26. What file permission provides a user with the ability to change...
74. What is a plastic/magnetic device that contains a microprocessor...
30. An administrator would normally allocate more file space to users...
86. What is the preferred method of clearing magnetic tapes?
21. Why are users required to change their passwords upon logging onto...
8. What are the two functional categories of performance management?
10. What network management area is concerned with controlling access...
15. What SNMP operational message retrieves the value of one instance...
28. When a volume is formatted with NTFS what group is automatically...
48. What are frames called that consist of garbled bits of data that...
22. For user accounts with elevated privileges, such as a client...
55. What utilities are used to find the round-trip delay between a...
27. What permission always overrides all other permissions assigned to...
72. How is a personal identification number categorized?
92. What standard is utilized by the Defense messaging system for...
2. What are the three most common network management architectures?
17. In the event that a domain conroller is no longer functioning,...
40. What are the two basic ways network faults can be detected?
9. Which functional category of performance management tracks...
56. What diagnostics test is usually run on a NIC to ensure its...
4. What network management architecture uses multiple systems, with...
33. What two files are required for Windows operating systems to run...
35. What is the first question "network experts" ask when beginning to...
37. What should you do after gathering all the facts about a network...
39. What is one of the greatest downfalls of personnel who must work...
44. What network management system alarm browser information item...
49. What is the maximum packet size (in bytes) for the internet...
57. What diagnostics command is run exclusively on Windows based...
58. What Internet protocol address is used to packet internetwork...
3. What network management architecture has an NM platform on one...
32. What usually has the most significance when determining the amount...
38. Why should only one possibility of a network problem be...
53. Ideally the average network utilization value should be less than
91. What standard is utilized by the defense messaging system for...
1. What is defined as a bundle of application software designed to...
24. What defines the rules by which operations can be performed on a...
34. What is the name for the core set of software instructions...
43. What is an indication that a noteworthy event occured on the...
77. In what step of the Barrier Reef process do you map both the...
68. What is the process of analyzing threats against and the...
80. What is the intrusion practice of encapsulationg a message inside...
16. What type of SNMP protocol node is responsible to authenticate...
63. What color on the system management automated reprot tracking...
71. What is a measure used to verify the eligibility of a...
29. When a new folder or file is created on a NTFS partition, what...
14. Which category of SMNP node is responsible for monitoring,...
62. What componet of the system management automated report tracking...
25. What is used to verify the level of availability an individual has...
31. What is one way to increase file server efficiency?
47. Within how many bytes of transmission should a network interface...
52. What type of network problems is caused by collisions on the...
59. What is one of the most types of hardware devices used for network...
89. Within the DOD CERT three tiered "Vulnerability Hierarchy" for...
93. What is one of the most important parts of security in the defense...
23. Which group scope allows member permissions to be assigned in any...
73. What is a physical device that users carry to authenticate...
84. What network device performs rigorous examinations of systems to...
90. Within the DOD CERT three tiered "vulnerablility hierarchy" for...
6. At what level of network management activity are you working when...
7. Gathering information about current network device settings is a...
70. What is the maximum number of years an automated information...
88. Who is the IAVA process manager?
11. What is established to distinguish between errors that fall within...
60. What are the three main componets of the system management...
64. How many different categories of information does the performance...
20. What network protocol is used for network connection to Hewlett...
45. When bits are missing in one or more octects in a frame, what type...
69. In which phase of the Department of Defense information technology...
13. What is a hierarchial, structured format that defines the network...
19. What protocol is used primarily to obtain connectivity to the...
51. Over 60 percent of all network problems occur at what layers of...
66. What automatically runs in the background when the protocol...
67. What menu on the protocol analyzer provides information concerning...
76. What is at the very core of the Barrier Reef process?
87. What web-based process incorporates indentification and evaluation...
36. What is the first of seven logical steps used to troubleshoot a...
50. What is the minimum packet size in bytes for the Internet Protocol
82. What type of firewall is used to serperate secure sites, networks,...
85. What software program protects classified data by erasing it from...
5. At what level of network management activity are you working when...
41. What are the most common, immediate, and service-affecting types...
54. What type of network errors do jabbers usually cause?
78. In what step of teh barrier reef process do you start a base...
61. What is the centerpiece of the SMARTS console?
65. What menu in the protocol analyzer provides information concerning...
81. WHat is the simplest and least expensive type of firewall to stop...
79. What are network attacks that bypass the firewall?
18. What type of network server is dedicated to an intensive...
46. What function checks for damaged frames by recalculating the...
83. What type of firewall generates audit trails of all...
42. What function of fault management identifies options for...
75. What is uniquely generated to encrypt a specific message to the...
12. Network management protocols are designed (in most cases) to...