Term
What is the minimum number of computers needed for a computer network? |
|
Definition
|
|
Term
What is a privately-owned network whose access is restricted to authorized personnel is called? |
|
Definition
|
|
Term
What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols? |
|
Definition
|
|
Term
What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system? |
|
Definition
|
|
Term
What is a communications network that serves users within a confined geographical area? |
|
Definition
|
|
Term
What type of communications network links a broad geographical region? |
|
Definition
|
|
Term
What type of communications network links different interconnected networks over an unlimited geographical region? |
|
Definition
Global area network (GAN) |
|
|
Term
How many users are normally in a peer-to-peer network? |
|
Definition
|
|
Term
How many users are in a single-server network? |
|
Definition
|
|
Term
How many users are in a multi-server network? |
|
Definition
|
|
Term
How many users are in a multi-server high-speed backbone network? |
|
Definition
|
|
Term
What type of communications network links geographically dispersed offices in other cities or around the globe? |
|
Definition
|
|
Term
What is used to identify network nodes on a physically connected network? |
|
Definition
Media access control list |
|
|
Term
How many octets is the standard internet protocol broken down into? |
|
Definition
|
|
Term
What is the binary equivalent to the dotted decimal number 96? |
|
Definition
|
|
Term
What is the host id of internet protocol (IP) address 131.10.230.120/24? |
|
Definition
|
|
Term
What is the host id of internet protocol (IP) address 131.10.230.120/24? |
|
Definition
|
|
Term
How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask? |
|
Definition
|
|
Term
What series of Air Force instruction series covers communications and information? |
|
Definition
|
|
Term
What Air Force instruction provides policy, direction, and structure for the Air Force global information grid (AF-GIG)? |
|
Definition
|
|
Term
According to the Air Force network structure, what tier is the Air Force network operations center (AFNOSC)? |
|
Definition
|
|
Term
What network entity provides reliable, secure networks and network services for base level customers? |
|
Definition
|
|
Term
What is defined as a bundle of application software designed to significantly improve network efficiency and productivity? |
|
Definition
network management server |
|
|
Term
Which of the following are the three most common network management architectures? |
|
Definition
Centralized, hierarchical, and distributed |
|
|
Term
What network architecture has a network management platform on one computer system at a location that is responsible for all network management duties? |
|
Definition
|
|
Term
What network architecture uses multiple systems for network management, with one system acting as a central server and the others working as clients? |
|
Definition
|
|
Term
What level of network management activity are you working at when you as the network manager are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause? |
|
Definition
|
|
Term
What level of network management activity are you working at when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at-hand? |
|
Definition
|
|
Term
Performance management can be broke into what two separate functional categories? |
|
Definition
|
|
Term
Which function of performance management tracks historical data by tracking activities on the network? |
|
Definition
|
|
Term
What network management area is concerned with controlling access points to information? |
|
Definition
|
|
Term
What is the established to distinguish between errors that fall within a normal range and excessive errors because of a fault? |
|
Definition
|
|
Term
Network management protocols are designed (in most cases) to reside above what layer of the operational system interface (OSI) model? |
|
Definition
|
|
Term
What is a hierarchical structured format that defines the network management information available from network devices? |
|
Definition
Management information base |
|
|
Term
What area of the simple network management protocol (SNMP) tree structure is reserved for vendors related label and leaf objects associated with specific manufactured equipment? |
|
Definition
|
|
Term
What simple network management protocol (SNMP) node is responsible for monitoring, collecting and reporting management data to the management system? |
|
Definition
|
|
Term
What operational simple network management protocol (SNMP) message asks for a specific instance of management information? |
|
Definition
|
|
Term
What operational simple network management protocol (SNMP) message is used to retrieve multiple pieces of information with minimal overhead? |
|
Definition
|
|
Term
What operational simple network management protocol (SNMP) message is used to modify the value of one or more instances of management information? |
|
Definition
|
|
Term
What operational simple network management protocol (SNMP) message is an unsolicited message from an agent to the manager? |
|
Definition
|
|
Term
What is the type of probe that collects inter-device connectivity information using proprietary topology management information bases (MIB)? |
|
Definition
|
|
Term
What is the centerpiece of a systems management automated report tracking system (SMARTS) application? |
|
Definition
|
|
Term
What component of the systems management automated report tracking system (SMARTS) application contains knowledge of available domain managers? |
|
Definition
|
|
Term
What are the three types of systems management automated report tracking system (SMARTS) notifications? |
|
Definition
Compound events, problems, and symptomatic events |
|
|
Term
What color on the systems management automated report tracking system (SMARTS) alarm log indicates one or more events? |
|
Definition
|
|
Term
How many different categories of information does the performance monitor provide you about your network? |
|
Definition
|
|
Term
What device provides a capability for digital network diagnostics and developing communications software? |
|
Definition
|
|
Term
What provides information concerning the network utilization and frame errors that are related to a specific protocol? |
|
Definition
|
|
Term
What reports errors that occur at the physical layer such as bad frame check sequence (FCS), short frames, and jabbers? |
|
Definition
Media access control(MAC) node statistics |
|
|
Term
What automatically runs in the background when the protocol analyzer application is activated? |
|
Definition
|
|
Term
What provides information concerning the bandwidth utilization and the number of connections that are related to specific nodes? |
|
Definition
|
|
Term
What is a measure used to verify the eligibility of a subject and the ability of the subject to access certain information? |
|
Definition
|
|
Term
What are three primary ways to authenticate one-self? |
|
Definition
Something you know, something you have, or something you are |
|
|
Term
Knowledge-based identification and authentication methods require the user to provide something you |
|
Definition
|
|
Term
The Air Force requires a network password to be at least how many characters long? |
|
Definition
|
|
Term
What regulation covers remanence security? |
|
Definition
|
|
Term
Storage media that retains data after power is removed is considered |
|
Definition
|
|
Term
Which standard form is used to annotate storage media has been sanitized? |
|
Definition
|
|
Term
Who can declassify storage media that has been sanitized? |
|
Definition
|
|
Term
What is the process of physically damaging the media to render it unusable in a computer and render the data on the media irretrievable by any known exploitation methods? |
|
Definition
|
|
Term
What is the process of erasing magnetic media by reducing the magnetic flux to virtual zero by applying a reverse magnetizing field? |
|
Definition
|
|
Term
What is the preferred method of sanitizing magnetic media? |
|
Definition
|
|
Term
What is a comprehensive evaluation and validation of an Air Force information system (IS) to establish the degree to which it complies with assigned information assurance (IA) controls based on standardized procedures? |
|
Definition
|
|
Term
What is a formal declaration by a designated approving official (DAA) that an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk? |
|
Definition
|
|
Term
What is the Department of Defense process for certifying and accrediting information systems to operate on the global information grid (GIG)? |
|
Definition
Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) |
|
|
Term
What documentation is required to permanently connect to the global information grid (GIG) system? |
|
Definition
Authorized to operate (ATO) |
|
|
Term
What documentation signifies that a system is not allowed to connect to the global information grid (GIG)? |
|
Definition
Denial of authorization to operate (DATO) |
|
|
Term
What process, along with AFI 33–210, Air Force Certification and Accreditation (C&A) Program (AFCAP), provides the basic framework of the certification & accreditation (C&A)? |
|
Definition
Information technology (IT) lean reengineering |
|
|
Term
What do you call the consolidated list of requirements that a program office must adhere to when fielding a system? |
|
Definition
Security, interoperability, supportability, sustainability, and usability (SISSU) |
|
|
Term
What is the database of record for registering all systems and applications? |
|
Definition
Enterprose information technology data repository (EITDR) |
|
|
Term
What is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security policy? |
|
Definition
|
|
Term
How many non-secure internet protocol router network (NIPRNet) gateways does the Air Force possess? |
|
Definition
|
|
Term
Which agency must approve all information protection tools prior to their use? |
|
Definition
Headquarters USAF (HQ USAF) |
|
|
Term
What device is placed outside the boundary protection mechanism to monitor all attempted attacks? |
|
Definition
Intrusion detection system (IDS) |
|
|
Term
What are examples of network attacks that bypass the firewall? |
|
Definition
Tunneling and application-based attacks |
|
|
Term
What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall? |
|
Definition
|
|
Term
A base web-server that interfaces with the public must be placed in what area of a base network? |
|
Definition
De-militarized zone (DMZ) |
|
|
Term
What is the simplest and least expensive way to stop inappropriate network addresses? |
|
Definition
|
|
Term
What type of firewall consists of a screening router and a set of rules that accept or reject a message based on information in the message’s header (a packet): the source address, the destination address, and the port? |
|
Definition
|
|
Term
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas? |
|
Definition
|
|
Term
What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes? |
|
Definition
|
|
Term
What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations? |
|
Definition
|
|
Term
What action represents one of the greatest vulnerabilities to internal networks? |
|
Definition
Network-connected computer system with modems that make calls to and accept calls from the public- switched network |
|
|
Term
What do you call a current and perceived capability, intention, or attack, directed to cause denial of service? |
|
Definition
|
|
Term
An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a |
|
Definition
|
|
Term
A program that replicates by attaching itself to a program is a |
|
Definition
|
|
Term
What type of malicious logic can form large networks that can be used to launch a variety of attacks without an information system owner’s knowledge? |
|
Definition
|
|
Term
What type of malicious logic can become active on an information system without the need to infect a file? |
|
Definition
|
|
Term
What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers? |
|
Definition
Public key infrastructure (PKI) |
|
|
Term
What can be used to encrypt a message so that it can only be decrypted by the recipient? |
|
Definition
|
|
Term
What is a file that is kept with you and will allow you to decrypt files encrypted specifically for you using your openly available encryption code? |
|
Definition
|
|
Term
What is an electronic document that officially links together a user’s identity with his public key? |
|
Definition
Public key infrastructure (PKI) certificate |
|
|
Term
Which component of the public key infrastructure (PKI) is responsible for establishing, authenticating, maintaining, and revoking certificates? |
|
Definition
|
|
Term
The two ways key establishment can occur are key |
|
Definition
|
|
Term
Which public key algorithm is exclusively a key establishment protocol? |
|
Definition
|
|
Term
What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force? |
|
Definition
|
|
Term
Which team provides a communication link between forces securing the area and setting up support facilities? |
|
Definition
Initial communications support teams |
|
|
Term
Sustained communications support becomes a part of the deployment if it exceeds |
|
Definition
|
|
Term
Who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency? |
|
Definition
Sustained communications support teams |
|
|
Term
What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base? |
|
Definition
Theater deployable communication (TDC) |
|
|