3D053 V1 & 2 2018

175 Questions | Total Attempts: 146

SettingsSettingsSettings
3D053 V1 & 2 2018 - Quiz


Questions and Answers
  • 1. 
    1. (001) Which of the following is a duty performed by a cyber surety journeyman?
    • A. 

      A. Sustain cryptographic equipment.

    • B. 

      B. Install and maintain servers or other computer systems.

    • C. 

      C. Manage data, information, and knowledge sharing services.

    • D. 

      D. Detection activities, including real-time intrusion detection and firewall protection.

  • 2. 
    2. (001) Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video network, and cryptographic client devices in fixed and deployed environments?
    • A. 

      A. Client Systems (3D1X1).

    • B. 

      B. Spectrum Operations (3D1X4).

    • C. 

      C. Cyber Transport Systems (3D1X2).

    • D. 

      D. Radio Frequency Transmission Systems (3D1X3).

  • 3. 
    3. (002) How many steps are in the risk management (RM) process?
    • A. 

      A. 4.

    • B. 

      B. 5.

    • C. 

      C. 6.

    • D. 

      D. 7.

  • 4. 
    4. (002) What is the third step in the risk management (RM) process?
    • A. 

      A. Assets hazards.

    • B. 

      B. Implement controls.

    • C. 

      C. Supervise and evaluate.

    • D. 

      D. Develop controls and make decisions.

  • 5. 
    5. (002) Human error causes approximately what percentage of all accidents?
    • A. 

      A. 40.

    • B. 

      B. 60.

    • C. 

      C. 75.

    • D. 

      D. 95.

  • 6. 
    6. (003) Which type of network typically provides wireless broadband data services?
    • A. 

      A. Global network.

    • B. 

      B. Wireless local area network (WLAN).

    • C. 

      C. Wireless wide area network (WWAN).

    • D. 

      D. Wireless metropolitan area network (WMAN).

  • 7. 
    7. (004) Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
    • A. 

      A. CAT–6

    • B. 

      B. Coaxial

    • C. 

      C. Fiber optic.

    • D. 

      D. Twisted pair

  • 8. 
    8. (004) Which of the following is not an example of unbound media?
    • A. 

      A. Fiber optic.

    • B. 

      B. Terrestrial.

    • C. 

      C. Radio frequency.

    • D. 

      D. Satellite microwave.

  • 9. 
    9. (005) In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?
    • A. 

      A. Bus.

    • B. 

      B. Star.

    • C. 

      C. Ring.

    • D. 

      D. Tree.

  • 10. 
    10. (006) When viewed in binary form, each octet within an Internet Protocol (IP) address has how many positions?
    • A. 

      A. 4.

    • B. 

      B. 6.

    • C. 

      C. 8.

    • D. 

      D. 10.

  • 11. 
    11. (006) How many bits are within an internet protocol version 4 (IPv4) address?
    • A. 

      A. 32.

    • B. 

      B. 64.

    • C. 

      C. 128.

    • D. 

      D. 256.

  • 12. 
    12. (006) Which class of internet protocol (IP) addresses is only used for experimental purposes?
    • A. 

      A. B.

    • B. 

      B. C.

    • C. 

      C. D.

    • D. 

      D. E.

  • 13. 
    13. (006) Which internet protocol (IP) address is used for limited broadcasts?
    • A. 

      A. x.x.x.0.

    • B. 

      B. x.x.x.255.

    • C. 

      C. 127.x.x.x.

    • D. 

      D. 255.255.255.255.

  • 14. 
    14. (006) The sequence of leading bits in an internet protocol (IP) that are used to identify the network portion of an IP address is called a
    • A. 

      A. mask.

    • B. 

      B. subnet.

    • C. 

      C. hierarchy.

    • D. 

      D. routing prefix.

  • 15. 
    15. (007) Which protocol does the Internet support as the “language” computers use to find and connect with each other?
    • A. 

      A. User datagram protocol (UDP).

    • B. 

      B. Hypertext transfer protocol (HTTP).

    • C. 

      C. Dynamic host configuration protocol (DHCP).

    • D. 

      D. Transmission control protocol/Internet Protocol (TCP/IP).

  • 16. 
    16. (007) Which transmission control protocol (TCP) port is used by hypertext transfer protocol (HTTP) by default?
    • A. 

      A. 50.

    • B. 

      B. 80.

    • C. 

      C. 5050.

    • D. 

      D. 8080.

  • 17. 
    17. (007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a transmission control protocol/internet protocol (TCP/IP) based network?
    • A. 

      A. Internet protocol (IP).

    • B. 

      B. Hypertext transfer protocol (HTTP).

    • C. 

      C. Transmission control protocol (TCP).

    • D. 

      D. Dynamic host configuration protocol (DHCP).

  • 18. 
    18. (008) A logical connection point for the transmission of information packets is known as
    • A. 

      A. a port.

    • B. 

      B. a protocol.

    • C. 

      C. a service point.

    • D. 

      D. an entrance point.

  • 19. 
    19. (008) Which port range constitutes well-known ports?
    • A. 

      A. 0 to 1023.

    • B. 

      B. 1024 to 23535.

    • C. 

      C. 23536 to 49151.

    • D. 

      D. 49152 to 65535.

  • 20. 
    20. (008) Which port is used for telnet?
    • A. 

      A. 7.

    • B. 

      B. 20.

    • C. 

      C. 23.

    • D. 

      D. 53.

  • 21. 
    21. (008) Which port is used for hypertext transfer protocol (HTTP)?
    • A. 

      A. 21.

    • B. 

      B. 22.

    • C. 

      C. 60.

    • D. 

      D. 80.

  • 22. 
    22. (008) In which type of port scan does the scanner connect to the same port on more than one machine?
    • A. 

      A. Strobe scan.

    • B. 

      B. Sweep scan.

    • C. 

      C. Fragment packet scan.

    • D. 

      D. File transfer protocol (FTP) bounce scan.

  • 23. 
    23. (008) Which type of scan is also known as a half open scan?
    • A. 

      A. Fragment packets.

    • B. 

      B. Synchronous (SYN) scan.

    • C. 

      C. User datagram protocol (UDP) scan.

    • D. 

      D. Transmission control protocol (TCP) scan.

  • 24. 
    24. (008) Which organization is responsible for developing Air Force ports, protocols and services (PPS) policies and procedures?
    • A. 

      A. Air Force Network Operations (AFNetOps).

    • B. 

      B. Air Force Network Integration Center (AFNIC).

    • C. 

      C. Air Force Network Operations Center (AFNOC).

    • D. 

      D. Air Force Information, Services and Integration Directorate (SAF/XCIA).

  • 25. 
    25. (009) How is an Internet protocol version 6 (IPv6) address written?
    • A. 

      A. Eight groups of four hexadecimal numbers, separated by colons.

    • B. 

      B. Eight groups of four hexadecimal numbers, separated by periods.

    • C. 

      C. Four groups of eight hexadecimal numbers, separated by colons.

    • D. 

      D. Four groups of eight hexadecimal numbers, separated by periods.

Back to Top Back to top