CDC 3DX53 Set 2 Vol 1 Edit 03 assesses knowledge in cyber surety, focusing on duties like intrusion detection and firewall protection, client systems operations, risk management processes, and network types. It prepares learners for roles in IT security.
Client Systems (3D1X1).
Spectrum Operations (3D1X4).
Cyber Transport Systems (3D1X2).
Radio Frequency Transmission Systems (3D1X3).
Rate this question:
4.
5.
6.
7.
Rate this question:
Assets hazards.
Implement controls.
Supervise and evaluate.
Develop controls and make decisions.
Rate this question:
40.
60.
75.
95.
Rate this question:
Global network.
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wireless metropolitan area network (WMAN).
Rate this question:
CAT–6.
Coaxial.
Fiber Optic.
Twisted pair.
Rate this question:
Fiber optic.
Terrestrial.
Radio frequency.
Satellite microwave.
Rate this question:
Bus.
Star.
Ring.
Tree.
Rate this question:
4.
6.
8.
10.
Rate this question:
32.
64.
128.
256.
Rate this question:
B.
C.
D.
E.
Rate this question:
X.x.x.0.
X.x.x.255.
127.x.x.x.
255.255.255.255.
Rate this question:
Mask.
Subnet.
Hierarchy.
Routing prefix.
Rate this question:
User datagram protocol (UDP).
Hypertext transfer protocol (HTTP).
Dynamic host configuration protocol (DHCP).
Transmission control protocol/Internet Protocol (TCP/IP).
Rate this question:
50.
80.
5050.
8080.
Rate this question:
Internet protocol (IP).
Hypertext transfer protocol (HTTP).
Transmission control protocol (TCP).
Dynamic host configuration protocol (DHCP).
Rate this question:
A port.
A protocol.
A service point.
An entrance point.
Rate this question:
0 to 1023.
1024 to 23535.
23536 to 49151.
49152 to 65535.
Rate this question:
7.
20.
23.
53.
Rate this question:
21.
22.
60.
80.
Rate this question:
Strobe scan.
Sweep scan.
Fragment packet scan.
File transfer protocol (FTP) bounce scan.
Rate this question:
Fragment packets.
Synchronous (SYN) scan.
User datagram protocol (UDP) scan.
Transmission control protocol (TCP) scan.
Rate this question:
Air Force Network Operations (AFNetOps).
Air Force Network Integration Center (AFNIC).
Air Force Network Operations Center (AFNOC).
Air Force Information, Services and Integration Directorate (SAF/XCIA).
Rate this question:
Eight groups of four hexadecimal numbers, separated by colons.
Eight groups of four hexadecimal numbers, separated by periods.
Four groups of eight hexadecimal numbers, separated by colons.
Four groups of eight hexadecimal numbers, separated by periods.
Rate this question:
Tunneling.
Dual layer.
Dual stack.
Peer-to-peer.
Rate this question:
Installing all applicable security patches.
Creating continuity throughout the network.
Minimizing risks posed by various cyberspace threats.
Keeping complete and accurate documentation for all configuration changes.
Rate this question:
Installing all applicable security patches.
Creating continuity throughout the network.
Minimizing risks posed by various cyberspace threats.
Keeping complete and accurate documentation for all configuration changes.
Rate this question:
802.11a.
802.11b.
802.11g.
802.11n.
Rate this question:
802.11a.
802.11b.
802.11g.
802.11n.
Rate this question:
WiFi protected access (WPA).
Wired equivalency privacy (WEP).
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Rate this question:
An adequate information assurance (IA) posture in a shared-risk environment.
An adequate IA posture in the AF environment.
A federal desktop configuration.
A federal server configuration.
Rate this question:
Secure location.
System classification.
Defense-in-depth code.
Mission assurance category.
Rate this question:
Users are aware of their role in IA.
Users are trained on network security.
Users have met investigative requirements.
Users have satisfied network access requirements.
Rate this question:
Wing commander.
Wing information assurance officer (WIAO).
AF Network Operations (AFNETOPS) commander.
AF Network Operations Center (AFNOC) commander.
Rate this question:
Unit commander.
Unit security manager.
Information system security officer (ISSO).
Wing information system security office (WISSO).
Rate this question:
Having information ready when needed.
Not being able to deny who performed network actions.
The protection of the network from those not authorized access.
The assurance that no one has changed or destroyed information without permission.
Rate this question:
32-bit.
64-bit.
128-bit.
256-bit.
Rate this question:
Digital.
Biometric.
Encryption.
Identification.
Rate this question:
Integrity.
Availability.
Confidentiality.
Non-repudiation.
Rate this question:
Wing (WG).
Air Force (AF).
Department of Defense (DOD).
Local Registration Authority/Trusted Agent (LRA/TA).
Rate this question:
1234!@#$asAShi.
P@ssw0rd123456.
Wsob^@49fg91*hd.
GwL18!np*Z&fB3q.
Rate this question:
Classified.
Unclassified.
Sensitive but unclassified.
For official use only (FOUO).
Rate this question:
End-user.
Remote user.
Administrative.
Limited (general).
Rate this question:
Router.
Firewall.
Proxy server.
Network access server.
Rate this question:
Threats.
Exploits.
Vulnerabilities.
Breaches of security.
Rate this question:
Shutting down ports.
Using strong passwords.
Ensuring remote access.
Disabling unused/unneeded services.
Rate this question:
Rsh.
Telnet.
Finger.
File transfer protocol (FTP).
Rate this question:
Notices.
Postings.
Bulletins.
Announcements.
Rate this question:
Quiz Review Timeline (Updated): Jun 12, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.