Z3d053 CDC UREs

179 Questions | Total Attempts: 347

SettingsSettingsSettings
CDC Quizzes & Trivia

.


Questions and Answers
  • 1. 
    1. (001) Which of the following is a duty performed by a cyber surety journeyman?
    • A. 

      Sustain cryptographic equipment.

    • B. 

      Install and maintain servers or other computer systems.

    • C. 

      Manage data, information, and knowledge sharing services.

    • D. 

      Detection activities, including real-time intrusion detection and firewall protection.

  • 2. 
    2. (001) Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video network, and cryptographic client devices in fixed and deployed environments?
    • A. 

      Client Systems (3D1X1).

    • B. 

      Spectrum Operations (3D1X4).

    • C. 

      Cyber Transport Systems (3D1X2).

    • D. 

      Radio Frequency Transmission Systems (3D1X3).

  • 3. 
    3. (002) How many steps are in the risk management (RM) process?
    • A. 

      4

    • B. 

      5

    • C. 

      6

    • D. 

      7

  • 4. 
    4. (002) What is the third step in the risk management (RM) process?
    • A. 

      Assets hazards.

    • B. 

      Implement controls.

    • C. 

      Supervise and evaluate.

    • D. 

      Develop controls and make decisions.

  • 5. 
    5. (002) Human error causes approximately what percentage of all accidents?
    • A. 

      40

    • B. 

      60

    • C. 

      75

    • D. 

      95

  • 6. 
    6. (003) Which type of network typically provides wireless broadband data services?
    • A. 

      Global network.

    • B. 

      Wireless local area network (WLAN).

    • C. 

      Wireless wide area network (WWAN).

    • D. 

      Wireless metropolitan area network (WMAN).

  • 7. 
    7. (004) Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
    • A. 

      CAT–6.

    • B. 

      Coaxial.

    • C. 

      Fiber optic.

    • D. 

      Twisted pair.

  • 8. 
    8. (004) Which of the following is not an example of unbound media?
    • A. 

      Fiber optic.

    • B. 

      Terrestrial.

    • C. 

      Radio frequency.

    • D. 

      Satellite microwave.

  • 9. 
    9. (005) In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?
    • A. 

      Bus.

    • B. 

      Star.

    • C. 

      Ring.

    • D. 

      Tree.

  • 10. 
    10. (006) When viewed in binary form, each octet within an Internet Protocol (IP) address has how many positions?
    • A. 

      4

    • B. 

      6

    • C. 

      8

    • D. 

      10

  • 11. 
    11. (006) How many bits are within an internet protocol version 4 (IPv4) address?
    • A. 

      32

    • B. 

      64

    • C. 

      128

    • D. 

      256

  • 12. 
    12. (006) Which class of internet protocol (IP) addresses is only used for experimental purposes?
    • A. 

      B.

    • B. 

      C.

    • C. 

      D.

    • D. 

      E.

  • 13. 
    13. (006) Which internet protocol (IP) address is used for limited broadcasts?
    • A. 

      X.x.x.0.

    • B. 

      X.x.x.255.

    • C. 

      127.x.x.x.

    • D. 

      255.255.255.255.

  • 14. 
    14. (006) The sequence of leading bits in an internet protocol (IP) that are used to identify the network portion of an IP address is called a
    • A. 

      Mask.

    • B. 

      Subnet.

    • C. 

      Hierarchy.

    • D. 

      Routing prefix.

  • 15. 
    15. (007) Which protocol does the Internet support as the “language” computers use to find and connect with each other?
    • A. 

      User datagram protocol (UDP).

    • B. 

      B. Hypertext transfer protocol (HTTP).

    • C. 

      C. Dynamic host configuration protocol (DHCP).

    • D. 

      D. Transmission control protocol/Internet Protocol (TCP/IP).

  • 16. 
    16. (007) Which transmission control protocol (TCP) port is used by hypertext transfer protocol
    • A. 

      50

    • B. 

      B. 80.

    • C. 

      C. 5050.

    • D. 

      D. 8080.

  • 17. 
    17. (007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a transmission control protocol/internet protocol (TCP/IP) based network?
    • A. 

      Internet protocol (IP).

    • B. 

      Hypertext transfer protocol (HTTP).

    • C. 

      Transmission control protocol (TCP).

    • D. 

      Dynamic host configuration protocol (DHCP).

  • 18. 
    18. (008) A logical connection point for the transmission of information packets is known as
    • A. 

      A port.

    • B. 

      A protocol.

    • C. 

      A service point.

    • D. 

      An entrance point.

  • 19. 
    19. (008) Which port range constitutes well-known ports?
    • A. 

      0 to 1023

    • B. 

      1024 to 23535.

    • C. 

      23536 to 49151.

    • D. 

      49152 to 65535.

  • 20. 
    20. (008) Which port is used for telnet?
    • A. 

      7

    • B. 

      20

    • C. 

      23

    • D. 

      53

  • 21. 
    21. (008) Which port is used for hypertext transfer protocol (HTTP)?
    • A. 

      21

    • B. 

      22

    • C. 

      60

    • D. 

      80

  • 22. 
    22. (008) In which type of port scan does the scanner connect to the same port on more than one machine?
    • A. 

      Strobe scan.

    • B. 

      Sweep scan.

    • C. 

      Fragment packet scan.

    • D. 

      File transfer protocol (FTP) bounce scan.

  • 23. 
    23. (008) Which type of scan is also known as a half open scan?
    • A. 

      Fragment packets.

    • B. 

      Synchronous (SYN) scan.

    • C. 

      User datagram protocol (UDP) scan.

    • D. 

      Transmission control protocol (TCP) scan.

  • 24. 
    24. (008) Which organization is responsible for developing Air Force ports, protocols and services (PPS) policies and procedures?
    • A. 

      Air Force Network Operations (AFNetOps).

    • B. 

      Air Force Network Integration Center (AFNIC).

    • C. 

      Air Force Network Operations Center (AFNOC).

    • D. 

      Air Force Information, Services and Integration Directorate (SAF/XCIA).

  • 25. 
    25. (009) How is an Internet protocol version 6 (IPv6) address written?
    • A. 

      Eight groups of four hexadecimal numbers, separated by colons.

    • B. 

      Eight groups of four hexadecimal numbers, separated by periods.

    • C. 

      Four groups of eight hexadecimal numbers, separated by colons.

    • D. 

      Four groups of eight hexadecimal numbers, separated by periods.