Management Information System

80 Questions | Total Attempts: 69

SettingsSettingsSettings
Please wait...
MIS Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Which 3D Career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
    • A. 

      Radio Frequency Transmissions Systems (3D1X3)

    • B. 

      Cyber Transport Systems (3D1X2)

    • C. 

      Spectrum Operations (3D1X4)

    • D. 

      Client Systems (3D1X1)

  • 2. 
    Which of the following is not a communications security program duty and responsibility for Cyber Transport Systems?  
    • A. 

      Transmission security.

    • B. 

      Technical security.

    • C. 

      Emission security.

    • D. 

      Physical security.

  • 3. 
    What is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field? 
    • A. 

      Core duty.

    • B. 

      Core value.

    • C. 

      Core competency.

    • D. 

      Core responsibility.

  • 4. 
    Which of the following is a core competency of Cyber Transport Systems?
    • A. 

      Fixed cable systems.

    • B. 

      Voice network systems.

    • C. 

      Application software systems.

    • D. 

      Client-server database systems.

  • 5. 
    Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?
    • A. 

      1118.

    • B. 

      457.

    • C. 

      55.

    • D. 

      3.

  • 6. 
    Which hazard is not one of the four major types of hazards?
    • A. 

      Biological.

    • B. 

      Chemical.

    • C. 

      Physical.

    • D. 

      Nuclear.

  • 7. 
    Which hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?
    • A. 

      Biological.

    • B. 

      Chemical.

    • C. 

      Physical.

    • D. 

      Stress.

  • 8. 
    To prevent manual handling hazards, utilize team lifting when lifting items that weigh more than how many pounds?
    • A. 

      25.

    • B. 

      50

    • C. 

      75.

    • D. 

      100.

  • 9. 
    When working on electrical circuits, the role of safety observer is normally performed by the
    • A. 

      Trainer.

    • B. 

      Certifier.

    • C. 

      Technician.

    • D. 

      Supervisor.

  • 10. 
    When working on electrical circuits, you may only wear metal framed eyeglasses if
    • A. 

      The circuit is energized.

    • B. 

      You have a valid prescription.

    • C. 

      They are certified for high voltage.

    • D. 

      They are secured with a nonmetallic cord.

  • 11. 
    To whom does the risk management (RM) process apply? 
    • A. 

      All personnel.

    • B. 

      Only safety personnel.

    • C. 

      Only civilian personnel.

    • D. 

      Only medical personnel.

  • 12. 
    What simple, systematic process allows commanders to maximize combat capability, while limiting risk?
    • A. 

      Risk control.

    • B. 

      Safety control.

    • C. 

      Risk management.

    • D. 

      Safety management.

  • 13. 
    Which of the following is a principle of risk management (RM)? 
    • A. 

      Accept unnecessary risk.

    • B. 

      Apply the RM process continuously.

    • C. 

      Train and adhere to safety guidelines.

    • D. 

      Make risk decisions at the lowest level.

  • 14. 
    How many steps are in the risk management (RM) process?
    • A. 

      Four.

    • B. 

      Five.

    • C. 

      Six.

    • D. 

      Seven.

  • 15. 
    An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having what category of vulnerability?
    • A. 

      I.

    • B. 

      II.

    • C. 

      III.

    • D. 

      IV.

  • 16. 
    How many Integrated Network and Operation Security Centers (INOSC) does the Air Force have? 
    • A. 

      One.

    • B. 

      Two.

    • C. 

      Three.

    • D. 

      Four.

  • 17. 
    The Integrated Network Operations and Security Centers (INOSC) has several responsibilities except
    • A. 

      Maintain sole administrative privileges on the firewall.

    • B. 

      Standardize, configure, back up, and otherwise maintain the firewall

    • C. 

      Maintain a single naming/configuration standard for boundary devices.

    • D. 

      Install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).

  • 18. 
    Which term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP)?
    • A. 

      IP telephony

    • B. 

      Network telephony

    • C. 

      Voice protection system

    • D. 

      Voice over Internet Protocol (VoIP

  • 19. 
    You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except
    • A. 

      Enabling access control lists (ACL) on firewalls, routers, and switches

    • B. 

      Deploying protection from dynamic host configuration protocol (DHCP) spoofing.

    • C. 

      Consolidating your voice with your data using virtual local area networks (VLAN).

    • D. 

      Enabling port security access to only allow the required devices needed by the client.

  • 20. 
     At which open systems interconnect (OSI) layer does a packet filter gateway operate at?
    • A. 

      2.

    • B. 

      3.

    • C. 

      4.

    • D. 

      5.

  • 21. 
    At which open systems interconnect (OSI) layer does a circuit layer gateway operate?
    • A. 

      3.

    • B. 

      4.

    • C. 

      5.

    • D. 

      6.

  • 22. 
    At which open systems interconnect (OSI) layer does an application-level firewall operate?
    • A. 

      4.

    • B. 

      5.

    • C. 

      6.

    • D. 

      7.

  • 23. 
    The disadvantage of a host-based intrusion detection system (HIDS) is that it 
    • A. 

      Can analyze any encrypted data if it is decrypted before reaching the target host.

    • B. 

      Consumes resources on the host it resides on and slows that device down

    • C. 

      Monitors log files for inadvisable settings or passwords

    • D. 

      Monitors traffic on the host on which it is installed.

  • 24. 
    One advantage of a network-based intrusion detection system (NIDS) is that it
    • A. 

      Can decrypt data.

    • B. 

      Uses very few network resources.

    • C. 

      Monitors logs for policy violations.

    • D. 

      Can analyze encrypted network traffic.

  • 25. 
    Which intrusion detection system (IDS) uses software sensors? 
    • A. 

      Active.

    • B. 

      Passive.

    • C. 

      Host-based.

    • D. 

      Network-based.