Open System Interconnect Layer Quiz 3dx5xn Vol. 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Toosoul
T
Toosoul
Community Contributor
Quizzes Created: 1 | Total Attempts: 193
| Attempts: 193 | Questions: 124
Please wait...
Question 1 / 124
0 %
0/100
Score 0/100
1. (215) The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a

Explanation

A driver is a special program that acts as a bridge between the operating system and hardware devices that are not located on the computer's motherboard. It allows the operating system to communicate with and control these external hardware devices effectively. Without a driver, the operating system would not be able to interact with or utilize the functionalities of these hardware devices. Therefore, a driver is necessary to establish a connection and facilitate communication between the operating system and external hardware.

Submit
Please wait...
About This Quiz
OSI Model Quizzes & Trivia

This OSI Model quiz, part of the 3DX5XN series, assesses knowledge on layers defining physical specifications, sublayer divisions, device operations, and data handling techniques like compression and encryption. Ideal for learners aiming to understand network interactions and protocol standards.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. (207) What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?

Explanation

The Institute of Electrical Electronics Engineers (IEEE) developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. These standards include popular ones like IEEE 802.11 (Wi-Fi) and IEEE 802.15 (Bluetooth). The IEEE is a global professional organization that focuses on advancing technology in various fields, including wireless communications. Through their efforts, they have played a significant role in shaping the wireless industry and ensuring compatibility and interoperability among different wireless devices and networks.

Submit
3. (207) The ability to move about without being tethered by wires in wireless technology is called

Explanation

The correct answer is mobility because wireless technology allows devices to move freely without being connected by wires. This enables users to have flexibility and freedom of movement while still being able to access and use the technology.

Submit
4. (215) Applications are software programs designed to perform what type of tasks?

Explanation

Applications are software programs designed to perform specific tasks. Unlike general software programs, which are designed to perform a wide range of tasks, applications are created with a specific purpose in mind. They are tailored to meet the needs of users in a particular domain or industry. This specificity allows applications to be more efficient and effective in performing their intended tasks, as they are designed with a focused set of features and functionalities.

Submit
5. (215) What are two anti-virus programs that the Air Force uses?

Explanation

The Air Force uses Norton and McAfee as their two anti-virus programs.

Submit
6. (225) While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?

Explanation

The liquid crystal display is a feature that lets you know that you have dialed the correct number at the proper level of security while using the Red Switch. The display provides visual feedback, indicating that the correct number has been dialed and that the desired level of security has been reached. This ensures that the communication is being conducted securely and accurately.

Submit
7. (204) What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?

Explanation

A wide area network (WAN) is a type of network that connects networks that are typically separated by geographical distances between cities, states, countries, or around the world. Unlike a local area network (LAN), which connects devices within a limited area such as a building or campus, a WAN allows for long-distance communication and connects multiple LANs together. A WAN often utilizes public or private telecommunications infrastructure to transmit data between different locations, making it suitable for organizations with multiple branches or offices spread across different regions.

Submit
8. (205) Using a range of 1–126 in the first octet of an IPv4 address, what class does it belong to?

Explanation

IPv4 addresses are divided into different classes based on the range of the first octet. Class A addresses have a range of 1-126 in the first octet. Therefore, an IPv4 address with a range of 1-126 in the first octet belongs to Class A.

Submit
9. (233) What best describes an unintended signals or noise appearing external to a piece of communications equipment?

Explanation

Emanation best describes unintended signals or noise appearing external to a piece of communications equipment. Emanation refers to the unintentional release of electromagnetic or acoustic signals from electronic devices, which can potentially be intercepted and exploited by unauthorized individuals. This can lead to security breaches and compromise the confidentiality of sensitive information.

Submit
10. (213) The classification of a fill device is

Explanation

The correct answer is that a fill device is classified as soon as a key is loaded, and it holds the classification of the loaded key. This means that the classification of the fill device is determined by the classification of the key that is loaded into it. Once the key is loaded, the fill device takes on the same classification as the key. This ensures that the fill device and the key have the same level of classification and that sensitive information is appropriately protected.

Submit
11. (204) What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?

Explanation

A Virtual Private Network (VPN) is a type of network that utilizes tunneling and security protocols to enable communication between two or more computer systems over the public Internet. It creates a secure and encrypted connection, allowing users to access resources on a private network remotely. VPNs are commonly used by organizations to ensure secure communication and data transfer between remote locations or employees working from home.

Submit
12. (207) Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?

Explanation

An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user, an employee has legitimate access to the network and can potentially misuse their privileges to assist external individuals or groups in gaining unauthorized access. This could be done either unintentionally, such as through negligence or lack of awareness of security protocols, or intentionally, as an insider threat or through collusion with external attackers. Therefore, employees pose a significant risk to network security if their actions are not properly monitored and controlled.

Submit
13. (211) What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?

Explanation

Store-and-forward is the method where the entire frame is received and stored in the buffer. An error check is then performed to ensure the integrity of the frame. Finally, the frame is sent to the appropriate port for delivery. This method ensures that the entire frame is received before it is forwarded, reducing the chances of errors or data loss during transmission.

Submit
14. (235) An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as

Explanation

A full accreditation refers to a decision that allows a system to operate in the environment it was originally intended for. This means that the system has met all the necessary requirements and standards to function effectively in its designated setting. It signifies that the system has successfully undergone a comprehensive evaluation and has been deemed suitable for its intended purpose.

Submit
15. (223) What concerns slowed the military's adoption of wireless network technology?

Explanation

The military's adoption of wireless network technology was slowed down by concerns related to security and reliability. The military requires highly secure and reliable communication systems to safeguard sensitive information and ensure effective operations. Wireless networks are vulnerable to security breaches and interference, which raised concerns about the confidentiality and integrity of military communications. Additionally, reliability issues such as signal strength, coverage, and potential disruptions further hindered the adoption of wireless technology in military settings.

Submit
16. (202) What topology consists of cable segments from each computer connected to a centralized component?

Explanation

In a star topology, each computer is connected to a centralized component, such as a switch or hub, through individual cable segments. This centralized component acts as a central point of communication, allowing data to be transmitted between computers. This topology is commonly used in Ethernet networks and provides better performance and reliability compared to bus or ring topologies, as a single point of failure does not affect the entire network.

Submit
17. (217) What was the first disk operating system developed to operate on a wide range of computer systems?

Explanation

UNIX was the first disk operating system developed to operate on a wide range of computer systems. It was developed in the 1960s and became popular due to its portability and compatibility across different hardware platforms. UNIX introduced many innovative features, such as a hierarchical file system and a command-line interface, which made it highly influential in the development of modern operating systems. Its flexibility and ability to run on various computer systems made it a groundbreaking advancement in the field of operating systems.

Submit
18. (207) What is the type of memory that retains data after power is removed or lost?

Explanation

Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which loses its data when power is disconnected, nonvolatile memory stores information permanently. This type of memory is commonly used in devices such as hard drives, solid-state drives, and flash memory. It allows for persistent storage of data, ensuring that information is not lost even during power outages or system shutdowns.

Submit
19. (207) Which of the following is not one the four security threats to Wireless Local Area Network?

Explanation

Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points, War Drivers, and Hackers are all potential security threats to a WLAN. Rogue Access Points refer to unauthorized access points that are set up by individuals without proper authorization. War Drivers are individuals who drive around looking for unsecured wireless networks to exploit. Hackers are individuals who attempt to gain unauthorized access to a network. However, Direct Connections does not pose a specific security threat to WLANs as it refers to a direct physical connection to a device, rather than a wireless connection.

Submit
20. (203) Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?

Explanation

The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a suite of protocols that enables communication between devices on the internet. It provides reliable and secure transmission of data packets, ensuring that information is delivered accurately and efficiently across networks. TCP/IP has become the standard protocol for internet communication and is widely used in various industries, including government and military organizations.

Submit
21. (217) What directory is always identified by the slash symbol (/) and is in the "a" partition?

Explanation

The directory that is always identified by the slash symbol (/) and is in the "a" partition is the root directory. The root directory is the top-level directory in a file system hierarchy and it contains all other directories and files in the system. It is represented by the slash symbol (/) in Unix-like operating systems.

Submit
22. (210) What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?

Explanation

The 80/20 rule establishes that 80% of the data should be local to a segment, meaning it stays within that segment, while 20% of the data should be destined to traverse a bridge to the other segment. This rule helps in determining the distribution of data between segments and ensures efficient data management and communication between segments.

Submit
23. (202) What topology defines the way in which devices communicate, and data is transmitted, throughout the network?

Explanation

Logical topology refers to the way in which devices communicate and data is transmitted in a network. It defines the logical connections between devices, regardless of their physical location. This includes the paths that data takes from one device to another, the protocols used for communication, and the logical structure of the network. Unlike physical topology, which focuses on the physical layout of devices and cables, logical topology is concerned with the conceptual layout of the network. It helps in understanding how devices are interconnected and how data flows within the network.

Submit
24. (202) What topology combines two or more different physical topologies in a single network?

Explanation

A hybrid topology combines two or more different physical topologies in a single network. This means that different sections of the network may be connected using different types of topologies such as bus, ring, or star. This allows for more flexibility and scalability in the network design, as different sections can be configured in the most suitable way for their specific requirements.

Submit
25. (203) What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

Explanation

File Transfer Protocol (FTP) is the correct answer because it is the application within TCP/IP that is specifically designed for sending and receiving files. FTP allows users to transfer files between a client and a server over a network. It provides a set of commands that allow users to navigate through directories, upload and download files, and manage file permissions. FTP operates on TCP, which ensures reliable and ordered delivery of data packets.

Submit
26. (231) Final reports of a communication security incident are due

Explanation

The correct answer is 30 days after the initial report is issued. This means that the final reports of a communication security incident should be submitted 30 days after the initial report is officially released or made available to relevant parties. This allows sufficient time for investigation, analysis, and compilation of the necessary information and findings before the final report is due.

Submit
27. (214) Analog modems are used over the voice band range of

Explanation

Analog modems are used over the voice band range of 20 Hz to 20 kHz. This range is within the audible frequency range for humans, which is why it is suitable for transmitting voice signals. Analog modems convert digital signals into analog signals that can be transmitted over telephone lines, and the voice band range allows for the transmission of voice signals without significant loss of quality. Frequencies outside of this range may not be properly transmitted or may be distorted, which is why the voice band range is specifically used for analog modems.

Submit
28. (212) What do routing algorithms initialize and maintain to aid the process of path determination?

Explanation

Routing algorithms initialize and maintain routing tables to aid the process of path determination. Routing tables contain information about the network topology, including the available paths, their costs, and other relevant metrics. By continuously updating and referencing these tables, routing algorithms can determine the most efficient routes for data packets to travel from a source to a destination in a computer network.

Submit
29. (231) An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC

Explanation

An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC incident.

Submit
30. (212) Which of these is an example of an Exterior Gateway Protocol?

Explanation

Border Gateway Protocol (BGP) is an example of an Exterior Gateway Protocol (EGP). EGP is a routing protocol used to exchange routing information between different autonomous systems (AS) in a network. BGP is specifically designed for this purpose and is widely used on the internet to exchange routing information between different internet service providers (ISPs) and ASes. BGP allows routers in different ASes to communicate and exchange information about the best paths to reach different networks. It is responsible for determining the most efficient routes and ensuring the proper flow of traffic between different ASes.

Submit
31. (217) What is the name of the standard all-purpose shell most commonly used?

Explanation

The Bourne shell is the standard all-purpose shell that is most commonly used. It was developed by Stephen Bourne and is the default shell for most Unix-like operating systems. The Bourne shell provides a command-line interface for users to interact with the operating system and execute commands. It is known for its simplicity and efficiency, making it a popular choice among users and system administrators.

Submit
32. (207) The computing part of the computer is the central processing unit, also called the

Explanation

The computing part of a computer is known as the microprocessor. The microprocessor is responsible for executing instructions and performing calculations. It is often referred to as the "brain" of the computer as it controls and coordinates all the activities of the computer system. The control unit, arithmetic logic unit, and minicomputer are all components that are part of the overall computer system, but the microprocessor specifically refers to the central processing unit responsible for processing data and executing instructions.

Submit
33. (207) Which landline transmission medium is the primary carrier of voice communications?

Explanation

Twisted pair cable is the primary carrier of voice communications because it is a widely used and cost-effective transmission medium. It consists of two insulated copper wires twisted together, which helps to reduce interference and improve signal quality. Twisted pair cable is capable of carrying analog voice signals efficiently over short to medium distances, making it ideal for telephone systems and voice communication applications. Fiber optic cable, coaxial cable, and twinax cable are also used for transmission, but they are more commonly used for data and video transmission rather than voice communications.

Submit
34. (207) Which of the following is not one of the three advantages to using wireless technology?

Explanation

Wireless technology offers several advantages, including ease of installation, lower cost, and mobility. However, safety is not one of these advantages. While wireless technology can provide convenience and flexibility, it also comes with potential security risks and vulnerabilities. Therefore, safety is not considered a primary advantage of using wireless technology.

Submit
35. (215) The core operating-system function is the management of the computer system which resides with the

Explanation

The correct answer is "kernel". The kernel is the core operating-system function that manages the computer system. It is responsible for managing hardware resources, providing essential services to other parts of the operating system, and facilitating communication between software and hardware components. The kernel acts as a bridge between applications and the actual hardware, ensuring that the system runs smoothly and efficiently. It handles tasks such as memory management, process scheduling, and device drivers. Without the kernel, the operating system would not be able to function properly.

Submit
36. (227) The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code?

Explanation

The Global Positioning System program is responsible for maintaining GPS time to within 1 microsecond of universal time code. This level of accuracy ensures that GPS devices can provide precise and synchronized time information, which is crucial for accurate positioning and navigation. By maintaining such a small time difference, the GPS program ensures that users can rely on the system for various applications, including aviation, maritime, and land-based navigation.

Submit
37. (201) What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?

Explanation

The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data and includes specifications for cables, connectors, and other hardware components.

Submit
38. (205) Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

Explanation

IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four octets, each separated by a dot. Each octet represents a decimal number ranging from 0 to 255. This format is easier for users to read and understand compared to binary or hexadecimal representation.

Submit
39. (215) Which one is not a category of the operating system's task categories?

Explanation

The given options are categories of the operating system's task categories. User interface refers to the interaction between the user and the computer system. Memory management involves managing the computer's primary memory. Processor management involves managing the computer's central processing unit. However, "Troubleshoot interface" is not a recognized category of the operating system's task categories.

Submit
40. (201) What is a formal set of rules and conventions that govern how computers exchange information over a network medium?

Explanation

A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of data transmission. Protocols ensure that data is transmitted reliably and efficiently between devices connected to a network. They provide a common language and guidelines for communication, allowing different devices and systems to understand and interact with each other effectively.

Submit
41. (213) What encryption device may you rarely see due to its lower maximum data rate?

Explanation

The TSEC/KIV-7 is a type of encryption device that is rarely seen due to its lower maximum data rate. This suggests that the TSEC/KIV-7 is not as commonly used as other encryption devices because it has limitations in terms of the amount of data it can process or transmit. Therefore, it is less likely to be encountered in comparison to other encryption devices with higher data rates.

Submit
42. (205) What IPv4 reserved address is used for loop back?

Explanation

The IPv4 reserved address used for loopback is 127.0.0.1. This address is reserved for testing network communication between the local host (the device itself) and is commonly referred to as the loopback address. When a packet is sent to this address, it is immediately returned back to the sender without being transmitted on the network. This allows applications to test network functionality without the need for an actual network connection.

Submit
43. (207) What two main components make up the central processing unit?

Explanation

The central processing unit (CPU) is composed of two main components: the control unit and the arithmetic logic unit (ALU). The control unit is responsible for managing and coordinating the activities of the CPU, including fetching instructions from memory and executing them. The ALU performs mathematical and logical operations, such as addition, subtraction, and comparison, on the data stored in the CPU. Together, the control unit and ALU work together to carry out the instructions of a computer program.

Submit
44. (207) An optical communications system is comprised of a

Explanation

An optical communications system consists of a transmitter, cable, and receiver. The transmitter is responsible for converting electrical signals into optical signals, which are then transmitted through the cable. The cable acts as the transmission medium, allowing the optical signals to travel from the transmitter to the receiver. The receiver then converts the optical signals back into electrical signals for further processing. Therefore, the correct answer is transmitter, cable, and receiver.

Submit
45. (209) What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?

Explanation

Voltage is applied across Liquid Crystal Display (LCD) material to change the alignment and light polarizing property. The application of voltage causes the liquid crystal molecules to align in a specific direction, which in turn changes the orientation of the light passing through the material. This change in alignment and polarization allows for the manipulation of light to create the desired display on an LCD screen.

Submit
46. (215) Software is generally divided into

Explanation

Software is generally divided into three main categories: systems software, operating systems software, and applications software. Systems software refers to software that is responsible for managing and controlling the computer hardware, such as operating systems, device drivers, and utilities. Operating systems software specifically refers to the software that manages the computer hardware and provides a platform for other software to run on, such as Windows, macOS, and Linux. Applications software, on the other hand, refers to software that is designed for specific tasks or applications, such as word processors, spreadsheets, and web browsers. Therefore, the correct answer is systems software, operating systems software, and applications software.

Submit
47. (223) What is the first step in merging voice, data and video networks into one integrated network within the Air Force?

Explanation

The first step in merging voice, data, and video networks into one integrated network within the Air Force is to integrate traditional TDM switches with voice over IP systems. This means combining the existing time division multiplexing switches with voice over IP technology to enable the transmission of voice, data, and video over the same network. This integration allows for more efficient communication and resource utilization, as well as improved flexibility and scalability. It is a crucial step in the process of creating a unified network infrastructure.

Submit
48. (201) The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?

Explanation

The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect Data Link Layers are divided into these two sublayers. The Logical Link Control (LLC) sublayer is responsible for error control, flow control, and framing of data packets. It also provides services to the network layer. The Media Access Control (MAC) sublayer is responsible for controlling access to the physical media, such as Ethernet or Wi-Fi. It handles addressing and transmission of data packets onto the network.

Submit
49. (230) What is the COMSEC program designed to do?

Explanation

The COMSEC program is designed to detect and correct procedural weaknesses that could potentially expose critical information. This means that the program focuses on identifying any vulnerabilities or flaws in procedures that could lead to the compromise of sensitive information. By identifying and addressing these weaknesses, the program aims to enhance the overall security and protection of critical information.

Submit
50. (203) What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

Explanation

Transmission Control Protocol (TCP) provides reliable data delivery services. TCP is a connection-oriented protocol that ensures the reliable and ordered delivery of data packets over the Internet. It uses acknowledgments and retransmission mechanisms to guarantee that data is delivered without errors or loss. TCP also handles flow control and congestion control to prevent network congestion and optimize data transmission. It is widely used for applications that require reliable data transfer, such as web browsing, email, and file transfer.

Submit
51. (205) How many bits are in an IPv4 address?

Explanation

An IPv4 address is made up of 32 bits. This means that there are 2^32 possible unique addresses in the IPv4 address space. Each bit in the address can be either 0 or 1, resulting in a total of 4,294,967,296 unique addresses. This addressing scheme is used to identify and locate devices on a network using the Internet Protocol version 4.

Submit
52. (218) This component of the Global Information Grid consists of those items that are necessary to directly connect the warfighter to the global network

Explanation

The correct answer is the Warrior component. The Warrior component refers to the items that directly connect the warfighter to the global network. This means that it includes the equipment, devices, and systems that enable the warfighter to access and communicate through the Global Information Grid. The Warrior component is essential for ensuring that the warfighter has the necessary connectivity and capabilities to effectively operate within the global network.

Submit
53. (214) The main function of the Data Service Unit is to

Explanation

The Data Service Unit (DSU) is responsible for adapting the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment. This means that the DSU converts the digital data into a format that is compatible with the carrier's equipment, allowing for seamless communication between the customer and the carrier. This adaptation ensures that the data can be transmitted and received accurately and efficiently.

Submit
54. (226) What is the purpose of the standardized tactical entry point terminal?

Explanation

The purpose of the standardized tactical entry point terminal is to provide a foxhole to National Command Authority link for commanders. This means that it allows commanders in the field to have a direct communication link with the National Command Authority, which is the highest level of military command. This ensures that important information and orders can be quickly and securely transmitted between commanders and the top-level decision-makers.

Submit
55. (202) What topology defines the layout of a network's devices and media?   

Explanation

The correct answer is physical because the physical topology refers to the physical arrangement of devices and media in a network. It describes how the devices are connected and the physical layout of cables, connectors, and other physical components. This includes the placement of devices such as routers, switches, and servers, as well as the physical connections between them using cables or wireless links. The physical topology is important for understanding the actual physical structure of a network and how devices are physically interconnected.

Submit
56. (202) What topology consists of devices connected to a common, shared cable?

Explanation

Bus topology consists of devices connected to a common, shared cable. In this topology, all devices are connected to a single cable, which acts as a backbone. Each device on the network can transmit data onto the cable, and all other devices on the network receive that data. This type of topology is relatively simple and inexpensive to set up, but if the main cable fails, the entire network can be affected.

Submit
57. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?

Explanation

The Reverse Address Resolution Protocol (RARP) is a network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request its corresponding IP address. This is useful in situations where a device does not have a configured IP address and needs to obtain one dynamically.

Submit
58. (205) What IPv4 class address is used for networks with about 250 nodes?

Explanation

Class C is the correct answer because it is designed for networks with approximately 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, allowing for up to 254 hosts on the network. Class D addresses are used for multicast purposes, Class E addresses are reserved for experimental use, and Class F addresses are not defined in the IPv4 standard. Therefore, Class C is the most appropriate choice for a network with about 250 nodes.

Submit
59. (232) Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction?

Explanation

COMPUSEC, or Computer Security, is the applied discipline that applies measures and controls to protect data in computer systems against unauthorized disclosure, modification, or destruction. It involves implementing security measures such as firewalls, encryption, access controls, and intrusion detection systems to safeguard computer systems and the data they contain.

Submit
60. (228) Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?

Explanation

OPSEC, or Operations Security, is the correct answer. OPSEC is a security program that involves identifying critical information and analyzing friendly actions related to military operations and other activities. It aims to prevent adversaries from obtaining sensitive information that could be used against the organization. EMSEC (Emissions Security), COMSEC (Communications Security), and COMPUSEC (Computer Security) are also important security programs, but they focus on different aspects of security and are not directly related to the process described in the question.

Submit
61. (201) What Open System Interconnect layer is closest to the end user?

Explanation

The Application layer is closest to the end user in the Open System Interconnect (OSI) model. This layer provides services directly to the user, such as email, web browsing, and file transfer. It is responsible for interpreting and presenting data in a format that is understandable to the user. The Application layer interacts with the lower layers of the OSI model to establish connections and ensure reliable data transfer.

Submit
62. (213) What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?

Explanation

The TSEC/KIV-19 encryption device is certified to secure all classification levels and categories and is capable of encrypting trunk-level high-speed circuits. This device is specifically designed for high-speed data encryption and is widely used in secure communication systems to protect sensitive information.

Submit
63. (204) Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

Explanation

Port 8080 is commonly used for HTTP servers and proxies. While Port 80 is the default port for HTTP, Port 8080 is often used as an alternative when the default port is already in use or blocked. It allows for the same HTTP communication but on a different port number. Therefore, Port 8080 is a common port for hosting HTTP servers and proxies.

Submit
64. (205) What is a mechanism that allows a network device to divide an IP address into a network and host number?

Explanation

A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is used to determine which part of the IP address represents the network and which part represents the host. By using a subnet mask, a network device can identify the network to which an IP address belongs and properly route the data packets within the network.

Submit
65. (221) How are non-internet protocols sent across the Secret Internet Protocol Router Network?

Explanation

not-available-via-ai

Submit
66. (212) Dynamic routing automatically calculates the best path between how many nodes?

Explanation

Dynamic routing automatically calculates the best path between two nodes. It analyzes the network conditions, such as traffic load and link failures, and determines the most efficient route for data transmission. By constantly updating routing tables, dynamic routing protocols ensure that data is efficiently and reliably delivered between two specific nodes in a network. Therefore, the correct answer is 2.

Submit
67. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?

Explanation

The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging capabilities to help with troubleshooting. ICMP messages are used to report errors and provide diagnostic information, such as unreachable hosts or network congestion. By using ICMP, network administrators can identify and resolve network issues more effectively.

Submit
68. (206) What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?

Explanation

The correct answer is Site-local. Site-local addresses are designed to be private and internally routable within a specific site or organization. These addresses are not meant to be routed outside of the site, ensuring that they remain private and isolated. They are typically used for internal communication within a specific network or organization.

Submit
69. (234) Which condition exists when there is no apparent terrorist activity against computer networks?

Explanation

INFOCON 5 indicates a normal state of readiness and implies that there is no apparent terrorist activity against computer networks. This means that the threat level is low, and there are currently no identified or active cyber threats or attacks. It suggests that the computer networks are secure and not under any immediate danger or risk of terrorist activity.

Submit
70. (210) What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

Explanation

A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of the incoming frames and making forwarding decisions based on that information. By doing so, a bridge helps to reduce network congestion and improve overall network performance by preventing unnecessary collisions and allowing for more efficient communication between devices connected to different segments.

Submit
71.  (210) This type of bridge is used to convert one Data Link layer protocol to another.

Explanation

A translational bridge is used to convert one Data Link layer protocol to another. This means that it can take data from one network using a specific protocol and convert it into a format that can be understood by a different network using a different protocol. This allows for seamless communication between different types of networks, ensuring compatibility and smooth data transmission.

Submit
72. (216) One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers. Which Operating system is it?

Explanation

Datacenter Edition is the correct answer because it is specifically designed to support high-end, high traffic application servers. This edition provides advanced features such as unlimited virtualization rights, support for larger memory configurations, and enhanced scalability and reliability. It is intended for use in data centers and cloud environments where the demand for processing power and performance is high. The other options, Web Edition, NT, and AERO, do not have the same level of capabilities and features as Datacenter Edition.

Submit
73. (229) Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as

Explanation

The correct answer is "sensitive but unclassified". This term refers to information that is not classified but still requires protection due to its sensitivity. It includes information that, if disclosed, could potentially harm national security by leading to loss, misuse, modification, or unauthorized access. This category of information is considered important and should be handled with care to prevent any adverse effects on national security.

Submit
74. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?

Explanation

The correct answer is Address Resolution Protocol. The Address Resolution Protocol (ARP) is used to match a known IP address for a destination device to a Media Access Control (MAC) address. ARP is responsible for resolving IP addresses to MAC addresses so that data can be properly transmitted over the network.

Submit
75. (206) Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?

Explanation

IPv6 addresses are expressed in colon hexadecimal format to make them more user-friendly. In this format, the address is divided into eight groups of four hexadecimal digits separated by colons. This format allows for a larger address space compared to IPv4 and is easier for users to read and understand. The use of hexadecimal digits also simplifies the representation of large numbers, making it more convenient for users to work with IPv6 addresses.

Submit
76. (206) What notation is expressed in zero compression for IPv6?

Explanation

The correct answer is an example of zero compression notation for IPv6. In this notation, consecutive groups of zeros are replaced with a double colon (::), indicating that there are multiple groups of zeros. This allows for a more concise representation of the IPv6 address. In the given answer, the double colon is used to represent the consecutive groups of zeros between 10AB and 3, and between 3 and 1234:5678.

Submit
77. (213) What encryption device is capable of loading up to 500 keys?

Explanation

The AN/CYZ-10 /DTD encryption device is capable of loading up to 500 keys.

Submit
78. (222) What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another?

Explanation

The DISN backbone is the correct answer because it is a high-speed network infrastructure that provides a conduit for the transmission of data from one location to another within the Joint Worldwide Intelligence Communication System (JWICS). It serves as the backbone for JWICS and enables the secure and efficient transmission of intelligence information across different locations. The other options, such as JDISS terminal, SIPRNET, and NIPRNET, are not specifically designed to provide the conduit for JWICS data transmission.

Submit
79. (216) Windows operating systems traditionally function in one of two network models. Which model does not operate using centralized user accounts?

Explanation

The correct answer is "Workgroup" because in a workgroup network model, each computer operates independently and there is no centralized user account management. In a workgroup, each computer has its own local user accounts and passwords, and there is no central authority to manage user accounts and permissions. This is in contrast to a domain network model, where user accounts and permissions are centrally managed by a domain controller, and Active Directory is a service that provides centralized user account and resource management in a domain network model. User groups are not a network model, but rather a way to organize users with similar permissions and access rights.

Submit
80. (225) What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?

Explanation

The maximum asynchronous data rate for the Defense Red Switch Network (DRSN) is 19.2 Kbps. This means that the network can transfer data at a maximum rate of 19.2 kilobits per second.

Submit
81. (235) At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?

Explanation

Tier 1 is the correct answer because at this level, responsibility for the worldwide management and operational oversight of the defense information infrastructure is globally managed.

Submit
82. (212) What layer of the open system interconnection model do routers operate?

Explanation

Routers operate at Layer 3 of the Open System Interconnection (OSI) model, which is the Network Layer. This layer is responsible for addressing, routing, and forwarding data packets across different networks. Routers use IP addresses to determine the best path for data transmission and make decisions on how to direct traffic between different networks. Therefore, Layer 3 is the correct answer as it aligns with the role and functionality of routers in the OSI model.

Submit
83. (205) What is the default classful subnet mask on class B networks?

Explanation

The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for a network portion of 16 bits and a host portion of 16 bits. It is used to divide the IP address into network and host portions, with the first two octets representing the network portion and the last two octets representing the host portion. This subnet mask provides a large number of possible networks and hosts within each network.

Submit
84. (224) Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network?

Explanation

The Defense Information Systems Agency (DISA) is responsible for the design, acquisition, and single systems management of the Defense Switched Network. DISA is a combat support agency of the Department of Defense and provides information technology and communication support to the military. They are responsible for ensuring secure and reliable communications for the defense community, including managing and maintaining the Defense Switched Network, which is a global voice and data network used by the military.

Submit
85. (201) At what Open System Interconnect layer do routers operate?

Explanation

Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for logical addressing and routing of data packets across different networks. Routers use the information in the network layer headers, such as IP addresses, to determine the best path for forwarding packets to their destination. They make decisions based on routing tables and protocols like OSPF or BGP. By operating at the Network layer, routers facilitate communication between different networks and enable the internet to function effectively.

Submit
86. (229) What form is used as a cover sheet to protect Privacy Act material?

Explanation

AF Form 3227 is used as a cover sheet to protect Privacy Act material.

Submit
87. (229) Guidance for posting information on Air Force web sites is outlined in

Explanation

The correct answer is AFI 33–129. This AFI provides guidance for posting information on Air Force web sites. It outlines the rules and regulations that must be followed when posting content on these sites, including guidelines for security, privacy, and accessibility. It ensures that information shared on Air Force web sites is accurate, appropriate, and in compliance with legal and ethical standards.

Submit
88. (201) At what Open System Interconnect layer do network switches and bridges operate?

Explanation

Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. The Data Link layer is responsible for the reliable transfer of data between nodes on a network. Network switches and bridges use MAC addresses to direct data packets within a local area network (LAN). They examine the destination MAC address of incoming packets and forward them to the appropriate port based on the MAC address table. Therefore, the correct answer is Data Link.

Submit
89. (208) How many devices can connect to a FireWire bus?

Explanation

A FireWire bus can support up to 63 devices. This is because the FireWire standard allows for a maximum of 63 devices to be connected in a daisy-chain configuration. Each device on the bus has a unique identifier, and the bus can provide power and data communication to all connected devices. Therefore, the correct answer is 63.

Submit
90. (216) Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?

Explanation

Enterprise Edition provides support for features such as Windows System Resource Manager and Metadirectory Services. These features are typically required by large organizations with complex IT infrastructures. The Enterprise Edition is designed to handle high workloads and provide advanced management capabilities, making it the ideal choice for organizations that need these specific features and capabilities.

Submit
91. (208) How many peripherals can a Universal Serial Bus handle at once?

Explanation

A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because USB devices are assigned unique addresses, and the USB protocol supports up to 127 addressable devices. Therefore, the correct answer is 127.

Submit
92. (219) Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?

Explanation

The responsibility for maintenance of the sustaining base portion of the Defense Information System Network lies with the service that owns the installation. This means that the specific military branch that operates and maintains the installation is responsible for the upkeep and maintenance of the network.

Submit
93. (221) Which is an internet protocol encryption device that can be directly connected to Red local area networks?

Explanation

The KG-84 is an internet protocol encryption device that can be directly connected to Red local area networks. It is a secure communication device that encrypts data transmitted over a network, ensuring that it cannot be intercepted or accessed by unauthorized individuals. The KG-84 is specifically designed for use in local area networks, making it a suitable choice for securing data transmission within a network.

Submit
94. (230) Which form is used as a visitor register log to record visitors into restricted areas?

Explanation

AF Form 1109 is used as a visitor register log to record visitors into restricted areas. This form is specific to the Air Force and is used to document the entry and exit of visitors to restricted areas for security purposes. It helps to maintain a record of individuals who have accessed these areas and allows for tracking and accountability.

Submit
95. (217) Which pathnames begin at the current working directory?

Explanation

Relative pathnames begin at the current working directory. Unlike absolute pathnames, which start from the root directory, relative pathnames are specified in relation to the current directory. They provide a shorter and more convenient way to navigate through the file system by referencing directories and files relative to the current location.

Submit
96. (214) A modem is a device that modulates

Explanation

A modem is a device that modulates digital data onto an analog carrier for transmission over an analog medium. This means that the modem takes the digital data and converts it into analog signals that can be transmitted over traditional telephone lines or other analog communication channels. The analog carrier refers to the physical medium through which the signals are transmitted, such as copper wires or coaxial cables. This allows digital information to be transmitted over analog networks, which are commonly used for voice communication.

Submit
97. (224) How is responsiveness provided in the Defense Switched Network?

Explanation

Responsiveness is provided in the Defense Switched Network (DSN) through the use of precedence access thresholding. This means that certain users or types of traffic are given priority access to the network based on their level of precedence. By setting thresholds for different levels of precedence, the DSN ensures that critical or high-priority communications are given priority access, allowing for a more responsive and efficient network.

Submit
98. (205) What IPv4 class address is used for multicast addressing?

Explanation

Class D is the correct answer because it is the IPv4 class address used for multicast addressing. Multicast addressing allows a single packet to be sent to multiple recipients simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255 and are reserved for multicast groups.

Submit
99. (206) What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?

Explanation

Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible and allows for hierarchical design and allocation. This means that the Network ID portion of the address can be broken up into different areas, enabling efficient management and allocation of IP addresses.

Submit
100. (223) Besides limiting connections to the Global Information Grid, what other Combat Information Transport Systems initiative will help increase network security?

Explanation

Eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated NOSCs will help increase network security by streamlining and centralizing the network operation and security functions. This consolidation will enable better coordination and communication between the two Integrated NOSCs, allowing for a more efficient and effective response to security threats. Additionally, having standardized tools and a baseline security model across all MAJCOM areas of responsibility will ensure consistent and robust security measures are in place throughout the network.

Submit
101. (229) Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement?

Explanation

The correct answer is "Routine use." A Privacy Act Statement is a document that informs individuals about how their personal information will be collected, used, and disclosed. The routine use section of the statement provides a list of specific circumstances where the information may be disclosed outside the Department of Defense (DOD), along with the reasons for such disclosure. This section ensures transparency and helps individuals understand the potential sharing of their information with other entities or agencies.

Submit
102. (211) What forwarding method is also known as runtless switching?

Explanation

Fragment-free forwarding method, also known as runtless switching, is a type of forwarding method in which the switch waits for the first 64 bytes of a frame to arrive before forwarding it. This method helps to prevent the forwarding of runt frames, which are frames that are smaller than the minimum frame size. By waiting for the first 64 bytes, fragment-free forwarding ensures that the frame is not a collision fragment and reduces the chances of forwarding corrupted or incomplete frames.

Submit
103. (220) What is the difference between a hub router and a premise router?

Explanation

not-available-via-ai

Submit
104. (206) What notation is expressed in leading zero compression for IPv6?

Explanation

Both IPv4 and IPv6 addresses can be expressed in leading zero compression notation. In this notation, consecutive blocks of zeros can be replaced with a double colon (::). The given answer, 1234:1234:0:0:1234:0:0:1234, is an example of leading zero compression in IPv6 notation. The consecutive blocks of zeros in the middle are compressed using the double colon (::) notation.

Submit
105. (233) An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as

Explanation

not-available-via-ai

Submit
106. (205) What method borrows bits from the host field of an IP address to create a subnet?

Explanation

Classless Inter-Domain Routing (CIDR) is a method that borrows bits from the host field of an IP address to create a subnet. This allows for more efficient allocation of IP addresses by allowing for variable length subnet masks. With CIDR, the traditional classful subnet masking is replaced, and networks can be divided into smaller subnets based on their specific needs, rather than being limited to fixed class boundaries.

Submit
107. (201) At what Open System Interconnect layer are common data compression and encryption schemes used?

Explanation

Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. The Presentation layer is responsible for data formatting, encryption, and compression before it is transmitted over the network. This layer ensures that the data is in a format that can be understood by the receiving device and also provides security by encrypting the data. Therefore, it is at the Presentation layer where common data compression and encryption schemes are implemented.

Submit
108. (229) Official guidance on individual security clearances and permitting access to classified information can be found in

Explanation

AFI 31–501 is the correct answer because it provides official guidance on individual security clearances and permitting access to classified information. The other options (AFI 31–301, AFI 31–401, AFI 31–601) do not specifically address this topic, making them incorrect choices.

Submit
109. (234) Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?

Explanation

INFOCON 2 is the condition that permits non-essential networks to be taken offline and substituted with alternate methods of communication. This means that when the INFOCON level is at 2, the organization can prioritize essential networks and switch to alternative means of communication for non-essential networks. This allows for better resource allocation and ensures that critical communication channels are not compromised during times of heightened security or threat levels.

Submit
110. (235) At what level do regional operation centers perform Network Operations (NETOPS) to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management?

Explanation

Regional operation centers perform Network Operations (NETOPS) at Tier 2 level. This is where operational and administrative control is ensured by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management.

Submit
111. (218) This characteristic of the Global Information Grid ensures seamless transmission of information between different service branches

Explanation

Common policy and standards refer to a set of rules and guidelines that are universally followed across different service branches. By having common policies and standards in place, the Global Information Grid ensures that information can be seamlessly transmitted between these branches. This promotes interoperability and allows for efficient communication and coordination between different service branches, ultimately enhancing the overall effectiveness of the system.

Submit
112. (228) Which security program is covered under AFI 10–701?

Explanation

AFI 10-701 covers OPSEC (Operations Security). OPSEC is a process that identifies critical information and analyzes threats to protect sensitive information from potential adversaries. It involves identifying vulnerabilities, assessing risks, and implementing countermeasures to ensure the confidentiality, integrity, and availability of information. AFI 10-701 provides guidance and procedures for implementing OPSEC measures within the Air Force to safeguard critical information and prevent unauthorized disclosure or exploitation.

Submit
113. (234) When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected?

Explanation

When a risk of a network system attack has been identified, INFOCON 3 requires all unclassified dial-up connections to be disconnected. INFOCON 3 signifies an increased risk of attack and heightened security measures. Disconnecting unclassified dial-up connections helps to prevent unauthorized access and potential exploitation of the network system.

Submit
114. (230) Which form is used with a transfer report to accompany a COMSEC package?

Explanation

The correct form used with a transfer report to accompany a COMSEC package is SF 153.

Submit
115. (231) Which organization assigns communication security incident report case numbers?

Explanation

The Air Force Communications Agency is responsible for assigning communication security incident report case numbers.

Submit
116. (236) Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?

Explanation

The correct answer is "C" because resources designated as priority are provided when the level of security requires a reasonable degree of deterrence against hostile acts. This means that these resources are given special attention and protection to prevent any potential threats or attacks.

Submit
117. (236) Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?

Explanation

When the level of security requires a significant degree of deterrence against hostile acts, the resources designated as priority are provided. This means that the resources that are essential for deterring and preventing hostile acts are given special attention and allocation.

Submit
118. (206) What Unicast address scope operates within a network segment, and will not originate from, or be destined to, an interface that requires a router to direct traffic?

Explanation

Link-local addresses have a scope that operates within a network segment and does not require a router to direct traffic. These addresses are automatically assigned to interfaces when no other address is available, and they are used for communication within the local network segment. Link-local addresses are not routable and cannot be used to communicate outside of the network segment. Therefore, they meet the criteria mentioned in the question.

Submit
119. (234) Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?

Explanation

INFOCON 4 is the condition that requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present. INFOCON, or Information Operations Condition, is a system used by the military to assess and communicate the current level of cyber threat. INFOCON 4 signifies an increased risk of attack, and as a result, increased monitoring of network system activities is necessary to ensure the security and integrity of the network.

Submit
120. (236) Which form would you use to properly label removable storage media containing "confidential" information?

Explanation

The correct form to use for properly labeling removable storage media containing "confidential" information is SF 708.

Submit
121. (230) What reference would you use for guidance on Air Force messaging?

Explanation

The correct answer is AFI 33-119. AFI 33-119 is the Air Force Instruction that provides guidance on Air Force messaging. It outlines the policies and procedures for the creation, transmission, and management of official messages within the Air Force. This reference would be the most appropriate and reliable source for individuals seeking guidance on Air Force messaging.

Submit
122. (232) The Air Force Information Assurance Program is detailed in

Explanation

The correct answer is AFI 33-200. This is the Air Force Instruction that provides detailed information about the Air Force Information Assurance Program. It outlines the policies, procedures, and guidelines that the Air Force follows to ensure the confidentiality, integrity, and availability of its information systems and networks. AFI 33-200 covers topics such as risk management, incident response, security training, and certification requirements for personnel involved in information assurance.

Submit
123. (224) What type of Defense Switched Network precedence call cannot be preempted?

Explanation

Flash calls in the Defense Switched Network cannot be preempted. This means that if a Flash call is in progress, it cannot be interrupted or overridden by a call with a higher precedence level. Flash calls are typically used for situations that require immediate attention or response, such as emergencies or critical communications.

Submit
124. (219) Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat?

Explanation

A person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat can be part of the sustaining base segment of the Defense Information System Network (DISN). The sustaining base segment is responsible for providing support and resources to military operations, even if they are not directly involved in combat. This segment includes personnel, facilities, and infrastructure that are necessary for the overall functioning and maintenance of the military forces.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 07, 2012
    Quiz Created by
    Toosoul
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(215) The path between the operating system and virtually all hardware...
(207) What organization developed several wireless standards to meet...
(207) The ability to move about without being tethered by wires in...
(215) Applications are software programs designed to perform what type...
(215) What are two anti-virus programs that the Air Force uses?
(225) While you are using the Red Switch, what feature lets you know...
(204) What type of network connects networks that are typically...
(205) Using a range of 1–126 in the first octet of an IPv4...
(233) What best describes an unintended signals or noise appearing...
(213) The classification of a fill device is
(204) What type of network makes use of tunneling and security...
(207) Who is an authorized client that may unknowingly or maliciously...
(211) What is the method called when the entire frame is received and...
(235) An accreditation decision which allows a system to operate in an...
(223) What concerns slowed the military's adoption of wireless network...
(202) What topology consists of cable segments from each computer...
(217) What was the first disk operating system developed to operate on...
(207) What is the type of memory that retains data after power is...
(207) Which of the following is not one the four security threats to...
(203) Which network protocol has the Department of Defense chosen as...
(217) What directory is always identified by the slash symbol (/) and...
(210) What rule establishes the percent of data that should be local...
(202) What topology defines the way in which devices communicate, and...
(202) What topology combines two or more different physical topologies...
(203) What application within Transmission Control Protocol/Internet...
(231) Final reports of a communication security incident are due
(214) Analog modems are used over the voice band range of
(212) What do routing algorithms initialize and maintain to aid the...
(231) An uninvestigated or unevaluated occurrence that potentially...
(212) Which of these is an example of an Exterior Gateway Protocol?
(217) What is the name of the standard all-purpose shell most commonly...
(207) The computing part of the computer is the central processing...
(207) Which landline transmission medium is the primary carrier of...
(207) Which of the following is not one of the three advantages to...
(215) The core operating-system function is the management of the...
(227) The Global Positioning System program is responsible for...
(201) What layer of the Open System Interconnect model defines the...
(205) Instead of using binary, how are IPv4 addresses expressed to be...
(215) Which one is not a category of the operating system's task...
(201) What is a formal set of rules and conventions that govern how...
(213) What encryption device may you rarely see due to its lower...
(205) What IPv4 reserved address is used for loop back?
(207) What two main components make up the central processing unit?
(207) An optical communications system is comprised of a
(209) What do you apply across Liquid Crystal Display material to...
(215) Software is generally divided into
(223) What is the first step in merging voice, data and video networks...
(201) The Institute of Electrical and Electronics Engineers divide the...
(230) What is the COMSEC program designed to do?
(203) What Transmission Control Protocol/Internet Protocol transport...
(205) How many bits are in an IPv4 address?
(218) This component of the Global Information Grid consists of those...
(214) The main function of the Data Service Unit is to
(226) What is the purpose of the standardized tactical entry point...
(202) What topology defines the layout of a network's devices and...
(202) What topology consists of devices connected to a common, shared...
(203) What Transmission Control Protocol/Internet Protocol network...
(205) What IPv4 class address is used for networks with about 250...
(232) Which applied discipline applies measures and controls to...
(228) Which of the following security programs is defined as a process...
(201) What Open System Interconnect layer is closest to the end user?
(213) What encryption device is certified to secure all classification...
(204) Which is a common port that contains Hyper Text Transfer...
(205) What is a mechanism that allows a network device to divide an IP...
(221) How are non-internet protocols sent across the Secret Internet...
(212) Dynamic routing automatically calculates the best path between...
(203) What Transmission Control Protocol/Internet Protocol network...
(206) What Unicast address scope is designed to be private, internally...
(234) Which condition exists when there is no apparent terrorist...
(210) What is a Data Link layer network device that logically...
 (210) This type of bridge is used to convert one Data Link layer...
(216) One of the Windows Server Editions operating systems provides...
(229) Disclosure of information that would result in the loss, misuse,...
(203) What Transmission Control Protocol/Internet Protocol network...
(206) Instead of using binary, how are IPv6 addresses expressed to be...
(206) What notation is expressed in zero compression for IPv6?
(213) What encryption device is capable of loading up to 500 keys?
(222) What provides conduit for Joint Worldwide Intelligence...
(216) Windows operating systems traditionally function in one of two...
(225) What is the maximum asynchronous data rate for the Defense Red...
(235) At which NETOPS level is responsibility for the worldwide...
(212) What layer of the open system interconnection model do routers...
(205) What is the default classful subnet mask on class B networks?
(224) Which organization is responsible for the design, acquisition,...
(201) At what Open System Interconnect layer do routers operate?
(229) What form is used as a cover sheet to protect Privacy Act...
(229) Guidance for posting information on Air Force web sites is...
(201) At what Open System Interconnect layer do network switches and...
(208) How many devices can connect to a FireWire bus?
(216) Which system provides support for features such as Windows...
(208) How many peripherals can a Universal Serial Bus handle at once?
(219) Who bears the responsibility for maintenance of the sustaining...
(221) Which is an internet protocol encryption device that can be...
(230) Which form is used as a visitor register log to record visitors...
(217) Which pathnames begin at the current working directory?
(214) A modem is a device that modulates
(224) How is responsiveness provided in the Defense Switched Network?
(205) What IPv4 class address is used for multicast addressing?
(206) What Unicast address scope is publicly accessible with the...
(223) Besides limiting connections to the Global Information Grid,...
(229) Providing a list of where and why the information will be...
(211) What forwarding method is also known as runtless switching?
(220) What is the difference between a hub router and a premise...
(206) What notation is expressed in leading zero compression for IPv6?
(233) An unclassified term referring to technical investigations for...
(205) What method borrows bits from the host field of an IP address to...
(201) At what Open System Interconnect layer are common data...
(229) Official guidance on individual security clearances and...
(234) Which condition permits non-essential networks to be taken...
(235) At what level do regional operation centers perform Network...
(218) This characteristic of the Global Information Grid ensures...
(228) Which security program is covered under AFI 10–701?
(234) When a risk of a network system attack has been identified,...
(230) Which form is used with a transfer report to accompany a COMSEC...
(231) Which organization assigns communication security incident...
(236) Which resources designated priority is provided when the level...
(236) Which resources designated priority is provided when the level...
(206) What Unicast address scope operates within a network segment,...
(234) Which condition requires the mandate of increased monitoring of...
(236) Which form would you use to properly label removable storage...
(230) What reference would you use for guidance on Air Force...
(232) The Air Force Information Assurance Program is detailed in
(224) What type of Defense Switched Network precedence call cannot be...
(219) Which segment of the Defense Information System Network (DISN)...
Alert!

Advertisement