The is the URE's from vol 2, edit code 02 which became active after 4 April 2013
0–1023.
1024–23535.
23536–49151.
49152–65535.
Rate this question:
Monitor ports.
Keep ports open.
Keep ports closed.
Ensure all ports are used.
Rate this question:
Lists of permissions stating who can access what.
Groups of computer names.
List of network resources.
Groups of users.
Rate this question:
Data networks only.
Voice networks only.
Both voice and data networks.
Neither voice nor data networks.
Rate this question:
Can analyze any encrypted data if it is decrypted before reaching the target host
Consumes resources on the host it resides on and slows that device down.
Monitors log files for inadvisable settings or passwords.
Monitors traffic on the host on which it is installed.
Rate this question:
A mindset.
Configuring firewalls
Activation of host-based intrusion detection system (HIDS).
Activation of network-based intrusion detection system (NIDS).
Rate this question:
Zoning
Caching
Proxy service.
Firewall service
Rate this question:
Network assurance.
Network protection.
Boundary protection.
Information assurance.
Rate this question:
One.
Two.
Three.
Four.
Rate this question:
File transfer protocol (FTP).
Domain name service (DNS).
Hypertext transfer protocol (HTTP).
Open system interconnection (OSI).
Rate this question:
Firewalls.
Security tools.
Defense-in-depth.
Information condition (INFOCON).
Rate this question:
Toll fraud.
War dialing.
Masquerades.
Denial of service (DoS).
Rate this question:
Reporting incidents to security administrators.
Reconfiguring equipment after an incident.
Identifying possible incidents.
Attempting to stop incidents.
Rate this question:
TCP message attack.
Inbound traceroute attack.
Local area network attack.
TCP Synchronous (SYN) attack.
Rate this question:
Entrance point.
Service point.
Protocol.
Port.
Rate this question:
7
20
23
53
Rate this question:
SECURE.
PUBLIC.
PRIVATE.
UNSECURE.
Rate this question:
Internet protocol (IP) address.
Access control list (ACL) entries.
Router ACL configuration settings.
Media access control (MAC) address.
Rate this question:
Administrative manager.
Performance manager
Directory manager
System console.
Rate this question:
Currency.
Freshness.
Timeliness.
Authenticity
Rate this question:
Active only.
Passive only.
Passive and active.
Neither passive nor active.
Rate this question:
Switches.
Firewalls.
Routers.
Servers.
Rate this question:
Deploy one IDS for the entire network.
Deploy IDS on 50 percent of the network segments.
Consider using only a network-based IDS or host-based IDS.
Use a centralized management console for system management.
Rate this question:
Can decrypt data
Uses very few network resources
Monitors logs for policy violations.
Can analyze encrypted network traffic.
Rate this question:
Sweep scan.
Vanilla scan.
Fragment packet scan.
File transfer protocol (FTP) bounce scan.
Rate this question:
Ping host.
Domain name server lookup.
Address resolution protocol (ARP).
Transmission control protocol dump.
Rate this question:
One
Two
Three
Four
Rate this question:
Traceroute.
Time exceeded.
Parameter problem.
Destination unreachable.
Rate this question:
Ping.
Traceroute.
Echo reply.
Domain name server (DNS) lookup.
Rate this question:
Immediately analyzes information.
Stores packets for later viewing and analysis.
Immediately sends the information to the firewall.
Stores packets until a filter is ready to receive the information.
Rate this question:
Fragment packets.
Synchronous (SYN) scan.
User datagram protocol (UDP) scan.
Transmission control protocol (TCP) scan.
Rate this question:
Keep devices requiring SNMP together with those that do not pass through virtual local area networks (VLAN).
Use access control lists on SNMP agents to accept SNMP messages from all SNMP managers.
Disable all SNMP devices/services if not required.
Enable the set community strings if possible.
Rate this question:
ESM agent.
ESM manager.
ESM administrator.
ESM graphical user interface (GUI) console.
Rate this question:
4
5
6
7
Rate this question:
Network stack.
Security policy.
Set of one or more interfaces.
Particular installation of a firewall.
Rate this question:
No traffic.
All traffic.
Inbound traffic
Outbound traffic.
Rate this question:
Rear line defense
Frontline defense.
Second line defense
Front and rear line defense
Rate this question:
President’s National Security Telecommunications Advisory Committee.
Air Force Information Warfare Battle Lab.
Air Force Network Integration Center (AFNIC).
Cryptographic Systems Group.
Rate this question:
Firewall.
Proxy server.
Intrusion detection system (IDS) software.
Automated security incident measurement (ASIM).
Rate this question:
21
22
53
54
Rate this question:
Public Switched Telephone Network (PSTN) system.
Enterprise Telephony Management (ETM) system.
Voice over Internet protocol (VoIP) system.
Time Division Multiplexing (TDM) system.
Rate this question:
Network-level.
Application-level.
Corporate/enterprise.
Personal/small office home office (SOHO).
Rate this question:
Getroute.
Ping host.
Traceroute.
Address resolution protocol.
Rate this question:
High cost.
High security risks.
Difficult to administer.
Cannot be configured on AF networks.
Rate this question:
External domain name server (DNS).
Mail relay server.
Internal DNS.
Proxy server.
Rate this question:
Local server
Non-Internet server.
Internal sendmail server.
External sendmail server
Rate this question:
Enabling access control lists (ACL) on firewalls, routers, and switches.
Deploying protection from dynamic host configuration protocol (DHCP) spoofing.
Consolidating your voice with your data using virtual local area networks (VLAN).
Enabling port security access to only allow the required devices needed by the client.
Rate this question:
Admin.
Adminro.
Adminda.
No admin privileges.
Rate this question:
Quiz Review Timeline (Updated): Mar 15, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
5 Level CDC Test (2A654)_Vol 1_EDC 05
This quiz is designed for Air Force personnel, focusing on the Career Development Courses (CDCs), addressing AFSC roles, STS requirements, and safety programs.
Questions:
50 |
Attempts:
127 |
Last updated:
Oct 06, 2023
|
3F351 CDC URE 3 Practice Questions! Trivia
This trivia quiz, titled '3F351 CDC URE 3 Practice Questions', assesses knowledge on work measurement methods such as time study and work sampling. It focuses on evaluating...
Questions:
48 |
Attempts:
195 |
Last updated:
Nov 16, 2023
|
CDC 2R051 Unit Review Exercises
This CDC 2R051 Unit Review Exercises quiz assesses knowledge crucial for air and space maintenance readiness, focusing on maintenance levels, mission capability, and unscheduled...
Questions:
378 |
Attempts:
148 |
Last updated:
May 29, 2024
|
Security Forces CDC Volume 1
This quiz assesses knowledge on the historical and operational aspects of Security Forces within the Air Force, focusing on milestones like the establishment of training camps,...
Questions:
100 |
Attempts:
1819 |
Last updated:
Mar 21, 2023
|
New CDC Quiz Vol. 2 (3S051) Edit Code 03
New CDC Quiz Vol. 2 (3S051) Edit Code 03 assesses knowledge on military personnel management topics such as special duty assignments, humanitarian requests, and out-processing...
Questions:
100 |
Attempts:
69 |
Last updated:
Jul 28, 2023
|
7 Level CDC 2T2 Vol 1
This quiz, titled '7 Level CDC 2T2 Vol 1', assesses competencies in managing air traffic and operational duties. It includes scenario-based questions on equipment troubleshooting,...
Questions:
51 |
Attempts:
3160 |
Last updated:
Mar 21, 2023
|
Wait!
Here's an interesting quiz for you.