This quiz assesses key knowledge in network management and security within an Air Force context, covering network definitions, types, protocols, and Air Force-specific regulations like AFI 33-119. It is designed for personnel involved in Cyber Operations, enhancing skills in maintaining confidentiality, integrity, and availability of information.
A Heterogeneous network consists of computers from multiple vendors and operating systems while a Homogeneous network consists of computers from the same vendor running the same operating system
A Heterogeneous network consists of computers from the same vendor and operating system while a Homogeneous network consists of computers from different vendors running different operating systems
A Heterogeneous network can utilize the internet while a Homogeneous network is isolated
A Heterogeneous network is isolated while a Homogeneous network can utilize the interent
Rate this question:
Confidentiality, Integrity, Availability
Integrity, Service, Excellence
Applications, Operating System, Hardware
Confidentiality, Intergrity
Rate this question:
The process for denying access to a government system
The DOD process for allowing access to a government system
The DOD approval process for joining the AF-GIG
The DOD process for identifying, implementing, validating, certifying and managing IA capabilities and services
Rate this question:
Users of unsecured networks to securely and privately exchange data through the use of public and private cryptographic key pairs
Users of secure networks to un-encrypt data using public cryptographic keys
Users of unsecure networks to enter a secure network such as SIPRNET using public and private cryptographic key pairs
Users of secure networks to enter unsecure public networks using public and private cryptographic key pairs
Rate this question:
Send a series of messages to a target and time the response
See the path packets are traveling and the time it takes to complete the trip
Send frames to a specific node
None of the above
Rate this question:
The process of proving that a subject is what the subject claims to be
The process of selecting a target and verifying authorization to attack
The process of identifying an attacker and the authentication method used
The process of selecting an airman for assignment and verifying they have the appropriate clearance
Rate this question:
Viruses
Disclosure of information by authorized users
Unauthorized access by someone already "inside" the network
All of the above
Rate this question:
Perform the Power of Self-Test (POST)
Load the Operating System (OS)
Detect Hard Disk Drives
Detect the Operating System
Rate this question:
Networks
Data flow
Hardware
None of the above
Rate this question:
Hyper Talk Transfer Protocol
Hyper Translation Transfer Protocol
Hypertext Transfer Protocol
None of the above
Rate this question:
Managing computer Operating Systems
Managing the devices plugged into a computer system
Configuring the operating system of a computer
Issuing and configuring the IP address of a computer
Rate this question:
ICMP
SNMP
SMTP
FTP
Rate this question:
Web Servers
Email Servers
Proxy Servers
All of the above
Rate this question:
True
False
Rate this question:
Korn, Bourne, Shorn
Bourne, Torn, K
Korn, CMD, Bourne
Korn, Bourne, C
Rate this question:
250-1000
1000+
50-250
1-50
Rate this question:
SMTP and POP3
SNMP and FTP
SNMP and ICMP
ICMP and SMTP
Rate this question:
A program that creates a tunnel to a remote machine for unauthorized access
A program that lies dormant waiting for information from the owner
A program that replicates itself by attaching to a program
None of the above
Rate this question:
Static
Dynamic
Duplicate
Sufficient
Rate this question:
Delivery
Parsing
Tunneling
Security
Rate this question:
Natural, Electrical, Human
Natural, Human, Environmental
Electrical, Water, Dust
None of the above
Rate this question:
Chown
Chgrp
Touch
Chmod
Rate this question:
True
False
Rate this question:
POP3
DHCP
SNMP
SMTP
Rate this question:
1 an 2
2 and 3
1 and 3
2 and 4
Rate this question:
False
True
Rate this question:
False
True
Rate this question:
Programming languages that are written at the binary level for faster computing
Programming languages designed to help both the programmer and the user. Utilizing English-like statements
Vernacular and technical jargon used by AF Comm personnel
Programming languages that use encoded messages to develop applications so that our enemies cannot understand any intercepted code
Rate this question:
Converting friendly names to IP addresses
Converting IP addresses to MAC addresses
Converting MAC addresses to IP addresses
Creating a user account on the domain
Rate this question:
Set of data elements in a three dimensional model
Relational data calculated in response to a query
Set of data elements using a model of horizontal rows and vertical columns
A set of instructions for the database server to process
Rate this question:
Contains library files used for programming
Contains executable files most commonly used
Is the master directory and is the highest level folder
Contains common files used by all users
Rate this question:
Unclassified
Secret
Top Secret
FOUO
Rate this question:
AFI 33-115
AFI 33-200
AFI 33-202
AFI 33-119
Rate this question:
Cat
Ln
Echo
Rate this question:
Varying layers of security to provide access
Physical security layers to prevent unauthorized physical access
Varying defense measures to prevent unauthorized access
Using more strict encryption as you go from an external to internal network
Rate this question:
Network information for later use
Configuration information about the computer used by the BIOS
Date and Time information
B & C
Rate this question:
Redundancy that stripes information and the parity but amongst the drives as opposed to the parity bit being on a single drive
Redundancy that stripes data at the block level where data in the form of a block is written to a single hard drive
Redundancy that mirrors information on one hard drive to another
Redundancy that mirrors and stripes information across a set of hard drives
Rate this question:
SMTP
MAPI
POP3
IMAP4
Rate this question:
Packet
Connection
Frame
Collision
Rate this question:
Quiz Review Timeline (Updated): Jun 12, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.