CDC 3dx53 Set 2 Vol 1 Edit 03

90 Questions | Total Attempts: 41

SettingsSettingsSettings
CDC Quizzes & Trivia

Questions and Answers
  • 1. 
    Which of the following is a duty performed by a cyber surety journeyman?
    • A. 

      Sustain cryptographic equipment.

    • B. 

      Install and maintain servers or other computer systems.

    • C. 

      Manage data, information, and knowledge sharing services.

    • D. 

      Detection activities, including real-time intrusion detection and firewall protection.

  • 2. 
    Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video network, and cryptographic client devices in fixed and deployed environments?
    • A. 

      Client Systems (3D1X1).

    • B. 

      Spectrum Operations (3D1X4).

    • C. 

      Cyber Transport Systems (3D1X2).

    • D. 

      Radio Frequency Transmission Systems (3D1X3).

  • 3. 
    How many steps are in the risk management (RM) process?
    • A. 

      4.

    • B. 

      5.

    • C. 

      6.

    • D. 

      7.

  • 4. 
    What is the third step in the risk management (RM) process?
    • A. 

      Assets hazards.

    • B. 

      Implement controls.

    • C. 

      Supervise and evaluate.

    • D. 

      Develop controls and make decisions.

  • 5. 
    Human error causes approximately what percentage of all accidents?
    • A. 

      40.

    • B. 

      60.

    • C. 

      75.

    • D. 

      95.

  • 6. 
    Which type of network typically provides wireless broadband data services?
    • A. 

      Global network.

    • B. 

      Wireless local area network (WLAN).

    • C. 

      Wireless wide area network (WWAN).

    • D. 

      Wireless metropolitan area network (WMAN).

  • 7. 
    Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
    • A. 

      CAT–6.

    • B. 

      Coaxial.

    • C. 

      Fiber Optic.

    • D. 

      Twisted pair.

  • 8. 
    Which of the following is not an example of unbound media?
    • A. 

      Fiber optic.

    • B. 

      Terrestrial.

    • C. 

      Radio frequency.

    • D. 

      Satellite microwave.

  • 9. 
    In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?
    • A. 

      Bus.

    • B. 

      Star.

    • C. 

      Ring.

    • D. 

      Tree.

  • 10. 
    When viewed in binary form, each octet within an Internet Protocol (IP) address has how many positions?
    • A. 

      4.

    • B. 

      6.

    • C. 

      8.

    • D. 

      10.

  • 11. 
    How many bits are within an internet protocol version 4 (IPv4) address?
    • A. 

      32.

    • B. 

      64.

    • C. 

      128.

    • D. 

      256.

  • 12. 
    Which class of internet protocol (IP) addresses is only used for experimental purposes?
    • A. 

      B.

    • B. 

      C.

    • C. 

      D.

    • D. 

      E.

  • 13. 
    Which internet protocol (IP) address is used for limited broadcasts?
    • A. 

      X.x.x.0.

    • B. 

      X.x.x.255.

    • C. 

      127.x.x.x.

    • D. 

      255.255.255.255.

  • 14. 
    The sequence of leading bits in an internet protocol (IP) that are used to identify the network portion of an IP address is called a
    • A. 

      Mask.

    • B. 

      Subnet.

    • C. 

      Hierarchy.

    • D. 

      Routing prefix.

  • 15. 
    Which protocol does the Internet support as the "language" computers use to find and connect with each other?
    • A. 

      User datagram protocol (UDP).

    • B. 

      Hypertext transfer protocol (HTTP).

    • C. 

      Dynamic host configuration protocol (DHCP).

    • D. 

      Transmission control protocol/Internet Protocol (TCP/IP).

  • 16. 
    Which transmission control protocol (TCP) port is used by hypertext transfer protocol (HTTP) by default?
    • A. 

      50.

    • B. 

      80.

    • C. 

      5050.

    • D. 

      8080.

  • 17. 
    Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a transmission control protocol/internet protocol (TCP/IP) based network?
    • A. 

      Internet protocol (IP).

    • B. 

      Hypertext transfer protocol (HTTP).

    • C. 

      Transmission control protocol (TCP).

    • D. 

      Dynamic host configuration protocol (DHCP).

  • 18. 
    A logical connection point for the transmission of information packets is known as
    • A. 

      A port.

    • B. 

      A protocol.

    • C. 

      A service point.

    • D. 

      An entrance point.

  • 19. 
    Which port range constitutes well-known ports?
    • A. 

      0 to 1023.

    • B. 

      1024 to 23535.

    • C. 

      23536 to 49151.

    • D. 

      49152 to 65535.

  • 20. 
    Which port is used for telnet?
    • A. 

      7.

    • B. 

      20.

    • C. 

      23.

    • D. 

      53.

  • 21. 
    Which port is used for hypertext transfer protocol (HTTP)?
    • A. 

      21.

    • B. 

      22.

    • C. 

      60.

    • D. 

      80.

  • 22. 
    In which type of port scan does the scanner connect to the same port on more than one machine?
    • A. 

      Strobe scan.

    • B. 

      Sweep scan.

    • C. 

      Fragment packet scan.

    • D. 

      File transfer protocol (FTP) bounce scan.

  • 23. 
    Which type of scan is also known as a half open scan?
    • A. 

      Fragment packets.

    • B. 

      Synchronous (SYN) scan.

    • C. 

      User datagram protocol (UDP) scan.

    • D. 

      Transmission control protocol (TCP) scan.

  • 24. 
    Which organization is responsible for developing Air Force ports, protocols and services (PPS) policies and procedures?
    • A. 

      Air Force Network Operations (AFNetOps).

    • B. 

      Air Force Network Integration Center (AFNIC).

    • C. 

      Air Force Network Operations Center (AFNOC).

    • D. 

      Air Force Information, Services and Integration Directorate (SAF/XCIA).

  • 25. 
    How is an Internet protocol version 6 (IPv6) address written?
    • A. 

      Eight groups of four hexadecimal numbers, separated by colons.

    • B. 

      Eight groups of four hexadecimal numbers, separated by periods.

    • C. 

      Four groups of eight hexadecimal numbers, separated by colons.

    • D. 

      Four groups of eight hexadecimal numbers, separated by periods.