CDC 3DX7X Vol 1

  • AFI 36-2201
  • MPTO 00–33A–1001–WA
Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Fjeffkirk
F
Fjeffkirk
Community Contributor
Quizzes Created: 4 | Total Attempts: 1,041
| Attempts: 129 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which common port contains Hyper Text Transfer Protocol (HTTP) servers and proxies?

Explanation

Port 8080 is commonly used for HTTP servers and proxies. While port 80 is the default port for HTTP, port 8080 is often used as an alternative when the default port is already in use or blocked. This allows HTTP traffic to be redirected to port 8080, ensuring that web servers and proxies can still function properly. Ports 110 and 443 are used for different purposes, such as email (POP3) and secure web browsing (HTTPS), respectively.

Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

The CDC 3DX7X Vol 1 quiz assesses knowledge crucial for various Air Force Specialty Codes (AFSCs), focusing on systems programming, skill level advancements, and manpower planning. It's designed for Air Force personnel aiming to enhance their understanding and proficiency in their respective fields.

Personalize your quiz and earn a certificate with your name on it!
2. What kind of network interconnects users with computer resources in a geographic area or region like a city?

Explanation

A Metropolitan Area Network (MAN) is a type of network that connects users with computer resources in a specific geographic area or region, such as a city. Unlike a Local Area Network (LAN), which typically covers a smaller area like a building or campus, a MAN covers a larger area and allows for the interconnection of multiple LANs. A Wide Area Network (WAN) covers an even larger area, such as multiple cities or countries, and a Virtual Private Network (VPN) is a secure network that allows remote users to access a private network over a public network. Therefore, the correct answer for this question is Metropolitan Area Network (MAN).

Submit
3. Which identity management process uses a password to authenticate a user?

Explanation

The correct answer is knowledge-based. In this identity management process, a user is authenticated by providing a password. This method relies on the user's knowledge of a specific password to verify their identity. Other methods such as tokens, biometrics, and multifactor authentication may also be used for identity verification, but in this case, the use of a password is specifically mentioned.

Submit
4. In-depth information for administering the Government Purchase Card program at all responsible levels is found in Air Force Instruction (AFI)

Explanation

The correct answer is 64-117 because the question asks for the source of in-depth information for administering the Government Purchase Card program at all responsible levels. The Air Force Instruction (AFI) provides detailed guidelines and procedures for the program, and AFI 64-117 specifically covers the Government Purchase Card program in the Air Force.

Submit
5. Which of the following is not a responsibility of Government Purchase Card (GPC) cardholders?

Explanation

The responsibility of Government Purchase Card (GPC) cardholders includes making authorized transactions, reconciling transactions, and logging transactions. However, funds accountability is not a responsibility of GPC cardholders. This means that GPC cardholders are not directly responsible for managing or tracking the funds associated with the purchases made using the GPC. Instead, funds accountability is typically handled by higher-level financial management personnel within the government organization.

Submit
6. Which Air Force Specialty Code (AFSC) requires members to pass the Air Force Electronic Data Processing Test?

Explanation

The Air Force Specialty Code (AFSC) that requires members to pass the Air Force Electronic Data Processing Test is Computer Systems Programming. This test is likely a requirement for this specialty as it assesses the individual's knowledge and skills in electronic data processing, which is a crucial aspect of computer systems programming. The test ensures that members have the necessary proficiency in this area before being assigned to this AFSC.

Submit
7. Which of the following functions is primarily staffed by Client Systems personnel but may have a variety of Air Force Specialty Codes (AFSCs) based upon the unit mission?

Explanation

The correct answer is Communications Focal Point. This function is primarily staffed by Client Systems personnel, but the specific Air Force Specialty Codes (AFSCs) can vary depending on the unit mission. This suggests that different units may have different requirements for the personnel in this role, and the AFSCs may be tailored to meet those specific needs.

Submit
8. Where is the Air Force active component manpower planning and programming centralized

Explanation

The correct answer is at Headquarters Air Force (HAF). This means that the Air Force active component manpower planning and programming is centralized at the headquarters of the Air Force. This suggests that the decision-making and coordination for manpower planning and programming activities are handled at the highest level of the Air Force organization.

Submit
9. Which of the following is a subdivision of programmed cost data related to a weapon system or support function?

Explanation

Program Element Code (PEC) is a subdivision of programmed cost data related to a weapon system or support function. PEC is a unique code assigned to each element of a program, which helps in identifying and tracking the costs associated with that specific element. It allows for better budgeting, cost estimation, and resource allocation within a program. PEC helps in categorizing and organizing the costs related to different aspects of a weapon system or support function, making it an essential subdivision of programmed cost data.

Submit
10. Which of the following is not a responsibility of the Air Force Career Field Manager (AFCFM)?

Explanation

The responsibility of the Air Force Career Field Manager (AFCFM) is to oversee and manage various aspects of a specific career field within the Air Force. This includes constructing career paths, managing skill-level training requirements, and establishing requirements for entry into the career field. However, distributing personnel throughout their respective major command (MAJCOM) is not a responsibility of the AFCFM. This task is typically handled by the personnel or manpower office within the MAJCOM.

Submit
11. Which of the following is not an action of the Specialty Training Requirements Team (STRT)?

Explanation

The Specialty Training Requirements Team (STRT) is responsible for various actions related to training and education. They draft and sign minutes, finalize part 1 of the career field education and training plan (CFETP), and finalize the Air Force Enlisted Classification Directory (AFECD) specialty description. However, they do not finalize Specialty Training Standards (STS)/Course Training Standards (CTS) for all courses.

Submit
12. Which of the following is included in the Master Training Plan only if applicable to the work center?

Explanation

The Job Qualification Standard is included in the Master Training Plan only if it is applicable to the work center. This means that if the work center requires specific job qualifications, such as certifications or specialized training, then the Job Qualification Standard will be included in the Master Training Plan. However, if the work center does not have any specific job qualifications, then the Job Qualification Standard will not be included in the Master Training Plan.

Submit
13. How many steps are there in Operational Risk Management (ORM)?

Explanation

Operational Risk Management (ORM) involves a systematic approach to identifying, assessing, and managing risks in an organization's operations. It typically consists of six steps: risk identification, risk assessment, risk mitigation, risk monitoring, risk reporting, and risk review. These steps help organizations proactively identify and address potential risks, ensuring the smooth functioning of their operations and minimizing the impact of any unforeseen events. Therefore, the correct answer to the question is 6.

Submit
14. Supervisors document and maintain completed safety training on

Explanation

Supervisors document and maintain completed safety training on AF Form 55. This form is specifically designed for recording and tracking safety training completion. It serves as a comprehensive record of an individual's safety training history, ensuring that supervisors can easily verify and maintain compliance with safety training requirements.

Submit
15. Which of the following is not a term for Job Safety Analysis?

Explanation

The term "Job Safety Training (JST)" is not a term for Job Safety Analysis. Job Safety Analysis (JSA) is a systematic process that identifies and analyzes potential hazards associated with a specific job or task. It involves breaking down the job into individual steps, identifying potential hazards, and determining the appropriate control measures to mitigate those hazards. On the other hand, Job Safety Training (JST) refers to the training provided to employees to ensure they have the necessary knowledge and skills to perform their jobs safely. While training is an important component of job safety, it is not the same as Job Safety Analysis.

Submit
16. Which of the following is information not contained in Technical Order (TO) 00–5–1?

Explanation

The information not contained in Technical Order (TO) 00-5-1 is the Time Compliance Technical Order (TCTO) procedures. The other options mention the resources, infrastructure, and training required to manage and use TOs, but TCTO procedures are not included in TO 00-5-1.

Submit
17. When a person uses his or her position for private or personal gain it is called

Explanation

When a person uses their position for private or personal gain, it is considered a misuse of position. This refers to the abuse of authority or power for personal benefits, which is unethical and can lead to negative consequences such as corruption or favoritism.

Submit
18. What is the maximum amount for minor construction projects that Operation and Maintenance (O&M) funds will cover under normal conditions?

Explanation

Under normal conditions, Operation and Maintenance (O&M) funds will cover a maximum amount of $750,000 for minor construction projects.

Submit
19. Which of the following is the highest level in which quarterly awards are normally presented?

Explanation

The highest level in which quarterly awards are normally presented is the Wing. This implies that within a larger organizational structure, such as the military or a corporation, the Wing is the highest level where these awards are typically given out. It suggests that there may be multiple levels within the organization, such as Groups and Squadrons, but the Wing is the highest level where these awards are recognized and celebrated.

Submit
20. What device is a series of single-pole, single-throw switches mounted to a circuit board?

Explanation

A keyboard is a device that consists of a series of single-pole, single-throw switches mounted to a circuit board. These switches, also known as key switches, are responsible for registering the input when a key is pressed. Therefore, the correct answer is keyboard.

Submit
21. Virtual circuits are established, maintained, and terminated at what Open System Interconnect (OSI) layer?

Explanation

Virtual circuits are established, maintained, and terminated at the Transport layer of the Open System Interconnect (OSI) model. The Transport layer is responsible for end-to-end communication between hosts and ensures reliable delivery of data. It establishes a connection-oriented virtual circuit, which provides a dedicated communication path between the sender and receiver. This virtual circuit is maintained throughout the communication session and terminated once the data transfer is complete. The Network layer is responsible for routing and addressing, the Physical layer deals with the physical transmission of data, and the Data Link layer handles data framing and error detection.

Submit
22. What is the combat information technology (IT) communication support agency of the DoD called?

Explanation

The correct answer is Defense Information Systems Agency. The Defense Information Systems Agency (DISA) is the combat information technology (IT) communication support agency of the Department of Defense (DoD). DISA provides IT and communication support to the military services, combatant commands, and other DoD components. It is responsible for the planning, development, and management of the DoD's information systems and networks, ensuring secure and reliable communication capabilities for the defense community.

Submit
23. Who must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service?

Explanation

The customer must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service. This means that it is the responsibility of the customer to ensure that they have the necessary encryption devices in order to connect to the service securely. The Security Manager, National Security Agency, and Communications Squadron are not responsible for providing these encryption devices.

Submit
24. In a connection-oriented protocol, such as Transmission Control Protocol (TCP), what must happen before data is transmitted between clients?

Explanation

In a connection-oriented protocol like TCP, before data can be transmitted between clients, a connection must be established. This involves a series of steps where both the client and server exchange control messages to negotiate and establish a reliable connection. Once the connection is established, the clients can then transmit data to each other with the assurance of reliable delivery and error detection.

Submit
25. What Internet Protocol version 4 (IPv4) reserved address is used for loop back?

Explanation

The loopback address is a reserved IP address used to test network connectivity on a local machine. It allows a computer to send and receive data to itself. In IPv4, the loopback address is represented by 127.0.0.1. This address is commonly used for troubleshooting network issues or running local server software.

Submit
26. The range of well-known port numbers is

Explanation

The well-known port numbers range from 0 to 1023. These port numbers are reserved for specific services or protocols, such as HTTP (port 80) or FTP (port 21), and are commonly used by well-known applications. Ports in this range are considered privileged and can only be used by processes with administrative privileges. The other options, 1024 to 49151 and 49152 to 65535, represent the ranges for registered ports and dynamic or private ports, respectively.

Submit
27. What topology consists of cable segments from each computer connected to a centralized component?

Explanation

A star topology consists of cable segments from each computer connected to a centralized component, usually a switch or hub. In this topology, all communication between the computers is routed through the central component, which helps to manage and control the network. This arrangement allows for easy troubleshooting and scalability, as adding or removing computers does not disrupt the entire network.

Submit
28. Over a single pair cable, Integrated Services Digital Network (ISDN) is capable of transmission rates of

Explanation

ISDN (Integrated Services Digital Network) is a digital telecommunications network that allows for the transmission of voice, video, and data over traditional telephone lines. It uses a single pair cable, which limits the transmission rates. The correct answer of 144 Kbps indicates that ISDN is capable of transmitting data at a rate of 144 kilobits per second. This is a relatively low transmission rate compared to the other options provided, reflecting the limitations of ISDN technology.

Submit
29. A modem is a device that

Explanation

A modem is a device that modulates and demodulates data signals. Modulation is the process of converting digital data into analog signals that can be transmitted over a communication channel, while demodulation is the process of converting the analog signals back into digital data. Modems are commonly used to connect devices to the internet via telephone lines, cable lines, or wireless networks. They are responsible for encoding and decoding the data signals to enable communication between devices.

Submit
30. What Data Link Layer network device logically separates a single network into two segments or collision domains in Ethernet networks?

Explanation

A bridge is a Data Link Layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the destination MAC address of each incoming frame and deciding whether to forward it or discard it based on its own MAC address table. This allows for better network performance by reducing collisions and improving overall network efficiency.

Submit
31. Dynamic routing automatically calculates the best path between how many nodes?

Explanation

Dynamic routing automatically calculates the best path between two nodes. This means that when a packet needs to be transmitted from one node to another in a network, dynamic routing algorithms are used to determine the most efficient route for the packet to take. These algorithms consider factors such as network congestion, link quality, and other metrics to determine the best path. Therefore, the correct answer is 2.

Submit
32. What is the most common wireless networking standard?

Explanation

802.11 is the most common wireless networking standard. This standard is commonly known as Wi-Fi and is used for wireless local area networks (WLANs). It operates in the 2.4 GHz and 5 GHz frequency bands and provides high-speed wireless connectivity for devices such as laptops, smartphones, and tablets. 802.11 has evolved over time to include various versions such as 802.11b, 802.11g, 802.11n, and 802.11ac, each offering improved speed and range. It is widely adopted and supported by various manufacturers, making it the most prevalent wireless networking standard in use today.

Submit
33. Which operations center monitors and controls Air Force network access points, boundary protection devices, and network activity to provide situational awareness, and report suspicious/malicious activity?

Explanation

The Integrated Network Operations Security Center (I-NOSC) is responsible for monitoring and controlling Air Force network access points, boundary protection devices, and network activity. It provides situational awareness by monitoring network activity and reports any suspicious or malicious activity. The I-NOSC plays a crucial role in ensuring the security and integrity of the Air Force network.

Submit
34. Within the information environment what term describes the advantage, or imbalance, in one's favor?

Explanation

Information superiority refers to the advantage or imbalance in one's favor within the information environment. It means having a superior understanding of the information available, being able to gather and analyze it effectively, and using it to make informed decisions and gain an advantage over others. This term highlights the importance of having superior information management and the ability to effectively use information for strategic purposes.

Submit
35. Which Cyberspace Defense Weapon System sub-discipline determines the extent of intrusions, develops courses of action required to mitigate threats, and determines and executes response actions?

Explanation

Incident response is the correct answer because it involves determining the extent of intrusions, developing courses of action to mitigate threats, and executing response actions. This sub-discipline focuses on promptly identifying and addressing cybersecurity incidents to minimize damage and restore normal operations. Computer forensics is more related to analyzing digital evidence, while incident prevention and incident detection are focused on proactive measures to prevent and detect cyber threats, respectively.

Submit
36. Which threat vector is considered more of an annoyance than an attack?

Explanation

Spam is considered more of an annoyance than an attack because it involves the mass sending of unsolicited and unwanted messages, typically advertising or promotional content. While spam can be disruptive and time-consuming, it does not directly harm or compromise the security of a system or individual. In contrast, viruses, spyware, and phishing are all malicious threats that can cause significant damage, such as stealing personal information, damaging files, or gaining unauthorized access to sensitive data.

Submit
37. Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?

Explanation

Patches are a small piece of code that software developers create to address the flaws found in the original code of a program. They are used to fix vulnerabilities and bugs in software, improving its security and functionality. Patches are often released by software vendors as updates or upgrades to their products, and they are essential for keeping software secure and up to date.

Submit
38. Which of the following is not a mandatory requirement for the advancement to the 7-skill level?

Explanation

The correct answer is d. Completion of Air Education and Training Command (AETC) Supplemental training courses. This is because the question asks for a requirement that is not mandatory for advancement to the 7-skill level. The other options, a, b, and c, all mention requirements that are necessary for advancement, such as minimum rank, on-the-job training, and completion of AFSC specific requirements. However, completion of AETC supplemental training courses is not mandatory for advancement to the 7-skill level.

Submit
39. What document directs the Communications Focal point key processes?

Explanation

The correct answer is MPTO 00–33A–1001–WA. This document directs the Communications Focal point key processes.

Submit
40. What Automated Information System (AIS) is used to document actions on any item with an assigned Standard Reporting Designator (SRD)?

Explanation

The Integrated Maintenance Data System (IMDS) is the correct answer because it is an Automated Information System (AIS) used to document actions on any item with an assigned Standard Reporting Designator (SRD). IMDS is a comprehensive system that allows for the tracking and recording of maintenance actions, providing a centralized database for maintenance data. It is commonly used in the military and aerospace industry to manage and document maintenance activities on various equipment and systems.

Submit
41. Who establishes the necessary controls to ensure periodic inspections are accomplished?

Explanation

The Flight Commander/Chief is responsible for establishing the necessary controls to ensure periodic inspections are accomplished. They have the authority and oversight to ensure that inspections are conducted regularly and in accordance with established procedures. This role is crucial in maintaining the safety and operational readiness of the organization, as periodic inspections help identify and address any potential issues or deficiencies. By assigning this responsibility to the Flight Commander/Chief, the organization can ensure that inspections are prioritized and carried out effectively.

Submit
42. Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within how many days of new equipment/system acceptance?

Explanation

Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within 120 days of new equipment/system acceptance. This means that after the ARC personnel have received and accepted new equipment or a new system, they must undergo a special evaluation within 120 days. This evaluation helps ensure that the personnel are properly trained and competent in using the new equipment or system.

Submit
43. Which statement is not a goal of Operational Risk Management (ORM)?

Explanation

The statement "Identify opportunities to decrease Air Force warfighting effectiveness on the battlefield and in the operational aerospace environment, helping to ensure decisive victory in any future conflict at the least possible cost" is not a goal of Operational Risk Management (ORM). ORM aims to enhance mission effectiveness, integrate risk assessments into decision-making processes, and train leaders and employees to manage risk in all activities. The given statement contradicts the goal of ORM by suggesting that opportunities to decrease effectiveness should be identified, which goes against the objective of preserving assets and safeguarding health and welfare.

Submit
44. Who determines if local checklists and/or work cards are required for specific equipment?

Explanation

The flight commander/chief determines if local checklists and/or work cards are required for specific equipment. They are responsible for overseeing and managing the operations of the flight and ensuring that all necessary procedures and documentation are in place for the equipment used. This includes determining if local checklists and work cards are necessary for the specific equipment being used by the flight.

Submit
45. Who should endorse the AF Form 673 as the Certifying Official?

Explanation

The correct answer is the authoring OPR’s supervisor. The Certifying Official for the AF Form 673 should be the supervisor of the authoring Office of Primary Responsibility (OPR). This ensures that the form is endorsed by someone who has oversight and authority over the OPR, ensuring accountability and accuracy in the certification process.

Submit
46. What systems allow for a commonly understood, maintainable, and defendable domain through all federal and non-federal systems?

Explanation

Commercial Off-The-Shelf (COTS) systems are commonly understood, maintainable, and defendable domain systems that can be used across both federal and non-federal systems. These systems are commercially available and can be easily integrated into existing infrastructure, allowing for interoperability and compatibility. They are designed to meet industry standards and are often more cost-effective and efficient compared to developing custom solutions. Therefore, COTS systems are the best choice for achieving a commonly understood, maintainable, and defendable domain across all federal and non-federal systems.

Submit
47. Procedures and circumstances for Congress to order units into active Federal duty are established in United States Code (USC) Title

Explanation

The correct answer is 32 because United States Code (USC) Title 32 specifically outlines the procedures and circumstances for Congress to order units into active Federal duty. This title is important for understanding the legal framework and requirements for activating units of the military for federal service.

Submit
48. Who appoints Air Force Portal Content Managers and Content Publishers for public and private websites?

Explanation

The correct answer is Wing Commander. The Wing Commander is responsible for appointing Air Force Portal Content Managers and Content Publishers for both public and private websites. They have the authority to select individuals who will be in charge of managing and publishing content on these websites, ensuring that the information is accurate, up-to-date, and meets the standards set by the Air Force.

Submit
49. Which type of fund covers the cost of relocating facilities?

Explanation

Military Construction (MILCON) funds cover the cost of relocating facilities. MILCON funds are allocated for constructing, repairing, or renovating military facilities, including relocating them if necessary. This type of fund specifically focuses on infrastructure projects related to military facilities, such as building new bases or upgrading existing ones. Therefore, MILCON is the correct answer as it directly relates to covering the cost of relocating facilities.

Submit
50. What are the inclusive dates for Secretary of the Air Force/Chief Information Officer ( SAF/CIO) annual awards?

Explanation

The inclusive dates for the Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards are from 1 October to 30 September. This means that the awards cover a one-year period starting in October and ending in September of the following year.

Submit
51. The maximum number of devices a FireWire bus can take is up to

Explanation

FireWire is a high-speed serial bus interface that allows multiple devices to be connected to a computer. The maximum number of devices that a FireWire bus can support is 63. This is because the FireWire specification allows for a maximum of 63 devices to be connected in a daisy-chain configuration, where each device is connected to the previous one in a linear chain. Therefore, the correct answer is 63.

Submit
52. Which is not a type of UNIX pathname?

Explanation

The question is asking to identify the type of UNIX pathname that does not exist. UNIX pathnames can be categorized into four types: simple, relative, absolute, and positive. Simple pathnames consist of a single name, relative pathnames are specified relative to the current directory, absolute pathnames start with the root directory, and positive pathnames are not a valid type of UNIX pathname. Therefore, the answer is positive.

Submit
53. Which application includes tools to help recover lost files and protect against computer failure?

Explanation

Norton Utilities is the correct answer because it is a software application that provides tools specifically designed to help recover lost files and protect against computer failure. It offers features such as disk optimization, file recovery, system diagnostics, and data protection, making it an effective solution for maintaining the performance and security of a computer system. Acrobat Reader is a PDF reader, Virus Scan is an antivirus software, and WinZip is a file compression tool, none of which have the specific tools mentioned in the question.

Submit
54. The Institute of Electrical and Electronics Engineers (IEEE) divides the Open System Interconnect (OSI) Data Link Layers into what two sublayers?

Explanation

The correct answer is Logical Link Control (LLC) and Media Access Control (MAC). The OSI Data Link Layer is divided into these two sublayers to handle different functions. The LLC sublayer is responsible for managing communication between network layers and providing error control and flow control mechanisms. The MAC sublayer is responsible for controlling access to the physical media and handling issues such as addressing, framing, and collision detection.

Submit
55. What are the two classifications of transport protocols?

Explanation

The correct answer is "Connection Oriented and Connectionless Oriented." Transport protocols can be classified into two categories based on their behavior. Connection-oriented protocols establish a dedicated connection between the sender and receiver before transmitting data, ensuring reliable and ordered delivery. Examples include TCP (Transmission Control Protocol). Connectionless-oriented protocols, on the other hand, do not establish a dedicated connection and transmit data packets independently. They do not guarantee reliable or ordered delivery but offer faster transmission. Examples include UDP (User Datagram Protocol).

Submit
56. What regulates how much information passes over a Transmission Control Protocol (TCP) connection before the receiving host must send an acknowledgement?

Explanation

The sliding window is a mechanism used in TCP to regulate the amount of data that can be sent without receiving an acknowledgement. It allows the sender to transmit multiple packets before waiting for an acknowledgement, improving efficiency and reducing latency. The size of the sliding window determines the number of packets that can be sent before an acknowledgement is required. As acknowledgements are received, the window slides forward, allowing the sender to transmit more data. Therefore, the sliding window is responsible for controlling the flow of information over a TCP connection.

Submit
57. How many bits are in an Internet Protocol version 4 (IPv4) address?

Explanation

An Internet Protocol version 4 (IPv4) address consists of 32 bits. This means that there are a total of 2^32 (over 4 billion) unique IPv4 addresses available. Each bit in the address represents a binary value of either 0 or 1, allowing for a wide range of possible combinations. This 32-bit address format is used to identify and locate devices on a network, enabling communication and data transfer between them.

Submit
58. What class uses a range of 1–126 in the first octet of an Internet Protocol version 4 (IPv4)?

Explanation

Class A uses a range of 1-126 in the first octet of an IPv4 address. Class A addresses are used for large networks and can support a maximum of 16 million hosts. The first bit in the first octet is always set to 0 in Class A addresses, which allows for the range of 1-126.

Submit
59. Instead of using binary, how are Internet Protocol version 6 (IPv6) addresses expressed to be more user-friendly?

Explanation

Internet Protocol version 6 (IPv6) addresses are expressed in colon hexadecimal format to make them more user-friendly. This format uses hexadecimal numbers separated by colons, making it easier to read and remember compared to the traditional dotted decimal notation used in IPv4 addresses. The use of hexadecimal numbers also allows for a larger address space, accommodating the increasing number of devices connected to the internet.

Submit
60. The design of communications network is known as

Explanation

The design of communications network refers to the overall structure and organization of the network, including its components, protocols, and policies. This encompasses the arrangement of different network elements, such as routers, switches, and servers, as well as the design principles and guidelines that govern their interactions. Therefore, network architecture is the most appropriate term to describe the design of a communications network. "Internet suite" refers to a collection of protocols and software used for internet communication, "the physical layer" refers to the lowest layer of the network model responsible for transmitting raw data, and "network implementation" refers to the actual deployment and installation of the network.

Submit
61. What kind of network is a group of computers and associated devices that share a common communications line within a small geographic area?

Explanation

A Local Area Network (LAN) is a network that connects computers and devices within a small geographic area, such as a home, office, or building. It allows for the sharing of resources, such as printers and files, and enables communication between connected devices. A LAN typically uses Ethernet cables or Wi-Fi to connect devices to a central router or switch. In contrast, a Metropolitan Area Network (MAN) covers a larger area, such as a city, and a Wide Area Network (WAN) covers even larger areas, such as multiple cities or countries. A Virtual Private Network (VPN) is a secure network connection that allows remote users to access a private network over the internet.

Submit
62. What topology defines the layout of a network's devices and media?

Explanation

The correct answer is physical because the physical topology refers to the actual layout of devices and media in a network. It describes how the devices are physically connected and the physical arrangement of cables, switches, routers, and other networking components. This includes the physical location of devices, the type of cables used, and the overall structure of the network. Logical topology, on the other hand, refers to how data flows within a network, regardless of the physical layout. Hybrid and star are specific types of physical topologies.

Submit
63. Two basic routing activities are determining optimal routing paths and

Explanation

The correct answer is "transporting information groups (packets) through an internetwork." This is because one of the basic routing activities is to determine the optimal paths for transporting packets through an internetwork. Routing involves making decisions on how to forward packets from the source to the destination based on the network topology and various routing algorithms. Therefore, this option accurately describes one of the fundamental tasks of routing.

Submit
64. Which transmission medium is the primary carrier of voice communications?

Explanation

Twisted pair cable is the primary carrier of voice communications because it is a type of cable that consists of pairs of insulated copper wires twisted together. These twisted pairs help to reduce electromagnetic interference, making it suitable for transmitting voice signals. Twisted pair cable is widely used in telephone networks and is capable of carrying analog or digital voice signals effectively over short to medium distances. Fiber optic cable, coaxial cable, and twinax cable are also used for various types of data transmission but are not primarily designed for voice communications.

Submit
65. What are the three major considerations that apply to Cyberspace Operations?

Explanation

The three major considerations that apply to Cyberspace Operations are Law, Authority, and Policy. These considerations are crucial in ensuring the effective and lawful use of cyberspace. Law refers to the legal framework and regulations that govern cyberspace operations, ensuring compliance and accountability. Authority pertains to the allocation of power and decision-making capabilities within cyberspace operations, ensuring proper governance and control. Policy involves the development and implementation of guidelines and procedures that govern the use and management of cyberspace, promoting consistency and best practices in operations.

Submit
66. What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary's, and maximizing cyberspace superiority?

Explanation

Careful planning is critical to mitigating unintended or undesirable effects and maximizing cyberspace superiority because it allows for proactive measures to be taken. By carefully planning and strategizing, potential risks and vulnerabilities can be identified and addressed in advance. This helps to prevent unintended consequences and minimize the impact of any adversary's actions. Additionally, careful planning enables the allocation of resources and the development of effective countermeasures to maintain control and dominance in cyberspace.

Submit
67. Which Electronic Warfare capability uses jamming to reduce the adversary's use of the electromagnetic spectrum (EMS)?

Explanation

Electronic attack is the correct answer because it involves the use of jamming to disrupt or degrade the adversary's use of the electromagnetic spectrum (EMS). By jamming the adversary's communications or radar systems, electronic attack aims to deny or limit their ability to operate effectively in the electromagnetic environment. This capability is a key component of electronic warfare, which encompasses a range of activities aimed at gaining control over the electromagnetic spectrum.

Submit
68. Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations ( CNO)?

Explanation

Electronic Warfare (EW) involves the use of electromagnetic energy to control or attack an adversary's electronic systems. It includes activities such as jamming enemy communications, intercepting and analyzing enemy signals, and protecting friendly systems from electronic threats. Radiated energy is a key aspect of EW as it is used to disrupt or exploit enemy electronic systems. On the other hand, Computer Network Operations (CNO) refers to activities conducted in cyberspace to manipulate, disrupt, or exploit enemy computer networks. While both EW and CNO involve the use of energy and have offensive and defensive capabilities, the statement that EW concerns radiated energy is true.

Submit
69. Which Supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data?

Explanation

The correct answer is Remote Terminal Unit. A Remote Terminal Unit (RTU) is a key component of a SCADA system that connects to sensors in the process and converts sensor signals to digital data. It is responsible for collecting data from various sensors and transmitting it to the supervisory system for monitoring and control. The RTU acts as an interface between the physical process and the SCADA system, ensuring that accurate and reliable data is collected and transmitted for analysis and decision-making.

Submit
70. Which identity management process uses a fingerprint to authenticate a user?

Explanation

Biometrics is the correct answer because it refers to the identity management process that uses a fingerprint to authenticate a user. Biometric authentication involves the use of unique physical or behavioral characteristics, such as fingerprints, iris patterns, or voice recognition, to verify a person's identity. By comparing the captured biometric data with the stored data in a database, the system can determine if the user is genuine or not. This method is highly secure as it relies on an individual's unique biological traits, making it difficult for unauthorized users to gain access.

Submit
71. What is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training Requirements Team ( STRT) and Utilization and Training Workshop (U&TW)?

Explanation

The Occupational Analysis Report (OAR) is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW). The OAR provides a comprehensive analysis of the knowledge, skills, and abilities required for a specific job or career field. It serves as a foundation for creating the CFETP and STS, which outline the training and education requirements for individuals in that career field. The OAR ensures that the CFETP and STS are based on a thorough understanding of the job and its requirements.

Submit
72. Which of the following is the official source of manpower information for an organization and is used as a tool to manage positions?

Explanation

The Unit Manpower Document (UMD) is the official source of manpower information for an organization and is used as a tool to manage positions. It provides detailed information about the authorized manpower positions within the organization, including job titles, responsibilities, and required qualifications. The UMD helps the organization to effectively allocate and manage its manpower resources, ensuring that the right personnel are in the right positions to meet operational needs. The other options listed, Program Element Code (PEC), Authorization Change Request (ACR), and Unit Personnel Management Roster (UPMR), are not specifically related to providing manpower information or managing positions within an organization.

Submit
73. Which segment of the Utilization and Training Workshop (U&TW)/ Specialty Training Requirements Team (STRT) process concentrates on training proficiency levels and training resourcing?

Explanation

Segment 2 of the Utilization and Training Workshop (U&TW)/Specialty Training Requirements Team (STRT) process concentrates on training proficiency levels and training resourcing. This segment likely involves assessing the proficiency levels of individuals or teams and determining the resources needed to provide appropriate training. It may include evaluating the current skill levels, identifying any gaps or areas for improvement, and allocating the necessary resources to meet the training requirements.

Submit
74. Who develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?

Explanation

The correct answer is Electronic Components Industry Association (ECIA). ECIA develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards.

Submit
75. The creation of the DOD as an executive component of the government Is authorized by United States Code (USC) Title

Explanation

The correct answer is 10. The creation of the DOD as an executive component of the government is authorized by United States Code (USC) Title 10. This code outlines the legal framework for the organization and operation of the Department of Defense. It specifies the roles, responsibilities, and authorities of the DOD and its various components, such as the Army, Navy, Air Force, and Marine Corps. Title 10 is an important piece of legislation that ensures the DOD operates within the boundaries set by law and serves as the foundation for the defense of the United States.

Submit
76. Guidance for awards specific to the Cyber community are found in Air Force instruction

Explanation

not-available-via-ai

Submit
77. A workgroup is a simple grouping of how many computers?

Explanation

A workgroup is a simple grouping of computers, and the given answer states that it consists of no more than 20 computers. This means that a workgroup can have a maximum of 20 computers, but it can also have fewer than 20 computers. The answer does not provide an exact number, but it indicates that the number of computers in a workgroup does not exceed 20.

Submit
78. Routers operate at what Open System Interconnect (OSI) layer?

Explanation

Routers operate at the Network layer of the OSI model. The Network layer is responsible for routing and forwarding data packets between different networks. Routers use IP addresses to determine the best path for data packets to reach their destination. They make decisions based on network layer information, such as IP addresses, to direct traffic across multiple networks. Therefore, the correct answer is Network.

Submit
79. What Internet Protocol version 4 (IPv4) class address is used for multicast addressing?

Explanation

IPv4 addresses are divided into five classes: A, B, C, D, and E. Class D addresses are specifically reserved for multicast addressing. Multicast addressing allows a single packet to be sent to multiple destinations simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255, making it the appropriate class for multicast addressing.

Submit
80. Which 802.11 standard is designed to operate at both 2.4 GHz and 5 GHz?

Explanation

The 802.11n standard is designed to operate at both 2.4 GHz and 5 GHz frequencies. It is an improvement over previous standards such as 802.11a, 802.11b, and 802.11g, which operate only at either 2.4 GHz or 5 GHz. 802.11n utilizes multiple-input multiple-output (MIMO) technology, allowing for increased data rates and improved network performance. This makes it capable of supporting higher bandwidth applications and providing better coverage and reliability in both frequency ranges.

Submit
81. Which of the following is an optional attendee for the Utilization and Training Workshop (U&TW)?

Explanation

The AETC Career Development Course (CD)C writer is an optional attendee for the Utilization and Training Workshop (U&TW). This implies that their presence is not mandatory but they have the choice to attend the workshop if they wish to do so.

Submit
82. Who serves as the major command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)?

Explanation

The MAJCOM Functional Manager serves as the major command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW). This individual is responsible for representing the MAJCOM's interests and ensuring that the career field's training requirements and utilization are aligned with the command's needs and objectives. They work closely with the Career Field Manager (CFM) and other stakeholders to develop and implement effective training programs and strategies. The MAJCOM Functional Manager plays a crucial role in shaping the career field's training and development initiatives.

Submit
83. Network switches and bridges operate at what Open System Interconnect (OSI) layer?

Explanation

Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transmission of data between adjacent network nodes, ensuring error-free communication over the physical network. Switches and bridges use MAC addresses to forward data packets to their intended destinations within a local area network (LAN). They examine the destination MAC address in the data link header of each packet and make forwarding decisions based on this information. Therefore, the correct answer is Data Link.

Submit
84. Detailed instructions for submitting a reclama or shortfall request are found in

Explanation

not-available-via-ai

Submit
85. Who reviews the selections after the board selects the 12 Outstanding Airmen of the Year?

Explanation

After the board selects the 12 Outstanding Airmen of the Year, the selections are reviewed by the Air Force Chief of Staff. This individual holds the highest-ranking position in the Air Force and is responsible for overseeing the operations and organization of the entire force. As such, they have the authority to review and approve the selections made by the board, ensuring that the process is fair and in line with the Air Force's standards and values. The Air Force Chief of Staff's involvement in the review process adds an additional layer of scrutiny and ensures that the selection of the 12 Outstanding Airmen of the Year is of the highest caliber.

Submit
86. Which type of cable is associated with the original designs of the Ethernet standard?

Explanation

The original designs of the Ethernet standard were associated with coaxial cable. Coaxial cable was widely used in the early days of Ethernet for its ability to carry signals over long distances without significant loss or interference. It provided a reliable and efficient means of transmitting data, making it the cable of choice for Ethernet networks. However, as technology advanced, other types of cables such as twisted-pair and fiber optic cables became more popular due to their improved performance and cost-effectiveness.

Submit
87. What title status must National Guard Guardsmen be in to execute cyber operations?

Explanation

National Guard Guardsmen must be in Title 10 status to execute cyber operations. Title 10 refers to the federal status of the National Guard, which allows them to be activated by the President or Congress for federal missions. This status grants them the authority to engage in cyber operations, which involve the use of technology to protect and defend against cyber threats.

Submit
88. Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information?

Explanation

Proactive Defense is the correct answer because it refers to the sub-discipline that conducts continuous monitoring to ensure timely delivery of critical information. Proactive defense involves actively identifying and addressing potential threats before they can cause harm. By continuously monitoring the network and systems, proactive defense aims to detect and mitigate any vulnerabilities or attacks in real-time, ensuring that critical information is delivered promptly and securely. This approach helps to prevent potential breaches or disruptions, enhancing the overall security and effectiveness of the Intranet Control Weapon System.

Submit
89. Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk?

Explanation

The Authorizing Official (AO) is responsible for providing the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk. This individual has the authority to make decisions regarding the system's authorization and ensures that all necessary security measures are in place before granting approval. The AO plays a crucial role in ensuring the security and integrity of the information system.

Submit
90. The technical solution for a communications and information system requirement summarizes

Explanation

The technical solution for a communications and information system requirement includes the full cost and recommended course of action. This means that the solution not only considers the financial implications but also provides guidance on the best course of action to address the requirement effectively. By including both aspects, the solution ensures that decision-makers have a comprehensive understanding of the costs involved and the recommended steps to take in order to meet the requirement successfully. Additionally, this approach allows for informed decision-making that takes into account both financial considerations and the desired outcome.

Submit
91. Which of these lists the fields in the User Datagram Protocol (UDP) segment?

Explanation

The correct answer is Source Port, Destination Port, Length, Checksum, Data. This is because these are the fields that are included in the User Datagram Protocol (UDP) segment. The Source Port field identifies the port number of the sender, the Destination Port field identifies the port number of the receiver, the Length field specifies the length of the UDP segment including the header and data, the Checksum field is used for error detection, and the Data field contains the actual data being transmitted.

Submit
92. Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4 GHz frequency?

Explanation

The correct answer is 802.11b. This standard has a throughput of 11 Mbps and operates at the 2.4 GHz frequency. 802.11a operates at a higher frequency of 5 GHz and has a higher throughput of up to 54 Mbps. 802.11g also operates at 2.4 GHz but has a higher throughput of up to 54 Mbps. 802.11n is a newer standard that operates at both 2.4 GHz and 5 GHz frequencies and has a higher throughput of up to 600 Mbps.

Submit
93. What system monitoring concept uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines?

Explanation

Capacity planning is a system monitoring concept that involves analyzing long-term trends of network devices. This analysis helps to identify potential future constraints and allows for the incorporation of these findings into future technical baselines. Capacity planning is essential for ensuring that the network infrastructure can handle the expected workload and can proactively address any potential limitations or bottlenecks. It helps organizations optimize their resources, improve performance, and avoid unexpected downtime or performance issues. Intrusion Detection and Prevention Systems, End-to-End Performance Monitoring, and Vulnerability scanners are not directly related to long-term trend analysis and future constraints identification.

Submit
94. Which of the following is not a common duty of the Maintenance Data Collection (MDC) monitor?

Explanation

The correct answer is "Ensures equipment status is entered into Equipment Status Reporting (ESR)." This duty is not commonly performed by the Maintenance Data Collection (MDC) monitor. The other options, such as reviewing IMDS reports, matching reports with OIL, and scheduling and distributing daily maintenance actions, are common duties of the MDC monitor.

Submit
95. Recommended technical order (TO) changes are required to be submitted on

Explanation

not-available-via-ai

Submit
96. At the installation level which office is responsible for program implementation, administration, training, and monitoring the Government Purchase Card (GPC) Program?

Explanation

The Agency/Organization Program Coordinator (A/OPC) is responsible for program implementation, administration, training, and monitoring of the Government Purchase Card (GPC) Program at the installation level. They oversee the day-to-day operations of the program, ensure compliance with regulations and policies, provide guidance and training to cardholders, and monitor card usage to prevent fraud and abuse. They serve as the main point of contact for cardholders and are responsible for maintaining accurate records and reporting on program activities.

Submit
97. What type of encryption is applied to each end of a communications line in a distributed network, and ensures all information flowing is unintelligible to an unauthorized intruder?

Explanation

Link encryption is the type of encryption that is applied to each end of a communications line in a distributed network and ensures that all information flowing through the line is unintelligible to an unauthorized intruder. This means that the encryption is specifically applied to the link or connection between the two ends of the communication, rather than at the individual devices or endpoints. End-to-end encryption, on the other hand, refers to a different type of encryption where the data is encrypted at the source device and remains encrypted until it reaches the intended recipient, providing protection throughout the entire communication path. Therefore, link encryption is the correct answer in this context.

Submit
98. Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor?

Explanation

The Supervisory System is the SCADA subsystem that gathers data on the process and sends commands to the processor. It acts as the central control unit, collecting and analyzing data from various sensors and devices, and then making decisions or sending commands to the processor based on that data. This subsystem plays a crucial role in monitoring and controlling industrial processes, ensuring efficient and safe operations.

Submit
99. What Internet Protocol version 4 (IPv4) class address is used for networks with about 250 nodes?

Explanation

Class C is the correct answer because it is used for networks with approximately 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, which allows for a maximum of 254 hosts on the network. This class of address is commonly used for small to medium-sized networks, making it suitable for a network with about 250 nodes. Class D is used for multicast addresses, Class E is reserved for experimental purposes, and Class F is reserved for future use.

Submit
100. Who provides accreditation for the Telecommunications Industry Association (TIA)?

Explanation

ANSI provides accreditation for the Telecommunications Industry Association (TIA).

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 14, 2017
    Quiz Created by
    Fjeffkirk
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which common port contains Hyper Text Transfer Protocol (HTTP) servers...
What kind of network interconnects users with computer resources in a...
Which identity management process uses a password to authenticate a...
In-depth information for administering the Government Purchase Card...
Which of the following is not a responsibility of Government Purchase...
Which Air Force Specialty Code (AFSC) requires members to pass the Air...
Which of the following functions is primarily staffed by Client...
Where is the Air Force active component manpower planning and...
Which of the following is a subdivision of programmed cost data...
Which of the following is not a responsibility of the Air Force Career...
Which of the following is not an action of the Specialty Training...
Which of the following is included in the Master Training Plan only if...
How many steps are there in Operational Risk Management (ORM)?
Supervisors document and maintain completed safety training on
Which of the following is not a term for Job Safety Analysis?
Which of the following is information not contained in Technical Order...
When a person uses his or her position for private or personal gain it...
What is the maximum amount for minor construction projects that...
Which of the following is the highest level in which quarterly awards...
What device is a series of single-pole, single-throw switches mounted...
Virtual circuits are established, maintained, and terminated at what...
What is the combat information technology (IT) communication support...
Who must provide encryption devices for connection to the Secret...
In a connection-oriented protocol, such as Transmission Control...
What Internet Protocol version 4 (IPv4) reserved address is used for...
The range of well-known port numbers is
What topology consists of cable segments from each computer connected...
Over a single pair cable, Integrated Services Digital Network (ISDN)...
A modem is a device that
What Data Link Layer network device logically separates a single...
Dynamic routing automatically calculates the best path between how...
What is the most common wireless networking standard?
Which operations center monitors and controls Air Force network access...
Within the information environment what term describes the advantage,...
Which Cyberspace Defense Weapon System sub-discipline determines the...
Which threat vector is considered more of an annoyance than an attack?
Which vulnerability preventive measure is a small piece of code that...
Which of the following is not a mandatory requirement for the...
What document directs the Communications Focal point key processes?
What Automated Information System (AIS) is used to document actions on...
Who establishes the necessary controls to ensure periodic inspections...
Special Personnel Evaluations (SPEs) are required on a sampling of Air...
Which statement is not a goal of Operational Risk Management (ORM)?
Who determines if local checklists and/or work cards are required for...
Who should endorse the AF Form 673 as the Certifying Official?
What systems allow for a commonly understood, maintainable, and...
Procedures and circumstances for Congress to order units into active...
Who appoints Air Force Portal Content Managers and Content Publishers...
Which type of fund covers the cost of relocating facilities?
What are the inclusive dates for Secretary of the Air Force/Chief...
The maximum number of devices a FireWire bus can take is up to
Which is not a type of UNIX pathname?
Which application includes tools to help recover lost files and...
The Institute of Electrical and Electronics Engineers (IEEE) divides...
What are the two classifications of transport protocols?
What regulates how much information passes over a Transmission Control...
How many bits are in an Internet Protocol version 4 (IPv4) address?
What class uses a range of 1–126 in the first octet of an...
Instead of using binary, how are Internet Protocol version 6 (IPv6)...
The design of communications network is known as
What kind of network is a group of computers and associated devices...
What topology defines the layout of a network's devices and media?
Two basic routing activities are determining optimal routing paths and
Which transmission medium is the primary carrier of voice...
What are the three major considerations that apply to Cyberspace...
What is critical to mitigating unintended or undesirable effects, on...
Which Electronic Warfare capability uses jamming to reduce the...
Which of the following is a true statement about Electronic Warfare...
Which Supervisory Control and Data Acquisition (SCADA) subsystem...
Which identity management process uses a fingerprint to authenticate a...
What is used as a starting point to develop the Career Field Education...
Which of the following is the official source of manpower information...
Which segment of the Utilization and Training Workshop (U&TW)/...
Who develops standards for Interconnect, Passive and...
The creation of the DOD as an executive component of the government Is...
Guidance for awards specific to the Cyber community are found in Air...
A workgroup is a simple grouping of how many computers?
Routers operate at what Open System Interconnect (OSI) layer?
What Internet Protocol version 4 (IPv4) class address is used for...
Which 802.11 standard is designed to operate at both 2.4 GHz and 5...
Which of the following is an optional attendee for the Utilization and...
Who serves as the major command (MAJCOM) voting representative during...
Network switches and bridges operate at what Open System Interconnect...
Detailed instructions for submitting a reclama or shortfall request...
Who reviews the selections after the board selects the 12 Outstanding...
Which type of cable is associated with the original designs of the...
What title status must National Guard Guardsmen be in to execute cyber...
Which Intranet Control Weapon System sub-discipline conducts...
Who provides the formal declaration that an information system is...
The technical solution for a communications and information system...
Which of these lists the fields in the User Datagram Protocol (UDP)...
Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4...
What system monitoring concept uses long trend analysis of network...
Which of the following is not a common duty of the Maintenance Data...
Recommended technical order (TO) changes are required to be submitted...
At the installation level which office is responsible for program...
What type of encryption is applied to each end of a communications...
Which Supervisory Control and Data Acquisition (SCADA) subsystem...
What Internet Protocol version 4 (IPv4) class address is used for...
Who provides accreditation for the Telecommunications Industry...
Alert!

Advertisement