Quiz About Air Force

124 Questions | Attempts: 85
Please wait...
Question 1 / 125
🏆 Rank #--
Score 0/100

1. What Air Force instruction series covers communications and information?

Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

23456789abcdefghijklmnopqrstuvwxyz

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What Air Force publication establishes policy on how C4 systems are acquired, operated, and maintained?

Submit

3. What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through network control centers?

Submit

4. What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?

Submit

5. What organization does communication and information services entering and exiting the base or site fall under the operational control of?

Submit

6. What function within the Network Control Center provides technical assistance to the unit functional system administrators and workgroup managers?

Submit

7. Whose network area of responsibility starts at the user's terminal and ends at the server, but does not include the network backbone infrastructure components?

Submit

8. What Air Force Instruction sets the policies that unit client support administrators must comply with?

Submit

9. What Network Control Center function responds to detected security incidents, network faults (errors), and user reported outages at the time of help desk referral?

Submit

10. What Network Control Center function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?

Submit

11. Performance management can be broken into which two separate functional categories?

Submit

12. To determine the level of network service provided to the users, you will make a measurement of the total response time

Submit

13. What Network Control Center function increases network reliability by giving the network manager tools to detect problems and initiate recovery procedures?

Submit

14. What does Network Security work to ensure about a network?

Submit

15. Which of the following are jobs performed by a help desk technician on a daily basis?

Submit

16. Within the Network Control Center, what function is initially responsible for taking trouble calls, deciding what type of problem has occurred, and what to do about the problem?

Submit

17. What is one of the most important communications skills you can develop as a help desk operator?

Submit

18. What software is used to open trouble tickets for customer trouble calls?

Submit

19. What is a set of subnetsthat are connected with routers?

Submit

20. What is a set of systems/nodes on a local segment that can be off a switch or a router?

Submit

21. What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?

Submit

22. What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

Submit

23. What type of communications network serves users within a confined geographical area?

Submit

24. What type of communications network links geographically dispersed offices in other cities or around the globe?

Submit

25. How many users are in a peer-to-peer network?

Submit

26. How many users are in a single-server network?

Submit

27. How many users are in a multi-server high-speed backbone network?

Submit

28. In most cases, the frequencies used by wireless networks are in what frequency band?

Submit

29. What is the distorting and/or weakening of a signal as it traverses the media called?

Submit

30. What is a measurement of data transferred through the medium between network connections?

Submit

31. What is a form of communication that transmits information as a serial stream of bits or bytes?

Submit

32. Which of the following categories of twisted-pair cable has the highest throughput?

Submit

33. A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?

Submit

34. Light signals in fibe optic cables can travel distances in excess of how many miles before they need to be boosted?

Submit

35. What type of optic fiber is used to span extremely long distances?

Submit

36. What type of optic fiber is designed for the local area network environment and light is typically generated with a light emitting diode?

Submit

37. What are the principal advantages of fiber optics with present day transmission technology?

Submit

38. What network topology consists of a single central cable to which all computers and other devices connect?

Submit

39. What is the greatest risk to a bus network?

Submit

40. On what network topology, can multiple transmit frames can co-exist?

Submit

41. What is the major Department of Defense contribution to networking?

Submit

42. What is a set of rules that define how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?

Submit

43. What layer of the Open Systems Interconnection reference model is really a set of rules regarding the hardware used to transmit data?

Submit

44. What layer of the Open Systems Interconnection reference model provides the grammar by which machines converse with each other and serves as a vehicle for information transmission?

Submit

45. What layer of the Open Systems Interconnection reference model prevents a fast computer from overwhelming a slow terminal?

Submit

46. A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?

Submit

47. Which layer of the Open Systems Interconnections model is concerned with network security, file transfers, and formatting functions?

Submit

48. The IEEE 802.3 standard describes a local area network using what kind of topology?

Submit

49. What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?

Submit

50. What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?

Submit

51. The IEEE 802.5 standard was developed to cover what local area network topology?

Submit

52. Why can a token ring network cover a greater distance than a token bus network without loss of signal?

Submit

53. What X series protocol is a Message Handling System (MHS) standard, that defines the structure of a store-and-forward e-mail message handling system?

Submit

54. This question was taken out.

Submit

55. Which protocol of Transmission Control Protocol/Internet Protocol provides a connectionless datagram "network access" layer?

Submit

56. Which protocol of Transmission Control Protocol/Internet Protocol is a connection oriented, reliable, host-to-host transport protocol?

Submit

57. What makes it possible for implementers to produce new Network File System systems without having to reconstruct their own system's internal data representation formats to suit Network File System?

Submit

58. As information passes down through the protocol layers, what is the packet that is formed called?

Submit

59. What is the only layer in the Open Systems Interconnection reference model that simply transmits the completed frame?

Submit

60. What layer in the Open Systems Interconnection reference model adds a trailer to the packet?

Submit

61. In the Ethernet environment, what is the minimum number of octets in a frame so it can be sent and received?

Submit

62. What is used to identify network nodes on a physically connected network?

Submit

63. What is the binary equivalent to the dotted decimal number 96?

Submit

64. How many octets is the standard Internet Protocol broken down into?

Submit

65. What communications device converts binary electrical signals into acoustic signals for transmission over telephone lines?

Submit

66. What communications device is used for converting analog signals to digital for transmission on digital lines?

Submit

67. What Network Interface Card module drives the signal onto and from the physical medium?

Submit

68. What Network Interface Card module converts information into a coded data stream?

Submit

69. What Network Interface Card module temporarily holds data for processing to or from the network?

Submit

70. What network component serves as a central connecting point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately?

Submit

71. What type of hub has special capabilites for configurations and or management?

Submit

72. What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped?

Submit

73. What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals?

Submit

74. The purpose of a network repeater is that is?

Submit

75. What is a local area network connection device with two or more ports that forwards frames from one LAN segment to another?

Submit

76. What are the four basic functions of a bridge?

Submit

77. Bridging loops are created when

Submit

78. What is used to logically eliminate loops within a network?

Submit

79. The bridge in a network with the highest priority (the lowest number) is called the

Submit

80. Switching conducted at the layer 2 category is based soley upon what information?

Submit

81. Switching conducted at the layer 3 category is based  upon what information?

Submit

82. What type of switch is limited in its applications to small workgroups where throughput is an issue but where potential network errors will not upset the network?

Submit

83. What type of switch reads the first 64 bytes before forwarding the frame?

Submit

84. What is the technology called that allows Network Interface Card (NIC) to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?

Submit

85. What is a logical grouping of end stations, independent of physical location, with a common set of requirements called?

Submit

86. What is the most common method of defining Virtual local area network membership?

Submit

87. At what level of the Open Systems Interconnection models does a router work?

Submit

88. What is the primary device used for connecting these networks, both within and between networks?

Submit

89. The function performed by a router to move information from one router to another according to decided path determinations is

Submit

90. What type of routing is the establishment of routes by the network administrator that changes only when done manually?

Submit

91. What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?

Submit

92. In what Dynamic Routing protocl must packets go the complete distance before discovering the destination is unreachable?

Submit

93. What routing metric is generally based upon the bit-error rate of the link?

Submit

94. What prevents a router from sending route information back to the router from which it came?

Submit

95. What acts as a translator between two workstaions or networks that use different operating systems, communication protocols, and data format structures?

Submit

96. Where is the backup copy of the Cisco Internet Operating System configuration information stored in the internetworking device?

Submit

97. What are the network connections through which network traffic enters and exits a router called?

Submit

98. What prompt is displayed when in the User Exec mode on a router?

Submit

99. What prompt is displayed when in the Privileged Exec mode on a router?

Submit

100. From what level can all other command modes be accessed?

Submit

101. From what mode is the banner motd command used in?

Submit

102. What command is used to restrict access to the Privileged Exec mode?

Submit

103. What command interface configuration command is used to activate an interface?

Submit

104. To view the current configuration of a router, what command is used from privileged exec mode?

Submit

105. What command is used to change the bootup values within ROM monitor mode?

Submit

106. What filters network traffic by controlling whether routed packets are forwarded or blocked at a router's interface?

Submit

107. What do all access lists end with?

Submit

108. Router access lists must be applied to

Submit

109. What does a standard access list use to filter packets?

Submit

110. What is the range of numbers that represent standard access lists?

Submit

111. What of server is set aside to perform a specific task or function all of the time?

Submit

112. What network type normally utilizes non-dedicated servers?

Submit

113. What is required due to the differences between the physical speed of the print device and the processing speed of the workstation generating the print job?

Submit

114. What frees the computer's attention so the user can continue working while waiting for a document to print?

Submit

115. What type of server is a bundle of application software designed to significantly improve network efficiency and productivity?

Submit

116. What two types of environments are network operating systems implemented upon?

Submit

117. Within the Windows environment, what is the central repository for the entire software and hardware configuration settings in a computer running the Windows based NT operating system?

Submit

118. What is a set of keys, subkeys, and values from the registry stored in its own file location called?

Submit

119. Data in which root-key determins which device drivers and services will load during the boot process?

Submit

120. What is a set of statistical measurements made over a period of time that characterizes network performance?

Submit

121. What is a detailed analysis of the performance of a specific application or a specific network element?

Submit

122. What network performance criteria is the most significant statistic to be collected and calculated?

Submit

123. The measurement of traffic volume actually being carried by the network, typically expressed in kilobytes per second is

Submit

124. What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What Air Force instruction series covers communications and...
What Air Force publication establishes policy on how C4 systems are...
What Air Force publication identifies responsibilities for supporting...
What Air Force publication provides the policy and procedures for...
What organization does communication and information services entering...
What function within the Network Control Center provides technical...
Whose network area of responsibility starts at the user's terminal and...
What Air Force Instruction sets the policies that unit client support...
What Network Control Center function responds to detected security...
What Network Control Center function is the central point of contact...
Performance management can be broken into which two separate...
To determine the level of network service provided to the users, you...
What Network Control Center function increases network reliability by...
What does Network Security work to ensure about a network?
Which of the following are jobs performed by a help desk technician on...
Within the Network Control Center, what function is initially...
What is one of the most important communications skills you can...
What software is used to open trouble tickets for customer trouble...
What is a set of subnetsthat are connected with routers?
What is a set of systems/nodes on a local segment that can be off a...
What type of network environments consist of computer systems from...
What type of network is made up of components from the same vendor or...
What type of communications network serves users within a confined...
What type of communications network links geographically dispersed...
How many users are in a peer-to-peer network?
How many users are in a single-server network?
How many users are in a multi-server high-speed backbone network?
In most cases, the frequencies used by wireless networks are in what...
What is the distorting and/or weakening of a signal as it traverses...
What is a measurement of data transferred through the medium between...
What is a form of communication that transmits information as a serial...
Which of the following categories of twisted-pair cable has the...
A fiber optic network uses a laser or light-emitting diode to send a...
Light signals in fibe optic cables can travel distances in excess of...
What type of optic fiber is used to span extremely long distances?
What type of optic fiber is designed for the local area network...
What are the principal advantages of fiber optics with present day...
What network topology consists of a single central cable to which all...
What is the greatest risk to a bus network?
On what network topology, can multiple transmit frames can co-exist?
What is the major Department of Defense contribution to networking?
What is a set of rules that define how communications are to take...
What layer of the Open Systems Interconnection reference model is...
What layer of the Open Systems Interconnection reference model...
What layer of the Open Systems Interconnection reference model...
A feature which involves the periodic insertion of points into data...
Which layer of the Open Systems Interconnections model is concerned...
The IEEE 802.3 standard describes a local area network using what kind...
What protocol is used by the IEEE 802.3 standard to avoid collisions...
What does a station specifically send when it sends a general request...
The IEEE 802.5 standard was developed to cover what local area network...
Why can a token ring network cover a greater distance than a...
What X series protocol is a Message Handling System (MHS)...
This question was taken out.
Which protocol of Transmission Control Protocol/Internet Protocol...
Which protocol of Transmission Control Protocol/Internet Protocol is...
What makes it possible for implementers to produce new Network File...
As information passes down through the protocol layers, what is the...
What is the only layer in the Open Systems Interconnection reference...
What layer in the Open Systems Interconnection reference model adds a...
In the Ethernet environment, what is the minimum number of octets in a...
What is used to identify network nodes on a physically connected...
What is the binary equivalent to the dotted decimal number 96?
How many octets is the standard Internet Protocol broken down into?
What communications device converts binary electrical signals into...
What communications device is used for converting analog signals to...
What Network Interface Card module drives the signal onto and from the...
What Network Interface Card module converts information into a coded...
What Network Interface Card module temporarily holds data for...
What network component serves as a central connecting point and is...
What type of hub has special capabilites for configurations and or...
What network condition usually begins slowly and (if not stopped)...
What is a group of devices connected to the same physical media such...
The purpose of a network repeater is that is?
What is a local area network connection device with two or more ports...
What are the four basic functions of a bridge?
Bridging loops are created when
What is used to logically eliminate loops within a network?
The bridge in a network with the highest priority (the lowest number)...
Switching conducted at the layer 2 category is based soley upon what...
Switching conducted at the layer 3 category is based  upon...
What type of switch is limited in its applications to small workgroups...
What type of switch reads the first 64 bytes before forwarding the...
What is the technology called that allows Network Interface Card (NIC)...
What is a logical grouping of end stations, independent of physical...
What is the most common method of defining Virtual local area network...
At what level of the Open Systems Interconnection models does a router...
What is the primary device used for connecting these networks, both...
The function performed by a router to move information from one router...
What type of routing is the establishment of routes by the network...
What type of routing involves the use of routing protocols that adjust...
In what Dynamic Routing protocl must packets go the complete distance...
What routing metric is generally based upon the bit-error rate of the...
What prevents a router from sending route information back to the...
What acts as a translator between two workstaions or networks that use...
Where is the backup copy of the Cisco Internet Operating System...
What are the network connections through which network traffic enters...
What prompt is displayed when in the User Exec mode on a router?
What prompt is displayed when in the Privileged Exec mode on a router?
From what level can all other command modes be accessed?
From what mode is the banner motd command used in?
What command is used to restrict access to the Privileged Exec mode?
What command interface configuration command is used to activate an...
To view the current configuration of a router, what command is used...
What command is used to change the bootup values within ROM monitor...
What filters network traffic by controlling whether routed packets are...
What do all access lists end with?
Router access lists must be applied to
What does a standard access list use to filter packets?
What is the range of numbers that represent standard access lists?
What of server is set aside to perform a specific task or function all...
What network type normally utilizes non-dedicated servers?
What is required due to the differences between the physical speed of...
What frees the computer's attention so the user can continue working...
What type of server is a bundle of application software designed to...
What two types of environments are network operating systems...
Within the Windows environment, what is the central repository for the...
What is a set of keys, subkeys, and values from the registry stored in...
Data in which root-key determins which device drivers and...
What is a set of statistical measurements made over a period of time...
What is a detailed analysis of the performance of a specific...
What network performance criteria is the most significant statistic to...
The measurement of traffic volume actually being carried by the...
What type of mask is used within a network that uses the same amount...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!