Network Management
Contingency Planning
Info Technology Applications
Remote Access
Monitor Events and Resources
100
The goal of ____ is to detect, log, notify users of, and (to the extent possible) automatically fix network problems to keep the network running efficiently.
Fault management
100
If these are lost deleted or corrupted uses reload the software and any updates to it If this is deleted corrupted or lost and there is no backup, it cannot be reloaded
Programs Data
100
This is the Air Force's primary combined software/server tool for handling the task of mass produced software patches and other updates on the base network and its respective network operations security center
Microsoft Systems Center Configuration Manager (SCCM)
100
Using this, the remote user uses his endpoints to connect to a network attached host computer located on the home organizations network
Remote desktop control method
100
This lets you monitor events in your system
Event Viewer
200
The goal of ____ is to monitor network and system configuration information so the affected hardware and software can be managed and tracked
Configuration Management
200
What are the three types of offsite storage sites
Cold, warm, hot
200
This is the nation's premier system for the command and control of joints and coalition forces as well as the identifying the resources of our adversaries
Global command and control systems (GCCS)
200
Using this, the remote endpoint connects to the network and becomes another node on the network
Remote node method
200
Consists of a header, description of the event (based on event type) and optionally, additional data.
Event
300
The goal of _____ is to measure various aspects of network performance so internetwork performance can be maintained at an acceptable level
Performance Management
300
Contingency planning is a lenghty process that starts with.
Data backup
300
This is a special United States Air force lead program with joint interest. It serves as the focal point for joint air warfare command and control and Security Systems for planning testing intelligence gathering and execution into a single common interface
Theater Battle Management Core System (TBMCS)
300
Remotely users who will be connecting to a DoD core network to perform in the system administration duties to include the troubleshooting, configuration changes, and reviewing any system or configuration data, regardless of system type
Administrative Access
300
When you click the Resources monitor button on the performance tab in the windows task manager what four resources does it display?
CPU, Disk, Network, Memory
400
The goal of ____ is to control access to network resources so the network cannot be sabotaged and sensitive info cannot be accessed by those without appropriate authorization.
Security Management
400
This provides a means to restore IT operations quickly and effectively following a service disruption
Recovery Strategies
400
This provides the joint or five years with the ability to identify, validate, and source force requirements, and requests that time phase movement of forces to the theater of interest
Joint Ops Planning Execution Systems (JOPES)
400
Remote users who are viewing content or sending e-mail but are not altering or entering official Government data
Limited (General) Access
400
The Event Viewer will let you view and manage three items. What are they?
System Log, Application Log, Security Log
500
The goal of accounting management is to measure network utilization parameters so individual or group uses on the network can be regulated appropriately
Accounting Management
500
There are three different back up types, what are they?
Full backup, differential backup, incremental backup
500
This is a special set of processes which support the Air Force planning and execution community in deliberate planning, crisis planning, and crisis execution
Deliberate and crisis action planning execution segment (DCAPES)
500
Remote users who will be using network services or accessing, downloading, or uploading data
End-User Access
500
The format and contents of event descriptions vary, depending on the event type. The description indicated what happened or the significance of the event. What are the five types of events recorded by the event log?
Error, Warning, Information, Success Audit, Failure Audit
M
e
n
u