Term
What layer of the Open System Interconnect model defines the electrical, mechanical,
procedural, and functional specifications for links between communicating network systems?
a. Physical.
b. Data Link.
c. Network.
d. Transport |
|
Definition
What layer of the Open System Interconnect model defines the electrical, mechanical,
procedural, and functional specifications for links between communicating network systems?
a. Physical.
b. Data Link.
c. Network.
d. Transport |
|
|
Term
The Institute of Electrical and Electronics Engineers divide the Open System Interconnect
Data Link Layers into what two sublayers?
a. High Level Data Link Control and Synchronous Data Link Control.
b. Logical Link Control and Media Access Control.
c. Distance Vector and Link State.
d. RS–232 and RS–530 |
|
Definition
The Institute of Electrical and Electronics Engineers divide the Open System Interconnect
Data Link Layers into what two sublayers?
a. High Level Data Link Control and Synchronous Data Link Control.
b. Logical Link Control and Media Access Control.
c. Distance Vector and Link State.
d. RS–232 and RS–530 |
|
|
Term
At what Open System Interconnect layer do network switches and bridges operate?
a. Network.
b. Physical.
c. Data Link.
d. Transport. |
|
Definition
At what Open System Interconnect layer do network switches and bridges operate?
a. Network.
b. Physical.
c. Data Link.
d. Transport. |
|
|
Term
At what Open System Interconnect layer do routers operate?
a. Network.
b. Physical.
c. Data Link.
d. Transport |
|
Definition
At what Open System Interconnect layer do routers operate?
a. Network.
b. Physical.
c. Data Link.
d. Transport |
|
|
Term
At what Open System Interconnect layer are common data compression and encryption
schemes used?
a. Application.
b. Session.
c. Presentation.
d. Transport. |
|
Definition
At what Open System Interconnect layer are common data compression and encryption
schemes used?
a. Application.
b. Session.
c. Presentation.
d. Transport. |
|
|
Term
What Open System Interconnect layer is closest to the end user?
a. Application.
b. Session.
c. Presentation.
d. Transport. |
|
Definition
What Open System Interconnect layer is closest to the end user?
a. Application.
b. Session.
c. Presentation.
d. Transport. |
|
|
Term
What is a formal set of rules and conventions that govern how computers exchange
information over a network medium?
a. Specification.
b. Standard.
c. Etiquette.
d. Protocol. |
|
Definition
What is a formal set of rules and conventions that govern how computers exchange
information over a network medium?
a. Specification.
b. Standard.
c. Etiquette.
d. Protocol. |
|
|
Term
What topology defines the layout of a network’s devices and media?
a. Physical.
b. Logical.
c. Star.
d. Hybrid. |
|
Definition
What topology defines the layout of a network’s devices and media?
a. Physical.
b. Logical.
c. Star.
d. Hybrid. |
|
|
Term
What topology defines the way in which devices communicate, and data is transmitted,
throughout the network?
a. Physical.
b. Logical.
c. Star.
d. Hybrid |
|
Definition
What topology defines the way in which devices communicate, and data is transmitted,
throughout the network?
a. Physical.
b. Logical.
c. Star.
d. Hybrid |
|
|
Term
What topology consists of devices connected to a common, shared cable?
a. Bus.
b. Ring.
c. Star.
d. Hybrid. |
|
Definition
What topology consists of devices connected to a common, shared cable?
a. Bus.
b. Ring.
c. Star.
d. Hybrid. |
|
|
Term
What topology consists of cable segments from each computer connected to a centralized
component?
a. Bus.
b. Ring.
c. Star.
d. Hybrid |
|
Definition
What topology consists of cable segments from each computer connected to a centralized
component?
a. Bus.
b. Ring.
c. Star.
d. Hybrid |
|
|
Term
What topology combines two or more different physical topologies in a single network?
a. Bus.
b. Ring.
c. Star.
d. Hybrid. |
|
Definition
What topology combines two or more different physical topologies in a single network?
a. Bus.
b. Ring.
c. Star.
d. Hybrid. |
|
|
Term
Which network protocol has the Department of Defense chosen as its standard to govern the
flow of information?
a. AppleTalk.
b. NetBios Extended User Interface.
c. Transport Control Protocol/Internet Protocol.
d. Internetwork Packet Exchange/ Sequenced Packet Exchange |
|
Definition
Which network protocol has the Department of Defense chosen as its standard to govern the
flow of information?
a. AppleTalk.
b. NetBios Extended User Interface.
c. Transport Control Protocol/Internet Protocol.
d. Internetwork Packet Exchange/ Sequenced Packet Exchange |
|
|
Term
What Transmission Control Protocol/Internet Protocol network layer protocol provides the
service of matching a known IP address for a destination device to a Media Access Control
address?
a. Internet Protocol.
b. Address Resolution Protocol.
c. Reverse Address Resolution Protocol.
d. Internet Control Message Protocol |
|
Definition
What Transmission Control Protocol/Internet Protocol network layer protocol provides the
service of matching a known IP address for a destination device to a Media Access Control
address?
a. Internet Protocol.
b. Address Resolution Protocol.
c. Reverse Address Resolution Protocol.
d. Internet Control Message Protocol |
|
|
Term
What Transmission Control Protocol/Internet Protocol network layer protocol provides the
IP address for a device that knows its own MAC address?
a. Internet Protocol.
b. Address Resolution Protocol.
c. Reverse Address Resolution Protocol.
d. Internet Control Message Protocol. |
|
Definition
What Transmission Control Protocol/Internet Protocol network layer protocol provides the
IP address for a device that knows its own MAC address?
a. Internet Protocol.
b. Address Resolution Protocol.
c. Reverse Address Resolution Protocol.
d. Internet Control Message Protocol. |
|
|
Term
What Transmission Control Protocol/Internet Protocol network layer protocol provides
messaging that can help with troubleshooting?
a. Internet Protocol.
b. Address Resolution Protocol.
c. Reverse Address Resolution Protocol.
d. Internet Control Message Protocol. |
|
Definition
What Transmission Control Protocol/Internet Protocol network layer protocol provides
messaging that can help with troubleshooting?
a. Internet Protocol.
b. Address Resolution Protocol.
c. Reverse Address Resolution Protocol.
d. Internet Control Message Protocol. |
|
|
Term
What Transmission Control Protocol/Internet Protocol transport layer protocol provides
reliable data delivery services?
a. Internet Protocol.
b. User Datagram Protocol.
c. Transmission Control Protocol.
d. Internet Control Message Protocol. |
|
Definition
What Transmission Control Protocol/Internet Protocol transport layer protocol provides
reliable data delivery services?
a. Internet Protocol.
b. User Datagram Protocol.
c. Transmission Control Protocol.
d. Internet Control Message Protocol. |
|
|
Term
What application within Transmission Control Protocol/Internet Protocol is used to send
and receive files via TCP?
a. File Transfer Protocol.
b. Trivial File Transfer Protocol.
c. Simple Mail Transfer Protocol.
d. HyperText Transfer Protocol. |
|
Definition
What application within Transmission Control Protocol/Internet Protocol is used to send
and receive files via TCP?
a. File Transfer Protocol.
b. Trivial File Transfer Protocol.
c. Simple Mail Transfer Protocol.
d. HyperText Transfer Protocol. |
|
|
Term
What type of network connects networks that are typically separated by geographical
distances between cities, states, countries, or around the world?
a. Local Area Network.
b. Wide Area Network.
c. Virtual Private Network.
d. Metropolitan Area Network |
|
Definition
What type of network connects networks that are typically separated by geographical
distances between cities, states, countries, or around the world?
a. Local Area Network.
b. Wide Area Network.
c. Virtual Private Network.
d. Metropolitan Area Network |
|
|
Term
What type of network makes use of tunneling and security protocols to enables a group of
two or more computer systems to communicate over the public Internet?
a. Local Area Network.
b. Wide Area Network.
c. Virtual Private Network.
d. Metropolitan Area Network. |
|
Definition
What type of network makes use of tunneling and security protocols to enables a group of
two or more computer systems to communicate over the public Internet?
a. Local Area Network.
b. Wide Area Network.
c. Virtual Private Network.
d. Metropolitan Area Network. |
|
|
Term
Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
a. Port 80.
b. Port 110.
c. Port 443.
d. Port 8080. |
|
Definition
Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
a. Port 80.
b. Port 110.
c. Port 443.
d. Port 8080. |
|
|
Term
How many bits are in an IPv4 address?
a. 16 bits.
b. 32 bits.
c. 64 bits.
d. 128 bits. |
|
Definition
How many bits are in an IPv4 address?
a. 16 bits.
b. 32 bits.
c. 64 bits.
d. 128 bits. |
|
|
Term
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
a. Colon Hexadecimal Format.
b. Dotted Decimal Notation.
c. Hexadecimal.
d. Octal. |
|
Definition
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
a. Colon Hexadecimal Format.
b. Dotted Decimal Notation.
c. Hexadecimal.
d. Octal. |
|
|
Term
Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
a. Class A.
b. Class B.
c. Class C.
d. Class D. |
|
Definition
Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
a. Class A.
b. Class B.
c. Class C.
d. Class D. |
|
|
Term
What IPv4 class address is used for networks with about 250 nodes?
a. Class C.
b. Class D.
c. Class E.
d. Class F. |
|
Definition
What IPv4 class address is used for networks with about 250 nodes?
a. Class C.
b. Class D.
c. Class E.
d. Class F. |
|
|
Term
What IPv4 class address is used for multicast addressing?
a. Class C.
b. Class D.
c. Class E.
d. Class F. |
|
Definition
What IPv4 class address is used for multicast addressing?
a. Class C.
b. Class D.
c. Class E.
d. Class F. |
|
|
Term
What IPv4 reserved address is used for loop back?
a. 0.0.0.0.
b. 127.0.0.1.
c. 207.55.157.255.
d. 255.255.255.255. |
|
Definition
What IPv4 reserved address is used for loop back?
a. 0.0.0.0.
b. 127.0.0.1.
c. 207.55.157.255.
d. 255.255.255.255. |
|
|
Term
What is a mechanism that allows a network device to divide an IP address into a network
and host number?
a. Subnet mask.
b. Broadcast.
c. Multicast.
d. Subnet |
|
Definition
What is a mechanism that allows a network device to divide an IP address into a network
and host number?
a. Subnet mask.
b. Broadcast.
c. Multicast.
d. Subnet |
|
|
Term
What is the default classful subnet mask on class B networks?
a. 255.255.0.0.
b. 255.255.240.0.
c. 255.255.255.0.
d. 255.255.255.224. |
|
Definition
What is the default classful subnet mask on class B networks?
a. 255.255.0.0.
b. 255.255.240.0.
c. 255.255.255.0.
d. 255.255.255.224. |
|
|
Term
What method borrows bits from the host field of an IP address to create a subnet?
a. Classful Subnet Masking.
b. Classless Inter-Domain Routing.
c. Virtual Private Networking.
d. Virtual Local Area Networking. |
|
Definition
What method borrows bits from the host field of an IP address to create a subnet?
a. Classful Subnet Masking.
b. Classless Inter-Domain Routing.
c. Virtual Private Networking.
d. Virtual Local Area Networking. |
|
|
Term
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
a. Colon Hexadecimal Format.
b. Dotted Decimal Notation.
c. Hexadecimal.
d. Octal. |
|
Definition
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
a. Colon Hexadecimal Format.
b. Dotted Decimal Notation.
c. Hexadecimal.
d. Octal. |
|
|
Term
What notation is expressed in leading zero compression for IPv6?
a. 1234:1234:0:0:1234:0:0:1234.
b. 10AB::3:0:1234:5678.
c. 255.255.255.255.
d. 127.0.0.1. |
|
Definition
What notation is expressed in leading zero compression for IPv6?
a. 1234:1234:0:0:1234:0:0:1234.
b. 10AB::3:0:1234:5678.
c. 255.255.255.255.
d. 127.0.0.1. |
|
|
Term
What notation is expressed in zero compression for IPv6?
a. 1234:1234:0:0:1234:0:0:1234.
b. 10AB::3:0:1234:5678.
c. 255.255.255.255.
d. 127.0.0.1. |
|
Definition
What notation is expressed in zero compression for IPv6?
a. 1234:1234:0:0:1234:0:0:1234.
b. 10AB::3:0:1234:5678.
c. 255.255.255.255.
d. 127.0.0.1. |
|
|
Term
What Unicast address scope operates within a network segment, and will not originate from,
or be destined to, an interface that requires a router to direct traffic?
a. Site-local.
b. Link-local.
c. Aggregatable Local.
d. Aggregatable Global |
|
Definition
What Unicast address scope operates within a network segment, and will not originate from,
or be destined to, an interface that requires a router to direct traffic?
a. Site-local.
b. Link-local.
c. Aggregatable Local.
d. Aggregatable Global |
|
|
Term
What Unicast address scope is designed to be private, internally routable addresses that do
not route outside the site?
a. Site-local.
b. Link-local.
c. Aggregatable Local.
d. Aggregatable Global. |
|
Definition
What Unicast address scope is designed to be private, internally routable addresses that do
not route outside the site?
a. Site-local.
b. Link-local.
c. Aggregatable Local.
d. Aggregatable Global. |
|
|
Term
What Unicast address scope is publicly accessible with the Network ID portion of the
address broken up into different areas allowing for hierarchical design and allocation?
a. Site-local.
b. Link-local.
c. Aggregatable Local.
d. Aggregatable Global. |
|
Definition
What Unicast address scope is publicly accessible with the Network ID portion of the
address broken up into different areas allowing for hierarchical design and allocation?
a. Site-local.
b. Link-local.
c. Aggregatable Local.
d. Aggregatable Global. |
|
|
Term
The computing part of the computer is the central processing unit, also called the
a. control unit.
b. minicomputer.
c. microprocessor.
d. arithmetic logic unit |
|
Definition
The computing part of the computer is the central processing unit, also called the
a. control unit.
b. minicomputer.
c. microprocessor.
d. arithmetic logic unit |
|
|
Term
What two main components make up the central processing unit?
a. Control unit and read-only memory.
b. Control unit and arithmetic logic unit.
c. Arithmetic logic unit and read-only memory.
d. Arithmetic logic unit and random access memory. |
|
Definition
What two main components make up the central processing unit?
a. Control unit and read-only memory.
b. Control unit and arithmetic logic unit.
c. Arithmetic logic unit and read-only memory.
d. Arithmetic logic unit and random access memory. |
|
|
Term
What is the type of memory that retains data after power is removed or lost?
a. Volatile.
b. Nonvolatile.
c. Secured.
d. Unsecured. |
|
Definition
What is the type of memory that retains data after power is removed or lost?
a. Volatile.
b. Nonvolatile.
c. Secured.
d. Unsecured. |
|
|
Term
Which landline transmission medium is the primary carrier of voice communications?
a. Twisted pair cable.
b. Fiber optic cable.
c. Coaxial cable.
d. Twinax cable. |
|
Definition
Which landline transmission medium is the primary carrier of voice communications?
a. Twisted pair cable.
b. Fiber optic cable.
c. Coaxial cable.
d. Twinax cable. |
|
|
Term
An optical communications system is comprised of a
a. transmitter, cable, and receiver.
b. transmitter, cable, and logic analyzer.
c. transmitter, transmission medium, and logic analyzer.
d. transmitter, transmission medium, and protocol analyzer |
|
Definition
An optical communications system is comprised of a
a. transmitter, cable, and receiver.
b. transmitter, cable, and logic analyzer.
c. transmitter, transmission medium, and logic analyzer.
d. transmitter, transmission medium, and protocol analyzer |
|
|
Term
Which of the following is not one of the three advantages to using wireless technology?
a. Ease of installation.
b. Lower Cost.
c. Safety.
d. Mobility. |
|
Definition
Which of the following is not one of the three advantages to using wireless technology?
a. Ease of installation.
b. Lower Cost.
c. Safety.
d. Mobility. |
|
|
Term
The ability to move about without being tethered by wires in wireless technology is called
a. mobility.
b. ease of installations.
c. war driving.
d. motion capture technology |
|
Definition
The ability to move about without being tethered by wires in wireless technology is called
a. mobility.
b. ease of installations.
c. war driving.
d. motion capture technology |
|
|
Term
Which of the following is not one the four security threats to Wireless Local Area Network?
a. Rogue Access Points.
b. Direct Connections.
c. War Drivers.
d. Hackers. |
|
Definition
Which of the following is not one the four security threats to Wireless Local Area Network?
a. Rogue Access Points.
b. Direct Connections.
c. War Drivers.
d. Hackers. |
|
|
Term
Who is an authorized client that may unknowingly or maliciously help outside parties gain
access to a network?
a. Auditor.
b. Employee.
c. War Driver.
d. Hacker. |
|
Definition
Who is an authorized client that may unknowingly or maliciously help outside parties gain
access to a network?
a. Auditor.
b. Employee.
c. War Driver.
d. Hacker. |
|
|
Term
What organization developed several wireless standards to meet the demands of security,
speed, and flexibility of today’s wireless networks?
a. Institute of Electrical Electronics Engineers.
b. International Organization for Standardization.
c. Internet assigned numbers authority.
d. National Science Foundation network. |
|
Definition
What organization developed several wireless standards to meet the demands of security,
speed, and flexibility of today’s wireless networks?
a. Institute of Electrical Electronics Engineers.
b. International Organization for Standardization.
c. Internet assigned numbers authority.
d. National Science Foundation network. |
|
|
Term
How many peripherals can a Universal Serial Bus handle at once?
a. 127.
b. 128.
c. 227.
d. 228. |
|
Definition
How many peripherals can a Universal Serial Bus handle at once?
a. 127.
b. 128.
c. 227.
d. 228. |
|
|
Term
How many devices can connect to a FireWire bus?
a. 63.
b. 64.
c. 65.
d. 66. |
|
Definition
How many devices can connect to a FireWire bus?
a. 63.
b. 64.
c. 65.
d. 66. |
|
|
Term
What do you apply across Liquid Crystal Display material to change the alignment and light
polarizing property?
a. Current.
b. Voltage.
c. Resistance.
d. Inductance |
|
Definition
What do you apply across Liquid Crystal Display material to change the alignment and light
polarizing property?
a. Current.
b. Voltage.
c. Resistance.
d. Inductance |
|
|
Term
What is a Data Link layer network device that logically separates a single network into two
segments or collision domains in Ethernet networks?
a. Hub.
b. Bridge.
c. Switch.
d. Router. |
|
Definition
What is a Data Link layer network device that logically separates a single network into two
segments or collision domains in Ethernet networks?
a. Hub.
b. Bridge.
c. Switch.
d. Router. |
|
|
Term
What rule establishes the percent of data that should be local to a segment and the
percentage of data that should be destined to traverse a bridge to the other segment?
a. 90/10 rule.
b. 80/20 rule.
c. 70/30 rule.
d. 60/40 rule. |
|
Definition
What rule establishes the percent of data that should be local to a segment and the
percentage of data that should be destined to traverse a bridge to the other segment?
a. 90/10 rule.
b. 80/20 rule.
c. 70/30 rule.
d. 60/40 rule. |
|
|
Term
This type of bridge is used to convert one Data Link layer protocol to another.
a. Cross route.
b. Transparent.
c. Translational.
d. Source route. |
|
Definition
This type of bridge is used to convert one Data Link layer protocol to another.
a. Cross route.
b. Transparent.
c. Translational.
d. Source route. |
|
|
Term
What is the method called when the entire frame is received and placed into the buffer, an
error check is performed, and the frame is sent to the proper port for delivery?
a. Store-and-forward.
b. Cross-over.
c. Fragment-free.
d. Adaptive. |
|
Definition
What is the method called when the entire frame is received and placed into the buffer, an
error check is performed, and the frame is sent to the proper port for delivery?
a. Store-and-forward.
b. Cross-over.
c. Fragment-free.
d. Adaptive. |
|
|
Term
What forwarding method is also known as runtless switching?
a. Store-and-forward.
b. Cut-through.
c. Fragment-free.
d. Adaptive. |
|
Definition
What forwarding method is also known as runtless switching?
a. Store-and-forward.
b. Cut-through.
c. Fragment-free.
d. Adaptive. |
|
|
Term
What layer of the open system interconnection model do routers operate?
a. Layer 2.
b. Layer 3.
c. Layer 4.
d. Layer 5. |
|
Definition
What layer of the open system interconnection model do routers operate?
a. Layer 2.
b. Layer 3.
c. Layer 4.
d. Layer 5. |
|
|
Term
What do routing algorithms initialize and maintain to aid the process of path determination?
a. Routing times.
b. Routing tables.
c. Longest routes.
d. Shortest routes. |
|
Definition
What do routing algorithms initialize and maintain to aid the process of path determination?
a. Routing times.
b. Routing tables.
c. Longest routes.
d. Shortest routes. |
|
|
Term
Which of these is an example of an Exterior Gateway Protocol?
a. Open Shortest Path First.
b. Border Gateway Protocol.
c. Routing Information Protocol.
d. Enhanced Gateway Routing Protocol. |
|
Definition
Which of these is an example of an Exterior Gateway Protocol?
a. Open Shortest Path First.
b. Border Gateway Protocol.
c. Routing Information Protocol.
d. Enhanced Gateway Routing Protocol. |
|
|
Term
Dynamic routing automatically calculates the best path between how many nodes?
a. 2.
b. 3.
c. 4.
d. 5. |
|
Definition
Dynamic routing automatically calculates the best path between how many nodes?
a. 2.
b. 3.
c. 4.
d. 5. |
|
|
Term
What encryption device may you rarely see due to its lower maximum data rate?
a. TSEC/KIV–7.
b. TSEC/KIV–19.
c. TSEC/KG–84.
d. TSEC/KG–194. |
|
Definition
What encryption device may you rarely see due to its lower maximum data rate?
a. TSEC/KIV–7.
b. TSEC/KIV–19.
c. TSEC/KG–84.
d. TSEC/KG–194. |
|
|
Term
What encryption device is certified to secure all classification levels and categories and is
able to encrypt trunk-level high-speed circuits?
a. TSEC/KIV–7.
b. TSEC/KIV–7HS.
c. TSEC/KIV–7HSA.
d. TSEC/KIV–19. |
|
Definition
What encryption device is certified to secure all classification levels and categories and is
able to encrypt trunk-level high-speed circuits?
a. TSEC/KIV–7.
b. TSEC/KIV–7HS.
c. TSEC/KIV–7HSA.
d. TSEC/KIV–19. |
|
|
Term
What encryption device is capable of loading up to 500 keys?
a. AN/CYZ–10 /DTD.
b. AN/CYZ–20 /DTD.
c. Secure DTD1000 System.
d. Secure DTD2000 System. |
|
Definition
What encryption device is capable of loading up to 500 keys?
a. AN/CYZ–10 /DTD.
b. AN/CYZ–20 /DTD.
c. Secure DTD1000 System.
d. Secure DTD2000 System. |
|
|
Term
The classification of a fill device is
a. classified when taken out of a safe.
b. classified as SECRET when the key has been unloaded.
c. unclassified when put back in the safe after a key has been loaded into it.
d. classified as soon as a key is loaded, and holds the classification of the loaded key. |
|
Definition
The classification of a fill device is
a. classified when taken out of a safe.
b. classified as SECRET when the key has been unloaded.
c. unclassified when put back in the safe after a key has been loaded into it.
d. classified as soon as a key is loaded, and holds the classification of the loaded key. |
|
|
Term
A modem is a device that modulates
a. analog data onto an analog carrier for transmission over an analog medium.
b. analog data onto a digital carrier for transmission over a digital medium.
c. digital data onto an analog carrier for transmission over an analog medium.
d. digital data onto a digital carrier for transmission over an analog medium |
|
Definition
A modem is a device that modulates
a. analog data onto an analog carrier for transmission over an analog medium.
b. analog data onto a digital carrier for transmission over a digital medium.
c. digital data onto an analog carrier for transmission over an analog medium.
d. digital data onto a digital carrier for transmission over an analog medium |
|
|
Term
Analog modems are used over the voice band range of
a. 10 Hz to 20 MHz.
b. 20 Hz to 20 kHz.
c. 30 Hz to 40 MHz.
d. 40 Hz to 40 kHz. |
|
Definition
Analog modems are used over the voice band range of
a. 10 Hz to 20 MHz.
b. 20 Hz to 20 kHz.
c. 30 Hz to 40 MHz.
d. 40 Hz to 40 kHz. |
|
|
Term
The main function of the Data Service Unit is to
a. provide buffering and data flow control.
b. manage timing errors and signal regeneration.
c. provide the proper electrical termination for the transmission line.
d. adapt the digital data stream produced by the customer equipment to the signaling standards of
the telephone carrier equipment. |
|
Definition
The main function of the Data Service Unit is to
a. provide buffering and data flow control.
b. manage timing errors and signal regeneration.
c. provide the proper electrical termination for the transmission line.
d. adapt the digital data stream produced by the customer equipment to the signaling standards of
the telephone carrier equipment. |
|
|
Term
Software is generally divided into
a. systems software and applications software.
b. operating systems software and systems software.
c. operating systems software and applications software.
d. systems software, operating systems software, and applications software. |
|
Definition
Software is generally divided into
a. systems software and applications software.
b. operating systems software and systems software.
c. operating systems software and applications software.
d. systems software, operating systems software, and applications software. |
|
|
Term
Which one is not a category of the operating system’s task categories?
a. User interface.
b. Memory management.
c. Troubleshoot interface.
d. Processor management |
|
Definition
Which one is not a category of the operating system’s task categories?
a. User interface.
b. Memory management.
c. Troubleshoot interface.
d. Processor management |
|
|
Term
The path between the operating system and virtually all hardware not on the computer’s
motherboard goes through a special program called a
a. director.
b. deliver.
c. driver.
d. sender. |
|
Definition
The path between the operating system and virtually all hardware not on the computer’s
motherboard goes through a special program called a
a. director.
b. deliver.
c. driver.
d. sender. |
|
|
Term
The core operating-system function is the management of the computer system which
resides with the
a. shell.
b. kernel.
c. device manager.
d. processor manager |
|
Definition
The core operating-system function is the management of the computer system which
resides with the
a. shell.
b. kernel.
c. device manager.
d. processor manager |
|
|
Term
Applications are software programs designed to perform what type of tasks?
a. specific.
b. general.
c. special.
d. broad. |
|
Definition
Applications are software programs designed to perform what type of tasks?
a. specific.
b. general.
c. special.
d. broad. |
|
|
Term
What are two anti-virus programs that the Air Force uses?
a. Norton and Horton.
b. Horton and McAfee.
c. Norton and McAfee.
d. McAfee and Lotus Pro. |
|
Definition
What are two anti-virus programs that the Air Force uses?
a. Norton and Horton.
b. Horton and McAfee.
c. Norton and McAfee.
d. McAfee and Lotus Pro. |
|
|
Term
Windows operating systems traditionally function in one of two network models. Which
model does not operate using centralized user accounts?
a. Workgroup.
b. Domain.
c. Active Directory.
d. User Group |
|
Definition
Windows operating systems traditionally function in one of two network models. Which
model does not operate using centralized user accounts?
a. Workgroup.
b. Domain.
c. Active Directory.
d. User Group |
|
|
Term
Which system provides support for features such as Windows System Resource Manager
and Metadirectory Services?
a. AERO.
b. Enterprise Edition.
c. Standard Edition.
d. Datacenter Edition |
|
Definition
Which system provides support for features such as Windows System Resource Manager
and Metadirectory Services?
a. AERO.
b. Enterprise Edition.
c. Standard Edition.
d. Datacenter Edition |
|
|
Term
One of the Windows Server Editions operating systems provides support for high-end, high
traffic applications servers. Which Operating system is it?
a. Web Edition.
b. Datacenter Edition.
c. NT.
d. AERO |
|
Definition
One of the Windows Server Editions operating systems provides support for high-end, high
traffic applications servers. Which Operating system is it?
a. Web Edition.
b. Datacenter Edition.
c. NT.
d. AERO |
|
|
Term
What was the first disk operating system developed to operate on a wide range of computer
systems?
a. C-Plus.
b. UNIX.
c. Fortran.
d. Windows. |
|
Definition
What was the first disk operating system developed to operate on a wide range of computer
systems?
a. C-Plus.
b. UNIX.
c. Fortran.
d. Windows. |
|
|
Term
What is the name of the standard all-purpose shell most commonly used?
a. Restricted shell.
b. Bourne shell.
c. Korn shell.
d. C shell. |
|
Definition
What is the name of the standard all-purpose shell most commonly used?
a. Restricted shell.
b. Bourne shell.
c. Korn shell.
d. C shell. |
|
|
Term
What directory is always identified by the slash symbol (/) and is in the “a” partition?
a. root.
b. user.
c. binary.
d. device. |
|
Definition
What directory is always identified by the slash symbol (/) and is in the “a” partition?
a. root.
b. user.
c. binary.
d. device. |
|
|
Term
Which pathnames begin at the current working directory?
a. Absolute.
b. Relative.
c. Complex.
d. Simple. |
|
Definition
Which pathnames begin at the current working directory?
a. Absolute.
b. Relative.
c. Complex.
d. Simple. |
|
|
Term
This component of the Global Information Grid consists of those items that are necessary to
directly connect the warfighter to the global network
a. Global applications.
b. Warrior component.
c. Network operations.
d. Information management |
|
Definition
This component of the Global Information Grid consists of those items that are necessary to
directly connect the warfighter to the global network
a. Global applications.
b. Warrior component.
c. Network operations.
d. Information management |
|
|
Term
This characteristic of the Global Information Grid ensures seamless transmission of
information between different service branches
a. Joint architecture.
b. Unity of command.
c. Information services.
d. Common policy and standards. |
|
Definition
This characteristic of the Global Information Grid ensures seamless transmission of
information between different service branches
a. Joint architecture.
b. Unity of command.
c. Information services.
d. Common policy and standards. |
|
|
Term
Who bears the responsibility for maintenance of the sustaining base portion of the Defense
Information System Network?
a. The service that owns the installation.
b. Defense Information System Agency.
c. Infrastructure technicians.
d. Deployed warfighters |
|
Definition
Who bears the responsibility for maintenance of the sustaining base portion of the Defense
Information System Network?
a. The service that owns the installation.
b. Defense Information System Agency.
c. Infrastructure technicians.
d. Deployed warfighters |
|
|
Term
Which segment of the Defense Information System Network (DISN) may be a person in the
deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from
combat?
a. Long-haul transport infrastructure.
b. Deployed warfighter.
c. Theater Battle Management Core System terminal.
d. Sustaining base. |
|
Definition
Which segment of the Defense Information System Network (DISN) may be a person in the
deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from
combat?
a. Long-haul transport infrastructure.
b. Deployed warfighter.
c. Theater Battle Management Core System terminal.
d. Sustaining base. |
|
|
Term
What is the difference between a hub router and a premise router?
a. Operated and managed as a base communications asset.
b. Considered one of the primary components of the Defense Information Systems Network.
c. Interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode
network.
d. Completely protected by encryption devices. |
|
Definition
What is the difference between a hub router and a premise router?
a. Operated and managed as a base communications asset.
b. Considered one of the primary components of the Defense Information Systems Network.
c. Interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode
network.
d. Completely protected by encryption devices. |
|
|
Term
How are non-internet protocols sent across the Secret Internet Protocol Router Network?
a. Protocols cannot be sent across the SIPRNET.
b. Transmitted from sender to user unchanged.
c. Encapsulated by the internet protocol before being transmitted across the SIPRNET.
d. Encrypted by a TACLANE before being transmitted across the SIPRNET. |
|
Definition
How are non-internet protocols sent across the Secret Internet Protocol Router Network?
a. Protocols cannot be sent across the SIPRNET.
b. Transmitted from sender to user unchanged.
c. Encapsulated by the internet protocol before being transmitted across the SIPRNET.
d. Encrypted by a TACLANE before being transmitted across the SIPRNET. |
|
|
Term
Which is an internet protocol encryption device that can be directly connected to Red local
area networks?
a. KG–84.
b. KG–194.
c. KIV–7.
d. KG175. |
|
Definition
Which is an internet protocol encryption device that can be directly connected to Red local
area networks?
a. KG–84.
b. KG–194.
c. KIV–7.
d. KG175. |
|
|
Term
What provides conduit for Joint Worldwide Intelligence Communication System data
transmission from one location to another?
a. DISN backbone.
b. JDISS terminal.
c. SIPRNET.
d. NIPRNET. |
|
Definition
What provides conduit for Joint Worldwide Intelligence Communication System data
transmission from one location to another?
a. DISN backbone.
b. JDISS terminal.
c. SIPRNET.
d. NIPRNET. |
|
|
Term
What concerns slowed the military’s adoption of wireless network technology?
a. Speed and reliability.
b. Security and reliability.
c. Reliability and maintenance.
d. Certification and interoperability. |
|
Definition
What concerns slowed the military’s adoption of wireless network technology?
a. Speed and reliability.
b. Security and reliability.
c. Reliability and maintenance.
d. Certification and interoperability. |
|
|
Term
What is the first step in merging voice, data and video networks into one integrated network
within the Air Force?
a. Adding more traditional time division multiplexing voice switches to handle additional data
traffic.
b. Integrating traditional TDM switches with voice over IP systems.
c. Complete replacement of TDM switches with VoIP technology.
d. Managing TDM switches in the same way we manage data networks. |
|
Definition
What is the first step in merging voice, data and video networks into one integrated network
within the Air Force?
a. Adding more traditional time division multiplexing voice switches to handle additional data
traffic.
b. Integrating traditional TDM switches with voice over IP systems.
c. Complete replacement of TDM switches with VoIP technology.
d. Managing TDM switches in the same way we manage data networks. |
|
|
Term
Besides limiting connections to the Global Information Grid, what other Combat
Information Transport Systems initiative will help increase network security?
a. Establishing a Network Operation and Security Center at each base.
b. Creating a security baseline across all MAJCOM areas of responsibility.
c. Fielding standardized tools to all of the MAJCOM Network Operating Security Centers to
establish a baseline security model.
d. Eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated
NOSCs. |
|
Definition
Besides limiting connections to the Global Information Grid, what other Combat
Information Transport Systems initiative will help increase network security?
a. Establishing a Network Operation and Security Center at each base.
b. Creating a security baseline across all MAJCOM areas of responsibility.
c. Fielding standardized tools to all of the MAJCOM Network Operating Security Centers to
establish a baseline security model.
d. Eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated
NOSCs. |
|
|
Term
Which organization is responsible for the design, acquisition, and single systems
management of the Defense Switched Network?
a. Defense Logistics Agency.
b. Communications Squadron.
c. Air Force Communications Agency.
d. Defense Information Systems Agency. |
|
Definition
Which organization is responsible for the design, acquisition, and single systems
management of the Defense Switched Network?
a. Defense Logistics Agency.
b. Communications Squadron.
c. Air Force Communications Agency.
d. Defense Information Systems Agency. |
|
|
Term
How is responsiveness provided in the Defense Switched Network?
a. End offices are multiple-homed.
b. End offices do not interoperate with allied networks.
c. The DSN offers precedence access thresholding.
d. The DSN offers single level precedence and preemption. |
|
Definition
How is responsiveness provided in the Defense Switched Network?
a. End offices are multiple-homed.
b. End offices do not interoperate with allied networks.
c. The DSN offers precedence access thresholding.
d. The DSN offers single level precedence and preemption. |
|
|
Term
What type of Defense Switched Network precedence call cannot be preempted?
a. Flash.
b. Priority.
c. Intermediate.
d. Flash Override. |
|
Definition
What type of Defense Switched Network precedence call cannot be preempted?
a. Flash.
b. Priority.
c. Intermediate.
d. Flash Override. |
|
|
Term
What is the maximum asynchronous data rate for the Defense Red Switch Network
(DRSN)?
a. 9.6 Kbps.
b. 14.4 Kbps.
c. 19.2 Kbps.
d. 28.8 Kbps |
|
Definition
What is the maximum asynchronous data rate for the Defense Red Switch Network
(DRSN)?
a. 9.6 Kbps.
b. 14.4 Kbps.
c. 19.2 Kbps.
d. 28.8 Kbps |
|
|
Term
While you are using the Red Switch, what feature lets you know that you have dialed the
correct number at the proper level of security?
a. Recorded voice message.
b. Punched computer cards.
c. Liquid crystal display.
d. Punched paper tape. |
|
Definition
While you are using the Red Switch, what feature lets you know that you have dialed the
correct number at the proper level of security?
a. Recorded voice message.
b. Punched computer cards.
c. Liquid crystal display.
d. Punched paper tape. |
|
|
Term
What is the purpose of the standardized tactical entry point terminal?
a. To provide a foxhole to National Command Authority link for commanders.
b. To lessen the amount of traffic transmitted through the gateway terminals.
c. To provide one-way communication access for deployed locations.
d. To replace the old tactical satellite communications system. |
|
Definition
What is the purpose of the standardized tactical entry point terminal?
a. To provide a foxhole to National Command Authority link for commanders.
b. To lessen the amount of traffic transmitted through the gateway terminals.
c. To provide one-way communication access for deployed locations.
d. To replace the old tactical satellite communications system. |
|
|
Term
The Global Positioning System program is responsible for maintaining GPS time to within
how many seconds of universal time code?
a. 2 microseconds.
b. 2 seconds.
c. 1 microsecond.
d. 1 second. |
|
Definition
The Global Positioning System program is responsible for maintaining GPS time to within
how many seconds of universal time code?
a. 2 microseconds.
b. 2 seconds.
c. 1 microsecond.
d. 1 second. |
|
|
Term
Which security program is covered under AFI 10–701?
a. OPSEC.
b. EMSEC.
c. COMSEC.
d. COMPUSEC. |
|
Definition
Which security program is covered under AFI 10–701?
a. OPSEC.
b. EMSEC.
c. COMSEC.
d. COMPUSEC. |
|
|
Term
Which of the following security programs is defined as a process of identifying critical
information and subsequently analyzing friendly actions attendant to military operations and
other activities?
a. OPSEC.
b. EMSEC.
c. COMSEC.
d. COMPUSEC. |
|
Definition
Which of the following security programs is defined as a process of identifying critical
information and subsequently analyzing friendly actions attendant to military operations and
other activities?
a. OPSEC.
b. EMSEC.
c. COMSEC.
d. COMPUSEC. |
|
|
Term
Providing a list of where and why the information will be disclosed outside the DOD best
describes which mandatory item of a Privacy Act Statement?
a. Purpose.
b. Authority.
c. Disclosure.
d. Routine use. |
|
Definition
Providing a list of where and why the information will be disclosed outside the DOD best
describes which mandatory item of a Privacy Act Statement?
a. Purpose.
b. Authority.
c. Disclosure.
d. Routine use. |
|
|
Term
What form is used as a cover sheet to protect Privacy Act material?
a. AF Form 2327.
b. AF Form 3217.
c. AF Form 3227.
d. AF Form 3327. |
|
Definition
What form is used as a cover sheet to protect Privacy Act material?
a. AF Form 2327.
b. AF Form 3217.
c. AF Form 3227.
d. AF Form 3327. |
|
|
Term
Guidance for posting information on Air Force web sites is outlined in
a. AFI 33–119.
b. AFI 33–129.
c. AFI 33–219.
d. AFI 33–329. |
|
Definition
Guidance for posting information on Air Force web sites is outlined in
a. AFI 33–119.
b. AFI 33–129.
c. AFI 33–219.
d. AFI 33–329. |
|
|
Term
Official guidance on individual security clearances and permitting access to classified
information can be found in
a. AFI 31–301.
b. AFI 31–401.
c. AFI 31–501.
d. AFI 31–601. |
|
Definition
Official guidance on individual security clearances and permitting access to classified
information can be found in
a. AFI 31–301.
b. AFI 31–401.
c. AFI 31–501.
d. AFI 31–601. |
|
|
Term
Disclosure of information that would result in the loss, misuse, modification or
unauthorized access that might adversely affect national security would best be described as
a. secret.
b. confidential.
c. for official use only.
d. sensitive but unclassified. |
|
Definition
Disclosure of information that would result in the loss, misuse, modification or
unauthorized access that might adversely affect national security would best be described as
a. secret.
b. confidential.
c. for official use only.
d. sensitive but unclassified. |
|
|
Term
What is the COMSEC program designed to do?
a. Relocate classified material to strengthen security.
b. Conduct assessments to evaluate compromise of national security.
c. Deflect unauthorized interception and analysis of compromising emanations.
d. Detect and correct procedural weaknesses that could expose critical information |
|
Definition
What is the COMSEC program designed to do?
a. Relocate classified material to strengthen security.
b. Conduct assessments to evaluate compromise of national security.
c. Deflect unauthorized interception and analysis of compromising emanations.
d. Detect and correct procedural weaknesses that could expose critical information |
|
|
Term
What reference would you use for guidance on Air Force messaging?
a. AFI 33–119.
b. AFI 33–129.
c. AFI 33–219.
d. AFI 33–329. |
|
Definition
What reference would you use for guidance on Air Force messaging?
a. AFI 33–119.
b. AFI 33–129.
c. AFI 33–219.
d. AFI 33–329. |
|
|
Term
Which form is used with a transfer report to accompany a COMSEC package?
a. SF 135.
b. SF 153.
c. SF 351.
d. SF 531. |
|
Definition
Which form is used with a transfer report to accompany a COMSEC package?
a. SF 135.
b. SF 153.
c. SF 351.
d. SF 531. |
|
|
Term
Which form is used as a visitor register log to record visitors into restricted areas?
a. AF Form 1019.
b. AF Form 1109.
c. AF Form 1119.
d. AF Form 1190. |
|
Definition
Which form is used as a visitor register log to record visitors into restricted areas?
a. AF Form 1019.
b. AF Form 1109.
c. AF Form 1119.
d. AF Form 1190. |
|
|
Term
An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of
COMSEC material or the secure transmission of government information is best described as a
COMSEC
a. insecurity.
b. deviation.
c. incident.
d. report. |
|
Definition
An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of
COMSEC material or the secure transmission of government information is best described as a
COMSEC
a. insecurity.
b. deviation.
c. incident.
d. report. |
|
|
Term
Which organization assigns communication security incident report case numbers?
a. Air Force Communications Agency.
b. Air Force Office of Record.
c. Central Office of Records.
d. National Security Agency. |
|
Definition
Which organization assigns communication security incident report case numbers?
a. Air Force Communications Agency.
b. Air Force Office of Record.
c. Central Office of Records.
d. National Security Agency. |
|
|
Term
Final reports of a communication security incident are due
a. 10 days after the initial report is dated.
b. 20 days after the initial report is signed.
c. 30 days after the initial report is issued.
d. 40 days after the initial report is approved. |
|
Definition
Final reports of a communication security incident are due
a. 10 days after the initial report is dated.
b. 20 days after the initial report is signed.
c. 30 days after the initial report is issued.
d. 40 days after the initial report is approved. |
|
|
Term
The Air Force Information Assurance Program is detailed in
a. AFI 33–100.
b. AFI 33–200.
c. AFI 33–300.
d. AFI 33–400. |
|
Definition
The Air Force Information Assurance Program is detailed in
a. AFI 33–100.
b. AFI 33–200.
c. AFI 33–300.
d. AFI 33–400. |
|
|
Term
Which applied discipline applies measures and controls to protect data in computer
systems against unauthorized, disclosure, modification, or destruction?
a. OPSEC.
b. EMSEC.
c. COMSEC.
d. COMPUSEC. |
|
Definition
Which applied discipline applies measures and controls to protect data in computer
systems against unauthorized, disclosure, modification, or destruction?
a. OPSEC.
b. EMSEC.
c. COMSEC.
d. COMPUSEC. |
|
|
Term
What best describes an unintended signals or noise appearing external to a piece of
communications equipment?
a. Emulation.
b. Emanation.
c. Signature.
d. Salutation. |
|
Definition
What best describes an unintended signals or noise appearing external to a piece of
communications equipment?
a. Emulation.
b. Emanation.
c. Signature.
d. Salutation. |
|
|
Term
An unclassified term referring to technical investigations for compromising emanations
from electrically operated data processing equipment is known as
a. Emission security.
b. Communication security.
c. Telecommunications Electronic Material Protected from Emanating Spurious Transmissions.
d. Computer security. |
|
Definition
An unclassified term referring to technical investigations for compromising emanations
from electrically operated data processing equipment is known as
a. Emission security.
b. Communication security.
c. Telecommunications Electronic Material Protected from Emanating Spurious Transmissions.
d. Computer security. |
|
|
Term
Which condition exists when there is no apparent terrorist activity against computer
networks?
a. INFOCON 2.
b. INFOCON 3.
c. INFOCON 4.
d. INFOCON 5. |
|
Definition
Which condition exists when there is no apparent terrorist activity against computer
networks?
a. INFOCON 2.
b. INFOCON 3.
c. INFOCON 4.
d. INFOCON 5. |
|
|
Term
Which condition requires the mandate of increased monitoring of all network system
activities when an increased risk of attack is present?
a. INFOCON 2.
b. INFOCON 3.
c. INFOCON 4.
d. INFOCON 5. |
|
Definition
Which condition requires the mandate of increased monitoring of all network system
activities when an increased risk of attack is present?
a. INFOCON 2.
b. INFOCON 3.
c. INFOCON 4.
d. INFOCON 5. |
|
|
Term
When a risk of a network system attack has been identified, which condition requires all
unclassified dial-up connections be disconnected?
a. INFOCON 2.
b. INFOCON 3.
c. INFOCON 4.
d. INFOCON 5. |
|
Definition
When a risk of a network system attack has been identified, which condition requires all
unclassified dial-up connections be disconnected?
a. INFOCON 2.
b. INFOCON 3.
c. INFOCON 4.
d. INFOCON 5. |
|
|
Term
Which condition permits non-essential networks to be taken offline and substituted with
alternate methods of communication?
a. INFOCON 2.
b. INFOCON 3.
c. INFOCON 4.
d. INFOCON 5. |
|
Definition
Which condition permits non-essential networks to be taken offline and substituted with
alternate methods of communication?
a. INFOCON 2.
b. INFOCON 3.
c. INFOCON 4.
d. INFOCON 5. |
|
|
Term
At which NETOPS level is responsibility for the worldwide management and operational
oversight of the defense information infrastructure globally managed?
a. Tier 1.
b. Tier 2.
c. Tier 3.
d. Tier 4. |
|
Definition
At which NETOPS level is responsibility for the worldwide management and operational
oversight of the defense information infrastructure globally managed?
a. Tier 1.
b. Tier 2.
c. Tier 3.
d. Tier 4. |
|
|
Term
At what level do regional operation centers perform Network Operations (NETOPS) to
ensure operational and administrative control by implementing Systems and Network
Management Information Assurance/Network Defense (IA/NetD), and Information
Dissemination Management?
a. Tier 1.
b. Tier 2.
c. Tier 3.
d. Tier 4. |
|
Definition
At what level do regional operation centers perform Network Operations (NETOPS) to
ensure operational and administrative control by implementing Systems and Network
Management Information Assurance/Network Defense (IA/NetD), and Information
Dissemination Management?
a. Tier 1.
b. Tier 2.
c. Tier 3.
d. Tier 4. |
|
|
Term
An accreditation decision which allows a system to operate in an environment for which it
was originally intended is known as
a. a full accreditation.
b. a type accreditation.
c. a major accreditation.
d. an interim accreditation. |
|
Definition
An accreditation decision which allows a system to operate in an environment for which it
was originally intended is known as
a. a full accreditation.
b. a type accreditation.
c. a major accreditation.
d. an interim accreditation. |
|
|
Term
Which resources designated priority is provided when the level of security requires a
significant degree of deterrence against hostile acts?
a. “A”.
b. “B”.
c. “C”.
d. “D”. |
|
Definition
Which resources designated priority is provided when the level of security requires a
significant degree of deterrence against hostile acts?
a. “A”.
b. “B”.
c. “C”.
d. “D”. |
|
|
Term
Which resources designated priority is provided when the level of security requires a
reasonable degree of deterrence against hostile acts?
a. “A”.
b. “B”.
c. “C”.
d. “D”. |
|
Definition
Which resources designated priority is provided when the level of security requires a
reasonable degree of deterrence against hostile acts?
a. “A”.
b. “B”.
c. “C”.
d. “D”. |
|
|
Term
Which form would you use to properly label removable storage media containing
“confidential” information?
a. SF 706.
b. SF 707.
c. SF 708.
d. SF 710. |
|
Definition
Which form would you use to properly label removable storage media containing
“confidential” information?
a. SF 706.
b. SF 707.
c. SF 708.
d. SF 710. |
|
|