• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
What are network attacks that bypass the firewall?
Tunneling and application based attacks.
822 - Ground hogs do this and Word 2003 docs can cause.
Areas of consideration for network planning include the
Licensing mode
804 - It is not the frequency of message traffic.
Under what class of ESD would an item fall if it was sensitive to 900 volts?
1
433 - it is not category 4.
After the system completes the Power-on self-test, what happens next?
The master boot record is loaded and executed.
810 - This is found on the 1st physical sector of the hard drive.
What Windows NT line command is used to manually collect interface statistics on a particular network node?
netstat
817 - not ping, it actually the answer is part of the question.
What Unix line command is used to manually collect interface statistics on a particular network node?
rnetstat.
917 - same as the windows command with an "r" added to it.
ESD items sensitive to more than 4000 but less than 15,000 volts fall into category
3
433
Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
100 miles
606 - a nice round number.
In what type of key cryptography are keys so different, that it would be possible to publicize one without danger of anyone being able to derive or compute the other?
Asymetric cypher.
215
What type of network server is dedicated to an intensive application or database
Member servers
804
What NCC function remotely performs the functions and duties of a DCS Primary Systems Control Facility, a patch and test facility and a DCS switching center when it is technically and economically feasible?
Configuration management.
602 - This is what you do when you first bring a server up.
What is the third logical step in troubleshooting?
Resolve the problem.
435 - Git er done!
What is the primary device used for connecting these networks, both within and between networks?
Routers
617 - This is the way you git there.
What are the network connections through which network traffic enters and exits a router called?
Interfaces.
618 - Software on a datalink server.
Who is the approval authority for primary COMSEC responsibility officer (CRO) grade waivers?
The COMSEC manager.
burleson.
What do you type to change to the Bourne shell?
sh
412 - Don't add a b.
AF Forms 1109 are destroyed after
90 days.
202 - not 30