Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
124 Cards in this Set
- Front
- Back
What Air Force instruction series covers communications and information?
|
33
|
|
What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained?
|
AFPD 33-1
|
|
What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers?
|
AFI 33-115, Volume 1
|
|
What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided informaiton systems on Air Force networks?
|
AFI 33-115, Volume 2
|
|
What organization does communication and information services entering and exiting the base or site fall under the operational control of?
|
Base Network Control Center
|
|
What function within the Network Control Center provides technical assistance to the unit funtional system administrators and workgroup managers?
|
Network administration
|
|
Whose network area of responsibility starts at the user's terminal and ends at the server, but does NOT include the network backbone infrastructure componen
|
Unit funtional systems administrator
|
|
What Air Force Instruction sets the policies that unit client support administrators must comply with?
|
33-115
|
|
What Network Control Center function responds to detected security incidents, network faults (error), and user reported outages at the time of help desk referral?
|
Network management
|
|
What Network Control Center function is the central point of contact for network distribution and maintenace/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?
|
Configuration management
|
|
Performance management can be broken into which two separate functional categories?
|
Monitoring and tuning
|
|
To determine the level of network service provided to the users, you will make a measurement of the total response time
|
rejection rate and availability of the network
|
|
What Network Control Center function increases network reliability by giving the network manager tools to detect problems and initiate recovery procedures?
|
Fault management
|
|
What does Network Security work to ensure about a network?
|
Availability, confidentiality, and integrity of data
|
|
Which of the following are jobs performed by a help desk technician on a daily basis?
|
Network manitoring, account unlocks, and account creations
|
|
Within the Network Control Center, what function is initially responsible for taking trouble calls, deciding what type of problem has occureed, and what to do about the problem?
|
Help destk
|
|
What is one of the most important communications skills you can develop as a help desk operator?
|
Listening
|
|
What software is used to open trouble tickets for customer trouble calls?
|
Remedy
|
|
What is a set of subnets that are connected with routers?
|
Internetwork
|
|
What is a set of systems/nodes on a local segment that can be off of a switch or a router?
|
Intranetwork
|
|
What type of network environments consist of computer systemns from different vendors that run different operating systems and communication protocols?
|
Heterogeneous network
|
|
What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating systems or network operating system?
|
Homogeneous network
|
|
What type of communications network serves users within a confined geographical area?
|
Local area network
|
|
What type of communications network links geographically dispersed offices in other cities or around the globe?
|
Wide area network
|
|
How many users are in a peer-to-peer network?
|
2 to 10
|
|
How many users are in a single-server network?
|
10 to 50
|
|
How many users are in a multi-server high-speed backbone network?
|
250 to 1000
|
|
In most cases the frequencies used by wireless networks are in what frequency band?
|
Industrial, scientific, and medical (ISM)
|
|
What is the distorting and/or weakening of a signal as it traverses the media called?
|
Attenuation
|
|
What is a measurement of data transferred through the medium between network connections?
|
Throughput
|
|
What is a form of communicaiton that transmits information as a serial stream of bits or bytes?
|
Asynchronous communication
|
|
Which of the following categories of twisted-pair cable has the highest throughput?
|
Cat 5
|
|
A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?
|
Core
|
|
Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
|
100
|
|
What type of optic fiber is used to span extremely long distances?
|
Single mode
|
|
What type of optic fiber is designed for the local area network environment and light is typically generated with a light emitting diode?
|
Multi mode
|
|
What are the principal advantages of fiber optics with present day transmission technology?
|
Sturdiness and security
|
|
What network topology consists of a single central cable to which all computers and other devices connect?
|
Bus
|
|
What is the greatest risk to a bus network?
|
The bus itself becoming inoperable
|
|
On what network topology, can multiple transmit frames co-exist?
|
Fiber Distributed Data Interface
|
|
What is the major Department of Defense contribution to networking?
|
The Transmission Control Protocol/Internet Protocol Suite
|
|
What is a set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?
|
A protocol
|
|
What layer of the Open Systems Interconnection reference model is really a set of rules regarding the hardware used to transmit data?
|
Physical
|
|
What layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?
|
Data Link
|
|
What layer of the Open Systems Interconnection reference model prevents a fast computer from overwhelming a slow terminal?
|
Transport
|
|
A feature which involves the peridic insertion of points into data from which any recovery necessary can be started is known as what?
|
Checkpointing
|
|
Which layer of the Open Systems Interconnection model is concerned with network security, file transfers, and formatting functions?
|
Presentation
|
|
The IEEE 802.3 standard describes a local area network using what kind of topology?
|
Bus
|
|
What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?
|
Carrier Sense Multiple Access/Collision Detection
|
|
What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?
|
Solicit successor frame
|
|
The IEEE 802.5 standard was developed to cover what local area network topology?
|
Roken ring
|
|
Why can a token ring network cover a greater distance than a token bus network without loss of signal?
|
Because each workstation repeats the signal
|
|
What X series protocol is a Message Handling System (MHS) standard, that defines the structure of a store-and-forward e-mail message handling system?
|
X.400
|
|
What X series protocol is a Directory Services specification standard that defines the structure of a store-and-forward e-mail message handling system?
|
X.500
|
|
Which protocol of Transmission Control Protocol/Internet Protocol provides a connectionless datagram "network access" layer?
|
Internet Protocol
|
|
Which protocol of Transmission Control Protocol/Internet Protocol is a connection oriented, reliable, host-to-host transport protocol?
|
Transmission Control Protocol
|
|
What makes it possible for implementers to produce new Network File System systems without having to reconstruct their own system's internal data representation formats to suit Network File System?
|
eXternal data representation
|
|
As information passes down through the protocol layers, what is the packet that is formed called?
|
Protocol data unit
|
|
What is the only layer in the Open Systems Interconnection reference model that simply transmits the completed frame?
|
Physical
|
|
What layer in the Open Systems Interconnection reference model adds a trailer to the packet?
|
Data Link
|
|
In the Ethernet environment, what is the minimum number of octets in a frame so it can be sent and received?
|
46
|
|
What is used to identify network nodes on a physically connected network?
|
Media access control address
|
|
What is the binary equivalent to the dotted decimal number 96?
|
01100000
|
|
How many octets is the standard Internet Protocol broken down into?
|
4
|
|
What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?
|
Standard
|
|
What communications device converts binary electrical signals into acoustic signals for transmission over telephone lines?
|
Modem
|
|
What communications device is used for converting anolog signals to digital for transmission on digital lines?
|
Codecs
|
|
What Network Interface Card Module drives the signal onto and from the physical medium?
|
Transmit/Receive
|
|
What Network Interface Card module converts information into a coded data stream?
|
Encode/Decode
|
|
What Network Interface Card module temporarily holds data for processing to or from the network?
|
Frame Buffering
|
|
What network component serves as a central connection point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately?
|
Hub
|
|
What type of hub has special capabilities for configurations and or management?
|
An intelligent hub
|
|
What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped?
|
Broadcast Storm
|
|
What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals?
|
A collision domain
|
|
The purpose of a network repeater is that it?
|
regenerates any signal received
|
|
What is a local area network connection device with two or more ports that forwards frames from one LAN segment to another?
|
Bridge
|
|
What are the four basic function of a bridge?
|
Listen, learn, filter, forward
|
|
Bridging loops are created when
|
there is more than one path to the destination
|
|
What is used to logically eliminate loops within a network?
|
Spanning Tree Algorithm
|
|
The bridge in a network with the highest priority (the lowest number) is called the
|
Root
|
|
Switching conducted at the layer 2 category is based solely upon what information?
|
The Media Access Control address
|
|
Switching conducted at the layer 3 category is based upon what information?
|
The Media Access Control and Internet Protocol address
|
|
What type of switch is limited in its applications to small workgroups where throughput is an issue but where potential network errors will NOT upset the network?
|
Cut through
|
|
What type of switch reads the first 64 bytes before forwarding the frame?
|
Fragment free
|
|
What is the technology called that allows Network Interface Card (NIC) to determin the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?
|
Auto negotiation
|
|
What is a logical grouping of end stations, independent of physical location, with a common set of requirements called?
|
Virtual local area network
|
|
Virtual local area network
|
Port grouping
|
|
At what level of the Open Systems Interconnection models does a router work?
|
Network
|
|
What is the primary device used for connecting these networks, both within and between networks?
|
Router
|
|
The function performed by a router to move information from one router to another according to decided path determinations is...
|
Switching
|
|
What type of routing is the establishment of routes by the network administrator that changes only when done manually?
|
Static routing
|
|
What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?
|
Dynamic routing
|
|
In what Dynamic Routing protocol MUST packets go the complete distance before discovering the destination is unreachable?
|
Distance vectoring
|
|
What routing metric is generally based upon the bit-error rate of the link?
|
Reliability
|
|
What prevents a router from sending route information back to the router from which it came?
|
Split horizons
|
|
What acts as a translator between two workstations or networks that use different operating systems, communication protocols, and data format structures?
|
Gateway
|
|
Where is the backup copy of the Cisco Internet Operating System Configuration information stored in the internetworking device?
|
Nonvolatile random access memory
|
|
What are the network connections through which network traffic enters and exits a router called?
|
Interfaces
|
|
What prompt is displayed when in the User Exec mode on a router?
|
Router>
|
|
What prompt is displayed when in the Privileged Exec mode on a router?
|
Router #
|
|
From what level can all other command modes be accessed?
|
Privileged Exec level
|
|
From what mode is the "banner motd" command used in?
|
Global configuration mode
|
|
What command is used to restrict access to the privileged Exec mode?
|
Password
|
|
What command interface configuration command is used to activate an interface?
|
No shutdown
|
|
To view the current configuration of a router, what command is used from privileged exec mode?
|
Show running
|
|
What command is used to change the bootup values within ROM monitor mode?
|
Confreg
|
|
What filters network traffic by controlling whether routed packets are forwarded or blocked at a router's interface?
|
Access control lists
|
|
What do all access lists end with?
|
Implicit deny
|
|
Router access lists MUST be applied to
|
interfaces
|
|
What does a standard access lists use to filter packets?
|
Source Internet Protocol address
|
|
What is the range of numbers that represent standard access lists?
|
1-99
|
|
What kind of server is set aside to perform a specific task or function all the time?
|
Dedicated server
|
|
what network type normally utilizes non-dedicated servers?
|
Peer-to-peer
|
|
What is required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job?
|
Print queues
|
|
What frees the computer's attention so the user can continue working while waiting for a document to print?
|
Print spooling
|
|
What type of server is a bundle of application software designed to significantly improve network efficience and productivity?
|
Network Management System
|
|
What two types of environments are network operating systems implemented upon?
|
Peer-to-peer and client server
|
|
Whithin the Windows environment, what is the central repository for the entire software and hardware configuration settings in a computer running the Windows based NT operating system?
|
Registry
|
|
What is a set of keys, subkeys, and values from the registry stored in its own file location called?
|
Hive
|
|
Data in which root-key determines which device drivers and dervices will load during the boot process?
|
HKEY_LOCAL_MACHINE
|
|
What is a set of statistical measurements made over a period of time that characterizes network performance?
|
Baseline
|
|
What is a detailed analysis of the performance of a specific application or a specific network element?
|
Benchmark
|
|
What network performance criteria is the most significant statistic to be collected and calculated?
|
Network availability
|
|
The measurement of traffic volume actually being carried by the network, typically expressed in kilobytes per second is
|
data throughput
|