1.
1. (001) Which of the following is a duty performed by a cyber surety journeyman?
A. 
Sustain cryptographic equipment.
B. 
Install and maintain servers or other computer systems.
C. 
Manage data, information, and knowledge sharing services.
D. 
Detection activities, including real-time intrusion detection and firewall protection.
2.
2. (001) Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video network, and cryptographic client devices in fixed and deployed environments?
A. 
B. 
Spectrum Operations (3D1X4).
C. 
Cyber Transport Systems (3D1X2).
D. 
Radio Frequency Transmission Systems (3D1X3).
3.
3. (002) How many steps are in the risk management (RM) process?
A. 
B. 
C. 
D. 
4.
4. (002) What is the third step in the risk management (RM) process?Assets hazards.
A. 
B. 
C. 
D. 
Develop controls and make decisions.
5.
5. (002) Human error causes approximately what percentage of all accidents?
A. 
B. 
C. 
D. 
6.
6. (003) Which type of network typically provides wireless broadband data services?
A. 
B. 
Wireless local area network (WLAN).
C. 
Wireless wide area network (WWAN).
D. 
Wireless metropolitan area network (WMAN).
7.
7. (004) Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
A. 
B. 
C. 
D. 
8.
8. (004) Which of the following is not an example of unbound media?
A. 
B. 
C. 
D. 
9.
9. (005) In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?
A. 
B. 
C. 
D. 
10.
10. (006) When viewed in binary form, each octet within an Internet Protocol (IP) address has how many positions?
A. 
B. 
C. 
D. 
11.
11. (006) How many bits are within an internet protocol version 4 (IPv4) address?
A. 
B. 
C. 
D. 
12.
12. (006) Which class of internet protocol (IP) addresses is only used for experimental purposes?
A. 
B. 
C. 
D. 
13.
13. (006) Which internet protocol (IP) address is used for limited broadcasts?
A. 
B. 
C. 
D. 
14.
14. (006) The sequence of leading bits in an internet protocol (IP) that are used to identify the network portion of an IP address is called a
A. 
B. 
C. 
D. 
15.
15. (007) Which protocol does the Internet support as the “language” computers use to find and connect with each other?
A. 
User datagram protocol (UDP).
B. 
Hypertext transfer protocol (HTTP).
C. 
Dynamic host configuration protocol (DHCP).
D. 
Transmission control protocol/Internet Protocol (TCP/IP).
16.
16. (007) Which transmission control protocol (TCP) port is used by hypertext transfer protocol by default?
A. 
B. 
C. 
D. 
17.
17. (007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a transmission control protocol/internet protocol (TCP/IP) based network?
A. 
B. 
Hypertext transfer protocol (HTTP).
C. 
Transmission control protocol (TCP).
D. 
Dynamic host configuration protocol (DHCP).
18.
18. (008) A logical connection point for the transmission of information packets is known as
A. 
B. 
C. 
D. 
19.
19. (008) Which port range constitutes well-known ports?
A. 
B. 
C. 
D. 
20.
20. (008) Which port is used for telnet?
A. 
B. 
C. 
D. 
21.
21. (008) Which port is used for hypertext transfer protocol (HTTP)?
A. 
B. 
C. 
D. 
22.
22. (008) In which type of port scan does the scanner connect to the same port on more than one machine?
A. 
B. 
C. 
D. 
File transfer protocol (FTP) bounce scan.
23.
23. (008) Which type of scan is also known as a half open scan?
A. 
B. 
C. 
User datagram protocol (UDP) scan.
D. 
Transmission control protocol (TCP) scan.
24.
24. (008) Which organization is responsible for developing Air Force ports, protocols and services (PPS) policies and procedures?
A. 
Air Force Network Operations (AFNetOps).
B. 
Air Force Network Integration Center (AFNIC).
C. 
Air Force Network Operations Center (AFNOC).
D. 
Air Force Information, Services and Integration Directorate (SAF/XCIA).
25.
25. (009) How is an Internet protocol version 6 (IPv6) address written?
A. 
Eight groups of four hexadecimal numbers, separated by colons.
B. 
Eight groups of four hexadecimal numbers, separated by periods.
C. 
Four groups of eight hexadecimal numbers, separated by colons.
D. 
Four groups of eight hexadecimal numbers, separated by periods.