2015 CDC Test 3d052 Vol 1 & 2

40 Questions | Total Attempts: 43

SettingsSettingsSettings
Please wait...
3d052 Quizzes & Trivia

Questions and Answers
  • 1. 
    What is a network?
    • A. 

      A group of systems that cannot talk to each other

    • B. 

      A group of computers that are not connected

    • C. 

      A group of computers that are connected with each other

    • D. 

      A single system connected to the internet

  • 2. 
    What is the difference between a Heterogeneous network and a Homogeneous network?
    • A. 

      A Heterogeneous network consists of computers from multiple vendors and operating systems while a Homogeneous network consists of computers from the same vendor running the same operating system

    • B. 

      A Heterogeneous network consists of computers from the same vendor and operating system while a Homogeneous network consists of computers from different vendors running different operating systems

    • C. 

      A Heterogeneous network can utilize the internet while a Homogeneous network is isolated

    • D. 

      A Heterogeneous network is isolated while a Homogeneous network can utilize the interent

  • 3. 
    How many users are required to define an "Enterprise Network"?
    • A. 

      250-1000

    • B. 

      1000+

    • C. 

      50-250

    • D. 

      1-50

  • 4. 
    Which AFI covers Air Force Messaging (e-mail)?
    • A. 

      AFI 33-115

    • B. 

      AFI 33-200

    • C. 

      AFI 33-202

    • D. 

      AFI 33-119

  • 5. 
    What protocol is utilized by network management servers?
    • A. 

      POP3

    • B. 

      DHCP

    • C. 

      SNMP

    • D. 

      SMTP

  • 6. 
    What are the three distinct aspects of information that must be protected?
    • A. 

      Confidentiality, Integrity, Availability

    • B. 

      Integrity, Service, Excellence

    • C. 

      Applications, Operating System, Hardware

    • D. 

      Confidentiality, Intergrity

  • 7. 
    Ping is a network management tool that is part of the ___ protocol
    • A. 

      ICMP

    • B. 

      SNMP

    • C. 

      SMTP

    • D. 

      FTP

  • 8. 
    SMARTS (System Management Automated Report Tracking System) performs root-cause analysis of which OSI model layers?
    • A. 

      1 an 2

    • B. 

      2 and 3

    • C. 

      1 and 3

    • D. 

      2 and 4

  • 9. 
    SMARTS uses a combination of what protocols for polling?
    • A. 

      SMTP and POP3

    • B. 

      SNMP and FTP

    • C. 

      SNMP and ICMP

    • D. 

      ICMP and SMTP

  • 10. 
    Protocol analyzers monitor the traffic on a segment or domain one ___ at a time
    • A. 

      Packet

    • B. 

      Connection

    • C. 

      Frame

    • D. 

      Collision

  • 11. 
    Tracert us a tool used to:
    • A. 

      Send a series of messages to a target and time the response

    • B. 

      See the path packets are traveling and the time it takes to complete the trip

    • C. 

      Send frames to a specific node

    • D. 

      None of the above

  • 12. 
    What is the definition of Identification and Authentication?
    • A. 

      The process of proving that a subject is what the subject claims to be

    • B. 

      The process of selecting a target and verifying authorization to attack

    • C. 

      The process of identifying an attacker and the authentication method used

    • D. 

      The process of selecting an airman for assignment and verifying they have the appropriate clearance

  • 13. 
    What is DIACAP?
    • A. 

      The process for denying access to a government system

    • B. 

      The DOD process for allowing access to a government system

    • C. 

      The DOD approval process for joining the AF-GIG

    • D. 

      The DOD process for identifying, implementing, validating, certifying and managing IA capabilities and services

  • 14. 
    SIPRNET is classified up to what levels?
    • A. 

      Unclassified

    • B. 

      Secret

    • C. 

      Top Secret

    • D. 

      FOUO

  • 15. 
    What is the Defense In Depth concept?
    • A. 

      Varying layers of security to provide access

    • B. 

      Physical security layers to prevent unauthorized physical access

    • C. 

      Varying defense measures to prevent unauthorized access

    • D. 

      Using more strict encryption as you go from an external to internal network

  • 16. 
    What severs usually reside in the DMZ?
    • A. 

      Web Servers

    • B. 

      Email Servers

    • C. 

      Proxy Servers

    • D. 

      All of the above

  • 17. 
    Firewalls cannot protect against what?
    • A. 

      Viruses

    • B. 

      Disclosure of information by authorized users

    • C. 

      Unauthorized access by someone already "inside" the network

    • D. 

      All of the above

  • 18. 
    Define Virus
    • A. 

      A program that creates a tunnel to a remote machine for unauthorized access

    • B. 

      A program that lies dormant waiting for information from the owner

    • C. 

      A program that replicates itself by attaching to a program

    • D. 

      None of the above

  • 19. 
    What does PKI provide?
    • A. 

      Users of unsecured networks to securely and privately exchange data through the use of public and private cryptographic key pairs

    • B. 

      Users of secure networks to un-encrypt data using public cryptographic keys

    • C. 

      Users of unsecure networks to enter a secure network such as SIPRNET using public and private cryptographic key pairs

    • D. 

      Users of secure networks to enter unsecure public networks using public and private cryptographic key pairs

  • 20. 
    True or False" A digital signature fundamentally relies on the concept of a key pair
    • A. 

      True

    • B. 

      False

  • 21. 
    What is the first job of the BIOS when turning on a computer?
    • A. 

      Perform the Power of Self-Test (POST)

    • B. 

      Load the Operating System (OS)

    • C. 

      Detect Hard Disk Drives

    • D. 

      Detect the Operating System

  • 22. 
    What information does the CMOS store?
    • A. 

      Network information for later use

    • B. 

      Configuration information about the computer used by the BIOS

    • C. 

      Date and Time information

    • D. 

      B & C

  • 23. 
    What is the most common type of RAM?
    • A. 

      Static

    • B. 

      Dynamic

    • C. 

      Duplicate

    • D. 

      Sufficient

  • 24. 
    True or False: Data integrity requires data to be identically maintained during any operation
    • A. 

      False

    • B. 

      True

  • 25. 
    Drivers are small, low-level programs used by the OS to interact with ___?
    • A. 

      Networks

    • B. 

      Data flow

    • C. 

      Hardware

    • D. 

      None of the above

Back to Top Back to top