Z3dx5x Vol 2

100 Questions | Attempts: 592
Please wait...
Question 1 / 101
🏆 Rank #--
Score 0/100

1. Which network provides a private tunnel through the Internet?

Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. What range of numbers are those of well know port numbers?

Submit

3. Which device optically reads an image, printed text, or an object and converts it to a digital image?

Submit

4. The Occupational Safety and Health Administration (OSHA) is a part of the United States Department of

Submit

5. Which network is a group of computers and associated devices that share a common communications line and typically share the resources of a single processor or server within a small geographic area?

Submit

6. Which wireless local area network (WLAN) security method is best described as hiding a message in a special code?

Submit

7. Which type of encryption provides the greatest degree of protection since the information fully encodes all the way through the network to the users' own end terminals?

Submit

8. What portion of the Internet Protocol (IP) Datagram (packet) allows IP to detect datagrams with corrupted headers and discard them?

Submit

9. Which network supports unclassified e-mail service to the user?

Submit

10. Which network is a network that links local area networks (LAN) and Metropolitan area networks (MAN) by using long-distance communication links leased or purchased from a telecommunications company?

Submit

11. Which computer software is designed to collect personal information about users without their informed consent?

Submit

12. What action should you take first when you encounter a fire?

Submit

13. What characteristic is not an advantage of fiber optic cable?

Submit

14. What three parts make up Communications and Information Systems Installation Record (CSIR)?

Submit

15. What action is the purpose of the Mishap Prevention Program?

Submit

16. How are fires classified?

Submit

17. Which event is not a valid reason to change the combination on a container storing classified materials?

Submit

18. What network topology is another name for a bus topology?

Submit

19. What negative effect could occur when star networks are interconnected?

Submit

20. What hazard is the greatest in the typical office?

Submit

21. Which action is not a part of risk management (RM)?

Submit

22. What UNIX system software interacts most closely with the hardware?

Submit

23. What topology offers centralized management of a network?

Submit

24. The logical link control (LLC) sublayer is a part of which Open Systems Interconnection (OSI) model layer?

Submit

25. When used alone, the word "topology" often refers to a network's

Submit

26. Whose responsibility is to advise commanders, function managers, supervisors and workers on safety matters on an Air Force installation?

Submit

27. According to the Centers for Disease Control and Prevention (CDC) office workers are how many times more likely to suffer a disabling injury for a fall than non-office workers?

Submit

28. What year did the Institute of Electrical and Electronics Engineers (IEEE) ratifies the use of gigabit Ethernet (GbE)?

Submit

29. What step is the fourth in the firefighting procedure?

Submit

30. What Microsoft application is a software program that allows users to create a desktop database?

Submit

31. What action is the main purpose of system cache?

Submit

32. What major program does the Global Combat Support System-Air Force (GCSS-AF) provides as a single point of reference for services and information for Air Force personnel?

Submit

33. What action must supervisors take before a work task not governed by a technical order or other guidance can be accomplished?

Submit

34. Which network uses Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA) to avoid collisions while transmitting data?

Submit

35. Fuels that are normally classified as A or B will change to what classification if an electric current is introduced?

Submit

36. Which computer system vulnerability is not one in a computer system?

Submit

37. Which office annually evaluates agency efforts to improve the quality and usefulness of information technology investments requested by agencies through well-organized strategic decisions relating to investments and portfolio management?

Submit

38. What value is the maximum of an octet in Internet Protocol version 4 (IPv4)?

Submit

39. Which device works as a transceiver that converts the electrical signal utilized in copper unshielded twisted pair (UTP) network cabling to light waves used for fiber optic cabling.

Submit

40. Which action is a physiological factor?

Submit

41. What method is considered the least preferred when controlling hazards and should not be relied upon alone to protect against hazards.

Submit

42. Under normal conditions, how many milliamps of current could cause cardiac arrest?

Submit

43. What Microsoft application is a personal information manager?

Submit

44. What speed is the maximum data transfer rate of USB 3.0 SuperSpeed (SS) transfer mode?

Submit

45. What is a peripheral device?

Submit

46. Which governing body is the authority for information technology (IT) communications within the Department of Defense (DOD) and every level of IT communication from the DOD information network to the warfighter under their scope of control?

Submit

47. Which ladder practice is not prohibited?

Submit

48. What action is the purpose of a sliding window in Transmission Control Protocol (TCP)?

Submit

49. What functions do the seven layers of the Open Systems Interconnection (OSI) reference model specify?

Submit

50. What three sub-categories make up human factors?

Submit

51. What characteristic is the major difference between Random Access Memory (RAM) and Read Only Memory (ROM)?

Submit

52. What class is reserved for multicast addressing?

Submit

53. How would you determine if an intrusion detection system is required or another supplemental control is sufficient?

Submit

54. Which classes allow for a maximum of 254 hosts per network?

Submit

55. Which part of the Communications and Information Systems Installation Record (CSIR) depicts physical layout of communications and information systems and provide engineering data?

Submit

56. What network device provides a remote network with connectivity to a host network?

Submit

57. Which network provides Department of Defense (DOD) customers with centralized and protected access to the public Internet?

Submit

58. Which helmet class does not provide protection against contact with electrical conductors?

Submit

59. What is a Transmission Control Protocol (TCP) socket?

Submit

60. What system of the Global High Frequency (HF) Network provides rapid, reliable, non-dedicated communications support between the National Command Authority, Department of Defense, aircraft, and ships of the United States government during peacetime, contingency situations, and war?

Submit

61. What requirements mandate to develop of Air Force architectures?

Submit

62. How many impact classifications do hardhats have?

Submit

63. Which incidents occur when a higher classification level of data transfers to a lower classification level system via a messaging system?

Submit

64. Which of the following services provides additional communications capacity by using manned and unmanned systems to host communications packages for continuous communications coverage of large geographic areas?

Submit

65. Which part of the Communications and Information Systems Installation Record (CSIR) is normally retained in the production work center?

Submit

66. Which Air Force (AF) form records the destruction of Top Secret classified material?

Submit

67. What chapter in Air Force Instruction (AFI) 91–203, Air Force Consolidated Occupational Safety Instruction provides specific guidance on office safety?

Submit

68. Who has the authority a grant permission to ship classified materials on Friday - Sunday?

Submit

69. What network routing protocols allow multiple autonomous systems to connect together?

Submit

70. What information system (IS) threat is the greatest threat to an organization's mission critical information via its communications and ISs?

Submit

71. Which classified document markings identifies the highest level of classification?

Submit

72. Which network provides high-quality, secure telecommunications for command and control (C2) and crisis management?

Submit

73. Which system is a space-based high data rate communications link for the flow of information from the United States or rear echelon locations to deployed forces?

Submit

74. Which classified document marking appears on the face of each classified United States document and shall indicate the authority for the classification determination and the duration of the classification.

Submit

75. What layers make up the two categories of the seven layer of the Open Systems Interconnection (OSI) reference model.

Submit

76. What system mission is to provide reliable, rapid, two-way communications between air-, land-, and sea-based users?

Submit

77. What does the media access control (MAC) sublayer of the data link layer manage?

Submit

78. Which system of the Global Command and Control System-Air Force (GCCS-AF) monitors status of resources and training systems ensuring that decision makers have the most accurate snapshot of the resources available to the for mission completion?

Submit

79. What classification do flammable liquids receive?

Submit

80. Describe a network bridge.

Submit

81. What does the logical link control (LLC) sublayer of the data link layer manage?

Submit

82. Which system is a radar Tracker/Correlator software program hosted on a powerful server-based computer system that takes inputs from long range and short-range radars and displays it all on a scope?

Submit

83. What Air Force (AF) form is used to report a hazard?

Submit

84. What system is the priority component of the Department of Defense Information Network (DODIN) that directly supports the president, secretary of defense, and the Joint Chiefs of Staff in the exercise of their responsibilities?

Submit

85. How many T1 Defense Switched Network (DSN) access circuits do Standardized Tactical Entry Point (STEP) terminals offer?

Submit

86. Which system is the Department of Defense's (DOD) command and control (C2) system of record and full spectrum dominance enabler?

Submit

87. The risk management process includes how many steps?

Submit

88. Who should you seek out if you need information on transporting Top Secret information?

Submit

89. How many volumes make up the Department of Defense Architecture Framework (DODAF) specification?

Submit

90. What Air Force (AF) form is used to report ground mishaps?

Submit

91. In general, how many operating system task categories are there?

Submit

92. What system includes all owned and leased communications and computing systems and services, software, data, security services, and other associated services necessary to achieve information superiority?

Submit

93. Which publication implements the Mishap Prevention Program?

Submit

94. Which system is the primary network used to transmit the Emergency Action Messages (EAM) generated by the National Military Command Center (NMCC) to the warfighting commanders in the field?

Submit

95. What system provides a secure communications path for command and control information in support of the Air Force's strategic aircraft and missile functions?

Submit

96. How many air defenses sectors is the Battle Control System-Fixed (BSC-F) divided into?

Submit

97. What system is a telecommunications network that provides the exchange of information in an interoperable and global space, divided by security demands, transmission requirements and geographic needs of targeted end-user customers?

Submit

98. Which system is the Air Forces' primary intelligence, surveillance and reconnaissance (ISR) collection, processing, exploitation, analysis and dissemination system?

Submit

99. Computer security (COMPUSEC) vulnerabilities are broken down into how many categories?

Submit

100. Who recommends controls to mitigate health risks associated with identified health threats/hazards?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which network provides a private tunnel through the Internet?
What range of numbers are those of well know port numbers?
Which device optically reads an image, printed text, or an object and...
The Occupational Safety and Health Administration (OSHA) is a part of...
Which network is a group of computers and associated devices that...
Which wireless local area network (WLAN) security method is best...
Which type of encryption provides the greatest degree of protection...
What portion of the Internet Protocol (IP) Datagram (packet) allows IP...
Which network supports unclassified e-mail service to the user?
Which network is a network that links local area networks (LAN) and...
Which computer software is designed to collect personal information...
What action should you take first when you encounter a fire?
What characteristic is not an advantage of fiber optic cable?
What three parts make up Communications and Information Systems...
What action is the purpose of the Mishap Prevention Program?
How are fires classified?
Which event is not a valid reason to change the combination on a...
What network topology is another name for a bus topology?
What negative effect could occur when star networks are...
What hazard is the greatest in the typical office?
Which action is not a part of risk management (RM)?
What UNIX system software interacts most closely with the hardware?
What topology offers centralized management of a network?
The logical link control (LLC) sublayer is a part of which Open...
When used alone, the word "topology" often refers to a network's
Whose responsibility is to advise commanders, function managers,...
According to the Centers for Disease Control and Prevention (CDC)...
What year did the Institute of Electrical and Electronics Engineers...
What step is the fourth in the firefighting procedure?
What Microsoft application is a software program that allows users to...
What action is the main purpose of system cache?
What major program does the Global Combat Support System-Air Force...
What action must supervisors take before a work task not governed by a...
Which network uses Carrier Sense Multiple Access/Collision Avoidance...
Fuels that are normally classified as A or B will change to what...
Which computer system vulnerability is not one in a computer system?
Which office annually evaluates agency efforts to improve the quality...
What value is the maximum of an octet in Internet Protocol version 4...
Which device works as a transceiver that converts the electrical...
Which action is a physiological factor?
What method is considered the least preferred when controlling hazards...
Under normal conditions, how many milliamps of current could cause...
What Microsoft application is a personal information manager?
What speed is the maximum data transfer rate of USB 3.0 SuperSpeed...
What is a peripheral device?
Which governing body is the authority for information technology (IT)...
Which ladder practice is not prohibited?
What action is the purpose of a sliding window in Transmission Control...
What functions do the seven layers of the Open Systems Interconnection...
What three sub-categories make up human factors?
What characteristic is the major difference between Random Access...
What class is reserved for multicast addressing?
How would you determine if an intrusion detection system is required...
Which classes allow for a maximum of 254 hosts per network?
Which part of the Communications and Information Systems Installation...
What network device provides a remote network with connectivity to a...
Which network provides Department of Defense (DOD) customers with...
Which helmet class does not provide protection against contact with...
What is a Transmission Control Protocol (TCP) socket?
What system of the Global High Frequency (HF) Network provides rapid,...
What requirements mandate to develop of Air Force architectures?
How many impact classifications do hardhats have?
Which incidents occur when a higher classification level of data...
Which of the following services provides additional communications...
Which part of the Communications and Information Systems Installation...
Which Air Force (AF) form records the destruction of Top Secret...
What chapter in Air Force Instruction (AFI) 91–203, Air Force...
Who has the authority a grant permission to ship classified materials...
What network routing protocols allow multiple autonomous systems to...
What information system (IS) threat is the greatest threat to an...
Which classified document markings identifies the highest level of...
Which network provides high-quality, secure telecommunications for...
Which system is a space-based high data rate communications link for...
Which classified document marking appears on the face of each...
What layers make up the two categories of the seven layer of the Open...
What system mission is to provide reliable, rapid, two-way...
What does the media access control (MAC) sublayer of the data link...
Which system of the Global Command and Control System-Air Force...
What classification do flammable liquids receive?
Describe a network bridge.
What does the logical link control (LLC) sublayer of the data link...
Which system is a radar Tracker/Correlator software program hosted on...
What Air Force (AF) form is used to report a hazard?
What system is the priority component of the Department of Defense...
How many T1 Defense Switched Network (DSN) access circuits do...
Which system is the Department of Defense's (DOD) command and control...
The risk management process includes how many steps?
Who should you seek out if you need information on transporting Top...
How many volumes make up the Department of Defense Architecture...
What Air Force (AF) form is used to report ground mishaps?
In general, how many operating system task categories are there?
What system includes all owned and leased communications and computing...
Which publication implements the Mishap Prevention Program?
Which system is the primary network used to transmit the Emergency...
What system provides a secure communications path for command and...
How many air defenses sectors is the Battle Control System-Fixed...
What system is a telecommunications network that provides the exchange...
Which system is the Air Forces' primary intelligence, surveillance and...
Computer security (COMPUSEC) vulnerabilities are broken down into how...
Who recommends controls to mitigate health risks associated with...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!