3d0x2 CDCs Volume 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vpucke11
V
Vpucke11
Community Contributor
Quizzes Created: 1 | Total Attempts: 320
| Attempts: 320 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

Explanation

A homogeneous network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system. This means that all the devices in the network are from the same manufacturer or are compatible with each other, and they all use the same operating system or network operating system. This type of network is easier to manage and troubleshoot because all the components are designed to work together seamlessly.

Submit
Please wait...
About This Quiz
Networking Quizzes & Trivia

This quiz, titled '3D0X2 CDCS VOLUME 1', assesses knowledge in computer networking, focusing on network types, configurations, and geographical networking scopes. It is designed for individuals aiming to certify in networking, enhancing both theoretical understanding and practical application.

Personalize your quiz and earn a certificate with your name on it!
2. What is the process of erasing magnetic media by reducing the magnetic flux to virtual zero by applying a reverse magnitizing field?

Explanation

Degaussing is the process of erasing magnetic media by reducing the magnetic flux to virtual zero by applying a reverse magnetizing field. This process effectively demagnetizes the media, making the previously stored data unreadable. Degaussing is commonly used to securely erase sensitive information from magnetic storage devices such as hard drives, tapes, and floppy disks. It is a reliable method for ensuring that the data cannot be recovered or accessed by unauthorized individuals.

Submit
3. What documentation signifies that a system is not allowed to connect to the global information grid(GIG)?

Explanation

Denial of authorization to operation (DATO) is the correct answer because it signifies that a system is not allowed to connect to the global information grid (GIG). This means that the system has been explicitly denied permission to operate on the GIG, indicating that it does not meet the necessary security requirements or has failed to comply with the necessary regulations. Therefore, DATO serves as a documentation to indicate that the system is not authorized to connect to the GIG.

Submit
4. What operational simple simple network management protocol(SNMP) message is an unsolicited message from an agent to the manager?

Explanation

A Trap message in SNMP is an unsolicited message sent from an agent to the manager. It is used to notify the manager about certain events or conditions that occur in the network. The agent sends the Trap message without any request from the manager, making it an unsolicited message. This allows the agent to proactively inform the manager about important events, such as system failures or security breaches, ensuring timely action can be taken.

Submit
5. Knowledge-based identification and authentification methods require the user to provide something you?

Explanation

Knowledge-based identification and authentication methods require the user to provide something they know, such as a password or personal information. This is different from methods that require something the user has, like a physical token or a fingerprint. In this case, the correct answer is "Know" because knowledge-based methods rely on the user's ability to recall and provide specific information as a means of verifying their identity.

Submit
6. How many users are in a multi server network?

Explanation

A multi server network typically consists of multiple servers that are interconnected to handle the network's workload. The number of users in such a network can vary depending on the size and capacity of the servers. The range of 50-250 suggests that there are a moderate number of users in the network, which is neither too small nor too large. This range allows for a sufficient number of users to be accommodated while ensuring that the network performance remains stable and efficient.

Submit
7. What is the  primary unclassified pki token for individual pki keys and certificates in the air force?

Explanation

The correct answer is CAC, which stands for Common Access Card. CAC is the primary unclassified PKI (Public Key Infrastructure) token for individual PKI keys and certificates in the Air Force. It is a smart card that serves as an identification card and authentication tool for military personnel, contractors, and other authorized individuals. The CAC contains a microchip that stores cryptographic information and allows users to securely access computer systems and networks.

Submit
8. What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?

Explanation

A heterogeneous network consists of computer systems from different vendors that run different operating systems and communication protocols. In this type of network environment, there is a mix of hardware and software from various sources, making it diverse and complex. The presence of different operating systems and protocols requires careful integration and compatibility measures to ensure seamless communication and interoperability between the systems.

Submit
9. How many users are in a single server network?

Explanation

A single server network typically refers to a small-scale network where a single server is responsible for handling all network requests and providing services to a limited number of users. The range of 10-50 users suggests that this network is designed to support a small group of individuals or a small office environment. This number of users is manageable for a single server to handle the network traffic and provide efficient services without overwhelming the system.

Submit
10. How many users are in a mulit server high speed backbone network?

Explanation

The correct answer is 250-1000. This range indicates that there are between 250 and 1000 users in a multi-server high-speed backbone network. This suggests that the network is capable of handling a significant number of users and is designed to provide fast and reliable connectivity for a large user base.

Submit
11. What documentation is required to permanently connect to the global information gri(GIG) system

Explanation

To permanently connect to the Global Information Grid (GIG) system, the documentation required is an Authorization to Operate (ATO). This means that the entity or organization has been granted official permission to operate and access the GIG system. The ATO indicates that the necessary security controls and measures have been implemented to ensure the confidentiality, integrity, and availability of the system. It is a crucial document that ensures compliance with security standards and regulations before being granted access to the GIG system.

Submit
12. What is the minimum number of computers needed for a computer network?

Explanation

To establish a computer network, a minimum of two computers is required. This is because a network is formed when two or more computers are connected together to share resources and communicate with each other. With only one computer, there would be no other device to connect and create a network. Therefore, the minimum number of computers needed for a computer network is 2.

Submit
13. What is used to identify network nodes on a physically connected network?

Explanation

A Media Access Control (MAC) address is a unique identifier assigned to network interfaces for communications on a physical network. It is used to identify network nodes on a physically connected network. Each network device has a unique MAC address, allowing data to be sent to the correct destination. This address is assigned by the manufacturer and is hardcoded into the device's network interface card.

Submit
14. What network management area is concerned with controlling access points to information?

Explanation

The network management area concerned with controlling access points to information is security. Security measures are implemented to ensure that unauthorized users are not able to access sensitive information or gain unauthorized access to the network. This includes implementing firewalls, encryption, access control lists, and other security measures to protect the network and its resources from potential threats and attacks.

Submit
15. What are three primary ways to authenticate one-self?

Explanation

The three primary ways to authenticate oneself are through something you know, something you have, or something you are. This means that authentication can be based on knowledge (such as passwords), possession (such as identification cards), or physical characteristics (such as fingerprints or retinal scans). By requiring multiple forms of authentication, it increases the security and reduces the risk of unauthorized access.

Submit
16. How many users are usually in a peer to peer network?

Explanation

In a peer-to-peer network, the number of users typically ranges from 2 to 10. This is because peer-to-peer networks are designed for small-scale connections where users directly interact with each other without the need for a central server. This smaller number of users allows for efficient communication and sharing of resources between the peers. Additionally, with fewer users, it is easier to maintain security and manage the network effectively.

Submit
17. What is a privately owned network whose access is restricted to authorized personnel is called?

Explanation

An intranetwork is a privately owned network that restricts access to authorized personnel only. It is typically used within an organization to facilitate communication and data sharing among employees. Unlike an internetwork, which connects multiple networks together, an intranetwork is confined to a single organization and is not accessible to the public. A local area network (LAN) refers to a network that covers a small geographical area, while a homogeneous network refers to a network where all the connected devices have the same operating system or protocol.

Submit
18. What operational simple simple network management protocol(SNMP) message is used to modify the value of one or more instances of management information?

Explanation

The correct answer is "Set." In Simple Network Management Protocol (SNMP), the "Set" message is used to modify the value of one or more instances of management information. This message allows network administrators to remotely configure and control network devices by changing the values of specific variables or parameters in the management information database. The "Set" message is an essential component of SNMP for managing and maintaining network devices.

Submit
19. What is the database of record for registering all systems and applications?

Explanation

The correct answer is Enterprise information technology data repository (EITDR). This is the database of record for registering all systems and applications. It serves as a central repository for storing and managing information related to enterprise IT systems and applications. It helps in maintaining a comprehensive record of all the systems and applications in an organization, including their details, configurations, and relationships. This database is essential for organizations to have a centralized and reliable source of information about their IT infrastructure.

Submit
20. What series of the Air Force instruction series covers communications and information?

Explanation

Air Force instruction series 33 covers communications and information.

Submit
21. What is the preferred method of sanitizing magnetic media?

Explanation

Degaussing is the preferred method of sanitizing magnetic media. Degaussing involves using a strong magnetic field to erase the data on the media, making it unrecoverable. This method is effective for tapes, hard drives, and other magnetic storage devices. Destroying the media physically or sanitizing it by overwriting the data are also viable options, but degaussing is considered the most secure method as it completely erases the magnetic properties of the media.

Submit
22. A base web server that interfaces with with the public must be placed in what area of the base network?

Explanation

A base web server that interfaces with the public must be placed in a de-militarized zone (DMZ) because it acts as a buffer zone between the internal network and the external network. By placing the web server in the DMZ, it provides an additional layer of security by segregating the public-facing services from the internal network. This prevents direct access to the internal network and protects sensitive information from potential attacks or unauthorized access.

Submit
23. What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers?

Explanation

Public key infrastructure (PKI) is a cryptographic key and certificate delivery system that enables secure electronic transactions and exchanges of sensitive information between unfamiliar parties. It uses asymmetric key cryptography, where each user has a pair of keys - a public key for encryption and a private key for decryption. The public keys are stored in a centralized repository called a certificate authority (CA), which issues digital certificates to verify the authenticity of the public keys. This infrastructure ensures the confidentiality, integrity, and authentication of data transmitted over the network, making it an essential component for secure communication.

Submit
24. What provides information concerning the bandwidth utilization and the number of connections that are related to specific nodes?

Explanation

Connection statistics provide information concerning the bandwidth utilization and the number of connections that are related to specific nodes. This data helps in monitoring and analyzing the network performance, identifying any bottlenecks or issues with specific nodes, and optimizing the network resources. By tracking the number of connections and their utilization, administrators can ensure efficient allocation of bandwidth and troubleshoot any connectivity problems.

Submit
25. What operational simple network management protocol(SNMP) message asks for a specific instance of management information?

Explanation

The correct answer is "Get". In Simple Network Management Protocol (SNMP), the "Get" message is used to request a specific instance of management information from a network device. It is used by a manager to retrieve the value of a specific variable or object from an SNMP agent. This message allows the manager to obtain information about the device's configuration, performance, and other parameters for monitoring and troubleshooting purposes.

Submit
26. What is the process of physically damaging the media to render it unusuable in a computer and render the data on the media irretrievable by any known exploitaion methods?

Explanation

Destroying is the correct answer because it refers to the process of physically damaging the media to the point where it becomes unusable and the data on it cannot be retrieved by any known exploitation methods. This can involve methods such as shredding, incinerating, or crushing the media to ensure that the information it contains is completely destroyed and cannot be recovered.

Submit
27. What network architecture has a network management platform on one computer system at a location that is responsible for all network management duties?

Explanation

A centralized network architecture refers to a setup where all network management duties are handled by a single computer system located at a specific location. This means that all network management tasks, such as monitoring, configuration, and troubleshooting, are performed from this central system. This approach offers the advantage of simplicity and ease of control, as all management functions are concentrated in one place. It also allows for efficient resource allocation and decision-making.

Submit
28. What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?

Explanation

Vulnerability scanners are network devices that perform thorough examinations of systems to identify weaknesses that could potentially lead to security breaches. These scanners are designed to search for vulnerabilities in software, networks, and systems, and provide detailed reports on any potential weaknesses found. By conducting rigorous examinations, vulnerability scanners help organizations identify and address vulnerabilities before they can be exploited by malicious actors, enhancing overall security.

Submit
29. How many octets is the standard internet protocol broken down into?

Explanation

The standard internet protocol is broken down into 4 octets. Octets are groups of 8 bits, and in the case of the internet protocol, each octet represents a portion of the IP address. The IP address is a 32-bit number, divided into 4 octets, with each octet ranging from 0 to 255. This division allows for a total of 4,294,967,296 unique IP addresses to be assigned, which is sufficient for the current needs of the internet.

Submit
30. Who provides uninterrupted flow of mission critical information to field and in garrison units for the duration of a contingency?

Explanation

Sustained communications support teams provide uninterrupted flow of mission critical information to field and in garrison units for the duration of a contingency. These teams are responsible for ensuring that communication systems are operational and reliable, allowing for effective communication between different units and personnel during critical missions.

Submit
31. What program is known as a state of the art ground to ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base?

Explanation

The program known as theater deployable communications is a state of the art ground to ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base.

Submit
32. What is a communications network that serves users within a confined geographical area?

Explanation

A local area network (LAN) is a communications network that serves users within a confined geographical area. LANs are commonly used in homes, offices, schools, and other small-scale environments. They allow devices such as computers, printers, and servers to connect and share resources, data, and information within the local area. Unlike wide area networks (WANs) or global area networks (GANs) which cover larger areas, LANs are designed for smaller-scale connectivity needs.

Submit
33. What network entity provides reliable,secure networks and network services for base level customers?

Explanation

The Network Control Center (NCC) is the network entity that provides reliable and secure networks and network services for base level customers. It is responsible for monitoring and controlling network operations, ensuring network availability, and resolving any network issues that may arise. The NCC plays a crucial role in maintaining the overall performance and security of the network infrastructure.

Submit
34. What component of the systems management automated report tracking system(SMARTS) application contains knowledge of available domain managers?

Explanation

The correct answer is "Broker". In the systems management automated report tracking system (SMARTS) application, the broker component is responsible for maintaining knowledge of available domain managers. The broker acts as a central hub, connecting the consoles, clients, and probes to the appropriate domain managers based on their availability and workload. It facilitates communication and coordination between the different components of the system, ensuring efficient management and tracking of reports.

Submit
35. Which compnent of the public key infrastructure is responsible for establishing,authenticating,maintaining,and revoking certificates?

Explanation

A certificate authority is responsible for establishing, authenticating, maintaining, and revoking certificates in a public key infrastructure. It is a trusted entity that issues digital certificates to verify the authenticity of public keys and ensure secure communication between parties. The certificate authority verifies the identity of individuals or organizations requesting certificates, signs the certificates to confirm their authenticity, and manages the revocation process if necessary.

Submit
36. What is a measure used to verify the eligibilty of a subject and the ability of the subject to access certain information?

Explanation

Authentication is the measure used to verify the eligibility of a subject and their ability to access certain information. It involves verifying the identity of the subject through credentials such as passwords, biometrics, or security tokens. This process ensures that only authorized individuals can access the information and helps prevent unauthorized access or data breaches.

Submit
37. What type of communications network links different interconnected networks over an unlimited geographical region?

Explanation

A Global Area Network (GAN) is a type of communications network that links different interconnected networks over an unlimited geographical region. Unlike a Local Area Network (LAN) or Metropolitan Area Network (MAN), which have limited coverage areas, a GAN allows for communication and data transfer across vast distances. A Wide Area Network (WAN) is a similar concept, but it typically refers to a network that covers a larger area than a GAN. Therefore, the correct answer is Global Area Network (GAN).

Submit
38. What do you call currrent and perceived capibility,intention,or attack,directed to cause denial of service?

Explanation

The term "threat" refers to the current and perceived capability, intention, or attack directed towards causing a denial of service. It encompasses the idea of a potential danger or harm that can disrupt or compromise the functioning of a system or network. It is different from vulnerability, compromise, or tunneling, as it specifically focuses on the intention and capability to cause harm rather than the weaknesses or methods used to exploit them.

Submit
39. Which function of performance management tracks historical data by tracking activities on the network?

Explanation

Monitoring is the correct answer because it involves tracking activities on the network and collecting historical data. By monitoring the network, organizations can keep track of the performance and health of their systems, identify any issues or anomalies, and gather data for analysis and improvement purposes. Monitoring allows for real-time tracking and provides valuable insights into network performance, security, and overall efficiency.

Submit
40. According to the Air Force network structure,what tier is the Air Force network operations center (AFNOSC)?

Explanation

According to the Air Force network structure, the Air Force network operations center (AFNOSC) is classified as Tier 1.

Submit
41. What operational simple network management protocol(SNMP) message is used to retrieve multiple pieces of information with minimal overhead?

Explanation

The correct answer is "Getnext." The Getnext message is used in SNMP to retrieve multiple pieces of information with minimal overhead. It allows the SNMP manager to request the next set of data from the SNMP agent, making it efficient for retrieving sequential data. This message is commonly used in polling operations where the manager needs to retrieve multiple variables in a single request.

Submit
42. What type of malicious logic can become active on an information system without the need to infect a file?

Explanation

A worm is a type of malicious logic that can become active on an information system without the need to infect a file. Unlike viruses or trojan horses, worms can self-replicate and spread across networks or systems without the need for human intervention. This allows them to quickly infect multiple computers and cause widespread damage. Worms often exploit vulnerabilities in network protocols or operating systems to propagate and can consume significant network bandwidth or system resources.

Submit
43. What is a file that is kept with you and will allow you to decrypt files encrypted specifically for you using your openly available encryption code?

Explanation

A private key is a file that is kept with you and allows you to decrypt files that have been encrypted specifically for you using your openly available encryption code. It is called a private key because it is meant to be kept secret and not shared with others. By using your private key, you can unlock and access encrypted information that is intended only for you.

Submit
44. An information system on your network that is not set to require the use of a cac or password would be considered a?

Explanation

An information system on a network that does not require the use of a CAC or password would be considered a vulnerability. This means that unauthorized individuals could potentially gain access to the system and its information without any form of authentication. This lack of security measures increases the risk of a breach or compromise, making it a vulnerability that needs to be addressed.

Submit
45. What is the host ID od internet protocol address 131.10.230.120/24?

Explanation

The host ID of an IP address is the portion of the address that identifies a specific device on a network. In this case, the given IP address is 131.10.230.120/24. The "/24" indicates that the first 24 bits of the address represent the network portion, and the remaining 8 bits represent the host portion. Therefore, the host ID is 0.0.0.120.

Submit
46. What is a collection of of computing environments connected by one or more internal networks under the control of a single approval authority and security policy?

Explanation

An enclave is a collection of computing environments connected by internal networks and controlled by a single approval authority and security policy. This term is commonly used in the field of cybersecurity to refer to a secure and isolated network or system. Enclaves are designed to protect sensitive information and prevent unauthorized access, ensuring that all communication and data exchange within the enclave is secure and controlled.

Submit
47. What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?

Explanation

Tunneling is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall. This technique allows the attacker to bypass the firewall's security measures by hiding the malicious message within a seemingly harmless one. By using tunneling, the attacker can successfully deliver the malicious payload to the target system without being detected or blocked by the firewall.

Submit
48. What type of malicious logic can form large networks that can be used to launch a variety of attacks without  an information system owners knowledge? 

Explanation

A bot is a type of malicious logic that can form large networks, known as botnets, without the knowledge of the information system owner. These botnets can be used to launch various attacks, such as DDoS attacks or spreading malware, without the owner's knowledge or control. Bots are typically designed to perform automated tasks, often under the control of a remote attacker, and can spread and infect multiple systems to form a powerful network for carrying out malicious activities.

Submit
49. What type of communications network links geographically dispersed offices in other cities or  around the globe?

Explanation

An enterprise network is the correct answer because it is a type of communications network that connects geographically dispersed offices in other cities or around the globe. It is designed to support the communication needs of a large organization, providing connectivity and data sharing between different locations. This network allows for efficient communication and collaboration among employees, regardless of their physical location.

Submit
50. The two ways key establishment can occur are key?

Explanation

Key establishment can occur through transfer and agreement. In this process, a pre-existing key is transferred securely from one entity to another, ensuring confidentiality and integrity. The entities involved then agree on a shared key, which can be used for secure communication. This method ensures that both parties have a copy of the same key, enabling them to encrypt and decrypt messages securely.

Submit
51. What automatically runs in the backround when the protocol analyzer application is activated?

Explanation

When the protocol analyzer application is activated, node discovery automatically runs in the background. Node discovery is a process that identifies and maps the network nodes or devices present in a network. It helps in creating a network topology and allows the protocol analyzer to gather information about the network's structure and connections. This information is crucial for analyzing network traffic and troubleshooting network issues.

Submit
52. What device is placed outside the boundary protection mechanism to monitor all attempted attacks?

Explanation

An Intrusion Detection System (IDS) is a device that is placed outside the boundary protection mechanism to monitor all attempted attacks. It is designed to detect and alert the system administrator about any suspicious or malicious activities that may be occurring on the network. Unlike a firewall, which primarily focuses on preventing unauthorized access, an IDS is specifically designed to detect and respond to potential attacks. It analyzes network traffic and system logs to identify patterns or behaviors that indicate a possible intrusion. By monitoring all attempted attacks, an IDS helps to enhance the overall security of the network.

Submit
53. What are examples of of network attacks that bypass the firewall?

Explanation

Tunneling and application-based attacks are examples of network attacks that can bypass the firewall. Tunneling involves encapsulating one network protocol within another, allowing the attacker to hide their activities and bypass the firewall's inspection. Application-based attacks exploit vulnerabilities in specific applications or services running on the network, allowing the attacker to gain unauthorized access or disrupt the network. Both of these attack techniques can evade the firewall's protection and potentially compromise the network's security.

Submit
54. What is formal declaration by a designated approving official(DAA) that an information system is approved to operate in a particular security mode using a prescribed set of safe guards at an acceptable level of risk?

Explanation

Accreditation is the formal declaration by a designated approving official (DAA) that an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk. It is the process of evaluating and certifying the security posture of an information system. Accreditation ensures that the system meets the necessary security requirements and is authorized to operate. It involves a comprehensive assessment of the system's security controls, risk management, and compliance with relevant policies and regulations.

Submit
55. Which of the following are the most common network management architectures?

Explanation

The most common network management architectures are centralized, hierarchical, and distributed. In a centralized architecture, all network management functions are performed by a central entity, providing control and monitoring capabilities. In a hierarchical architecture, network management functions are divided into multiple levels, each with its own set of responsibilities and control. In a distributed architecture, network management functions are distributed across multiple entities, allowing for more flexibility and scalability. These three architectures are commonly used in various network management systems to effectively manage and control network operations.

Submit
56. Sustained comminications support becomes a part of the deployment if it exceeds?

Explanation

If the sustained communications support exceeds 30 days, it becomes a part of the deployment.

Submit
57. A program that replicates by attaching itself to a program is a?

Explanation

A program that replicates by attaching itself to a program is a virus. Viruses are malicious programs that can self-replicate and spread to other programs or systems. They attach themselves to host programs and can cause damage by modifying or deleting files, stealing data, or disrupting the normal functioning of a computer or network. Unlike worms, which can spread independently, viruses require a host program to replicate. Bots are automated software programs that can perform tasks on the internet, while Trojan horses are programs that appear harmless but actually have malicious intent.

Submit
58. The Air Force requires a network password to be at least how many characters long?

Explanation

The Air Force requires a network password to be at least 9 characters long. This is likely because longer passwords are generally more secure and harder to guess or crack. A longer password increases the number of possible combinations, making it more difficult for unauthorized individuals to gain access to the network.

Submit
59. Which standard form is used to annotate storage media has been sanitized?

Explanation

The correct answer is 711 because this standard form is used to annotate storage media that has been sanitized.

Submit
60. What color on the systems management automated report tracking system(SMARTS) alarm log indicates one or more events?

Explanation

Purple color on the SMARTS alarm log indicates one or more events.

Submit
61. What is the department of defense process for certifying and accrediting informationystems to operate on the global information grid(GIG)?

Explanation

The correct answer is the Department of Defense Information Assurance Certification and Accreditation Process (DIACAP). This process is used to certify and accredit information systems to operate on the global information grid (GIG). DIACAP ensures that these systems meet security, interoperability, supportability, sustainability, and usability requirements. It is the specific process used by the Department of Defense to ensure the security and effectiveness of their information systems.

Submit
62. What area of the simple network management protocol(SNMP) node is responsible for monitoring,collecting and reporting management data to the mangement system?

Explanation

The SNMP node is responsible for monitoring, collecting, and reporting management data to the management system. The agent is a component of the SNMP node that performs these tasks. It collects information from the managed devices, such as routers or switches, and sends it to the management system for analysis and monitoring. The agent acts as an intermediary between the managed devices and the management system, ensuring that the data is properly collected and reported.

Submit
63. Which public key algorithum is exclusively a key establishment protocol?

Explanation

Diffie and Hellman is exclusively a key establishment protocol. This means that its main purpose is to securely establish a shared secret key between two parties over an insecure channel. It does not involve digital signatures or encryption/decryption operations like the other options. Instead, Diffie and Hellman allows two parties to agree on a shared secret key without actually transmitting the key itself, ensuring that the key remains confidential. This makes it a key establishment protocol rather than a digital signature algorithm or a public key encryption algorithm.

Submit
64. What is the binary equivalent to the dotted decimal number 96?

Explanation

The binary equivalent to the dotted decimal number 96 is 01100000.

Submit
65. Which team provides a communication link between forces securing the area and setting up support facilities?

Explanation

Initial communications support teams provide a communication link between forces securing the area and setting up support facilities. These teams are responsible for establishing and maintaining communication systems that enable effective coordination and information sharing between different units and facilities. They play a crucial role in ensuring seamless communication during the initial stages of securing an area and setting up support infrastructure.

Submit
66. Storage media that retains data after power is removed is considered?

Explanation

Sensitive is the correct answer because storage media that retains data after power is removed is considered sensitive. This means that the data stored on the media can be accessed even when the device is turned off or unplugged. Sensitive storage media is often used to store confidential or important information that needs to be protected and accessed even in the absence of power.

Submit
67. What is the simplest and least expensive way to stop inappropiate network addresses?

Explanation

Packet filtering is the simplest and least expensive way to stop inappropriate network addresses. It involves examining the headers of data packets and determining whether to allow or block them based on predetermined criteria. By filtering out packets with inappropriate network addresses, such as those known to be associated with malicious activity or unauthorized access attempts, network security can be enhanced without the need for additional hardware or software.

Submit
68. What area of the simple network management protocol(SNMP) tree structure is reserved for vendors related label and leaf objects associated with specific manufactured equipment?

Explanation

The area of the SNMP tree structure that is reserved for vendors related label and leaf objects associated with specific manufactured equipment is called "Private". In this area, vendors can define their own labels and leaf objects to provide additional management capabilities for their equipment. This allows for customization and flexibility in managing different types of equipment from different vendors.

Submit
69. What network architecture uses multiple systems for network management,with one system acting as a central server and the others working as clients?

Explanation

A hierarchical network architecture uses multiple systems for network management, with one system acting as a central server and the others working as clients. In this architecture, the central server has control over the network and manages the communication between the clients. The clients rely on the central server for network management tasks such as routing, security, and resource allocation. This hierarchical structure allows for efficient management and control of the network, with the central server acting as a central point of authority.

Submit
70. Performance management can be broke into what two seperate functional categories?

Explanation

Performance management involves monitoring the performance of systems or processes and making necessary adjustments to optimize their performance. Monitoring involves tracking and measuring performance metrics, while tuning refers to making adjustments or fine-tuning the system to improve its performance. Therefore, monitoring and tuning are the two separate functional categories of performance management.

Submit
71. Who can declassify storage media that has been sanitized?

Explanation

The information owner is responsible for the classification and declassification of storage media that has been sanitized. As the owner of the information, they have the authority to determine the level of sensitivity of the data and can decide when it is safe to declassify the storage media. The information owner is typically the individual or organization that has legal or operational control over the information, making them the appropriate party to make decisions regarding its classification.

Submit
72. What are the three types of  systems management automated report tracking system(SMARTS) notifications?

Explanation

The three types of systems management automated report tracking system (SMARTS) notifications are compound events, problems, and symptomatic events. These notifications help in identifying and addressing various issues and events that occur within the system. Compound events refer to a combination of multiple events that may indicate a larger problem. Problems are specific issues that need to be resolved. Symptomatic events are events that indicate potential problems or abnormalities in the system. These different types of notifications allow for effective monitoring and management of the system.

Submit
73. Network management protocols are designed in most cases to reside above what layer of the operational system interface(OSI) model?

Explanation

Network management protocols are designed to reside above the Session layer of the OSI model. The Session layer is responsible for establishing, maintaining, and terminating connections between network devices. Network management protocols, such as SNMP (Simple Network Management Protocol), operate at a higher layer to monitor and control network devices and services. They utilize the Session layer's capabilities to establish and manage communication sessions between the network management system and the managed devices. Therefore, the correct answer is Session.

Submit
74. What is the network ID of internet protocol address 131.10.230.120/24

Explanation

The network ID of an IP address is obtained by setting all the host bits to 0. In this case, the IP address is 131.10.230.120/24, which means that the first 24 bits represent the network ID. Therefore, the network ID is 131.10.230.0.

Submit
75. What is established to distinguish between errors that fall between a normal range and excessive errors because of a fault?

Explanation

Tolerance parameters are established to distinguish between errors that fall within a normal range and excessive errors caused by a fault. These parameters define the acceptable limits for errors or deviations from the expected behavior. By setting tolerance parameters, organizations can determine when errors are considered acceptable and when they indicate a fault or abnormal behavior. This helps in identifying and addressing issues that may arise due to faults or errors exceeding the defined tolerance levels.

Submit
76. What Air Force instruction provides policy,direction,and structure for the Air Force global information grid(AF-GIG)?

Explanation

AFI 33-115v1 is the correct answer because it is the Air Force instruction that provides policy, direction, and structure for the Air Force global information grid (AF-GIG). This instruction outlines the guidelines and procedures for managing and operating the AF-GIG, which is the Air Force's worldwide network of information systems and services. It ensures that the AF-GIG is secure, reliable, and interoperable, supporting the Air Force's mission and enabling effective communication and information sharing across the organization.

Submit
77. What is the type of probe that collects inter device connectivity information using proprietary topology management information bases(MIB)?

Explanation

A neighbor probe is a type of probe that collects inter device connectivity information using proprietary topology management information bases (MIB). It is specifically designed to gather information about neighboring devices in a network, including their IP addresses, MAC addresses, and other relevant details. This probe helps in monitoring and managing network connectivity by providing insights into the relationships and connectivity between devices in a network.

Submit
78. What is an electonic dcoument that offically links together a users identity with his public key?

Explanation

A public key infrastructure (PKI) certificate is an electronic document that officially links together a user's identity with his public key. This certificate is used to verify the authenticity and integrity of digital communications and transactions. It ensures that the public key belongs to the correct user and provides a secure way to exchange information.

Submit
79. What type of firewall is used to separate secure sites,networks,or network segments from less sucure areas?

Explanation

A bastion host is a type of firewall that is used to separate secure sites, networks, or network segments from less secure areas. It acts as a gateway between the secure and less secure areas, allowing only authorized traffic to pass through while blocking unauthorized access. It provides an additional layer of security by monitoring and controlling incoming and outgoing traffic, and can also provide other security services such as authentication and encryption.

Submit
80. What level of network activity are you working at when you working at when thw automated monitoring of components provides problem analysis,giving a root cause alarm for the problem at hand?

Explanation

When working at a level where automated monitoring of components provides problem analysis and gives a root cause alarm for the problem at hand, you are working at a proactive level of network activity. This means that you are actively monitoring and analyzing the network to identify and address potential issues before they become major problems. By being proactive, you can prevent network downtime and ensure the smooth functioning of the network.

Submit
81. Which agency must approve all information protection tools prior to their use?

Explanation

The correct answer is Headquarters United States Air Force (HQ USAF). This agency must approve all information protection tools prior to their use.

Submit
82. What regulation covers remanence security?

Explanation

AFSSI 8580 is the correct answer because it is a regulation that specifically covers remanence security. Remanence security refers to the process of ensuring that data is properly erased or destroyed from storage media to prevent unauthorized access. AFSSI 8580 provides guidelines and procedures for remanence security within the United States Air Force.

Submit
83. What device provides information concerning the network utilization and frame errors that are related to a specific protocol?

Explanation

Protocol statistics provide information concerning the network utilization and frame errors that are related to a specific protocol. This includes data on the performance and efficiency of the protocol, such as the number of packets transmitted and received, error rates, and overall network utilization. By analyzing protocol statistics, network administrators can identify any issues or bottlenecks in the network and take appropriate measures to optimize its performance.

Submit
84. What can be used to encrypt a message so that it can only be decrypted by the recipient?

Explanation

Public key encryption is a cryptographic system that uses a pair of keys: a public key and a private key. The public key is used to encrypt the message, while the private key is used to decrypt it. Only the recipient possesses the private key, ensuring that only they can decrypt the message. Therefore, public key encryption is used to encrypt a message so that it can only be decrypted by the recipient.

Submit
85. What do you call the consolidated list of requirments that a program office must adhere to when fielding a system?

Explanation

not-available-via-ai

Submit
86. What is a hierarchical structured format that defines the network management information available from a network devices?

Explanation

A Management Information Base (MIB) is a hierarchical structured format that defines the network management information available from a network device. It provides a standardized way to organize and access information about the device's configuration, performance, and status. MIBs are used by network management systems to monitor and control network devices. They contain a collection of objects, each identified by a unique object identifier (OID), which represents a specific piece of information about the device. The MIB acts as a database of information that can be queried and manipulated by network administrators.

Submit
87. How many different categories of information does the performance monitor provide you about your network?

Explanation

The performance monitor provides 21 different categories of information about your network.

Submit
88. How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask?

Explanation

An internet protocol version 6 (IPv6) subnet mask typically covers 64 bits. IPv6 uses a 128-bit address space, and the subnet mask is used to divide this address space into subnets. By using a 64-bit subnet mask, the first 64 bits of the IPv6 address are used to identify the network, while the remaining 64 bits are used to identify the host within that network. This allows for a large number of unique network addresses and a large number of unique host addresses within each network.

Submit
89. What reports errors that occur at the physical layer such as bad frame check sequence(FCS) short frames,and jabbers?

Explanation

The correct answer is Media access control(MAC) node statistics. Media access control (MAC) node statistics provide information about errors that occur at the physical layer, such as bad frame check sequence (FCS), short frames, and jabbers. These statistics help in monitoring and troubleshooting network issues related to the physical layer.

Submit
90. What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?

Explanation

A network management server is a bundle of application software designed to significantly improve network efficiency and productivity. It is responsible for monitoring and managing network devices, analyzing network performance, troubleshooting network issues, and optimizing network resources. By providing centralized control and visibility over the network, a network management server helps organizations ensure smooth network operations, minimize downtime, and enhance overall productivity.

Submit
91. What action represents one of the greatest vulnerabilities to internal networks?

Explanation

Network connected computer systems with modems that make calls to and accept calls from the public switched network represent one of the greatest vulnerabilities to internal networks. This is because these systems provide a direct connection between the internal network and the public switched network, allowing potential attackers to gain unauthorized access to the internal network. This can lead to various security risks, such as unauthorized access to sensitive data, malware infections, and potential network breaches.

Submit
92. What centerpiece of a systems management automated report tracking system(SMARTS) application?

Explanation

The correct answer is "Domain manager." In a systems management automated report tracking system (SMARTS) application, the domain manager is the centerpiece. It is responsible for managing and monitoring the various components of the system, such as brokers, clients, and the map console. The domain manager ensures smooth communication and coordination between these components, allowing for efficient tracking and reporting of system activities.

Submit
93. How many non secure internet protocol router network(niprnet) gateways does the air force possess?

Explanation

The air force possesses 16 non secure internet protocol router network (NIPRNET) gateways.

Submit
94. What level of network activity are you working at when you as the network manager are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?

Explanation

When the network manager is monitoring and troubleshooting components to eliminate side-effect alarms and isolate problems to a root cause, they are working at the interactive level of network activity. This level involves actively engaging with the network and its components to identify and address any issues that arise. It requires hands-on involvement and a proactive approach to ensure smooth network operation.

Submit
95. What device provides a capability for digital network diagnostics and developing communications software?

Explanation

A protocol analyzer is a device that allows for digital network diagnostics and the development of communications software. It is used to capture, analyze, and decode network traffic, providing valuable insights into network performance and troubleshooting. This tool helps in identifying and resolving network issues by examining the protocols and data packets transmitted over the network. It is an essential device for network administrators and developers involved in maintaining and optimizing network infrastructure.

Submit
96. What type of firewall consists of a screening  router and a set od rules that accept or reject a message based on information in the messages header(a packet) the source address the destination address and the port.

Explanation

A packet filtering firewall is a type of firewall that examines the header of each packet in a message to determine whether to accept or reject it. It uses a set of rules to make this decision, considering information such as the source and destination addresses and the port number. This type of firewall acts as a barrier between a private network and the internet, filtering incoming and outgoing packets based on the specified criteria, thus enhancing network security.

Submit
97. What type of communications network links a broad geographical region?

Explanation

A Metropolitan Area Network (MAN) is a type of communications network that connects a broad geographical region, typically within a city or metropolitan area. It covers a larger area than a Local Area Network (LAN) but is smaller than a Wide Area Network (WAN). MANs are designed to provide high-speed connectivity to businesses, organizations, and individuals within a specific geographic location, allowing them to share resources and communicate efficiently. This makes MAN the most suitable option for linking a broad geographical region.

Submit
98. What type of firewall generates audit trails of all network related activity for monitoring and intrusion detection purposes?

Explanation

A bastion host is a type of firewall that generates audit trails of all network related activity for monitoring and intrusion detection purposes. It acts as a secure gateway between an internal network and an external network, providing an additional layer of security. By logging all network activity, a bastion host can help identify any unauthorized access attempts or suspicious behavior, allowing for timely response and mitigation of potential threats.

Submit
99. What is a comprehensive evaluation and validation of an Air Force information system(IS)to establish the degree which it complies with assigned information assurance(IA) controls based on standardized procedures?

Explanation

Certification refers to the comprehensive evaluation and validation of an Air Force information system (IS) to determine the extent to which it complies with assigned information assurance (IA) controls using standardized procedures. It involves assessing the system's security measures, controls, and processes to ensure that it meets the required standards and is suitable for operation. Certification is an essential step in the accreditation process, which involves granting official approval for the system to be used in a specific environment.

Submit
100. What process along with AFI 33-210 Air Force certification and accreditation program provides the basic framework of the certification and accreditation?

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 31, 2012
    Quiz Created by
    Vpucke11
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What type of network is made up of components from the same vendor or...
What is the process of erasing magnetic media by reducing the magnetic...
What documentation signifies that a system is not allowed to connect...
What operational simple simple network management protocol(SNMP)...
Knowledge-based identification and authentification methods require...
How many users are in a multi server network?
What is the  primary unclassified pki token for individual pki...
What type of network environments consist of computer systems from...
How many users are in a single server network?
How many users are in a mulit server high speed backbone network?
What documentation is required to permanently connect to the global...
What is the minimum number of computers needed for a computer network?
What is used to identify network nodes on a physically connected...
What network management area is concerned with controlling access...
What are three primary ways to authenticate one-self?
How many users are usually in a peer to peer network?
What is a privately owned network whose access is restricted to...
What operational simple simple network management protocol(SNMP)...
What is the database of record for registering all systems and...
What series of the Air Force instruction series covers communications...
What is the preferred method of sanitizing magnetic media?
A base web server that interfaces with with the public must be placed...
What is a cryptographic key and certificate delivery system that makes...
What provides information concerning the bandwidth utilization and the...
What operational simple network management protocol(SNMP) message asks...
What is the process of physically damaging the media to render it...
What network architecture has a network management platform on one...
What network device performs rigorous examinations of systems to...
How many octets is the standard internet protocol broken down into?
Who provides uninterrupted flow of mission critical information to...
What program is known as a state of the art ground to ground...
What is a communications network that serves users within a confined...
What network entity provides reliable,secure networks and network...
What component of the systems management automated report tracking...
Which compnent of the public key infrastructure is responsible for...
What is a measure used to verify the eligibilty of a subject and...
What type of communications network links different interconnected...
What do you call currrent and perceived capibility,intention,or...
Which function of performance management tracks historical data by...
According to the Air Force network structure,what tier is the Air...
What operational simple network management protocol(SNMP) message is...
What type of malicious logic can become active on an information...
What is a file that is kept with you and will allow you to decrypt...
An information system on your network that is not set to require the...
What is the host ID od internet protocol address 131.10.230.120/24?
What is a collection of of computing environments connected by...
What is the intrusion practice of encapsulating a message that would...
What type of malicious logic can form large networks that can be used...
What type of communications network links geographically dispersed...
The two ways key establishment can occur are key?
What automatically runs in the backround when the protocol analyzer...
What device is placed outside the boundary protection mechanism to...
What are examples of of network attacks that bypass the firewall?
What is formal declaration by a designated approving official(DAA)...
Which of the following are the most common network management...
Sustained comminications support becomes a part of the deployment if...
A program that replicates by attaching itself to a program is a?
The Air Force requires a network password to be at least how many...
Which standard form is used to annotate storage media has been...
What color on the systems management automated report tracking...
What is the department of defense process for certifying and...
What area of the simple network management protocol(SNMP) node is...
Which public key algorithum is exclusively a key establishment...
What is the binary equivalent to the dotted decimal number 96?
Which team provides a communication link between forces securing the...
Storage media that retains data after power is removed is considered?
What is the simplest and least expensive way to stop inappropiate...
What area of the simple network management protocol(SNMP) tree...
What network architecture uses multiple systems for network...
Performance management can be broke into what two seperate functional...
Who can declassify storage media that has been sanitized?
What are the three types of  systems management...
Network management protocols are designed in most cases to reside...
What is the network ID of internet protocol address 131.10.230.120/24
What is established to distinguish between errors that fall between a...
What Air Force instruction provides policy,direction,and structure for...
What is the type of probe that collects inter device connectivity...
What is an electonic dcoument that offically links together a...
What type of firewall is used to separate secure...
What level of network activity are you working at when you working at...
Which agency must approve all information protection tools prior to...
What regulation covers remanence security?
What device provides information concerning the network utilization...
What can be used to encrypt a message so that it can only be decrypted...
What do you call the consolidated list of requirments that a...
What is a hierarchical structured format that defines the network...
How many different categories of information does the performance...
How many bits are typically covered in an internet protocol version 6...
What reports errors that occur at the physical layer such as bad frame...
What is defined as a bundle of application software designed to...
What action represents one of the greatest vulnerabilities to internal...
What centerpiece of a systems management automated report tracking...
How many non secure internet protocol router network(niprnet) gateways...
What level of network activity are you working at when you as the...
What device provides a capability for digital network diagnostics and...
What type of firewall consists of a screening  router and a set...
What type of communications network links a broad geographical region?
What type of firewall generates audit trails of all network...
What is a comprehensive evaluation and validation of an Air Force...
What process along with AFI 33-210 Air Force certification and...
Alert!

Advertisement