Z3dx5x Volume 2-edition02

99 Questions | Attempts: 396
Please wait...
Question 1 / 100
🏆 Rank #--
Score 0/100

1. (224) What characteristic is not an advantage of fiber optic cable?

Submit
Please wait...
About This Quiz
Z3dx5x Volume 2-edition02 - Quiz

.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. (211) What portion of the Internet Protocol (IP) Datagram (packet) allows IP to detect datagrams with corrupted headers and discard them?

Submit

3. (230) Which event is not a valid reason to change the combination on a container storing classified materials?

Submit

4. (201) Whose responsibility is to advise commanders, function managers, supervisors and workers on safety matters on an Air Force installation?

Submit

5. (216) Which network provides a private tunnel through the Internet?

Submit

6. (223) Which type of encryption provides the greatest degree of protection since the information fully encodes all the way through the network to the users' own end terminals?

Submit

7. (236) What major program does the Global Combat Support System-Air Force (GCSS-AF) provides as a single point of reference for services and information for Air Force personnel?

Submit

8. (208) What topology offers centralized management of a network?

Submit

9. (208) What negative effect could occur when star networks are interconnected?

Submit

10. (212) What range of numbers are those of well know port numbers?

Submit

11. (215) Which device optically reads an image, printed text, or an object and converts it to a digital image?

Submit

12. (206) What three parts make up Communications and Information Systems Installation Record (CSIR)?

Submit

13. (226) What Microsoft application is a software program that allows users to create a desktop database?

Submit

14. (228) Which computer system vulnerability is not one in a computer system?

Submit

15. (228) Which computer software is designed to collect personal information about users without their informed consent?

Submit

16. (213) What action is the main purpose of system cache?

Submit

17. (215) What is a peripheral device?

Submit

18. (216) Which network uses Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) to avoid collisions while transmitting data?

Submit

19. (203) How are fires classified?

Submit

20. (203) Fuels that are normally classified as A or B will change to what classification if an electric current is introduced?

Submit

21. (233) Which network supports unclassified e-mail service to the user?

Submit

22. (219) Which device works as a transceiver that converts the electrical signal utilized in copper unshielded twisted pair (UTP) network cabling to light waves used for fiber optic cabling.

Submit

23. (208) What network topology is another name for a bus topology?

Submit

24. (209) Which governing body is the authority for information technology (IT) communications within the Department of Defense (DOD) and every level of IT communication from the DOD information network to the warfighter under their scope of control?

Submit

25. (226) What Microsoft application is a personal information manager?

Submit

26. (214) What speed is the maximum data transfer rate of USB 3.0 SuperSpeed (SS) transfer mode?

Submit

27. (216) Which network is a network that links local area networks (LAN) and Metropolitan area networks (MAN) by using long-distance communication links leased or purchased from a telecommunications company?

Submit

28. (201) The Occupational Safety and Health Administration (OSHA) is a part of the United States Department of

Submit

29. (202) What method is considered the least preferred when controlling hazards and should not be relied upon alone to protect against hazards.

Submit

30. (203) What hazard is the greatest in the typical office?

Submit

31. (203) What action should you take first when you encounter a fire?

Submit

32. (203) What step is the fourth in the firefighting procedure?

Submit

33. (203) Under normal conditions, how many milliamps of current could cause cardiac arrest?

Submit

34. (203) Which ladder practice is not prohibited?

Submit

35. (204) Which action is not a part of risk management (RM)?

Submit

36. (216) Which wireless local area network (WLAN) security method is best described as hiding a message in a special code?

Submit

37. (205) Which office annually evaluates agency efforts to improve the quality and usefulness of information technology investments requested by agencies through well-organized strategic decisions relating to investments and portfolio management?

Submit

38. (225) What UNIX system software interacts most closely with the hardware?

Submit

39. (201) What action is the purpose of the Mishap Prevention Program?

Submit

40. (203) According to the Centers for Disease Control and Prevention (CDC) office workers are how many times more likely to suffer a disabling injury for a fall than non-office workers?

Submit

41. (206) Which part of the Communications and Information Systems Installation Record (CSIR) depicts physical layout of communications and information systems and provide engineering data?

Submit

42. (228) Which incidents occur when a higher classification level of data transfers to a lower classification level system via a messaging system?

Submit

43. (216) Which network is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area?

Submit

44. (202) Which action is a physiological factor?

Submit

45. (234) Which network provides Department of Defense (DOD) customers with centralized and protected access to the public Internet?

Submit

46. (222) What network device provides a remote network with connectivity to a host network?

Submit

47. (211) What value is the maximum of an octet in Internet Protocol version 4 (IPv4)?

Submit

48. (230) How would you determine if an intrusion detection system is required or another supplemental control is sufficient?

Submit

49. (201) What action must supervisors take before a work task not governed by a technical order or other guidance can be accomplished?

Submit

50. (207) What functions do the seven layers of the Open Systems Interconnection (OSI) reference model specify?

Submit

51. (208) When used alone, the word "topology" often refers to a network's

Submit

52. (217) What year did the Institute of Electrical and Electronics Engineers (IEEE) ratifies the use of gigabit Ethernet (GbE)?

Submit

53. (242) What system of the Global High Frequency (HF) Network provides rapid, reliable, non-dedicated communications support between the National Command Authority, Department of Defense, aircraft, and ships of the United States government during peacetime, contingency situations, and war?

Submit

54. (202) What three sub-categories make up human factors?

Submit

55. (234) Which network provides high-quality, secure telecommunications for command and control (C2) and crisis management?

Submit

56. (210) What action is the purpose of a sliding window in Transmission Control Protocol (TCP)?

Submit

57. (201) Which publication implements the Mishap Prevention Program?

Submit

58. (205) What requirements mandate to develop of Air Force architectures?

Submit

59. (206) Which part of the Communications and Information Systems Installation Record (CSIR) is normally retained in the production work center?

Submit

60. (230) Which Air Force (AF) form records the destruction of Top Secret classified material?

Submit

61. (202) Who recommends controls to mitigate health risks associated with identified health threats/hazards?

Submit

62. (231) Who has the authority a grant permission to ship classified materials on Friday - Sunday?

Submit

63. (202) Which helmet class does not provide protection against contact with electrical conductors?

Submit

64. (207) The logical link control (LLC) sublayer is a part of which Open Systems Interconnection (OSI) model layer?

Submit

65. (211) What class is reserved for multicast addressing?

Submit

66. (218) How many T1 Defense Switched Network (DSN) access circuits do Standardized Tactical Entry Point (STEP) terminals offer?

Submit

67. 33. (207) What layers make up the two categories of the seven layer of the Open Systems Interconnection (OSI) reference model.

Submit

68. (227) What information system (IS) threat is the greatest threat to an organization's mission critical information via its communications and ISs?

Submit

69. (235) Which system of the Global Command and Control System-Air Force (GCCS-AF) monitors status of resources and training systems ensuring that decision makers have the most accurate snapshot of the resources available to the for mission completion?

Submit

70. (203) What chapter in Air Force Instruction (AFI) 91–203, Air Force Consolidated Occupational Safety Instruction provides specific guidance on office safety?

Submit

71. (213) What characteristic is the major difference between Random Access Memory (RAM) and Read Only Memory (ROM)?

Submit

72. (231) Who should you seek out if you need information on transporting Top Secret information?

Submit

73. (232) Which of the following services provides additional communications capacity by using manned and unmanned systems to host communications packages for continuous communications coverage of large geographic areas?

Submit

74. (229) Which classified document markings identifies the highest level of classification?

Submit

75. (201) What Air Force (AF) form is used to report ground mishaps?

Submit

76. (203) What classification do flammable liquids receive?

Submit

77. (220) Describe a network bridge.

Submit

78. (210) What is a Transmission Control Protocol (TCP) socket?

Submit

79. (221) What network routing protocols allow multiple autonomous systems to connect together?

Submit

80. (202) How many impact classifications do hardhats have?

Submit

81. (229) Which classified document marking appears on the face of each classified United States document and shall indicate the authority for the classification determination and the duration of the classification.

Submit

82. (239) Which system is a space-based high data rate communications link for the flow of information from the United States or rear echelon locations to deployed forces?

Submit

83. (240) What system is the priority component of the Department of Defense Information Network (DODIN) that directly supports the president, secretary of defense, and the Joint Chiefs of Staff in the exercise of their responsibilities?

Submit

84. (211) Which classes allow for a maximum of 254 hosts per network?

Submit

85. (204) The risk management process includes how many steps?

Submit

86. (242) What system mission is to provide reliable, rapid, two-way communications between air-, land-, and sea-based users?

Submit

87. (241) Which system is the primary network used to transmit the Emergency Action Messages (EAM) generated by the National Military Command Center (NMCC) to the warfighting commanders in the field?

Submit

88. (228) Computer security (COMPUSEC) vulnerabilities are broken down into how many categories?

Submit

89. (232) What system includes all owned and leased communications and computing systems and services, software, data, security services, and other associated services necessary to achieve information superiority?

Submit

90. (235) Which system is the Department of Defense's (DOD) command and control (C2) system of record and full spectrum dominance enabler?

Submit

91. (207) What does the logical link control (LLC) sublayer of the data link layer manage?

Submit

92. (238) Which system is a radar Tracker/Correlator software program hosted on a powerful server-based computer system that takes inputs from long range and short-range radars and displays it all on a scope?

Submit

93. (205) How many volumes make up the Department of Defense Architecture Framework (DODAF) specification?

Submit

94. (207) What does the media access control (MAC) sublayer of the data link layer manage?

Submit

95. (225) In general, how many operating system task categories are there?

Submit

96. (233) What system is a telecommunications network that provides the exchange of information in an interoperable and global space, divided by security demands, transmission requirements and geographic needs of targeted end-user customers?

Submit

97. (237) Which system is the Air Forces' primary intelligence, surveillance and reconnaissance (ISR) collection, processing, exploitation, analysis and dissemination system?

Submit

98. (238) How many air defenses sectors is the Battle Control System-Fixed (BSC-F) divided into?

Submit

99. (241) What system provides a secure communications path for command and control information in support of the Air Force's strategic aircraft and missile functions?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (99)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(224) What characteristic is not an advantage of fiber optic cable?
(211) What portion of the Internet Protocol (IP) Datagram (packet)...
(230) Which event is not a valid reason to change the combination on a...
(201) Whose responsibility is to advise commanders, function managers,...
(216) Which network provides a private tunnel through the Internet?
(223) Which type of encryption provides the greatest degree of...
(236) What major program does the Global Combat Support System-Air...
(208) What topology offers centralized management of a network?
(208) What negative effect could occur when star networks are...
(212) What range of numbers are those of well know port numbers?
(215) Which device optically reads an image, printed text, or an...
(206) What three parts make up Communications and Information Systems...
(226) What Microsoft application is a software program that allows...
(228) Which computer system vulnerability is not one in a computer...
(228) Which computer software is designed to collect personal...
(213) What action is the main purpose of system cache?
(215) What is a peripheral device?
(216) Which network uses Carrier Sense Multiple Access/Collision...
(203) How are fires classified?
(203) Fuels that are normally classified as A or B will change to what...
(233) Which network supports unclassified e-mail service to the user?
(219) Which device works as a transceiver that converts the electrical...
(208) What network topology is another name for a bus topology?
(209) Which governing body is the authority for information technology...
(226) What Microsoft application is a personal information manager?
(214) What speed is the maximum data transfer rate of USB 3.0...
(216) Which network is a network that links local area networks (LAN)...
(201) The Occupational Safety and Health Administration (OSHA) is a...
(202) What method is considered the least preferred when controlling...
(203) What hazard is the greatest in the typical office?
(203) What action should you take first when you encounter a fire?
(203) What step is the fourth in the firefighting procedure?
(203) Under normal conditions, how many milliamps of current could...
(203) Which ladder practice is not prohibited?
(204) Which action is not a part of risk management (RM)?
(216) Which wireless local area network (WLAN) security method is best...
(205) Which office annually evaluates agency efforts to improve the...
(225) What UNIX system software interacts most closely with the...
(201) What action is the purpose of the Mishap Prevention Program?
(203) According to the Centers for Disease Control and Prevention...
(206) Which part of the Communications and Information Systems...
(228) Which incidents occur when a higher classification level of data...
(216) Which network is a group of computers and associated devices...
(202) Which action is a physiological factor?
(234) Which network provides Department of Defense (DOD) customers...
(222) What network device provides a remote network with connectivity...
(211) What value is the maximum of an octet in Internet Protocol...
(230) How would you determine if an intrusion detection system is...
(201) What action must supervisors take before a work task not...
(207) What functions do the seven layers of the Open Systems...
(208) When used alone, the word "topology" often refers to a network's
(217) What year did the Institute of Electrical and Electronics...
(242) What system of the Global High Frequency (HF) Network provides...
(202) What three sub-categories make up human factors?
(234) Which network provides high-quality, secure telecommunications...
(210) What action is the purpose of a sliding window in Transmission...
(201) Which publication implements the Mishap Prevention Program?
(205) What requirements mandate to develop of Air Force architectures?
(206) Which part of the Communications and Information Systems...
(230) Which Air Force (AF) form records the destruction of Top Secret...
(202) Who recommends controls to mitigate health risks associated with...
(231) Who has the authority a grant permission to ship classified...
(202) Which helmet class does not provide protection against contact...
(207) The logical link control (LLC) sublayer is a part of which Open...
(211) What class is reserved for multicast addressing?
(218) How many T1 Defense Switched Network (DSN) access circuits do...
33. (207) What layers make up the two categories of the seven layer of...
(227) What information system (IS) threat is the greatest threat to an...
(235) Which system of the Global Command and Control System-Air Force...
(203) What chapter in Air Force Instruction (AFI) 91–203, Air...
(213) What characteristic is the major difference between Random...
(231) Who should you seek out if you need information on transporting...
(232) Which of the following services provides additional...
(229) Which classified document markings identifies the highest level...
(201) What Air Force (AF) form is used to report ground mishaps?
(203) What classification do flammable liquids receive?
(220) Describe a network bridge.
(210) What is a Transmission Control Protocol (TCP) socket?
(221) What network routing protocols allow multiple autonomous systems...
(202) How many impact classifications do hardhats have?
(229) Which classified document marking appears on the face of each...
(239) Which system is a space-based high data rate communications link...
(240) What system is the priority component of the Department of...
(211) Which classes allow for a maximum of 254 hosts per network?
(204) The risk management process includes how many steps?
(242) What system mission is to provide reliable, rapid, two-way...
(241) Which system is the primary network used to transmit the...
(228) Computer security (COMPUSEC) vulnerabilities are broken down...
(232) What system includes all owned and leased communications and...
(235) Which system is the Department of Defense's (DOD) command and...
(207) What does the logical link control (LLC) sublayer of the data...
(238) Which system is a radar Tracker/Correlator software program...
(205) How many volumes make up the Department of Defense Architecture...
(207) What does the media access control (MAC) sublayer of the data...
(225) In general, how many operating system task categories are there?
(233) What system is a telecommunications network that provides the...
(237) Which system is the Air Forces' primary intelligence,...
(238) How many air defenses sectors is the Battle Control System-Fixed...
(241) What system provides a secure communications path for command...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!