3d052 Vol 1: The Ultimate Cyber Systems Operation Quiz

100 Questions | Attempts: 662
Share
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Knowledge-based identification and authentication methods require the user to providesomething you
Submit
Please wait...
About This Quiz
Air Force Quizzes & Trivia

In the Air force, the enlisted officers, airmen, and health care professionals enjoy great opportunities. Do you want to enter into the Air force? If yes, hows your knowledge about cyber systems operations? Check out our online quiz to test your knowledge and learn more.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. What is the primary unclassified public key infrastructure (PKI) token for individual PKIkeys and certificates in the Air Force?
Submit
3. What are three primary ways to authenticate one-self?
Submit
4. What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?
Submit
5. What is the preferred method of sanitizing magnetic media?
Submit
6. What is the minimum number of computers needed for a computer network?
Submit
7. What type of network is made up of components from the same vendor or compatibleequipment that all run under the same operating system or network operating system?
Submit
8. What type of communications network links different interconnected networks over anunlimited geographical region?
Submit
9. What color on the systems management automated report tracking system (SMARTS)alarm log indicates one or more events?
Submit
10. A base web-server that interfaces with the public must be placed in what area of a basenetwork?
Submit
11. What network management area is concerned with controlling access points to information?
Submit
12. Which component of the public key infrastructure (PKI) is responsible for establishing,authenticating, maintaining, and revoking certificates?
Submit
13. Sustained communications support becomes a part of the deployment if it exceeds
Submit
14. What network device performs rigorous examinations of systems to identify weaknessesthat might allow security violations?
Submit
15. What is used to identify network nodes on a physically connected network?
Submit
16. What is the process of erasing magnetic media by reducing the magnetic flux to virtual zeroby applying a reverse magnetizing field?
Submit
17. What is a communications network that serves users within a confined geographical area?
Submit
18. An information system on your network that is not set to require the use of a commonaccess card (CAC) or password would be considered a
Submit
19. What network architecture has a network management platform on one computer system ata location that is responsible for all network management duties?
Submit
20. What is a collection of computing environments connected by one or more internalnetworks under the control of a single approval authority and security policy?
Submit
21. What is the process of physically damaging the media to render it unusable in a computerand render the data on the media irretrievable by any known exploitation methods?
Submit
22. Which standard form is used to annotate storage media has been sanitized?
Submit
23. How many users are normally in a peer-to-peer network?
Submit
24. How many users are in a multi-server high-speed backbone network?
Submit
25. What series of Air Force instruction series covers communications and information?
Submit
26. What documentation is required to permanently connect to the global information grid(GIG) system?
Submit
27. Which public key algorithm is exclusively a key establishment protocol?
Submit
28. The Air Force requires a network password to be at least how many characters long?
Submit
29. What is a cryptographic key and certificate delivery system that makes possible secureelectronic transactions and exchanges of sensitive information between relative strangers?
Submit
30. According to the Air Force network structure, what tier is the Air Force network operationscenter (AFNOSC)?
Submit
31. What documentation signifies that a system is not allowed to connect to the globalinformation grid (GIG)?
Submit
32. What do you call a current and perceived capability, intention, or attack, directed to causedenial of service?
Submit
33. What operational simple network management protocol (SNMP) message is an unsolicitedmessage from an agent to the manager?
Submit
34. What is the intrusion practice of encapsulating a message that would be rejected by thefirewall inside a second message that will pass through the firewall?
Submit
35. What is a measure used to verify the eligibility of a subject and the ability of the subject toaccess certain information?
Submit
36. What is a privately-owned network whose access is restricted to authorized personnel iscalled?
Submit
37. What operational simple network management protocol (SNMP) message is used to modifythe value of one or more instances of management information?
Submit
38. What is the binary equivalent to the dotted decimal number 96?
Submit
39. Which agency must approve all information protection tools prior to their use?
Submit
40. What are examples of network attacks that bypass the firewall?
Submit
41. Who provides uninterrupted flow of mission critical information to field and in-garrisonunits for the duration of a contingency?
Submit
42. What type of communications network links geographically dispersed offices in other citiesor around the globe?
Submit
43. What is an electronic document that officially links together a user's identity with his publickey?
Submit
44. What type of firewall consists of a screening router and a set of rules that accept or reject amessage based on information in the message's header (a packet): the source address, thedestination address, and the port?
Submit
45. What are the three types of systems management automated report tracking system(SMARTS) notifications?
Submit
46. What is the network id of internet protocol (IP) address 131.10.230.120/24?
Submit
47. Which function of performance management tracks historical data by tracking activities onthe network?
Submit
48. What type of communications network links a broad geographical region?
Submit
49. How many users are in a multi-server network?
Submit
50. What type of malicious logic can form large networks that can be used to launch a varietyof attacks without an information system owner's knowledge?
Submit
51. What operational simple network management protocol (SNMP) message asks for aspecific instance of management information?
Submit
52. What component of the systems management automated report tracking system (SMARTS)application contains knowledge of available domain managers?
Submit
53. The two ways key establishment can occur are key
Submit
54. How many octets is the standard internet protocol broken down into?
Submit
55. Which team provides a communication link between forces securing the area and setting up support facilities?
Submit
56. What program is known as a state of the art ground-to-ground communicationsinfrastructure designed to provide base level full spectrum communications to the commander and all agencies on base?
Submit
57. What Air Force instruction provides policy, direction, and structure for the Air Force globalinformation grid (AF-GIG)?
Submit
58. What network entity provides reliable, secure networks and network services for base levelcustomers?
Submit
59. Who can declassify storage media that has been sanitized?
Submit
60. Network management protocols are designed (in most cases) to reside above what layer ofthe operational system interface (OSI) model?
Submit
61. A program that replicates by attaching itself to a program is a
Submit
62. What device is placed outside the boundary protection mechanism to monitor all attemptedattacks?
Submit
63. What is the type of probe that collects inter-device connectivity information usingproprietary topology management information bases (MIB)?
Submit
64. How many users are in a single-server network?
Submit
65. Storage media that retains data after power is removed is considered
Submit
66. What simple network management protocol (SNMP) node is responsible for monitoring,collecting and reporting management data to the management system?
Submit
67. What operational simple network management protocol (SNMP) message is used to retrievemultiple pieces of information with minimal overhead?
Submit
68. What provides information concerning the bandwidth utilization and the number ofconnections that are related to specific nodes?
Submit
69. What is the database of record for registering all systems and applications?
Submit
70. What is the simplest and least expensive way to stop inappropriate network addresses?
Submit
71. What is the host id of internet protocol (IP) address 131.10.230.120/24?
Submit
72. What do you call the consolidated list of requirements that a program office must adhere towhen fielding a system?
Submit
73. Which of the following are the three most common network management architectures?
Submit
74. What area of the simple network management protocol (SNMP) tree structure is reservedfor vendors related label and leaf objects associated with specific manufactured equipment?
Submit
75. How many different categories of information does the performance monitor provide youabout your network?
Submit
76. How many non-secure internet protocol router network (NIPRNet) gateways does the AirForce possess?
Submit
77. What is the established to distinguish between errors that fall within a normal range andexcessive errors because of a fault?
Submit
78. Performance management can be broke into what two separate functional categories?
Submit
79. What provides information concerning the network utilization and frame errors that arerelated to a specific protocol?
Submit
80. What type of firewall is used to separate secure sites, networks, or network segments fromless secure areas?
Submit
81. What is a file that is kept with you and will allow you to decrypt files encrypted specificallyfor you using your openly available encryption code?
Submit
82. What network architecture uses multiple systems for network management, with one systemacting as a central server and the others working as clients?
Submit
83. What regulation covers remanence security?
Submit
84. What is a hierarchical structured format that defines the network management informationavailable from network devices?
Submit
85. What reports errors that occur at the physical layer such as bad frame check sequence(FCS), short frames, and jabbers?
Submit
86. What is a formal declaration by a designated approving official (DAA) that an informationsystem is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk?
Submit
87. What automatically runs in the background when the protocol analyzer application isactivated?
Submit
88. What can be used to encrypt a message so that it can only be decrypted by the recipient?
Submit
89. What is the centerpiece of a systems management automated report tracking system(SMARTS) application?
Submit
90. What is defined as a bundle of application software designed to significantly improvenetwork efficiency and productivity?
Submit
91. What level of network management activity are you working at when the automatedmonitoring of components provides problem analysis, giving a root cause alarm for the problem at-hand?
Submit
92. What is the Department of Defense process for certifying and accrediting informationsystems to operate on the global information grid (GIG)?
Submit
93. What level of network management activity are you working at when you as the networkmanager are monitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?
Submit
94. What process, along with AFI 33–210, Air Force Certification and Accreditation (C&A)Program (AFCAP), provides the basic framework of the certification & accreditation (C&A)?
Submit
95. What type of firewall generates audit trails of all network-related activity for monitoringand intrusion detection purposes?
Submit
96. How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask?
Submit
97. What action represents one of the greatest vulnerabilities to internal networks?
Submit
98. What device provides a capability for digital network diagnostics and developingcommunications software?
Submit
99. What is a comprehensive evaluation and validation of an Air Force information system (IS)to establish the degree to which it complies with assigned information assurance (IA) controls based on standardized procedures?
Submit
100. What type of malicious logic can become active on an information system without the needto infect a file?
Submit
View My Results

Quiz Review Timeline (Updated): Jun 3, 2021 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 03, 2021
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 07, 2016
    Quiz Created by
    Dinstaar2a6x2
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Knowledge-based identification and authentication methods require the...
What is the primary unclassified public key infrastructure (PKI) token...
What are three primary ways to authenticate one-self?
What type of network environments consist of computer systems from...
What is the preferred method of sanitizing magnetic media?
What is the minimum number of computers needed for a computer network?
What type of network is made up of components from the same vendor or...
What type of communications network links different interconnected...
What color on the systems management automated report tracking system...
A base web-server that interfaces with the public must be placed in...
What network management area is concerned with controlling access...
Which component of the public key infrastructure (PKI) is responsible...
Sustained communications support becomes a part of the deployment if...
What network device performs rigorous examinations of systems to...
What is used to identify network nodes on a physically connected...
What is the process of erasing magnetic media by reducing the magnetic...
What is a communications network that serves users within a confined...
An information system on your network that is not set to require the...
What network architecture has a network management platform on one...
What is a collection of computing environments connected by one or...
What is the process of physically damaging the media to render it...
Which standard form is used to annotate storage media has been...
How many users are normally in a peer-to-peer network?
How many users are in a multi-server high-speed backbone network?
What series of Air Force instruction series covers communications and...
What documentation is required to permanently connect to the global...
Which public key algorithm is exclusively a key establishment...
The Air Force requires a network password to be at least how many...
What is a cryptographic key and certificate delivery system that makes...
According to the Air Force network structure, what tier is the Air...
What documentation signifies that a system is not allowed to connect...
What do you call a current and perceived capability, intention, or...
What operational simple network management protocol (SNMP) message is...
What is the intrusion practice of encapsulating a message that would...
What is a measure used to verify the eligibility of a subject and the...
What is a privately-owned network whose access is restricted to...
What operational simple network management protocol (SNMP) message is...
What is the binary equivalent to the dotted decimal number 96?
Which agency must approve all information protection tools prior to...
What are examples of network attacks that bypass the firewall?
Who provides uninterrupted flow of mission critical information to...
What type of communications network links geographically dispersed...
What is an electronic document that officially links together a user's...
What type of firewall consists of a screening router and a set of...
What are the three types of systems management automated report...
What is the network id of internet protocol (IP) address...
Which function of performance management tracks historical data by...
What type of communications network links a broad geographical region?
How many users are in a multi-server network?
What type of malicious logic can form large networks that can be used...
What operational simple network management protocol (SNMP) message...
What component of the systems management automated report tracking...
The two ways key establishment can occur are key
How many octets is the standard internet protocol broken down into?
Which team provides a communication link between forces securing the...
What program is known as a state of the art ground-to-ground...
What Air Force instruction provides policy, direction, and structure...
What network entity provides reliable, secure networks and network...
Who can declassify storage media that has been sanitized?
Network management protocols are designed (in most cases) to reside...
A program that replicates by attaching itself to a program is a
What device is placed outside the boundary protection mechanism to...
What is the type of probe that collects inter-device connectivity...
How many users are in a single-server network?
Storage media that retains data after power is removed is considered
What simple network management protocol (SNMP) node is responsible for...
What operational simple network management protocol (SNMP) message is...
What provides information concerning the bandwidth utilization and the...
What is the database of record for registering all systems and...
What is the simplest and least expensive way to stop inappropriate...
What is the host id of internet protocol (IP) address...
What do you call the consolidated list of requirements that a program...
Which of the following are the three most common network management...
What area of the simple network management protocol (SNMP) tree...
How many different categories of information does the performance...
How many non-secure internet protocol router network (NIPRNet)...
What is the established to distinguish between errors that fall within...
Performance management can be broke into what two separate functional...
What provides information concerning the network utilization and frame...
What type of firewall is used to separate secure sites, networks, or...
What is a file that is kept with you and will allow you to decrypt...
What network architecture uses multiple systems for network...
What regulation covers remanence security?
What is a hierarchical structured format that defines the network...
What reports errors that occur at the physical layer such as bad frame...
What is a formal declaration by a designated approving official (DAA)...
What automatically runs in the background when the protocol analyzer...
What can be used to encrypt a message so that it can only be decrypted...
What is the centerpiece of a systems management automated report...
What is defined as a bundle of application software designed to...
What level of network management activity are you working at when the...
What is the Department of Defense process for certifying and...
What level of network management activity are you working at when you...
What process, along with AFI 33–210, Air Force Certification and...
What type of firewall generates audit trails of all network-related...
How many bits are typically covered in an internet protocol version 6...
What action represents one of the greatest vulnerabilities to internal...
What device provides a capability for digital network diagnostics and...
What is a comprehensive evaluation and validation of an Air Force...
What type of malicious logic can become active on an information...
Alert!

Advertisement