Enjoy!
Sustain cryptographic equipment
Install and maintain servers or other computer systems
Manage data, information, and knowledge sharing services
Detection activities, including real-time intrustion detection and firewall protection
Client Systems (3D1X1)
Spectrum Operations (3D1X4)
Cyber Transport Systems (3D1X2)
Radio Frequency (RF) Transmission Systems (3D1X3)
4
5
6
7
Assets hazards
Implement controls
Supervise and evaluate
Develop controls and make decisions
40
60
75
95
Global network
WLAN
WWAN
WMAN
CAT-6
Coaxial
Fiber Optic
Twisted Pair
Fiber optic
Terrestrial
Radio frequency
Satellite microwave
Bus
Star
Ring
Tree
4
6
8
10
32
64
128
256
B
C
D
E
X.x.x.0
X.x.x.255
127.x.x.x
255.255.255.255
Mask
Subnet
Hierarchy
Routing prefix
User datagram protocol (UDP)
Hyper text transfer protocol (HTTP)
Dynamic host configuration protocol (DHCP)
Transmission control protocol / Internet protocol (TCP/IP)
50
80
5050
8080
Internet protocol (IP)
Hyper text transfer protocol (HTTP)
Transmission control protocol (TCP)
Dynamic host configuration protocol (DHCP)
A port
A protocol
A service point
An entrance point
0 to 1023
1024 to 23535
23536 to 49151
49152 to 65535
7
20
23
53
21
22
60
80
Strobe scan
Sweep scan
Fragment packet scan
FTP bounce scan
Fragment packets
Synchronous (SYN) scan
User datagram protocol (UDP) scan
Transmission control protocol (TCP) scan
Air Force Network Operations (AFNetOps)
Air Force Network Integration Center (AFNIC)
Air Force Network Operations Center (AFNOC)
Air Force Information, Services and Integration Directorate (SAF/XCIA)
Eight groups of four hexadecimal numbers, separated by colons
Eight groups of four hexadecimal numbers, separated by periods
Four groups of eight hexadecimal numbers, separated by colons
Four groups of eight hexadecimal numbers, separated by periods
Tunneling
Dual layer
Dual stack
Peer-to-peer
Installing all applicable security patches
Creating continuity throughout the network
Minimizing risks posed by various cyberspace threats
Keeping complete and accurate documentation for all configuration changes
Installing all applicable security patches
Creating continuity throughout the network
Minimizing risks posed by various cyberspace threats
Keeping complete and accurate documentation for all configuration changes
802.11a
802.11b
802.11g
802.11n
802.11a
802.11b
802.11g
802.11n
WiFi protected access (WPA)
Wired equivalency privacy (WEP)
Wireless local area network (WLAN)
Wireless wide area network (WWAN)
An adequate IA posture in a shared-risk environment
An adequate IA posture in the AF environment
A federal desktop configuration
A federal server configuration
Secure location
System classification
Defense-in-depth code
Mission assurance category
Users are aware of their role in IA
Users are trained on network security
Users have met investigative requirements
Users have satisfied network access requirements
Wing commander
Wing IAO
AFNETOPS commander
AFNOC commander
Unit commander
Unit security manager
ISSO
Wing ISSO
Having information ready when needed
Not being able to deny who performed network actions
The protection of the network from those not authorized access
The assurance that no one has changed or destroyed information without permission
32-bit
64-bit
128-bit
256-bit
Digital
Biometric
Encryption
Identification
Integrity
Availability
Confidentiality
Non-repudiation
Wing (WG)
Air Force (AF)
Department of Defense (DoD)
Local Registration Authority / Trusted Agent (LRA/TA)
Classified
Unclassified
Sensitive but unclassified
FOUO
End-user
Remote user
Administrative
Limited
Router
Firewall
Proxy server
Network access server
Threats
Exploits
Vulnerabilities
Breaches of security
Shutting down ports
Using strong passwords
Ensuring remote access
Disabling unused/unneeded services
Rsh
Telnet
Finger
File transfer protocol (FTP)
Rate this question:
Notices
Postings
Bulletins
Announcements
Writes itself before the original file
Writes itself to the end of the original file
Writes itself between file sections of 32-bit file
Renames the original file and writes itself with the original file's name
Boot sector virus
Worm program
Trojan horse
Macro virus
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.