3D053 Cyber Surety Journeyman - Edit Code 03, Vol. 1

90 Questions | Total Attempts: 92

SettingsSettingsSettings
Please wait...
3D053 Cyber Surety Journeyman - Edit Code 03, Vol. 1

Enjoy!


Related Topics
Questions and Answers
  • 1. 
    Which of the following is performed by a cyber surety journeyman?
    • A. 

      Sustain cryptographic equipment

    • B. 

      Install and maintain servers or other computer systems

    • C. 

      Manage data, information, and knowledge sharing services

    • D. 

      Detection activities, including real-time intrustion detection and firewall protection

  • 2. 
    Which career field deploys, sustains, troubleshoots and repairs standard voice, data, video network, and cryptographic equipment?
    • A. 

      Client Systems (3D1X1)

    • B. 

      Spectrum Operations (3D1X4)

    • C. 

      Cyber Transport Systems (3D1X2)

    • D. 

      Radio Frequency (RF) Transmission Systems (3D1X3)

  • 3. 
    How many steps are in the Risk Management process?
    • A. 

      4

    • B. 

      5

    • C. 

      6

    • D. 

      7

  • 4. 
    What is the third step in the Risk Management process?
    • A. 

      Assets hazards

    • B. 

      Implement controls

    • C. 

      Supervise and evaluate

    • D. 

      Develop controls and make decisions

  • 5. 
    Human error causes approximately what percentage of all accidents?
    • A. 

      40

    • B. 

      60

    • C. 

      75

    • D. 

      95

  • 6. 
    Which type of network typically provides wireless broadband data services?
    • A. 

      Global network

    • B. 

      WLAN

    • C. 

      WWAN

    • D. 

      WMAN

  • 7. 
    Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?
    • A. 

      CAT-6

    • B. 

      Coaxial

    • C. 

      Fiber Optic

    • D. 

      Twisted Pair

  • 8. 
    Which of the following is not an example of unbound media?
    • A. 

      Fiber optic

    • B. 

      Terrestrial

    • C. 

      Radio frequency

    • D. 

      Satellite microwave

  • 9. 
    In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?
    • A. 

      Bus

    • B. 

      Star

    • C. 

      Ring

    • D. 

      Tree

  • 10. 
    When viewed in binary form, each octet within an IP address has how many positions?
    • A. 

      4

    • B. 

      6

    • C. 

      8

    • D. 

      10

  • 11. 
    How many bits are in an IPv4 address?
    • A. 

      32

    • B. 

      64

    • C. 

      128

    • D. 

      256

  • 12. 
    Which class of IP address is only used for experimental purposes?
    • A. 

      B

    • B. 

      C

    • C. 

      D

    • D. 

      E

  • 13. 
    Which IP address is used for limited broadcast?
    • A. 

      X.x.x.0

    • B. 

      X.x.x.255

    • C. 

      127.x.x.x

    • D. 

      255.255.255.255

  • 14. 
    The sequence of leading bits in an IP that are used to identify the network portion of an IP address is called a
    • A. 

      Mask

    • B. 

      Subnet

    • C. 

      Hierarchy

    • D. 

      Routing prefix

  • 15. 
    Which protocol does the internet support as the "language" computers use to find and connect with each other?
    • A. 

      User datagram protocol (UDP)

    • B. 

      Hyper text transfer protocol (HTTP)

    • C. 

      Dynamic host configuration protocol (DHCP)

    • D. 

      Transmission control protocol / Internet protocol (TCP/IP)

  • 16. 
    Which TCP port is used by HTTP by default?
    • A. 

      50

    • B. 

      80

    • C. 

      5050

    • D. 

      8080

  • 17. 
    Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a TCP/IP based network?
    • A. 

      Internet protocol (IP)

    • B. 

      Hyper text transfer protocol (HTTP)

    • C. 

      Transmission control protocol (TCP)

    • D. 

      Dynamic host configuration protocol (DHCP)

  • 18. 
    A logical connection point for the transmission of information packets is known as:
    • A. 

      A port

    • B. 

      A protocol

    • C. 

      A service point

    • D. 

      An entrance point

  • 19. 
    Which port range constitutes well-known ports?
    • A. 

      0 to 1023

    • B. 

      1024 to 23535

    • C. 

      23536 to 49151

    • D. 

      49152 to 65535

  • 20. 
    Which port is used for telnet?
    • A. 

      7

    • B. 

      20

    • C. 

      23

    • D. 

      53

  • 21. 
    Which port is used for HTTP?
    • A. 

      21

    • B. 

      22

    • C. 

      60

    • D. 

      80

  • 22. 
    In which type of port scan does the scanner connect to the same port on more than one machine?
    • A. 

      Strobe scan

    • B. 

      Sweep scan

    • C. 

      Fragment packet scan

    • D. 

      FTP bounce scan

  • 23. 
    Which type of scan is also known as a half open scan?
    • A. 

      Fragment packets

    • B. 

      Synchronous (SYN) scan

    • C. 

      User datagram protocol (UDP) scan

    • D. 

      Transmission control protocol (TCP) scan

  • 24. 
    Which organization is responsible for developing Air Force ports, protocols and services (PPS) policies and procedures?
    • A. 

      Air Force Network Operations (AFNetOps)

    • B. 

      Air Force Network Integration Center (AFNIC)

    • C. 

      Air Force Network Operations Center (AFNOC)

    • D. 

      Air Force Information, Services and Integration Directorate (SAF/XCIA)

  • 25. 
    How is an IPv6 address written?
    • A. 

      Eight groups of four hexadecimal numbers, separated by colons

    • B. 

      Eight groups of four hexadecimal numbers, separated by periods

    • C. 

      Four groups of eight hexadecimal numbers, separated by colons

    • D. 

      Four groups of eight hexadecimal numbers, separated by periods