Term
|
Definition
What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, ad functional specifications for links between communicating network systems? |
|
|
Term
Logical LInk COntrol and Media Access Control |
|
Definition
The IEEE divide the OPen SYstem Interconnect Data Link Layers into what two sublayers? |
|
|
Term
|
Definition
At what Open System Interconnect layer do network switches and bridges operate? |
|
|
Term
|
Definition
At what Open System Interconnect layer do routers operate? |
|
|
Term
|
Definition
At what open system interconnect layer are common data compression and encryption schemes used? |
|
|
Term
|
Definition
What open system interconnect layer is closest to the end user? |
|
|
Term
|
Definition
What is a formal set of rules and conventions that govern how computers exchange information over a network medium? |
|
|
Term
|
Definition
What topology defines the layout of a network's devices and media? |
|
|
Term
|
Definition
What topology defines the way in which devices communicate, and data is transmitted, throughout the network? |
|
|
Term
|
Definition
What topology consists of devices connected to a common, shared cable? |
|
|
Term
|
Definition
What topology consists of cable segments from each computer connected to a centralized component? |
|
|
Term
|
Definition
What topology cobines two or more different physical topologies in a single network? |
|
|
Term
Transport Control Protocol/Internet Protocol |
|
Definition
Which network protocol has the DoD chosen as its standard to govern the flow of info? |
|
|
Term
Address Resolution Protocol |
|
Definition
What TCP/IP network layer protocol provides the services of matching a known IP address for a destination device to a Media Access Control address? |
|
|
Term
Reverse Address Resolution Protocol |
|
Definition
What TCP/IP network layer protocol provides the IP address for a device that knows its own MAC address? |
|
|
Term
Internet Control Message Protocol |
|
Definition
What TCP/IP network layer protocol provides messaging that can help with troubleshooting? |
|
|
Term
Transmission Control Protocol |
|
Definition
What TCP/IP transport layer protocol provides reliable data delivery services? |
|
|
Term
|
Definition
What application within TCP/IP is used to send and receive files via TCP? |
|
|
Term
|
Definition
WHat type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world? |
|
|
Term
|
Definition
What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet? |
|
|
Term
|
Definition
Which is a common port that contains HTTP servers and proxies? |
|
|
Term
|
Definition
How many bits are in an IPv4 address? |
|
|
Term
|
Definition
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly? |
|
|
Term
|
Definition
Using a range of 1-126 in the first octet of an IPv4 address, what class does it belong to? |
|
|
Term
|
Definition
What IPv4 class address is used for networks with about 250 nodes? |
|
|
Term
|
Definition
What IPv4 class address is used for multicast addressign? |
|
|
Term
|
Definition
What IPv4 reserved address is used for loop back? |
|
|
Term
|
Definition
What is a mechanism that allows a network device to divide an IP address into a network and host number? |
|
|
Term
|
Definition
What is the default classful subnet mask on class B networks? |
|
|
Term
Classles Inter-Domain Routing |
|
Definition
What method borrows bits from the host field of an IP address to create a subnet? |
|
|
Term
|
Definition
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly? |
|
|
Term
1234:1234:0:0:1234:0:0:1234 |
|
Definition
What notation is expressed in leading zero compression for IPv6? |
|
|
Term
|
Definition
What notation is expressed in zero compression for IPv6? |
|
|
Term
|
Definition
What Unicast address scope operates within a network segment, and will not originate from or be destined to an interface that requires a router to direct traffic? |
|
|
Term
|
Definition
What Unicast address scope is designed to be private, internally routable adresses that do not route outside the site? |
|
|
Term
|
Definition
What Unicast address scope is publicly accessible with the Network ID portion of the address borken up into different areas allowing for hierarchical design and allocation? |
|
|
Term
|
Definition
The computing part of the computer is the central processing unit, also called the: |
|
|
Term
Control unit and arithmetic logic unit |
|
Definition
What two main components make up the central processing unit? |
|
|
Term
|
Definition
What is the type of memory that retains data after power is removed or lost? |
|
|
Term
|
Definition
Which landline transmission medium is the primary carrier of voice comm? |
|
|
Term
transmitter, cable, and receiver |
|
Definition
An optical comm system is comprised of a: |
|
|
Term
|
Definition
Which of the following is not one of the three advantages to using wireless tech? |
|
|
Term
|
Definition
THe ability to move about without being tethered by wires in wireless tech is called: |
|
|
Term
|
Definition
Which of the following is not one of the four security threats to WLAN? |
|
|
Term
|
Definition
Who is an authorized client that may unknowlingly or maliciously help outside parties gain access to a network? |
|
|
Term
Institute of Electrical Electronics Engineers |
|
Definition
What organization develped several wireless standards to meet the demands of security, speed, and flexibility of today's wirelss networks? |
|
|
Term
|
Definition
How many peripherals can a Universal Serial Bus handle at once? |
|
|
Term
|
Definition
HOw many devices can connect to a FireWire bus? |
|
|
Term
|
Definition
What do you apply across LCD material to change the alignment and light polarizing property? |
|
|
Term
|
Definition
What is a Datalink layer network device that logically separates a single network into two segments or collision domains in Ethernet networks? |
|
|
Term
|
Definition
What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment? |
|
|
Term
|
Definition
This type of bridge is used to convert one Data LInk layer protocol to another: |
|
|
Term
|
Definition
What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery? |
|
|
Term
|
Definition
What forwarding method is alos known as runtless switching? |
|
|
Term
|
Definition
What layer of the OSI model do routers operate? |
|
|
Term
|
Definition
What do routing algorithms initialize and maintain to aid the process of path determination? |
|
|
Term
|
Definition
Which of these is an example of an Exterior Gateway Protocol? |
|
|
Term
|
Definition
Dynamic routing automatically calcualtes the best path between how many nodes? |
|
|
Term
|
Definition
What encryption device may you rarely see due to its lower maximum data rate? |
|
|
Term
|
Definition
What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits? |
|
|
Term
|
Definition
What encryption device is capable of loading up to 500 keys? |
|
|
Term
classified as soon as the key is loaded, and holds the classification of the loaded key |
|
Definition
The classification of a fill device is: |
|
|
Term
digital data onto an analog carrier for transmission over an analog medium |
|
Definition
A modem is a device that modulates: |
|
|
Term
|
Definition
Analog modems are used over the voice band range of: |
|
|
Term
adapt the digital data stream produced by the customer euipment to the signaling standards of the telephone carrier equipment |
|
Definition
The main function of the Data Service Unit is to: |
|
|
Term
systems software, operating systems software, and applications software |
|
Definition
Software is generally divided into: |
|
|
Term
|
Definition
Which one is not a category of the operating ystem's task categories? |
|
|
Term
|
Definition
The path between the os and virtually all hardware not on the computer's motherboard goes thorugh a special program called a |
|
|
Term
|
Definition
The core operating-system function is the management of the computer system which resides with the: |
|
|
Term
|
Definition
Applications are software programs designed to perform what type of tasks? |
|
|
Term
|
Definition
What are two anti-virus programs that the air force uses? |
|
|
Term
|
Definition
Windows OS systems traditionally function in one of two network models. Which model does not operate using centralized user accounts? |
|
|
Term
|
Definition
Which system provides support for features such as Windows System Resource Manager and Metadirectory Services? |
|
|
Term
|
Definition
One of the Windows Server Editions operating systems provides support for high-end, hig traffic applications servers. Which Operating system is it? |
|
|
Term
|
Definition
What was the first disk operating system developed to operate on a wide range of computer systems? |
|
|
Term
|
Definition
What is the name of the standard all-purpose shell most commonly used? |
|
|
Term
|
Definition
What directory is always identified by the slash symbol (/) and is in the "a" partion? |
|
|
Term
|
Definition
Which pathnames begin at the current working directory? |
|
|
Term
|
Definition
This component of the GIG consists of those items that are necessary to directly connect the warfighter to the global network: |
|
|
Term
|
Definition
This characteristic of the GIG ensures seamless transmission of info between different service brances |
|
|
Term
The service that owns the installation |
|
Definition
Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network? |
|
|
Term
|
Definition
Which segment of the DISN may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat? |
|
|
Term
Interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode network |
|
Definition
What is the difference between a hub router and a premise router? |
|
|
Term
Encapsulated by the internet protocol before being transmitted across the SIPRNET |
|
Definition
How are non-internet protocols sent across the SIPRNET? |
|
|
Term
|
Definition
Which is an internet protocol encryption device that can be directly connected to Red local area networks? |
|
|
Term
|
Definition
What provides conduit for JWICS data transmission from one location to another? |
|
|
Term
|
Definition
What concerns slowed the military's adoption of wireless network tech? |
|
|
Term
Integrating traditional TDM switches with voIP systems |
|
Definition
What is the first step in merging voice, data and video networks into one integrated network within the air force? |
|
|
Term
Eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated NOSCs |
|
Definition
Besides limiting connections to the GIG, what other Combat Information Systems initiative will help increase network security? |
|
|
Term
Defense Information SYstems Agency |
|
Definition
Which organization is responsible for the design, acquisition, and single systems management of the DSN? |
|
|
Term
The DSN offers precedence accesss thresholding |
|
Definition
How is responsiveness provided in teh DSN? |
|
|
Term
|
Definition
What type of Defense Switched Netwok precedence call cannot be preempted? |
|
|
Term
|
Definition
What is the maximum asynchronous data rate for the Defense Red Switch Network |
|
|
Term
|
Definition
While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security |
|
|
Term
To provide a foxhole to National Command Authority link for commanders |
|
Definition
What is the purpose of the standardized tactical entry point terminal |
|
|
Term
|
Definition
The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code? |
|
|
Term
|
Definition
Which security program is covered under AFI 10-701 |
|
|
Term
|
Definition
Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement |
|
|
Term
|
Definition
What form is used s a cover sheet to protect Privacy Act material |
|
|
Term
|
Definition
Guidance for posting information on Air Force web sites is outlined in |
|
|
Term
|
Definition
Official giuidance on individual security clearances and permitting access to classified information can be found in |
|
|
Term
sensitive but unclassified |
|
Definition
Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as |
|
|
Term
Detect and correct procedural weaknesses that could expose critical information |
|
Definition
What is the COMSEC program designed to do |
|
|
Term
|
Definition
What reference would you use for guidance on Air Force messaging |
|
|
Term
|
Definition
Which form is used with a transfer report to accompany a COMSEC package |
|
|
Term
|
Definition
Which form is used as a visitor register log to record visitors into restricted areas |
|
|
Term
|
Definition
An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC |
|
|
Term
|
Definition
Which organization assigns communication security incident report case numbers |
|
|
Term
30 days after the initial report is signed |
|
Definition
Final reports of a communication security incident are due |
|
|
Term
|
Definition
The Air Force Information Assurance Program is detailed in |
|
|
Term
|
Definition
Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction |
|
|
Term
|
Definition
What best describes an unintended signals or noise appearing external to a piece of communications equipment |
|
|
Term
Telecommunications Electronic Material Protected from Emanating Spurious Transmissions |
|
Definition
An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as |
|
|
Term
|
Definition
Which condition exists when there is no apparent terrorist activity against computer networks |
|
|
Term
|
Definition
Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present |
|
|
Term
|
Definition
When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected |
|
|
Term
|
Definition
Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication |
|
|
Term
|
Definition
At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed |
|
|
Term
|
Definition
At what level do regional operation centers perform Network Operations(NETOPS) to ensure operational and administrative control by implementing Systems and Netowkr Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management |
|
|
Term
|
Definition
An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as |
|
|
Term
|
Definition
Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts |
|
|
Term
|
Definition
Which form would you use to properly label removable storage media containing "confidential" information |
|
|
Term
|
Definition
Which of the following security programs is defined as a process of identifying critical info and subsequently analyzing friendly actions attendant to military ops and other activities? |
|
|
Term
|
Definition
Which resources designated priority is provided when the leel of security requires a significant degree of deterrence against hostile acts? |
|
|
Term
|
Definition
Directly connects the warfighter and their combat platforms to the global network. |
|
|
Term
|
Definition
Warfighter uses this for the transmission of their information. The conduit by which the warfighter critical info can make it to and from the warfighter. |
|
|
Term
|
Definition
Consists of hardware and software systems, support, and storage that enables info processing. Ex. Base email, web services, and file storage servers. |
|
|
Term
|
Definition
Provide info transport service to all DOD users. |
|
|
Term
|
Definition
The mortar between the component bricks in the GIG, keeps the warfighter connected to the foundation. Info Assurance is a key aspect for this. |
|
|
Term
|
Definition
Conrtols and prioritizes info through its entire life cycle, from formation through processing, dissemination, use, storage, and disposition. Ensure integrity of info that is available. |
|
|
Term
|
Definition
Consists of standards, plicies, doctrines, and architecture that create what is acceptable for the DOD network. |
|
|
Term
|
Definition
THis characterisitic defines the necessary coordination and cooperation of supporting and supported comanders in relation to the NETOPS of the GIG |
|
|
Term
Common policies and standards |
|
Definition
The only way to ensure seamless transmission of info between different service branches, systems and applications. |
|
|
Term
Global authentication, access control, directory services |
|
Definition
Allows for any and all authorized users to log in and gain access to DOD info, applications, and sercices based on their clearance and access level as long as they have common and portable identity credentials. |
|
|
Term
|
Definition
Allows DOD forces and our mission partners access to the info they require for mission accomplishment. |
|
|
Term
|
Definition
GIG users across the DOD are able to seamlessly connect to the applications, systems, and services offered by the GIG. Architecture is common through the network. |
|
|
Term
|
Definition
Three data networks that comprise the major data backbone of DISN. |
|
|
Term
Defense Switched Network, Defense Red Switch Network |
|
Definition
Two DOD standard telephone networks for DISN: |
|
|
Term
GCCS, GCSS, JWICS, DCGS, TBMCS |
|
Definition
C4I networks include what? |
|
|