2015 CDC Test 3d052 Vol 1 & 2

40 Questions | Total Attempts: 37

SettingsSettingsSettings
Please wait...
3d052 Quizzes & Trivia

.


Questions and Answers
  • 1. 
    What is a network?
    • A. 

      A group of systems that cannot talk to each other

    • B. 

      A group of computers that are not connected

    • C. 

      A group of computers that are connected with each other

    • D. 

      A single system connected to the internet

  • 2. 
    What is the difference between a Heterogeneous network and a Homogeneous network?
    • A. 

      A Heterogeneous network consists of computers from multiple vendors and operating systems while a Homogeneous network consists of computers from the same vendor running the same operating system

    • B. 

      A Heterogeneous network consists of computers from the same vendor and operating system while a Homogeneous network consists of computers from different vendors running different operating systems

    • C. 

      A Heterogeneous network can utilize the internet while a Homogeneous network is isolated

    • D. 

      A Heterogeneous network is isolated while a Homogeneous network can utilize the interent

  • 3. 
    How many users are required to define an "Enterprise Network"?
    • A. 

      250-1000

    • B. 

      1000+

    • C. 

      50-250

    • D. 

      1-50

  • 4. 
    Which AFI covers Air Force Messaging (e-mail)?
    • A. 

      AFI 33-115

    • B. 

      AFI 33-200

    • C. 

      AFI 33-202

    • D. 

      AFI 33-119

  • 5. 
    What protocol is utilized by network management servers?
    • A. 

      POP3

    • B. 

      DHCP

    • C. 

      SNMP

    • D. 

      SMTP

  • 6. 
    What are the three distinct aspects of information that must be protected?
    • A. 

      Confidentiality, Integrity, Availability

    • B. 

      Integrity, Service, Excellence

    • C. 

      Applications, Operating System, Hardware

    • D. 

      Confidentiality, Intergrity

  • 7. 
    Ping is a network management tool that is part of the ___ protocol
    • A. 

      ICMP

    • B. 

      SNMP

    • C. 

      SMTP

    • D. 

      FTP

  • 8. 
    SMARTS (System Management Automated Report Tracking System) performs root-cause analysis of which OSI model layers?
    • A. 

      1 an 2

    • B. 

      2 and 3

    • C. 

      1 and 3

    • D. 

      2 and 4

  • 9. 
    SMARTS uses a combination of what protocols for polling?
    • A. 

      SMTP and POP3

    • B. 

      SNMP and FTP

    • C. 

      SNMP and ICMP

    • D. 

      ICMP and SMTP

  • 10. 
    Protocol analyzers monitor the traffic on a segment or domain one ___ at a time
    • A. 

      Packet

    • B. 

      Connection

    • C. 

      Frame

    • D. 

      Collision

  • 11. 
    Tracert us a tool used to:
    • A. 

      Send a series of messages to a target and time the response

    • B. 

      See the path packets are traveling and the time it takes to complete the trip

    • C. 

      Send frames to a specific node

    • D. 

      None of the above

  • 12. 
    What is the definition of Identification and Authentication?
    • A. 

      The process of proving that a subject is what the subject claims to be

    • B. 

      The process of selecting a target and verifying authorization to attack

    • C. 

      The process of identifying an attacker and the authentication method used

    • D. 

      The process of selecting an airman for assignment and verifying they have the appropriate clearance

  • 13. 
    What is DIACAP?
    • A. 

      The process for denying access to a government system

    • B. 

      The DOD process for allowing access to a government system

    • C. 

      The DOD approval process for joining the AF-GIG

    • D. 

      The DOD process for identifying, implementing, validating, certifying and managing IA capabilities and services

  • 14. 
    SIPRNET is classified up to what levels?
    • A. 

      Unclassified

    • B. 

      Secret

    • C. 

      Top Secret

    • D. 

      FOUO

  • 15. 
    What is the Defense In Depth concept?
    • A. 

      Varying layers of security to provide access

    • B. 

      Physical security layers to prevent unauthorized physical access

    • C. 

      Varying defense measures to prevent unauthorized access

    • D. 

      Using more strict encryption as you go from an external to internal network

  • 16. 
    What severs usually reside in the DMZ?
    • A. 

      Web Servers

    • B. 

      Email Servers

    • C. 

      Proxy Servers

    • D. 

      All of the above

  • 17. 
    Firewalls cannot protect against what?
    • A. 

      Viruses

    • B. 

      Disclosure of information by authorized users

    • C. 

      Unauthorized access by someone already "inside" the network

    • D. 

      All of the above

  • 18. 
    Define Virus
    • A. 

      A program that creates a tunnel to a remote machine for unauthorized access

    • B. 

      A program that lies dormant waiting for information from the owner

    • C. 

      A program that replicates itself by attaching to a program

    • D. 

      None of the above

  • 19. 
    What does PKI provide?
    • A. 

      Users of unsecured networks to securely and privately exchange data through the use of public and private cryptographic key pairs

    • B. 

      Users of secure networks to un-encrypt data using public cryptographic keys

    • C. 

      Users of unsecure networks to enter a secure network such as SIPRNET using public and private cryptographic key pairs

    • D. 

      Users of secure networks to enter unsecure public networks using public and private cryptographic key pairs

  • 20. 
    True or False" A digital signature fundamentally relies on the concept of a key pair
    • A. 

      True

    • B. 

      False

  • 21. 
    What is the first job of the BIOS when turning on a computer?
    • A. 

      Perform the Power of Self-Test (POST)

    • B. 

      Load the Operating System (OS)

    • C. 

      Detect Hard Disk Drives

    • D. 

      Detect the Operating System

  • 22. 
    What information does the CMOS store?
    • A. 

      Network information for later use

    • B. 

      Configuration information about the computer used by the BIOS

    • C. 

      Date and Time information

    • D. 

      B & C

  • 23. 
    What is the most common type of RAM?
    • A. 

      Static

    • B. 

      Dynamic

    • C. 

      Duplicate

    • D. 

      Sufficient

  • 24. 
    True or False: Data integrity requires data to be identically maintained during any operation
    • A. 

      False

    • B. 

      True

  • 25. 
    Drivers are small, low-level programs used by the OS to interact with ___?
    • A. 

      Networks

    • B. 

      Data flow

    • C. 

      Hardware

    • D. 

      None of the above

  • 26. 
    True or False: A Storage area network is a way of utilizing a group of storage devices as routers?
    • A. 

      False

    • B. 

      True

  • 27. 
    What is RAID 5?
    • A. 

      Redundancy that stripes information and the parity but amongst the drives as opposed to the parity bit being on a single drive

    • B. 

      Redundancy that stripes data at the block level where data in the form of a block is written to a single hard drive

    • C. 

      Redundancy that mirrors information on one hard drive to another

    • D. 

      Redundancy that mirrors and stripes information across a set of hard drives

  • 28. 
    What are High-order languages (HOL)?
    • A. 

      Programming languages that are written at the binary level for faster computing

    • B. 

      Programming languages designed to help both the programmer and the user. Utilizing English-like statements

    • C. 

      Vernacular and technical jargon used by AF Comm personnel

    • D. 

      Programming languages that use encoded messages to develop applications so that our enemies cannot understand any intercepted code

  • 29. 
    What does HTTP stand for?
    • A. 

      Hyper Talk Transfer Protocol

    • B. 

      Hyper Translation Transfer Protocol

    • C. 

      Hypertext Transfer Protocol

    • D. 

      None of the above

  • 30. 
    The secure socket layer (SSL) is a commonly used protocol for managing the ___ of a message transmission on the internet
    • A. 

      Delivery

    • B. 

      Parsing

    • C. 

      Tunneling

    • D. 

      Security

  • 31. 
    What are the three main classifications of threats to an IT system?
    • A. 

      Natural, Electrical, Human

    • B. 

      Natural, Human, Environmental

    • C. 

      Electrical, Water, Dust

    • D. 

      None of the above

  • 32. 
    The domain name service (DNS) is responsible for:
    • A. 

      Converting friendly names to IP addresses

    • B. 

      Converting IP addresses to MAC addresses

    • C. 

      Converting MAC addresses to IP addresses

    • D. 

      Creating a user account on the domain

  • 33. 
    What is dynamic host configuration protocol (DHCP) used for?
    • A. 

      Managing computer Operating Systems

    • B. 

      Managing the devices plugged into a computer system

    • C. 

      Configuring the operating system of a computer

    • D. 

      Issuing and configuring the IP address of a computer

  • 34. 
    What protocol does Outlook use to connect with Exchange 2003?
    • A. 

      SMTP

    • B. 

      MAPI

    • C. 

      POP3

    • D. 

      IMAP4

  • 35. 
    What is a database table?
    • A. 

      Set of data elements in a three dimensional model

    • B. 

      Relational data calculated in response to a query

    • C. 

      Set of data elements using a model of horizontal rows and vertical columns

    • D. 

      A set of instructions for the database server to process

  • 36. 
    What are the three UNIX shells?
    • A. 

      Korn, Bourne, Shorn

    • B. 

      Bourne, Torn, K

    • C. 

      Korn, CMD, Bourne

    • D. 

      Korn, Bourne, C

  • 37. 
    What UNIX command is used to change permissions?
    • A. 

      Chown

    • B. 

      Chgrp

    • C. 

      Touch

    • D. 

      Chmod

  • 38. 
    True or False: UNIX commands are case sensitive
    • A. 

      True

    • B. 

      False

  • 39. 
    What is the UNIX /lib directory for
    • A. 

      Contains library files used for programming

    • B. 

      Contains executable files most commonly used

    • C. 

      Is the master directory and is the highest level folder

    • D. 

      Contains common files used by all users

  • 40. 
    What command displays the contents of a file
    • A. 

      Cat

    • B. 

      Print

    • C. 

      Ln

    • D. 

      Echo