3D053 Cyber Surety Journeyman - Edit Code 03, Vol. 1

90 Questions | Attempts: 102
Share

SettingsSettingsSettings
3D053 Cyber Surety Journeyman - Edit Code 03, Vol. 1 - Quiz

Enjoy!


Questions and Answers
  • 1. 

    Which of the following is performed by a cyber surety journeyman?

    • A.

      Sustain cryptographic equipment

    • B.

      Install and maintain servers or other computer systems

    • C.

      Manage data, information, and knowledge sharing services

    • D.

      Detection activities, including real-time intrustion detection and firewall protection

    Correct Answer
    D. Detection activities, including real-time intrustion detection and firewall protection
  • 2. 

    Which career field deploys, sustains, troubleshoots and repairs standard voice, data, video network, and cryptographic equipment?

    • A.

      Client Systems (3D1X1)

    • B.

      Spectrum Operations (3D1X4)

    • C.

      Cyber Transport Systems (3D1X2)

    • D.

      Radio Frequency (RF) Transmission Systems (3D1X3)

    Correct Answer
    A. Client Systems (3D1X1)
  • 3. 

    How many steps are in the Risk Management process?

    • A.

      4

    • B.

      5

    • C.

      6

    • D.

      7

    Correct Answer
    B. 5
  • 4. 

    What is the third step in the Risk Management process?

    • A.

      Assets hazards

    • B.

      Implement controls

    • C.

      Supervise and evaluate

    • D.

      Develop controls and make decisions

    Correct Answer
    D. Develop controls and make decisions
  • 5. 

    Human error causes approximately what percentage of all accidents?

    • A.

      40

    • B.

      60

    • C.

      75

    • D.

      95

    Correct Answer
    D. 95
  • 6. 

    Which type of network typically provides wireless broadband data services?

    • A.

      Global network

    • B.

      WLAN

    • C.

      WWAN

    • D.

      WMAN

    Correct Answer
    C. WWAN
  • 7. 

    Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?

    • A.

      CAT-6

    • B.

      Coaxial

    • C.

      Fiber Optic

    • D.

      Twisted Pair

    Correct Answer
    C. Fiber Optic
  • 8. 

    Which of the following is not an example of unbound media?

    • A.

      Fiber optic

    • B.

      Terrestrial

    • C.

      Radio frequency

    • D.

      Satellite microwave

    Correct Answer
    A. Fiber optic
  • 9. 

    In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?

    • A.

      Bus

    • B.

      Star

    • C.

      Ring

    • D.

      Tree

    Correct Answer
    A. Bus
  • 10. 

    When viewed in binary form, each octet within an IP address has how many positions?

    • A.

      4

    • B.

      6

    • C.

      8

    • D.

      10

    Correct Answer
    C. 8
  • 11. 

    How many bits are in an IPv4 address?

    • A.

      32

    • B.

      64

    • C.

      128

    • D.

      256

    Correct Answer
    A. 32
  • 12. 

    Which class of IP address is only used for experimental purposes?

    • A.

      B

    • B.

      C

    • C.

      D

    • D.

      E

    Correct Answer
    D. E
  • 13. 

    Which IP address is used for limited broadcast?

    • A.

      X.x.x.0

    • B.

      X.x.x.255

    • C.

      127.x.x.x

    • D.

      255.255.255.255

    Correct Answer
    D. 255.255.255.255
  • 14. 

    The sequence of leading bits in an IP that are used to identify the network portion of an IP address is called a

    • A.

      Mask

    • B.

      Subnet

    • C.

      Hierarchy

    • D.

      Routing prefix

    Correct Answer
    D. Routing prefix
  • 15. 

    Which protocol does the internet support as the "language" computers use to find and connect with each other?

    • A.

      User datagram protocol (UDP)

    • B.

      Hyper text transfer protocol (HTTP)

    • C.

      Dynamic host configuration protocol (DHCP)

    • D.

      Transmission control protocol / Internet protocol (TCP/IP)

    Correct Answer
    D. Transmission control protocol / Internet protocol (TCP/IP)
  • 16. 

    Which TCP port is used by HTTP by default?

    • A.

      50

    • B.

      80

    • C.

      5050

    • D.

      8080

    Correct Answer
    B. 80
  • 17. 

    Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a TCP/IP based network?

    • A.

      Internet protocol (IP)

    • B.

      Hyper text transfer protocol (HTTP)

    • C.

      Transmission control protocol (TCP)

    • D.

      Dynamic host configuration protocol (DHCP)

    Correct Answer
    D. Dynamic host configuration protocol (DHCP)
  • 18. 

    A logical connection point for the transmission of information packets is known as:

    • A.

      A port

    • B.

      A protocol

    • C.

      A service point

    • D.

      An entrance point

    Correct Answer
    A. A port
  • 19. 

    Which port range constitutes well-known ports?

    • A.

      0 to 1023

    • B.

      1024 to 23535

    • C.

      23536 to 49151

    • D.

      49152 to 65535

    Correct Answer
    A. 0 to 1023
  • 20. 

    Which port is used for telnet?

    • A.

      7

    • B.

      20

    • C.

      23

    • D.

      53

    Correct Answer
    C. 23
  • 21. 

    Which port is used for HTTP?

    • A.

      21

    • B.

      22

    • C.

      60

    • D.

      80

    Correct Answer
    D. 80
  • 22. 

    In which type of port scan does the scanner connect to the same port on more than one machine?

    • A.

      Strobe scan

    • B.

      Sweep scan

    • C.

      Fragment packet scan

    • D.

      FTP bounce scan

    Correct Answer
    B. Sweep scan
  • 23. 

    Which type of scan is also known as a half open scan?

    • A.

      Fragment packets

    • B.

      Synchronous (SYN) scan

    • C.

      User datagram protocol (UDP) scan

    • D.

      Transmission control protocol (TCP) scan

    Correct Answer
    B. Synchronous (SYN) scan
  • 24. 

    Which organization is responsible for developing Air Force ports, protocols and services (PPS) policies and procedures?

    • A.

      Air Force Network Operations (AFNetOps)

    • B.

      Air Force Network Integration Center (AFNIC)

    • C.

      Air Force Network Operations Center (AFNOC)

    • D.

      Air Force Information, Services and Integration Directorate (SAF/XCIA)

    Correct Answer
    B. Air Force Network Integration Center (AFNIC)
  • 25. 

    How is an IPv6 address written?

    • A.

      Eight groups of four hexadecimal numbers, separated by colons

    • B.

      Eight groups of four hexadecimal numbers, separated by periods

    • C.

      Four groups of eight hexadecimal numbers, separated by colons

    • D.

      Four groups of eight hexadecimal numbers, separated by periods

    Correct Answer
    A. Eight groups of four hexadecimal numbers, separated by colons
  • 26. 

    Which type of transition technology is used to set up secure point-to-point communication?

    • A.

      Tunneling

    • B.

      Dual layer

    • C.

      Dual stack

    • D.

      Peer-to-peer

    Correct Answer
    A. Tunneling
  • 27. 

    Networked resources must be consistently monitored and controlled to ensure access to the network while

    • A.

      Installing all applicable security patches

    • B.

      Creating continuity throughout the network

    • C.

      Minimizing risks posed by various cyberspace threats

    • D.

      Keeping complete and accurate documentation for all configuration changes

    Correct Answer
    C. Minimizing risks posed by various cyberspace threats
  • 28. 

    Administrators must be in the habit of doing what to make it possible for replacement administrators to accomplish the same tasks as their predecessors?

    • A.

      Installing all applicable security patches

    • B.

      Creating continuity throughout the network

    • C.

      Minimizing risks posed by various cyberspace threats

    • D.

      Keeping complete and accurate documentation for all configuration changes

    Correct Answer
    D. Keeping complete and accurate documentation for all configuration changes
  • 29. 

    Which is the slowest yet least expensive WiFi standard?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11n

    Correct Answer
    B. 802.11b
  • 30. 

    What is the newest WiFi networking standard that is widely available?

    • A.

      802.11a

    • B.

      802.11b

    • C.

      802.11g

    • D.

      802.11n

    Correct Answer
    D. 802.11n
  • 31. 

    Which wireless standard was originally intended to create a wireless security platform that would perform as securely as a traditional wired network by providing data encryption?

    • A.

      WiFi protected access (WPA)

    • B.

      Wired equivalency privacy (WEP)

    • C.

      Wireless local area network (WLAN)

    • D.

      Wireless wide area network (WWAN)

    Correct Answer
    B. Wired equivalency privacy (WEP)
  • 32. 

    Defense-in-depth is the DoD approach for establishing

    • A.

      An adequate IA posture in a shared-risk environment

    • B.

      An adequate IA posture in the AF environment

    • C.

      A federal desktop configuration

    • D.

      A federal server configuration

    Correct Answer
    A. An adequate IA posture in a shared-risk environment
  • 33. 

    What is assigned to all DoD information systems that is directly associated with the importance of the information contained relative to achieving DoD goals objectives?

    • A.

      Secure location

    • B.

      System classification

    • C.

      Defense-in-depth code

    • D.

      Mission assurance category

    Correct Answer
    A. Secure location
  • 34. 

    Which of the following is not a result of initial IA awareness training for all network users?

    • A.

      Users are aware of their role in IA

    • B.

      Users are trained on network security

    • C.

      Users have met investigative requirements

    • D.

      Users have satisfied network access requirements

    Correct Answer
    C. Users have met investigative requirements
  • 35. 

    Who is the approval authority for foreign nationals to access unclassified systems?

    • A.

      Wing commander

    • B.

      Wing IAO

    • C.

      AFNETOPS commander

    • D.

      AFNOC commander

    Correct Answer
    C. AFNETOPS commander
  • 36. 

    Who initiates a local files check prior to allowing volunteers access to the AF network>

    • A.

      Unit commander

    • B.

      Unit security manager

    • C.

      ISSO

    • D.

      Wing ISSO

    Correct Answer
    B. Unit security manager
  • 37. 

    The definition of integrity as it's applied to identification, authentication and encryption is

    • A.

      Having information ready when needed

    • B.

      Not being able to deny who performed network actions

    • C.

      The protection of the network from those not authorized access

    • D.

      The assurance that no one has changed or destroyed information without permission

    Correct Answer
    D. The assurance that no one has changed or destroyed information without permission
  • 38. 

    Logon and password management screens must be encrypted with at least what type of secure socket layer?

    • A.

      32-bit

    • B.

      64-bit

    • C.

      128-bit

    • D.

      256-bit

    Correct Answer
    C. 128-bit
  • 39. 

    Which CAC certificate would be used to sign an enlisted performance report?

    • A.

      Digital

    • B.

      Biometric

    • C.

      Encryption

    • D.

      Identification

    Correct Answer
    D. Identification
  • 40. 

    What does the CAC certificate used to sign email provide?

    • A.

      Integrity

    • B.

      Availability

    • C.

      Confidentiality

    • D.

      Non-repudiation

    Correct Answer
    D. Non-repudiation
  • 41. 

    The contract manager must use what agency to validate a contractor employee's need to obtain a government public key infrastructure certificate?

    • A.

      Wing (WG)

    • B.

      Air Force (AF)

    • C.

      Department of Defense (DoD)

    • D.

      Local Registration Authority / Trusted Agent (LRA/TA)

    Correct Answer
    D. Local Registration Authority / Trusted Agent (LRA/TA)
  • 42. 

    Which category of information must be stored on removable media?

    • A.

      Classified

    • B.

      Unclassified

    • C.

      Sensitive but unclassified

    • D.

      FOUO

    Correct Answer
    A. Classified
  • 43. 

    Users who perform troubleshooting, configuration changes, or system reviews are given what type of access?

    • A.

      End-user

    • B.

      Remote user

    • C.

      Administrative

    • D.

      Limited

    Correct Answer
    C. Administrative
  • 44. 

    Which device provides the initial entry point into a network?

    • A.

      Router

    • B.

      Firewall

    • C.

      Proxy server

    • D.

      Network access server

    Correct Answer
    D. Network access server
  • 45. 

    Weaknesses or holes in a security system are considered

    • A.

      Threats

    • B.

      Exploits

    • C.

      Vulnerabilities

    • D.

      Breaches of security

    Correct Answer
    C. Vulnerabilities
  • 46. 

    Which of the following options is not involved when securing a UNIX system?

    • A.

      Shutting down ports

    • B.

      Using strong passwords

    • C.

      Ensuring remote access

    • D.

      Disabling unused/unneeded services

    Correct Answer
    C. Ensuring remote access
  • 47. 

    Which UNIX command allows remote logins?

    • A.

      Rsh

    • B.

      Telnet

    • C.

      Finger

    • D.

      File transfer protocol (FTP)

    Correct Answer
    B. Telnet
    Explanation
    also: rlogin

    Rate this question:

  • 48. 

    When vulnerabilities are discovered within the Windows OS and other products, Microsoft releases

    • A.

      Notices

    • B.

      Postings

    • C.

      Bulletins

    • D.

      Announcements

    Correct Answer
    C. Bulletins
  • 49. 

    A companion file virus is one that

    • A.

      Writes itself before the original file

    • B.

      Writes itself to the end of the original file

    • C.

      Writes itself between file sections of 32-bit file

    • D.

      Renames the original file and writes itself with the original file's name

    Correct Answer
    D. Renames the original file and writes itself with the original file's name
  • 50. 

    A program that contains or installs a malicious program is called a

    • A.

      Boot sector virus

    • B.

      Worm program

    • C.

      Trojan horse

    • D.

      Macro virus

    Correct Answer
    C. Trojan horse

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 17, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • May 25, 2016
    Quiz Created by
    Medwardstitles
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.