3d052 Vol 1: The Ultimate Cyber Systems Operation Quiz

100 Questions | Attempts: 662
Share
SettingsSettings
Please wait...
  • 1/100 Questions

    Knowledge-based identification and authentication methods require the user to providesomething you

    • Know.
    • Have.
    • Need.
    • Read.
Please wait...
About This Quiz

In the Air force, the enlisted officers, airmen, and health care professionals enjoy great opportunities. Do you want to enter into the Air force? If yes, hows your knowledge about cyber systems operations? Check out our online quiz to test your knowledge and learn more.

Air Force Quizzes & Trivia

Quiz Preview

  • 2. 

    What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?

    • Internetwork.

    • Intranetwork.

    • Homogeneous network.

    • Heterogeneous network.

    Correct Answer
    A. Heterogeneous network.
  • 3. 

    What are three primary ways to authenticate one-self?

    • Finger and voiceprints, or retinal scans.

    • Passwords, finger prints, or identification cards.

    • Passwords, fortezza cards, or identification cards.

    • Something you know, something you have, or something are.

    Correct Answer
    A. Something you know, something you have, or something are.
  • 4. 

    What is the preferred method of sanitizing magnetic media?

    • Degaussing.

    • Overwriting.

    • Formatting.

    • Deleting.

    Correct Answer
    A. Degaussing.
  • 5. 

    What is the primary unclassified public key infrastructure (PKI) token for individual PKIkeys and certificates in the Air Force?

    • Hardware token.

    • Software token.

    • Common access card.

    • Identification (ID) key.

    Correct Answer
    A. Common access card.
  • 6. 

    What is the minimum number of computers needed for a computer network?

    • 1.

    • 2.

    • 5.

    • 10.

    Correct Answer
    A. 2.
  • 7. 

    What type of network is made up of components from the same vendor or compatibleequipment that all run under the same operating system or network operating system?

    • Internetwork.

    • Intranetwork.

    • Homogeneous network.

    • Heterogeneous network.

    Correct Answer
    A. Homogeneous network.
  • 8. 

    What type of communications network links different interconnected networks over anunlimited geographical region?

    • Global area network (GAN).

    • Local area network (LAN).

    • Metropolitan area network. (MAN).

    • Wide area network. (WAN).

    Correct Answer
    A. Global area network (GAN).
  • 9. 

    What network management area is concerned with controlling access points to information?

    • Configuration.

    • Performance.

    • Accounting.

    • Security.

    Correct Answer
    A. Security.
  • 10. 

    What color on the systems management automated report tracking system (SMARTS)alarm log indicates one or more events?

    • Blue.

    • Orange.

    • Purple.

    • Yellow.

    Correct Answer
    A. Purple.
  • 11. 

    A base web-server that interfaces with the public must be placed in what area of a basenetwork?

    • At the core.

    • None are allowed

    • Outside the base network.

    • De-militarized zone (DMZ).

    Correct Answer
    A. De-militarized zone (DMZ).
  • 12. 

    Which component of the public key infrastructure (PKI) is responsible for establishing,authenticating, maintaining, and revoking certificates?

    • Certificate policy manager.

    • Registration authority.

    • Certificate authority.

    • Certificate repository.

    Correct Answer
    A. Certificate authority.
  • 13. 

    What is used to identify network nodes on a physically connected network?

    • Media access control address.

    • Network server name.

    • Subnet mask address.

    • Node serial number.

    Correct Answer
    A. Media access control address.
  • 14. 

    What network device performs rigorous examinations of systems to identify weaknessesthat might allow security violations?

    • Network management software.

    • Intrusion detection devices.

    • Vulnerability scanners.

    • Firewalls.

    Correct Answer
    A. Vulnerability scanners.
  • 15. 

    Sustained communications support becomes a part of the deployment if it exceeds

    • 15 days.

    • 30 days.

    • 45 days.

    • 90 days.

    Correct Answer
    A. 30 days.
  • 16. 

    What is a communications network that serves users within a confined geographical area?

    • Global area network (GAN).

    • Local area network (LAN).

    • Metropolitan area network. (MAN).

    • Wide area network. (WAN).

    Correct Answer
    A. Local area network (LAN).
  • 17. 

    What network architecture has a network management platform on one computer system ata location that is responsible for all network management duties?

    • Centralized.

    • Distributed.

    • Hierarchical.

    • Hybrid.

    Correct Answer
    A. Centralized.
  • 18. 

    What is the process of physically damaging the media to render it unusable in a computerand render the data on the media irretrievable by any known exploitation methods?

    • Destroying.

    • Degaussing.

    • Sanitizing.

    • Overwriting.

    Correct Answer
    A. Destroying.
  • 19. 

    What is the process of erasing magnetic media by reducing the magnetic flux to virtual zeroby applying a reverse magnetizing field?

    • Degausser.

    • Degaussing.

    • Destroying.

    • Sanitizing.

    Correct Answer
    A. Degaussing.
  • 20. 

    What is a collection of computing environments connected by one or more internalnetworks under the control of a single approval authority and security policy?

    • Enclave.

    • Bastion.

    • Circuits.

    • Base.

    Correct Answer
    A. Enclave.
  • 21. 

    An information system on your network that is not set to require the use of a commonaccess card (CAC) or password would be considered a

    • Threat.

    • Vulnerability.

    • Compromise.

    • Risk.

    Correct Answer
    A. Vulnerability.
  • 22. 

    How many users are normally in a peer-to-peer network?

    • 2-10.

    • 10-50.

    • 50-250.

    • 250-1,000.

    Correct Answer
    A. 2-10.
  • 23. 

    How many users are in a multi-server high-speed backbone network?

    • 2-10.

    • 10-50.

    • 50-250.

    • 250-1,000.

    Correct Answer
    A. 250-1,000.
  • 24. 

    What series of Air Force instruction series covers communications and information?

    • 10

    • 29

    • 30

    • 33

    Correct Answer
    A. 33
  • 25. 

    Which standard form is used to annotate storage media has been sanitized?

    • 700.

    • 701.

    • 711.

    • 712.

    Correct Answer
    A. 711.
  • 26. 

    What documentation is required to permanently connect to the global information grid(GIG) system?

    • Denial of authorization to operation (DATO).

    • Interim authorization to operate (IATO).

    • Authorization to operate (ATO).

    • Interim authorization to test (IATT).

    Correct Answer
    A. Authorization to operate (ATO).
  • 27. 

    According to the Air Force network structure, what tier is the Air Force network operationscenter (AFNOSC)?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 1
  • 28. 

    What operational simple network management protocol (SNMP) message is an unsolicitedmessage from an agent to the manager?

    • Get.

    • Set.

    • Trap.

    • GetNext.

    Correct Answer
    A. Trap.
  • 29. 

    The Air Force requires a network password to be at least how many characters long?

    • 6

    • 7

    • 8

    • 9

    Correct Answer
    A. 9
  • 30. 

    What documentation signifies that a system is not allowed to connect to the globalinformation grid (GIG)?

    • Denial of authorization to operation (DATO).

    • Interim authorization to operate (IATO).

    • Authorization to operate (ATO).

    • Interim authorization to test (IATT).

    Correct Answer
    A. Denial of authorization to operation (DATO).
  • 31. 

    What do you call a current and perceived capability, intention, or attack, directed to causedenial of service?

    • Vulnerability.

    • Threat.

    • Compromise.

    • Tunneling.

    Correct Answer
    A. Threat.
  • 32. 

    What is a cryptographic key and certificate delivery system that makes possible secureelectronic transactions and exchanges of sensitive information between relative strangers?

    • Public key cryptography.

    • Public key infrastructure (PKI).

    • Key distribution center.

    • Asymmetric key infrastructure.

    Correct Answer
    A. Public key infrastructure (PKI).
  • 33. 

    Which public key algorithm is exclusively a key establishment protocol?

    • Rivest-Shamir-Adleman (RSA).

    • Diffie and Hellman.

    • Elliptic curve digital signature algorithm (ECDSA).

    • Elliptic curve Diffie-Hellman (ECDH).

    Correct Answer
    A. Diffie and Hellman.
  • 34. 

    What is a privately-owned network whose access is restricted to authorized personnel iscalled?

    • Homogeneous network.

    • Internetwork.

    • Intranetwork.

    • Local area network (LAN).

    Correct Answer
    A. Intranetwork.
  • 35. 

    What operational simple network management protocol (SNMP) message is used to modifythe value of one or more instances of management information?

    • Get.

    • Set.

    • Trap.

    • GetNext.

    Correct Answer
    A. Set.
  • 36. 

    What is a measure used to verify the eligibility of a subject and the ability of the subject toaccess certain information?

    • Authentication.

    • Recertification.

    • Accreditation.

    • Identification.

    Correct Answer
    A. Authentication.
  • 37. 

    What is the intrusion practice of encapsulating a message that would be rejected by thefirewall inside a second message that will pass through the firewall?

    • Tunneling.

    • Identification spoofing.

    • Application-based attacks.

    • Second message encryption.

    Correct Answer
    A. Tunneling.
  • 38. 

    What type of communications network links geographically dispersed offices in other citiesor around the globe?

    • Local area network (LAN).

    • Metropolitan area network (MAN).

    • Multi-server high-speed backbone network.

    • Enterprise network.

    Correct Answer
    A. Enterprise network.
  • 39. 

    What is the binary equivalent to the dotted decimal number 96?

    • 01100000.

    • 01100110.

    • 00001100.

    • 10000001.

    Correct Answer
    A. 01100000.
  • 40. 

    Which agency must approve all information protection tools prior to their use?

    • Defense Information System Agency (DISA).

    • Air Force Communication Agency (AFCA).

    • Air Force computer emergency response team (AFCERT).

    • Headquarters United States Air Force (HQ USAF).

    Correct Answer
    A. Headquarters United States Air Force (HQ USAF).
  • 41. 

    What are examples of network attacks that bypass the firewall?

    • Identification spoofing and tunneling.

    • Tunneling and application-based attacks.

    • Second message encryption and identification spoofing.

    • Application-based attacks and second message encryption.

    Correct Answer
    A. Tunneling and application-based attacks.
  • 42. 

    What is an electronic document that officially links together a user’s identity with his publickey?

    • Token.

    • Public key.

    • Private key.

    • Public key infrastructure (PKI) certificate.

    Correct Answer
    A. Public key infrastructure (PKI) certificate.
  • 43. 

    Who provides uninterrupted flow of mission critical information to field and in-garrisonunits for the duration of a contingency?

    • Open system standards teams.

    • Combat integrated system teams.

    • Initial communications support teams.

    • Sustained communications support teams.

    Correct Answer
    A. Sustained communications support teams.
  • 44. 

    What are the three types of systems management automated report tracking system(SMARTS) notifications?

    • Compound events, alarm, and trend.

    • Compound events, problems, and network.

    • Auto-discovery, compound, and symptomatic events.

    • Compound events, problems, and symptomatic events.

    Correct Answer
    A. Compound events, problems, and symptomatic events.
  • 45. 

    What type of firewall consists of a screening router and a set of rules that accept or reject amessage based on information in the message’s header (a packet): the source address, thedestination address, and the port?

    • Proxy.

    • Bastion host.

    • Packet filtering.

    • Intrusion detection.

    Correct Answer
    A. Packet filtering.
  • 46. 

    What type of communications network links a broad geographical region?

    • Global area network (GAN).

    • Local area network (LAN).

    • Metropolitan area network. (MAN).

    • Wide area network. (WAN).

    Correct Answer
    A. Wide area network. (WAN).
  • 47. 

    How many users are in a multi-server network?

    • 2-10.

    • 10-50.

    • 50-250.

    • 250-1,000.

    Correct Answer
    A. 50-250.
  • 48. 

    What is the network id of internet protocol (IP) address 131.10.230.120/24?

    • 0.0.0.120.

    • 0.10.230.0.

    • 131.10.230.0.

    • 255.255.255.0.

    Correct Answer
    A. 131.10.230.0.
  • 49. 

    Which function of performance management tracks historical data by tracking activities onthe network?

    • Tuning.

    • Analyzing.

    • Gathering.

    • Monitoring.

    Correct Answer
    A. Monitoring.

Quiz Review Timeline (Updated): Jun 3, 2021 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 03, 2021
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 07, 2016
    Quiz Created by
    Dinstaar2a6x2
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.