3D053 Vol's 1,2, And 3

202 Questions | Total Attempts: 160

SettingsSettingsSettings
Please wait...
3D053 Vol

All three volumes. Enjoy!


Questions and Answers
  • 1. 
    The Cyber T hec The Cyber Surety journeyman monitors all of the following programs except
    • A. 

      Emission security (EMSEC)

    • B. 

      Information security (INFOSEC)

    • C. 

      Computer security (COMPUSEC)

    • D. 

      Communications security (COMSEC)

  • 2. 
    What is the fourth step in the operational risk management (ORM) process?
    • A. 

      Supervise and review

    • B. 

      Develop and apply implementation strategies.

    • C. 

      Make decisions based on overall cost versus benefit.

    • D. 

      Analyze control and implement strategies to reduce or eliminate risk.

  • 3. 
    What minimum milli-ampere current can be lethal?
    • A. 

      100

    • B. 

      75

    • C. 

      50

    • D. 

      25

  • 4. 
    Which type of network typically provides wireless broadband data services?
    • A. 

      Wireless metropolitan area network (WMAN)

    • B. 

      Wireless wide area network (WWAN)

    • C. 

      Wireless local area network (WLAN)

    • D. 

      Global network

  • 5. 
    To use VPN products, obtain interim approval from?
    • A. 

      AFNIC Network Infrastructure Flight (ECN)

    • B. 

      AFNIC Architecture and Analysis Flight (EAC)

    • C. 

      Air Force Virtual Privet Network (AF VPN)

    • D. 

      Services and Integration Division (SAF/XC)

  • 6. 
    Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
    • A. 

      WiFi

    • B. 

      Coaxial

    • C. 

      Fiber Optic

    • D. 

      Twisted pair

  • 7. 
    In which network does every device have exactly two neighbors?
    • A. 

      Ring

    • B. 

      Tree

    • C. 

      Star

    • D. 

      Bus

  • 8. 
    Which network integrates multiple topologies?
    • A. 

      Bus

    • B. 

      Star

    • C. 

      Tree

    • D. 

      Ring

  • 9. 
    Which class of internet protocols addresses in used for very large networks?
    • A. 

      A

    • B. 

      B

    • C. 

      C

    • D. 

      D

  • 10. 
    Which protocol has the job of verifiying the correct delivery of data from client to server?
    • A. 

      Dynamic host configuration protocol (DHCP)

    • B. 

      Transmission control protocol (TCP)

    • C. 

      Hypertext transfer protocol (HTTP)

    • D. 

      Internet protocol (IP)

  • 11. 
    Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a TCP/IP-base network?
    • A. 

      Internet Protocol (IP)

    • B. 

      Hypertext transfer protocol (HTTP)

    • C. 

      Transmission control protocol (TCP)

    • D. 

      Dynamic host configuration protocol (DHCP)

  • 12. 
    As the migration to internet protocol (IP)  V6 continues, many organizations rely upon what to compensate for the lack of usable IP addresses?
    • A. 

      Prefixing

    • B. 

      Subnetting

    • C. 

      Transition Technology

    • D. 

      Classless Inter-Domain Routing

  • 13. 
    The sequences of leading bits in an internet protocol used to identify the network portion of an an IP address is called?
    • A. 

      Routing prefix

    • B. 

      Hierarchy

    • C. 

      Subnet

    • D. 

      Mask

  • 14. 
    Breaking down the packets' addresses to act as a gateway to allow traffic to pass between networks involves which transition technology?
    • A. 

      Dual stack

    • B. 

      Dual layer

    • C. 

      Tunneling

    • D. 

      Peer-to-peer

  • 15. 
    Setting up a secure point-to-point communication is called
    • A. 

      Dual stack

    • B. 

      Dual layer

    • C. 

      Tunneling

    • D. 

      Peer-to-peer

  • 16. 
    Networked resources must be consistently monitored and controlled to ensure access to the network while
    • A. 

      Keeping complete and accurate documentation for all configuration changes.

    • B. 

      Minimizing risks posed by various cyberspace threats.

    • C. 

      Creating continuity throughout the network.

    • D. 

      Installing all applicable security patches.

  • 17. 
    To make it possible for replacement administrators to accomplish the same tasks as their predecessor, administrators must be in the habit of
    • A. 

      Keeping complete and accurate documentation for all configuration changes.

    • B. 

      Minimizing risks posed by various cyberspace threats.

    • C. 

      Creating continuity throughout the network.

    • D. 

      Installing all applicable security patches.

  • 18. 
    When coupled with standardized network policy, the standard desktop configuration (SDC) substantially
    • A. 

      Reduces the number of network users with administrative privileges.

    • B. 

      Achieves near end-to-end command and control capability.

    • C. 

      Guards against the insider threat.

    • D. 

      Improves network security.

  • 19. 
    With the consolidation of the several Network Operations and Security  Centers (NOSC), the Air Force
    • A. 

      Reduce the number of network users with administrative privileges.

    • B. 

      Achieves near end-to-end command and control capability.

    • C. 

      Guard against the insider threat.

    • D. 

      Improves network security.

  • 20. 
    Which WiFi standard is the slowest yet least expensive?
    • A. 

      802.11a

    • B. 

      802.11b

    • C. 

      802.11g

    • D. 

      802.11n

  • 21. 
    Which wireless standard originally intended to create a wireless security platform that would perform as securely as a traditional wired network by providing data encryption?
    • A. 

      WiFi protected access (WPA)

    • B. 

      Wireless local area network (WLAN)

    • C. 

      Wireless wide area network (WWAN)

    • D. 

      Wired equivalency privacy (WEP)

  • 22. 
    What shall be assigned to all Department of Defense information systems that is directly associated with the importance of the information contained relative to achieving  DOD goals and objectives?
    • A. 

      Mission assurance category.

    • B. 

      Defense-in-depth code.

    • C. 

      System classification.

    • D. 

      Secure location.

  • 23. 
    Requirements for availability and integrity are associated with
    • A. 

      Information classification

    • B. 

      Mission assurance

    • C. 

      Need-to-know

    • D. 

      Sensitivity

  • 24. 
    Who is responsible for verifying proper security clearances and background investigation  checks prior  to granting a network user access to the Air Force Provisioned Portion of the Global Information Grid (AF GIG)?
    • A. 

      Information assurance officer (IAO) only

    • B. 

      IAO and security manager.

    • C. 

      Have met investigative requirements

    • D. 

      Have satisfied network access requirements.

  • 25. 
    Initial information assurance (IA) awareness training for all network users ensures all of the following except the users
    • A. 

      Are aware of their role in IA.

    • B. 

      Are trained on network security.

    • C. 

      Have met investigative requirements.

    • D. 

      Have satisfied network access requirements.

Back to Top Back to top