The flashcards below were created by user
Anonymous
on FreezingBlue Flashcards.
-
What is the minimum number of computers needed for a computer network?
2
-
What is a privately-owned network whose access is restricted to authorized personnel is called?
Intranetwork
-
What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?
Heterogeneous network
-
What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?
Homogeneous network.
-
What is a communications network that serves users within a confined geographical area?
Local area network (LAN).
-
What type of communications network links a broad geographical region?
Wide area network. (WAN)
-
What type of communications network links different interconnected networks over an unlimited geographical region?
Global area network (GAN)
-
How many users are normally in a peer-to-peer network?
2-10
-
How many users are in a single-server network?
10-50
-
How many users are in a multi-server network?
50-250
-
How many users are in a multi-server high-speed backbone network?
250-1,000
-
What type of communications network links geographically dispersed offices in other cities or around the globe?
Enterprise network.
-
What is used to identify network nodes on a physically connected network?
Media access control address
-
How many octets is the standard internet protocol broken down into?
4
-
What is the binary equivalent to the dotted decimal number 96?
01100000
-
What is the network id of internet protocol (IP) address 131.10.230.120/24?
131.10.230.0.
-
What is the host id of internet protocol (IP) address 131.10.230.120/24?
0.0.0.120
-
How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask?
64
-
What series of Air Force instruction series covers communications and information?
33
-
What Air Force instruction provides policy, direction, and structure for the Air Force global information grid (AF-GIG)?
AFI 33–115v1
-
According to the Air Force network structure, what tier is the Air Force network operations center (AFNOSC)?
1
-
What network entity provides reliable, secure networks and network services for base level customers?
Network control center (NCC)
-
What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?
Network management server
-
Which of the following are the three most common network management architectures?
Centralized, hierarchical, and distributed.
-
What network architecture has a network management platform on one computer system at a location that is responsible for all network management duties?
Centralized
-
What network architecture uses multiple systems for network management, with one system acting as a central server and the others working as clients?
Hierarchical
-
What level of network management activity are you working at when you as the network manager are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?
Interactive
-
What level of network management activity are you working at when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at-hand?
Proactive
-
Performance management can be broke into what two separate functional categories?
Monitoring and tuning
-
Which function of performance management tracks historical data by tracking activities on the network?
Monitoring
-
What network management area is concerned with controlling access points to information?
Security
-
What is the established to distinguish between errors that fall within a normal range and excessive errors because of a fault?
Tolerance parameters
-
Network management protocols are designed (in most cases) to reside above what layer of the operational system interface (OSI) model?
Session
-
What is a hierarchical structured format that defines the network management information available from network devices?
Management information base
-
What area of the simple network management protocol (SNMP) tree structure is reserved for vendors related label and leaf objects associated with specific manufactured equipment?
Private
-
What simple network management protocol (SNMP) node is responsible for monitoring,collecting and reporting management data to the management system?
Agent
-
What operational simple network management protocol (SNMP) message asks for a specific instance of management information?
Get
-
What operational simple network management protocol (SNMP) message is used to retrieve multiple pieces of information with minimal overhead?
GetNext
-
What operational simple network management protocol (SNMP) message is used to modify the value of one or more instances of management information?
Set
-
What operational simple network management protocol (SNMP) message is an unsolicited message from an agent to the manager?
Trap
-
What is the type of probe that collects inter-device connectivity information using proprietary topology management information bases (MIB)?
Neighbor probe
-
What is the centerpiece of a systems management automated report tracking system(SMARTS) application?
Domain manager.
-
What component of the systems management automated report tracking system (SMARTS)application contains knowledge of available domain managers?
Broker
-
What are the three types of systems management automated report tracking system(SMARTS) notifications?
Compound events, problems, and symptomatic events
-
What color on the systems management automated report tracking system (SMARTS)alarm log indicates one or more events?
Purple
-
How many different categories of information does the performance monitor provide you about your network?
21
-
What device provides a capability for digital network diagnostics and developing communications software?
Protocol analyzer
-
What provides information concerning the network utilization and frame errors that are related to a specific protocol?
Protocol statistics
-
What reports errors that occur at the physical layer such as bad frame check sequence (FCS), short frames, and jabbers?
Media access control (MAC) node statistics
-
What automatically runs in the background when the protocol analyzer application is activated?
Node discovery
-
What provides information concerning the bandwidth utilization and the number of connections that are related to specific nodes?
Connection statistics.
-
What is a measure used to verify the eligibility of a subject and the ability of the subject to access certain information?
Authentication
-
What are three primary ways to authenticate one-self?
Something you know, something you have, or something are.
-
Knowledge-based identification and authentication methods require the user to provide something you...
know.
-
The Air Force requires a network password to be at least how many characters long?
9
-
What regulation covers remanence security?
AFSSI 8580
-
Storage media that retains data after power is removed is considered...
sensitive.
-
Which standard form is used to annotate storage media has been sanitized?
711
-
Who can declassify storage media that has been sanitized?
Information owner
-
What is the process of physically damaging the media to render it unusable in a computer and render the data on the media irretrievable by any known exploitation methods?
Destroying
-
What is the process of erasing magnetic media by reducing the magnetic flux to virtual zero by applying a reverse magnetizing field?
Degaussing
-
What is the preferred method of sanitizing magnetic media?
Degaussing
-
What is a comprehensive evaluation and validation of an Air Force information system (IS)to establish the degree to which it complies with assigned information assurance (IA) controls based on standardized procedures?
Certification
-
What is a formal declaration by a designated approving official (DAA) that an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk?
Accreditation
-
What is the Department of Defense process for certifying and accrediting information systems to operate on the global information grid (GIG)?
Department of Defense Information Assurance Certification and Accreditation Process(DIACAP).
-
What documentation is required to permanently connect to the global information grid(GIG) system?
Authorization to operate (ATO)
-
What documentation signifies that a system is not allowed to connect to the global information grid (GIG)?
Denial of authorization to operation (DATO).
-
What process, along with AFI 33–210, Air Force Certification and Accreditation (C&A)Program (AFCAP), provides the basic framework of the certification & accreditation (C&A)?
Information technology (IT) lean reengineering
-
What do you call the consolidated list of requirements that a program office must adhere to when fielding a system?
Security, interoperability, supportability, sustainability, and usability (SISSU)
-
What is the database of record for registering all systems and applications?
Enterprise information technology data repository (EITDR).
-
What is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security policy?
Enclave
-
How many non-secure internet protocol router network (NIPRNet) gateways does the Air Force possess?
16
-
Which agency must approve all information protection tools prior to their use?
Headquarters United States Air Force (HQ USAF)
-
What device is placed outside the boundary protection mechanism to monitor all attempted attacks?
Intrusion detection system (IDS)
-
What are examples of network attacks that bypass the firewall?
Tunneling and application-based attacks.
-
What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?
Tunneling
-
A base web-server that interfaces with the public must be placed in what area of a base network?
De-militarized zone (DMZ)
-
What is the simplest and least expensive way to stop inappropriate network addresses?
Packet filtering
-
What type of firewall consists of a screening router and a set of rules that accept or reject a message based on information in the message’s header (a packet): the source address, the destination address, and the port?
Packet filtering
-
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?
Bastion host
-
What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes?
Bastion host
-
What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?
Vulnerability scanners
-
What action represents one of the greatest vulnerabilities to internal networks?
Network-connected computer systems with modems that make calls to and accept calls from the public-switched network.
-
What do you call a current and perceived capability, intention, or attack, directed to cause denial of service?
Threat
-
An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a...
vulnerability.
-
A program that replicates by attaching itself to a program is a...
virus.
-
What type of malicious logic can form large networks that can be used to launch a variety of attacks without an information system owner’s knowledge?
Bot
-
What type of malicious logic can become active on an information system without the need to infect a file?
Worm
-
What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers?
Public key infrastructure (PKI).
-
What can be used to encrypt a message so that it can only be decrypted by the recipient?
Public key.
-
What is a file that is kept with you and will allow you to decrypt files encrypted specifically for you using your openly available encryption code?
Private key
-
What is an electronic document that officially links together a user’s identity with his public key?
Public key infrastructure (PKI) certificate
-
Which component of the public key infrastructure (PKI) is responsible for establishing,authenticating, maintaining, and revoking certificates?
Certificate authority
-
The two ways key establishment can occur are key...
transfer and agreement.
-
Which public key algorithm is exclusively a key establishment protocol?
Diffie and Hellman.
-
What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force?
Common access card
-
Which team provides a communication link between forces securing the area and setting up support facilities?
Initial communications support teams
-
Sustained communications support becomes a part of the deployment if it exceeds...
30 days
-
Who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency?
Sustained communications support teams.
-
What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base?
Theater deployable communications (TDC)
-
Which original components were very susceptible to damage from electrostatic discharge?
Complementary metal-oxide semiconductor (CMOS)
-
What is considered to be a computer’s main storage?
Random access memory (RAM)
-
What is considered as nonvolatile permanent memory?
Read only memory (ROM)
-
What is a form of firmware that contains the computer’s startup instructions?
Basic input/output system (BIOS)
-
What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?
Interrupt
-
Which controller component interprets an electronic signal, prioritizes it, and requests the attention of the central processing unit (CPU)?
Priority interrupt
-
Which interrupt request (IRQ) line number is normally used for the floppy disk controller?
6
-
Which is a term used to describe that data is whole or complete?
Data integrity
-
What is considered as a technique or method of checking data integrity?
Parity
-
Which is a very simple example of an error detecting code?
Parity bit
-
What is a way of utilizing a group of storage devices as if they were physically connected to a server when they are not?
Storage area network (SAN)
-
What is an advantage of using a storage area network (SAN) architecture?
Ease of replacing server.
-
What is the connection type of choice for storage area networks (SAN)?
Fiber channel.
-
Which storage device can be easily connected to a network and appears as a network drive?
Network attached storage (NAS)
-
Which storage device has the means of providing data storage reliability using multiple hard drives?
Redundant array of independent disks (RAID)
-
The hard drives in a redundant array of independent disks (RAID) array are presented to the server as...
one single hard drive.
-
Which technology is often used in redundant array of independent disks (RAID) array that can be daisy chained?
Small computer system interface (SCSI)
-
Which is not a characteristic of high-order languages?
Source codes that are written closest to machine language.
-
What best describes programming machine code?
Instructions in a form that is acceptable to the computer.
-
Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
Hyper Text Markup Language (HTML).
-
Which Web application is most likely to succeed Hypertext Markup Language (HTML)?
Extensible HTML (XHTML).
-
A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a...
common gateway interface (CGI).
-
Which protocol is commonly used for managing the security of a message transmission on the Internet?
Secure socket layer (SSL).
-
Which program can be used to automatically launch programs on a preset schedule?
Task scheduler
-
Which error-checking tool allows you to monitor the file system for errors?
Check disk
-
Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
Most significant digit (MSD)
-
What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?
Recovery strategies
-
Which type of backup would you use at the end of the week to save all data that you select on your systems?
Incremental
-
Which type of backup will backup all files that have been altered in the last 24 hours?
Daily
-
What is based around a central directory database containing information about all the domain controllers in the network?
Active directory
-
What is a group of users, servers, and other resources that share a centralized database of account and security information?
Domain
-
Where does a copy of the active directory database reside?
Domain controllers.
-
What kind of server contains the master listing of all active directory objects in the forest?
Global catalog
-
What is a set of rules that can be set to affect active directory leaf objects to control what can be done by a user?
Group policy objects
-
Which type of interface is friendlier for the average user to use?
Graphical user interface
-
Which of the following is not one of the elements that most graphical user interfaces are composed of?
Programs
-
Sitting at a computer and loading a software patch onto it is an example of what type of software patch?
Attended
-
Which type of patch would utilize a remote installation services (RIS)?
Unattended
-
Which components of domain name service (DNS) contain a database of associated names and IP addresses?
Name servers
-
Which query is made by one name server to another name server?
Non-recursive query
-
Which software program manages an IP address allocation for a network?
Dynamic host configuration protocol (DHCP)
-
The group of IP addresses that a dynamic host configuration protocol (DHCP) server manages is known as a...
scope.
-
What is the minimum number of scopes a dynamic host configuration protocol (DHCP) server can have?
One
-
According to Air Force dynamic host configuration protocol (DHCP) policies, how long is the lease that a noncritical workstation will have applied to them?
30 days
-
What type of service allows network administrators to install upgrades on any number of client computers at one time from a centralized location?
Remote installation services (RIS)
-
Which is NOT a component of Internet information services (IIS)?
Simple network management protocol (SNMP)
-
What component of windows unifies and simplifies day to day system management tasks?
Microsoft management console (MMC)
-
Which type of group manages user’s rights assignments and access permissions?
Security
-
Which special identity can represent users currently logged on to a particular computer and accessing a given resource located on that computer?
Interactive
-
What defines the rules by which operations can be performed on a particular resource?
Permissions
-
A feature of networking that enables individuals to designate resources they want other users to be able to access through the network is called...
sharing.
-
What permission always overrides all other permissions assigned to a user or group to which the user belongs?
No access
-
When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned?
Everyone group permission
-
Which exchange service is the first service launched when Microsoft Exchange starts and the last to stop when it is shut down?
System attendant
-
In Exchange System Manager, which container holds configuration objects such as Queues,Mailbox stores and Public Folder stores and protocols information?
Servers.
-
Which type of lists uses pointers to connect each element together?
Linked
-
A set of data elements (values) organized using a model of horizontal rows and vertical columns whose data is calculated in response to a query is called a...
table.
-
What is the most common type of operation in sequential query language (SQL)?
Queries
-
What type of sequential query language (SQL) statement would you use to make the changes you were working on permanent?
Transaction
-
Which is the most commonly used sequential query language (SQL) data statement?
Select
-
Which sequential query language (SQL) server feature tracks changes and is used to ensure data integrity?
Logging
-
Which UNIX capability can execute numerous programs at the same time?
Time sharing
-
Which UNIX ability can run on different types of hardware with few relatively minor changes?
Portability
-
Which UNIX operating system component interacts directly with the system hardware?
Kernel
-
Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data?
File system
-
Which UNIX shell is the most compact and is often used for writing shell scripts?
Bourne shell
-
Normally, when you create a file with a text editor, the file is set up with...
read and write permission for you and read-only permission for others.
-
To change permissions on a shell script, you use the UNIX command...
chmod.
-
The simplest place to put your function definitions is in your...
profile.
-
What do you type to quit a UNIX shell?
Exit
-
How many characters do most UNIX system administrators and users tend to use for filenames?
14
-
UNIX™ disks are divided into logical sections called...
partitions.
-
The /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
Root
-
What does the 0 following the c in the device name c0t6d0s7 represent?
Controller
-
What does the 7 in the device name c0t6d0s7 represent?
Partition
-
What is the basic unit for storing and manipulating a collection of logically related information known as data?
Files
-
Hard links are created using which UNIX command?
ln
-
Which UNIX mechanism enables programs to communicate with one another through the file system?
Named pipes
-
Which UNIX mechanism provides for communication with system device drivers through the file system one character at a time?
Character devices
-
Which UNIX command displays the current working directory?
pwd
-
Which UNIX command allows you to move to different directories within a file system using absolute or relative pathnames?
cd
-
Which UNIX command takes any characters from standard input and then echoes them to standard output?
cat
-
Which UNIX command deletes files from within a directory?
rm
-
Which UNIX command looks at an individual file and finds a specified pattern (string)?
grep
-
Which UNIX command changes the group ownership of one or more files?
chgrp
-
Which UNIX command changes the ownership of one or more files to a new owner?
chown
-
Which UNIX command sets access and modification times for each file to the current time?
touch
-
How many primary groups can a user be a member of?
One
-
Which UNIX vi mode allows users to execute set commands?
Command
-
Which UNIX vi character represents the end of the file?
$
-
While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file?
w!
-
In UNIX, which package of programs lets a terminal handle many sessions at once?
UNIX™ windows system
-
What is the most common UNIX windows system?
X windows
-
Which UNIX default command starts the X windows system?
xinit
-
The act of choosing the window you type is called setting the...
input focus.
-
What action puts unneeded windows out of the way without quitting the program inside them?
Iconifying
-
Which UNIX command from the menu bar moves a window to the bottom of the stack of windows?
Lower
-
The key to shutting down an xterm window is to know which of your programs is the...
controlling program.
-
The first step in quitting an xterm session is to...
quit all controlling programs.
-
Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man –k command?
catman
|
|