Z3d053 CDC UREs

179 Questions | Attempts: 415
Share
SettingsSettings
Please wait...
  • 1/179 Questions

    5. (002) Human error causes approximately what percentage of all accidents?

    • 40
    • 60
    • 75
    • 95
Please wait...
About This Quiz

.

CDC Quizzes & Trivia

Quiz Preview

  • 2. 

    8. (004) Which of the following is not an example of unbound media?

    • Fiber optic.

    • Terrestrial.

    • Radio frequency.

    • Satellite microwave.

    Correct Answer
    A. Fiber optic.
  • 3. 

    24. (210) How often should communications security (COMSEC) access lists be reviewed for accuracy?

    • Weekly.

    • Monthly.

    • Quarterly.

    • Annually.

    Correct Answer
    A. Monthly.
  • 4. 

    48. (220) Sign the communication security (COMSEC) material destruction record

    • Immediately after the material is destroyed.

    • Immediately before the material is destroyed.

    • Within 12 hours after the material is destroyed.

    • Within 12 hours before the material is destroyed.

    Correct Answer
    A. Immediately after the material is destroyed.
  • 5. 

    7. (004) Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?

    • CAT–6.

    • Coaxial.

    • Fiber optic.

    • Twisted pair.

    Correct Answer
    A. Fiber optic.
  • 6. 

    9. (005) In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?

    • Bus.

    • Star.

    • Ring.

    • Tree.

    Correct Answer
    A. Bus.
  • 7. 

    18. (008) A logical connection point for the transmission of information packets is known as

    • A port.

    • A protocol.

    • A service point.

    • An entrance point.

    Correct Answer
    A. A port.
  • 8. 

    26. (009) Which type of transition technology is used to set up secure point-to-point communication?

    • Tunneling.

    • Dual layer.

    • Dual stack.

    • Peer-to-peer.

    Correct Answer
    A. Tunneling.
  • 9. 

    39. (014) Which common access card (CAC) certificate would be used to sign an enlisted performance report (EPR)?

    • Digital.

    • Biometric.

    • Encryption.

    • Identification.

    Correct Answer
    A. Identification.
  • 10. 

    41. (014) The contract manager must use what agency to validate a contractor employee’s need to obtain a government public key infrastructure (PKI) certificate?

    • Wing (WG).

    • Air Force (AF).

    • Department of Defense (DOD).

    • Local Registration Authority/Trusted Agent (LRA/TA).

    Correct Answer
    A. Local Registration Authority/Trusted Agent (LRA/TA).
  • 11. 

    46. (018) Weaknesses or holes in a security system are considered

    • Threats.

    • Exploits.

    • Vulnerabilities.

    • Breaches of security.

    Correct Answer
    A. Vulnerabilities.
  • 12. 

    58. (023) What determines the number of alternate information assurance officers (IAO) in an organization?

    • Number of information systems.

    • Number of personnel assigned.

    • Type of organization.

    • Mission need.

    Correct Answer
    A. Mission need.
  • 13. 

    19. (008) Which port range constitutes well-known ports?

    • 0 to 1023

    • 1024 to 23535.

    • 23536 to 49151.

    • 49152 to 65535.

    Correct Answer
    A. 0 to 1023
  • 14. 

    20. (008) Which port is used for telnet?

    • 7

    • 20

    • 23

    • 53

    Correct Answer
    A. 23
  • 15. 

    21. (008) Which port is used for hypertext transfer protocol (HTTP)?

    • 21

    • 22

    • 60

    • 80

    Correct Answer
    A. 80
  • 16. 

    23. (008) Which type of scan is also known as a half open scan?

    • Fragment packets.

    • Synchronous (SYN) scan.

    • User datagram protocol (UDP) scan.

    • Transmission control protocol (TCP) scan.

    Correct Answer
    A. Synchronous (SYN) scan.
  • 17. 

    30. (011) What is the newest WiFi networking standard that is widely available?

    • 802.11a.

    • 802.11b.

    • 802.11g.

    • 802.11n.

    Correct Answer
    A. 802.11n.
  • 18. 

    37. (014) The definition of integrity as it’s applied to identification, authentication, and encryption is

    • Having information ready when needed.

    • Not being able to deny who performed network actions.

    • The protection of the network from those not authorized access.

    • The assurance that no one has changed or destroyed information without permission.

    Correct Answer
    A. The assurance that no one has changed or destroyed information without permission.
  • 19. 

    47. (018) Which of the following options is not involved when securing a UNIX system?

    • Shutting down ports.

    • Using strong passwords.

    • Ensuring remote access.

    • Disabling unused/unneeded services.

    Correct Answer
    A. Ensuring remote access.
  • 20. 

    52. (019) The two fundamental concepts of network security are

    • Authorization and confidentiality.

    • Authentication and authorization.

    • Confidentiality and integrity.

    • Authorization and integrity.

    Correct Answer
    A. Authentication and authorization.
  • 21. 

    23. (210) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?

    • A final security clearance.

    • An interim security clearance.

    • A clearance equal to the COMSEC being accessed.

    • A clearance higher than the COMSEC being accessed.

    Correct Answer
    A. An interim security clearance.
  • 22. 

    44. (219) Who may destroy communications security (COMSEC) material?

    • Communications security account manager (CAM) or any responsible person on the COMSEC access list.

    • Communications security responsible officer (CRO).

    • Alternate CAM only.

    • CAM only.

    Correct Answer
    A. Communications security account manager (CAM) or any responsible person on the COMSEC access list.
  • 23. 

    54. (223) When you are performing courier duties and transporting bulky communication security (COMSEC) material through the airlines, when is it acceptable to leave the COMSEC material unattended?

    • Under no circumstances.

    • When it is in a baggage claim area.

    • When it is loaded on a cargo dock.

    • When it is passed on to authorized airport personnel.

    Correct Answer
    A. Under no circumstances.
  • 24. 

    55. (224) How many times do you wrap communications security (COMSEC) material prior to transportation?

    • One.

    • Two.

    • Three.

    • Four.

    Correct Answer
    A. Two.
  • 25. 

    4. (002) What is the third step in the risk management (RM) process?

    • Assets hazards.

    • Implement controls.

    • Supervise and evaluate.

    • Develop controls and make decisions.

    Correct Answer
    A. Develop controls and make decisions.
  • 26. 

    14. (006) The sequence of leading bits in an internet protocol (IP) that are used to identify the network portion of an IP address is called a

    • Mask.

    • Subnet.

    • Hierarchy.

    • Routing prefix.

    Correct Answer
    A. Routing prefix.
  • 27. 

    17. (007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a transmission control protocol/internet protocol (TCP/IP) based network?

    • Internet protocol (IP).

    • Hypertext transfer protocol (HTTP).

    • Transmission control protocol (TCP).

    • Dynamic host configuration protocol (DHCP).

    Correct Answer
    A. Dynamic host configuration protocol (DHCP).
  • 28. 

    40. (014) What does the common access card (CAC) certificate used to sign e-mail provide?

    • Integrity.

    • Availability.

    • Confidentiality.

    • Non-repudiation.

    Correct Answer
    A. Non-repudiation.
  • 29. 

    42. (015) Which of the following represents a strong password?

    • 1234!@#$asAShi.

    • P@ssw0rd123456.

    • Wsob^@49fg91*hd.

    • GwL18!np*Z&fB3q.

    Correct Answer
    A. GwL18!np*Z&fB3q.
  • 30. 

    51. (019) A program that contains or installs a malicious program is called a

    • Boot sector virus.

    • Worm program.

    • Trojan horse.

    • Macro virus.

    Correct Answer
    A. Trojan horse.
  • 31. 

    74. (028) Which term identifies any equipment or area in which classified information is processed?

    • TEMPEST.

    • BLACK.

    • EMSEC.

    • RED.

    Correct Answer
    A. RED.
  • 32. 

    83. (030) In which information assurance control must an organization ensure individual information system user actions can be traced to the user?

    • Risk Assessment (RA).

    • Personnel Security (PS).

    • Audit and Accountability (AU).

    • System and Information Integrity (SI).

    Correct Answer
    A. Audit and Accountability (AU).
  • 33. 

    86. (031) What is the minimum rank the AF Information Network (AFIN) connection approval can be delegated to?

    • Major General (O–8).

    • Brigadier General (O–7).

    • Colonel (O–6).

    • Lieutenant Colonel (O–5).

    Correct Answer
    A. Colonel (O–6).
  • 34. 

    90. (033) Which of the following is not a phase in the information technology (IT) Lean reengineering process?

    • Design.

    • Define need.

    • Build and test.

    • Define need review.

    Correct Answer
    A. Define need review.
  • 35. 

    19. (209) Which of the following requirements would make a person ineligible for the cryptographic access program (CAP)?

    • Hold an interim security clearance.

    • Have a final security clearance.

    • Be a DOD cleared contractor.

    • Be a US citizen.

    Correct Answer
    A. Hold an interim security clearance.
  • 36. 

    39. (217) When you are sealing a package containing communications security (COMSEC) material where do you place your initials?

    • Upper right-hand corner.

    • Lower right-hand corner.

    • Bottom of envelope.

    • Across the seal.

    Correct Answer
    A. Across the seal.
  • 37. 

    41. (218) Changes that must be made to material in communication security (COMSEC) publications are called

    • Modifications.

    • Amendments.

    • Corrections.

    • Updates.

    Correct Answer
    A. Amendments.
  • 38. 

    52. (222) How many people must unwrap the inner wrapper of a top secret (TS) crypto package?

    • One.

    • Two.

    • Three.

    • Four.

    Correct Answer
    A. Two.
  • 39. 

    79. (235) Comm kits are normally contained in

    • 3-part folders.

    • 6-part folders.

    • 3-ring binders.

    • 6-ring binders.

    Correct Answer
    A. 3-ring binders.
  • 40. 

    2. (001) Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video network, and cryptographic client devices in fixed and deployed environments?

    • Client Systems (3D1X1).

    • Spectrum Operations (3D1X4).

    • Cyber Transport Systems (3D1X2).

    • Radio Frequency Transmission Systems (3D1X3).

    Correct Answer
    A. Client Systems (3D1X1).
  • 41. 

    16. (007) Which transmission control protocol (TCP) port is used by hypertext transfer protocol

    • 50

    • B. 80.

    • C. 5050.

    • D. 8080.

    Correct Answer
    A. B. 80.
  • 42. 

    38. (014) Logon and password management screens must be encrypted with at least what type of secure socket layer?

    • 32-bit.

    • 64-bit.

    • 128-bit.

    • 256-bit.

    Correct Answer
    A. 128-bit.
  • 43. 

    43. (016) Which category of information must be stored on removable media?

    • Classified.

    • Unclassified.

    • Sensitive but unclassified.

    • For official use only (FOUO).

    Correct Answer
    A. Classified.
  • 44. 

    44. (017) Users who perform troubleshooting, configuration changes, or system reviews are given which type of access?

    • End-user.

    • Remote user.

    • Administrative.

    • Limited (general).

    Correct Answer
    A. Administrative.
  • 45. 

    78. (029) Who is the installation’s focal point for emission security (EMSEC) matters?

    • Wing commander.

    • Information security system manager (ISPM).

    • Wing information assurance office (WIAO).

    • Communications and information system officer (CSO).

    Correct Answer
    A. Wing information assurance office (WIAO).
  • 46. 

    26. (211) At a minimum, how often must you review the communications security (COMSEC) access list?

    • Every week.

    • Every two weeks.

    • Once a month.

    • Every six months.

    Correct Answer
    A. Once a month.
  • 47. 

    43. (219) Who requests disposition instructions for communications security (COMSEC) material?

    • Unit commander.

    • COMSEC material user.

    • Communications security account manager (CAM).

    • Cryptographic access program (CAP) administrator.

    Correct Answer
    A. Communications security account manager (CAM).
  • 48. 

    50. (221) Two-person integrity (TPI) is the storage and handling system that prohibits access by any single person to what classification of communications security (COMSEC) material?

    • Top Secret (TS).

    • Secret.

    • Confidential.

    • Unclassified.

    Correct Answer
    A. Top Secret (TS).
  • 49. 

    51. (221) What provides the special protection of Top Secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening?

    • Two-person control (TPC).

    • Two-person integrity (TPI).

    • Cryptographic access program (CAP).

    • Communications security management system (CMS).

    Correct Answer
    A. Two-person integrity (TPI).

Quiz Review Timeline (Updated): Mar 18, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 05, 2015
    Quiz Created by
    CDCs4dayz
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.