3dx5x Cyber Support Journeyman Volume 2. Information Technology Concepts

126 Questions  I  By Beto612
Volume 2. Information Technology Concepts

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  (201) What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?
A.
B.
C.
D.
2.  (201) The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?
A.
B.
C.
D.
3.  (201) At what Open System Interconnect layer do network switches and bridges operate?
A.
B.
C.
D.
4.  (201) At what Open System Interconnect layer do routers operate?
A.
B.
C.
D.
5.  (201) At what Open System Interconnect layer are common data compression and encryption schemes used?
A.
B.
C.
D.
6.  (201) What Open System Interconnect layer is closest to the end user?
A.
B.
C.
D.
7.  (201) What is a formal set of rules and conventions that govern how computers exchange information over a network medium?
A.
B.
C.
D.
8.  (202) What topology defines the layout of a network’s devices and media?
A.
B.
C.
D.
9.  (202) What topology defines the way in which devices communicate, and data is transmitted, throughout the network?
A.
B.
C.
D.
10.  (202) What topology consists of devices connected to a common, shared cable?
A.
B.
C.
D.
11.  (202) What topology consists of cable segments from each computer connected to a centralized component?
A.
B.
C.
D.
12.  (202) What topology combines two or more different physical topologies in a single network?
A.
B.
C.
D.
13.  (202) What topology combines two or more different physical topologies in a single network?
A.
B.
C.
D.
14.  (203) Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?
A.
B.
C.
D.
15.  (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?
A.
B.
C.
D.
16.  (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?
A.
B.
C.
D.
17.  (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?
A.
B.
C.
D.
18.  (203) What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?
A.
B.
C.
D.
19.  (203) What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?
A.
B.
C.
D.
20.  (204) What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?
A.
B.
C.
D.
21.  (204) What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?
A.
B.
C.
D.
22.  (204) Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?
A.
B.
C.
D.
23.  (205) How many bits are in an IPv4 address?
A.
B.
C.
D.
24.  (205) Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?
A.
B.
C.
D.
25.  (205) Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?
A.
B.
C.
D.
26.  (205) What IPv4 class address is used for networks with about 250 nodes?
A.
B.
C.
D.
27.  (205) What IPv4 class address is used for multicast addressing?
A.
B.
C.
D.
28.  (205) What IPv4 reserved address is used for loop back?
A.
B.
C.
D.
29.  (205) What is a mechanism that allows a network device to divide an IP address into a network and host number?
A.
B.
C.
D.
30.  (205) What is the default classful subnet mask on class B networks?
A.
B.
C.
D.
31.  (205) What method borrows bits from the host field of an IP address to create a subnet?
A.
B.
C.
D.
32.  (206) Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?
A.
B.
C.
D.
33.  (206) What notation is expressed in leading zero compression for IPv6?
A.
B.
C.
D.
34.  (206) What notation is expressed in zero compression for IPv6?
A.
B.
C.
D.
35.  (206) What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?
A.
B.
C.
D.
36.  (206) What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?
A.
B.
C.
D.
37.  (206) What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?
A.
B.
C.
D.
38.  (207) The computing part of the computer is the central processing unit, also called the
A.
B.
C.
D.
39.  (207) What two main components make up the central processing unit?
A.
B.
C.
D.
40.  (207) What is the type of memory that retains data after power is removed or lost?
A.
B.
C.
D.
41.  (207) Which landline transmission medium is the primary carrier of voice communications?
A.
B.
C.
D.
42.  (207) An optical communications system is comprised of a
A.
B.
C.
D.
43.  (207) Which of the following is not one of the three advantages to using wireless technology?
A.
B.
C.
D.
44.  (207) The ability to move about without being tethered by wires in wireless technology is called
A.
B.
C.
D.
45.  (207) Which of the following is not one the four security threats to Wireless Local Area Network?
A.
B.
C.
D.
46.  (207) Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
A.
B.
C.
D.
47.  (207) What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today’s wireless networks?
A.
B.
C.
D.
48.  (208) How many peripherals can a Universal Serial Bus handle at once?
A.
B.
C.
D.
49.  (208) How many devices can connect to a FireWire bus?
A.
B.
C.
D.
50.  (209) What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
A.
B.
C.
D.
51.  (210) What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?
A.
B.
C.
D.
52.  (210) What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?
A.
B.
C.
D.
53.  (210) This type of bridge is used to convert one Data Link layer protocol to another.
A.
B.
C.
D.
54.  (211) What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?
A.
B.
C.
D.
55.  (211) What forwarding method is also known as runtless switching?
A.
B.
C.
D.
1 comment
56.  (212) What layer of the open system interconnection model do routers operate?
A.
B.
C.
D.
57.  (212) What do routing algorithms initialize and maintain to aid the process of path determination?
A.
B.
C.
D.
58.  (212) Which of these is an example of an Exterior Gateway Protocol?
A.
B.
C.
D.
59.  (212) Dynamic routing automatically calculates the best path between how many nodes?
A.
B.
C.
D.
60.  (213) What encryption device may you rarely see due to its lower maximum data rate?
A.
B.
C.
D.
61.  (213) What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?
A.
B.
C.
D.
62.  (213) What encryption device is capable of loading up to 500 keys?
A.
B.
C.
D.
63.  (213) The classification of a fill device is
A.
B.
C.
D.
64.  (214) A modem is a device that modulates
A.
B.
C.
D.
65.  (214) Analog modems are used over the voice band range of
A.
B.
C.
D.
66.  (214) The main function of the Data Service Unit is to
A.
B.
C.
D.
67.  (215) Software is generally divided into
A.
B.
C.
D.
68.  (215) Which one is not a category of the operating system’s task categories?
A.
B.
C.
D.
69.  (215) The path between the operating system and virtually all hardware not on the computer’s motherboard goes through a special program called a
A.
B.
C.
D.
70.  (215) The core operating-system function is the management of the computer system which resides with the
A.
B.
C.
D.
71.  (215) Applications are software programs designed to perform what type of tasks?
A.
B.
C.
D.
72.  (215) What are two anti-virus programs that the Air Force uses?
A.
B.
C.
D.
73.  (216) Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts?
A.
B.
C.
D.
74.  (216) Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?
A.
B.
C.
D.
75.  (216) One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it?
A.
B.
C.
D.
76.  (217) What was the first disk operating system developed to operate on a wide range of computer systems?
A.
B.
C.
D.
77.  (217) What is the name of the standard all-purpose shell most commonly used?
A.
B.
C.
D.
78.  (217) What directory is always identified by the slash symbol (/) and is in the “a” partition?
A.
B.
C.
D.
79.  (217) Which pathnames begin at the current working directory?
A.
B.
C.
D.
80.  (218) This component of the Global Information Grid consists of those items that are necessary to directly connect the warfighter to the global network
A.
B.
C.
D.
81.  (218) This characteristic of the Global Information Grid ensures seamless transmission of information between different service branches
A.
B.
C.
D.
82.  (219) Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?
A.
B.
C.
D.
83.  (219) Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?
A.
B.
C.
D.
84.  (219) Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat?
A.
B.
C.
D.
85.  (220) What is the difference between a hub router and a premise router?
A.
B.
C.
D.
86.  (221) How are non-internet protocols sent across the Secret Internet Protocol Router Network?
A.
B.
C.
D.
87.  (221) Which is an internet protocol encryption device that can be directly connected to Red local area networks?
A.
B.
C.
D.
88.  (222) What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another?
A.
B.
C.
D.
89.  (223) What concerns slowed the military’s adoption of wireless network technology?
A.
B.
C.
D.
90.  (223) What is the first step in merging voice, data and video networks into one integrated network within the Air Force?
A.
B.
C.
D.
91.  (223) Besides limiting connections to the Global Information Grid, what other Combat Information Transport Systems initiative will help increase network security?
A.
B.
C.
D.
92.  (224) Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network?
A.
B.
C.
D.
93.  (224) How is responsiveness provided in the Defense Switched Network?
A.
B.
C.
D.
94.  (224) What type of Defense Switched Network precedence call cannot be preempted?
A.
B.
C.
D.
95.  (225) What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?
A.
B.
C.
D.
96.  (225) While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?
A.
B.
C.
D.
97.  (226) What is the purpose of the standardized tactical entry point terminal?
A.
B.
C.
D.
98.  (227) The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code?
A.
B.