Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

3D052 Volume 1 - Flashcards for 3D052 Vol. 1 CDC

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
What is the minimum number of computers needed for a computer network?   show
🗑
(001) What is a privately-owned network whose access is restricted to authorized personnel is   show
🗑
show Heterogeneous network  
🗑
show Homogeneous network  
🗑
(001) What is a communications network that serves users within a confined geographical area?   show
🗑
show MAN  
🗑
(001) What type of communications network links different interconnected networks over an unlimited geographical region?   show
🗑
show 2-10  
🗑
show 10-50  
🗑
(001) How many users are in a multi-server network?   show
🗑
show 250-1000  
🗑
show Enterprise network  
🗑
show MAC  
🗑
(002) How many octets is the standard internet protocol broken down into?   show
🗑
(002) What is the binary equivalent to the dotted decimal number 96?   show
🗑
(002) What is the network id of internet protocol (IP) address 131.10.230.120/24?   show
🗑
show 0.0.0.120  
🗑
(002) How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask?   show
🗑
(003) What series of Air Force instruction series covers communications and information?   show
🗑
show AFI 33-115v1  
🗑
show 1  
🗑
show NCC  
🗑
show Network Management Server  
🗑
show Centralized, hierarchical, and distributed  
🗑
show Centralized  
🗑
(004) What network architecture uses multiple systems for network management, with one system acting as a central server and the others working as clients?   show
🗑
(004) What level of network management activity are you working at when you as the network manager are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?   show
🗑
show Proactive  
🗑
show Monitoring and tuning  
🗑
(005) Which function of performance management tracks historical data by tracking activities on the network?   show
🗑
(005) What network management area is concerned with controlling access points to information?   show
🗑
(005) What is the established to distinguish between errors that fall within a normal range and excessive errors because of a fault?   show
🗑
(006) Network management protocols are designed (in most cases) to reside above what layer of the operational system interface (OSI) model?   show
🗑
show Management information base  
🗑
show Private  
🗑
show Agent  
🗑
show Get  
🗑
show GetNext  
🗑
show Set  
🗑
show Trap  
🗑
show Neighbor Probe  
🗑
show Domain Manager  
🗑
show Broker  
🗑
(007) What are the three types of systems management automated report tracking system (SMARTS) notifications?   show
🗑
show Purple  
🗑
show 21  
🗑
show Protocol Analyzer  
🗑
show Protocol statistics  
🗑
(008) What reports errors that occur at the physical layer such as bad frame check sequence (FCS), short frames, and jabbers?   show
🗑
(008) What automatically runs in the background when the protocol analyzer application is activated?   show
🗑
show Connection Statistics  
🗑
show Authentication  
🗑
(009) What are three primary ways to authenticate one-self?   show
🗑
(009) Knowledge-based identification and authentication methods require the user to provide something you. . . .   show
🗑
(009) The Air Force requires a network password to be at least how many characters long?   show
🗑
show AFSSI 8580  
🗑
(010) Storage media that retains data after power is removed is considered   show
🗑
show 711  
🗑
(010) Who can declassify storage media that has been sanitized?   show
🗑
show Destroying  
🗑
show Degaussing  
🗑
(010) What is the preferred method of sanitizing magnetic media?   show
🗑
(011) What is a comprehensive evaluation and validation of an Air Force information system (IS) to establish the degree to which it complies with assigned information assurance (IA) controls based on standardized procedures?   show
🗑
show Accreditation  
🗑
show DIACAP  
🗑
(011) What documentation is required to permanently connect to the global information grid (GIG) system?   show
🗑
(011) What documentation signifies that a system is not allowed to connect to the global information grid (GIG)?   show
🗑
(011) What process, along with AFI 33–210, Air Force Certification and Accreditation (C&A) Program (AFCAP), provides the basic framework of the certification & accreditation (C&A)?   show
🗑
show SISSU (Security, interoperability, supportability, sustainability, and usability  
🗑
show EITDR (Enterprise information technology data repository  
🗑
show Enclave  
🗑
(011) How many non-secure internet protocol router network (NIPRNet) gateways does the Air Force possess?   show
🗑
show HQ USAF  
🗑
show Intrusion detection system  
🗑
(012) What are examples of network attacks that bypass the firewall?   show
🗑
(012) What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?   show
🗑
(012) A base web-server that interfaces with the public must be placed in what area of a base network?   show
🗑
show Packet filtering  
🗑
show Packet filtering  
🗑
(012) What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?   show
🗑
(012) What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes?   show
🗑
(012) What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?   show
🗑
show Network-connected computer systems with modems that make calls to and accept calls from the public-switched network  
🗑
show Threat  
🗑
(012) An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a   show
🗑
show Virus  
🗑
show Bot  
🗑
(012) What type of malicious logic can become active on an information system without the need to infect a file?   show
🗑
(013) What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers?   show
🗑
show Public Key  
🗑
show Private Key  
🗑
(014) What is an electronic document that officially links together a user’s identity with his public key?   show
🗑
show CA (Certificate Authority)  
🗑
(015) The two ways key establishment can occur are key   show
🗑
show Diffie and Hellman  
🗑
(016) What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force?   show
🗑
(017) Which team provides a communication link between forces securing the area and setting up support facilities?   show
🗑
(018) Sustained communications support becomes a part of the deployment if it exceeds   show
🗑
(018) Who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency?   show
🗑
(018) What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base?   show
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: madgerbil88
Popular Military sets