.
Sustain cryptographic equipment.
Install and maintain servers or other computer systems.
Manage data, information, and knowledge sharing services.
Detection activities, including real-time intrusion detection and firewall protection.
Client Systems (3D1X1).
Spectrum Operations (3D1X4).
Cyber Transport Systems (3D1X2).
Radio Frequency Transmission Systems (3D1X3).
4
5
6
7
Assets hazards.
Implement controls.
Supervise and evaluate.
Develop controls and make decisions.
40
60
75
95
Global network.
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
Wireless metropolitan area network (WMAN).
CAT–6.
Coaxial.
Fiber optic.
Twisted pair.
Fiber optic.
Terrestrial.
Radio frequency.
Satellite microwave.
Bus.
Star.
Ring.
Tree.
4
6
8
10
32
64
128
256
B.
C.
D.
E.
X.x.x.0.
X.x.x.255.
127.x.x.x.
255.255.255.255.
Mask.
Subnet.
Hierarchy.
Routing prefix.
User datagram protocol (UDP).
B. Hypertext transfer protocol (HTTP).
C. Dynamic host configuration protocol (DHCP).
D. Transmission control protocol/Internet Protocol (TCP/IP).
50
B. 80.
C. 5050.
D. 8080.
Internet protocol (IP).
Hypertext transfer protocol (HTTP).
Transmission control protocol (TCP).
Dynamic host configuration protocol (DHCP).
A port.
A protocol.
A service point.
An entrance point.
0 to 1023
1024 to 23535.
23536 to 49151.
49152 to 65535.
7
20
23
53
21
22
60
80
Strobe scan.
Sweep scan.
Fragment packet scan.
File transfer protocol (FTP) bounce scan.
Fragment packets.
Synchronous (SYN) scan.
User datagram protocol (UDP) scan.
Transmission control protocol (TCP) scan.
Air Force Network Operations (AFNetOps).
Air Force Network Integration Center (AFNIC).
Air Force Network Operations Center (AFNOC).
Air Force Information, Services and Integration Directorate (SAF/XCIA).
Eight groups of four hexadecimal numbers, separated by colons.
Eight groups of four hexadecimal numbers, separated by periods.
Four groups of eight hexadecimal numbers, separated by colons.
Four groups of eight hexadecimal numbers, separated by periods.
Tunneling.
Dual layer.
Dual stack.
Peer-to-peer.
Installing all applicable security patches.
Creating continuity throughout the network.
Minimizing risks posed by various cyberspace threats.
Keeping complete and accurate documentation for all configuration changes.
Installing all applicable security patches.
Creating continuity throughout the network.
Minimizing risks posed by various cyberspace threats.
Keeping complete and accurate documentation for all configuration changes.
802.11a.
802.11b.
802.11g.
802.11n.
802.11a.
802.11b.
802.11g.
802.11n.
WiFi protected access (WPA).
Wired equivalency privacy (WEP).
Wireless local area network (WLAN).
Wireless wide area network (WWAN).
An adequate information assurance (IA) posture in a shared-risk environment.
An adequate IA posture in the AF environment.
A federal desktop configuration.
A federal server configuration.
Secure location.
System classification.
Defense-in-depth code.
Mission assurance category.
Users are aware of their role in IA.
Users are trained on network security.
Users have met investigative requirements.
Users have satisfied network access requirements.
Wing commander.
Wing information assurance officer (WIAO).
AF Network Operations (AFNETOPS) commander.
AF Network Operations Center (AFNOC) commander.
Unit commander.
Unit security manager.
Information system security officer (ISSO).
Wing information system security office (WISSO).
Having information ready when needed.
Not being able to deny who performed network actions.
The protection of the network from those not authorized access.
The assurance that no one has changed or destroyed information without permission.
32-bit.
64-bit.
128-bit.
256-bit.
Digital.
Biometric.
Encryption.
Identification.
Integrity.
Availability.
Confidentiality.
Non-repudiation.
Wing (WG).
Air Force (AF).
Department of Defense (DOD).
Local Registration Authority/Trusted Agent (LRA/TA).
1234!@#$asAShi.
P@ssw0rd123456.
Wsob^@49fg91*hd.
GwL18!np*Z&fB3q.
Classified.
Unclassified.
Sensitive but unclassified.
For official use only (FOUO).
End-user.
Remote user.
Administrative.
Limited (general).
Router.
Firewall.
Proxy server.
Network access server.
Threats.
Exploits.
Vulnerabilities.
Breaches of security.
Shutting down ports.
Using strong passwords.
Ensuring remote access.
Disabling unused/unneeded services.
Rsh.
Telnet.
Finger.
File transfer protocol (FTP).
Notices.
Postings.
Bulletins.
Announcements.
Writes itself before the original file.
Writes itself to the end of the original file.
Writes itself between file sections of 32-bit file.
Renames the original file and writes itself with the original file’s name.
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.