Part 1 Flashcards

(98 cards)

0
Q

What are the three basic network configurations?

A

Centralized computing, peer-to-peer network, server-based network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

A system of independent computers that are interconnected together to share data and resources is called a

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which basic network configuration uses “dumb terminals” parentheses along with mainframe computer?

A

Centralized computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

__________ is the standard for optical transport and is capable of transmitting data in excess of 1 Gbps.

A

Synchronous optical network (SONET)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The most popular physical network architecture in use today is called ________ .

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List the three primary differences between the network mediums (cables)?

A
  1. Distance the cables can run
  2. Ease of installation
  3. cost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The ________ topology uses cable segments from each computer that are connected to a centralized component such as hub.

A

Star

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A system of rules and procedures that govern communications between two or more devices on the network is called a __________.

A

Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The __________ layer in the protocol stack ensures that packets are delivered error free and in sequence.

A

Transport 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which transport protocol category establishes, maintains, and breaks connection with the receiving system?

A

Connection orientated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The User Datagram Protocol (UDP) falls under ________ _________ classification.

A

Connections less orientated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What concept of TCP/IP prevents network congestion by ensuring transmitting devices do not overwhelm receiving devices with data?

A

Flow Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A __________ is the combination of in IP address and port number.

A

Sockets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An example of an extra routing protocol used to link several LANs/MANs together is the ___________ ___________ ____________.

A

Border Gateway protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What protocol layer transmits the uninstructed, Raw bitstream over a physical medium?

A

Physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The ____________ __________ __________ __________ is the United States representative to the international organization for standardization.

A

American national standards Institute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the term for standard development by a company for that company’s products only?

A

Proprietary or closed standard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The ____________ is a standard that has been officially approved by a recognized standards committee.

A

Dejure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

List the three specifications for the 802 series of standards.

A
  1. Type of interface cards
  2. Components use for the LAN & wireless connection
  3. Layout of the connector pins and type of connectors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What IEEE 802 category defines standards for broadband wireless?

A

802.16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which IEEE 802 category defines standards for wireless LAN networks?

A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What device is designed to establish, maintain, and terminate a connection and transfer data without regard to its contents?

A

Data communication equipment DCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A __________ is a device that is added to a network to extend the length of cable.

A

Repeaters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A ___________ is a device that can connect to or more LAN segments together and uses software to perform switching functions.

A

Bridge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Which device functions as a translator between systems using different protocols on the same network?
Gateway
25
A _________ __________ creates a virtual private network through a process called "tunneling".
VPN concentrator
26
What type of clock uses an atomic resonance frequency standard as its time keeping element?
Atomic clock
27
__________ is the process by which a subject professes an identity and accountability is initiated?
Identification
28
What are six methods of identification and authentication?
1. Knowledge-based 2. Possession-based 3. Biometric-based 4. Combining methods 5. Ticket authentication 6. Single sign-on
29
Which I&A method is vulnerable to attack by guessing or deciphering the information
Knowledge-based, passwords
30
The I&A method that uses a token that the system can recognize by the host is called___________.
Possession based
31
___________ methods provide a high level of security because Authentication is directly related to the users behavioral or psychological characteristics.
Biometric
32
The use of prescribed safeguards & controls to prevent reconstruction of sensitive or classified information is called _________
Remanence security
33
Which method of destruction removed classified and sensitive information from media to render the information unrecoverable by technical means?
Sanitizing
34
______________ is the DOD's practical strategies for achieving information assurance (IA) in today's network dependent environments.
Defense in depth
35
What are the three elements that make up the defense-in-depth strategy?
1. People 2. Operations 3. Technology
36
The second element of the defense-in-depth strategy that focuses on all the activities required to sustain an organization's security on a day-to-day bases is called __________.
Operations
37
_____________ is networks architectural concept design for network security established by the Air Force.
Barrier reef
38
_____________ is what protects the base's "network perimeter" IAW Air Force security policies.
Boundary protection
39
The __________ router is controlled by the Integrated Network Operations and Security Center (INOSC)and is the first line of defense for Air Force bases.
Air Force SDP
40
A piece of hardware or software program that examines data passing into your computer or network is called a ___________.
Firewall
41
An ___________ system scans, audits, and monitors the security infrastructure for signs of unauthorized access or abuse in progress.
Intrusion detection IDS
42
The ability to identify and report vulnerabilities at the host & network level to protect resources directly manage by and NCC is called __________.
Internal controls
43
_________ limits access to base systems based on roles or identification that reflects the degree of the users need-to-know and privileges.
Access control
44
What is the procedural method that provides the capability to prioritize and guarantee network access to traffic at various levels of mission criticality?
Access preservation
45
What are the three sanction tools that form the foundation of the Combat Information Transport System (CITS)?
Internet security system ISS, intruder alert ITA, enterprise security manager ESM
46
The ___________ performs automated, distributed or event-driven probes of geographically dispersed network services and prioritizes scan results and remediation information in clear reports that allow users to respond quickly to critical vulnerabilities.
Internet security system ISS
47
__________ is an agent-based intrusion detection tool used by an OSC and NCC operators to detect unauthorized activity on select network host, key servers, and critical workstations.
Intruder alert ITA
48
Which Air Force approved tool runs on a management server and has agents installed on host to run checks based on vulnerabilities of particular operating system?
Enterprise security management
49
The two primary goals of anti-virus software are?
Prevention and detection
50
Automated security incident management system (ASIMS) all connections and looks for suspicious events that enter a ?
Base Network
51
A network ___________ Policy focuses on controlling the network traffic and usage
Security
52
List the three types of the perimeter and networks.
Outermost perimeter, internal perimeter, and innermost perimeter
53
The ___________ network is the most insecure area of your network infrastructure
Outermost perimeter
54
A __________ is in access control device, performing perimeter security by determining which packets are allowed or denied into a network
Firewall
55
What filtering firewall works by examining packets and comparing them to a list of rules based on source of data, intended destination, and the port number the data was sent from?
Packet filtering or IP firewall
56
A ___________ Firewall examines more than just addresses and port information of the data by looking deeper at the actual application data
Stateful Packet inspection
57
Name the five network-management domains as defined by ISO
Fault, configuration, accounting, performance, and security management... FCAPS
58
__________ Management is the process of detecting isolating and correcting network problems
Fault
59
periodically the network management software can't send out a message to other devices asking them for their status which is called
Polling
60
The final step and fault management is called _______The problem
Fix
61
The goal of _____________ ___________ is to monitor network in system configurations so that effects on network operations of various versions of hardware and software can be tracked in managed
Configuration management
62
Storing data in a database such as relational database management system RDMS to allow quick access to the number of routers in a building falls under __________ management
Configuration
63
" fine-tuning " a networks operation capabilities fall under ?
Performance management
64
What is the measurement of network usage, costs, charges and access to resources?
Accounting management
65
The goal of _____________ management is to ensure all users have adequate network resources and they are regulated and distributed accordingly
Accounting
66
Securing axis points to sensitive information on the network is part of ___________ management
Security
67
Security management under FCAPS deals with physical and operating system security.... T/F?
False, physical & operating security fall under physical security
68
As part of security management __________ ___________ ___________ should be used to provide a basic level of security for accessing the network
Access Control List (ACL)
69
The final step in security management is ____________ The secure access points
Maintaining
70
___________ __________ __________ are another name for communication computer facility records
Central office records
71
__________ is the database design to proactively manage small, medium, and large scale enterprise network's from local, regional, and central locations simultaneously.
CIARS
72
Which software was adapted by the Air Force as the standard application to generate and maintain telephone central office records?
TMS telecommunications management system
73
What is another name for action request system?
Remedy
74
A central point to receive help on various computer issues is called
Help desk
75
______________ Computer has resources associated with it, but nothing is shared with another system.
Stand alone
76
Also called a domain
Server based networks
77
Ethernet uses what to regulate network access?
CSMA/CD
78
What is another name for a trunk?
Backbone or segment
79
In bus topology what is needed at the end of the cable runs to prevent signals from bouncing back down the cable?
Terminators
80
What is the most common physical topology?
Star topology
81
What are the three basic elements of any communications protocol?
Character set, sequence and timing messages, and procedures for error detection and correction
82
What is required for connection to be established in TCP?
Three-way handshake
83
What agency assigns and controls all well-known ports?
IANA INTERNET ASSIGNED NUMBERS AUTHORITY
84
Which ISO layer determines the best route based on network conditions?
Network layer (3)
85
Which ISO layer is also considered the hardware layer?
Physical layer (1)
86
Which Institute develop the 802 standard?
IEEE
87
What organization oversees the development of Internet standards and protocols, especially IP addressing
IAB Internet architecture board
88
Which organization promotes US Innovation and industrial competitive's by advancing measurement science, standards, and technology in ways that enhance economic security improve quality-of-life
NIST National Institute of standards and technology
89
Widely excepted standard designed to apply to equipment and software, regardless of manufacture
Non-proprietary or open standard
90
Standard without any formal path of implementation
De facto
91
What is required when going from one type of media to another?
Converters or media converters
92
What is known as the physical address, burned in address, or ethernet address?
MAC address
93
What are the two types of specialized network interface cards?
Wireless and fiber optic
94
What are used to connect two or more network segments and supports dynamic path assignment
Routers
95
Which layer 2 device uses hardware to preform switching?
Switches
96
What is a good way to organize a network that has a lot of connection and provides room for growth
distribution racks and rack shelves
97
What is space-based radio positioning and time transfer system
GPS