3D052 Volume 1 - Flashcards for 3D052 Vol. 1 CDC
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
What is the minimum number of computers needed for a computer network? | show 🗑
|
||||
(001) What is a privately-owned network whose access is restricted to authorized personnel is | show 🗑
|
||||
show | Heterogeneous network
🗑
|
||||
show | Homogeneous network
🗑
|
||||
(001) What is a communications network that serves users within a confined geographical area? | show 🗑
|
||||
show | MAN
🗑
|
||||
(001) What type of communications network links different interconnected networks over an unlimited geographical region? | show 🗑
|
||||
show | 2-10
🗑
|
||||
show | 10-50
🗑
|
||||
(001) How many users are in a multi-server network? | show 🗑
|
||||
show | 250-1000
🗑
|
||||
show | Enterprise network
🗑
|
||||
show | MAC
🗑
|
||||
(002) How many octets is the standard internet protocol broken down into? | show 🗑
|
||||
(002) What is the binary equivalent to the dotted decimal number 96? | show 🗑
|
||||
(002) What is the network id of internet protocol (IP) address 131.10.230.120/24? | show 🗑
|
||||
show | 0.0.0.120
🗑
|
||||
(002) How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask? | show 🗑
|
||||
(003) What series of Air Force instruction series covers communications and information? | show 🗑
|
||||
show | AFI 33-115v1
🗑
|
||||
show | 1
🗑
|
||||
show | NCC
🗑
|
||||
show | Network Management Server
🗑
|
||||
show | Centralized, hierarchical, and distributed
🗑
|
||||
show | Centralized
🗑
|
||||
(004) What network architecture uses multiple systems for network management, with one system acting as a central server and the others working as clients? | show 🗑
|
||||
(004) What level of network management activity are you working at when you as the network manager are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause? | show 🗑
|
||||
show | Proactive
🗑
|
||||
show | Monitoring and tuning
🗑
|
||||
(005) Which function of performance management tracks historical data by tracking activities on the network? | show 🗑
|
||||
(005) What network management area is concerned with controlling access points to information? | show 🗑
|
||||
(005) What is the established to distinguish between errors that fall within a normal range and excessive errors because of a fault? | show 🗑
|
||||
(006) Network management protocols are designed (in most cases) to reside above what layer of the operational system interface (OSI) model? | show 🗑
|
||||
show | Management information base
🗑
|
||||
show | Private
🗑
|
||||
show | Agent
🗑
|
||||
show | Get
🗑
|
||||
show | GetNext
🗑
|
||||
show | Set
🗑
|
||||
show | Trap
🗑
|
||||
show | Neighbor Probe
🗑
|
||||
show | Domain Manager
🗑
|
||||
show | Broker
🗑
|
||||
(007) What are the three types of systems management automated report tracking system (SMARTS) notifications? | show 🗑
|
||||
show | Purple
🗑
|
||||
show | 21
🗑
|
||||
show | Protocol Analyzer
🗑
|
||||
show | Protocol statistics
🗑
|
||||
(008) What reports errors that occur at the physical layer such as bad frame check sequence (FCS), short frames, and jabbers? | show 🗑
|
||||
(008) What automatically runs in the background when the protocol analyzer application is activated? | show 🗑
|
||||
show | Connection Statistics
🗑
|
||||
show | Authentication
🗑
|
||||
(009) What are three primary ways to authenticate one-self? | show 🗑
|
||||
(009) Knowledge-based identification and authentication methods require the user to provide something you. . . . | show 🗑
|
||||
(009) The Air Force requires a network password to be at least how many characters long? | show 🗑
|
||||
show | AFSSI 8580
🗑
|
||||
(010) Storage media that retains data after power is removed is considered | show 🗑
|
||||
show | 711
🗑
|
||||
(010) Who can declassify storage media that has been sanitized? | show 🗑
|
||||
show | Destroying
🗑
|
||||
show | Degaussing
🗑
|
||||
(010) What is the preferred method of sanitizing magnetic media? | show 🗑
|
||||
(011) What is a comprehensive evaluation and validation of an Air Force information system (IS) to establish the degree to which it complies with assigned information assurance (IA) controls based on standardized procedures? | show 🗑
|
||||
show | Accreditation
🗑
|
||||
show | DIACAP
🗑
|
||||
(011) What documentation is required to permanently connect to the global information grid (GIG) system? | show 🗑
|
||||
(011) What documentation signifies that a system is not allowed to connect to the global information grid (GIG)? | show 🗑
|
||||
(011) What process, along with AFI 33–210, Air Force Certification and Accreditation (C&A) Program (AFCAP), provides the basic framework of the certification & accreditation (C&A)? | show 🗑
|
||||
show | SISSU (Security, interoperability, supportability, sustainability, and usability
🗑
|
||||
show | EITDR (Enterprise information technology data repository
🗑
|
||||
show | Enclave
🗑
|
||||
(011) How many non-secure internet protocol router network (NIPRNet) gateways does the Air Force possess? | show 🗑
|
||||
show | HQ USAF
🗑
|
||||
show | Intrusion detection system
🗑
|
||||
(012) What are examples of network attacks that bypass the firewall? | show 🗑
|
||||
(012) What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall? | show 🗑
|
||||
(012) A base web-server that interfaces with the public must be placed in what area of a base network? | show 🗑
|
||||
show | Packet filtering
🗑
|
||||
show | Packet filtering
🗑
|
||||
(012) What type of firewall is used to separate secure sites, networks, or network segments from less secure areas? | show 🗑
|
||||
(012) What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes? | show 🗑
|
||||
(012) What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations? | show 🗑
|
||||
show | Network-connected computer systems with modems that make calls to and accept calls from the public-switched network
🗑
|
||||
show | Threat
🗑
|
||||
(012) An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a | show 🗑
|
||||
show | Virus
🗑
|
||||
show | Bot
🗑
|
||||
(012) What type of malicious logic can become active on an information system without the need to infect a file? | show 🗑
|
||||
(013) What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers? | show 🗑
|
||||
show | Public Key
🗑
|
||||
show | Private Key
🗑
|
||||
(014) What is an electronic document that officially links together a user’s identity with his public key? | show 🗑
|
||||
show | CA (Certificate Authority)
🗑
|
||||
(015) The two ways key establishment can occur are key | show 🗑
|
||||
show | Diffie and Hellman
🗑
|
||||
(016) What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force? | show 🗑
|
||||
(017) Which team provides a communication link between forces securing the area and setting up support facilities? | show 🗑
|
||||
(018) Sustained communications support becomes a part of the deployment if it exceeds | show 🗑
|
||||
(018) Who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency? | show 🗑
|
||||
(018) What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base? | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
madgerbil88
Popular Military sets