3dx5x 1&2

224 Questions  I  By CommV1
This quiz has both volumes unit review questions in the 3DX5X.  

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  At what Open System Interconnect layer are common data compression and encryption schemes used?
A.
B.
C.
D.
2.  The Air Force Occupational Safety and Health (AFOSH) standard that you would reference safety information on data processing facilities is called AFOSH standard
A.
B.
C.
D.
3.  Which condition exists when there is no apparent terrorist activity against computer network?
A.
B.
C.
D.
4.  Besides limiting connections to the Global Information Grid, what other Combat Information transport Systems initiative will help increase network security?
A.
B.
C.
D.
5.  Defense Support of Civil Authorities (DSCA), Humanitarian Relief Operations (HUMRO), Non-Combatant Evacuation Operations (NEO) and support to International Law Enforcement are all examples of
A.
B.
C.
D.
6.  Which command and control structure has network node whose survivability is achieved using nuclear hardened equipment, redundant circuits, and alternate communications paths?
A.
B.
C.
D.
7.  Who is responsible for creating unique passwords for the office of primary responsibility (OPR) records custodian?
A.
B.
C.
D.
8.  What  encryption device is capable of loading up to 500 keys?
A.
B.
C.
D.
9.  What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
A.
B.
C.
D.
10.  The proper way we destroy records to prevent compromise is by
A.
B.
C.
D.
11.  Discloser of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as 
A.
B.
C.
D.
12.  What is the difference between a hub router and a premise router?
A.
B.
C.
D.
1 comment
13.  An optical communications system is comprised of a
A.
B.
C.
D.
14.  The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a
A.
B.
C.
D.
15.  What IPv4 class address is used for multicast addressing?
A.
B.
C.
D.
16.  What method borrows bits from the host field of an IP address to create a subnet?
A.
B.
C.
D.
17.  Offensive operations support United States cyberspace objectives by
A.
B.
C.
D.
18.  Which enlisted training element defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field?
A.
B.
C.
D.
19.  Records that are considered to be in final format have which characteristic?
A.
B.
C.
D.
20.  Which security program is covered under AFI 10-701?
A.
B.
C.
D.
21.  A remotely piloted or self-piloted aircraft that can carry cameras, sensors, communications equipment, or other payloads is called a/an
A.
B.
C.
D.
22.  Which option refers to centralized systems which monitor and control industrial sites, or complexes of systems spread out over large areas?
A.
B.
C.
D.
23.  What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?
A.
B.
C.
D.
24.  What notation is expressed in zero compression for IPv6?
A.
B.
C.
D.
25.  Which Occupational Risk Management (ORM) principle has risk assessments of mission supportive operations done as a normal way of conducting a mission and not an add-on process?
A.
B.
C.
D.
26.  Final reports of a communication security incident are due
A.
B.
C.
D.
27.  What two main components make up the central processing unit?
A.
B.
C.
D.
28.  What determines the cutoff for active records?
A.
B.
C.
D.
29.  What layer of the open system interconnection model do routers operate?
A.
B.
C.
D.
30.  Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?
A.
B.
C.
D.
31.  Which form would you use to properly label removable storage media containing "confidential" information?
A.
B.
C.
D.
32.  What is the default classful subnet mask on class B networks?
A.
B.
C.
D.
33.  What tool provides essential online resources for the Air Force and its users at a single location?
A.
B.
C.
D.
34.  An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as
A.
B.
C.
D.
35.  Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
A.
B.
C.
D.
36.  Which publication type are directive policy statements of Office of the Secretary of the Air Force and HQ USAF to initiate, govern, or regulated actions of conduct, within their specified areas of responsibility?
A.
B.
C.
D.
37.  Which organization is responsible for the design, acquisition, and signle systems management of the Defense Switched Network?
A.
B.
C.
D.
1 comment
38.  What system provides connectivity between the US and allied forces for critical missions and enhances worldwide readiness, mobility, responsiveness, and operations?
A.
B.
C.
D.
39.  In what year did the Air Force finalized and published its information operations (IO) doctrine in August of 1998, while the Joint Staff published its doctrine?
A.
B.
C.
D.
40.  What topology consists of devices connected to a common, shared cable?
A.
B.
C.
D.
41.  The Air Force Information  Assurance Program is detailed in 
A.
B.
C.
D.
42.  What concerns slowed the military's adoption of wireless network techniology? 
A.
B.
C.
D.
43.  Which command and control structure is a priority component of the Global Information Grid (GIG) designed to support the President, SECDEF, and the JCS in the exercise of their responsibilities?
A.
B.
C.
D.
44.  Which document serves as the basis for holding military members accountable for breeches in binding instruction and law?
A.
B.
C.
D.
45.  Which major systems employs the Joint Operation Planning and Execution System (JOPES), Global Status of Resources and Training System (GSORTS), Deliberate Crisis Action Planning and Execution Segment (DCAPES), and Common Operational Picture (COP) systems?
A.
B.
C.
D.
46.  Which one is not a category of the operating system's task categories?
A.
B.
C.
D.
47.  Which center has overall authoritative source for the status, control, and defense of Air Force networks?
A.
B.
C.
D.
48.  What function provides the Department of Defense (DOD) with the capability to reach hundreds of thousands of people via Personal Computer (PC), Personal Digital Assistants (PDA's), land and cell phones, pagers, Blackberry devices, and/or giant voice systems in real-time?
A.
B.
C.
D.
49.  What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
A.
B.
C.
D.
50.  Official guidance on individual security clearances and permitting accesss to classified information can be found in
A.
B.
C.
D.
51.  What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
A.
B.
C.
D.
52.  A comprehensive term that specifies the destruction, salvage, and donation of records, or the transfer to a staging area or records center; and the transfer of records from one organization to another is called a
A.
B.
C.
D.
53.  What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?
A.
B.
C.
D.
54.  Which function or organization has the goal to manage AF core services, within the AFNetOps community to; reduce training, maintenance costs; increase operational flexibility and capacity to the warfighter?
A.
B.
C.
D.
55.  When a risk of a network system  attack has been identified, which condition requires all unclassified dial-up connections be disconnected?
A.
B.
C.
D.
56.  The 85th Engineering and Installation Squadron (EIS) is assigned to the
A.
B.
C.
D.
57.  Which function is a state-of-the-art ground-to-ground communications infrastructure designed to exchange secure and non-secure voice, data, and video communications by way of line-of-sight (LOS), satellite, or hard-wired resources?
A.
B.
C.
D.
58.  From which of the following can a person absorb selectively damaging amounts of radiation that will result in deep tissue harming organs with little or no sensation of skin heating?
A.
B.
C.
D.
59.  This type of bridge is used to convert one Data Link layer protocol to another.
A.
B.
C.
D.
60.  Which publication type are informational publications which are "how to" documents?
A.
B.
C.
D.
61.  Which 3D Air Force Specialty (AFS) responsibilities include the installation, maintains and repairs of fixed and deployable air traffic, weather, ground air control, and warning radar systems?
A.
B.
C.
D.
62.  What best describes an unintended signals or noise appearing external to a piece of communications equipment?
A.
B.
C.
D.
63.  Who has the primary mission of providing the joint force air component commander (JFACC) with the tools necessary to fight and win a major theater war within the scope and coordination of all land, sea, and air forces?
A.
B.
C.
D.
64.  Records that are considered to be in draft format
A.
B.
C.
D.
65.  A logical group of record is called a/an
A.
B.
C.
D.
66.  What topology consists of cable segments from each computer connected to a centralized component?
A.
B.
C.
D.
67.  Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?
A.
B.
C.
D.
68.  The core operating-system function is the management of the computer system which resides with the
A.
B.
C.
D.
69.  Under what program does the Department of Defense (DOD) collects, processes, produces, disseminates, and uses information?
A.
B.
C.
D.
70.  Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
A.
B.
C.
D.
71.  Which system provides high-quality voice/data HF and Ultra-High Frequency (UHF) satellite communications to president, vice president, cabinet members, and other senior government and military officials while aboard Special Airlift Mission (SAM) aircraft?
A.
B.
C.
D.
72.  Which system provides support for features such as Windows System Resources Manager and Metadirectory Services?
A.
B.
C.
D.
73.  What Occupational Risk Management (ORM) principle states that most logical choices for accomplishing a mission are those that meet all mission requirements while exposing personnel and resource to the lowest acceptable risk?
A.
B.
C.
D.
74.  Which system is a USAF program supporting Global, Defense Communication System (DCS) HF Entry, Mystic Star, and System of Inter- American Telecommunications for the Air Force (SITFAA) mission?
A.
B.
C.
D.
75.  What IPv4 class address is used for networks with 250 nodes?
A.
B.
C.
D.
76.  Which of the following is not one of the three advantages to using wireless technology?
A.
B.
C.
D.
77.  Which system focuses on providing exploitable digital imagery to the warfighter in near real-time?
A.
B.
C.
D.
78.  An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as 
A.
B.
C.
D.
1 comment
79.  One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers.  Which Operaing System is it?
A.
B.
C.
D.
80.  Who is the advisor for all matters affecting the career field?
A.
B.
C.
D.
81.  At what level do regional operation centers perform Network Operations (NETOPS) ot ensure operation and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management?
A.
B.
C.
D.
82.  What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?
A.
B.
C.
D.
83.  Marking the records for filing is considered which step of file management?
A.
B.
C.
D.
84.  Which Air Force Occupational Safety and Health (AFOSH) standard document would you reference safety information on "Communications Cable, Antenna and Communications-Electronics Systems?"
A.
B.
C.
D.
85.  Which system provides the ability to rapidly detect and identify airborne targets with minimal or no support?
A.
B.
C.
D.
86.  Guidance for posting information on Air Force web sites is outlined in 
A.
B.
C.
D.
87.  Which Air Force Occupational Safety and Health (AFOSH) standard would you reference safety information on "Material Handling and Storage Equipment?"
A.
B.
C.
D.
88.  Who bears the responsibility for maintenance or of the sustaining base portion of the Defense Information System Network?
A.
B.
C.
D.
89.  Which form is used as a visitor register long to record visitors into restricted areas?
A.
B.
C.
D.
1 comment
90.  How many peripherals can Universal Serial Bus handle at once?
A.
B.
C.
D.
91.  Which form is used with a transfer report to accompany a COMSEC package?
A.
B.
C.
D.
92.  Which command and control structure is a primary network used to transmit the Emergency Action Message generated by the National Military Command Center (NMCC) to the warfighting commanders in the field?
A.
B.
C.
D.
93.  Which system capitalizes on the popular commercial direct broadcast satellite technology to provide critical informtaion to the nation's warfighters?
A.
B.
C.
D.
1 comment
94.  Which is an internet protocol encyption device that can be directly connected to Red local area network?
A.
B.
C.
D.
95.  Which system of interconnected computer networks is used by the United States Department of Defense and the United States Department of State?
A.
B.
C.
D.
96.  The main function of the Data Service Unit is to 
A.
B.