1.
1. (001) Which of the following is a duty performed by a cyber surety journeyman?
A. 
A. Sustain cryptographic equipment.
B. 
B. Install and maintain servers or other computer systems.
C. 
C. Manage data, information, and knowledge sharing services.
D. 
D. Detection activities, including real-time intrusion detection and firewall protection.
2.
2. (001) Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video
network, and cryptographic client devices in fixed and deployed environments?
A. 
A. Client Systems (3D1X1).
B. 
B. Spectrum Operations (3D1X4).
C. 
C. Cyber Transport Systems (3D1X2).
D. 
D. Radio Frequency Transmission Systems (3D1X3).
3.
3. (002) How many steps are in the risk management (RM) process?
A. 
B. 
C. 
D. 
4.
4. (002) What is the third step in the risk management (RM) process?
A. 
B. 
C. 
C. Supervise and evaluate.
D. 
D. Develop controls and make decisions.
5.
5. (002) Human error causes approximately what percentage of all accidents?
A. 
B. 
C. 
D. 
6.
6. (003) Which type of network typically provides wireless broadband data services?
A. 
B. 
B. Wireless local area network (WLAN).
C. 
C. Wireless wide area network (WWAN).
D. 
D. Wireless metropolitan area network (WMAN).
7.
7. (004) Which bound media has a core surrounded by cladding and a second layer surrounded by
glass or plastic?
A. 
B. 
C. 
D. 
8.
8. (004) Which of the following is not an example of unbound media?
A. 
B. 
C. 
D. 
9.
9. (005) In which topology does a device wanting to communicate with another device on the network
send a broadcast message onto the wire that all other devices see, but only the intended recipient
actually accepts and processes?
A. 
B. 
C. 
D. 
10.
10. (006) When viewed in binary form, each octet within an Internet Protocol (IP) address has how
many positions?
A. 
B. 
C. 
D. 
11.
11. (006) How many bits are within an internet protocol version 4 (IPv4) address?
A. 
B. 
C. 
D. 
12.
12. (006) Which class of internet protocol (IP) addresses is only used for experimental purposes?
A. 
B. 
C. 
D. 
13.
13. (006) Which internet protocol (IP) address is used for limited broadcasts?
A. 
B. 
C. 
D. 
14.
14. (006) The sequence of leading bits in an internet protocol (IP) that are used to identify the
network portion of an IP address is called a
A. 
B. 
C. 
D. 
15.
15. (007) Which protocol does the Internet support as the “language” computers use to find and
connect with each other?
A. 
A. User datagram protocol (UDP).
B. 
B. Hypertext transfer protocol (HTTP).
C. 
C. Dynamic host configuration protocol (DHCP).
D. 
D. Transmission control protocol/Internet Protocol (TCP/IP).
16.
16. (007) Which transmission control protocol (TCP) port is used by hypertext transfer protocol
(HTTP) by default?
A. 
B. 
C. 
D. 
17.
17. (007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce
the administration burden and complexity of configuring hosts on a transmission control
protocol/internet protocol (TCP/IP) based network?
A. 
A. Internet protocol (IP).
B. 
B. Hypertext transfer protocol (HTTP).
C. 
C. Transmission control protocol (TCP).
D. 
D. Dynamic host configuration protocol (DHCP).
18.
18. (008) A logical connection point for the transmission of information packets is known as
A. 
B. 
C. 
D. 
19.
19. (008) Which port range constitutes well-known ports?
A. 
B. 
C. 
D. 
20.
20. (008) Which port is used for telnet?
A. 
B. 
C. 
D. 
21.
21. (008) Which port is used for hypertext transfer protocol (HTTP)?
A. 
B. 
C. 
D. 
22.
22. (008) In which type of port scan does the scanner connect to the same port on more than one
machine?
A. 
B. 
C. 
D. 
D. File transfer protocol (FTP) bounce scan.
23.
23. (008) Which type of scan is also known as a half open scan?
A. 
B. 
B. Synchronous (SYN) scan.
C. 
C. User datagram protocol (UDP) scan.
D. 
D. Transmission control protocol (TCP) scan.
24.
24. (008) Which organization is responsible for developing Air Force ports, protocols and services
(PPS) policies and procedures?
A. 
A. Air Force Network Operations (AFNetOps).
B. 
B. Air Force Network Integration Center (AFNIC).
C. 
C. Air Force Network Operations Center (AFNOC).
D. 
D. Air Force Information, Services and Integration Directorate (SAF/XCIA).
25.
25. (009) How is an Internet protocol version 6 (IPv6) address written?
A. 
A. Eight groups of four hexadecimal numbers, separated by colons.
B. 
B. Eight groups of four hexadecimal numbers, separated by periods.
C. 
C. Four groups of eight hexadecimal numbers, separated by colons.
D. 
D. Four groups of eight hexadecimal numbers, separated by periods.