(215) What are two anti-virus programs that the Air Force uses?
(223) What concerns slowed the military's adoption of wireless network...
(207) The ability to move about without being tethered by wires in...
(217) What was the first disk operating system developed to operate on...
(207) Which landline transmission medium is the primary carrier of...
(207) Who is an authorized client that may unknowingly or maliciously...
(211) What is the method called when the entire frame is received and...
(201) What Open System Interconnect layer is closest to the end user?
(202) What topology defines the way in which devices communicate, and...
(215) The path between the operating system and virtually all hardware...
(207) Which of the following is not one the four security threats to...
(207) What organization developed several wireless standards to meet...
(212) What do routing algorithms initialize and maintain to aid the...
(217) What directory is always identified by the slash symbol (/) and...
(234) Which condition permits non-essential networks to be taken...
(204) What type of network makes use of tunneling and security...
(205) Using a range of 1–126 in the first octet of an IPv4...
(207) What is the type of memory that retains data after power is...
(210) What rule establishes the percent of data that should be local...
(212) Dynamic routing automatically calculates the best path between...
(215) Applications are software programs designed to perform what type...
(203) What application within Transmission Control Protocol/Internet...
(204) What type of network connects networks that are typically...
(201) The Institute of Electrical and Electronics Engineers divide the...
(213) The classification of a fill device is
(203) Which network protocol has the Department of Defense chosen as...
(206) What Unicast address scope is designed to be private, internally...
(207) The computing part of the computer is the central processing...
(207) Which of the following is not one of the three advantages to...
(201) What is a formal set of rules and conventions that govern how...
(202) What topology combines two or more different physical topologies...
(202) What topology combines two or more different physical topologies...
(203) What Transmission Control Protocol/Internet Protocol network...
(205) What IPv4 reserved address is used for loop back?
(206) What notation is expressed in zero compression for IPv6?
(202) What topology consists of devices connected to a common, shared...
(203) What Transmission Control Protocol/Internet Protocol network...
(205) How many bits are in an IPv4 address?
(201) What layer of the Open System Interconnect model defines the...
(225) While you are using the Red Switch, what feature lets you know...
(203) What Transmission Control Protocol/Internet Protocol transport...
(234) When a risk of a network system attack has been identified,...
(212) Which of these is an example of an Exterior Gateway Protocol?
(205) Instead of using binary, how are IPv4 addresses expressed to be...
(205) What is a mechanism that allows a network device to divide an IP...
(207) An optical communications system is comprised of a
(209) What do you apply across Liquid Crystal Display material to...
(210) This type of bridge is used to convert one Data Link layer...
(201) At what Open System Interconnect layer do routers operate?
(214) Analog modems are used over the voice band range of
(215) The core operating-system function is the management of the...
(204) Which is a common port that contains Hyper Text Transfer...
(205) What is the default classful subnet mask on class B networks?
(207) What two main components make up the central processing unit?
(202) What topology defines the layout of a network's devices and...
(203) What Transmission Control Protocol/Internet Protocol network...
(205) What IPv4 class address is used for networks with about 250...
(205) What IPv4 class address is used for multicast addressing?
(232) Which applied discipline applies measures and controls to...
(235) An accreditation decision which allows a system to operate in an...
(208) How many peripherals can a Universal Serial Bus handle at once?
(213) What encryption device may you rarely see due to its lower...
(222) What provides conduit for Joint Worldwide Intelligence...
(227) The Global Positioning System program is responsible for...
(235) At what level do regional operation centers perform Network...
(206) Instead of using binary, how are IPv6 addresses expressed to be...
(212) What layer of the open system interconnection model do routers...
(215) Which one is not a category of the operating system's task...
(217) What is the name of the standard all-purpose shell most commonly...
(219) Which segment of the Defense Information System Network (DISN)...
(220) What is the difference between a hub router and a premise...
(231) An uninvestigated or unevaluated occurrence that potentially...
(231) Final reports of a communication security incident are due
(233) What best describes an unintended signals or noise appearing...
(234) Which condition requires the mandate of increased monitoring of...
(213) What encryption device is certified to secure all classification...
(216) Which system provides support for features such as Windows...
(230) What is the COMSEC program designed to do?
(210) What is a Data Link layer network device that logically...
(214) The main function of the Data Service Unit is to
(208) How many devices can connect to a FireWire bus?
(201) At what Open System Interconnect layer do network switches and...
(219) Who bears the responsibility for maintenance of the sustaining...
(234) Which condition exists when there is no apparent terrorist...
(206) What Unicast address scope is publicly accessible with the...
(213) What encryption device is capable of loading up to 500 keys?
(218) This component of the Global Information Grid consists of those...
(228) Which of the following security programs is defined as a process...
(201) At what Open System Interconnect layer are common data...
(216) One of the Windows Server Editions operating systems provides...
(219) Who bears the responsibility for maintenance of the sustaining...
(229) Guidance for posting information on Air Force web sites is...
(225) What is the maximum asynchronous data rate for the Defense Red...
(236) Which resources designated priority is provided when the level...
(206) What notation is expressed in leading zero compression for IPv6?
(214) A modem is a device that modulates
(215) Software is generally divided into
(221) Which is an internet protocol encryption device that can be...
(224) What type of Defense Switched Network precedence call cannot be...
(230) What reference would you use for guidance on Air Force...
(226) What is the purpose of the standardized tactical entry point...
(205) What method borrows bits from the host field of an IP address to...
(206) What Unicast address scope operates within a network segment,...
(223) What is the first step in merging voice, data and video networks...
(224) Which organization is responsible for the design, acquisition,...
(228) Which security program is covered under AFI 10–701?
(229) What form is used as a cover sheet to protect Privacy Act...
(233) An unclassified term referring to technical investigations for...
(217) Which pathnames begin at the current working directory?
(218) This characteristic of the Global Information Grid ensures...
(229) Disclosure of information that would result in the loss, misuse,...
(231) Which organization assigns communication security incident...
(230) Which form is used with a transfer report to accompany a COMSEC...
(224) How is responsiveness provided in the Defense Switched Network?
(223) Besides limiting connections to the Global Information Grid,...
(229) Providing a list of where and why the information will be...
(229) Official guidance on individual security clearances and...
(236) Which resources designated priority is provided when the level...
(235) At which NETOPS level is responsibility for the worldwide...
(232) The Air Force Information Assurance Program is detailed in
(221) How are non-internet protocols sent across the Secret Internet...
(202) What topology consists of cable segments from each computer...
(236) Which form would you use to properly label removable storage...
(216) Windows operating systems traditionally function in one of two...
(211) What forwarding method is also known as runtless switching?
(230) Which form is used as a visitor register log to record visitors...