Term
|
Definition
A set of networks connected by routers |
|
|
Term
What does a heterogeneous network environment consist of? |
|
Definition
Computer systems from different vendors that run different OS and Communication protocols. |
|
|
Term
|
Definition
A network of components from the same vendor or compatible equipment that all run under the same OS or NOS |
|
|
Term
Which type of network (homo vs hetero) is more common? |
|
Definition
|
|
Term
What is a communications network that serves users within a confined geographical area? |
|
Definition
|
|
Term
What type of network usually provides services for 2 to 10 users? |
|
Definition
|
|
Term
How many users does a single server network normally service? |
|
Definition
|
|
Term
What type of netowrk can service 1000+ users? |
|
Definition
|
|
Term
What is used for addressing on a physically connected network to identify network nodes? |
|
Definition
|
|
Term
What is the numbering system that computers use to represent data? |
|
Definition
|
|
Term
Within IP addressing, how many bits are used and how are they broken down? |
|
Definition
32-bit IP address is broken into 4 sets of 8 bits |
|
|
Term
What mechanism is used to designate a part of an IP address as the network address, and other parts as the host address? |
|
Definition
|
|
Term
What is the primary reason for subnetting in IPv4? |
|
Definition
Improve efficency in using a limited number of available address spaces and to improve security |
|
|
Term
What bits in an IP address are routers mainly concerned with? |
|
Definition
|
|
Term
What does AFPD-33-1, Information Resources Mangement, establishes policy on? |
|
Definition
responsibly acquiring, planning, and managing its information resources |
|
|
Term
AFI 33-104, Base-Level Planning and Implementation, outlines what actions? |
|
Definition
Standard management practices and tells how to manage planning and implementation of comm and info systems and the base level infrastructure |
|
|
Term
What are 3 areas of distibuted responsibilitiy does the DIICC consist of? |
|
Definition
Global, Regional and Local levels |
|
|
Term
What is Network Management (NM)? |
|
Definition
The systems management mechanism that monitors and controls data collection for the purpose of data analysis and report generation on an OSI-based communication network |
|
|
Term
|
Definition
A bundle of application software designed to significantly improve network efficiency and productivity |
|
|
Term
Where should the NM server be located? |
|
Definition
Place the server itself in an area that is controlled strictly by the NCC |
|
|
Term
What are the 3 most common NM architectures? |
|
Definition
Centralized - 1 computer system at a location responsible for all NM duties |
|
|
Term
What are the 4 levels of activity that one must understand before applying management to specific services or devices> |
|
Definition
Inactive, Reactive, Interactive, Proactive |
|
|
Term
What is configuration management? |
|
Definition
The process of obtaining data from the network and using that data to manage setup all management netowrk devices |
|
|
Term
What are the two features built into an NMS that alleviate manually configuring a networks devices? |
|
Definition
Automatic Discovery and Auto -Mapping |
|
|
Term
What does performance management consist of? |
|
Definition
Consists of the facilities needed to evaluate behavior of network objective and effectiveness of comm activities |
|
|
Term
What are the two functional categories of performance management? |
|
Definition
|
|
Term
What is Secuity Management? |
|
Definition
Protecting sensitive information on devices attached to a data network by controlling access points to that information |
|
|
Term
What are the 2 subsections of security management? |
|
Definition
|
|
Term
What is fault management? |
|
Definition
The process of identifying, locating, and correcting network problems |
|
|
Term
What is the difference between a fault and an error? |
|
Definition
Faults - abnormal conditions require NCC to take action to correct or repair |
|
|
Term
What are some drawbacks to ICMP pinging as a NM tool? |
|
Definition
Unreliable delivery of packets. Need for polling, limited info derived from responses |
|
|
Term
|
Definition
Hierarchical, structured format that defines the NM information available from network devices |
|
|
Term
What are the 2 parts of the labeled node? |
|
Definition
Object Identifier (OID) and Short text description |
|
|
Term
What are the 2 types of nodes that make up the MIB tree? |
|
Definition
|
|
Term
What are the differences between the 2 types of nodes that make of the MIB tree? |
|
Definition
Labeled - May have subordinate labled/leaf node |
|
|
Term
What are some examples of what a node in SNMP can represent? |
|
Definition
Workstation, client, network user, personal computer, server, printer, etc |
|
|
Term
Describe each of the 2 categories of SNMP. |
|
Definition
Manager - Uses the NM station to issue requests for information from managed nodes |
|
|
Term
What does the Get operation do? |
|
Definition
Retrieves the value of one specific instance of manag. information |
|
|
Term
|
Definition
Unsolicited message from an agent to the manager |
|
|
Term
What are community names? |
|
Definition
Group that contains at least one agent and one management system |
|
|
Term
What are 2 types of community names? |
|
Definition
Read (Get) and Write (Set) |
|
|
Term
What do the two hierarchies provided by the CIM descirbe? |
|
Definition
Physical - Real world components |
|
|
Term
What are the 3 methods ofcreating a representation of a network topology within the domain managers repository? |
|
Definition
Auto Discovery, Manual and Topology Discover |
|
|
Term
What are the 3 main components of SMARTS? |
|
Definition
Domain Manager, Broker, Clients |
|
|
Term
What is the primary console in SMARTS and what does it display? |
|
Definition
Monitoring console - the results of the domain manager's correlation alrams |
|
|
Term
What are 2 factors that determine if a SMARTS map is opened with read-write access or with read-only access? |
|
Definition
1- only 1 user can have a specific map opened with R&W access at any one time |
|
|
Term
What are the 3 types of notifications used in SMARTS? |
|
Definition
Problem, Compound Event, Symptomatic Event |
|
|
Term
What are the primary capabilities provieded by a protocol analyzer? |
|
Definition
to monitor the traffic on a segment or domain are collision at a time |
|
|
Term
What is the recommended minimum amount of time to acquire netowrk information to establish a performance baseline? |
|
Definition
|
|
Term
What function of the protocal analyzer excludes specific type of frames? |
|
Definition
|
|
Term
On the protocol analyzer, what menu isbest used to report errors that occur at thephysical layer such as bad FCS, short frames, and jabbers? |
|
Definition
|
|
Term
On the protocol analyzer, what kind of information does the connection statistics menu provide? |
|
Definition
The bandwith utilization and the number of connections that related to specific nodes |
|
|
Term
What are the 3 types of active tests tha are conducted with a protocol analyzer? |
|
Definition
Ping, tracert, traffic generator |
|
|
Term
What is identification as it pertains to information protection? |
|
Definition
Proces of proving that a subject is what the subject claims to be |
|
|
Term
What is authentication as it pertains to information protection? |
|
Definition
A measure used to verify the eligibility of a subject and the ability of the subject to access certain informaiton |
|
|
Term
On an AF network, what is your passowrd requried to have in it? |
|
Definition
9 characters long, 2 upper/lower, 2 numbers, and 2 special |
|
|
Term
Where are biometrics based authentication and identification generally used, and why? |
|
Definition
provide very high levels of security, more expensive, reserved for areas that require very high level of security |
|
|
Term
What is the biggest risk with a possession based system for identifying and authenticating yourself? |
|
Definition
|
|
Term
Why would you use a combination of methods for identifying and authenticating yourself? |
|
Definition
substantially increase the security of an IA system |
|
|
Term
What are the 3 methods of providing strong authentication? |
|
Definition
Biometric & possession based, cryptographically protected, and using one time passwords |
|
|
Term
Where can you find specific guidance concernging remanence security? |
|
Definition
AFSSI 8580, Remanence Security |
|
|
Term
What is remancence security? |
|
Definition
the use of prescirbed safeguards and controls to prevent reconstruction/disclosure of sensitive/classfied information to persons who dont have prper clearance or need to know for the information |
|
|
Term
When something is sanitized, is it automatically declassified? |
|
Definition
|
|
Term
Until when must you retain classification controls? |
|
Definition
until the media is sanitized, declassified, or destroyed in an approved manner |
|
|
Term
When does the information owner of storage media declassifiy the media? |
|
Definition
after the information owner provides evidence that no information resides on the media, the information owner can declassify the media by removing the classification markings |
|
|
Term
When is destroying storage media NOT necessary? |
|
Definition
If the media is sanitized and declassified |
|
|
Term
What must you ensure when you are degaussing storage media? |
|
Definition
coercivity strength of the magnetic field generated by the degausser is strong enough to return the mag media to its zero state |
|
|
Term
|
Definition
|
|
Term
What is the biggest difference between DIACAP and previous processes? |
|
Definition
It tracks every IS and network from inception to retirement |
|
|
Term
What 2 publications provide the basic framework of the C&A process? |
|
Definition
IT lean reengineering process and AFI 33-210 |
|
|
Term
What is the SISSU checklist? |
|
Definition
consolidated list of requirements covering each of those areas that a program office must adhere to when developing and fielding a system |
|
|
Term
What are the most common AF circuit-enclaves? |
|
Definition
|
|
Term
What are the SIPRNET, and NIPRNET, and how does the SIPRNET differ from the NIPRNET? |
|
Definition
SIPR does not provide acces to the internet or any other lower classificaiton networks |
|
|
Term
What is the name of the concept that DOD uses in network defense? |
|
Definition
|
|
Term
Where would a network monitoring device such as an ASIM be placed in relation to the netowrk? |
|
Definition
placed outside the boundary protection mechanism to monitor all attempted attacks |
|
|
Term
|
Definition
encapsulating a message inside a 2nd message that will pass thorugh the firewall |
|
|
Term
What kind of servers would typically befound in a DMZ? |
|
Definition
all servers in a netowrk enclave that interface with the internet |
|
|
Term
What is the simplest an dleast expensive type of firewall? |
|
Definition
Packet Filtering Firewall |
|
|
Term
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas? |
|
Definition
|
|
Term
Describe the 2 categories that security related access controls fall into? |
|
Definition
Technical and Administrative controls |
|
|
Term
Regardless of the source of the threat, what is it usually targeting? |
|
Definition
A vulnerability or weakness in the network |
|
|
Term
How does a virus activiate? |
|
Definition
the infected program must execute, activating the virus |
|
|
Term
|
Definition
Group of computers that have been infected by bots under the control of a person or group |
|
|
Term
How is a Trojan horse different from a regular virus? |
|
Definition
it does not replicate itself |
|
|
Term
What step is taken before an IS is connected to the AFGIG? |
|
Definition
Baseline configuration applied to the prior |
|
|
Term
What does the PKI enable users of basically unsecured public networks to do? |
|
Definition
to securely and privately exchange data through the use of public and private crypto key pars obtained and shared through a trusted authority |
|
|
Term
Describe a symmetric central server architecture |
|
Definition
where each entity in the community shares a secret key with the central server |
|
|
Term
What do users use to verify that a particular public key belongs to a particular user? |
|
Definition
|
|
Term
What is a CA responsible for |
|
Definition
establishing, authenticating, maintaining, revoking certs and hardware |
|
|
Term
What are the 2 ways that key establishment can occur? |
|
Definition
Key transfer and key agreement |
|
|
Term
|
Definition
one entity generates the symmetric key and sends it to the other etity |
|
|
Term
|
Definition
both entities jointly contribute to the genereation of the symmetric key |
|
|
Term
How long should ECDSA and ECDH keys be to provide adequate security for the medium-to-long term? |
|
Definition
|
|
Term
What was the fundamental premise in the original formulation of public-key cryptography? |
|
Definition
2 strangers should be able to communicate securely |
|
|
Term
What does the PKI user population trust CA authorities to do? |
|
Definition
Perform the function of binding a public key to a given identity |
|
|
Term
What are the 4 configurations for CA servers? |
|
Definition
|
|
Term
What happens when a cert on a CRL is used? |
|
Definition
|
|
Term
What is the difference between a software token and a hardware token? |
|
Definition
HW token - built in security ofsome sort that must be entered to use the cert/keys |
|
|
Term
|
Definition
Identity, email signing, encryption |
|
|
Term
What does the global directory service providce for? |
|
Definition
the ability to search for individiuals, access information about them |
|
|
Term
What does middleware allow the use of? |
|
Definition
a wide variety of customers to access a single DB, translating diverse input into something the DB can understand |
|
|
Term
What does combat-ready communications and information forces provide? |
|
Definition
first-in capabilities to support peacetime through combat operations worldwide |
|
|
Term
Who plans, engineers, deploys, and employs support for all air and space forces? |
|
Definition
Communications and Information (C&I) professionals |
|
|
Term
Why do we have quicker response times, an efficient use of resources, and more effective training than previous Air and Space Expeditionary Force deployments? |
|
Definition
Versatiility and Flexability |
|
|
Term
Within what time frames are initial communications support designed to proved basic communications to a bare base operations? |
|
Definition
24-72 hours of deployment notification |
|
|
Term
What are the 3 major components in the TDC program? |
|
Definition
|
|
Term
What program is a state-of-the-art groundcommunications infrastructure that is designed to replace existing older communications systems? |
|
Definition
|
|
Term
Is TDC-ICAP used in initial communications support or sustained communications support? |
|
Definition
|
|
Term
What concept allows planners to scale the netowrk to meet the needs of deployments ranging from a few subscribers to a full wing, or even a Joint AF Command Component? |
|
Definition
|
|
Term
What is the conduit that ties all the LANs together and provides the interface to other networks? |
|
Definition
|
|
Term
Which phase of the deployment cycle is all the preparation done? |
|
Definition
|
|
Term
What order indicates that your unit may deploy? |
|
Definition
|
|
Term
Which pahse in the deplyment cycle do you enter after disembarking from your transportation? |
|
Definition
|
|
Term
In which phase of the deployment cycle do you replace and or repair worn equipment and replenish supplies? |
|
Definition
|
|