3DX5X CDC Vol 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Gtarrant
G
Gtarrant
Community Contributor
Quizzes Created: 2 | Total Attempts: 17,168
| Attempts: 6,428 | Questions: 124
Please wait...
Question 1 / 124
0 %
0/100
Score 0/100
1. What topology combines two or more different physical topologies in a single network?

Explanation

A hybrid topology combines two or more different physical topologies in a single network. This means that it can have different sections of the network using different topologies such as bus, ring, or star. This allows for greater flexibility and scalability in the network design, as different sections can be configured to meet specific requirements or preferences.

Submit
Please wait...
About This Quiz
3DX5X CDC Vol 2 - Quiz

This quiz, titled '3DX5X CDC Vol 2', assesses knowledge on network protocols as per the OSI model. It covers layers, their functions, and devices operating at each layer,... see morecrucial for professionals in communications and IT. see less

2. The ability to move about without being tethered by wires in wireless technology is called

Explanation

The correct answer is mobility. In wireless technology, mobility refers to the ability to move freely without being restricted by wires. This allows users to access and use devices or networks from different locations, providing convenience and flexibility. Mobility is a key feature of wireless technology that enables users to stay connected and access information on the go.

Submit
3. What are two anti-virus programs that the Air Force uses?

Explanation

The Air Force uses Norton and McAfee as their two anti-virus programs.

Submit
4. Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network

Explanation

An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. Employees have legitimate access to the network and can potentially compromise its security by either unintentionally falling victim to social engineering attacks or intentionally collaborating with external entities to breach the network's defenses.

Submit
5. What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks

Explanation

The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards, such as IEEE 802.11 (Wi-Fi), IEEE 802.15 (Bluetooth), and IEEE 802.16 (WiMAX), have played a crucial role in ensuring interoperability and reliable wireless communication. The IEEE is a renowned organization in the field of electrical and electronics engineering, and its contributions have greatly influenced the development and advancement of wireless technology.

Submit
6. The classification of a fill device is

Explanation

The correct answer states that a fill device is classified as soon as a key is loaded, and it holds the classification of the loaded key. This means that the classification of the fill device is determined by the key that is loaded into it. Once a key is loaded, the fill device takes on the classification of that key. This implies that the fill device can have different classifications depending on the key that is loaded into it.

Submit
7. The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a

Explanation

A driver is a special program that acts as a bridge between the operating system and hardware devices that are not directly attached to the computer's motherboard. It facilitates communication and enables the operating system to send commands and receive data from these external hardware devices. Without a driver, the operating system would not be able to interact with or control these devices effectively.

Submit
8. What was the first disk operating system developed to operate on a wide range of computer systems?

Explanation

UNIX was the first disk operating system developed to operate on a wide range of computer systems. It was created in the 1960s at Bell Labs and was designed to be portable and flexible, allowing it to run on different hardware architectures. UNIX introduced many innovative features, such as a hierarchical file system, multitasking, and a command-line interface, which made it highly influential in the development of modern operating systems. Its portability and versatility made UNIX widely adopted in academic, government, and commercial settings, solidifying its position as the first widely used disk operating system for multiple computer systems.

Submit
9. What concerns slowed the military's adoption of wireless network technology?

Explanation

The military's adoption of wireless network technology was slowed down due to concerns regarding both security and reliability. This means that the military was hesitant to implement wireless networks because they were worried about the potential vulnerabilities and risks associated with wireless communication, as well as the need for a reliable and stable network connection. These concerns highlight the importance of ensuring the security and reliability of wireless networks in a military context.

Submit
10. Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?

Explanation

The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of rules and protocols that allows for reliable and secure communication between devices on a network. It is widely used in the internet and is known for its robustness and scalability. The decision to adopt TCP/IP as the standard protocol by the Department of Defense highlights its effectiveness and widespread acceptance in the field of networking.

Submit
11. What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?

Explanation

A Wide Area Network (WAN) is a type of network that connects networks that are typically separated by geographical distances between cities, states, countries, or around the world. Unlike a Local Area Network (LAN) which is confined to a small area, a WAN allows for long-distance communication and connects multiple LANs together. A Virtual Private Network (VPN) is a technology that allows secure remote access to a private network over a public network, and a Metropolitan Area Network (MAN) connects networks within a specific geographic area, such as a city.

Submit
12. What directory is always identified by the slash symbol (/) and is in the "a" partition?

Explanation

The directory that is always identified by the slash symbol (/) and is in the "a" partition is the root directory. The root directory is the top-level directory in a file system hierarchy and serves as the starting point for navigating the file system. It contains all other directories and files in the system.

Submit
13. While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?

Explanation

The liquid crystal display (LCD) is a feature that lets you know that you have dialed the correct number at the proper level of security while using the Red Switch. The LCD provides visual feedback by displaying the dialed number or other relevant information, ensuring that the correct number has been entered. This feature allows for easy verification and confirmation of the dialed number, enhancing the security and accuracy of the communication process.

Submit
14. Final reports of a communication security incident are due

Explanation

The correct answer is 30 days after the initial report is issued. This means that the final reports for a communication security incident should be submitted within 30 days from the date the initial report was officially issued.

Submit
15. What is a formal set of rules and conventions that govern how computers exchange information over a network medium?

Explanation

A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It ensures that data is transmitted and received correctly, and defines the format, timing, sequencing, and error control of the communication. A protocol acts as a common language that allows different devices and systems to communicate effectively and efficiently.

Submit
16. What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet

Explanation

A Virtual Private Network (VPN) is a type of network that uses tunneling and security protocols to enable a group of two or more computer systems to communicate over the public Internet. VPNs provide a secure and encrypted connection between the computers, allowing them to send and receive data as if they were directly connected to a private network. This makes VPNs particularly useful for remote workers or for accessing private networks while connected to a public network, such as the internet.

Submit
17. Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?

Explanation

An IPv4 address is divided into different classes based on the range of values in the first octet. Class A addresses have a first octet range of 1-126, which means that any IP address falling within this range belongs to Class A. Class A addresses are used for large networks, as they provide a large number of host addresses.

Submit
18. What is the type of memory that retains data after power is removed or lost?

Explanation

Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which requires a constant power source to retain data, nonvolatile memory can store information for long periods without power. This type of memory is commonly used in devices such as hard drives, solid-state drives, and flash memory, where data needs to be stored even when the device is turned off or loses power.

Submit
19. What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?

Explanation

The 80/20 rule refers to the principle that 80% of the data should be local to a segment, while 20% of the data should be destined to traverse a bridge to the other segment. This rule helps in determining the distribution of data between segments, ensuring that a majority of the data stays within the local segment, reducing the need for unnecessary data transfer and optimizing network efficiency.

Submit
20. What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?

Explanation

Store-and-forward is the method where the entire frame is received and stored in the buffer before being forwarded to the appropriate port for delivery. This method also includes performing an error check on the frame to ensure its integrity before transmission. Cross-over, fragment-free, and adaptive are not relevant to this specific process.

Submit
21. Applications are software programs designed to perform what type of tasks?

Explanation

Applications are software programs designed to perform specific tasks. Unlike general software programs that have a wide range of functionalities, applications are created with a focused purpose in mind. They are tailored to meet the specific needs of users, whether it be for productivity, communication, entertainment, or any other specific task.

Submit
22. What topology defines the way in which devices communicate, and data is transmitted, throughout the network?

Explanation

Logical topology refers to the way in which devices are connected and communicate with each other in a network, regardless of their physical location. It defines the pathways that data takes as it is transmitted between devices. Unlike physical topology, which focuses on the actual physical connections between devices, logical topology is concerned with the logical relationships between devices. It determines how data is transmitted, routed, and controlled within the network, allowing for efficient communication and data transfer.

Submit
23. What topology consists of devices connected to a common, shared cable?

Explanation

Bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable, known as the bus. Each device on the network can transmit data onto the bus, and all other devices on the network can receive that data. It is a simple and cost-effective topology, but it has the disadvantage of being susceptible to a single point of failure, as if the main cable is damaged, the entire network may go down.

Submit
24. What IPv4 reserved address is used for loop back?

Explanation

The IPv4 reserved address used for loop back is 127.0.0.1. This address is commonly referred to as the loopback address and is used to test network connectivity on a local machine. When a packet is sent to this address, it is looped back to the same machine without being transmitted on the network. This allows for testing and troubleshooting network applications without the need for an external network connection.

Submit
25. Which landline transmission medium is the primary carrier of voice communications?

Explanation

Twisted pair cable is the primary carrier of voice communications because it is a widely used transmission medium for telephone systems. It consists of two insulated copper wires twisted together, which helps to minimize interference and crosstalk. The twisted pair cable is capable of carrying analog signals, such as voice, over long distances without significant degradation in quality. It is cost-effective, easy to install, and suitable for both residential and commercial applications, making it the preferred choice for voice communication.

Submit
26. Which of the following is not one the four security threats to Wireless Local Area Network?

Explanation

Direct Connections is not considered one of the four security threats to Wireless Local Area Network because it refers to a legitimate method of connecting devices to a network using a physical cable, rather than wirelessly. Rogue Access Points, War Drivers, and Hackers, on the other hand, are all potential security threats to wireless networks.

Submit
27. What do routing algorithms initialize and maintain to aid the process of path determination?

Explanation

Routing algorithms initialize and maintain routing tables to aid the process of path determination. Routing tables contain information about the network topology, including the available paths, costs, and next-hop routers. By using these tables, routing algorithms can determine the most efficient path for data packets to reach their destination. Routing tables are regularly updated and maintained to adapt to changes in the network, such as link failures or new routes becoming available. They play a crucial role in ensuring efficient and reliable communication within a network.

Submit
28. An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as

Explanation

A full accreditation refers to the decision that allows a system to operate in the environment it was originally intended for. This means that the system has met all the necessary requirements and standards to operate effectively and safely in its designated environment. It signifies that the system has been thoroughly evaluated and deemed suitable for its intended purpose, providing assurance to stakeholders that it meets all necessary criteria.

Submit
29. What topology consists of cable segments from each computer connected to a centralized component?

Explanation

A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this configuration, all communication between computers passes through the central component, making it easier to manage and troubleshoot the network. Each computer has its own dedicated connection to the central component, which improves performance and allows for easier expansion of the network.

Submit
30. An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC

Explanation

An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC incident.

Submit
31. What best describes an unintended signals or noise appearing external to a piece of communications equipment?

Explanation

Emanation best describes unintended signals or noise appearing external to a piece of communications equipment. Emanation refers to the unintentional release of electromagnetic signals or radiation from electronic devices, which can potentially interfere with other nearby devices or be intercepted by unauthorized individuals. This can lead to security risks and compromise the confidentiality of sensitive information.

Submit
32. The computing part of the computer is the central processing unit, also called the

Explanation

The central processing unit (CPU) is the computing part of a computer that performs all the necessary calculations and operations. It is responsible for executing instructions, managing data, and controlling the overall operation of the computer. The microprocessor is a key component of the CPU, acting as its brain and carrying out the actual processing of data. It is a small chip that contains millions of transistors and circuits, allowing it to perform complex calculations and operations at high speeds. Therefore, the microprocessor is the correct answer as it accurately represents the computing part of the computer.

Submit
33. An optical communications system is comprised of a

Explanation

The correct answer is transmitter, cable, and receiver. In an optical communications system, the transmitter is responsible for converting electrical signals into optical signals, which are then transmitted through a cable made of optical fibers. The receiver at the other end of the cable receives the optical signals and converts them back into electrical signals. Therefore, the transmitter, cable, and receiver are the essential components of an optical communications system.

Submit
34. Which of the following is not one of the three advantages to using wireless technology?

Explanation

Safety is not one of the three advantages to using wireless technology because it can pose security risks and vulnerabilities. While wireless technology offers ease of installation, lower cost, and mobility, it may also be susceptible to unauthorized access, data breaches, and interference. Therefore, safety is not a direct advantage of wireless technology, but rather a concern that needs to be addressed and managed.

Submit
35. Dynamic routing automatically calculates the best path between how many nodes?

Explanation

Dynamic routing automatically calculates the best path between two nodes. It analyzes various factors such as network congestion, link quality, and other metrics to determine the most efficient route for data packets to travel between the source and destination nodes. By dynamically adjusting the routing paths based on real-time conditions, dynamic routing protocols ensure optimal network performance and efficient utilization of network resources.

Submit
36. What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

Explanation

File Transfer Protocol (FTP) is the correct answer because it is the application within TCP/IP that is specifically designed for sending and receiving files. FTP allows users to transfer files between a client and a server over a network, using TCP as the underlying protocol for reliable data transmission. FTP provides a set of commands for navigating and manipulating files on the server, making it a widely used protocol for file transfer over the internet.

Submit
37. Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

Explanation

IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four sections, each representing an octet of the address. Each octet is represented as a decimal number ranging from 0 to 255, separated by dots. This format is easier for users to understand and remember compared to binary, hexadecimal, or octal formats.

Submit
38. The core operating-system function is the management of the computer system which resides with the

Explanation

The kernel is responsible for managing the core functions of the operating system. It acts as the bridge between the hardware and software, handling tasks such as memory management, process scheduling, and device drivers. The kernel is essential for the proper functioning of the computer system, making it the correct answer in this case.

Submit
39. The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code?

Explanation

The Global Positioning System (GPS) program is responsible for maintaining GPS time to within 1 microsecond of universal time code. This means that the time provided by GPS is accurate up to a millionth of a second compared to the universal time code. GPS time is crucial for various applications such as navigation, telecommunications, and scientific research, where precise timing is essential.

Submit
40. Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction?

Explanation

COMPUSEC, short for computer security, is the applied discipline that applies measures and controls to protect data in computer systems against unauthorized disclosure, modification, or destruction. It involves implementing various security measures such as firewalls, encryption, access controls, and intrusion detection systems to safeguard computer systems and the data they contain.

Submit
41. Which condition exists when there is no apparent terrorist activity against computer networks?

Explanation

INFOCON 5 indicates that there is no apparent terrorist activity against computer networks. This means that the threat level is at its lowest, suggesting that there are currently no known or visible terrorist activities targeting computer networks. Therefore, INFOCON 5 represents a condition of minimal or no threat in terms of terrorist activities against computer networks.

Submit
42. The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?

Explanation

The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for managing the flow of data between devices and providing error control. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical media and handling the transmission of data frames. These two sublayers work together to ensure reliable and efficient communication between devices in a network.

Submit
43. What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?

Explanation

Voltage is applied across Liquid Crystal Display (LCD) material to change its alignment and light polarizing property. By applying voltage, the liquid crystals in the display can be aligned in a specific way, which affects the polarization of light passing through them. This alignment change allows the display to control the amount of light that passes through different areas, thus creating the desired image or text. Therefore, voltage is the correct answer as it directly influences the alignment and polarizing properties of the LCD material.

Submit
44. What is the name of the standard all-purpose shell most commonly used?

Explanation

The correct answer is Bourne shell. The Bourne shell is the standard all-purpose shell that is widely used in Unix-like operating systems. It was developed by Stephen Bourne and is known for its simplicity and efficiency. The Bourne shell provides a command-line interface for users to interact with the operating system and execute various commands and scripts. It is considered the foundation for many other shells that have been developed later, making it a commonly used and important shell in the Unix world.

Submit
45. What type of Defense Switched Network precedence call cannot be preempted?

Explanation

Flash Override is a type of Defense Switched Network precedence call that cannot be preempted. Preemption refers to the ability to interrupt or cancel a lower priority call in order to make room for a higher priority call. In the case of Flash Override calls, they are given the highest priority and cannot be interrupted or preempted by any other type of call, including Flash, Priority, or Intermediate. Therefore, Flash Override calls take precedence over all other types of calls in the Defense Switched Network.

Submit
46. What Open System Interconnect layer is closest to the end user?

Explanation

The Open System Interconnect (OSI) model is a conceptual framework that describes how network protocols interact and communicate with each other. It consists of seven layers, with the Application layer being the closest to the end user. The Application layer provides services directly to the user, such as web browsing, email, and file transfer. It interacts with the user and initiates communication with the lower layers of the OSI model to transmit and receive data over the network. Therefore, the Application layer is the correct answer as it is the layer closest to the end user.

Submit
47. What topology defines the layout of a network's devices and media?

Explanation

The correct answer is physical because the physical topology refers to the actual layout of the devices and media in a network. It describes how the devices are physically connected to each other and to the network media, such as cables or wireless connections. This includes the arrangement of devices, the type of cables used, and the location of network components. On the other hand, logical topology refers to how data flows within the network, independent of the physical layout.

Submit
48. What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting

Explanation

The correct answer is Internet Control Message Protocol. The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging services for troubleshooting purposes. It is used to send error messages and operational information, such as network congestion or unreachable hosts, between network devices. ICMP messages are crucial for diagnosing and resolving network issues, as they allow network administrators to identify and troubleshoot problems in the network.

Submit
49. How many bits are in an IPv4 address?

Explanation

An IPv4 address is a 32-bit binary number, divided into four octets, each containing 8 bits. Therefore, the correct answer is 32 bits.

Submit
50. What is the default classful subnet mask on class B networks?

Explanation

The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for 16 bits to be used for the network portion of the IP address and 16 bits for the host portion. This means that class B networks can have up to 65,536 hosts on each network.

Submit
51. What two main components make up the central processing unit?

Explanation

The central processing unit (CPU) consists of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for managing and coordinating the operations of the CPU, including fetching and decoding instructions, while the ALU performs mathematical and logical operations, such as addition, subtraction, and comparisons. Together, these two components work in tandem to carry out the instructions and process data within the CPU.

Submit
52. This type of bridge is used to convert one Data Link layer protocol to another.

Explanation

A transnational bridge is used to convert one Data Link layer protocol to another. This means that it can take data from one network using a specific protocol and convert it into a different protocol so that it can be transmitted over another network. This type of bridge is commonly used in situations where different networks with different protocols need to communicate with each other.

Submit
53. Which of these is an example of an Exterior Gateway Protocol?

Explanation

Border Gateway Protocol (BGP) is an example of an Exterior Gateway Protocol (EGP). BGP is used to exchange routing information between different autonomous systems (AS) on the internet. It allows routers in different ASs to communicate and exchange information about the best paths for routing traffic. BGP is a widely used protocol in large-scale networks and is responsible for ensuring efficient routing and connectivity between different networks on the internet.

Submit
54. Analog modems are used over the voice band range of

Explanation

Analog modems are used over the voice band range of 20 Hz to 20 kHz. This range corresponds to the frequency range of human voice, which is the range of frequencies that can be transmitted over telephone lines. Analog modems convert digital signals to analog signals for transmission over these telephone lines, allowing for communication between devices. The given answer accurately represents the frequency range used by analog modems for transmitting data.

Submit
55. Which one is not a category of the operating system's task categories

Explanation

The correct answer is "Troubleshoot interface" because it is not a category of the operating system's task categories. The operating system's task categories typically include user interface, memory management, and processor management. The troubleshoot interface is not a specific task category, but rather a feature or functionality that may be included within the user interface or other categories to assist in troubleshooting issues or problems with the operating system.

Submit
56. Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?

Explanation

OPSEC, or Operations Security, is the correct answer. OPSEC is a security program that involves identifying critical information and analyzing friendly actions in order to protect sensitive information and prevent adversaries from gaining an advantage. It is commonly used in military operations and other activities to ensure the confidentiality, integrity, and availability of information. EMSEC (Emissions Security), COMSEC (Communications Security), and COMPUSEC (Computer Security) are other important security programs, but they do not specifically focus on identifying critical information and analyzing friendly actions like OPSEC does.

Submit
57. What is the COMSEC program designed to do?

Explanation

The COMSEC program is designed to detect and correct procedural weaknesses that could expose critical information. This means that it focuses on identifying and addressing any vulnerabilities in procedures or protocols that could potentially lead to the compromise of sensitive information. By doing so, the program aims to enhance the overall security and protection of critical information.

Submit
58. Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

Explanation

Port 8080 is commonly used for HTTP servers and proxies. While port 80 is the standard port for HTTP, port 8080 is often used as an alternative when port 80 is already in use or blocked. Port 110 is used for POP3 email protocol, and port 443 is used for secure HTTPS communication.

Submit
59. What is a mechanism that allows a network device to divide an IP address into a network and host number

Explanation

A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address represents the network and which part represents the host. The subnet mask consists of a series of binary digits that correspond to the number of bits used for the network portion of the IP address. By applying the subnet mask to the IP address, the device can determine the network address and the host address, allowing for proper routing and communication within the network.

Submit
60. What encryption device may you rarely see due to its lower maximum data rate?

Explanation

The TSEC/KIV-7 encryption device is rarely seen due to its lower maximum data rate. This suggests that the device is not commonly used because it has a slower data processing capability compared to other encryption devices listed.

Submit
61. The main function of the Data Service Unit is to

Explanation

The correct answer is to adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment. The Data Service Unit (DSU) acts as an interface between the customer's equipment and the telephone carrier's equipment. It takes the digital data stream produced by the customer's equipment and converts it to the signaling standards used by the telephone carrier's equipment. This ensures compatibility and proper transmission of data between the two systems.

Submit
62. What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?

Explanation

The maximum asynchronous data rate for the Defense Red Switch Network (DRSN) is 19.2 Kbps. This means that the network is capable of transmitting data at a rate of 19.2 kilobits per second.

Submit
63. What is the purpose of the standardized tactical entry point terminal?

Explanation

The purpose of the standardized tactical entry point terminal is to provide a secure communication link between commanders in the field and the National Command Authority. This allows commanders to have direct access to vital information and instructions from higher levels of command, ensuring effective and timely decision-making. The terminal serves as a reliable and efficient means of communication, enabling commanders to stay connected and informed even in challenging operational environments.

Submit
64. At what Open System Interconnect layer do routers operate?

Explanation

Routers operate at the network layer of the Open System Interconnect (OSI) model. The network layer is responsible for routing and forwarding data packets between different networks. Routers use IP addresses to determine the best path for data packets to reach their destination. They make decisions based on network layer protocols such as IP (Internet Protocol) and ICMP (Internet Control Message Protocol). Routers play a crucial role in connecting multiple networks together and ensuring efficient data transmission across the internet.

Submit
65. What IPv4 class address is used for networks with about 250 nodes?

Explanation

Class C IPv4 addresses are used for networks with about 250 nodes. Class C addresses have a range of 192.0.0.0 to 223.255.255.255 and provide 24 bits for the network portion and 8 bits for the host portion. This allows for a maximum of 2^8 (256) possible network addresses, with each network capable of accommodating up to 2^8 (256) hosts. Therefore, a Class C address is suitable for networks with approximately 250 nodes.

Submit
66. Software is generally divided into

Explanation

This answer is correct because it accurately identifies the three main categories of software: systems software, operating systems software, and applications software. Systems software refers to software that manages and controls the computer hardware, such as operating systems and utility programs. Operating systems software specifically refers to the software that manages computer hardware and software resources and provides common services for computer programs. Applications software refers to software that is designed for specific tasks or applications, such as word processors, spreadsheets, or graphic design programs. Therefore, the correct answer includes all three categories of software.

Submit
67. One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it?

Explanation

The Datacenter Edition of Windows Server is specifically designed to support high-end, high traffic application servers. It offers advanced features such as unlimited virtualization rights, high availability, and scalability. This edition is suitable for organizations that require a robust and reliable operating system to handle heavy workloads and demanding applications. The Web Edition, on the other hand, is more suitable for hosting websites and web applications, while NT and AERO are not specific editions of Windows Server.

Submit
68. This component of the Global Information Grid consists of those items that are necessary to directly connect the warfighter to the global network

Explanation

The Warrior component is the correct answer because it refers to the items that directly connect the warfighter to the global network. This component includes the necessary equipment, devices, and systems that enable communication and information sharing between the warfighter and the global network. It plays a crucial role in ensuring that the warfighter has access to the resources and capabilities of the Global Information Grid, allowing them to effectively carry out their missions and tasks.

Submit
69. What is the difference between a hub router and a premise router?

Explanation

not-available-via-ai

Submit
70. How are non-internet protocols sent across the Secret Internet Protocol Router Network

Explanation

Non-internet protocols are encapsulated by the internet protocol before being transmitted across the SIPRNET. This means that the non-internet protocols are wrapped within the internet protocol packets, allowing them to be transmitted over the SIPRNET network. The encapsulation process ensures that the non-internet protocols can be properly transmitted and understood by the receiving end on the SIPRNET.

Submit
71. What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another

Explanation

The DISN backbone is the correct answer because it provides the conduit for Joint Worldwide Intelligence Communication System (JWICS) data transmission from one location to another. The DISN backbone is a global network infrastructure that connects various military and government organizations, allowing them to securely transmit and exchange information. It ensures reliable and efficient communication between different locations, enabling the seamless transfer of JWICS data.

Submit
72. What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?

Explanation

The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data over the network, including the physical media, connectors, and signaling. It ensures that the data is transmitted reliably and accurately between devices.

Submit
73. Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?

Explanation

IPv6 addresses are expressed in a colon hexadecimal format to make them more user-friendly. This format uses groups of four hexadecimal digits separated by colons. This allows for a larger address space and simplifies the representation of IPv6 addresses compared to the binary format used in IPv4. The use of hexadecimal digits also makes it easier for humans to read and remember the addresses.

Submit
74. What layer of the open system interconnection model do routers operate?

Explanation

Routers operate at Layer 3 of the OSI model, which is the network layer. This layer is responsible for logical addressing, routing, and forwarding of data packets between different networks. Routers use IP addresses to determine the best path for data packets to reach their destination, making decisions based on network protocols and routing tables. Layer 3 is crucial for interconnecting multiple networks and enabling communication between them.

Submit
75. Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts?

Explanation

The correct answer is Workgroup. In a workgroup network model, each computer operates independently and manages its own user accounts. There is no centralized control or management of user accounts. This means that each computer has its own set of user accounts and passwords, and users must create and manage separate accounts on each computer they want to access.

Submit
76. What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?

Explanation

The Address Resolution Protocol (ARP) is the network layer protocol that provides the service of matching a known IP address for a destination device to a Media Access Control (MAC) address. ARP is used to resolve IP addresses to MAC addresses in a local network environment. When a device wants to communicate with another device on the same network, it uses ARP to find the MAC address corresponding to the IP address of the destination device. This allows for successful communication at the data link layer.

Submit
77. What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

Explanation

The correct answer is Transmission Control Protocol (TCP). TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without any errors or loss. TCP uses acknowledgment and retransmission mechanisms to guarantee reliable delivery, making it suitable for applications that require accurate and complete data transmission, such as web browsing and file transfer.

Submit
78. How many peripherals can a Universal Serial Bus handle at once?

Explanation

A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because the USB specification supports a maximum of 127 unique device addresses, each of which can be assigned to a peripheral device. Therefore, any additional peripherals beyond this limit would not be recognized or supported by the USB.

Submit
79. What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

Explanation

A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of the incoming frames and making forwarding decisions based on the destination address. By doing so, it can filter and control the flow of traffic between the segments, reducing collisions and improving network performance. Unlike a hub, which simply broadcasts all incoming traffic to all connected devices, a bridge selectively forwards traffic only to the intended destination, making it an efficient solution for dividing a network into separate segments.

Submit
80. What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?

Explanation

The TSEC/KIV-19 encryption device is certified to secure all classification levels and categories and is capable of encrypting trunk-level high-speed circuits. This device is specifically designed to provide secure communication and encryption for sensitive information across various levels of classification. It is a trusted and reliable solution for protecting data and ensuring the confidentiality and integrity of communications.

Submit
81. Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network

Explanation

The Defense Information Systems Agency (DISA) is responsible for the design, acquisition, and single systems management of the Defense Switched Network. DISA is an agency of the Department of Defense and provides information technology and communications support to the military. They are responsible for ensuring secure and efficient communication systems for the defense sector, including the Defense Switched Network, which is a global voice and data network used by the military.

Submit
82. Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as

Explanation

Sensitive but unclassified information refers to information that is not classified but still requires protection due to its potential to cause harm if disclosed. In the context of national security, disclosing information that could lead to loss, misuse, modification, or unauthorized access may have adverse effects on the security of a nation. Therefore, sensitive but unclassified is the best description for such information, as it highlights the need for protection without indicating a specific classification level.

Submit
83. What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?

Explanation

Reverse Address Resolution Protocol (RARP) is the correct answer because it is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request its corresponding IP address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.

Submit
84. How many devices can connect to a FireWire bus?

Explanation

A FireWire bus can support up to 63 devices. This is because the FireWire protocol uses a 6-bit device address field, allowing for a maximum of 2^6 - 1 (63) unique addresses. Each device connected to the bus is assigned a unique address, and therefore, the maximum number of devices that can be connected is 63.

Submit
85. What forwarding method is also known as runtless switching?

Explanation

Fragment-free forwarding is also known as runtless switching because it is a method of forwarding network packets that examines the first 64 bytes of the frame before forwarding it. This ensures that any fragments or runts (undersized packets) are not forwarded, preventing errors and collisions on the network. This method strikes a balance between the thoroughness of store-and-forward forwarding and the speed of cut-through forwarding, making it ideal for environments where error checking is important but low latency is also desired.

Submit
86. Which form is used as a visitor register log to record visitors into restricted areas?

Explanation

AF Form 1109 is the correct answer because it is used as a visitor register log to record visitors into restricted areas. This form is specifically designed for documenting visitor information, such as their name, organization, purpose of visit, and the date and time of entry and departure. It helps maintain a record of all individuals who enter restricted areas, ensuring security and accountability.

Submit
87. What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?

Explanation

Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally routable. They allow for communication within the site without the need for external routing. Site-local addresses were defined in older versions of the Internet Protocol (IPv6) but have been deprecated in favor of Unique Local Addresses (ULA).

Submit
88. What encryption device is capable of loading up to 500 keys?

Explanation

The AN/CYZ-10 /DTD is capable of loading up to 500 keys.

Submit
89. Which system provides support for features such as Windows System Resource Manager and Metadirectory Services

Explanation

Enterprise Edition provides support for features such as Windows System Resource Manager and Metadirectory Services. These features are typically required in large-scale enterprise environments where resource management and directory services are crucial for efficient operation. AERO, Standard Edition, and Datacenter Edition do not specifically mention support for these features, making Enterprise Edition the most suitable choice.

Submit
90. Which pathnames begin at the current working directory

Explanation

Relative pathnames begin at the current working directory. They are specified relative to the current directory and do not include the complete path from the root directory. Instead, they provide a path that is relative to the current location. This means that the file or directory being referenced is located in a location that is relative to the current working directory.

Submit
91. Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?

Explanation

The responsibility for maintenance of the sustaining base portion of the Defense Information System Network lies with the service that owns the installation. This means that the specific branch of the military that operates and maintains the installation is responsible for the upkeep and maintenance of the network.

Submit
92. At what Open System Interconnect layer do network switches and bridges operate?

Explanation

Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes. Switches and bridges use MAC addresses to forward data packets within a local area network (LAN). They examine the destination MAC address in the data frames and make forwarding decisions based on this information. Therefore, the correct answer is Data Link.

Submit
93. What notation is expressed in zero compression for IPv6?

Explanation

The correct answer is "10AB::3:0:1234:5678." This is an example of zero compression notation in IPv6. Zero compression allows consecutive blocks of zeros to be represented by "::". In this case, "::" is used to represent the consecutive blocks of zeros between "10AB" and "3", as well as the consecutive blocks of zeros between "3" and "1234:5678". This notation helps to simplify and shorten the representation of IPv6 addresses.

Submit
94. A modem is a device that modulates

Explanation

A modem is a device that converts digital data into analog signals, which can then be transmitted over an analog medium such as a telephone line. This allows digital information to be transmitted over existing analog networks.

Submit
95. What is the first step in merging voice, data and video networks into one integrated network within the Air Force?

Explanation

The first step in merging voice, data, and video networks into one integrated network within the Air Force is to integrate traditional TDM switches with voice over IP systems. This means combining the existing TDM switches with VoIP technology to enable voice communication over the IP network. This integration allows for the convergence of voice, data, and video traffic onto a single network infrastructure, improving efficiency and reducing costs. It is a crucial step in achieving a unified and integrated network within the Air Force.

Submit
96. An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as

Explanation

The correct answer is "Telecommunications Electronic Material Protected from Emanating Spurious Transmissions." This term refers to the technical investigations conducted to protect electronic material from emitting unintended signals or information. It focuses on preventing the leakage of classified or sensitive information through electromagnetic emanations from data processing equipment.

Submit
97. Besides limiting connections to the Global Information Grid, what other Combat Information Transport Systems initiative will help increase network security

Explanation

The correct answer is eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated NOSCs. This initiative will help increase network security by streamlining and consolidating the network operation and security functions into two Integrated NOSCs. By eliminating the MAJCOM NOSC concept, there will be a more centralized and efficient approach to network security, allowing for better coordination and control over the network infrastructure. This will help in effectively managing and protecting the network from potential threats and vulnerabilities.

Submit
98. Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement?

Explanation

The correct answer is Routine use. A Privacy Act Statement is a document that informs individuals about how their personal information will be collected, used, and disclosed. The routine use section of the statement provides a list of where and why the information may be disclosed outside the Department of Defense (DOD). This section outlines the specific circumstances under which the information may be shared with other government agencies, organizations, or individuals. It ensures transparency and informs individuals about the potential disclosure of their personal information.

Submit
99. What form is used as a cover sheet to protect Privacy Act material?

Explanation

AF Form 3227 is used as a cover sheet to protect Privacy Act material.

Submit
100. What IPv4 class address is used for multicast addressing?

Explanation

Class D is the correct answer because it is the class of IPv4 addresses that is reserved for multicast addressing. Multicast addressing allows a single packet to be sent to multiple recipients simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255, and they are specifically designated for multicast group communication.

Submit
101. What notation is expressed in leading zero compression for IPv6?

Explanation

Leading zero compression is a notation used in IPv6 to simplify the representation of consecutive blocks of zeros. It allows for the removal of one or more consecutive blocks of zeros and replaces them with a double colon (::). In the given answer, the notation 1234:1234:0:0:1234:0:0:1234 represents the IPv6 address with leading zero compression. The consecutive blocks of zeros have been compressed to ::, making the representation shorter and more concise.

Submit
102. What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?

Explanation

The correct answer is Aggregatable Global. Aggregatable Global Unicast addresses are publicly accessible and allow for hierarchical design and allocation by breaking up the Network ID portion of the address into different areas. This enables efficient routing and management of IP addresses on a global scale. Site-local addresses are not publicly accessible and are limited to a specific site or organization. Link-local addresses are only used for communication within a single network segment. Aggregatable Local addresses are not a recognized scope for Unicast addresses.

Submit
103. This characteristic of the Global Information Grid ensures seamless transmission of information between different service branches

Explanation

Common policy and standards ensure seamless transmission of information between different service branches in the Global Information Grid. By having a common set of policies and standards, all branches can communicate and share information effectively and efficiently. This ensures that information flows smoothly and consistently across the entire system, regardless of the specific branch or service involved. Having common policies and standards also promotes interoperability and reduces potential barriers or conflicts that could arise from differences in processes or procedures. Therefore, common policy and standards are essential for the seamless transmission of information in the Global Information Grid.

Submit
104. Which organization assigns communication security incident report case numbers

Explanation

The Air Force Communications Agency assigns communication security incident report case numbers.

Submit
105. Which is an internet protocol encryption device that can be directly connected to Red local area networks?

Explanation

The KG-84 is an internet protocol encryption device that can be directly connected to Red local area networks. It is a secure communication device used to encrypt and protect sensitive information transmitted over the internet. The other options, KG-194, KIV-7, and KG175, are not specifically designed for direct connection to Red local area networks.

Submit
106. How is responsiveness provided in the Defense Switched Network?

Explanation

The correct answer is that the DSN offers precedence access thresholding. Precedence access thresholding is a feature provided by the Defense Switched Network (DSN) that allows for prioritization of communication traffic. This means that certain types of communication, such as emergency or high-priority messages, are given preferential treatment and are able to bypass normal traffic congestion. This helps to ensure that critical information is able to be transmitted quickly and efficiently, enhancing the responsiveness of the network.

Submit
107. At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?

Explanation

Tier 1 is responsible for the worldwide management and operational oversight of the defense information infrastructure globally. This suggests that Tier 1 has the highest level of authority and control over the management of the defense information infrastructure.

Submit
108. Guidance for posting information on Air Force web sites is outlined in

Explanation

The correct answer is AFI 33–129. This Air Force Instruction provides guidance for posting information on Air Force web sites. It outlines the rules and regulations that must be followed when posting content on these sites to ensure compliance with Air Force policies and procedures. It covers topics such as security, privacy, accessibility, and content management.

Submit
109. At what level do regional operation centers perform Network Operations (NETOPS) to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management?

Explanation

Regional operation centers perform Network Operations (NETOPS) at Tier 2 level. This means that they are responsible for ensuring operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management. Tier 2 is typically responsible for monitoring and managing network performance, troubleshooting issues, and coordinating with Tier 1 and Tier 3 support teams.

Submit
110. At what Open System Interconnect layer are common data compression and encryption schemes used?

Explanation

Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. This layer is responsible for formatting, encrypting, and compressing data to be transmitted over the network. It ensures that the data is in a format that can be understood by the receiving system. By using compression, the size of the data is reduced, optimizing network bandwidth. Encryption ensures the security and confidentiality of the data during transmission. Therefore, the correct answer is Presentation.

Submit
111. Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?

Explanation

INFOCON 4 indicates a condition where there is an increased risk of attack. Therefore, it requires the mandate of increased monitoring of all network system activities. This means that when the INFOCON level is at 4, organizations need to enhance their monitoring efforts to detect and respond to potential attacks more effectively.

Submit
112. Which security program is covered under AFI 10–701?

Explanation

OPSEC, which stands for Operations Security, is the security program that is covered under AFI 10-701. OPSEC is a process that identifies critical information and determines the vulnerabilities that can be exploited by adversaries. It involves analyzing threats and risks, developing countermeasures, and implementing measures to protect sensitive information. The other options, EMSEC (Emissions Security), COMSEC (Communications Security), and COMPUSEC (Computer Security), are also important security programs but are not specifically covered under AFI 10-701.

Submit
113. Official guidance on individual security clearances and permitting access to classified information can be found in

Explanation

AFI 31–501 is the correct answer because it is the official guidance that provides information on individual security clearances and granting access to classified information. It is likely that this document outlines the specific requirements and procedures for obtaining and maintaining security clearances, as well as the criteria for determining who is eligible for access to classified information. The other three options (AFI 31–301, AFI 31–401, and AFI 31–601) may be related to different topics or aspects of security, but they are not specifically focused on individual security clearances and access to classified information.

Submit
114. Which form is used with a transfer report to accompany a COMSEC package?

Explanation

The form used with a transfer report to accompany a COMSEC package is SF 153.

Submit
115. Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?

Explanation

INFOCON 2 is the correct answer because it indicates a higher level of readiness and awareness of potential threats. In this condition, non-essential networks can be taken offline and replaced with alternative communication methods as a precautionary measure to protect critical systems and data. This allows for increased security and reduces the risk of potential cyber attacks or disruptions.

Submit
116. What reference would you use for guidance on Air Force messaging?

Explanation

The correct answer is AFI 33–119. AFI 33–119 is the Air Force Instruction that provides guidance on Air Force messaging. It outlines the policies and procedures for creating, transmitting, and managing official messages within the Air Force. This instruction is the primary reference for Air Force personnel when it comes to messaging protocols and standards.

Submit
117. What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?

Explanation

Link-local addresses operate within a network segment and do not require a router to direct traffic. These addresses are automatically assigned to interfaces and are used for communication within the local network. They are not meant to be routed outside of the network segment and are only valid within that specific network.

Submit
118. The Air Force Information Assurance Program is detailed in

Explanation

The correct answer is AFI 33-200. This document details the Air Force Information Assurance Program. It provides guidelines and procedures for ensuring the confidentiality, integrity, availability, and non-repudiation of Air Force information systems and networks. AFI 33-200 covers topics such as risk management, incident response, security awareness training, and certification and accreditation of information systems. It is an essential resource for Air Force personnel involved in information assurance and cybersecurity.

Submit
119. Which form would you use to properly label removable storage media containing "confidential" information?

Explanation

The correct form to properly label removable storage media containing "confidential" information is SF 708.

Submit
120. When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected?

Explanation

When a risk of a network system attack has been identified, INFOCON 3 requires all unclassified dial-up connections to be disconnected. INFOCON, or Information Operations Condition, is a system used by the United States military to indicate the level of threat to computer networks. INFOCON 3 signifies an increase in risk and the need for heightened security measures. Disconnecting unclassified dial-up connections helps to mitigate the potential vulnerability and protect the network from potential attacks.

Submit
121. Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?

Explanation

The correct answer is B. In situations where security needs a strong deterrent against hostile acts, the resources designated as a priority are given the highest level of importance and attention. These resources are typically the ones that are most critical or vulnerable to attacks, and therefore require extra measures to ensure their protection.

Submit
122. What method borrows bits from the host field of an IP address to create a subnet?

Explanation

Classful subnet masking is a method that borrows bits from the host field of an IP address to create a subnet. In classful subnet masking, the IP address is divided into network and host portions based on predetermined class boundaries. The subnet mask is used to determine the size of the network and host portions. By borrowing bits from the host field, the network can be further divided into smaller subnets, allowing for more efficient use of IP addresses and better network management.

Submit
123. Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?

Explanation

The correct answer is C. In the context of security, resources designated priority refers to allocating more resources or attention to certain areas or assets. When the level of security requires a reasonable degree of deterrence against hostile acts, it is important to prioritize and allocate resources accordingly. Option C is the correct answer because it suggests that priority resources are provided in such situations.

Submit
124. Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat?

Explanation

A sustaining base refers to a fixed location that is located far away from combat zones. It is responsible for providing support and resources to the deployed warfighters. This means that it can be thousands of miles away from the actual combat area. Therefore, a person in a sustaining base can be located either in the deployed area of responsibility or in a fixed location far from combat.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 08, 2011
    Quiz Created by
    Gtarrant
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What topology combines two or more different physical topologies in a...
The ability to move about without being tethered by wires in wireless...
What are two anti-virus programs that the Air Force uses?
Who is an authorized client that may unknowingly or maliciously help...
What organization developed several wireless standards to meet the...
The classification of a fill device is
The path between the operating system and virtually all hardware not...
What was the first disk operating system developed to operate on a...
What concerns slowed the military's adoption of wireless network...
Which network protocol has the Department of Defense chosen as its...
What type of network connects networks that are typically separated by...
What directory is always identified by the slash symbol (/) and is in...
While you are using the Red Switch, what feature lets you know that...
Final reports of a communication security incident are due
What is a formal set of rules and conventions that govern how...
What type of network makes use of tunneling and security protocols to...
Using a range of 1–126 in the first octet of an IPv4 address,...
What is the type of memory that retains data after power is removed or...
What rule establishes the percent of data that should be local to a...
What is the method called when the entire frame is received and placed...
Applications are software programs designed to perform what type of...
What topology defines the way in which devices communicate, and data...
What topology consists of devices connected to a common, shared cable?
What IPv4 reserved address is used for loop back?
Which landline transmission medium is the primary carrier of voice...
Which of the following is not one the four security threats to...
What do routing algorithms initialize and maintain to aid the process...
An accreditation decision which allows a system to operate in an...
What topology consists of cable segments from each computer connected...
An uninvestigated or unevaluated occurrence that potentially...
What best describes an unintended signals or noise appearing external...
The computing part of the computer is the central processing unit,...
An optical communications system is comprised of a
Which of the following is not one of the three advantages to using...
Dynamic routing automatically calculates the best path between how...
What application within Transmission Control Protocol/Internet...
Instead of using binary, how are IPv4 addresses expressed to be more...
The core operating-system function is the management of the computer...
The Global Positioning System program is responsible for maintaining...
Which applied discipline applies measures and controls to protect data...
Which condition exists when there is no apparent terrorist activity...
The Institute of Electrical and Electronics Engineers divide the Open...
What do you apply across Liquid Crystal Display material to change the...
What is the name of the standard all-purpose shell most commonly used?
What type of Defense Switched Network precedence call cannot be...
What Open System Interconnect layer is closest to the end user?
What topology defines the layout of a network's devices and media?
What Transmission Control Protocol/Internet Protocol network layer...
How many bits are in an IPv4 address?
What is the default classful subnet mask on class B networks?
What two main components make up the central processing unit?
This type of bridge is used to convert one Data Link layer protocol to...
Which of these is an example of an Exterior Gateway Protocol?
Analog modems are used over the voice band range of
Which one is not a category of the operating system's task categories
Which of the following security programs is defined as a process of...
What is the COMSEC program designed to do?
Which is a common port that contains Hyper Text Transfer Protocol...
What is a mechanism that allows a network device to divide an IP...
What encryption device may you rarely see due to its lower maximum...
The main function of the Data Service Unit is to
What is the maximum asynchronous data rate for the Defense Red Switch...
What is the purpose of the standardized tactical entry point terminal?
At what Open System Interconnect layer do routers operate?
What IPv4 class address is used for networks with about 250 nodes?
Software is generally divided into
One of the Windows Server Editions operating systems provides support...
This component of the Global Information Grid consists of those items...
What is the difference between a hub router and a premise router?
How are non-internet protocols sent across the Secret Internet...
What provides conduit for Joint Worldwide Intelligence Communication...
What layer of the Open System Interconnect model defines the...
Instead of using binary, how are IPv6 addresses expressed to be more...
What layer of the open system interconnection model do routers...
Windows operating systems traditionally function in one of two network...
What Transmission Control Protocol/Internet Protocol network layer...
What Transmission Control Protocol/Internet Protocol transport layer...
How many peripherals can a Universal Serial Bus handle at once?
What is a Data Link layer network device that logically separates a...
What encryption device is certified to secure all classification...
Which organization is responsible for the design, acquisition, and...
Disclosure of information that would result in the loss, misuse,...
What Transmission Control Protocol/Internet Protocol network layer...
How many devices can connect to a FireWire bus?
What forwarding method is also known as runtless switching?
Which form is used as a visitor register log to record visitors into...
What Unicast address scope is designed to be private, internally...
What encryption device is capable of loading up to 500 keys?
Which system provides support for features such as Windows System...
Which pathnames begin at the current working directory
Who bears the responsibility for maintenance of the sustaining base...
At what Open System Interconnect layer do network switches and bridges...
What notation is expressed in zero compression for IPv6?
A modem is a device that modulates
What is the first step in merging voice, data and video networks into...
An unclassified term referring to technical investigations for...
Besides limiting connections to the Global Information Grid, what...
Providing a list of where and why the information will be disclosed...
What form is used as a cover sheet to protect Privacy Act material?
What IPv4 class address is used for multicast addressing?
What notation is expressed in leading zero compression for IPv6?
What Unicast address scope is publicly accessible with the Network ID...
This characteristic of the Global Information Grid ensures seamless...
Which organization assigns communication security incident report case...
Which is an internet protocol encryption device that can be directly...
How is responsiveness provided in the Defense Switched Network?
At which NETOPS level is responsibility for the worldwide management...
Guidance for posting information on Air Force web sites is outlined in
At what level do regional operation centers perform Network Operations...
At what Open System Interconnect layer are common data compression and...
Which condition requires the mandate of increased monitoring of all...
Which security program is covered under AFI 10–701?
Official guidance on individual security clearances and permitting...
Which form is used with a transfer report to accompany a COMSEC...
Which condition permits non-essential networks to be taken offline and...
What reference would you use for guidance on Air Force messaging?
What Unicast address scope operates within a network segment, and will...
The Air Force Information Assurance Program is detailed in
Which form would you use to properly label removable storage media...
When a risk of a network system attack has been identified, which...
Which resources designated priority is provided when the level of...
What method borrows bits from the host field of an IP address to...
Which resources designated priority is provided when the level of...
Which segment of the Defense Information System Network (DISN) may be...
Alert!

Advertisement