3D053 CDC Edit 02 Vol 1

100 Questions | Total Attempts: 708

SettingsSettingsSettings
CDC Quizzes & Trivia

These are the UREs from edit code 2 that became active after 4 April 2013


Questions and Answers
  • 1. 
    Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video network, and cryptographic client devices in fixed and deployed environments?
    • A. 

      Client Systems (3D1X1).

    • B. 

      Cyber Transport Systems (3D1X2).

    • C. 

      Radio Frequency Transmission Systems (3D1X3).

    • D. 

      Spectrum Operations (3D1X4).

  • 2. 
    What is the third step in the risk management (RM) process?
    • A. 

      Develop controls and make decisions

    • B. 

      Supervise and evaluate

    • C. 

      Implement controls

    • D. 

      Assess hazards

  • 3. 
    The fundamental goal of risk management (RM) is to enhance mission effectiveness
    • A. 

      While preserving assets and safeguarding personnel

    • B. 

      By completely eliminating risks

    • C. 

      While applying risk strategies

    • D. 

      By identifying hazards

  • 4. 
    Which type of network are nodes connected directly to the network media and do not use the telephone system to access the network?
    • A. 

      Local Area Network (LAN)

    • B. 

      Wide area network (WAN)

    • C. 

      Virtual private network (VPN)

    • D. 

      Metropolitan area network (MAN)

  • 5. 
    A base area network (BAN) is actually a
    • A. 

      Local area network (LAN)

    • B. 

      Wide area network (WAN)

    • C. 

      Virtual private network (VPN)

    • D. 

      Metropolitan area network (MAN)

  • 6. 
    Which of the following is not an example of unbound media?
    • A. 

      Fiber optic

    • B. 

      Terrestrial

    • C. 

      Radio frequency

    • D. 

      Satellite microwave

  • 7. 
    In which topology does a device wanting to communicate with another device on a network send broadcast message onto the wire that all the other devices see, but only the intended recipient actually accepts and processes the message?
    • A. 

      Bus

    • B. 

      Star

    • C. 

      Ring

    • D. 

      Tree

  • 8. 
    In which network does every device have exactly two neighbors?
    • A. 

      Bus

    • B. 

      Star

    • C. 

      Tree

    • D. 

      Ring

  • 9. 
    When viewed in binary form, how many positions does each octet have within an Internet Protocol (IP) address?
    • A. 

      4

    • B. 

      6

    • C. 

      8

    • D. 

      10

  • 10. 
    How many bits are within an internet protocol version 4 (IPv4) address?
    • A. 

      32

    • B. 

      64

    • C. 

      128

    • D. 

      256

  • 11. 
    Which class of internet protocol (IP) addresses is only used for experimental purposes?
    • A. 

      B

    • B. 

      C

    • C. 

      D

    • D. 

      E

  • 12. 
    Which internet protocol (IP) address is used for limited broadcasts?
    • A. 

      X.x.x.0

    • B. 

      X.x.x.255

    • C. 

      127.x.x.x

    • D. 

      255.255.255.255

  • 13. 
    What is used to manage traffic and constitutes borders between subnets?
    • A. 

      Router

    • B. 

      Server

    • C. 

      Switch

    • D. 

      Firewall

  • 14. 
    The sequence of leading bits in an internet protocol (IP) used to identify the network portion of an IP address is called a
    • A. 

      Routing prefix

    • B. 

      Hierarchy

    • C. 

      Subnet

    • D. 

      Mask

  • 15. 
    Which protocol has the job of verifying the correct delivery of data from client to server?
    • A. 

      Dynamic host configuration protocol (DHCP)

    • B. 

      Transmission control protocol (TCP)

    • C. 

      Hypertext transfer protocol (HTTP)

    • D. 

      Internet protocol (IP)

  • 16. 
    By default, which transmission control protocol (TCP) port is used by hypertext transfer protocol (HTTP)?
    • A. 

      50

    • B. 

      80

    • C. 

      5050

    • D. 

      8080

  • 17. 
    What is the most straightforward way for internet protocol version 6 (IPv6) to remain compatible with internet protocol version 4 (IPv4) nodes?
    • A. 

      Dual stack

    • B. 

      Tunneling

    • C. 

      Addressing

    • D. 

      Translation

  • 18. 
    Breaking down the packets' addresses to act as a gateway to allow traffic to pass between networks involves which transition technology?
    • A. 

      Tunneling

    • B. 

      Dual layer

    • C. 

      Dual stack

    • D. 

      Peer-to-peer

  • 19. 
    Which type of transition technology is used to set up secure point-to-point communication?
    • A. 

      Tunneling

    • B. 

      Dual layer

    • C. 

      Dual stack

    • D. 

      Peer-to-peer

  • 20. 
    Networked resources must be consistently monitored and controlled to ensure access to the network while
    • A. 

      Keeping complete and accurate documentation for all configuration changes

    • B. 

      Minimizing risks posed by various cyberspace threats

    • C. 

      Creating continuity throughout the network

    • D. 

      Installing all applicable security patches

  • 21. 
    With the consolidation of several Network Operations and Security Centers (I-NOSC), the Air Force
    • A. 

      Reduces the number of network users with administrative privileges

    • B. 

      Achieves near end-to-end command and control capability

    • C. 

      Guards against the insider threat

    • D. 

      Improves network security

  • 22. 
    Which WiFi standard in the slowest yet least expensive?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 23. 
    What WiFi networking standard is the newest standard that is widely available?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 24. 
    Who approves all wireless systems prior to installation and use for processing unclassified or classified information?
    • A. 

      Designated Approval Authority (DAA)

    • B. 

      Wing Information Assurance Officer (WIAO)

    • C. 

      Communications and Information Systems Officer (CSO)

    • D. 

      Air Force Network Operations Center (AFNOC) Commander

  • 25. 
    What is assigned to all Department of Defense (DOD) information systems that is directly associated with the importance of the information contained relative to achieving DOD goals and objectives?
    • A. 

      Mission assurance category

    • B. 

      Defense-in-depth code

    • C. 

      System classification

    • D. 

      Secure location

Back to Top Back to top