Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By JOHLE21
J
JOHLE21
Community Contributor
Quizzes Created: 1 | Total Attempts: 82
| Attempts: 82 | Questions: 124
Please wait...
Question 1 / 124
0 %
0/100
Score 0/100
1. What topology defines the way in which devices communicate, and data is transmitted, throughout the network?

Explanation

Logical topology defines the way in which devices communicate and data is transmitted throughout the network. It refers to the abstract representation of the network, focusing on how data flows between devices rather than the physical layout of the network. This includes concepts such as bus, ring, and mesh topologies, which determine how devices are connected and how data is transmitted between them.

Submit
Please wait...
About This Quiz
3d0x1 CDC Vol 2 - Quiz

This quiz, titled '3d0x1 CDC vol 2,' assesses knowledge of the OSI Model, focusing on layers, their functions, and the devices operating at each layer. It is crucial for understanding network structure and enhancing communication systems skills.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?

Explanation

The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a widely used protocol suite that enables communication between devices on the internet. It provides reliable and secure transmission of data, ensuring that information flows efficiently and securely within the Department of Defense network.

Submit
3. Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?

Explanation

INFOCON 2 is the correct answer because it signifies a moderate level of readiness and indicates that there is a significant risk of attack or compromise. In this condition, non-essential networks can be taken offline and replaced with alternative methods of communication in order to minimize the risk and protect critical systems. This allows for a proactive approach to security and ensures that essential communication channels remain operational in the event of a threat.

Submit
4. What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?

Explanation

The 80/20 rule is a principle that states that 80% of the data should be local to a segment, while 20% of the data should be destined to traverse a bridge to the other segment. This rule helps in determining the optimal distribution of data within a network, ensuring that a majority of the data stays within a segment for efficient and fast communication, while allowing a smaller portion to be transmitted across segments when necessary.

Submit
5. The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a

Explanation

A driver is a special program that acts as a bridge between the operating system and hardware devices that are not on the computer's motherboard. It allows the operating system to communicate with and control these external hardware devices by providing the necessary instructions and protocols. Without a driver, the operating system would not be able to interact with or utilize these hardware devices effectively.

Submit
6. When a risk of a network system attack has been identified, which condition requires all unclassified dial- up connections be disconnected?

Explanation

When a risk of a network system attack has been identified, INFOCON 3 requires all unclassified dial-up connections to be disconnected. INFOCON is a system used by the military to assess and communicate the current risk level of potential network attacks. INFOCON 3 signifies an increased risk level where there is a significant threat to the network system, and as a precautionary measure, all unclassified dial-up connections need to be disconnected to mitigate the potential risk and protect the network from further attacks.

Submit
7. What concerns slowed the military's adoption of wireless network technology?

Explanation

The military's adoption of wireless network technology was slowed by concerns regarding both security and reliability. Security is a major concern for the military as they need to ensure that their wireless networks are protected from unauthorized access and potential cyber attacks. Reliability is also crucial as the military heavily relies on communication systems for their operations, and any disruptions or failures in the wireless networks could have serious consequences. Therefore, the military had to address these concerns before fully adopting wireless network technology.

Submit
8. What was the first disk operating system developed to operate on a wide range of computer systems?

Explanation

UNIX was the first disk operating system developed to operate on a wide range of computer systems. It was designed to be portable and compatible with different hardware architectures, which allowed it to be used on various computer systems. This made UNIX a versatile and widely adopted operating system in the early days of computing.

Submit
9. What topology consists of devices connected to a common, shared cable?

Explanation

The correct answer is "Bus". In a bus topology, devices are connected to a common cable called the bus. This cable acts as a communication medium, allowing devices to transmit and receive data. Each device on the bus can access the data transmitted by other devices on the same cable. This topology is relatively simple and inexpensive to implement, but it can be prone to single point failures if the main cable is damaged or disconnected.

Submit
10. What topology consists of cable segments from each computer connected to a centralized component?

Explanation

A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this topology, all communication between computers is routed through this central component, which helps to manage and control the network traffic. This type of topology provides better performance and reliability compared to bus or ring topologies, as it allows for easier troubleshooting and isolation of network issues.

Submit
11. What topology combines two or more different physical topologies in a single network?

Explanation

A hybrid topology combines two or more different physical topologies in a single network. This means that a network using a hybrid topology can have a combination of bus, ring, star, or other topologies. This allows for more flexibility and scalability in designing the network, as different topologies can be used to suit different needs or requirements.

Submit
12. What is a formal set ofrules and conventions that govern how computers exchange information over a network medium?

Explanation

A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. It ensures that devices can communicate with each other effectively and efficiently by establishing a common language and set of procedures. A specification refers to a detailed description of how a particular system should be implemented, while a standard is a set of guidelines or criteria that define a certain level of quality or compatibility. Etiquette refers to polite behavior or customs, which is not directly related to computer network communication.

Submit
13. Using a range of 1—126 in the first octet of an lPv4 address, what class does it belong to?

Explanation

An IPv4 address is divided into different classes based on the range of the first octet. Class A addresses have a range of 1-126 in the first octet, which means that any IP address starting with a number between 1 and 126 belongs to Class A.

Submit
14. The ability to move about without being tethered by wires in wireless technology is called

Explanation

The correct answer is mobility because wireless technology allows for freedom of movement without the need for physical connections or wires. This enables users to move around and access devices or networks without being tethered to a specific location.

Submit
15. What encryption device may you rarely see due to its lower maximum data rate?

Explanation

The TSEC/KIV-7 is a encryption device that is rarely seen due to its lower maximum data rate. This suggests that the device is not commonly used because it is not capable of handling high volumes of data quickly. The other options, TSEC/KIV-19, TSEC/KG-84, and TSEC/KG-194, are not mentioned as being limited by their data rate, so they are more likely to be used in situations where higher data rates are required.

Submit
16. What topology defines the layout of a network's devices and media?

Explanation

The correct answer is physical because the physical topology refers to the actual layout of devices and media in a network. It describes how devices are physically connected to each other and to the network media, such as cables or wireless connections. This includes the arrangement of devices, the types of cables used, and the location of devices within the network. In contrast, the logical topology refers to how data flows within the network and is independent of the physical layout. The star and hybrid topologies are examples of physical topologies.

Submit
17. The classification of a fill device is

Explanation

When a fill device is loaded with a key, it becomes classified. The classification of the fill device is determined by the classification of the loaded key. This means that if a fill device is loaded with a key that is classified as SECRET, the fill device will also be classified as SECRET. The classification of the fill device remains the same until the key is unloaded. Therefore, the correct answer is that a fill device is classified as soon as a key is loaded, and it holds the classification of the loaded key.

Submit
18. What are two anti-virus programs that the Air Force uses?

Explanation

The Air Force uses Norton and McAfee as their two anti-virus programs.

Submit
19. What IPv4 reserved address is used for loop back?

Explanation

The loopback address is a reserved IPv4 address used to test network connectivity on a local machine. It allows a device to send and receive data to itself. The loopback address is represented by the IP address 127.0.0.1, which is the correct answer in this case. The other options are not loopback addresses.

Submit
20. What is a mechanism that allows a network device to divide an IP address into a network and host number?

Explanation

A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address represents the network and which part represents the host. The subnet mask is applied to the IP address using a bitwise AND operation, which effectively separates the network and host portions of the address. This allows the device to route packets correctly within the network and identify the appropriate destination for each packet.

Submit
21. What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?

Explanation

A Wide Area Network (WAN) is the correct answer because it connects networks that are typically separated by geographical distances. WANs are used to connect networks across cities, states, countries, or even globally, allowing for communication and data transfer between different locations. In contrast, a Local Area Network (LAN) connects devices within a limited area, such as a home, office, or building. A Virtual Private Network (VPN) is a secure network connection that allows remote users to access a private network over the internet. A Metropolitan Area Network (MAN) connects networks within a specific geographic area, such as a city or town.

Submit
22. What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?

Explanation

A Virtual Private Network (VPN) makes use of tunneling and security protocols to enable a group of two or more computer systems to communicate over the public Internet. VPNs create a secure and encrypted connection between the computers, allowing them to send and receive data as if they were directly connected to a private network. This ensures that the communication remains private and protected from unauthorized access or interception.

Submit
23. The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?

Explanation

The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer handles error control and flow control, ensuring reliable data transmission. The Media Access Control (MAC) sublayer is responsible for managing access to the physical media, such as Ethernet or Wi-Fi, and handles addressing and data transmission between devices on the network. These two sublayers work together to provide a reliable and efficient data link between network devices.

Submit
24. How many bits are in an IPv4 address?

Explanation

An IPv4 address is made up of 32 bits. This means that it consists of a sequence of 32 binary digits (0s and 1s). Each bit represents a binary value and together they form the unique address for a device on a network. The use of 32 bits allows for a total of 4,294,967,296 unique addresses in the IPv4 addressing system.

Submit
25. What do routing algorithms initialize and maintain to aid the process of path determination?

Explanation

Routing algorithms initialize and maintain routing tables to aid the process of path determination. Routing tables contain information about the available paths, such as the next hop and the cost associated with each path. By referencing these tables, routing algorithms can determine the best path for forwarding packets to their destination. Routing tables are continuously updated and maintained to adapt to changes in network topology and ensure efficient routing.

Submit
26. Applications are software programs designed to perform what type of tasks?

Explanation

Applications are software programs that are designed to perform specific tasks. They are created with a particular purpose in mind and are tailored to meet the needs of a specific user or group of users. Unlike general software programs, which are designed to be versatile and perform a wide range of tasks, applications are focused on providing specific functionalities and solving specific problems. Therefore, the correct answer is "specific".

Submit
27. Which of the following is not one the four security threats to Wireless Local Area Network?

Explanation

Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points, War Drivers, and Hackers are all potential security threats to WLANs. Direct Connections refers to devices that are physically connected to the network, rather than accessing it wirelessly. While direct connections can still pose security risks, they are not specifically categorized as a threat to WLANs.

Submit
28. What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?

Explanation

The TSEC/KIV-19 encryption device is certified to secure all classification levels and categories and is capable of encrypting trunk-level high-speed circuits. This device is specifically designed for high-speed encryption and is suitable for securing sensitive information across various levels and categories of classification.

Submit
29. Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?

Explanation

An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an insider, an employee has access to sensitive information and network resources, making them a potential threat if they misuse their privileges or fall victim to social engineering tactics. Whether intentionally or unintentionally, an employee can compromise the security of a network by sharing login credentials, downloading malware, or falling for phishing scams, allowing unauthorized individuals to gain access. Hence, employees need to be educated and trained on cybersecurity best practices to minimize the risk of such incidents.

Submit
30. What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?

Explanation

To change the alignment and light polarizing property of Liquid Crystal Display (LCD) material, voltage is applied across it. The application of voltage causes the liquid crystal molecules to reorient themselves, which in turn changes the alignment of the material. This change in alignment affects the polarization of light passing through the LCD, allowing for the control of the display's brightness and color.

Submit
31. The computing part of the computer is the central processing unit, also called the

Explanation

The computing part of the computer is referred to as the microprocessor. The microprocessor is responsible for executing instructions and performing calculations. It is often considered the brain of the computer, as it controls and coordinates all the activities of the computer's hardware and software components. The control unit, arithmetic logic unit, and minicomputer are not the correct answers as they do not accurately describe the computing part of the computer.

Submit
32. Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

Explanation

IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four octets, each represented by a decimal number separated by dots. This notation is easier for users to read and understand compared to binary, hexadecimal, or octal formats.

Submit
33. What lPv4 class address is used for networks with about 250 nodes?

Explanation

Class C is the correct answer because it is designated for networks with approximately 250 nodes. Class C addresses have a range of 192.0.0.0 to 223.255.255.255, allowing for up to 2^24 (16,777,216) unique addresses. This provides enough addresses to accommodate a network with around 250 nodes. Class D is used for multicast addresses, Class E is reserved for experimental purposes, and Class F is currently unassigned.

Submit
34. What LPv4 class address is used for multicast addressing?

Explanation

Class D is used for multicast addressing in IPv4. Class D addresses range from 224.0.0.0 to 239.255.255.255. Multicast addresses are used to send packets to a group of hosts rather than a single host. This allows for efficient distribution of data to multiple recipients simultaneously. Class C addresses are used for regular IP addressing, while Class E addresses are reserved for future use. Class F does not exist in IPv4.

Submit
35. What Open System Interconnect layer is closest to the end user?

Explanation

The Open System Interconnect (OSI) model consists of seven layers, with the application layer being the closest to the end user. This layer is responsible for providing services directly to user applications, such as email, web browsers, and file transfer protocols. It interacts with the user and provides a means for accessing network resources. Therefore, the correct answer is Application.

Submit
36. What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?

Explanation

Store-and-forward is the method where the entire frame is received and placed into the buffer, an error check is performed, and then the frame is sent to the proper port for delivery. This method ensures that the frame is error-free before forwarding it, making it a reliable method for data transmission. Cross-over, fragment-free, and adaptive are not relevant to this process.

Submit
37. Which landline transmission medium is the primary carrier of voice communications?

Explanation

Twisted pair cable is the primary carrier of voice communications because it is a widely used and cost-effective transmission medium. It consists of two insulated copper wires twisted together, which helps to reduce electromagnetic interference. Twisted pair cable is capable of transmitting voice signals effectively over short to medium distances, making it suitable for landline telephone systems. Fiber optic cable, coaxial cable, and twinax cable are also used for transmission, but they are more commonly used for data and video communication rather than voice communication.

Submit
38. Which of the following is not one of the three advantages to using wireless technology?

Explanation

Wireless technology offers several advantages, including ease of installation, lower cost, and mobility. However, safety is not one of these advantages. While wireless technology provides convenience and flexibility, it may also pose security risks such as unauthorized access, data breaches, and interference. Therefore, safety is not considered an advantage of using wireless technology.

Submit
39. What directory is always identified by the slash symbol (I) and is in the "a" partition?

Explanation

The directory that is always identified by the slash symbol and is in the "a" partition is the root directory. The root directory is the top-level directory in a file system hierarchy and serves as the starting point for navigating the file system. It contains all other directories and files in the file system.

Submit
40. Dynamic routing automatically calculates the best path between how many nodes?

Explanation

Dynamic routing automatically calculates the best path between two nodes.

Submit
41. An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a

Explanation

An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as an incident. This term implies that there has been a specific event or situation that has occurred, but it has not yet been fully investigated or evaluated to determine the extent of the security risk. The term "insecurity" does not accurately convey the idea of a specific occurrence, while "deviation" and "report" do not capture the potential security implications of the situation.

Submit
42. What notation is expressed in zero compression for lPv6?

Explanation

The correct answer is 10AB::3:0:1234:5678.

This notation represents the zero compression in IPv6. The "::" indicates that a series of consecutive zeros have been compressed. In this case, the zeros between "3" and "1234" have been compressed. This notation helps to shorten the IPv6 address and make it more readable.

Submit
43. The main function of the Data Service Unit is to

Explanation

The correct answer is to adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment. The Data Service Unit acts as an interface between the customer's equipment and the telephone carrier's equipment. It ensures that the digital data stream from the customer's equipment is converted and formatted to meet the signaling standards and protocols used by the telephone carrier. This allows for seamless communication and compatibility between the two systems.

Submit
44. The core operating-system function is the management of the computer system which resides with the

Explanation

The kernel is the core operating system function that manages the computer system. It is responsible for managing the system's resources, such as memory, processes, and hardware devices. The kernel acts as a bridge between the hardware and software, allowing programs to communicate with the hardware and perform various tasks. It is the central component of the operating system and plays a crucial role in ensuring the system's stability, security, and overall performance.

Submit
45. What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known 1 P address for a destination device to a Media Access Control address?

Explanation

The correct answer is Address Resolution Protocol. The Address Resolution Protocol (ARP) is a network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve IP addresses to MAC addresses in order to facilitate communication between devices on a local network.

Submit
46. What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?

Explanation

The Reverse Address Resolution Protocol (RARP) is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request its corresponding IP address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.

Submit
47. What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?

Explanation

The correct answer is Internet Control Message Protocol. ICMP is a network layer protocol that provides messaging services for troubleshooting and diagnostic purposes. It allows network devices to send error messages and operational information to indicate any issues or errors encountered during communication. ICMP messages can help in troubleshooting network connectivity, identifying network congestion, and diagnosing network problems. It is commonly used by network administrators and diagnostic tools to monitor and troubleshoot network issues.

Submit
48. An optical communications system is comprised of a

Explanation

An optical communications system requires a transmitter to convert electrical signals into optical signals, a cable to transmit the optical signals, and a receiver to convert the optical signals back into electrical signals. This ensures that the information can be transmitted effectively and accurately from one point to another. A logic analyzer or protocol analyzer is not necessary for the basic functioning of an optical communications system.

Submit
49. What form is used as a cover sheet to protect Privacy Act material?

Explanation

AF Form 3227 is used as a cover sheet to protect Privacy Act material.

Submit
50. What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?

Explanation

Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. They are used for communication within a specific site or organization and are not meant to be globally unique or routable on the internet. Site-local addresses were deprecated in 2004 by RFC 4193, which introduced Unique Local Addresses (ULA) as a replacement.

Submit
51. What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?

Explanation

The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards include IEEE 802.11 (Wi-Fi), IEEE 802.15 (Bluetooth), and IEEE 802.16 (WiMAX), among others. The IEEE is a professional association that focuses on advancing technology in various fields, including wireless communication. Their standards ensure interoperability and compatibility among different wireless devices and networks, enabling seamless communication and providing a foundation for innovation in wireless technology.

Submit
52. What forwarding method is also known as runtless switching?

Explanation

Fragment-free forwarding method, also known as runtless switching, is a type of forwarding method used in networking. It is called runtless switching because it specifically focuses on preventing the forwarding of runt frames, which are frames that are too short to contain complete information. In fragment-free forwarding, the switch waits for a brief period of time to ensure that the first 64 bytes of a frame have been received before forwarding it. This helps to minimize the chances of forwarding incomplete or corrupted frames, improving network efficiency and reducing errors.

Submit
53. What is the name of the standard all-purpose shell most commonly used?

Explanation

The correct answer is Bourne shell. The Bourne shell is the standard all-purpose shell that is commonly used in Unix-like operating systems. It was developed by Stephen Bourne and is known for its simplicity and efficiency. It provides a command-line interface for users to interact with the operating system and execute commands. The Bourne shell is often used as the default shell for many Unix-based systems and has influenced the development of other shells such as the Korn shell and C shell.

Submit
54. Which of these is an example of an Exterior Gateway Protocol?

Explanation

Border Gateway Protocol (BGP) is an example of an Exterior Gateway Protocol (EGP). BGP is used to exchange routing information between different autonomous systems (AS) on the internet. It is specifically designed to handle the routing between different networks and is widely used by internet service providers (ISPs) to establish connections and exchange routing information. BGP is a complex and robust protocol that allows for efficient and scalable routing on the internet. Open Shortest Path First (OSPF), Routing Information Protocol (RIP), and Enhanced Gateway Routing Protocol (EGRP) are examples of Interior Gateway Protocols (IGP), which are used within a single autonomous system.

Submit
55. What method bonows bits from the host field of an IP address to create a subnet?

Explanation

Classless Inter-Domain Routing (CIDR) is the method that borrows bits from the host field of an IP address to create a subnet. CIDR allows for more flexible and efficient allocation of IP addresses by allowing variable length subnet masks (VLSM). This means that the subnet mask can be adjusted to accommodate different network sizes, rather than being limited to the fixed network sizes of classful subnet masking.

Submit
56. Instead of using binary, how are lPv6 addresses expressed to be more user-friendly?

Explanation

not-available-via-ai

Submit
57. At what level do regional operation centers perform Network Operations (NETOPS) to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management?

Explanation

Regional operation centers perform Network Operations (NETOPS) at Tier 2 level to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management.

Submit
58. What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?

Explanation

The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data and the physical characteristics of the network, such as cables, connectors, and signaling.

Submit
59. What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

Explanation

A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of incoming data packets and forwarding them only to the appropriate segment. This helps to reduce network congestion and improve overall network performance. Bridges are commonly used in local area networks (LANs) to connect different segments and improve network efficiency.

Submit
60. What is the COMSEC program designed to do?

Explanation

The COMSEC program is designed to detect and correct procedural weaknesses that could expose critical information. This means that the program focuses on identifying and addressing any flaws or vulnerabilities in procedures that could potentially lead to the compromise of sensitive and important information. By doing so, the program aims to strengthen the overall security and protection of critical data and ensure that it is not exposed to unauthorized access or interception.

Submit
61. What notation is expressed in leading zero compression for lPv6?

Explanation

The correct answer is an IPv6 address expressed in leading zero compression notation. This notation allows consecutive blocks of zeros to be represented as "::". In the given answer, the blocks "0:0" and "0:0" are compressed using "::", resulting in 1234:1234::1234:0:0:1234.

Submit
62. Analog modems are used over the voice band range of

Explanation

Analog modems are used over the voice band range of 20 Hz to 20 kHz. This range is suitable for transmitting and receiving audio signals, which are converted into analog signals by the modem. The voice band range includes frequencies that are audible to the human ear, allowing for clear and understandable communication. Frequencies outside of this range are typically not used for voice communication and may be reserved for other purposes such as data transmission or higher frequency signals.

Submit
63. Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?

Explanation

Enterprise Edition provides support for features such as Windows System Resource Manager and Metadirectory Services. These features are not available in AERO, Standard Edition, or Datacenter Edition.

Submit
64. What two main components make up the central processing unit?

Explanation

The central processing unit (CPU) is responsible for executing instructions and performing calculations in a computer system. It consists of two main components: the control unit and the arithmetic logic unit (ALU). The control unit coordinates the activities of all the other hardware components, manages the flow of data, and interprets and executes instructions. The ALU performs mathematical and logical operations, such as addition, subtraction, and comparison. Therefore, the correct answer is control unit and arithmetic logic unit.

Submit
65. This type of bridge is used to convert one Data Link layer protocol to another.

Explanation

A translational bridge is used to convert one Data Link layer protocol to another. It acts as a mediator between two different protocols, allowing them to communicate with each other. This type of bridge is able to translate the data frames from one protocol into a format that can be understood by the other protocol. This is particularly useful in situations where two networks are using different protocols and need to be interconnected. By using a translational bridge, the networks can seamlessly communicate with each other without the need for protocol conversion at higher layers.

Submit
66. What layer of the open system interconnection model do routers operate?

Explanation

Routers operate at Layer 3 of the Open Systems Interconnection (OSI) model, which is the network layer. This layer is responsible for routing data packets between different networks, making decisions on the most efficient path for data transmission, and providing logical addressing and routing. Routers use IP addresses to identify and forward packets to their destination across multiple networks. Therefore, Layer 3 is the correct answer as it aligns with the role and functions of routers in network communication.

Submit
67. What is the default classful subnet mask on class B networks?

Explanation

The default classful subnet mask for class B networks is 255.255.0.0. This is because class B networks have a default subnet mask of 255.255.0.0, which allows for a maximum of 65,534 host addresses.

Submit
68. Final reports of a communication security incident are due

Explanation

The final reports of a communication security incident are due 30 days after the initial report is issued. This means that once the initial report is officially released, the responsible parties have 30 days to complete and submit the final reports.

Submit
69. Which is an internet protocol encryption device that can be directly connected to Red local area networks?

Explanation

The KG-84 is an internet protocol encryption device that can be directly connected to Red local area networks. It is specifically designed to provide secure communication and encryption for data transmitted over a network. The other options listed, KG-194, KIV-7, and KG175, are not specifically mentioned as being able to be directly connected to Red local area networks, making KG-84 the correct answer.

Submit
70. How many peripherals can a Universal Serial Bus handle at once?

Explanation

A Universal Serial Bus (USB) can handle up to 127 peripherals at once. USB is designed to support multiple devices through a single connection, allowing for easy connectivity and data transfer. This high number of peripherals is made possible by the USB protocol and the way it manages data transmission and power distribution. Therefore, the correct answer is 127.

Submit
71. At what Open System Interconnect layer do routers operate?

Explanation

Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing and forwarding data packets between different networks. Routers use IP addresses to determine the best path for data packets to reach their destination. They make decisions based on network layer information such as IP addresses and routing tables. Therefore, the correct answer is Network.

Submit
72. What is the type of memory that retains data after power is removed or lost?

Explanation

Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which loses its data when power is turned off, nonvolatile memory stores information permanently. This type of memory is commonly used in devices such as flash drives, solid-state drives, and read-only memory (ROM) chips.

Submit
73. What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

Explanation

The correct answer is Transmission Control Protocol (TCP). TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without errors by using mechanisms such as acknowledgments, retransmissions, and flow control. TCP is widely used in applications that require reliable and ordered delivery of data, such as web browsing, email, and file transfers.

Submit
74. What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

Explanation

The correct answer is File Transfer Protocol. FTP is a widely used application protocol that allows for the transfer of files between a client and a server over a TCP/IP network. It provides a set of commands and responses for authentication, file navigation, and file transfer. FTP is commonly used for uploading and downloading files from remote servers and is supported by most operating systems and web browsers.

Submit
75. At what Open System Interconnect layer are common data compression and encryption schemes used?

Explanation

Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. The Presentation layer is responsible for formatting and presenting data in a way that can be understood by the application layer. Data compression reduces the size of the data to optimize transmission, while encryption ensures the security and confidentiality of the data. These functions are typically implemented at the Presentation layer before the data is passed to the application layer for processing.

Submit
76. Guidance for posting information on Air Force web sites is outlined in

Explanation

The correct answer is AFI 33—129. This Air Force instruction provides guidance on posting information on Air Force websites. It outlines the policies and procedures that must be followed to ensure the proper handling and dissemination of information on these platforms.

Submit
77. What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?

Explanation

Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible. In this scope, the Network ID portion of the address is broken up into different areas, which allows for hierarchical design and allocation. This means that the address can be divided into smaller subnets, making it easier to manage and allocate IP addresses in a large network. The term "aggregatable" suggests that these smaller subnets can be aggregated or combined into larger blocks, further enhancing the scalability and efficiency of the network.

Submit
78. How many devices can connect to a Fire Wire bus?

Explanation

A FireWire bus can support up to 63 devices. This limitation is due to the addressing scheme used by FireWire, which allows for a maximum of 63 unique addresses. Each device connected to the bus requires a unique address, so once all 63 addresses are assigned, no additional devices can be connected.

Submit
79. An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as

Explanation

A full accreditation refers to the accreditation decision that allows a system to operate in the environment it was originally intended for. This means that the system has met all the necessary requirements and standards to function effectively and safely in its designated environment. It signifies that the system has successfully undergone a thorough evaluation and has been deemed suitable for its intended purpose.

Submit
80. Which one is not a category of the operating system's task categories?

Explanation

The correct answer is "Troubleshoot interface." This is not a category of the operating system's task categories. The other options, such as user interface, memory management, and processor management, are all categories that are commonly found in operating systems. The troubleshoot interface is not a specific task category, but rather a function or feature that may be included within the user interface or other categories to help users diagnose and resolve issues with the operating system or software.

Submit
81. What is the difference between a hub router and a premise router?

Explanation

not-available-via-ai

Submit
82. Which security program is covered under AFI 10—701?

Explanation

AFI 10-701 is a United States Air Force instruction that covers Operations Security (OPSEC). OPSEC is a systematic process that identifies and protects critical information from potential adversaries. It involves analyzing the vulnerabilities and threats to information and implementing measures to mitigate those risks. Therefore, OPSEC is the correct security program covered under AFI 10-701.

Submit
83. Which organization assigns communication security incident report case numbers?

Explanation

The Air Force Communications Agency is responsible for assigning communication security incident report case numbers.

Submit
84. One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it?

Explanation

The Datacenter Edition of Windows Server is designed to provide support for high-end, high traffic application servers. It offers advanced features such as unlimited virtualization rights, support for larger server configurations, and enhanced scalability and reliability. This edition is specifically optimized for data centers and provides the necessary tools and capabilities to handle demanding workloads and ensure high availability and performance.

Submit
85. At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?

Explanation

At Tier I, responsibility for the worldwide management and operational oversight of the defense information infrastructure is globally managed.

Submit
86. Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat?

Explanation

The correct answer is "Deployed warfighter." This segment of the Defense Information System Network (DISN) refers to individuals who are actively deployed in the Area of Responsibility or those who are stationed in a fixed location far away from combat. They are the personnel directly involved in military operations and require access to the DISN for communication, data sharing, and other network services.

Submit
87. Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?

Explanation

The correct answer is C. This answer suggests that the resources designated priority are provided when the level of security requires a reasonable degree of deterrence against hostile acts. This means that when there is a need to prevent and discourage hostile actions, the resources that are deemed most important or essential will be given priority. This ensures that the necessary measures are in place to deter any potential threats or attacks.

Submit
88. What type of Defense Switched Network precedence call cannot be preempted?

Explanation

Flash Override is a type of Defense Switched Network (DSN) precedence call that cannot be preempted. Preemption refers to the ability to interrupt or cancel an ongoing call in favor of a higher priority call. In the case of Flash Override calls, they are given the highest priority and cannot be interrupted or preempted by any other type of call, including Flash, Priority, or Intermediate. This ensures that critical and urgent communications are given the highest priority and are not delayed or interrupted by lower priority calls.

Submit
89. Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts?

Explanation

The correct answer is Workgroup. In a workgroup network model, each computer operates independently and has its own local user accounts. There is no centralized management of user accounts, and each computer manages its own security and authentication. In contrast, a domain network model uses a centralized server called a domain controller to manage user accounts, security policies, and authentication. Active Directory is a service provided by Microsoft that is used to manage domain-based networks. User Group is not a network model and does not relate to the management of user accounts.

Submit
90. What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?

Explanation

The maximum asynchronous data rate for the Defense Red Switch Network (DRSN) is 19.2 Kbps. This means that the network can transmit data at a rate of 19.2 kilobits per second.

Submit
91. While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?

Explanation

The feature that lets you know that you have dialed the correct number at the proper level of security while using the Red Switch is the liquid crystal display. This display provides a visual indication of the dialed number and the level of security, ensuring that the correct number has been dialed and the appropriate security measures are in place.

Submit
92. The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code?

Explanation

The Global Positioning System program is responsible for maintaining GPS time to within 1 microsecond of universal time code. This level of accuracy ensures that GPS devices can provide precise and synchronized time information for various applications such as navigation, telecommunications, and scientific research.

Submit
93. At what Open System lnterconnect layer do network switches and bridges operate?

Explanation

Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes and handles functions such as framing, error detection, and flow control. Network switches and bridges use MAC addresses to forward data packets within a local area network (LAN), making them operate at the Data Link layer.

Submit
94. How are non-internet protocols sent across the Secret Internet Protocol Router Network?

Explanation

Non-internet protocols are sent across the Secret Internet Protocol Router Network (SIPRNET) by being encapsulated by the internet protocol before transmission. This means that the non-internet protocols are wrapped or packaged within the internet protocol packets, allowing them to be transmitted across the SIPRNET. This encapsulation process ensures that the non-internet protocols can be transmitted over the network without any issues or conflicts.

Submit
95. A modem is a device that modulates

Explanation

A modem is a device that converts digital data into analog signals, which can then be transmitted over an analog medium such as telephone lines. This is necessary because analog mediums can only transmit analog signals, so the modem modulates the digital data onto an analog carrier signal.

Submit
96. Official guidance on individual security clearances and permitting access to classified information can be found in

Explanation

The correct answer is AFI 31—501. This is because the question is asking for the official guidance on individual security clearances and permitting access to classified information. AFI 31—501 is the most relevant document as it specifically addresses these topics. The other options (AFI 31—301, AF1 31—401, and AFT 31—601) may contain related information, but they do not focus specifically on individual security clearances and access to classified information.

Submit
97. Software is generally divided into

Explanation

Software is typically categorized into three main types: systems software, operating systems software, and applications software. Systems software refers to programs that manage and control the computer hardware and provide a platform for running other software. Operating systems software specifically refers to the software that manages the computer's resources and provides services for other software applications. Applications software, on the other hand, refers to programs that are designed for specific tasks or purposes, such as word processing, spreadsheet management, or graphic design. Therefore, the correct answer is systems software, operating systems software, and applications software.

Submit
98. What is the purpose of the standardized tactical entry point terminal?

Explanation

The purpose of the standardized tactical entry point terminal is to provide a foxhole to National Command Authority link for commanders. This means that it serves as a communication channel between commanders in the field and the National Command Authority, allowing them to receive and transmit important information and instructions.

Submit
99. What best describes an unintended signals or noise appearing external to a piece of communications equipment?

Explanation

Emanation best describes unintended signals or noise appearing external to a piece of communications equipment. Emanation refers to the unintentional release of electromagnetic or acoustic energy from a device, which can be intercepted and potentially cause interference or security breaches. Emulation refers to imitating or replicating the behavior of another device or system. Signature refers to a unique characteristic or pattern that identifies something. Salutation refers to a greeting or expression of goodwill.

Submit
100. What reference would you use for guidance on Air Force messaging?

Explanation

AFT 33—119 is the correct reference for guidance on Air Force messaging.

Submit
101. Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?

Explanation

OPSEC, or Operations Security, is the correct answer. OPSEC is a security program that involves identifying critical information and analyzing friendly actions in order to prevent potential adversaries from obtaining sensitive information that could be used against military operations or other activities. It focuses on protecting information through measures such as risk assessment, vulnerability analysis, and countermeasures to ensure operational security and confidentiality.

Submit
102. What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another?

Explanation

The DISN backbone provides the conduit for Joint Worldwide Intelligence Communication System (JWICS) data transmission from one location to another. The DISN (Defense Information Systems Network) backbone is a global network infrastructure that connects various military installations and facilitates secure and reliable communication. It is specifically designed to support the transmission of sensitive and classified information, making it an ideal choice for transmitting JWICS data. The other options, such as JDISS terminal, STPRNET, and NIPRNET, are not specifically designed to provide this conduit for JWICS data transmission.

Submit
103. Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?

Explanation

not-available-via-ai

Submit
104. Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction?

Explanation

COMPUSEC, short for computer security, is the applied discipline that applies measures and controls to protect data in computer systems against unauthorized disclosure, modification, or destruction. It focuses on safeguarding computer systems and networks from both external and internal threats, ensuring the confidentiality, integrity, and availability of data. This includes implementing firewalls, encryption, access controls, and other security measures to prevent unauthorized access, data breaches, and other cyber threats.

Submit
105. What is the first step in merging voice, data and video networks into one integrated network within the Air Force?

Explanation

The first step in merging voice, data, and video networks into one integrated network within the Air Force is to integrate traditional TDM switches with voice over IP systems. This involves combining the existing traditional time division multiplexing switches with voice over IP technology, allowing for the transmission of voice data over the IP network. By integrating these systems, the Air Force can begin to unify their networks and streamline communication processes.

Submit
106. Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as

Explanation

The correct answer is "sensitive but unclassified." This is because the disclosure of information that could potentially harm national security falls under the category of sensitive information that should not be classified but still requires protection. It implies that the information is not suitable for public release but does not pose a direct threat to national security if disclosed.

Submit
107. Besides limiting connections to the Global Information Grid, what other Combat Information Transport Systems initiative will help increase network security?

Explanation

The correct answer is eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated NOSCs. This initiative will help increase network security by streamlining and centralizing the network operation and security functions into two Integrated NOSCs. This consolidation will reduce complexity, improve coordination, and enhance overall security measures across the Combat Information Transport Systems.

Submit
108. Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?

Explanation

The responsibility for maintenance of the sustaining base portion of the Defense Information System Network lies with the service that owns the installation. This means that the specific branch of the military that operates and maintains the installation is responsible for the upkeep and maintenance of the network.

Submit
109. Which pathnames begin at the current working directory?

Explanation

Relative pathnames begin at the current working directory. Unlike absolute pathnames, which start from the root directory, relative pathnames specify the location of a file or directory relative to the current working directory. For example, if the current working directory is "/home/user/", a relative pathname like "documents/file.txt" would refer to the file located at "/home/user/documents/file.txt".

Submit
110. Which form is used as a visitor register log to record visitors into restricted areas?

Explanation

AF Form 1109 is used as a visitor register log to record visitors into restricted areas. This form is specifically designed for this purpose and is used by the Air Force to maintain a record of individuals entering restricted areas. It helps ensure that only authorized personnel are granted access to these areas and allows for easy tracking and monitoring of visitors.

Submit
111. What encryption device is capable of loading up to 500 keys?

Explanation

The AN/CYZ-l0 /DTD is the correct answer because it is capable of loading up to 500 keys. The other options, AN/CYZ—20 /DTD, Secure DTD I 000 System, and Secure DTD2000 System, do not mention the capability of loading up to 500 keys.

Submit
112. The Air Force Information Assurance Program is detailed in

Explanation

The correct answer is AFI 33—200. This is because AFI 33—200 is the Air Force Instruction that specifically details the Air Force Information Assurance Program. AFT 33—100, AFI 33—300, and AFI 33—400 are not the correct answers as they do not pertain to the Information Assurance Program.

Submit
113. How is responsiveness provided in the Defense Switched Network?

Explanation

The Defense Switched Network (DSN) provides responsiveness through precedence access thresholding. This means that certain users or types of traffic are given priority over others based on their level of importance or urgency. By implementing this feature, the DSN ensures that critical communications are prioritized and can be processed quickly, improving overall responsiveness and efficiency.

Submit
114. What Unicast address scope operates within a network-segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?

Explanation

Link-local addresses have a scope that is limited to a specific network segment and do not require a router to direct traffic. These addresses are automatically assigned to interfaces when no other address is available, and they are used for communication within the local network only. They cannot be routed outside of the network segment, making them ideal for local communication and for ensuring that network traffic stays within the intended network.

Submit
115. Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

Explanation

Port 80 is the common port that contains Hyper Text Transfer Protocol (HTTP) servers and proxies. HTTP is the protocol used for transmitting and receiving information on the World Wide Web. Port 80 is the default port for HTTP, and it is used by web servers to listen for incoming HTTP requests from clients. It is the standard port for accessing websites and web applications through a web browser. Other ports mentioned, such as port 110, port 443, and port 8080, have different purposes and are not specifically associated with HTTP servers and proxies.

Submit
116. This characteristic of the Global Information Grid ensures seamless transmission of /information between different service branches

Explanation

The characteristic of the Global Information Grid that ensures seamless transmission of information between different service branches is common policy and standards. This means that there is a set of guidelines and rules that all branches must follow when transmitting and sharing information. These policies and standards help to ensure compatibility and interoperability between different systems and networks, allowing for smooth and efficient communication between service branches.

Submit
117. This component of the Global Information Grid consists of those items that are necessary to directly connect the warfighter to the global network

Explanation

The warrior component is the correct answer because it directly connects the warfighter to the global network. This component includes the necessary items, such as equipment and infrastructure, that enable the warfighter to access and utilize the global network for communication, information sharing, and other operational purposes. It plays a crucial role in ensuring that the warfighter is connected and able to effectively engage with the global information grid.

Submit
118. An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as

Explanation

The correct answer is "Telecommunications Electronic Material Protected from Emanating Spurious Transmissions." This term refers to technical investigations for compromising emanations from electrically operated data processing equipment. It suggests that there is a need to protect electronic material from emitting spurious transmissions, which could potentially compromise security.

Submit
119. Which form would you use to properly label removable storage media containing "confidential" information?

Explanation

The correct answer is SF 708. This form is used to label removable storage media that contains "confidential" information. The other forms listed are not specifically designed for this purpose.

Submit
120. Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network?

Explanation

The Defense Information Systems Agency (DISA) is responsible for the design, acquisition, and single systems management of the Defense Switched Network. DISA is an agency of the Department of Defense that provides information technology and communications support to the military. They are specifically tasked with managing and operating the Defense Information System Network (DISN), which includes the Defense Switched Network (DSN). The DSN is a global voice and data network that connects military installations and supports secure communications for the Department of Defense. Therefore, the correct answer is Defense Information Systems Agency.

Submit
121. Which condition exists when there is no apparent terrorist activity against computer networks?

Explanation

INFOCON 5 indicates that there is no apparent terrorist activity against computer networks. This means that there are no current threats or attacks happening. INFOCON 2, 3, and 4 would indicate varying levels of threat and activity, but INFOCON 5 specifically indicates a lack of activity.

Submit
122. Which form is used with a transfer report to accompany a COMSEC package?

Explanation

The correct answer is SF 153. This form is used with a transfer report to accompany a COMSEC package.

Submit
123. Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?

Explanation

Resource B is designated priority when the level of security requires a significant degree of deterrence against hostile acts. This means that Resource B is given special attention and allocation of resources in order to prevent and deter any hostile acts. The other resources (A, C, and D) may also be important, but Resource B is specifically designated as a priority in high-security situations.

Submit
124. Providing a list of where and why the information will be disclosed outside the DOD best  describes which mandatory item of a Privacy Act Statement?

Explanation

The correct answer is Routine use. A Privacy Act Statement is a document that informs individuals about the collection, use, and disclosure of their personal information. It is required by law to be provided whenever personal information is collected by a federal agency. The routine use item of a Privacy Act Statement specifies the circumstances under which the information may be disclosed outside the Department of Defense (DOD). It provides a list of where and why the information will be disclosed, ensuring transparency and accountability in the handling of personal information.

Submit
View My Results

Quiz Review Timeline (Updated): Nov 15, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Nov 15, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 07, 2012
    Quiz Created by
    JOHLE21
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What topology defines the way in which devices communicate, and data...
Which network protocol has the Department of Defense chosen as its...
Which condition permits non-essential networks to be taken offline and...
What rule establishes the percent of data that should be local to a...
The path between the operating system and virtually all hardware not...
When a risk of a network system attack has been identified, which...
What concerns slowed the military's adoption of wireless network...
What was the first disk operating system developed to operate on a...
What topology consists of devices connected to a common, shared cable?
What topology consists of cable segments from each computer connected...
What topology combines two or more different physical topologies in a...
What is a formal set ofrules and conventions that govern how computers...
Using a range of 1—126 in the first octet of an lPv4 address,...
The ability to move about without being tethered by wires in wireless...
What encryption device may you rarely see due to its lower maximum...
What topology defines the layout of a network's devices and media?
The classification of a fill device is
What are two anti-virus programs that the Air Force uses?
What IPv4 reserved address is used for loop back?
What is a mechanism that allows a network device to divide an IP...
What type of network connects networks that are typically separated by...
What type of network makes use of tunneling and security protocols to...
The Institute of Electrical and Electronics Engineers divide the Open...
How many bits are in an IPv4 address?
What do routing algorithms initialize and maintain to aid the process...
Applications are software programs designed to perform what type of...
Which of the following is not one the four security threats to...
What encryption device is certified to secure all classification...
Who is an authorized client that may unknowingly or maliciously help...
What do you apply across Liquid Crystal Display material to change the...
The computing part of the computer is the central processing unit,...
Instead of using binary, how are IPv4 addresses expressed to be more...
What lPv4 class address is used for networks with about 250 nodes?
What LPv4 class address is used for multicast addressing?
What Open System Interconnect layer is closest to the end user?
What is the method called when the entire frame is received and placed...
Which landline transmission medium is the primary carrier of voice...
Which of the following is not one of the three advantages to using...
What directory is always identified by the slash symbol (I) and is in...
Dynamic routing automatically calculates the best path between how...
An uninvestigated or unevaluated occurrence that potentially...
What notation is expressed in zero compression for lPv6?
The main function of the Data Service Unit is to
The core operating-system function is the management of the computer...
What Transmission Control Protocol/Internet Protocol network layer...
What Transmission Control Protocol/Internet Protocol network layer...
What Transmission Control Protocol/Internet Protocol network layer...
An optical communications system is comprised of a
What form is used as a cover sheet to protect Privacy Act material?
What Unicast address scope is designed to be private, internally...
What organization developed several wireless standards to meet the...
What forwarding method is also known as runtless switching?
What is the name of the standard all-purpose shell most commonly used?
Which of these is an example of an Exterior Gateway Protocol?
What method bonows bits from the host field of an IP address to create...
Instead of using binary, how are lPv6 addresses expressed to be more...
At what level do regional operation centers perform Network Operations...
What layer of the Open System Interconnect model defines the...
What is a Data Link layer network device that logically separates a...
What is the COMSEC program designed to do?
What notation is expressed in leading zero compression for lPv6?
Analog modems are used over the voice band range of
Which system provides support for features such as Windows System...
What two main components make up the central processing unit?
This type of bridge is used to convert one Data Link layer protocol to...
What layer of the open system interconnection model do routers...
What is the default classful subnet mask on class B networks?
Final reports of a communication security incident are due
Which is an internet protocol encryption device that can be directly...
How many peripherals can a Universal Serial Bus handle at once?
At what Open System Interconnect layer do routers operate?
What is the type of memory that retains data after power is removed or...
What Transmission Control Protocol/Internet Protocol transport layer...
What application within Transmission Control Protocol/Internet...
At what Open System Interconnect layer are common data compression and...
Guidance for posting information on Air Force web sites is outlined in
What Unicast address scope is publicly accessible with the Network ID...
How many devices can connect to a Fire Wire bus?
An accreditation decision which allows a system to operate in an...
Which one is not a category of the operating system's task categories?
What is the difference between a hub router and a premise router?
Which security program is covered under AFI 10—701?
Which organization assigns communication security incident report case...
One of the Windows Server Editions operating systems provides support...
At which NETOPS level is responsibility for the worldwide management...
Which segment of the Defense Information System Network (DISN) may be...
Which resources designated priority is provided when the level of...
What type of Defense Switched Network precedence call cannot be...
Windows operating systems traditionally function in one of two network...
What is the maximum asynchronous data rate for the Defense Red Switch...
While you are using the Red Switch, what feature lets you know that...
The Global Positioning System program is responsible for maintaining...
At what Open System lnterconnect layer do network switches and bridges...
How are non-internet protocols sent across the Secret Internet...
A modem is a device that modulates
Official guidance on individual security clearances and permitting...
Software is generally divided into
What is the purpose of the standardized tactical entry point terminal?
What best describes an unintended signals or noise appearing external...
What reference would you use for guidance on Air Force messaging?
Which of the following security programs is defined as a process of...
What provides conduit for Joint Worldwide Intelligence Communication...
Which condition requires the mandate of increased monitoring of all...
Which applied discipline applies measures and controls to protect data...
What is the first step in merging voice, data and video networks into...
Disclosure of information that would result in the loss, misuse,...
Besides limiting connections to the Global Information Grid, what...
Who bears the responsibility for maintenance of the sustaining base...
Which pathnames begin at the current working directory?
Which form is used as a visitor register log to record visitors into...
What encryption device is capable of loading up to 500 keys?
The Air Force Information Assurance Program is detailed in
How is responsiveness provided in the Defense Switched Network?
What Unicast address scope operates within a network-segment, and will...
Which is a common port that contains Hyper Text Transfer Protocol...
This characteristic of the Global Information Grid ensures seamless...
This component of the Global Information Grid consists of those items...
An unclassified term referring to technical investigations for...
Which form would you use to properly label removable storage media...
Which organization is responsible for the design, acquisition, and...
Which condition exists when there is no apparent terrorist activity...
Which form is used with a transfer report to accompany a COMSEC...
Which resources designated priority is provided when the level of...
Providing a list of where and why the information will be disclosed...
Alert!

Advertisement