• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/287

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

287 Cards in this Set

  • Front
  • Back
What AFI series covers communications and information?
33
What Air Force publication establishes policy on how C4 systems are acuired, operated, and maintained?
AFPD 33--1
What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through NCCs?
AFI 33-115, Vol 1
What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?
AFI 33-115, Vol 2
What organization does communication and information services entering and exiting the base or site fall under the oeprational control of?
Base NCC
What function within the NCC provides technical assistance to the unit functional system administrators and workgroup managers?
Network administration
Whose network area of responsibility starts at the user's terminal and ends at the server, but does NOT include the network backbone infrastructure components?
unit functional systems administrator
what AFI sets the policies that unit client support administrators must comply with?
AFI 33-115
What NCC function responds to detected security incidents, network faults (errors), and user reported outages at the time of help desk referral?
Network management
What NCC function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?
Configuration management
Performance management can be broken into which two separate functional categories?
Monitoring and tuning
To determine the level of network service provided to users, you will make a measurement of the total response time
rejection rate and availability of the network.
What NCC function increases network responsibility by giving the network manager tools to detect problems and initiate recovery procedures?
Fault management
What does Network Security work to ensure about a network?
Availability, confidentiality, and integrity of data
What jobs are performed by a help desk technician on a daily basis?
Network monitoring, account unlocks, and account creations
With in the NCC, what function is initially responsible for taking trouble calls, decidin what type of problem has occurred, and what to do about the problem?
Help desk
What is one of the most important communications skills you can develop as a help desk operator?
Listening
What software is used to open trouble tickets for customer trouble calls?
Remedy
What are a set of subnets that are connected with routers?
Internetwork
What is a set of systems/nodes on a local segment that can be off of a switch or a router?
Intranetwork
What type of network environments consists of computer systems from different vendors that run different operating systems and communication protocols?
Heterogeneous network
What type of network is made up of componets from the same vendor or compatible equipemnt that all run under the same operating system ro network operating system?
Homogeneous network
What type of communications network serves users within a confined geographical area?
Local area network
What type of communications network links geographically dispersed offices in other cities or around the globe?
Wide are network
How many users ar in a peer-to-peer network?
2 to 10
How many users are in a single-server network?
10 to 50
How many users are in a multi-server high-speed backbone network?
250 to 1000
In most cases the frequencies used by wireless networks are in what frequency band?
Industrial, scientific, and medical (ISM)
What is the distorting and/or weakeing of a signal as it traverses the media called?
Attenuation
What is a measurement of data transferred through the media between network connections?
Throughput
What is a form of communications that transmits information as a serial stream of bits or bytes?
Asynchronous communication
What categoy of twisted-pair cables has the highest throughput?
Cat 5
A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?
Core
Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
100
What type of otic fiber is used to span extremely long distances?
Single mode
What type of optic fiber is designed for the LAN environment and light is typically generated with an LED?
Multi mode
What are the principle advantages of fiber otics with present day transmission technologies?
Sturdiness and security
What network topology consists of a single central cable to which all computers and other devices connect?
Bus
What is the greatest risk to a bus network?
The bus itself can beome inoperable
On what netwrok topology, can multiple transmit frames co-exist?
Fiber Distributed Data Interface
hat is the major DOD contribution to networking?
The TCP/IP Suite
What is a set of rules tha tdefine how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?
Protocol
What layer of the OSI model is really a set of rules regarding the hardware used to transmit data?
Physical
What layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for the information transmission?
Data Link
What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?
Transport
A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?
Checkpointing
Which layer of the OSI model is connected with network security, file transfers, and formatting functions?
Presentation
The IEEE 802.3 standard describes a local area network using what kind of topology?
Bus
What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?
Carrier Sense Multiple Access/Collision Detection
What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?
Solicit successor frame
The IEEE 802.5 standard was developed to cover what local area network topology?
Token Ring
Why can a token rink network cover a greater distance than a token bus network without loss of signal?
Because each workstation repeats the signal
What X series protocol is a Message Handling System (MHS) standard, that defines the structure of a store-and-forward e-mail message handling system?
X.400
What X series protocol is a Directory Services specification standard that defines the structure of a store-and-forward e-mail MHS?
X.500
Which protocol of TCP/IP provides a connectionless datagram "network access" layer?
Internet Protocol
Which protocol of TCP/IP is a connection oriented, reliable, host-to-host transport protocol?
Transmission Control Protocol
What makes it possible for implementers to produce new NFS systems without having to reconstruct their own system's internal data representation formats to suit NFS?
eXternal data representation
As information passes down trhought the protocol layers, what is the packet that is formed called?
Protocol data unit
What is the only layer inthe OSI model that simply transmits the completed frame?
Physical
What layer of the OSI model adds a trailerto the packet?
Data Link
In the Ethernet environment, what is the minimum number of octetsin a frame so it can be sent and recieved?
46
What is used to identify network nodes on a physically connected network?
Media access control address
How many octes is the standard Internet Protocol broken down into?
4
What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?
Standard
What communications device converts binary electrical signals into acoustic sigals for transmission over telephone lines?
Modem
What communications device is used for converting analog signals to digital for transmission o digital lines?
Codecs
What NIC module drives the signal onto and from the physical medium?
Transmit/Receive
What NIC module converts information into a coded data stream?
Encode/Decode
What NIC module temporarily holds data for processing to or from the network?
Frame Buffering
What network component serves as a central connecting point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately?
Hub
What type of hub has special capabilities for configurations and or management?
An intelligent hub
What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped?
Broadcast storm
What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals?
A collision domain
The purpose of a network repeater is that it
regenerates any signal received.
What is a local area network connection dvice with two or more ports that forwards frames from one LAN segment to another?
Bridge
What are the four basic functions of bridge?
Listen, learn, filter, forward
Bidging loops are created when
there is more than one path to the destination.
What is used to logically eliminate loops within a network?
Spanning Tree Algorithm
The bridge in a network with the highest priority (the lowest number) is called the
root
Switching conducted at the layer 2 cetegory is based soley upon what information?
The MAC address
Switching conducted at the layer 3 category is based upon what information?
the MAC and IP address
What type of switch is limited in its applications to small workgroups where throughput is an issue but where protential network errors will not upset the network?
Cut through
What type of switch reads the first 64 bytes before forwarding the frame?
Fragment free
What is the technology called that allows NIC to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?
Auto negotiation
What is a logical grouping of end stations, independent of physical location, with a common set of requirements called?
Virtual local area network
What is the most common method of defining Virtual local area network memebership?
Port grouping
At what level of the OSI model does a router work?
Network
What is the primary device used for connecting these networks, both within and between networks?
Router
The function performed by a router to move information from one router to another according to decided path determinations is
switching (book)
routing (answer sheet)
What type of routing is the establishment of routes by the network administrator that changes only whne done manaually?
Static routing
What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?
Dynamic routing
In what Dynamic Routing Protocol must packets go the complete distance before discovering the destination is unreachable?
Distance Vectoring
What routing metric is generally based upon the bit-error rate of the link?
Reliability
What prevents a router from sending route information back to the router from which it came?
Split horizons
What acts as a translator between two workstations or networks that use different operating systems, communications protocols, and data format structures?
Gateway
Where is the backup copy of the Cisco Internet Operating System configuration information stored in the internetworking device?
Nonvolatile RAM
What are the network connections trhough which network traffic enters and exits a router called?
Interfaces
What prompt is displayed when in the User Exec mode on a router?
Router>
What prompt is displayed when in the Privileged Exec mode on a router?
Router#
From what level can all other command modes be accessed?
Privileged Exec level
From what mode is the banner motd command used in?
Global configuration mode
What command is used to restrict access to the Privileged Exec mode?
Enable password
What command interface configuration command is used to activate an interface?
No shutdown
To view the current configuration of a router, what command is used from privileged exec mode?
Show running
What command is used to change the bootup values within ROM monitor mode?
Confreg
What filters network traffic by controlling whether routed packets are forwarded or blocked at a router's interface?
Access control lists
What do all acces lists end with?
Implicit deny
Router access lists must be applied to
interfaces.
What does a standard access list use to filter packets?
Source IP address
What is the range of number that represents standard access lists?
1-99
What kind of server is set aside to perform a specific task or function all the time?
Dedicated server
What network type normally untilies non-dedicated servers?
Peer-to-peer
What is required to do the differences between the physical speed of the print device and the processing speed of the worststaion generating the print job?
Print qeues
What frees the computer's attention so the user can continue working while waiting for a document to print?
Print spooling
What type of server is a bundle of application software designed to significanlty improve netwrok efficiency and productivity?
Network Management System
What two type of environments are newtork operating systems implemented upon?
Peer-to-peer and client server
Within the Windows environment, what is the central repository for the entrie software and hardware configuration settings in a computer running the Windows based NT operating system?
Registry
What is a set of keys, subkeys, and values fromt he registry stored in its own file locations called?
Hive
Fsys in ehivh tooy-key determines which device drivers and services will load during the boot process?
HKEY_LOCAL_MACHINE
What is a set of statistical measurements made over a period of time that characterizes network performance?
Baseline
What is a detailed analysis of the performance of a specific application or a specific network element?
Benchmark
What network performance criteria is the most significant statistc to be collected and calculated?
Network availability
The measurement of traffic volume actually being carreid by the network typically expressed in kilobytes per second is
data throughput.
What is defined as a bundle of application software disgned to significantly improve network efficiency and productivity?
Network management server
What are the three most common network managment architectures?
Centralized, hierarical, and distributed
What network managment architecture has an NM platform on one computer system at a location that is responsible for all NM duties?
Centralized
What network managment architecture uses multiple systems, with one system acting as a central server and the others working as clients?
Hierarchical
At what level of network managment activity are you working when you, as the network manager, are moonitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?
Interactive
At what level of network managment activity are you working when the automated monitoring of components provides problem analysis, giving a root cuase alarm for the problme at hand?
Proactive
Gathering information about current network device settings is a step of what functional network managment area?
Configuration managment
What are the two functional categories of performance management?
Monitoring and tuning
Which functional category of performance management tracks historical data by tracking activities on the network?
Security management
What is established to distinguish between errors that fall within a normal range and excessive errors because of a fault?
Tolerance parameters
network managment protocols are designed (in most cases) tp reside above what layer of the OSI model?
Session
What is a hierarchical, structured format that defines the network managment informaiton available from network devices?
Management information base
Which category of SNMP node is responsible for monitoring, collecting and reporting managment data to the managment system?
Agent
What SNMP operational message retrieves the value of one instance of management information?
Get
What type of SNMP node is responsbile for to authenticate logons for clients by validating the supplied username and password against the account in the database?
Domain controllers
In the event that a domain controller is no longer functioning, what action is taken to make another DC take over the responsibility?
No action is required
What type of network server is dedicated to an intensive application or database?
Member server
What protocol is used primarily to obtain connectivity to the large base of Novell NetWare clients?
IPX/SPX
What network protocol is used for network connection of HP network printers?
Data link control protocol
Why are users required to change thier passwords upon logging onto the network for the first time?
To ensure users don't creat vulnerability by leaving the default password in place.
For user accounts with elevated privileges, such as client support administrator, what are the correct number and type of characters needed for the account password?
Minimum of 15 characters, 2 upper and lowercase letters, 2 numbers, and 2 special characters
Which groups scope allows member permissions to be assigned in any domain or forest?
Universal
What defines the rules by which operations can be performed on a particular resource?
Permissions
What is used to verify the level of availablity an individual has to the resource?
Access control list
What file permission provides a user with the ability to change file permissions and take ownership of files on new technology file system volumes?
Full control
What permission always overrides all other permissions assigned to a user or group to which the user belongs?
No access
When a volume is formatted with new technology file system, what group is automatically assigned full control permission to the volume?
Everyone group
When a new folder or file is created on a new technology file system partition, what permissions are automatically assigned?
Inherited permissions of the folder it is contained in.
An administrator would normally allocate more file space to users maintaining what type of files?
Databases
What is one way to increase file server efficiency?
Limiting the access time of typical users
What usually has the most significance when determining the mount of space and access time users are given on a file server?
Job position
What two files are required for Windows operating systems to run on most client systems?
BOOT.INI and NTDETECT.COM
What is the name for the core set of software instructions contained in operating systems on which the higher-level functions are based?
System kernal
What is the first question "network experts" ask when beginning to troubleshoot a serious network problem?
Wher is the network map?
What is the first of sevel logical steps used to trouble shoot a network problem?
Define the main problems
What should yo udo after gathering all the facts about a netwrok problem?
Consider all possible causes
Why should only one possibility of a network problem be trouble shot at a time?
Isolate a definite cause if the action fixes the problem
What is one of the greatest downfalls of personnel who must work together to trouble shoot a network problem?
Failure to accurately observe and thoroughly document the results of their individual efforts.
What are the two basic ways netowrk faults can be detected?
Reactively and proactively
What are the most common, immediate, and service-affecting types of faults?
Devices that have lost power and have broken network connections.
Wat are th emost common, immediate, and service-affecting types of faults?
Devices that have lost power and have broken network connections.
What function of fault management identifies options for minimizing the effects of detected or predicted faults?
Fault correction
What is an indication that a noteworthy event has occurred on the network?
Alarm
What network managemnet system alarm browser informaiton item indicates if an alarm is related to other alarms?
Cor
When bits are missing in one of more octets in a frame, what type of error occurs?
Alignment
What function checks for damaged frames by recalculating the 32-bit cyclic redundancy check value of the received frame and comparing it to the received 32-bit CRC value in the frame check sequence field?
MAC frame
Within how many bytes of transmission should a NIC sense a collision and stop transmitting?
64
What are frames called that consist of garbled bits of data that are transmitted continuously on the network?
Jabbers
What is the maximum packet size (in bytes) for the IP?
65,535
What is the minimum packet size (in bytes) for the IP?
28
Over 60% of all network problems occur at what layers of the OSI model?
Data link and Physical
What type of network problem(s) is caused by collisions on the domain?
High utilization or jabbers
Ideally the average netwrok utilization value should be less than
30%
What type of network errors do jabbers usually cause?
High utilizations and collisions
What utilities are used to find the round-trip delay between a source and taget node?
PING and TRACERT
What diagnostics command is run exclusively on Windows based machines?
IPCONFIG
What IP address is used to packet internetwork groper a computer's own NIC
127.0.0.1
What is one of the most common types of hardware devices used for network troubleshooting?
Loopback plug
What are the three main components of the system management automated report tracking system?
Domain managers, broker, and clients
What is the centerpiece of the SMARTS application?
Domain manager
What component of the system management automated report tracking system application contains knowledge of available domain managers?
Broker
Waht color on the system managment automated report tracking system alarm log indicates one or more events?
Purple
How many different categories of information does the performance monitor provide you about your network?
21
What menu in the protocol analyzer provides information concerning the network utilization and frame errors that are related to a specific protocol?
Protocol statistics
What automatically runs in the background when the protocol analyzer application is activated?
Node discovery
What menu on the protocol analyzer provides information concerning the bandwidth utilization and the number of connections that are related to specific nodes?
Connection statistics
What is the process of analyzing threats against the vulnerabilities of an information system?
Risk analysis
In which phase of the DOD informaiton technology security certification and accreditation process is data gathered for system analysis?
Phase 1: Definition
What is the maximum number of automated information system iwht no changes to the baseline must be recertified or accredited?
Three
What is a measure used to verify eligibility of a subject and the ability of the subject to access certain information?
Authentication
How is a PIN categorized?
Something you know
What is a physical device that users carry to authenticate themselves over the Internet?
Token
What is a plastic/magnetic device that contains a microprocessor used to authenticate users over the Internet?
Smart card
What is uniquely generated to encrypt a specific message by the user?
Session key
What is at the very core of the Barrier Reef process?
Base network security policy
In what step of the Barrier Reef process do yo umap both the physical and logical topology of your network?
Step 1: Know thyself
In what step of the Barrier Reef process do you start a base network steering group to address base-wide network managemnet and security issues?
Step 2: Determine requirements
What are network attacks that bypass the firewall?
Tunneling and application-based attacks
What is the intrusion practice of encapsulating a message (that would be rejected by the firewall) inside a second message that will pass through the firewall?
Tunneling
What is the simplest and least expensive type of firewall to stop messages wiht inappropriate network addresses?
Packet filtering
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?
Bastion host
What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes?
Bastion host
What network performs rigorous examinations of systems to identify weaknesses that might allow security violations?
Vulnerability scanners
What software program protects classified data by erasing it from the disk so that it is unrecoverable?
Wipeinfo
What is the preferred method of clearing magnetic tapes?
Degaussing
What web-based process incorporates identification and evaluation of new vulnerabilities, disseminates technical responses, and tracks compliance within the DOD community?
IAVA
Who is the IAVA process manager?
DISA
Withing the DOD computer emergency response team three-tiered "vulnerability hierarchy" for notifications, what tier documents a new vulnerability that poses an immediate, potentially severe threat to DOD systems?
Informaiton assurance vulnerability alert
Waht standard is utilized by the defense messaging system for messagin services?
X.400
What standard is utilized by the Defense Messaging System for directory services?
X.500
What is one of the most important part of security in the DMS?
Fortezza cards
What is the first job the basic input output system (BIOS) does at start-up?
Run the power-on self-test
Which original component was very susceptible to damage from electrostatic discharge?
CMOS
Which component uses a lithium battery to maintain computer settings when power is removed?
CMOS
What is considered as a nonvolatiles permanent memory?
ROM
What is a form of firmware that contains the computer's startup instructions?
BIOS
What static RAM (SRAM) uses special applications in a CPU?
Cache
On MOST modern computers, which has two or three levels of memory?
Cache
Actively sampling the status of an external device by a client program is known as
polling.
What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a CPU or a synchronous event?
Interrupt
What Interrupt request (IRQ) line number is normally used for the floppy disk controller?
6
which term describes that data is whole or complete?
Data integrity
What is considered as a technique or method of checking data integrity?
Parity bit
Which is a very simple example of an error detecting code?
Parity bit
What component initializes communication with all hardware devices and sends a message if a keyboard or mouse is not found?
BIOS
What is a small, low-level program used by the computer operating system to interact with hardware devices?
Driver
What is the sudden momentary electric current that flows between two objects at different electrical potentials?
Electrostatic discharge
Static electricity remains intact until it is
discharged.
under what class of ESD would an item fall if it was sensitive to 900 volts
I
What measure would you take to prevent the build up of static electricity?
Ground the ESDS device
What is the first step you must take when either installing or removing an ESDS device?
Turn the power switch to the off position.
The process of collecting and analyzing data to determine the cause of an operational failure and how to prevent it from recurring is called
fault isolation.
In which troubleshooting step would you determine which conditions are present?
Define the problem.
In which troubleshooting step would you confirm a dilemma exists?
Isolate the problem
In which troubleshooting step would you identify likely causes and eliminate unlikely causes?
Resolve the problem
In which troubleshooting step would you review the case history and assure no steps were missed?
Confirm the resolution
What is NORMALLy the next step in the boot up process after initial power is applied?
The keyboard lights should flash.
What is NORMALLY the next sept in the boot up process after the basic input output system (BIOS) message appears on the monitor?
A memory test should be visible on the monitor.
Normally the last step in the boot up process is
the OS loads into memory and user interface appears.
what can detect if CPU hardware problem exist?
Power-on-self-test (POST)
When troubleshooting hardware; one simple method of identifying cables is to
place masking tape to the cables and connection points.
What rank must primary communications security responsible officers (CRO) hold?
SSgt
Who has the authority to approve waivers that are mission justified?
COMSEC manager
After receiving their initial educations in COMSEC account management, how often must CROs be trained to remain qualified to manage their account?
Annually
To ensure CROs are complying with applicable directives and accounting for the COMSEC material under their control, the COMSEC manager is required to inspect their accounts at least
semi-annually
Who is responsible for the production and management of cryptographic material within the US government?
DIRSNA
What is the classification of the combination to any security container?
Always classified to the highest classification of material in the container.
The operational use and control of COMSEC material is overseen and managed by
a controlling authority.
This COMSEC material requires the most stenuous accounting practices by usinig an accounting control number.
ALC-1
Whis COMSEC material is accounted for continuously by quantity
ALC-2
This form is considered a daily physical security inventory for your environment.
SF701
What form do you fill out and affix to the inside of the locking drawer when you change a safe combination?
SF700
At a minimum, how often do you change a cipher lock combination?
Monthly
What is the perferred method for listing material on the AFCOMSEC Form 16?
Alphabetically by short title
AFCOMSEC Form 16 inventories are retained for the current inventory plaus howmany pevious months of inventory?
6
if it is physically impossible to conduct an inventory of a user because of distance, the COMSEC manager
asks the user to verify his or her holdings by letter or message.
Who establishes the semi-annual inventory date for each COMSEC account number?
CPSG
The individual who is required to use and safeguard COMSEC aids while performing official duties is the
user.
What is the term used when referring to specific COMSEC material other than equipment?
Aids
Where doe sthe next unused voucer number come form that is used on transfer reports?
COMSEC Form 14
In which phase does the COMSEC manager determine which materials the CRO needs?
Preparation
In which phase does the CRO check the material issued against the list on the SF153?
Distribution
What should each CRO do before signing the COMSEC hand receipt?
Ensure the required COMSEC material is listed on the SF153 and ready for issue.
Disposition records and/or destruction reports are not required for material that has been issued to
transient aircrews.
What term suggests movement from one place to another by someone with an active interest in that material?
Transport
What is the maximum number of different actions that can be accomplished on a singled SF153?
1
What form is commonly used as a destruction certificate of COMSEC material?
SF153
In which folder of the COMSEC account 6-part folder are destruction certificates filed?
6
Whenever COMSEC material needs to be replaced or amended immediately, who develops the original messages for COMSEC accounts by urgent electronic message?
CSGP
Failure to comply with an urgent dissemination message could consitute in what kind of violation?
Cryptographic incident
Who is ultimately responsible for all EAPs on base?
CM
How long do you need to maintain the written documentation of the semiannual EAP exercises?
24 months
Which AF form do CMs use when conducting an inspection of a sub-COMSEC account?
AF Form 4160
What is the maximum time between EAP exercises at CRO accounts
6 months
Who is the final approval authority for a person going into TPC positions?
The commander of the unity holding TPC material.
What is used for the generation, management, and distribution of keying material, including programming FORTEZZA cards?
Certification authority workstation
Wjat os lmpwm as a state-of-the-are ground-to-ground communications infrastructure?
TDC
What TDC characteristic reflects module architecture which comply with established international or commercial communication standards?
Open system standards
What TDC characteristic required equipment setup times are kept to an absolute minimum to support transportation, deployment, and operations in a deployed environment?
Mobility
What TDC characteristic required equipment be capable of operation/maintenance by personnel wearing nuclear, biological, and chemical protective gear?
Survivability
What is known as a suite of modules and accessory kids serving as the backbone of deployed communication networks?
ICAP
Who provides uniterrupted flow of mission critical informaiton to field units, in-garrison units for the duration of a contingency?
Sustained communications support teams
Who should you notify immediately of any predeployment shortfalls?
UDM and Commander
What phase is concerned with exercises to ensure you are familiar with the deployment process and with your equipment?
Predeployment.