We have sent an email with your new password.


3dx5x 1&2

224 Questions  I  By CommV1
3DX5X 1&2
This quiz has both volumes unit review questions in the 3DX5X.  

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  A remotely piloted or self-piloted aircraft that can carry cameras, sensors, communications equipment, or other payloads is called a/an
A.
B.
C.
D.
2.  Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction?
A.
B.
C.
D.
3.  Whose duties include providing assistance, managing staging areas, and records training?
A.
B.
C.
D.
4.  Prior to posting web content on an Air Force web page; which document would you reference regarding compliance of local clearance and approval Public Affairs procedures for posting information to the Internet/public Web sites?
A.
B.
C.
D.
5.  A logical group of record is called a/an
A.
B.
C.
D.
6.  A modem is a device that modulates
A.
B.
C.
D.
7.  What Unicast address scope is designed to be private, internally routable address that do not route outside the site?
A.
B.
C.
D.
8.  For which exception will federal records centers accept records having less than 3 years of retention?
A.
B.
C.
D.
9.  Records that are considered to be in draft format
A.
B.
C.
D.
10.  How are non-internet protocols sent across the Secret Internet Protocol Router Network?
A.
B.
C.
D.
11.  What authorization generates a file disposition control label for each item listed on the office's file plan?
A.
B.
C.
D.
12.  Who is the advisor for all matters affecting the career field?
A.
B.
C.
D.
13.  The primary purpose for maintaining records is to ensure
A.
B.
C.
D.
14.  An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material the secure transmission of government information is best described as a COMSEC
A.
B.
C.
D.
15.  What determines the cutoff for active records?
A.
B.
C.
D.
16.  What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?
A.
B.
C.
D.
17.  What best describes an unintended signals or noise appearing external to a piece of communications equipment?
A.
B.
C.
D.
18.  What encryption device may you rarely see due to its lower maximum data rate?
A.
B.
C.
D.
19.  What form is used as a cover sheet to protect Privacy Act material?
A.
B.
C.
D.
20.  Which system capitalizes on the popular commercial direct broadcast satellite technology to provide critical informtaion to the nation's warfighters?
A.
B.
C.
D.
21.  When a risk of a network system  attack has been identified, which condition requires all unclassified dial-up connections be disconnected?
A.
B.
C.
D.
22.  What method borrows bits from the host field of an IP address to create a subnet?
A.
B.
C.
D.
23.  Marking the records for filing is considered which step of file management?
A.
B.
C.
D.
24.  What concerns slowed the military's adoption of wireless network techniology? 
A.
B.
C.
D.
25.  What layer of the open system interconnection model do routers operate?
A.
B.
C.
D.
26.  What topology combines two or more different physical topologies in a single network?
A.
B.
C.
D.
27.  Which system is a service that broadcast via communication payloads on military satellites (Ka band) and commercial satellites (Ku Band)?
A.
B.
C.
D.
28.  This component of the Global Information Grid consists of those items that are necessary to directly connect the warfighter to the global network 
A.
B.
C.
D.
29.  What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
A.
B.
C.
D.
30.  What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
A.
B.
C.
D.
31.  What Open System Interconnect layer is closed to the end user?
A.
B.
C.
D.
32.  What do routing algorithms initialize and maintain to aid the process of path determination?
A.
B.
C.
D.
33.  Which document is not considered an official government record?
A.
B.
C.
D.
34.  Which Air Force Occupational Safety and Health (AFOSH) standard would you reference safety information on "Material Handling and Storage Equipment?"
A.
B.
C.
D.
35.  This characteristic or the Global Information Grid ensures seamless transmission of information between different services branches
A.
B.
C.
D.
36.  Which component of Theater Deployable Communications (TDC) is a suite of modules and accessory kits serving as the backbone of a deployed communication network?
A.
B.
C.
D.
37.  Who is responsible for creating unique passwords for the office of primary responsibility (OPR) records custodian?
A.
B.
C.
D.
38.  What IPv4 reserved address is used for loop back?
A.
B.
C.
D.
39.  Windows operating system traditionally function in one two network models. Which model does not operate using centralized user accounts?
A.
B.
C.
D.
40.  Which Theater Deployable Communications (TDC) equipment characteristic requires size, weight, power requirements, and equipment set-up times are kept to an absolute minimum to support the transportation, deployment, and operations in a deployed environment?
A.
B.
C.
D.
41.  Besides limiting connections to the Global Information Grid, what other Combat Information transport Systems initiative will help increase network security?
A.
B.
C.
D.
42.  Final reports of a communication security incident are due
A.
B.
C.
D.
43.  What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?
A.
B.
C.
D.
44.  What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
A.
B.
C.
D.
45.  Which condition exists when there is no apparent terrorist activity against computer network?
A.
B.
C.
D.
46.  What tool is considered a key enabler for the information technology task force and a foundation program for other transformation task forces?
A.
B.
C.
D.
47.  What is the purpose of the standardization tactical entry point terminal?
A.
B.
C.
D.
48.  The core operating-system function is the management of the computer system which resides with the
A.
B.
C.
D.
49.  Which system provides high-quality voice/data HF and Ultra-High Frequency (UHF) satellite communications to president, vice president, cabinet members, and other senior government and military officials while aboard Special Airlift Mission (SAM) aircraft?
A.
B.
C.
D.
50.  Which system provides the ability to rapidly detect and identify airborne targets with minimal or no support?
A.
B.
C.
D.
51.  Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
A.
B.
C.
D.
52.  At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?
A.
B.
C.
D.
53.  When corresponding to an e-mail, which would you not use to follow proper e-mail etiquette?
A.
B.
C.
D.
54.  What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
A.
B.
C.
D.
55.  An organized collection of data or data structures is known as a/an
A.
B.
C.
D.
56.  What system provides connectivity between the US and allied forces for critical missions and enhances worldwide readiness, mobility, responsiveness, and operations?
A.
B.
C.
D.
57.  What is a mechanism that allows a network device to divide an IP address into a network and host number?
A.
B.
C.
D.
58.  The proper way we destroy records to prevent compromise is by
A.
B.
C.
D.
59.  A comprehensive term that specifies the destruction, salvage, and donation of records, or the transfer to a staging area or records center; and the transfer of records from one organization to another is called a
A.
B.
C.
D.
60.  Which Theater Deployable Communications (TDC) equipment characteristic requires equipment modules to be expandable and packaged for deployment in standard 19-inch rack mounted transit cases, vehicle, or shelterized configurations?
A.
B.
C.
D.
61.  What topology defines the way in which devices communicate, and data is transmitted, throughout the network?
A.
B.
C.
D.
62.  Who has the authority to appoint record custodians within an office of record?
A.
B.
C.
D.
63.  Which system provides the capability to identify, sequence, and separate aircraft; provide final approach guidance, and control instructions to aircraft at deployed locations in all types of weather?
A.
B.
C.
D.
64.  One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers.  Which Operaing System is it?
A.
B.
C.
D.
65.  Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
A.
B.
C.
D.
66.  What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
A.
B.
C.
D.
67.  Which function or organization was established to operate with an Air Expeditionary Task Force (AETF)?
A.
B.
C.
D.
68.  Which center has overall authoritative source for the status, control, and defense of Air Force networks?
A.
B.
C.
D.
69.  Which enlisted training element is assigned by the supervisor in accordance with (IAW) AFI 36-2201, Classifying Military Personnel (officer and Enlisted)?
A.
B.
C.
D.
70.  Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
A.
B.
C.
D.
71.  Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?
A.
B.
C.
D.
72.  The Air Force Information  Assurance Program is detailed in 
A.
B.
C.
D.
73.  Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?
A.
B.
C.
D.
74.  What are two anti-virus programs that the Air Force uses?
A.
B.
C.
D.
75.  Which system is a USAF program supporting Global, Defense Communication System (DCS) HF Entry, Mystic Star, and System of Inter- American Telecommunications for the Air Force (SITFAA) mission?
A.
B.
C.
D.
76.  Which function or organization has a mission that varies from providing small flyaway communication packages to rapidly deploying Expeditionary Air Base (EAB) communications packages?
A.
B.
C.
D.
77.  Official guidance on individual security clearances and permitting accesss to classified information can be found in
A.
B.
C.
D.
78.  What places Air and Space Expeditionary Force (AEF) forces in a "ready to deploy" state and supports global requirements, home station requirements or support to Combatant Commanders (CCDR)?
A.
B.
C.
D.
79.  The Air Force Occupational Safety and Health (AFOSH) standard that you would reference safety information on data processing facilities is called AFOSH standard
A.
B.
C.
D.
80.  Which system provides a solution to a decrease in manpower and increase in requirements, at the same time, taking advantage of new technological developments to deliver superior connectivity, flexibility, speed, reliability, and joint interoperability?
A.
B.
C.
D.
81.  Which command and control structure has network node whose survivability is achieved using nuclear hardened equipment, redundant circuits, and alternate communications paths?
A.
B.
C.
D.
82.  What two main components make up the central processing unit?
A.
B.
C.
D.
83.  Which option refers to centralized systems which monitor and control industrial sites, or complexes of systems spread out over large areas?
A.
B.
C.
D.
84.  Which major systems employs the Joint Operation Planning and Execution System (JOPES), Global Status of Resources and Training System (GSORTS), Deliberate Crisis Action Planning and Execution Segment (DCAPES), and Common Operational Picture (COP) systems?
A.
B.
C.
D.
85.  What provides conduit for Joint WorldWide Intelligence Communication System data transmission from one location to another?
A.
B.
C.
D.
86.  What provides us with the transmission of analog or digital bits information to convey data over significant geographical distances to communicate?
A.
B.
C.
D.
87.  Which of these is an example of an Exterior Gateway Protocol?
A.
B.
C.
D.
88.  Which document authorizes the creation of the Department of Defense (DOD) as the executive component of the government and established all subordinate agencies including the Army, Navy, Air Force, and Marine Corps?
A.
B.
C.
D.
89.  Which system focuses on providing exploitable digital imagery to the warfighter in near real-time?
A.
B.
C.
D.
90.  Which Air Force Portal feature provides a secure, Web-based collaborative environment specific to a given task or topic where members of a group share information and tools to conduct business, manage a project, and/or solve group problems?
A.
B.
C.
D.
91.  In what year did the Joint Staff and Armed Services consolidated their ideas as the first drafts of joint and Armed Services doctrine circulated around the DOD?
A.
B.
C.
D.
92.  While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?
A.
B.
C.
D.
93.  What is the COMSEC program designed to do?
A.
B.
C.
D.
94.  What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?
A.
B.
C.
D.
95.  In what year did the Air Force finalized and published its information operations (IO) doctrine in August of 1998, while the Joint Staff published its doctrine?
A.
B.
C.
D.
96.  Which organization is responsible for the design, acquisition, and signle systems management of the Defense Switched Network?
A.
B.
C.
D.
97.  Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?
A.
B.
C.
D.
98.  Dynamic routing automatically calculates the best path between how many nodes?
A.
B.
C.
D.
99.  Which center is typically aligned under the base communications squadron, provides Tier 3 (local level) on-site, and implements technical and physical network changes?
A.
B.
C.
D.
100.  What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?
A.
B.
C.
D.
101.  Who bears the responsibility for maintenance or of the sustaining base portion of the Defense Information System Network?
A.
B.
C.
D.
102.  Which of the following is not the four security threats to Wireless Local Area Network?
A.
B.
C.
D.
103.  The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a
A.
B.
C.
D.
104.  Who is appointed at each base-level unit, principal staff office within an Air Force organization or contractor to perform records management?
A.
B.
C.
D.
105.  What is the difference between a hub router and a premise router?
A.
B.
C.
D.
106.  At what Open System Interconnect layer do routers operate?
A.
B.
C.
D.
107.  Which program was created in response to the FY-97-03 Defense Planning Guidance that directed a "program to migrate to a multi-intelligence, common, interoperable, open systems ground systems architecture?
A.
B.
C.
D.
108.  Discloser of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as 
A.
B.
C.
D.
109.  Which Air Force Portal feature enables authorized users to enter passwords once to gain access to all applications with no further log-in requirements?
A.
B.
C.
D.
110.  Which document is used for accountability purposes when retirement records are identified and prepared for federal records center, staging areas or to transfer records to another organization?
A.
B.
C.
D.
111.  What forwarding method is also known as runtless switching?
A.
B.
C.
D.
112.  What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?
A.
B.
C.
D.
113.  At what level do regional operation centers perform Network Operations (NETOPS) ot ensure operation and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management?
A.
B.
C.
D.
114.  Which is a common port that contains Hyper Text Transfer Protocol server and proxies?
A.
B.
C.
D.
115.  Which system can be deployed in either the Control Reporting Center or Control Reporting Element configurations?
A.
B.
C.
D.
116.  Which document serves as the basis for holding military members accountable for breeches in binding instruction and law?
A.
B.
C.
D.
117.  Offensive operations support United States cyberspace objectives by
A.
B.
C.
D.
118.  An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as
A.
B.
C.
D.
119.  What topology consists of devices connected to a common, shared cable?
A.
B.
C.
D.
120.  What is the first step in merging voice, data and video network into one integrated network within the Air Force?
A.
B.
C.
D.
121.  Which document is the basic building block used in joint force planning and deployments of Air and Space Expeditionary Forces (AEF)?
A.
B.
C.
D.
122.  Which 3D Air Force Specialty (AFS) responsibilities include the deployment, sustainment, troubleshooting, and repairing of standard radio frequency (RF) line-of -sight, wideband and ground based satellite devices?
A.
B.
C.
D.
123.  What IPv4 class address is used for networks with 250 nodes?
A.
B.
C.
D.
124.  Which function or organization has the goal to manage AF core services, within the AFNetOps community to; reduce training, maintenance costs; increase operational flexibility and capacity to the warfighter?
A.
B.
C.
D.
125.  What was the first disk operating system developed to operate on a wide range of computer systems?
A.
B.
C.
D.
126.  Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?
A.
B.
C.
D.
127.  What IPv4 class address is used for multicast addressing?
A.
B.
C.
D.
128.  At what Open System Interconnect layer do network switches and bridges operate?
A.
B.
C.
D.
129.  Who assists with the identification of qualified subject matter experts (SME) to help with the development of your specialty knowledge test (SKT) and your career development course (CDC)?
A.
B.
C.
D.
130.  Which Air Force Occupational Safety and Health (AFOSH) standard document would you reference safety information on "Communications Cable, Antenna and Communications-Electronics Systems?"
A.
B.
C.
D.
131.  The main function of the Data Service Unit is to 
A.
B.
C.
D.
132.  What reference would you use for guidance on Air Force messaging?
A.
B.
C.
D.
133.  This type of bridge is used to convert one Data Link layer protocol to another.
A.
B.
C.
D.
134.  Which organization is responsible for Air and Space Expeditionary Force (AEF) sourcing of individual augmentees, Joint Manning Document authorizations, and managing replacements for 365-day or greater requirements?
A.
B.
C.
D.
135.  How many peripherals can Universal Serial Bus handle at once?
A.
B.
C.
D.
136.  What is a type of memory that retains data after power is removed or lost?
A.
B.
C.
D.
137.  Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement?
A.
B.
C.
D.
138.  How is responsiveness provide in the Defense Switched Network?
A.
B.
C.
D.
139.  What is a formal set of rules and conventions that govern how computers exchange information over a network medium?
A.
B.
C.
D.
140.  What topology defines the layout of a network's devices and media?
A.
B.
C.
D.
141.  Which system is employed at more than 600 sites across the Global Information Grid (GIG) and interconnected through the SIPRNET?
A.
B.
C.
D.
142.  Which command and control structure is a primary network used to transmit the Emergency Action Message generated by the National Military Command Center (NMCC) to the warfighting commanders in the field?
A.
B.
C.
D.
143.  Which form would you use to properly label removable storage media containing "confidential" information?
A.
B.
C.
D.
144.  Which document would you refernce for guidance on "Web management and Internet use?"
A.
B.
C.
D.
145.  Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?
A.
B.
C.
D.
146.  Which systems basic functions operational elements are Tasking, Processing, Exploitation, and Dissemination (TPED)?
A.
B.
C.
D.
147.  Which 3D Air Force Specialty (AFS) responsibility includes local base helpdesk/client support and "hands-on" maintenance actions?
A.
B.
C.
D.
148.  Which publication type are informational publications which are "how to" documents?
A.
B.
C.
D.
149.  What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
A.
B.
C.
D.
150.  Which 3D Air Force Specialty (AFS) responsibilities include the installation, maintains and repairs of fixed and deployable air traffic, weather, ground air control, and warning radar systems?
A.
B.
C.
D.
151.  The ability to move about without being tethered by wires in wireless technology is called
A.
B.
C.
D.
152.  What  encryption device is capable of loading up to 500 keys?
A.
B.
C.
D.
153.  What directory is always identified by the slash symbol (/) and is in the "a" partition?
A.
B.
C.
D.
154.  Software is generally divided into
A.
B.
C.
D.
155.  How many devices can connect to a FireWire Bus?
A.
B.
C.
D.
156.  Using a range of 1-26 is the first octet of an IPv4 address, what class does it belong to?
A.
B.
C.
D.
157.  What notation is expressed in zero compression for IPv6?
A.
B.
C.
D.
158.  Which Occupation Risk Management (ORM) principle requests you to weigh the risks against opportunities and benefits to help maximize unit capablility?
A.
B.
C.
D.
159.  Which one is not a category of the operating system's task categories?
A.
B.
C.
D.
160.  At what Open System Interconnect layer are common data compression and encryption schemes used?
A.
B.
C.
D.
161.  Which form is used with a transfer report to accompany a COMSEC package?
A.
B.
C.
D.
162.  Which Occupational Risk Management (ORM) principle has risk assessments of mission supportive operations done as a normal way of conducting a mission and not an add-on process?
A.
B.
C.
D.
163.  The 85th Engineering and Installation Squadron (EIS) is assigned to the
A.
B.
C.
D.
164.  Which function has the primary purpose of providing standard force package descriptions of the force packages to be used to support contingency planning at all levels of command?
A.
B.
C.
D.
165.  What topology consists of cable segments from each computer connected to a centralized component?
A.
B.
C.
D.
166.  Guidance for posting information on Air Force web sites is outlined in 
A.
B.
C.
D.
167.  Analog modems are used over the voice band range of
A.
B.
C.
D.
168.  An optical communications system is comprised of a
A.
B.
C.
D.
169.  The computing part of the computer is the central processing unit,  also called the 
A.
B.
C.
D.
170.  What type of Defense Switched Network  precedence call cannot be preempted?
A.
B.
C.
D.
171.  What is the main goal of the Utilization and Training Workshop (U&TW)?
A.
B.
C.
D.
172.  The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?
A.
B.
C.
D.
173.  An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as 
A.
B.
C.
D.
174.  Which Air Force Portal feature is considered a major benefit of the Air Force Portal?
A.
B.
C.
D.
175.  Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Resonsibility or a person sitting in a fixed location thousands of miles from combat?
A.
B.
C.
D.
176.  Which system of interconnected computer networks is used by the United States Department of Defense and the United States Department of State?
A.
B.
C.
D.
177.  What Unicast address scope is publicly accessible with the Network ID protion of the address broken up into different areas allowing for hierarchical design and allocation?
A.
B.
C.
D.
178.  What is the default classful subnet mask on class B networks?
A.
B.
C.
D.
179.  What function provides the Department of Defense (DOD) with the capability to reach hundreds of thousands of people via Personal Computer (PC), Personal Digital Assistants (PDA's), land and cell phones, pagers, Blackberry devices, and/or giant voice systems in real-time?
A.
B.
C.
D.
180.  What document is used as the basis for drafting and enforcing all federal laws governing the United States?
A.
B.
C.
D.
181.  Which system is a radar tracker and correlator software program that is hosted on a powerful server based computer system, which takes inputs from long and short range radars and displays it all on a scope (computer monitor)?
A.
B.
C.
D.
182.  Applications are software programs designed to perform what type of tasks?
A.
B.
C.
D.
183.  Records that are considered to be in final format have which characteristic?
A.
B.
C.
D.
184.  The classification of a fill device is 
A.
B.
C.
D.
185.  Which 3D Air Force Specialty (AFS) responsibilities include the installation and maintenance for large scale network wiring in support of fixed and deployed operations?
A.
B.
C.
D.
186.  What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?
A.
B.
C.
D.
187.  Which pathnames begin at the current working directory?
A.
B.
C.
D.
188.  Which form is used as a visitor register long to record visitors into restricted areas?
A.
B.
C.
D.
189.  What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
A.
B.
C.
D.
190.  What Transmission Control Protocol/ Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
A.
B.
C.
D.
191.  What is the name of the standard all-purpose shell most commonly used?
A.
B.
C.
D.
192.  What tool provides essential online resources for the Air Force and its users at a single location?
A.
B.
C.
D.
193.  Which security program is covered under AFI 10-701?
A.
B.
C.
D.
194.  Defense Support of Civil Authorities (DSCA), Humanitarian Relief Operations (HUMRO), Non-Combatant Evacuation Operations (NEO) and support to International Law Enforcement are all examples of
A.
B.
C.
D.
195.  AFPD-10-4, Operations Planning: Air and Space Expeditionary Force (AEF) aligns what requirements with a matching force generation model?
A.
B.
C.
D.
196.  As of September 2004, how many total flight hours have coalition unmanned aircrafts flown to support Operation ENDURING FREEDOM and Operation IRAQI FREEDOM?
A.
B.
C.
D.
197.  What title is normally assigned to the on-station ranking 3D Cyberspace non-commissioned officer (NCO)?
A.
B.
C.
D.
198.  Which function is a state-of-the-art ground-to-ground communications infrastructure designed to exchange secure and non-secure voice, data, and video communications by way of line-of-sight (LOS), satellite, or hard-wired resources?
A.
B.
C.