The '3D052 Cyber Systems Operations Journeyman Volume 1' quiz assesses knowledge on network setups, including types and configurations. It covers essentials from basic network requirements to distinctions between heterogeneous and homogeneous networks, vital for professionals in IT and network engineering.
Internetwork
Intranetwork
Homogeneous network
Heterogeneous network
Rate this question:
Finger and voiceprints, or retinal scans
Passwords, fingerprints, or identification cards
Passwords, fortezza cards, or identification cards
Something you know, something you have, or something you are
Rate this question:
Know
Have
Need
Read
Rate this question:
Degaussing
Overwriting
Formatting
Deleting
Rate this question:
1
2
5
10
Rate this question:
2-10
10-50
50-250
250-1000
Rate this question:
Configuration
Performance
Accounting
Security
Rate this question:
At the core
None are allowed
Outside the base network
De-militarized zone
Rate this question:
Internetwork
Intranetwork
Homogeneous Network
Heterogeneous Network
Rate this question:
Media access control address
Network server name
Subnet mask address
Node seriel number
Rate this question:
10
29
30
33
Destroying
Degaussing
Sanitizing
Overwriting
Rate this question:
Denial of authorization to operation (DATO)
Interim authorization to operate (IATO)
Authorization to operate (ATO)
Interim authorization to test (IATT)
Rate this question:
Denial of authorization to operation (DATO)
Interim authorization to operate (IATO)
Authorization to operate (ATO)
Interim authorization to test (IATT)
Rate this question:
Public key cryptography
Public key infrastructure (PKI)
Key distribution center
Asymmetric key infrastructure
Rate this question:
Homogeneous Network
Internetwork
Intranetwork
Local Area Network (LAN)
Rate this question:
Network control center (NCC)
Network control center-deployable (NCC-D)
Network operations center (NOSC)
Air Force network operations center (AFNOSC)
Rate this question:
Blue
Orange
Purple
Yellow
Rate this question:
Tunneling
Identification Spoofing
Application-based attacks
Second message encryption
Rate this question:
Network management software
Intrusion detection devices
Vulnerability scanners
Firewalls
Rate this question:
Vulnerability
Threat
Compromise
Tunneling
Rate this question:
Threat
Vulnerability
Compromise
Tunneling
Rate this question:
Certificate Policy Manager
Registration Authority
Certificate Authority
Certificate Repository
Rate this question:
2-10
10-50
50-250
250-1000
Rate this question:
2
4
6
8
Rate this question:
Degausser
Degaussing
Destroying
Sanitizing
Rate this question:
15 days
30 days
45 days
90 days
Rate this question:
Virus
Trojan Horse
Worm
Bot
Rate this question:
Open systems standards teams
Combat integrated system teams
Initial communications support teams
Sustained communications support teams
Rate this question:
Global area network (GAN)
Local area network (LAN)
Metropolitan area network (MAN)
Wide area network (WAN)
Rate this question:
AFPD 33-1
AFI 33-112
AFI 33-115v1
AFI 29-2603v2
Rate this question:
1
2
3
4
Rate this question:
Centralized
Distributed
Hierarchical
Hybrid
Rate this question:
Get
Set
Trap
Getnext
Rate this question:
Get
Set
Trap
GetNext
Rate this question:
Virus
Trojan Horse
Worm
Bot
Rate this question:
Rivest-Shamir-Adleman (RSA)
Diffie and Hellman
Elliptic curve digital signature algorithm (ECDSA)
Elliptic curve Diffie-Hellman (ECDH)
Rate this question:
Global area network (GAN)
Local are network (LAN)
Metropolitan area network (MAN)
Wide area network (WAN)
Rate this question:
2-10
10-50
50-250
250-1000
Rate this question:
6
7
8
9
Rate this question:
Enclave
Bastion
Circuits
Base
Rate this question:
Tuning
Analyzing
Gathering
Monitoring
Rate this question:
Get
Set
Trap
GetNext
Rate this question:
Virtual local area network (VLAN) probe.
Neighbor probe
Containment probe
System information probe
Rate this question:
Authentication
Recertification
Accreditation
Identification
Rate this question:
Identification spoofing and tunneling
Tunneling and application-based attacks
Second message encryption and identification spoofing
Application-based attacks and second message encryption
Rate this question:
Virus
Trojan Horse
Worm
Bot
Rate this question:
Commercial-off-the-shelf (COTS)
Combat integrated systems
Theater deployable communications (TDC)
Integrated communications access package (ICAP)
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.