3D052 Flashcards

1
Q

What is a group of computers that are connected with each other?

A

A network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A set of networks that are connected with routers.

A

Internetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A private network whose access is generally restricted to authorized persons.

A

Intranetwork

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Collection of networks under common administration that share a common routing strategy.

A

Autonomous system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A communications network that serves users within a confined geographical area.

A

LAN (local area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A network that spans a metropolitan area.

A

MAN (metropolitan area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A data communications network that serves users across a broad geographical area and often uses transmission devices provided by common carriers.

A

WAN (wide area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network composed of different interconnected computer networks that cover an unlimited geographical area.

A

GAN (global area network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

These networks are used for a small number of systems, generally 2-10 users.

A

Peer-to-peer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

These networks are designed for a relatively small number of people, with one server managing network access, security, file storage, email, web surfing, and all other needs. Generally for 10-50 users

A

Single-server network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network containinig more than one server, often with each server serving a specialized purpose. Generally 50-250 users.

A

Multi-server network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A network that contains multiple servers, but different parts of the network may be located in different areas, such as different buildings. Generally 250-1000 users.

A

Multi-server high-speed backbone network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A network containing hundreds of thousands of devices, most often geographically dispersed, but remaining under the management of one organization. Generally 1000+ users.

A

Enterprise network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is used to uniquely identify (by use of binary or hexadecimal numbers) all nodes that need to participate in internetworking?

A

IP addressing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is legacy internet addressing system with a limited number of addresses?

A

Internet protocol version 4 (IPv4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___________ is when you create smaller “subnetworks” off of your network by manipulating the subnet mask.

A

Subnetting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This is a mechanism used to designate part of IP address as the network field and part of it as the host field.

A

Subnet mask

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This internet addressing system is designed to replace IPv4, increasing the number of available IP addresses by over a billion time.

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is normally the subnet mask in IPv6 addresses?

A

/64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How do you determine an IP range?

A

By combining the subnet range and the host range together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is classless inter-domain routing and when was it introduced?

A

A system that distributes addresses through the technique of variable length subnet masking (VLSM), and combines numerous small networks into larger networks for the purpose of tracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

______ is used to effectively manage the waste of IP addresses on your network.

A

VLSM (variable length subnet masking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which AFI series covers communications-computer networking and information management?

24
Q

_____ establishes AF policy for responsibly acquiring, planning and managing its information resources.

A

AFPD 33-1: Information Resources Management

25
\_\_\_\_ establishes the AF IA program to provide continuously for the availablity, integrity, confidentiality, nonrepudiation, and authentication of informatin and ISs as an essential element to achieving the AF mission.
AFPD 33-2: Information Assurance
26
\_\_\_\_\_\_\_ outlines standardized management practices and tells how to manage planning and implementation of communications and information systems and the base-level infrastructure.
AFI 33-104, Base Level planning and implementation
27
\_\_\_\_\_\_\_ implements AF policy directives 33-1, 33-2, and 10-6, by identifying responsibilities for supporting AF information technology equipment (computer systems).
AFI 33-112: Information Technology Hardware Asset Management
28
\_\_\_\_\_\_ identifies responsibilities for management of commercial off-the-shelf (COTS) and AF-unique software acquire by the AF.
AFI 33-114, Software Management
29
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ provides the overarching policy, direction and structure for the AF Global Info Grid (AF-GIG) and procedures necessary to manage the increasingly complex network environment.
AFI 33-115, VOLUME 1, Network Ops
30
AF network management adheres to the Defense Information Infrastructure Control Concept (DIICC) and Network Control Center (NCC) relationship. The DIICC consists of what three areas of distributed responsibility?
Global, Regional, & Local
31
The international standards organization (ISO) definition of network management is:
Systems management provides mechanisms for monitorinig, control, and coordination of resources within the open systems interconnection (OSI) environment.
32
What are CITS?
Combat Information Transport Systems
33
A _________ is a bundle of application software designed to significantly improve network efficiency and productivity.
Network Management Server
34
The network management server is essentially a network server that specifically runs _________ based management applications.
Simple Network Management Protocol (SNMP)
35
It is important to place a network management server should be placed.......
...on a subnet that is seperate from the busy user subnets but where it still has access to the info produced by teh managed devices on those subnets.
36
What are the three most common network management architectures?
Centralized, hierarchical, distributed
37
\_\_\_\_\_\_\_\_ has a NM platform on one computer system at a location that is responsible for all NM duties.
Centralized architecture
38
\_\_\_\_\_\_\_\_\_\_\_ uses multiple systems, with one system acting as a central server and the others working as clients.
Hierarchical architecture
39
A ____________ combines the centralized and hierarchical architectures.
Distributed architecture
40
\_\_\_\_\_\_\_\_\_\_\_\_\_\_\_ is the process of obtaining data from the network and using that data to manage the setup of all managed network devices.
Configuration managament
41
\_\_\_\_\_\_\_\_\_\_\_ consists of the facilities needed to evaluate the behavior of network objects and the effectiveness of communications activities.
Performance management
42
What are the two seperate functional categories of performance management?
Monitoring-Tracking historical data by tracking activities on the network. Tuning-Deals strictly with the adjustment of the parameters on the network devices to improve overall operation.
43
\_\_\_\_\_\_\_\_ encompasses protecting sensitive information on devices attached to a data network by controlling access points to that information.
Security Management
44
\_\_\_\_\_\_\_\_\_ is the protection of your data network including all hardware, software and information.
Network security
45
What are the three distint aspects of information that must be protected?
Confidentiality, integrity, and availability
46
\_\_\_\_\_\_\_\_\_\_\_\_ covers all aspects associated with the collection and protection of the data stored within the NMS itself.
Network management system security
47
\_\_\_\_\_\_\_\_\_\_\_ involves measuring the usage of a network resource against a user or organization.
Accounting management
48
\_\_\_\_\_\_\_\_\_\_ is the process of identifying, locating, and correcting network problems (faults). \*\*\*of all the network managment areas, this one is probably the most important\*\*\*
Fault Managment
49
What are abnormal conditions that require NCC personnel to take action to correct or repair? What sometimes arise on normal functioning networks and do not necessarily require attention?
Faults Errors
50
A _______ is a standard set of rules defined for communications.
A protocol.
51
Network management protocols, in most cases, reside above which layer of the OSI model?
The session layer (5)
52
The ________ is a hierarchical, structured format that defines the network management informationa vailable from network devices.
Managment Information Base (MIB)
53
What are the two types of nodes associated with the MIB structure?
Labeled and Leaf
54
What are the four operational SNMP messages within NM?
Get, GetNext, Set, Trap
55
\_\_\_\_\_\_\_ is a programming and reporting standard defined by a consortium of computer and networking companies.
Desktop Management Interface (DMI)
56