3DX5X Volume 2

124 Questions | Attempts: 1200
Please wait...
Question 1 / 125
🏆 Rank #--
Score 0/100

1. (207) The ability to move about without being tethered by wires in wireless technology is called

Submit
Please wait...
About This Quiz
3DX5X Quizzes & Trivia

Volume 2 of 3DX5X (URE's)

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. (215) What are two anti-virus programs that the Air Force uses?

Submit

3. (202) What topology combines two or more different physical topologies in a single network?

Submit

4. (217) What was the first disk operating system developed to operate on a wide range of computer systems?

Submit

5. (213) The classification of a fill device is

Submit

6. (223) What concerns slowed the military's adoption of wireless network technology?

Submit

7. (204) What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?

Submit

8. (215) The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a

Submit

9. (207) Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?

Submit

10. (207) What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?

Submit

11. (202) What topology consists of devices connected to a common, shared cable?

Submit

12. (205) Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?

Submit

13. (207) What is the type of memory that retains data after power is removed or lost?

Submit

14. (211) What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?

Submit

15. (217) What directory is always identified by the slash symbol (/) and is in the "a" partition?

Submit

16. (201) What is a formal set of rules and conventions that govern how computers exchange information over a network medium?

Submit

17. (202) What topology defines the way in which devices communicate, and data is transmitted, throughout the network?

Submit

18. (202) What topology consists of cable segments from each computer connected to a centralized component?

Submit

19. (203) Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?

Submit

20. (212) What do routing algorithms initialize and maintain to aid the process of path determination?

Submit

21. (231) An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC

Submit

22. (215) Applications are software programs designed to perform what type of tasks?

Submit

23. (231) Final reports of a communication security incident are due

Submit

24. (225) While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?

Submit

25. (204) What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?

Submit

26. (205) What IPv4 reserved address is used for loop back?

Submit

27. (207) Which of the following is not one of the three advantages to using wireless technology?

Submit

28. (210) What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?

Submit

29. (235) An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as

Submit

30. (207) Which landline transmission medium is the primary carrier of voice communications?

Submit

31. (207) Which of the following is not one the four security threats to Wireless Local Area Network?

Submit

32. (212) Dynamic routing automatically calculates the best path between how many nodes?

Submit

33. (201) The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?

Submit

34. (205) Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

Submit

35. (207) The computing part of the computer is the central processing unit, also called the

Submit

36. (209) What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?

Submit

37. (227) The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code?

Submit

38. (207) An optical communications system is comprised of a

Submit

39. (210) This type of bridge is used to convert one Data Link layer protocol to another.

Submit

40. (233) What best describes an unintended signals or noise appearing external to a piece of communications equipment?

Submit

41. (202) What topology defines the layout of a network's devices and media?

Submit

42. (203) What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

Submit

43. (204) Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

Submit

44. (207) What two main components make up the central processing unit?

Submit

45. (212) Which of these is an example of an Exterior Gateway Protocol?

Submit

46. (214) Analog modems are used over the voice band range of

Submit

47. (201) What Open System Interconnect layer is closest to the end user?

Submit

48. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?

Submit

49. (230) What is the COMSEC program designed to do?

Submit

50. (215) The core operating-system function is the management of the computer system which resides with the

Submit

51. (232) Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction?

Submit

52. (213) What encryption device may you rarely see due to its lower maximum data rate?

Submit

53. (214) The main function of the Data Service Unit is to

Submit

54. (215) Which one is not a category of the operating system's task categories?

Submit

55. (205) How many bits are in an IPv4 address?

Submit

56. (205) What is a mechanism that allows a network device to divide an IP address into a network and host number?

Submit

57. (205) What is the default classful subnet mask on class B networks?

Submit

58. (206) Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?

Submit

59. (218) This component of the Global Information Grid consists of those items that are necessary to directly connect the warfighter to the global network

Submit

60. (222) What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another?

Submit

61. (224) What type of Defense Switched Network precedence call cannot be preempted?

Submit

62. (212) What layer of the open system interconnection model do routers operate?

Submit

63.  (216) One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it?

Submit

64. (217) What is the name of the standard all-purpose shell most commonly used?

Submit

65. (223) What is the first step in merging voice, data and video networks into one integrated network within the Air Force?

Submit

66. (228) Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?

Submit

67. (205) What IPv4 class address is used for networks with about 250 nodes?

Submit

68. (210) What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

Submit

69. (234) Which condition exists when there is no apparent terrorist activity against computer networks?

Submit

70. (215) Software is generally divided into

Submit

71. (221) How are non-internet protocols sent across the Secret Internet Protocol Router Network?

Submit

72. (225) What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?

Submit

73. (201) What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?

Submit

74. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?

Submit

75. (203) What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

Submit

76. (211) What forwarding method is also known as runtless switching?

Submit

77. (213) What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?

Submit

78. (224) Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network?

Submit

79. (226) What is the purpose of the standardized tactical entry point terminal?

Submit

80. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?

Submit

81. (208) How many devices can connect to a FireWire bus?

Submit

82. (216) Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts?

Submit

83. (213) What encryption device is capable of loading up to 500 keys?

Submit

84. (201) At what Open System Interconnect layer do routers operate?

Submit

85. (208) How many peripherals can a Universal Serial Bus handle at once?

Submit

86. (220) What is the difference between a hub router and a premise router?

Submit

87. (206) What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?

Submit

88. (229) Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as

Submit

89. (217) Which pathnames begin at the current working directory?

Submit

90. (214) A modem is a device that modulates

Submit

91. (219) Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat?

Submit

92. (206) What notation is expressed in zero compression for IPv6?

Submit

93. (216) Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?

Submit

94. (218) This characteristic of the Global Information Grid ensures seamless transmission of information between different service branches

Submit

95. (206) What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?

Submit

96. (230) Which form is used as a visitor register log to record visitors into restricted areas?

Submit

97. (231) Which organization assigns communication security incident report case numbers?

Submit

98. (201) At what Open System Interconnect layer do network switches and bridges operate?

Submit

99. (219) Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?

Submit

100. (224) How is responsiveness provided in the Defense Switched Network?

Submit

101. (205) What IPv4 class address is used for multicast addressing?

Submit

102. (229) Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement?

Submit

103. (221) Which is an internet protocol encryption device that can be directly connected to Red local area networks?

Submit

104. (223) Besides limiting connections to the Global Information Grid, what other Combat Information Transport Systems initiative will help increase network security?

Submit

105. (206) What notation is expressed in leading zero compression for IPv6?

Submit

106. (205) What method borrows bits from the host field of an IP address to create a subnet?

Submit

107. (229) What form is used as a cover sheet to protect Privacy Act material?

Submit

108. (233) An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as

Submit

109. (235) At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?

Submit

110. (229) Guidance for posting information on Air Force web sites is outlined in

Submit

111. (201) At what Open System Interconnect layer are common data compression and encryption schemes used?

Submit

112. (228) Which security program is covered under AFI 10–701?

Submit

113. (235) At what level do regional operation centers perform Network Operations (NETOPS) to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management?

Submit

114. (230) Which form is used with a transfer report to accompany a COMSEC package?

Submit

115. (230) What reference would you use for guidance on Air Force messaging?

Submit

116. (234) When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected?

Submit

117. (236) Which form would you use to properly label removable storage media containing "confidential" information?

Submit

118. (206) What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?

Submit

119. (229) Official guidance on individual security clearances and permitting access to classified information can be found in

Submit

120. (232) The Air Force Information Assurance Program is detailed in

Submit

121. (234) Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?

Submit

122. (236) Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?

Submit

123. (234) Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?

Submit

124. (236) Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(207) The ability to move about without being tethered by wires in...
(215) What are two anti-virus programs that the Air Force uses?
(202) What topology combines two or more different physical topologies...
(217) What was the first disk operating system developed to operate on...
(213) The classification of a fill device is
(223) What concerns slowed the military's adoption of wireless network...
(204) What type of network connects networks that are typically...
(215) The path between the operating system and virtually all hardware...
(207) Who is an authorized client that may unknowingly or maliciously...
(207) What organization developed several wireless standards to meet...
(202) What topology consists of devices connected to a common, shared...
(205) Using a range of 1–126 in the first octet of an IPv4...
(207) What is the type of memory that retains data after power is...
(211) What is the method called when the entire frame is received and...
(217) What directory is always identified by the slash symbol (/) and...
(201) What is a formal set of rules and conventions that govern how...
(202) What topology defines the way in which devices communicate, and...
(202) What topology consists of cable segments from each computer...
(203) Which network protocol has the Department of Defense chosen as...
(212) What do routing algorithms initialize and maintain to aid the...
(231) An uninvestigated or unevaluated occurrence that potentially...
(215) Applications are software programs designed to perform what type...
(231) Final reports of a communication security incident are due
(225) While you are using the Red Switch, what feature lets you know...
(204) What type of network makes use of tunneling and security...
(205) What IPv4 reserved address is used for loop back?
(207) Which of the following is not one of the three advantages to...
(210) What rule establishes the percent of data that should be local...
(235) An accreditation decision which allows a system to operate in an...
(207) Which landline transmission medium is the primary carrier of...
(207) Which of the following is not one the four security threats to...
(212) Dynamic routing automatically calculates the best path between...
(201) The Institute of Electrical and Electronics Engineers divide the...
(205) Instead of using binary, how are IPv4 addresses expressed to be...
(207) The computing part of the computer is the central processing...
(209) What do you apply across Liquid Crystal Display material to...
(227) The Global Positioning System program is responsible for...
(207) An optical communications system is comprised of a
(210) This type of bridge is used to convert one Data Link layer...
(233) What best describes an unintended signals or noise appearing...
(202) What topology defines the layout of a network's devices and...
(203) What application within Transmission Control Protocol/Internet...
(204) Which is a common port that contains Hyper Text Transfer...
(207) What two main components make up the central processing unit?
(212) Which of these is an example of an Exterior Gateway Protocol?
(214) Analog modems are used over the voice band range of
(201) What Open System Interconnect layer is closest to the end user?
(203) What Transmission Control Protocol/Internet Protocol network...
(230) What is the COMSEC program designed to do?
(215) The core operating-system function is the management of the...
(232) Which applied discipline applies measures and controls to...
(213) What encryption device may you rarely see due to its lower...
(214) The main function of the Data Service Unit is to
(215) Which one is not a category of the operating system's task...
(205) How many bits are in an IPv4 address?
(205) What is a mechanism that allows a network device to divide an IP...
(205) What is the default classful subnet mask on class B networks?
(206) Instead of using binary, how are IPv6 addresses expressed to be...
(218) This component of the Global Information Grid consists of those...
(222) What provides conduit for Joint Worldwide Intelligence...
(224) What type of Defense Switched Network precedence call cannot be...
(212) What layer of the open system interconnection model do routers...
 (216) One of the Windows Server Editions operating systems...
(217) What is the name of the standard all-purpose shell most commonly...
(223) What is the first step in merging voice, data and video networks...
(228) Which of the following security programs is defined as a process...
(205) What IPv4 class address is used for networks with about 250...
(210) What is a Data Link layer network device that logically...
(234) Which condition exists when there is no apparent terrorist...
(215) Software is generally divided into
(221) How are non-internet protocols sent across the Secret Internet...
(225) What is the maximum asynchronous data rate for the Defense Red...
(201) What layer of the Open System Interconnect model defines the...
(203) What Transmission Control Protocol/Internet Protocol network...
(203) What Transmission Control Protocol/Internet Protocol transport...
(211) What forwarding method is also known as runtless switching?
(213) What encryption device is certified to secure all classification...
(224) Which organization is responsible for the design, acquisition,...
(226) What is the purpose of the standardized tactical entry point...
(203) What Transmission Control Protocol/Internet Protocol network...
(208) How many devices can connect to a FireWire bus?
(216) Windows operating systems traditionally function in one of two...
(213) What encryption device is capable of loading up to 500 keys?
(201) At what Open System Interconnect layer do routers operate?
(208) How many peripherals can a Universal Serial Bus handle at once?
(220) What is the difference between a hub router and a premise...
(206) What Unicast address scope is designed to be private, internally...
(229) Disclosure of information that would result in the loss, misuse,...
(217) Which pathnames begin at the current working directory?
(214) A modem is a device that modulates
(219) Which segment of the Defense Information System Network (DISN)...
(206) What notation is expressed in zero compression for IPv6?
(216) Which system provides support for features such as Windows...
(218) This characteristic of the Global Information Grid ensures...
(206) What Unicast address scope is publicly accessible with the...
(230) Which form is used as a visitor register log to record visitors...
(231) Which organization assigns communication security incident...
(201) At what Open System Interconnect layer do network switches and...
(219) Who bears the responsibility for maintenance of the sustaining...
(224) How is responsiveness provided in the Defense Switched Network?
(205) What IPv4 class address is used for multicast addressing?
(229) Providing a list of where and why the information will be...
(221) Which is an internet protocol encryption device that can be...
(223) Besides limiting connections to the Global Information Grid,...
(206) What notation is expressed in leading zero compression for IPv6?
(205) What method borrows bits from the host field of an IP address to...
(229) What form is used as a cover sheet to protect Privacy Act...
(233) An unclassified term referring to technical investigations for...
(235) At which NETOPS level is responsibility for the worldwide...
(229) Guidance for posting information on Air Force web sites is...
(201) At what Open System Interconnect layer are common data...
(228) Which security program is covered under AFI 10–701?
(235) At what level do regional operation centers perform Network...
(230) Which form is used with a transfer report to accompany a COMSEC...
(230) What reference would you use for guidance on Air Force...
(234) When a risk of a network system attack has been identified,...
(236) Which form would you use to properly label removable storage...
(206) What Unicast address scope operates within a network segment,...
(229) Official guidance on individual security clearances and...
(232) The Air Force Information Assurance Program is detailed in
(234) Which condition permits non-essential networks to be taken...
(236) Which resources designated priority is provided when the level...
(234) Which condition requires the mandate of increased monitoring of...
(236) Which resources designated priority is provided when the level...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!