Term
|
Definition
| A set of networks connected by routers |
|
|
Term
| What does a heterogeneous network environment consist of? |
|
Definition
| Computer systems from different vendors that run different OS and Communication protocols. |
|
|
Term
|
Definition
| A network of components from the same vendor or compatible equipment that all run under the same OS or NOS |
|
|
Term
| Which type of network (homo vs hetero) is more common? |
|
Definition
|
|
Term
| What is a communications network that serves users within a confined geographical area? |
|
Definition
|
|
Term
| What type of network usually provides services for 2 to 10 users? |
|
Definition
|
|
Term
| How many users does a single server network normally service? |
|
Definition
|
|
Term
| What type of netowrk can service 1000+ users? |
|
Definition
|
|
Term
| What is used for addressing on a physically connected network to identify network nodes? |
|
Definition
|
|
Term
| What is the numbering system that computers use to represent data? |
|
Definition
|
|
Term
| Within IP addressing, how many bits are used and how are they broken down? |
|
Definition
| 32-bit IP address is broken into 4 sets of 8 bits |
|
|
Term
| What mechanism is used to designate a part of an IP address as the network address, and other parts as the host address? |
|
Definition
|
|
Term
| What is the primary reason for subnetting in IPv4? |
|
Definition
| Improve efficency in using a limited number of available address spaces and to improve security |
|
|
Term
| What bits in an IP address are routers mainly concerned with? |
|
Definition
|
|
Term
| What does AFPD-33-1, Information Resources Mangement, establishes policy on? |
|
Definition
| responsibly acquiring, planning, and managing its information resources |
|
|
Term
| AFI 33-104, Base-Level Planning and Implementation, outlines what actions? |
|
Definition
| Standard management practices and tells how to manage planning and implementation of comm and info systems and the base level infrastructure |
|
|
Term
| What are 3 areas of distibuted responsibilitiy does the DIICC consist of? |
|
Definition
| Global, Regional and Local levels |
|
|
Term
| What is Network Management (NM)? |
|
Definition
| The systems management mechanism that monitors and controls data collection for the purpose of data analysis and report generation on an OSI-based communication network |
|
|
Term
|
Definition
| A bundle of application software designed to significantly improve network efficiency and productivity |
|
|
Term
| Where should the NM server be located? |
|
Definition
| Place the server itself in an area that is controlled strictly by the NCC |
|
|
Term
| What are the 3 most common NM architectures? |
|
Definition
| Centralized - 1 computer system at a location responsible for all NM duties |
|
|
Term
| What are the 4 levels of activity that one must understand before applying management to specific services or devices> |
|
Definition
| Inactive, Reactive, Interactive, Proactive |
|
|
Term
| What is configuration management? |
|
Definition
| The process of obtaining data from the network and using that data to manage setup all management netowrk devices |
|
|
Term
| What are the two features built into an NMS that alleviate manually configuring a networks devices? |
|
Definition
| Automatic Discovery and Auto -Mapping |
|
|
Term
| What does performance management consist of? |
|
Definition
| Consists of the facilities needed to evaluate behavior of network objective and effectiveness of comm activities |
|
|
Term
| What are the two functional categories of performance management? |
|
Definition
|
|
Term
| What is Secuity Management? |
|
Definition
| Protecting sensitive information on devices attached to a data network by controlling access points to that information |
|
|
Term
| What are the 2 subsections of security management? |
|
Definition
|
|
Term
| What is fault management? |
|
Definition
| The process of identifying, locating, and correcting network problems |
|
|
Term
| What is the difference between a fault and an error? |
|
Definition
| Faults - abnormal conditions require NCC to take action to correct or repair |
|
|
Term
| What are some drawbacks to ICMP pinging as a NM tool? |
|
Definition
| Unreliable delivery of packets. Need for polling, limited info derived from responses |
|
|
Term
|
Definition
| Hierarchical, structured format that defines the NM information available from network devices |
|
|
Term
| What are the 2 parts of the labeled node? |
|
Definition
| Object Identifier (OID) and Short text description |
|
|
Term
| What are the 2 types of nodes that make up the MIB tree? |
|
Definition
|
|
Term
| What are the differences between the 2 types of nodes that make of the MIB tree? |
|
Definition
| Labeled - May have subordinate labled/leaf node |
|
|
Term
| What are some examples of what a node in SNMP can represent? |
|
Definition
| Workstation, client, network user, personal computer, server, printer, etc |
|
|
Term
| Describe each of the 2 categories of SNMP. |
|
Definition
| Manager - Uses the NM station to issue requests for information from managed nodes |
|
|
Term
| What does the Get operation do? |
|
Definition
| Retrieves the value of one specific instance of manag. information |
|
|
Term
|
Definition
| Unsolicited message from an agent to the manager |
|
|
Term
| What are community names? |
|
Definition
| Group that contains at least one agent and one management system |
|
|
Term
| What are 2 types of community names? |
|
Definition
| Read (Get) and Write (Set) |
|
|
Term
| What do the two hierarchies provided by the CIM descirbe? |
|
Definition
| Physical - Real world components |
|
|
Term
| What are the 3 methods ofcreating a representation of a network topology within the domain managers repository? |
|
Definition
| Auto Discovery, Manual and Topology Discover |
|
|
Term
| What are the 3 main components of SMARTS? |
|
Definition
| Domain Manager, Broker, Clients |
|
|
Term
| What is the primary console in SMARTS and what does it display? |
|
Definition
| Monitoring console - the results of the domain manager's correlation alrams |
|
|
Term
| What are 2 factors that determine if a SMARTS map is opened with read-write access or with read-only access? |
|
Definition
| 1- only 1 user can have a specific map opened with R&W access at any one time |
|
|
Term
| What are the 3 types of notifications used in SMARTS? |
|
Definition
| Problem, Compound Event, Symptomatic Event |
|
|
Term
| What are the primary capabilities provieded by a protocol analyzer? |
|
Definition
| to monitor the traffic on a segment or domain are collision at a time |
|
|
Term
| What is the recommended minimum amount of time to acquire netowrk information to establish a performance baseline? |
|
Definition
|
|
Term
| What function of the protocal analyzer excludes specific type of frames? |
|
Definition
|
|
Term
| On the protocol analyzer, what menu isbest used to report errors that occur at thephysical layer such as bad FCS, short frames, and jabbers? |
|
Definition
|
|
Term
| On the protocol analyzer, what kind of information does the connection statistics menu provide? |
|
Definition
| The bandwith utilization and the number of connections that related to specific nodes |
|
|
Term
| What are the 3 types of active tests tha are conducted with a protocol analyzer? |
|
Definition
| Ping, tracert, traffic generator |
|
|
Term
| What is identification as it pertains to information protection? |
|
Definition
| Proces of proving that a subject is what the subject claims to be |
|
|
Term
| What is authentication as it pertains to information protection? |
|
Definition
| A measure used to verify the eligibility of a subject and the ability of the subject to access certain informaiton |
|
|
Term
| On an AF network, what is your passowrd requried to have in it? |
|
Definition
| 9 characters long, 2 upper/lower, 2 numbers, and 2 special |
|
|
Term
| Where are biometrics based authentication and identification generally used, and why? |
|
Definition
| provide very high levels of security, more expensive, reserved for areas that require very high level of security |
|
|
Term
| What is the biggest risk with a possession based system for identifying and authenticating yourself? |
|
Definition
|
|
Term
| Why would you use a combination of methods for identifying and authenticating yourself? |
|
Definition
| substantially increase the security of an IA system |
|
|
Term
| What are the 3 methods of providing strong authentication? |
|
Definition
| Biometric & possession based, cryptographically protected, and using one time passwords |
|
|
Term
| Where can you find specific guidance concernging remanence security? |
|
Definition
| AFSSI 8580, Remanence Security |
|
|
Term
| What is remancence security? |
|
Definition
| the use of prescirbed safeguards and controls to prevent reconstruction/disclosure of sensitive/classfied information to persons who dont have prper clearance or need to know for the information |
|
|
Term
| When something is sanitized, is it automatically declassified? |
|
Definition
|
|
Term
| Until when must you retain classification controls? |
|
Definition
| until the media is sanitized, declassified, or destroyed in an approved manner |
|
|
Term
| When does the information owner of storage media declassifiy the media? |
|
Definition
| after the information owner provides evidence that no information resides on the media, the information owner can declassify the media by removing the classification markings |
|
|
Term
| When is destroying storage media NOT necessary? |
|
Definition
| If the media is sanitized and declassified |
|
|
Term
| What must you ensure when you are degaussing storage media? |
|
Definition
| coercivity strength of the magnetic field generated by the degausser is strong enough to return the mag media to its zero state |
|
|
Term
|
Definition
|
|
Term
| What is the biggest difference between DIACAP and previous processes? |
|
Definition
| It tracks every IS and network from inception to retirement |
|
|
Term
| What 2 publications provide the basic framework of the C&A process? |
|
Definition
| IT lean reengineering process and AFI 33-210 |
|
|
Term
| What is the SISSU checklist? |
|
Definition
| consolidated list of requirements covering each of those areas that a program office must adhere to when developing and fielding a system |
|
|
Term
| What are the most common AF circuit-enclaves? |
|
Definition
|
|
Term
| What are the SIPRNET, and NIPRNET, and how does the SIPRNET differ from the NIPRNET? |
|
Definition
| SIPR does not provide acces to the internet or any other lower classificaiton networks |
|
|
Term
| What is the name of the concept that DOD uses in network defense? |
|
Definition
|
|
Term
| Where would a network monitoring device such as an ASIM be placed in relation to the netowrk? |
|
Definition
| placed outside the boundary protection mechanism to monitor all attempted attacks |
|
|
Term
|
Definition
| encapsulating a message inside a 2nd message that will pass thorugh the firewall |
|
|
Term
| What kind of servers would typically befound in a DMZ? |
|
Definition
| all servers in a netowrk enclave that interface with the internet |
|
|
Term
| What is the simplest an dleast expensive type of firewall? |
|
Definition
| Packet Filtering Firewall |
|
|
Term
| What type of firewall is used to separate secure sites, networks, or network segments from less secure areas? |
|
Definition
|
|
Term
| Describe the 2 categories that security related access controls fall into? |
|
Definition
| Technical and Administrative controls |
|
|
Term
| Regardless of the source of the threat, what is it usually targeting? |
|
Definition
| A vulnerability or weakness in the network |
|
|
Term
| How does a virus activiate? |
|
Definition
| the infected program must execute, activating the virus |
|
|
Term
|
Definition
| Group of computers that have been infected by bots under the control of a person or group |
|
|
Term
| How is a Trojan horse different from a regular virus? |
|
Definition
| it does not replicate itself |
|
|
Term
| What step is taken before an IS is connected to the AFGIG? |
|
Definition
| Baseline configuration applied to the prior |
|
|
Term
| What does the PKI enable users of basically unsecured public networks to do? |
|
Definition
| to securely and privately exchange data through the use of public and private crypto key pars obtained and shared through a trusted authority |
|
|
Term
| Describe a symmetric central server architecture |
|
Definition
| where each entity in the community shares a secret key with the central server |
|
|
Term
| What do users use to verify that a particular public key belongs to a particular user? |
|
Definition
|
|
Term
| What is a CA responsible for |
|
Definition
| establishing, authenticating, maintaining, revoking certs and hardware |
|
|
Term
| What are the 2 ways that key establishment can occur? |
|
Definition
| Key transfer and key agreement |
|
|
Term
|
Definition
| one entity generates the symmetric key and sends it to the other etity |
|
|
Term
|
Definition
| both entities jointly contribute to the genereation of the symmetric key |
|
|
Term
| How long should ECDSA and ECDH keys be to provide adequate security for the medium-to-long term? |
|
Definition
|
|
Term
| What was the fundamental premise in the original formulation of public-key cryptography? |
|
Definition
| 2 strangers should be able to communicate securely |
|
|
Term
| What does the PKI user population trust CA authorities to do? |
|
Definition
| Perform the function of binding a public key to a given identity |
|
|
Term
| What are the 4 configurations for CA servers? |
|
Definition
|
|
Term
| What happens when a cert on a CRL is used? |
|
Definition
|
|
Term
| What is the difference between a software token and a hardware token? |
|
Definition
| HW token - built in security ofsome sort that must be entered to use the cert/keys |
|
|
Term
|
Definition
| Identity, email signing, encryption |
|
|
Term
| What does the global directory service providce for? |
|
Definition
| the ability to search for individiuals, access information about them |
|
|
Term
| What does middleware allow the use of? |
|
Definition
| a wide variety of customers to access a single DB, translating diverse input into something the DB can understand |
|
|
Term
| What does combat-ready communications and information forces provide? |
|
Definition
| first-in capabilities to support peacetime through combat operations worldwide |
|
|
Term
| Who plans, engineers, deploys, and employs support for all air and space forces? |
|
Definition
| Communications and Information (C&I) professionals |
|
|
Term
| Why do we have quicker response times, an efficient use of resources, and more effective training than previous Air and Space Expeditionary Force deployments? |
|
Definition
| Versatiility and Flexability |
|
|
Term
| Within what time frames are initial communications support designed to proved basic communications to a bare base operations? |
|
Definition
| 24-72 hours of deployment notification |
|
|
Term
| What are the 3 major components in the TDC program? |
|
Definition
|
|
Term
| What program is a state-of-the-art groundcommunications infrastructure that is designed to replace existing older communications systems? |
|
Definition
|
|
Term
| Is TDC-ICAP used in initial communications support or sustained communications support? |
|
Definition
|
|
Term
| What concept allows planners to scale the netowrk to meet the needs of deployments ranging from a few subscribers to a full wing, or even a Joint AF Command Component? |
|
Definition
|
|
Term
| What is the conduit that ties all the LANs together and provides the interface to other networks? |
|
Definition
|
|
Term
| Which phase of the deployment cycle is all the preparation done? |
|
Definition
|
|
Term
| What order indicates that your unit may deploy? |
|
Definition
|
|
Term
| Which pahse in the deplyment cycle do you enter after disembarking from your transportation? |
|
Definition
|
|
Term
| In which phase of the deployment cycle do you replace and or repair worn equipment and replenish supplies? |
|
Definition
|
|