Which UNIX command deletes files from within a directory?
Which type of lists uses pointers to connect each element together?
What is a form of firmware that contains the computer's startup...
Which type of interface is friendlier for the average user to use?
What type of service allows network administrators to install upgrades...
Which UNIX operating system component interacts directly with the...
How many users are in a multi-server high-speed backbone network?
What is the basic unit for storing and manipulating a collection of...
Which UNIX command changes the ownership of one or more files to a new...
Which is a term used to describe that data is whole or complete?
What is considered as nonvolatile permanent memory?
Which UNIX command allows you to move to different directories within...
Which UNIX command takes any characters from standard input and then...
What type of network environments consist of computer systems from...
What type of network is made up of components from the same vendor or...
What is a communications network that serves users within a confined...
How many users are normally in a peer-to-peer network?
How many users are in a multi-server network?
What operational simple network management protocol (SNMP) message is...
Which program can be used to automatically launch programs on a preset...
What component of windows unifies and simplifies day to day system...
What is the most common type of operation in sequential query language...
What network architecture has a network management platform on one...
What is the minimum number of scopes a dynamic host configuration...
According to Air Force Dynamic Host Configuration Protocol (DHCP)...
What type of communications network links different...
How many users are in a single-server network?
What is a measure used to verify the eligibility of a subject and the...
What type of communications network links a broad geographical region?
What documentation signifies that a system is not allowed to connect...
Which type of group manages user's rights assignments and access...
Which is the most commonly used sequential query language (SQL) data...
What is a file that is kept with you and will allow you to decrypt...
Sustained communications support becomes a part of the deployment if...
A feature of networking that enables individuals to designate...
Which UNIX ability can run on different types of hardware with few...
Which Unix mechanism enables programs to communicate with one another...
A set of data elements (Values) organized using a model of horizontal...
Which error checking took allows you to monitor the file system for...
Sitting at a computer and loading a software patch onto it is an...
Which components of domain name service (DNS) contain a database of...
Which UNIX capability can execute numerous programs at the same time?
Which UNIX component provides a logical way to organize, store,...
Which UNIX vi character represents the end of the file?
What is the minimum number of computers needed for a computer network?
What is used to identify network nodes on a physically connected...
How many octets is the standard internet protocol broken down into?
What is the network id of internet protocol (IP) address...
What is considered as a technique or method of checking data...
Which selection is a set of markup symbols or codes inserted in a file...
An information system on your network that is not set to require the...
What Air Force instruction provides policy, direction, and structure...
What network management area is concerned with controlling access...
Knowledge-based identification and authentication methods require the...
What defines the rules by which operations can be performed on a...
What level of network management activity are you working at when the...
What is the process of physically damaging the media to render it...
What is the process of erasing magnetic media by reducing the magnetic...
What do you call a current and perceived capability, intention, or...
What is a cryptographic key and certificate delivery system that makes...
When a new folder or file is created on a new technology file system...
Normally, when you create a file with a text editor, the file is set...
Which UNIX command looks at an individual file and finds a specified...
Which UNIX command sets access and modification times for each file to...
Which UNIX default command starts the X windows system?
Which UNIX command from the menu bar moves a window to the bottom of...
What is considered to be a computer's main storage?
What permission always overrides all other permissions assigned to a...
Which UNIX shell is the most compact and is often used for writing...
The/dev/dsk and /dev/rdsk directories are sub directories of which...
What does the 0 following the c in the device name c0t6d0s7 represent?
Hard links are created using which UNIX command?
Which UNIX command displays the current working directory?
What provides information concerning the bandwidth utilization and the...
A base web-server that interfaces with the public must be placed in...
What is a group of users, servers, and other resources that share a...
Which of the following is not one of the elements that most graphical...
Which type of patch would utilize a remote installation services...
What is defined as a bundle of applications software designed to...
What are the three primary ways to authenticate one-self?
Which controller component interprets an electronic signal,...
What type of sequential query language (SQL) statement would you use...
Which sequential query language (SQL) server feature tracks changes...
What do you type to quit a UNIX shell?
UNIX disks are divided into logical sections called?
Which UNIX command changes the group ownership of one or more files?
How many primary groups can a user be a member of?
What is a privately-owned network whose access is restricted to...
Which of the following are the three most common network management...
What is a formal declaration approving official (DAA) that an...
Which software program manages an IP address allocation for a network?
Which special identity can represent users currently logged on to a...
While using UNIX vi to edit a file, what would you enter to save the...
What is the most common UNIX windows system?
The key to shutting down an xterm window is to know which of your...
What network architecture uses multiple systems for network...
What level of network management activity are you working for at when...
The Air Force requires a network password to be at least how many...
What documentation is required to permanently connect to the global...
What do you call the consolidated list of requirements that a program...
What is a collection of computing environments connected by one or...
What best describes programming machine code?
Which numbering system characteristic is the leftmost non-zero digit...
What kind of server contains the master listing of all active...
The group of IP Addresses that a dynamic host configuration protocol...
Which exchange service is the first service launched when Microsoft...
In Exchange System Manager, which container holds configuration...
To change permissions on a shell script, you use the UNIX command
The simplest place to put your function definitions is in your
Which UNIX mechanism provides for communication with system device...
What component of the systems management report tracking system...
Which standard form is used to annotate storage media has been...
What is the preferred method of sanitizing magnetic media?
Which is a very simple example of an error detecting code?
Which is not a characteristic of high-order languages?
Which type of backup will backup all files that have been altered in...
Which is not a component of Internet Information Services (IIS)?
How many characters do most UNIX system administrators and users tend...
What does the 7 in the device name c0t6d0s7 represent?
Which UNIX vi mode allows users to execute set commands?
Which UNIX command does the system administrator need to use to create...
What type of communications network links geographically dispersed...
What is the host id of internet protocol (IP) address...
What operational simple network network management protocol (SNMP)...
What is the database of record for registering all systems and...
What are examples of network attacks that bypass the firewall?
What type of firewall consists of a screening router and a set of...
A program that replicates by attaching itself to a program is a?
What type of malicious logic can form large networks that can be used...
What type of malicious logic can become active on an information...
What is an electronic document that officially links together a...
Which storage device can be easily connected to a network and appears...
Which storage device has the means of providing data storage...
What should each organization have that spells out which systems are...
What is hierarchical structured format that defines the network...
Which protocol is commonly used for managing the security of a message...
What is based around a central directory database containing...
What action puts unneeded windows out of the way without quitting the...
The first step in quitting an xterm session is to
What is the binary equivalent to the dotted decimal number 96?
How many bits are typically covered in an internet protocol version 6...
What operational simple network management protocol (SNMP) message...
What is the type of probe that collects inter-device connectivity...
What reports errors that occur at the physical layer such as bad frame...
What automatically runs in the background when the protocol analyzer...
What regulation covers remanence security?
What is a comprehensive evaluation and validation of an Air Force...
What is the intrusion practice of encapsulating a message that would...
What is the simplest and least expensive way to stop inappropriate...
What color on the systems management automated report tracking system...
What is the connection type of choice for Storage area networks (SAN)?
A standard Web application used to pass a Web user's request to a...
What is defined as an asynchronous signal from a computer hardware...
Which technology is often used in redundant array of independent disks...
What series of Air Force instruction series covers communications and...
What is the established to distinguish between errors that fall within...
What device is placed outside the boundary protection mechanism to...
Which component of the public key infrastructure (PKI) is responsible...
The two ways keys establishment can occur are key?
Who provides uninterrupted flow of mission critical information to...
Which original components were very susceptible to damage from...
Network management protocols are designed (in most cases) to reside...
What operational simple network protocol (SNMP) message is used to...
What are the three types of systems management automated report...
What device provides a capability for digital network diagnostics and...
What provides information concerning the network utilization and frame...
Which team provides a communication link between forces securing the...
Which function of performance management tracks historical data by...
What area of the simple network management protocol (SNMP) tree...
What simple network management protocol (SNMP) node is responsible for...
What is the centerpiece of a systems management automated report...
What network device performs rigorous examinations of systems to...
Who can declassify storage media that has been sanitized?
What is an advantage of using a storage area network (SAN)...
Which Web application is most likely to succeed Hypertext Markup...
Where does a copy of the active directory database reside?
What is a set of rules that can be set to affect active directory leaf...
Storage media the retains data after power is removed is considered?
What is the Department of Defense process for certifying and...
How many non-secure internet protocol router network (NIPRNet)...
Which public key algorithm is exclusively a key establishment...
What type of firewall is used to separate secure sites, networks, or...
What is the primary unclassified public key infrastructure (PKI) token...
Performance management can be broke into what two separate functional...
What process, along with AFI 33-210, Air Force Certification and...
What is a way of utilizing a group of storage devices as if they were...
Which type of backup would you use at the end of the week to save all...
The act of choosing the window you type is called setting the?
How many different categories of information does the performance...
Which agency must approve all information protection tools prior to...
What can be used to encrypt a message so that it can only be decrypted...
Which interrupt request (IRQ) line number is normally used for the...
What network entity provides reliable, secure networks and network...
In UNIX, which package of programs lets a terminal handle many...
The hard drives in a redundant array of independent disks (RAID) array...
According to the Air Force network structure, what tier is the Air...
What program is known as a state of the art ground-to-ground...
What type of firewall generates audit trails of all network-related...
What action represents one of the greatest vulnerabilities to internal...
Which query is made by one name server to another name server?