(001) Actively sampling the status of an external device by a client...
(002) Which term describes that data is whole or complete? a. Driver. ...
(002) What is considered as a technique or method of checking data...
(002) What component initializes communication with all hardware...
(203) What is one of the most important communication skills you can...
(003) What is the sudden and momentary electric current that flows...
(222) What network performance criteria is the most significant...
(003) Static electricity remains intact until it is
(221) What is a set of keys, subkeys, and values from the registry...
...
(221) What two types of environments are network operating systems...
(003) What measure would you take to prevent the build up of static...
(220) What type of server is a bundle of software designed to...
...
(220) What is required due to the differences between the physical...
(004) The process of collecting and analyzing data to determine the...
(219) What is the range of numbers that represent standard access...
(004) In which troubleshooting step would you determine which...
(004) In which troubleshooting step would you confirm a dilemma...
(219) What do all access lists end with?
(218) What command is used to change the bootup values within ROM...
...
(218) What command is used to restrict access to the privileged exec...
...
(217) What acts as a translator between two workstations or networks...
(218) What are the network connections through which network traffic...
(004) What is normally the next step in the boot up process after...
(004) What is normally the next step in the boot up process after the...
(217) What prevents a router from sending route information back to...
(005) What can detect if central processing unit (CPU) hardware...
(005) When troubleshooting hardware, one simple method of identifying...
(006) What rank must primary communications security responsible...
(217) At what level of the OSI model does a router work?
(006) After receiving their initial educations in communications...
(006) To ensure communications security responsible officers (CRO) are...
(215) The bridge in a network with the highest priority (the lowest...
(006) Who is responsible for the production and management of...
(215) What is a local area network connection device with two or more...
(006) What is the classification of the combination to any security...
(215) Bridging loops are created when
(006) The operational use and control of communications security...
(215) What is used to logically eliminate loops within a network?
(214) What network component serves as a central connecting point and...
(214) What is a group of devices connected to the same physical media...
(214) What network condition usually begins slowly and (if not...
(007) This form is considered a daily physical security inventory for...
(213) What network interface card module drives the signal onto and...
(213) What network interface card module converts information into a...
(007) At a minimum, how often do you change a cipher lock...
(008) What is the preferred method for listing material on the Air...
(212) How many octets is the standard internet protocol broken down...
(213) What communications device converts binary electrical signals...
(212) What is used to identify network nodes on a physically connected...
(211) What is the only layer in the OSI model that simply transmits...
(008) If it is physically impossible to conduct an inventory of a user...
(220) What type of server is set aside to perform a specific task or...
(209) What does a station specifically send when it sends a general...
(209) Why can a token ring network cover a greater distance than a...
(009) The individual who is required to use and safeguard...
(208) What layer of the OSI model prevents a fast computer from...
(208) What is the major Department of Defense contribution to...
(208) What layer of the OSI reference model is really a set of rules...
(207) What is the greatest risk to a bus network?
(207) What network topology consists of a single central cable to...
(009) Where does the next unused voucher number come from that is used...
(206) What are the principal advantages of fiber optics with present...
(206) What type of fiber optic is used to span extremely long...
(206) Light signals in fiber optic cables can travel distances in...
(206) A fiber optic network uses a laser or light-emitting diode to...
(205) What is a measurement of data transferred through the medium...
(205) What is a form of communication that transmits information as a...
(205) What is the distorting and/or weakening of a signal as it...
(204) How many users are in a multi-server high-speed backbone...
(204) What type of communications network links geographically...
(204) How many users are in a peer-to-peer network?
(010) What should each communications security responsible officer...
(204) What type of communications network serves users within a...
(202) What does network security work to ensure about a network?
(202) What Air Force Instruction sets the policies that unit client...
(204) What is a set of systems/nodes on a local segment that can be...
(203) What software is used to open trouble tickets for customer...
(202) What organization does communication and information services...
(203) Within the NCC, what function is initially responsible for...
(201) What Air Force instruction series covers communications and...
(010) Disposition records and/or destruction reports are not required...
(203) Which of the following jobs are performed by a help desk...
(011) What term suggests movement of material from one place to...
(204) What type of network is made up of components from the same...
(204) What is a set of subnets that are connected with...
(011) What is the maximum number of different actions that can be...
(202) What function within the network control center provides...
(012) What form is commonly used as a destruction certificate of...
(012) In which folder of the communications security (COMSEC) account...
(013) Failure to comply with an urgent dissemination message could...
(014) Who is ultimately responsible for all emergency actions plans...
What are network attacks that bypass the firewall?
What is the intrusion practice of encapsulating a message (that would...
What is at the very core of the barrier reef process?
In what step of the barrier reef process do you map both the physical...
What is a physical device that users carry to authenticate themselves...
What is a plastic/magnetic device that contains a microprocessor used...
What is the measure used to verify the eligibility of a subject and...
How is a personal identification number categorized?
What is the process of analyzing threats against and the...
In which phase of the department of Defense I.T. Security...
Waht is the maximum number of years an automated information system...
How many different categories of information does the performance...
What color on the system management automated report tracking system...
Waht are the 3 main components of the system management automated...
What diagnostics command is run exclusively on Windows based machines?
(015) Which Air Force form do communications security managers (CM)...
What type of network problem is caused by collisions on the domain?
Ideally, the average network utilization value should be less than
What type of network errors do jabbers usually cause?
(015) What is the maximum time between emergency action plan (EAP)...
What utilities are used to find the round trip delay between a source...
Over 60% of all network problems occur at what layers of the OSI...
What is the maximum packet size for the internet protocol?
What are frames called that consist of garbled bits of data that are...
Within how many bytes of transmission should a network interface card...
What function of fault management identifies options for minimizing...
What is an indication that a noteworthy event has occured on the...
What is one of the greatest downfalls of personnel who must work...
(001) What is the first job the basic input output system (BIOS) does...
What are the 2 basic ways network faults can be detected?
Why should only one possibility of a network problem be troubleshot at...
What is the first of 7 logical steps used to troubleshoot a network...
What is the name for the core set of software instructions contained...
What usually has the most significance when determining the amount of...
When a new folder or file is created on a new technology file system...
What permission always overrides all other permissions assigned to a...
(001) Which original component was very susceptible to damage from...
What file permission provides a user with the ability to change file...
(018) What is known as a state-of-the-art ground-to-ground...
Which group scope allows member permissions to be assigned in any...
(018) What theater deployable communications (TDC) characteristic...
For user accounts with elevated privileges, such as a client support...
...
What type of simple network management protocol node is resposible to...
What SNMP operational message retrieves the value of one instance of...
...
Which category of simple network management protocol node is...
(001) Which component uses a lithium battery to maintain computer...
Network management protocols are designed (in most cases) to...
What network management area is concerned with controlling access...
What are the two functional categories of performance management?
(001) What is considered as nonvolatile permanent memory? ...
Which functional category of performance management tracks historical...
(019) Who provides uninterrupted flow of mission critical information...
(001) What is a form of firmware that contains the computer's startup...
(020) Who should you notify immediately of any predeployment...
(020) What phase is concerned with exercises to ensure you are...
What are the 3 most common network management architectures?
What is defined as a bundle of application software designed to...
What is the simplest and least expensive type of firewall to stop...
What type of firewall is used to seperate secure sites, networks, or...
What network device performs rigorous examinations of systems to...
What software program protects classified data by erasing it from the...
What is the preferred method of clearing magnetic tapes?
What web based process incorporates identification and evaluation of...
Who is the IAVA process manager?
Within the DOD computer emergency response team three tiered...
Within the DOD computer emergency response team three tiered...
What standard utilized by the defense messaging system for messaging...
(016) Who is the final approval authority for a person going into...
(213) What network interface card module temporarily holds holds data...
(009) What is the term used when referring to specific communications...
(217) The function performed by a router to move information from one...
What are the most common, immediate and service-affecting types of...
(001) What static RAM (SRAM) uses special applications in a CPU?...
(002) What interrupt request (IRQ) line number is normally used for...
(217) What is the primary device used for connecting these networks,...
(216) What is a logical grouping of end stations, independent of...
(006) This communications security (COMSEC) material requires the most...
(210) Which protocol of TCP/IP provides a connectionless datagram...
(209) What Xseries protocol is a message handling system (MHS)...
(010) In which phase does the communications security (COMSEC) manager...
(202) What network control center function responds to detected...
(013) Whenever communications security (COMSEC) material needs to be...
(014) How long do you need to maintain the written documentation of...
What is the minimum packet size for the Internet protocol?
(204) What type of network environments consist of computer systems...
What is one of the most common types of hardware devices used for...
What function checks for damaged frames by recalculating the 32-bit...
What is the first question "network experts" ask when beginning to...
When a volume is formatted with new technology file system, what group...
In the event that a domain controller is no longer functioning, what...
(008) Air Force communications security (AFCOMSEC) Form 16 inventories...
What is one way to increase file server efficiency?
(002) What is defined as an asynchronous signal from a computer...
(002) Which is a very simple example of an error detecting code?...
(006) Who has the authority to approve waivers that are mission...
(212) What type of mask is used within a network that uses the same...
(205) Which of the following categories of twisted-pair cable has the...
(204) How many users are in a single-server network?
What diagnostic test is usually run on a nic to ensure it is...
What standard utilized by the defense messaging system...
(214) What type of hub has special capabilities for configurations and...
(211) What layer in the OSI model adds a trailer to the packet?
(202) Performance management can be broken into which two separate...