Term
What is defined as a bundle of application software designed to significantly improve network efficiency and productivity? |
|
Definition
(c) Network Management Server |
|
|
Term
What are the three most common network management architectures? |
|
Definition
(a) Centralized, hierarchical, and distributed |
|
|
Term
What network management architecture has an NM platform on one computer system at a location that is responsible for all NM duties? |
|
Definition
|
|
Term
What network management architecture uses multiple systems, with one system acting as a central server and the others working as clients? |
|
Definition
|
|
Term
At what level of network management activity are you working when you, as the network manager, are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause? |
|
Definition
|
|
Term
At what level of network management activity are you working when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at hand? |
|
Definition
|
|
Term
Gathering information about current network device settings is a step of what functional network management area? |
|
Definition
(a) Configuration Management |
|
|
Term
What are the two functional categories of performance management? |
|
Definition
(c) Monitoring and Tuning |
|
|
Term
What function category of performance management tracks historical data by tracking activities on the network? |
|
Definition
|
|
Term
What network management area is concerned with controlling access points to information? |
|
Definition
|
|
Term
What is established to distinguish between errors that fall within a normal range and excessive errors because of a fault? |
|
Definition
|
|
Term
Network management protocols are designed (in most cases) to reside above what layer of the open system interconnections (OSI) model? |
|
Definition
|
|
Term
What is a hierarchical, structured format that defines the network management information available from network devices? |
|
Definition
(d) Management information base (MIB) |
|
|
Term
Which category of simple network management protocol node is responsible for monitoring, collecting, and reporting management data to the management system? |
|
Definition
|
|
Term
What simple network management protocol operation message retrieves the value of one instance of management information? |
|
Definition
|
|
Term
What type of simple network management protocol node is responsible to authenticate logons for clients by validating the supplied user name and password against the account in the database? |
|
Definition
|
|
Term
In the event that a domain controller is no longer functioning, what action is taken to make another DC take over the responsibility? |
|
Definition
(a) No action is required |
|
|
Term
What type of network server is dedicated to an intensive application or database? |
|
Definition
|
|
Term
What protocol is used primarily to obtain connectivity to the large base of Novell NetWare clients? |
|
Definition
(d) Internetwork packet exchange/sequenced packet exchange (IPX/SPX) |
|
|
Term
What network protocol is used for network connection to Hewlett Packard network printers? |
|
Definition
(a) Data link control protocol |
|
|
Term
Why are users required to change their passwords upon logging onto the network for the first time? |
|
Definition
(a) To ensure users don't create vulnerability by leaving the default password in place. |
|
|
Term
For user accounts with elevated privileges, such as a client support administrator, what are the correct number and type of characters needed for the account password? |
|
Definition
(d) Minimum of fifteen characters consisting of at least two upper and lowercase letters, two numbers and two special characters. |
|
|
Term
Which group scope allows member permissions to be assigned in any domain or forest? |
|
Definition
|
|
Term
What defines the rules by which operations can be performed on a particular resource? |
|
Definition
|
|
Term
What is used to verify the level of availability an individual has to the resource? |
|
Definition
|
|
Term
What file permission provides a user with the ability to change file permissions and take ownership of files on new technology file system (NTFS) volumes? |
|
Definition
|
|
Term
What permission always overrides all other permissions assigned to a user or group to which the user belongs? |
|
Definition
|
|
Term
When a volume is formatted with new technology file system (NTFS) what group is automatically assigned full control permission to the volume? |
|
Definition
|
|
Term
When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned? |
|
Definition
(d) Inherited permissions of the folder it is contained in. |
|
|
Term
An administrator would normally allocate more file space to users maintaining what type of files? |
|
Definition
|
|
Term
What is one way to increase file server efficiency? |
|
Definition
(c) Limiting the access time of typical users |
|
|
Term
What usually has the most significance when determining the amount of space and access time users are given on a file server? |
|
Definition
|
|
Term
What two files are required for Windows operating systems to run on most client systems? |
|
Definition
(c) BOOT.INI and NTDETECT.COM |
|
|
Term
What is the name for the core set of software instructions contained in operating systems(OS) on which the higher-level functions are based? |
|
Definition
|
|
Term
What is the first question "network experts" ask when beginning to troubleshoot a serious network problem? |
|
Definition
(b) Where is the network map? |
|
|
Term
What is the first of seven logical steps used to troubleshoot a network problem? |
|
Definition
(b) define the main problems. |
|
|
Term
What should you do after gathering all the facts about a network problem? |
|
Definition
(c) Consider all possible causes |
|
|
Term
Why should only one possibility of a network problem be trouble shot at a time? |
|
Definition
(d) Isolate a definite cause if the action fixes the problem |
|
|
Term
What is one of the greatest downfalls of personnel who must work together to troubleshoot a network problem? |
|
Definition
(a) Failure to accurately observe and thoroughly document the results of their individual efforts. |
|
|
Term
What are the two basic ways network faults can be detected? |
|
Definition
(c) Reactively and proactively |
|
|
Term
What are the most common, immediate, and service-affecting types of faults? |
|
Definition
(b) Devices that have lost power and have broken network connections. |
|
|
Term
What function of fault management identifies options for minimizing the effects of detected or predicted faults? |
|
Definition
|
|
Term
What is an indication that a noteworthy event has occurred on the network? |
|
Definition
|
|
Term
What network management system alarm browser information item indicates if an alarm is related to other alarms? |
|
Definition
|
|
Term
When bits are missing in one or more octets in a frame, what type of error occurs? |
|
Definition
|
|
Term
What function checks for damaged frames by recalculating the 32-bit cyclic redundancy check value of the received frame and comparing it to the received 32-bit CRC value in the frame check sequence field? |
|
Definition
(b) Media Access Control frame. |
|
|
Term
Within how many bytes of transmission should a network interface card sense a collision and stop transmitting? |
|
Definition
|
|
Term
What are frames called that consist of garbled bits of data that are transmitted continuously on the network? |
|
Definition
|
|
Term
What is the maximum packet size (in bytes) for the Internet protocol? |
|
Definition
|
|
Term
What is the minimum packet size (in bytes) for the Internet protocol? |
|
Definition
|
|
Term
Over 60 percent of all network problems occur at what layers of the open systems interconnect (OSI) reference model? |
|
Definition
(b) Data link and physical |
|
|
Term
What type of network problem(s) is caused by collisions on the domain? |
|
Definition
(d) High utilization or jabbers |
|
|
Term
Ideally, the average network utilization value should be less than |
|
Definition
|
|
Term
What type of network errors to jabbers usually cause? |
|
Definition
(a) High utilization and collisions |
|
|
Term
What utilities are used to find the round-trip delay between a source and target node? |
|
Definition
|
|
Term
What diagnostics test is usually run on a network interface card (NIC) to ensure it is functional? |
|
Definition
|
|
Term
What diagnostics command is run exclusively on Windows based machines? |
|
Definition
|
|
Term
What internet protocol address is used to packet internetwork groper a computer's own network interface card (NIC)? |
|
Definition
|
|
Term
What is one of the most common types of hardware devices used for network troubleshooting? |
|
Definition
|
|
Term
What are the three main components of the system management automated report tracking system? |
|
Definition
(d) Domain managers, broker, clients. |
|
|
Term
What is the centerpiece of the SMARTS application? |
|
Definition
|
|
Term
What component of the system management automated report tracking system application contains knowledge of available domain managers? |
|
Definition
|
|
Term
What color on the system management automated report tracking system alarm log indicates one or more events? |
|
Definition
|
|
Term
How many different categories of information does the performance monitor provide you about your network? |
|
Definition
|
|
Term
What menu in the protocol analyzer provides information concerning the network utilization and frame errors that are related to a specific protocol? |
|
Definition
|
|
Term
What automatically runs in the background when the protocol analyzer application is activated? |
|
Definition
|
|
Term
What menu of the protocol analyzer provides information concerning the bandwidth utilization and the number of connections that are related to specific nodes? |
|
Definition
(a) Connection statistics |
|
|
Term
What is the process of analyzing threats against and the vulnerabilities of an information system? |
|
Definition
|
|
Term
In which phase of the Department of Defense information technology security certification and accreditation process is data gathered for system analysis? |
|
Definition
|
|
Term
What is the maximum number of years an automated information system, with no changes to baseline, must be recertified or accredited? |
|
Definition
|
|
Term
What is a measure used to verify the eligibility of a subject and the ability of the subject to access certain information? |
|
Definition
|
|
Term
How is a personal identification number categorized? |
|
Definition
|
|
Term
What is a physical device that users carry to authenticate themselves over the Internet? |
|
Definition
|
|
Term
What is a plastic/magnetic device that contains a microprocessor used to authenticate users over the Internet? |
|
Definition
|
|
Term
What is uniquely generated to encrypt a specific message by the user? |
|
Definition
|
|
Term
What is at the very core of the Barrier Reef process? |
|
Definition
(c) Base network security policy |
|
|
Term
In what step of the Barrier Reef process do you map both the physical and logical topology of your network? |
|
Definition
|
|
Term
In what step of the Barrier Reef process do you start a base network steering group to address base-wide network management and security issues? |
|
Definition
(b) Step 2: Determine requirements. |
|
|
Term
What are network attacks that bypass the firewall? |
|
Definition
(b) Tunneling and application-based attacks. |
|
|
Term
What is the intrusion practice of encapsulating a message (that would be rejected by the firewall) inside a second message that will pass through the firewall? |
|
Definition
|
|
Term
What is the simplest and least expensive type of firewall to stop messages with inappropriate network addresses? |
|
Definition
|
|
Term
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas? |
|
Definition
|
|
Term
What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes? |
|
Definition
|
|
Term
What network device performs rigorous examinations of the system to identify weaknesses that might allow security violations? |
|
Definition
(c) Vulnerability scanners |
|
|
Term
What software program protects classified data by erasing it from the disk so that it is unrecoverable? |
|
Definition
|
|
Term
What is the preferred method of clearing magnetic tapes? |
|
Definition
|
|
Term
What web-based process incorporates identification and evaluation of new vulnerabilities, disseminates technical responses, and tracks compliance within the Department of Defense community? |
|
Definition
|
|
Term
Who is the IAVA process manager? |
|
Definition
|
|
Term
Within the Department of Defense computer emergency response team three-tiered "vulnerability hierarchy" for notifications, what tier documents a new vulnerability that poses an immediate, potentially severe threat to DOD systems? |
|
Definition
(c) Information assurance vulnerability alert (IAVA) |
|
|
Term
Within the Department of Defense computer emergency response team three-tiered "vulnerability hierarchy" for notifications, what tier addresses new vulnerabilities that do not pose an immediate threat to DOD systems, but are significant enough that noncompliance with the corrective action could escalate the threat? |
|
Definition
(d) Information assurance vulnerability bulletin |
|
|
Term
What standard is utilized by the defense messaging system for messaging services? |
|
Definition
|
|
Term
What standard is utilized by the Defense messaging system for directory services? |
|
Definition
|
|
Term
What is one of the most important parts of security in the defense messaging system (DMS) |
|
Definition
|
|