A group of systems that cannot talk to each other
A group of computers that are not connected
A group of computers that are connected with each other
A single system connected to the internet
A Heterogeneous network consists of computers from multiple vendors and operating systems while a Homogeneous network consists of computers from the same vendor running the same operating system
A Heterogeneous network consists of computers from the same vendor and operating system while a Homogeneous network consists of computers from different vendors running different operating systems
A Heterogeneous network can utilize the internet while a Homogeneous network is isolated
A Heterogeneous network is isolated while a Homogeneous network can utilize the interent
250-1000
1000+
50-250
1-50
AFI 33-115
AFI 33-200
AFI 33-202
AFI 33-119
POP3
DHCP
SNMP
SMTP
Confidentiality, Integrity, Availability
Integrity, Service, Excellence
Applications, Operating System, Hardware
Confidentiality, Intergrity
ICMP
SNMP
SMTP
FTP
1 an 2
2 and 3
1 and 3
2 and 4
SMTP and POP3
SNMP and FTP
SNMP and ICMP
ICMP and SMTP
Packet
Connection
Frame
Collision
Send a series of messages to a target and time the response
See the path packets are traveling and the time it takes to complete the trip
Send frames to a specific node
None of the above
The process of proving that a subject is what the subject claims to be
The process of selecting a target and verifying authorization to attack
The process of identifying an attacker and the authentication method used
The process of selecting an airman for assignment and verifying they have the appropriate clearance
The process for denying access to a government system
The DOD process for allowing access to a government system
The DOD approval process for joining the AF-GIG
The DOD process for identifying, implementing, validating, certifying and managing IA capabilities and services
Unclassified
Secret
Top Secret
FOUO
Varying layers of security to provide access
Physical security layers to prevent unauthorized physical access
Varying defense measures to prevent unauthorized access
Using more strict encryption as you go from an external to internal network
Web Servers
Email Servers
Proxy Servers
All of the above
Viruses
Disclosure of information by authorized users
Unauthorized access by someone already "inside" the network
All of the above
A program that creates a tunnel to a remote machine for unauthorized access
A program that lies dormant waiting for information from the owner
A program that replicates itself by attaching to a program
None of the above
Users of unsecured networks to securely and privately exchange data through the use of public and private cryptographic key pairs
Users of secure networks to un-encrypt data using public cryptographic keys
Users of unsecure networks to enter a secure network such as SIPRNET using public and private cryptographic key pairs
Users of secure networks to enter unsecure public networks using public and private cryptographic key pairs
True
False
Perform the Power of Self-Test (POST)
Load the Operating System (OS)
Detect Hard Disk Drives
Detect the Operating System
Network information for later use
Configuration information about the computer used by the BIOS
Date and Time information
B & C
Static
Dynamic
Duplicate
Sufficient
False
True
Networks
Data flow
Hardware
None of the above
Wait!
Here's an interesting quiz for you.