Term
What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems? |
|
Definition
|
|
Term
The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers? |
|
Definition
Logical Link Control and Media Access Control |
|
|
Term
At what Open System Interconnect layer do network switches and bridges operate? |
|
Definition
|
|
Term
At what Open System Interconnect layer do routers operate? |
|
Definition
|
|
Term
At what Open System Interconnect layer are common data compression and encryption schemes used? |
|
Definition
|
|
Term
What Open System Interconnect layer is closest to the end user? |
|
Definition
|
|
Term
What is a formal set of rules and conventions that govern how computers exchange information over a network medium? |
|
Definition
|
|
Term
What topology defines the layout of a network’s devices and media? |
|
Definition
|
|
Term
What topology defines the way in which devices communicate, and data is transmitted, throughout the network? |
|
Definition
|
|
Term
What topology consists of devices connected to a common, shared cable? |
|
Definition
|
|
Term
What topology consists of cable segments from each computer connected to a centralized component? |
|
Definition
|
|
Term
What topology combines two or more different physical topologies in a single network? |
|
Definition
|
|
Term
Which network protocol has the Department of Defense chosen as its standard to govern the flow of information? |
|
Definition
Transport Control Protocol/Internet Protocol |
|
|
Term
What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address? |
|
Definition
Address Resolution Protocol |
|
|
Term
What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address? |
|
Definition
Reverse Address Resolution Protocol |
|
|
Term
What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting? |
|
Definition
Internet Control Message Protocol |
|
|
Term
What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services? |
|
Definition
Transmission Control Protocol |
|
|
Term
What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP? |
|
Definition
|
|
Term
What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world? |
|
Definition
|
|
Term
What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet? |
|
Definition
|
|
Term
Which is a common port that contains Hyper Text Transfer Protocol servers and proxies? |
|
Definition
|
|
Term
How many bits are in an IPv4 address? |
|
Definition
|
|
Term
Instead of using binary, how are IPv4 addresses expressed to be more user-friendly? |
|
Definition
|
|
Term
Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to? |
|
Definition
|
|
Term
What IPv4 class address is used for networks with about 250 nodes? |
|
Definition
|
|
Term
What IPv4 class address is used for multicast addressing? |
|
Definition
|
|
Term
What IPv4 reserved address is used for loop back? |
|
Definition
|
|
Term
What is a mechanism that allows a network device to divide an IP address into a network and host number? |
|
Definition
|
|
Term
What is the default classful subnet mask on class B networks? |
|
Definition
|
|
Term
What method borrows bits from the host field of an IP address to create a subnet? |
|
Definition
Classless Inter-Domain Routing |
|
|
Term
Instead of using binary, how are IPv6 addresses expressed to be more user-friendly? |
|
Definition
|
|
Term
What notation is expressed in leading zero compression for IPv6? |
|
Definition
1234:1234:0:0:1234:0:0:1234 |
|
|
Term
What notation is expressed in zero compression for IPv6? |
|
Definition
|
|
Term
What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic? |
|
Definition
|
|
Term
What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site? |
|
Definition
|
|
Term
What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation? |
|
Definition
|
|
Term
The computing part of the computer is the central processing unit, also called the |
|
Definition
|
|
Term
What two main components make up the central processing unit? |
|
Definition
Control unit and arithmetic logic unit |
|
|
Term
What is the type of memory that retains data after power is removed or lost? |
|
Definition
|
|
Term
Which landline transmission medium is the primary carrier of voice communications? |
|
Definition
|
|
Term
An optical communications system is comprised of a |
|
Definition
transmitter, cable, and receiver |
|
|
Term
Which of the following is not one of the three advantages to using wireless technology? |
|
Definition
|
|
Term
The ability to move about without being tethered by wires in wireless technology is called |
|
Definition
|
|
Term
Which of the following is not one the four security threats to Wireless Local Area Network? |
|
Definition
|
|
Term
Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network? |
|
Definition
|
|
Term
What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today’s wireless networks? |
|
Definition
Institute of Electrical Electronics Engineers |
|
|
Term
How many peripherals can a Universal Serial Bus handle at once? |
|
Definition
|
|
Term
How many devices can connect to a FireWire bus? |
|
Definition
|
|
Term
What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property? |
|
Definition
|
|
Term
What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks? |
|
Definition
|
|
Term
What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment? |
|
Definition
|
|
Term
This type of bridge is used to convert one Data Link layer protocol to another |
|
Definition
|
|
Term
What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery? |
|
Definition
|
|
Term
What forwarding method is also known as runtless switching? |
|
Definition
|
|
Term
What layer of the open system interconnection model do routers operate? |
|
Definition
|
|
Term
What do routing algorithms initialize and maintain to aid the process of path determination? |
|
Definition
|
|
Term
Which of these is an example of an Exterior Gateway Protocol? |
|
Definition
|
|
Term
Dynamic routing automatically calculates the best path between how many nodes? |
|
Definition
|
|
Term
What encryption device may you rarely see due to its lower maximum data rate? |
|
Definition
|
|
Term
What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits? |
|
Definition
|
|
Term
What encryption device is capable of loading up to 500 keys? |
|
Definition
|
|
Term
The classification of a fill device is |
|
Definition
classified as soon as a key is loaded, and holds the classification of the loaded key. |
|
|
Term
A modem is a device that modulates |
|
Definition
digital data onto an analog carrier for transmission over an analog medium |
|
|
Term
Analog modems are used over the voice band range of |
|
Definition
|
|
Term
The main function of the Data Service Unit is to |
|
Definition
adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment |
|
|
Term
Software is generally divided into |
|
Definition
systems software, operating systems software, and applications software |
|
|
Term
Which one is not a category of the operating system’s task categories? |
|
Definition
|
|
Term
The path between the operating system and virtually all hardware not on the computer’s motherboard goes through a special program called a |
|
Definition
|
|
Term
The core operating-system function is the management of the computer system which resides with the |
|
Definition
|
|
Term
Applications are software programs designed to perform what type of tasks? |
|
Definition
|
|
Term
What are two anti-virus programs that the Air Force uses? |
|
Definition
|
|
Term
Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts? |
|
Definition
|
|
Term
Which system provides support for features such as Windows System Resource Manager and Metadirectory Services? |
|
Definition
|
|
Term
One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it? |
|
Definition
|
|
Term
What was the first disk operating system developed to operate on a wide range of computer systems? |
|
Definition
|
|
Term
What is the name of the standard all-purpose shell most commonly used? |
|
Definition
|
|
Term
What directory is always identified by the slash symbol (/) and is in the “a” partition? |
|
Definition
|
|
Term
Which pathnames begin at the current working directory? |
|
Definition
|
|
Term
This component of the Global Information Grid consists of those items that are necessary to directly connect the warfighter to the global network |
|
Definition
|
|
Term
This characteristic of the Global Information Grid ensures seamless transmission of information between different service branches |
|
Definition
Common policy and standards |
|
|
Term
Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network? |
|
Definition
The service that owns the installation |
|
|
Term
Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat? |
|
Definition
|
|
Term
What is the difference between a hub router and a premise router? |
|
Definition
Interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode network |
|
|
Term
How are non-internet protocols sent across the Secret Internet Protocol Router Network? |
|
Definition
Encapsulated by the internet protocol before being transmitted across the SIPRNET |
|
|
Term
Which is an internet protocol encryption device that can be directly connected to Red local area networks? |
|
Definition
|
|
Term
What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another? |
|
Definition
|
|
Term
What concerns slowed the military’s adoption of wireless network technology? |
|
Definition
|
|
Term
What is the first step in merging voice, data and video networks into one integrated network within the Air Force? |
|
Definition
Integrating traditional TDM switches with voice over IP systems |
|
|
Term
Besides limiting connections to the Global Information Grid, what other Combat Information Transport Systems initiative will help increase network security? |
|
Definition
Eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated NOSCs |
|
|
Term
Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network? |
|
Definition
Defense Information Systems Agency |
|
|
Term
How is responsiveness provided in the Defense Switched Network? |
|
Definition
The DSN offers precedence access thresholding |
|
|
Term
What type of Defense Switched Network precedence call cannot be preempted? |
|
Definition
|
|
Term
What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)? |
|
Definition
|
|
Term
While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security? |
|
Definition
|
|
Term
What is the purpose of the standardized tactical entry point terminal? |
|
Definition
To provide a foxhole to National Command Authority link for commanders |
|
|
Term
The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code? |
|
Definition
|
|
Term
Which security program is covered under AFI 10–701? |
|
Definition
|
|
Term
Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities? |
|
Definition
|
|
Term
Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement? |
|
Definition
|
|
Term
What form is used as a cover sheet to protect Privacy Act material? |
|
Definition
|
|
Term
Guidance for posting information on Air Force web sites is outlined in |
|
Definition
|
|
Term
Official guidance on individual security clearances and permitting access to classified information can be found in |
|
Definition
|
|
Term
Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as |
|
Definition
sensitive but unclassified |
|
|
Term
What is the COMSEC program designed to do? |
|
Definition
Detect and correct procedural weaknesses that could expose critical information |
|
|
Term
What reference would you use for guidance on Air Force messaging? |
|
Definition
|
|
Term
Which form is used with a transfer report to accompany a COMSEC package? |
|
Definition
|
|
Term
Which form is used as a visitor register log to record visitors into restricted areas? |
|
Definition
|
|
Term
An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC |
|
Definition
|
|
Term
Which organization assigns communication security incident report case numbers? |
|
Definition
Air Force Communications Agency |
|
|
Term
Final reports of a communication security incident are due |
|
Definition
30 days after the initial report is issued |
|
|
Term
The Air Force Information Assurance Program is detailed in |
|
Definition
|
|
Term
Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction? |
|
Definition
|
|
Term
What best describes an unintended signals or noise appearing external to a piece of communications equipment? |
|
Definition
|
|
Term
An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as |
|
Definition
Telecommunications Electronic Material Protected from Emanating Spurious Transmissions |
|
|
Term
Which condition exists when there is no apparent terrorist activity against computer networks? |
|
Definition
|
|
Term
Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present? |
|
Definition
|
|
Term
When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected? |
|
Definition
|
|
Term
Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication? |
|
Definition
|
|
Term
At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed? |
|
Definition
|
|
Term
At what level do regional operation centers perform Network Operations (NETOPS) to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management? |
|
Definition
|
|
Term
An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as |
|
Definition
|
|
Term
Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts? |
|
Definition
|
|
Term
Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts? |
|
Definition
|
|
Term
Which form would you use to properly label removable storage media containing “confidential” information? |
|
Definition
|
|