerbil88
Popular Military sets