3D052 Volume 1 - Flashcards for 3D052 Vol. 1 CDC
Help!
|
|
||||
---|---|---|---|---|---|
What is the minimum number of computers needed for a computer network? | show 🗑
|
||||
show | Intranetwork
🗑
|
||||
show | Heterogeneous network
🗑
|
||||
show | Homogeneous network
🗑
|
||||
(001) What is a communications network that serves users within a confined geographical area? | show 🗑
|
||||
show | MAN
🗑
|
||||
show | GAN
🗑
|
||||
show | 2-10
🗑
|
||||
(001) How many users are in a single-server network? | show 🗑
|
||||
show | 50-250
🗑
|
||||
show | 250-1000
🗑
|
||||
(001) What type of communications network links geographically dispersed offices in other cities or around the globe? | show 🗑
|
||||
show | MAC
🗑
|
||||
show | 4
🗑
|
||||
show | 0110000
🗑
|
||||
(002) What is the network id of internet protocol (IP) address 131.10.230.120/24? | show 🗑
|
||||
show | 0.0.0.120
🗑
|
||||
show | 64
🗑
|
||||
show | 33
🗑
|
||||
(003) What Air Force instruction provides policy, direction, and structure for the Air Force global information grid (AF-GIG)? | show 🗑
|
||||
According to the Air Force network structure, what tier is the Air Force network operations center (AFNOSC)? | show 🗑
|
||||
(003) What network entity provides reliable, secure networks and network services for base level customers? | show 🗑
|
||||
(004) What is defined as a bundle of application software designed to significantly improve network efficiency and productivity? | show 🗑
|
||||
show | Centralized, hierarchical, and distributed
🗑
|
||||
show | Centralized
🗑
|
||||
(004) What network architecture uses multiple systems for network management, with one system acting as a central server and the others working as clients? | show 🗑
|
||||
show | Interactive
🗑
|
||||
show | Proactive
🗑
|
||||
show | Monitoring and tuning
🗑
|
||||
show | Monitoring
🗑
|
||||
show | Security
🗑
|
||||
(005) What is the established to distinguish between errors that fall within a normal range and excessive errors because of a fault? | show 🗑
|
||||
show | Session
🗑
|
||||
(006) What is a hierarchical structured format that defines the network management information available from network devices? | show 🗑
|
||||
show | Private
🗑
|
||||
show | Agent
🗑
|
||||
(006) What operational simple network management protocol (SNMP) message asks for a specific instance of management information? | show 🗑
|
||||
(006) What operational simple network management protocol (SNMP) message is used to retrieve multiple pieces of information with minimal overhead? | show 🗑
|
||||
show | Set
🗑
|
||||
(006) What operational simple network management protocol (SNMP) message is an unsolicited message from an agent to the manager? | show 🗑
|
||||
show | Neighbor Probe
🗑
|
||||
(007) What is the centerpiece of a systems management automated report tracking system (SMARTS) application? | show 🗑
|
||||
(007) What component of the systems management automated report tracking system (SMARTS) application contains knowledge of available domain managers? | show 🗑
|
||||
show | Compound events, problems, and symptomatic events
🗑
|
||||
(007) What color on the systems management automated report tracking system (SMARTS) alarm log indicates one or more events? | show 🗑
|
||||
show | 21
🗑
|
||||
(008) What device provides a capability for digital network diagnostics and developing communications software? | show 🗑
|
||||
show | Protocol statistics
🗑
|
||||
show | Media access control (MAC) node statistics
🗑
|
||||
show | Node discovery
🗑
|
||||
show | Connection Statistics
🗑
|
||||
(009) What is a measure used to verify the eligibility of a subject and the ability of the subject to access certain information? | show 🗑
|
||||
(009) What are three primary ways to authenticate one-self? | show 🗑
|
||||
show | know
🗑
|
||||
show | 9
🗑
|
||||
show | AFSSI 8580
🗑
|
||||
(010) Storage media that retains data after power is removed is considered | show 🗑
|
||||
(010) Which standard form is used to annotate storage media has been sanitized? | show 🗑
|
||||
(010) Who can declassify storage media that has been sanitized? | show 🗑
|
||||
show | Destroying
🗑
|
||||
show | Degaussing
🗑
|
||||
(010) What is the preferred method of sanitizing magnetic media? | show 🗑
|
||||
(011) What is a comprehensive evaluation and validation of an Air Force information system (IS) to establish the degree to which it complies with assigned information assurance (IA) controls based on standardized procedures? | show 🗑
|
||||
show | Accreditation
🗑
|
||||
show | DIACAP
🗑
|
||||
(011) What documentation is required to permanently connect to the global information grid (GIG) system? | show 🗑
|
||||
(011) What documentation signifies that a system is not allowed to connect to the global information grid (GIG)? | show 🗑
|
||||
(011) What process, along with AFI 33–210, Air Force Certification and Accreditation (C&A) Program (AFCAP), provides the basic framework of the certification & accreditation (C&A)? | show 🗑
|
||||
show | SISSU (Security, interoperability, supportability, sustainability, and usability
🗑
|
||||
show | EITDR (Enterprise information technology data repository
🗑
|
||||
show | Enclave
🗑
|
||||
show | 16
🗑
|
||||
show | HQ USAF
🗑
|
||||
show | Intrusion detection system
🗑
|
||||
(012) What are examples of network attacks that bypass the firewall? | show 🗑
|
||||
show | Tunneling
🗑
|
||||
(012) A base web-server that interfaces with the public must be placed in what area of a base network? | show 🗑
|
||||
(012) What is the simplest and least expensive way to stop inappropriate network addresses? | show 🗑
|
||||
show | Packet filtering
🗑
|
||||
show | Bastion Host
🗑
|
||||
(012) What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes? | show 🗑
|
||||
show | Vulnerability scanners
🗑
|
||||
show | Network-connected computer systems with modems that make calls to and accept calls from the public-switched network
🗑
|
||||
(012) What do you call a current and perceived capability, intention, or attack, directed to cause denial of service? | show 🗑
|
||||
(012) An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a | show 🗑
|
||||
show | Virus
🗑
|
||||
show | Bot
🗑
|
||||
show | Worm
🗑
|
||||
(013) What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers? | show 🗑
|
||||
show | Public Key
🗑
|
||||
(014) What is a file that is kept with you and will allow you to decrypt files encrypted specifically for you using your openly available encryption code? | show 🗑
|
||||
show | PKI certificate
🗑
|
||||
show | CA (Certificate Authority)
🗑
|
||||
(015) The two ways key establishment can occur are key | show 🗑
|
||||
(015) Which public key algorithm is exclusively a key establishment protocol? | show 🗑
|
||||
(016) What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force? | show 🗑
|
||||
(017) Which team provides a communication link between forces securing the area and setting up support facilities? | show 🗑
|
||||
show | 30 Days
🗑
|
||||
show | Sustained communications support teams
🗑
|
||||
(018) What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base? | show 🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
madgerbil88
Popular Military sets