Network Management Flashcards

1
Q

What are the two types of areas of responsibility (AOR)?

A

Terrain: Proxy servers, firewalls
Function: Cyber Defense, Theater Deployable Comm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a library that provides guidelines that can help organizations implement best practices that have been learned the hard way by those who came before?

A

ITIL (Information Technology Infrastructure Library)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IT Service Management is comprised of what 5 processes?

A
  • Incident Management
  • Problem Management
  • Change Management
  • Release Management
  • Configuration Management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What’s the difference between Incident Management and Problem Management?

A

Incident Management deals with single-user issues, while Problem Management involves grouping similar incident tickets into a single problem ticket because they have the same root cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What process prevents ad hoc changes to the network and ensures that any changes to the baseline IT configuration are documented and authorized?

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the strategic approach used to implement changes to and IT system?

A

Release Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What documents the current state of the network by illustrating the services, assets, and infrastructure?

A

Configuration Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Regarding IT Service Management, fill in the blanks:
___________ = What I want to do
___________ = What I am doing
___________ = What I did

A

Change Management = What I want to do
Release Management = What I am doing
Configuration Management = What I did

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is used to track information regarding events that occur on shift such as Classified Message Incidents (CMIs), network outages, personnel reporting for duty, firewall or Exchange issues?

A

MSL (Master Station Log)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Who controls and defends the Air Force enterprise boundary?

A

26th NOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many Air Force DISA gateways are there?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who centrally manages and controls network core services?

A

ESU (Enterprise Services Unit)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Where are the data centers/servers physically located that are operated by the ESUs?

A

APC (Area Processing Center)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Who provides Proactive Detection and Rapid Response against advanced adversaries?

A

DCC-P (Defensive Counter Cyber - Pursuit) (33rd NWS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the types of missions conducted by DCC-P?

A
Combat Cyber Patrol / Scanning Orbit:
- Wide-scope proactive scans for adversaries
- Enterprise-level malware hunting
Pursuit Mission:
- Rapid Response to detected intrusions
- Cyber Tracking – Determining the extent of infections
Engagement:
- Disable malware/enemy accesses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the name for the DoD’s move to a single, orchestrated construct for providing IT services.

A

Joint Information Environment (JIE)

17
Q

Who resolves Tier-2 incident and problem tickets?

A

I-NOSC (Integrated Network Operations and Security Center)

18
Q

Who performs the execution of enterprise network security and centralizes these aspects of network security?

A

I-NOSC (Integrated Network Operations and Security Center)