3DX5X Vol 2 Supervisors Comprehensive Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By RScott1206
R
RScott1206
Community Contributor
Quizzes Created: 1 | Total Attempts: 178
| Attempts: 178 | Questions: 124
Please wait...
Question 1 / 124
0 %
0/100
Score 0/100
1. (202) What topology defines the layout of a network's devices and media?

Explanation

The correct answer is "Physical." Physical topology refers to the physical arrangement of devices and media in a network. It defines how the devices are connected to each other and how they are physically laid out. This includes the placement of devices such as computers, routers, switches, and cables. It does not involve any logical or conceptual aspects of the network, but rather focuses on the actual physical connections and locations of the devices.

Submit
Please wait...
About This Quiz
OSI Model Quizzes & Trivia

This comprehensive exam tests knowledge on the OSI model, focusing on layers, their functions, and associated hardware like routers and switches. It prepares individuals in understanding network protocols and data handling.

Personalize your quiz and earn a certificate with your name on it!
2. (202) What topology combines two or more different physical topologies in a single network?

Explanation

A hybrid topology combines two or more different physical topologies in a single network. This means that it can have a combination of bus, ring, star, or other types of topologies. This allows for greater flexibility and scalability in the network design, as different sections of the network can be configured with different topologies based on their specific requirements.

Submit
3. (207) The ability to move about without being tethered by wires technology is called

Explanation

The correct answer is mobility. Mobility refers to the ability to move about freely without being restricted by wires or cables. This term is commonly used in technology to describe wireless devices or systems that allow for easy movement and portability. In this context, mobility is the most appropriate term to describe the ability to move about without being tethered by wires. Ease of installations, war driving, and motion capture technology are not relevant to the given question.

Submit
4. (207) Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?

Explanation

An employee is an authorized client who may unknowingly or maliciously help outside parties gain access to a network. As an authorized user with access privileges, an employee can either unintentionally compromise the network by falling victim to social engineering or phishing attacks, or intentionally exploit their privileges for personal gain or to assist external hackers. Employees are considered a potential insider threat as they have insider knowledge and access to sensitive information, making them a significant risk to the security of a network.

Submit
5. (207) What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?

Explanation

The Institute of Electrical Electronics Engineers (IEEE) is the correct answer because it is an organization that has developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks. The IEEE is renowned for its work in the field of electrical engineering and is responsible for creating standards such as IEEE 802.11 (Wi-Fi) and IEEE 802.15 (Bluetooth). These standards ensure that wireless devices can communicate with each other effectively and securely.

Submit
6. (212) What do routing algorithms initialize and maintain to aid the process of path determination?

Explanation

Routing algorithms initialize and maintain routing tables to aid the process of path determination. Routing tables contain information about the network topology, such as the available routes and the associated metrics (such as cost or distance) for each route. These tables are used by the routing algorithm to make decisions on the best path for forwarding packets from a source to a destination. By continuously updating and maintaining these tables, routing algorithms can efficiently determine the shortest or most optimal routes for data transmission within a network.

Submit
7. (213) The classification of a fill device is

Explanation

When a key is loaded into a fill device, it becomes classified. The classification of the fill device is determined by the classification of the loaded key. Therefore, the fill device is classified as soon as a key is loaded, and it holds the classification of the loaded key.

Submit
8. (215) The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a

Explanation

The correct answer is "driver". A driver is a special program that acts as a bridge between the operating system and hardware devices that are not on the computer's motherboard. It allows the operating system to communicate with and control these external hardware devices, enabling them to function properly. Without a driver, the operating system would not be able to interact with or utilize these hardware components effectively.

Submit
9. (202) What topology defines the way in which devices communicate, and data is transmitted, throughout the network?

Explanation

Logical topology defines the way in which devices communicate and data is transmitted throughout the network. It describes the logical connections between devices, such as how data flows from one device to another, without considering the physical layout or arrangement of the devices. This includes concepts like bus, ring, and mesh topologies, which determine how devices are interconnected and how data is routed between them.

Submit
10. (202) What topology consists of devices connected to a common, shared cable?

Explanation

The correct answer is Bus. In a bus topology, devices are connected to a common cable called the bus. The bus acts as a shared communication medium, allowing all devices to transmit and receive data. Each device on the network listens for data packets and only accepts those addressed to it. This topology is relatively simple and cost-effective, but it can suffer from performance issues if multiple devices try to transmit data simultaneously.

Submit
11. (203) What application within Transmission Control Protocol/Internet Protocol is used to send and receive files via TCP?

Explanation

The correct answer is File Transfer Protocol (FTP). FTP is a standard network protocol used to transfer files from one host to another over a TCP-based network, such as the internet. It provides a simple and reliable way to send and receive files, allowing users to upload, download, and manage files on remote servers. FTP operates on the application layer of the TCP/IP protocol suite and uses separate control and data connections to perform file transfers.

Submit
12. (204) What type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world?

Explanation

A Wide Area Network (WAN) is the correct answer because it connects networks that are separated by large geographical distances, such as between cities, states, countries, or even worldwide. Unlike a Local Area Network (LAN) which connects devices within a limited area like a home or office, a WAN allows for communication and data transfer over long distances. Virtual Private Network (VPN) is a technology that creates a secure connection over a public network, while Metropolitan Area Network (MAN) connects networks within a specific geographic area like a city.

Submit
13. (207) Which landline transmission medium is the primary carrier of voice communications?

Explanation

Twisted pair cable is the primary carrier of voice communications because it is a type of copper cable that consists of pairs of insulated wires twisted together. This design helps to reduce interference and crosstalk, ensuring clear and reliable transmission of voice signals. Twisted pair cable is widely used in telephone networks and is capable of carrying analog voice signals efficiently over long distances. It is a cost-effective and readily available transmission medium for voice communication.

Submit
14. (215) What are two anti-virus programs that the Air Force uses?

Explanation

The Air Force uses Norton and McAfee as their two anti-virus programs. These programs are commonly used in various organizations and are known for their effectiveness in detecting and removing viruses and other malicious software. By using both Norton and McAfee, the Air Force can ensure a higher level of protection against potential cyber threats.

Submit
15. (223) What concerns slowed the military's adoption of wireless network technology?

Explanation

The military's adoption of wireless network technology was slowed due to concerns regarding both security and reliability. The military requires secure and reliable communication channels to ensure the confidentiality and integrity of their sensitive information. Wireless networks are vulnerable to security breaches and interference, which raised concerns about the safety of military operations. Additionally, the military needs reliable communication systems that can withstand harsh environments and maintain connectivity in challenging conditions. These concerns regarding security and reliability hindered the military's adoption of wireless network technology.

Submit
16. (201) What Open System Interconnect layer is closest to the end user?

Explanation

The Open System Interconnect (OSI) model is a conceptual framework that standardizes the functions of a communication system. The OSI model consists of seven layers, each responsible for specific tasks. The layer closest to the end user is the Application layer. This layer provides services directly to the user, such as email, web browsing, and file transfer. It interacts with the user and serves as the interface between the user and the underlying network protocols.

Submit
17. (203) Which network protocol has the Department of Defense chosen as its standard to govern the flow of information?

Explanation

The Department of Defense has chosen the Transport Control Protocol/Internet Protocol (TCP/IP) as its standard network protocol to govern the flow of information. TCP/IP is a set of protocols that allows for the reliable and secure transmission of data over networks. It is widely used in the internet and provides a standardized framework for communication between devices. TCP/IP ensures that data packets are delivered in the correct order and that errors in transmission are detected and corrected. It is the foundation of modern networking and is used by a wide range of industries and organizations, including the Department of Defense.

Submit
18. (204) What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet?

Explanation

A Virtual Private Network (VPN) is a type of network that uses tunneling and security protocols to enable communication between two or more computer systems over the public Internet. It creates a secure and encrypted connection, allowing users to access resources on a private network remotely. VPNs are commonly used by businesses to provide secure remote access for their employees, as well as by individuals to protect their online privacy and bypass geographical restrictions.

Submit
19. (205) Using a range of 1-136 in the first octet of an IPv4 address, what class does it belong to?

Explanation

An IPv4 address is divided into different classes based on the range of the first octet. Class A addresses have a range of 1-126 in the first octet, so an IPv4 address with a range of 1-136 in the first octet belongs to Class A.

Submit
20. (205) What IPv4 reserved address is used for loop back?

Explanation

The loopback address is a reserved IPv4 address that is used to test network connectivity on a local device. The correct answer is 127.0.0.1. This address is commonly referred to as the localhost address and is used to send network packets back to the device itself. It can be used to troubleshoot network issues or test network applications without actually sending data over a physical network.

Submit
21. (207) What is the type of memory that retains data after power is removed or lost?

Explanation

Nonvolatile memory is the type of memory that retains data even after power is removed or lost. Unlike volatile memory, which loses its data when power is turned off, nonvolatile memory stores information permanently. This type of memory is commonly used in devices such as hard drives, solid-state drives, and flash memory. It allows for the long-term storage and retrieval of data, making it essential for preserving information even during power outages or system shutdowns.

Submit
22. (207) An optical communications system is comprised of a 

Explanation

An optical communications system requires a transmitter to convert electrical signals into optical signals, a cable to transmit the optical signals, and a receiver to convert the optical signals back into electrical signals. A logic analyzer is not necessary for the basic functioning of an optical communications system. Similarly, a protocol analyzer is not required as it is used for analyzing and debugging communication protocols, which is not directly related to the transmission of optical signals. Therefore, the correct answer is transmitter, cable, and receiver.

Submit
23. (211) What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?

Explanation

Store-and-forward is the method where the entire frame is received and stored in the buffer. It then undergoes an error check to ensure data integrity. Once the error check is complete, the frame is sent to the appropriate port for delivery. This method ensures that the entire frame is error-free before forwarding it, which helps in maintaining data integrity during transmission.

Submit
24. (212) Dynamic routing automatically calculates the best path between how many nodes?

Explanation

Dynamic routing automatically calculates the best path between two nodes. It analyzes various factors such as network congestion, link quality, and available bandwidth to determine the most efficient route for data transmission. By constantly updating and adapting to network conditions, dynamic routing ensures optimal performance and reliability in data communication. Therefore, the correct answer is 2.

Submit
25. (215) Applications are software programs designed to perform what type of tasks?

Explanation

Applications are software programs designed to perform specific tasks. Unlike general software programs that have a wide range of functions, applications are tailored to perform a particular task or set of tasks. They are developed with a specific purpose in mind, such as word processing, photo editing, or financial calculations. This specificity allows applications to be more efficient and focused, providing users with the necessary tools and features to accomplish their specific goals.

Submit
26. (217) What was the first disk operating system developed to operate on a wide range of computer systems?

Explanation

UNIX was the first disk operating system developed to operate on a wide range of computer systems. It was created in the 1960s at Bell Labs and was designed to be portable and flexible, allowing it to run on different hardware platforms. UNIX became widely popular due to its multi-user and multitasking capabilities, as well as its robustness and stability. It laid the foundation for modern operating systems and has had a significant impact on the development of computer systems and software.

Submit
27. (217) What directory is always identified by the slash symbol (/) and is in the "a" partition?

Explanation

The directory that is always identified by the slash symbol (/) and is in the "a" partition is the root directory. This directory is the top-level directory in the file system hierarchy and serves as the starting point for navigating the file system. It contains all other directories and files in the system.

Submit
28. (225) While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security?

Explanation

The liquid crystal display is the feature that lets you know that you have dialed the correct number at the proper level of security while using the Red Switch. The LCD provides a visual representation of the dialed number, confirming that it is correct and ensuring the appropriate level of security.

Submit
29. (231) An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC

Explanation

An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as an incident.

Submit
30. (234) Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication?

Explanation

INFOCON 2 is the condition that permits non-essential networks to be taken offline and substituted with alternate methods of communication. INFOCON levels are used by the military to indicate the current threat level and readiness status. INFOCON 2 indicates a substantial risk of attack and requires heightened security measures. Taking non-essential networks offline and using alternate methods of communication helps to minimize the risk of compromise during a potential attack.

Submit
31. (201) What is a formal set of rules and conventions that govern how computers exchange information over a network medium?

Explanation

A protocol is a formal set of rules and conventions that govern how computers exchange information over a network medium. It defines the format, timing, sequencing, and error control of the data transmission. By following a protocol, computers can communicate effectively and ensure that the information is transmitted accurately and reliably.

Submit
32. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides messaging that can help with troubleshooting?

Explanation

The Internet Control Message Protocol (ICMP) is a network layer protocol that provides messaging to help with troubleshooting. It is used by network devices to send error messages and operational information to indicate network problems or to diagnose network connectivity issues. ICMP messages include information about unreachable hosts, network congestion, and time exceeded. By using ICMP, network administrators can identify and troubleshoot network problems more efficiently.

Submit
33. (205) What is a mechanism that allows a network device to divide an IP address into a network and host number?

Explanation

A subnet mask is a mechanism that allows a network device to divide an IP address into a network and host number. It is a 32-bit number used to determine which part of the IP address belongs to the network and which part belongs to the host. By using the subnet mask, the device can determine if a destination IP address is on the same network or a different network, allowing for proper routing and communication between devices.

Submit
34. (206) What notation is expressed in zero compression for IPv6?

Explanation

The correct answer is 10AB::3:0:1234:5678. This is an example of zero compression notation in IPv6. In zero compression, consecutive blocks of zeros are replaced with a double colon (::). This is done to simplify and shorten the representation of IPv6 addresses. In the given answer, the consecutive blocks of zeros between 10AB and 3 are compressed using double colon (::).

Submit
35. (207) The computing part of the computer is the central processing unit, also called the 

Explanation

The computing part of a computer refers to the component that carries out the actual processing of data and instructions. The central processing unit (CPU) is responsible for this task, and it consists of several subunits, including the control unit, arithmetic logic unit, and the microprocessor. However, the microprocessor is the specific component within the CPU that performs the actual computation and controls the overall operation of the computer. Therefore, the correct answer is microprocessor.

Submit
36. (207) What two main components make up the central processing unit?

Explanation

The central processing unit (CPU) is composed of two main components, namely the control unit and the arithmetic logic unit (ALU). The control unit is responsible for coordinating and managing the operations of the CPU, including fetching instructions from memory, decoding them, and executing them. On the other hand, the ALU performs arithmetic and logical operations, such as addition, subtraction, and comparison, required by the instructions. Therefore, the correct answer is control unit and arithmetic logic unit.

Submit
37. (207) Which of the following is not one of the four security threats to Wireless Local Area Network?

Explanation

Direct Connections is not one of the four security threats to Wireless Local Area Network. Rogue Access Points refer to unauthorized access points that can be set up by attackers to gain access to the network. War Drivers are individuals who drive around with wireless devices to detect and exploit vulnerabilities in wireless networks. Hackers are individuals who attempt to gain unauthorized access to a network. However, Direct Connections do not pose a specific security threat to Wireless Local Area Network as they are typically used for legitimate purposes, such as connecting devices directly to a router or modem.

Submit
38. (202) What topology consists of cable segments from each computer connected to a centralized component?

Explanation

A star topology consists of cable segments from each computer connected to a centralized component, typically a switch or hub. In this configuration, all communication between the computers passes through the central component, allowing for easy management and troubleshooting. This topology provides better performance and reliability compared to bus or ring topologies, as a single point of failure does not disrupt the entire network.

Submit
39. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the IP address for a device that knows its own MAC address?

Explanation

The Reverse Address Resolution Protocol (RARP) is the network layer protocol that provides the IP address for a device that knows its own MAC address. RARP allows a device to send its MAC address to a RARP server and request its corresponding IP address. This is useful in scenarios where a device does not have a configured IP address and needs to obtain one dynamically based on its MAC address.

Submit
40. (204) Which is a common port that contains Hyper Text Transfer Protocol servers and proxies?

Explanation

Port 8080 is commonly used for hosting Hyper Text Transfer Protocol (HTTP) servers and proxies. While port 80 is the standard port for HTTP, port 8080 is often used as an alternative when the standard port is already occupied or when additional HTTP servers need to be hosted on the same machine. It allows for the communication of web browsers and servers, enabling the transfer of hypertext documents over the internet.

Submit
41. (205) Instead of using binary, how are IPv4 addresses expressed to be more user-friendly?

Explanation

IPv4 addresses are expressed in dotted decimal notation to make them more user-friendly. In this format, the address is divided into four octets, separated by dots. Each octet represents a decimal value ranging from 0 to 255, making it easier for users to read and understand the address. This format is widely used and familiar to most people, making it the preferred way to express IPv4 addresses.

Submit
42. (210) What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?

Explanation

The 80/20 rule establishes that 80% of the data should be local to a segment, while 20% of the data should be destined to traverse a bridge to the other segment. This means that the majority of the data should stay within the segment, reducing the need for data transfer across segments.

Submit
43. (215) Which one is not a category of the operating system's task categories?

Explanation

The question asks for a category that is not a category of the operating system's task categories. The options provided are user interface, memory management, troubleshoot interface, and processor management. User interface, memory management, and processor management are all categories of the operating system's task categories. However, troubleshoot interface is not a recognized category of the operating system's task categories. Therefore, the correct answer is troubleshoot interface.

Submit
44. (215) The core operating-system function is the management of the computer system which resides with the 

Explanation

The kernel is responsible for managing the core functions of the operating system. It acts as a bridge between the hardware and software, providing essential services such as memory management, process scheduling, and device driver management. The kernel is the central component of the operating system, handling system calls and ensuring that different parts of the system can communicate with each other effectively. Therefore, it is the correct answer for the question.

Submit
45. (201) The Institute of Electrical and Electronics Engineers divide the Open System Interconnect Data Link Layers into what two sublayers?

Explanation

The correct answer is Logical Link Control and Media Access Control. The Open System Interconnect (OSI) Data Link Layer is divided into two sublayers: Logical Link Control (LLC) and Media Access Control (MAC). The LLC sublayer is responsible for error control, flow control, and framing. It provides a reliable link between the network layer and the MAC sublayer. The MAC sublayer is responsible for controlling access to the physical media, managing data transmission, and addressing. Together, these two sublayers ensure efficient and reliable data transmission over a network.

Submit
46. (201) At what Open System Interconnect layer do routers operate?

Explanation

Routers operate at the Network layer of the Open System Interconnect (OSI) model. The Network layer is responsible for routing and forwarding data packets between different networks. Routers make decisions about the best path for data packets to reach their destination based on network addresses. They use routing protocols to exchange information with other routers and build a routing table, which helps them make these decisions. Therefore, routers play a crucial role in connecting different networks and ensuring efficient data transmission.

Submit
47. (206) What Unicast address scope is designed to be private, internally routable addresses that do not route outside the site?

Explanation

The correct answer is Site-local. Site-local addresses are designed to be private, internally routable addresses that do not route outside the site. These addresses are used within a specific site or organization and are not meant to be globally unique or routable on the internet. They provide a way for devices within a site to communicate with each other without exposing their addresses to the outside world.

Submit
48. (207) Which of the following is not one of the three advantages to using wireless technology?

Explanation

Wireless technology offers several advantages, including ease of installation, lower cost, and mobility. However, safety is not one of these advantages. While wireless technology can provide convenience and flexibility, it also comes with potential security risks and vulnerabilities. Therefore, safety is not considered a primary advantage of using wireless technology.

Submit
49. (208) How many peripherals can a Universal Serial Bus handle at once?

Explanation

A Universal Serial Bus (USB) can handle up to 127 peripherals at once. This is because USB uses a 7-bit address scheme to communicate with devices, allowing for a maximum of 127 unique addresses. Each peripheral connected to the USB is assigned a unique address, and the USB controller can communicate with all of them simultaneously. Therefore, the correct answer is 127.

Submit
50. (213) What encryption device may you rarely see due to its lower maximum data rate?

Explanation

The TSEC/KIV-7 encryption device may rarely be seen due to its lower maximum data rate. This suggests that the TSEC/KIV-7 has a slower data transmission capability compared to other encryption devices listed.

Submit
51. (215) Software is generally divided into

Explanation

Software is generally categorized into three main types: systems software, operating systems software, and applications software. Systems software refers to programs that manage and control the computer hardware, such as compilers, assemblers, and drivers. Operating systems software is a specific type of systems software that provides a platform for other software to run on, such as Windows or macOS. Applications software includes programs designed for specific tasks or purposes, such as word processors, spreadsheets, and graphic design software. Therefore, the correct answer is systems software, operating systems software, and applications software.

Submit
52. (201) What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, and functional specifications for links between communicating network systems?

Explanation

The correct answer is Physical. The Physical layer of the OSI model is responsible for defining the electrical, mechanical, procedural, and functional specifications for links between communicating network systems. It deals with the physical transmission of data and the physical characteristics of the network hardware. This layer ensures that the signals sent over the network are properly transmitted and received.

Submit
53. (205) How many bits are in an IPv4 address?

Explanation

An IPv4 address is made up of 32 bits. This means that there are a total of 2^32 (4,294,967,296) possible unique addresses in the IPv4 addressing system. Each bit in the address represents a binary value of either 0 or 1, resulting in a 32-bit binary number that uniquely identifies a device connected to a network.

Submit
54. (205) What IPv4 class address is used for networks with about 250 nodes?

Explanation

Class C is the correct answer because it is typically used for networks with about 250 nodes. Class C addresses have a default subnet mask of 255.255.255.0, which allows for a maximum of 254 usable host addresses. This makes it suitable for small to medium-sized networks, such as small businesses or home networks. Class D is used for multicast addresses, Class E is reserved for experimental use, and Class F is not defined and therefore not used.

Submit
55. (205) What iPv4 class address is used for multicast addressing?

Explanation

Class D addresses in IPv4 are reserved for multicast addressing. Multicast addressing is a method of sending IP packets to a group of hosts on a network simultaneously. Class D addresses range from 224.0.0.0 to 239.255.255.255.

Submit
56. (205) What is the default classful subnet mask on class B networks?

Explanation

The default classful subnet mask for class B networks is 255.255.0.0. This subnet mask allows for 16 bits of network address and 16 bits of host address, giving a total of 65,536 possible networks and 65,534 possible hosts per network.

Submit
57. (209) What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?

Explanation

Voltage is applied across Liquid Crystal Display (LCD) material to change the alignment and light polarizing property. The application of voltage alters the orientation of liquid crystal molecules, which in turn affects the alignment of the liquid crystal material. This change in alignment allows control over the amount of light passing through the LCD, thus enabling the display of different colors and images. By adjusting the voltage, the desired alignment and polarizing properties can be achieved, resulting in the desired display output.

Submit
58. (212) Which of these is an example of an Exterior Gateway Protocol?

Explanation

Border Gateway Protocol (BGP) is an example of an Exterior Gateway Protocol (EGP). It is used to exchange routing information between different autonomous systems (AS) on the internet. BGP is responsible for determining the best path for data to flow between networks and helps in making routing decisions based on factors like network policies, path attributes, and network reachability. It is widely used by internet service providers (ISPs) to connect their networks and exchange routing information with other ISPs.

Submit
59. (214) Analog modems are used over the voice band range of

Explanation

Analog modems are used to transmit data over telephone lines. The voice band range refers to the frequency range that can be transmitted over a telephone line. The voice band range for analog modems is typically from 20 Hz to 20 kHz, which is within the range of human hearing. This frequency range allows for the transmission of voice signals and data signals at a reasonable quality. Therefore, the correct answer is 20 Hz to 20 kHz.

Submit
60. (224) What type of Defense Switched Network precedence call cannot be preempted?

Explanation

Flash Override is a type of Defense Switched Network (DSN) precedence call that cannot be preempted. This means that when a call with Flash Override precedence is in progress, it cannot be interrupted or given lower priority by any other call. Flash Override calls are reserved for critical and emergency situations that require immediate attention and cannot be delayed or interrupted.

Submit
61. (231) Final reports of a communication security incident are due

Explanation

The correct answer is 30 days after the initial report is issued. This means that the final reports of a communication security incident must be submitted within 30 days after the initial report is issued.

Submit
62. (232) Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction?

Explanation

COMPUSEC, or computer security, is the applied discipline that applies measures and controls to protect data in computer systems against unauthorized disclosure, modification, or destruction. It involves implementing various security measures such as encryption, access controls, firewalls, and antivirus software to ensure the confidentiality, integrity, and availability of data stored in computer systems. COMPUSEC aims to protect against both external threats, such as hackers and malware, as well as internal threats, such as unauthorized access by employees.

Submit
63. (213) What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?

Explanation

The TSEC/KIV-19 encryption device is certified to secure all classification levels and categories and is specifically designed to encrypt trunk-level high-speed circuits. It is the only option among the given choices that meets these requirements.

Submit
64. (213) What encryption device is capable of loading up to 500 keys?

Explanation

The AN/CYZ-10 /DTD is the correct answer because it is an encryption device that is capable of loading up to 500 keys. The other options mentioned, AN/CYZ-20 /DTD, Secure DTD1000 System, and Secure DTD2000 System, do not specify their capability to load up to 500 keys. Therefore, they are not the correct answers.

Submit
65. (214) The main function of the Data Service Unit is to

Explanation

The main function of the Data Service Unit (DSU) is to adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment. This means that the DSU converts the data from the customer's equipment into a format that is compatible with the telephone carrier's equipment. This is important because different equipment may use different signaling standards, and the DSU ensures that the data can be properly transmitted and received between the customer and the carrier.

Submit
66. (217) What is the name of the standard all-purpose shell most commonly used?

Explanation

The Bourne shell is the name of the standard all-purpose shell that is most commonly used. It was developed by Stephen Bourne in the early 1970s and is the default shell for many Unix-like operating systems. The Bourne shell provides a command-line interface for users to interact with the operating system, allowing them to execute commands, run scripts, and perform various tasks. It is known for its simplicity and compatibility, making it a popular choice among users and system administrators.

Submit
67. (218) This component of the Global Information Grid consists of those items that are necessary to directly connect the warfighter to the global network.

Explanation

The Warrior component is the correct answer because it refers to the items that directly connect the warfighter to the global network. This component includes the necessary equipment, technology, and systems that enable the warfighter to access and communicate with the global information grid. It plays a crucial role in ensuring that the warfighter has direct connectivity and can effectively utilize the global network for information sharing and communication purposes.

Submit
68. (228) Which of the following security programs is defined as a process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities?

Explanation

OPSEC, or Operations Security, is the correct answer. OPSEC is a security program that involves identifying critical information and analyzing friendly actions in military operations and other activities. It focuses on preventing adversaries from obtaining sensitive information that could be used against the organization. EMSEC (Emissions Security), COMSEC (Communications Security), and COMPUSEC (Computer Security) are also important security programs, but they do not specifically address the process of identifying critical information and analyzing friendly actions like OPSEC does.

Submit
69. (203) What Transmission Control Protocol/Internet Protocol network layer protocol provides the service of matching a known IP address for a destination device to a Media Access Control address?

Explanation

The Address Resolution Protocol (ARP) is the correct answer because it is the protocol used to match a known IP address for a destination device to a Media Access Control (MAC) address. ARP is responsible for resolving the IP address to the corresponding MAC address in order to establish communication between devices on a TCP/IP network.

Submit
70. (203) What Transmission Control Protocol/Internet Protocol transport layer protocol provides reliable data delivery services?

Explanation

The correct answer is Transmission Control Protocol. TCP is a transport layer protocol that provides reliable data delivery services. It ensures that data packets are delivered in the correct order and without any errors. TCP uses various mechanisms such as acknowledgment, retransmission, and flow control to ensure reliable data transmission. It is widely used in applications that require guaranteed delivery of data, such as web browsing, file transfer, and email.

Submit
71. (206) What Unicast address scope is publicly accessible with the Network ID portion of the address broken up into different areas allowing for hierarchical design and allocation?

Explanation

Aggregatable Global is the correct answer because it refers to a unicast address scope that is publicly accessible. In this scope, the Network ID portion of the address is divided into different areas, enabling hierarchical design and allocation. This allows for efficient management and organization of IP addresses on a global scale.

Submit
72. (210) This type of bridge is used to convert one Data Link layer protocol to another.

Explanation

A translational bridge is used to convert one Data Link layer protocol to another. This means that it can take data from one protocol and translate it into a format that can be understood by another protocol. This is useful when different devices or networks are using different protocols and need to communicate with each other. The translational bridge acts as a mediator between the two protocols, allowing them to exchange information effectively.

Submit
73. (227) The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code?

Explanation

The Global Positioning System program is responsible for maintaining GPS time to within 1 microsecond of universal time code. This means that the GPS time is accurate up to 1 millionth of a second compared to the universal time code. This high level of accuracy is crucial for various applications that rely on GPS, such as navigation systems, scientific research, and telecommunications.

Submit
74. (233) What best describes an unintended signals or noise appearing external to a piece of communications equipment?

Explanation

Emanation best describes an unintended signals or noise appearing external to a piece of communications equipment. Emanation refers to the unintentional release of signals or radiation from electronic devices, which can potentially be intercepted or cause interference with other devices. It is a common concern in the field of cybersecurity and is often addressed through measures such as shielding and encryption.

Submit
75. (234) When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected?

Explanation

When a risk of a network system attack has been identified, INFOCON 3 condition requires all unclassified dial-up connections to be disconnected. INFOCON, or Information Operations Condition, is a system used by the military to assess and communicate the level of threat to computer networks. INFOCON 3 signifies an increased risk level, where there is a significant possibility of an attack or compromise. Disconnecting unclassified dial-up connections helps to mitigate the risk by reducing potential entry points for attackers.

Submit
76. (235) At what level do regional operation centers perform Network Operations (NETOPS) to ensure operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management?

Explanation

Regional operation centers perform Network Operations (NETOPS) at Tier 2 level. This level ensures operational and administrative control by implementing Systems and Network Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management.

Submit
77. (206) What notation is expressed in leading zero compression for IPv6?

Explanation

Leading zero compression in IPv6 notation allows consecutive blocks of zeros to be represented with a double colon "::". In the given answer, the notation 1234:1234:0:0:1234:0:0:1234 is expressed in leading zero compression because the consecutive blocks of zeros are compressed using "::".

Submit
78. (210) What is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks?

Explanation

A bridge is a Data Link layer network device that logically separates a single network into two segments or collision domains in Ethernet networks. It operates by examining the MAC addresses of incoming frames and forwarding them only to the appropriate segment, effectively reducing collisions and improving network performance. Unlike a hub, which simply broadcasts all incoming frames to all connected devices, a bridge intelligently filters and forwards frames based on their destination MAC address. This allows for more efficient and secure communication within a network. A switch is similar to a bridge but typically has more ports and additional features. A router, on the other hand, operates at the Network layer and is responsible for forwarding packets between different networks.

Submit
79. (216) One of the Windows Server Editions operating systems provides support for high-end, high traffic applications servers.  Which Operating system is it?

Explanation

The correct answer is Datacenter Edition. This edition of Windows Server is specifically designed to support high-end, high traffic application servers. It offers advanced features such as unlimited virtualization rights, enhanced scalability, and high availability. It is ideal for large organizations or data centers that require robust performance and reliability for their applications.

Submit
80. (223) What is the first step in merging voice, data and video networks into one integrated network within the Air Force?

Explanation

The first step in merging voice, data, and video networks into one integrated network within the Air Force is to integrate traditional TDM switches with voice over IP systems. This approach allows for the seamless integration of voice communication over the existing data network infrastructure, eliminating the need for separate voice switches and enabling more efficient communication and collaboration across different types of media. This integration ensures a smooth transition and maximizes the utilization of existing resources while enhancing the overall network capabilities.

Submit
81. (229) Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as 

Explanation

The correct answer is "sensitive but unclassified." This is because the disclosure of information that could lead to loss, misuse, modification, or unauthorized access that might harm national security is considered sensitive. However, it is not classified, meaning it is not categorized under specific levels of classified information such as secret, confidential, or for official use only. Instead, it falls under the category of sensitive but unclassified information.

Submit
82. (236) Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts?

Explanation

not-available-via-ai

Submit
83. (206) Instead of using binary, how are IPv6 addresses expressed to be more user-friendly?

Explanation

IPv6 addresses are expressed in a more user-friendly way using the Colon Hexadecimal Format. In this format, the address is divided into eight groups of four hexadecimal digits, separated by colons. This format allows for a larger address space compared to IPv4, which uses dotted decimal notation. The use of hexadecimal digits makes it easier for users to read and understand the address, as hexadecimal numbers are commonly used in computing.

Submit
84. (208) How many devices can connect to a FireWire bus?

Explanation

A FireWire bus can support up to 63 devices. This is because the FireWire standard allows for a maximum of 63 devices to be connected in a daisy-chain configuration, where each device is connected to the previous one in a linear chain. Each device in the chain has a unique identifier, allowing them to be recognized and communicated with individually. Therefore, the correct answer is 63.

Submit
85. (211) What forwarding method is also known as runtless switching?

Explanation

Fragment-free forwarding method, also known as runtless switching, is a type of switching method used in network communication. In this method, the switch waits for a small portion of the incoming frame to be received before forwarding it. This allows the switch to detect and discard any fragments or runts, which are incomplete or improperly sized frames. By doing so, it helps to reduce the chances of forwarding corrupted or damaged data, improving the overall reliability and efficiency of the network communication.

Submit
86. (216) Windows operating systems traditionally function in one of two network models.  Which model does not operate using centralized user accounts?

Explanation

In a Windows operating system, the workgroup model does not operate using centralized user accounts. In a workgroup, each computer maintains its own user accounts and security settings independently. This means that user accounts are created and managed separately on each computer within the workgroup. In contrast, the domain model and Active Directory both operate using centralized user accounts. In a domain, user accounts and security settings are managed centrally by a domain controller, providing a more centralized and efficient way to manage user accounts and security across multiple computers. User groups, on the other hand, are not network models but rather a way to organize and manage users within a network.

Submit
87. (216) Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?

Explanation

Enterprise Edition provides support for features such as Windows System Resource Manager and Metadirectory Services. These features are typically required in large organizations where resource management and directory services are crucial for efficient operations. Therefore, choosing Enterprise Edition would be the most appropriate option for organizations needing these specific features.

Submit
88. (221) How are non-internet protocols sent across the Secret Internet Protocol Router Network?

Explanation

Non-internet protocols are sent across the Secret Internet Protocol Router Network (SIPRNET) by being encapsulated by the internet protocol before transmission. This means that the non-internet protocols are wrapped within an internet protocol packet, allowing them to be transmitted across the SIPRNET. This encapsulation process ensures that the non-internet protocols can be properly transmitted and understood within the SIPRNET environment.

Submit
89. (225) What is the maximum asynchronous data rate for the Defense Red Switch Network (DRSN)?

Explanation

The maximum asynchronous data rate for the Defense Red Switch Network (DRSN) is 19.2 Kbps.

Submit
90. (235) An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as

Explanation

A full accreditation is an accreditation decision that permits a system to function in its intended environment. This means that the system has met all the necessary requirements and standards to operate effectively and safely in the designated environment. It signifies that the system has successfully undergone a comprehensive evaluation and is fully approved to operate without any restrictions or limitations.

Submit
91. (201) At what Open System Interconnect layer do network switches and bridges operate?

Explanation

Network switches and bridges operate at the Data Link layer of the Open System Interconnect (OSI) model. This layer is responsible for the reliable transfer of data between adjacent network nodes, such as switches and bridges. It provides error detection and correction, as well as the addressing of devices on a local network. Network switches and bridges use MAC addresses to forward data packets within a local area network (LAN), making them essential components at the Data Link layer.

Submit
92. (212) What layer of the open system interconnection model do routers operate?

Explanation

Routers operate at Layer 3 of the Open System Interconnection (OSI) model. This layer is known as the Network layer, which is responsible for routing and forwarding data packets between different networks. Routers use IP addresses to determine the best path for data transmission and make decisions based on network protocols. Therefore, Layer 3 is the correct answer as it aligns with the role and function of routers in the OSI model.

Submit
93. (220) What is the difference between a hub router and a premise router?

Explanation

not-available-via-ai

Submit
94. (224) Which organization is responsible for the design, acquisition, and single systems management of the Defense Switched Network?

Explanation

The Defense Information Systems Agency (DISA) is responsible for the design, acquisition, and single systems management of the Defense Switched Network. DISA is an agency of the United States Department of Defense (DoD) and provides information technology and communications support to the military and other government organizations. They are responsible for the planning, development, and maintenance of the Defense Information System for Command, Control, Communications, and Computers (C4). Therefore, DISA is the correct organization responsible for the Defense Switched Network.

Submit
95. (230) What is the COMSEC program designed to do?

Explanation

The COMSEC program is designed to detect and correct procedural weaknesses that could potentially expose critical information. This means that it focuses on identifying and addressing any vulnerabilities or flaws in the procedures related to communication security. By doing so, it aims to prevent unauthorized interception and analysis of compromising emanations, ensuring the protection of sensitive information.

Submit
96. (233) An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as

Explanation

The correct answer is "Telecommunications Electronic Material Protected from Emanating Spurious Transmissions." This term refers to the technical investigations conducted to protect against compromising emanations from electrically operated data processing equipment. It focuses on preventing unintended electromagnetic emissions that could potentially be intercepted and exploited by unauthorized individuals.

Submit
97. (234) Which condition exists when there is no apparent terrorist activity against computer networks?

Explanation

INFOCON 5 indicates that there is no apparent terrorist activity against computer networks. In this condition, the threat level is considered to be low, and there are no known or suspected attacks or vulnerabilities. This means that the computer networks are currently not under any significant threat from terrorist activities.

Submit
98. (201) At what Open System Interconnect layer are common data compression and encryption schemes used?

Explanation

Common data compression and encryption schemes are used at the Presentation layer of the Open System Interconnect (OSI) model. The Presentation layer is responsible for formatting and encrypting data to be transmitted over the network. It ensures that the data is in a format that can be understood by the receiving system. Data compression reduces the size of the data to optimize transmission, while encryption ensures the security and confidentiality of the data. Therefore, the correct answer is Presentation.

Submit
99. (217) Which pathnames begin at the current working directory?

Explanation

Relative pathnames begin at the current working directory. Unlike absolute pathnames that start from the root directory, relative pathnames are specified in relation to the current directory. They provide a shorter and more concise way of referencing files and directories within the current working directory.

Submit
100. (222) What provides conduit for Joint Worldwide Intelligence Communication System data transmission from one location to another?

Explanation

The DISN (Defense Information Systems Network) backbone is the correct answer because it is a high-speed, secure network infrastructure that provides the conduit for Joint Worldwide Intelligence Communication System (JWICS) data transmission from one location to another. The DISN backbone ensures the reliable and efficient transfer of classified information across the network, enabling seamless communication and collaboration among intelligence agencies and military organizations.

Submit
101. (226) What is the purpose of the standardized tactical entry point terminal?

Explanation

The purpose of the standardized tactical entry point terminal is to provide a foxhole to National Command Authority link for commanders. This means that it serves as a communication tool that allows commanders to establish a direct line of communication with the National Command Authority, ensuring efficient and secure communication in critical situations.

Submit
102. (228) Which security program is covered under AFI 10-701?

Explanation

The correct answer is OPSEC. OPSEC, or Operations Security, is a security program that is covered under AFI 10-701. OPSEC involves identifying and protecting critical information that could be used by adversaries to compromise military operations. It focuses on preventing the unauthorized disclosure of sensitive information and ensuring the effectiveness of operational security measures.

Submit
103. (224) How is responsiveness provided in the Defense Switched Network?

Explanation

The Defense Switched Network (DSN) provides responsiveness through precedence access thresholding. This means that certain users or types of traffic are given priority access to the network based on their assigned precedence level. This allows critical communications to be prioritized over non-critical ones, ensuring that important messages are delivered in a timely manner.

Submit
104. (230) Which form is used as a visitor register log to record visitors into restricted areas?

Explanation

AF Form 1109 is used as a visitor register log to record visitors into restricted areas. This form is specifically designed for documenting visitor information such as name, organization, purpose of visit, and duration of stay. It helps maintain a record of individuals accessing restricted areas, ensuring accountability and security.

Submit
105. (214) A modem is a device that modulates

Explanation

A modem is a device that modulates digital data onto an analog carrier for transmission over an analog medium. This means that the modem converts the digital data into analog signals that can be transmitted over traditional telephone lines or other analog communication channels. The analog carrier carries the modulated digital data, allowing it to be transmitted over the analog medium.

Submit
106. (234) Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present?

Explanation

INFOCON 4 is the correct answer because it signifies an increased risk of attack. When the INFOCON level is raised to 4, it means that there is a significant risk of attack and the organization needs to increase monitoring of all network system activities. This is necessary to detect and respond to any potential threats or attacks in a timely manner.

Submit
107. (235) At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed?

Explanation

Tier 1 is responsible for the worldwide management and operational oversight of the defense information infrastructure globally.

Submit
108. (230)  What reference would you use for guidance on Air Force messaging?

Explanation

AFI 33-119 is the correct reference for guidance on Air Force messaging. This Air Force Instruction provides guidance on the proper procedures and standards for creating, sending, and receiving messages within the Air Force. It covers topics such as message formatting, classification, handling, and transmission. By following the guidelines outlined in AFI 33-119, Air Force personnel can ensure effective and secure communication through messaging systems.

Submit
109. (219) Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network?

Explanation

The responsibility for maintenance of the sustaining base portion of the Defense Information System Network lies with the service that owns the installation. This means that the specific branch of the military that operates and maintains the installation is responsible for the upkeep and maintenance of the network.

Submit
110. (219) Which segment of the Defense Information System Network (DISN) may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat?

Explanation

A deployed warfighter refers to a person who is actively serving in a combat area or a deployed area of responsibility. This can include military personnel who are physically present in the field or in a combat zone, as well as those who are stationed in a fixed location far away from combat but still actively involved in military operations. Therefore, the deployed warfighter segment of the Defense Information System Network (DISN) can include both individuals on the frontlines and those in support roles located thousands of miles away from combat.

Submit
111. (221) Which is an internet protocol encryption device that can be directly connected to Red local area networks?

Explanation

The KG-84 is an internet protocol encryption device that can be directly connected to Red local area networks. It is designed to provide secure communication over IP networks by encrypting and decrypting data. The other options, KG-194, KIV-7, and KG175, are not specifically designed for direct connection to Red local area networks.

Submit
112. (205) What method borrows bits from the host field of an IP address to create a subnet?

Explanation

Classless Inter-Domain Routing (CIDR) is a method that borrows bits from the host field of an IP address to create a subnet. CIDR allows for more efficient allocation of IP addresses by allowing variable-length subnet masks. This means that instead of being limited to the fixed subnet masks used in classful subnet masking, CIDR allows for more flexibility in dividing IP address space into smaller subnets.

Submit
113. (206) What Unicast address scope operates within a network segment, and will not originate from, or to be destined to, an interface that requires a router to direct traffic?

Explanation

A link-local address operates within a network segment and does not require a router to direct traffic. It is used for communication within the local network and cannot be routed outside of the network segment. Therefore, it meets the criteria mentioned in the question. Site-local, aggregatable local, and aggregatable global addresses may require a router for traffic to be directed, so they are not the correct answer.

Submit
114. (230) Which form is used with a transfer report to accompany a COMSEC package?

Explanation

The correct answer is SF 153. The SF 153 form is used with a transfer report to accompany a COMSEC package. This form is specifically designed for the purpose of documenting the transfer of classified material, including cryptographic equipment and keying material. It provides a record of the transfer, ensuring accountability and proper handling of the COMSEC package throughout the chain of custody.

Submit
115. (231) Which organization assigns communication security incident report case numbers?

Explanation

The Air Force Communications Agency is responsible for assigning communication security incident report case numbers.

Submit
116. (229) Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement?

Explanation

The correct answer is "Routine use." A Privacy Act Statement is a document that provides individuals with information about how their personal information will be collected, used, and disclosed. One mandatory item of a Privacy Act Statement is the disclosure, which refers to the list of where and why the information will be disclosed outside the Department of Defense (DOD). This information is important for individuals to understand how their personal information may be shared with other entities or organizations. Therefore, "Routine use" best describes this mandatory item.

Submit
117. (229) Guidance for posting information on Air Force web sites is outlined in

Explanation

The correct answer is AFI 33-129. This Air Force Instruction provides guidance for posting information on Air Force web sites. It outlines the rules and regulations that must be followed when posting content on these sites to ensure compliance with Air Force policies and procedures. It covers topics such as security, privacy, accessibility, and content management. By following the guidelines outlined in AFI 33-129, Air Force personnel can ensure that the information posted on their web sites is accurate, secure, and in line with the Air Force's standards.

Submit
118. (229) Official guidance on individual security clearances and permitting access to classified information can be found in

Explanation

not-available-via-ai

Submit
119. (229) What form is used as a cover sheet ​to protect Privacy Act material?

Explanation

AF Form 3227 is used as a cover sheet to protect Privacy Act material.

Submit
120. (232) The Air Force Information Assurance Program is detailed in

Explanation

not-available-via-ai

Submit
121. (218) This characteristic of the Global Information Grid ensures seamless transmission of information between different service branches.

Explanation

Common policy and standards refer to a set of guidelines and rules that are universally followed across different service branches. By having common policies and standards in place, the Global Information Grid ensures that information is transmitted seamlessly between different service branches. This means that regardless of the branch, everyone follows the same protocols and procedures, allowing for efficient and effective communication and information sharing.

Submit
122. (223) Besides limiting connections to the Global Information Grid, what other Combat Information Transport Systems initiative will help increase network security?

Explanation

The correct answer is "Eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated NOSCs." This initiative will help increase network security by streamlining and consolidating the Network Operating Security Centers (NOSCs) into two Integrated NOSCs. This consolidation will reduce the number of NOSCs, making it easier to manage and secure the network. Additionally, having standardized tools and a baseline security model across all MAJCOM areas of responsibility will further enhance network security.

Submit
123. (236) Which form would you use to properly label removable storage media containing "confidential" information?

Explanation

The correct form to use for properly labeling removable storage media containing "confidential" information is SF 708.

Submit
124. (236) Which resources designated priority is provided when the level of security requires a significant degree of deterrence against hostile acts?

Explanation

The correct answer is "B" because when the level of security requires a significant degree of deterrence against hostile acts, the resources designated priority is provided. This means that the resources that are most important and necessary for ensuring security and deterring hostile acts will be given priority in terms of allocation and protection.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 30, 2013
    Quiz Created by
    RScott1206
Cancel
  • All
    All (124)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(202) What topology defines the layout of a network's devices and...
(202) What topology combines two or more different physical topologies...
(207) The ability to move about without being tethered by wires...
(207) Who is an authorized client that may unknowingly or maliciously...
(207) What organization developed several wireless standards to meet...
(212) What do routing algorithms initialize and maintain to aid the...
(213) The classification of a fill device is
(215) The path between the operating system and virtually all hardware...
(202) What topology defines the way in which devices communicate, and...
(202) What topology consists of devices connected to a common, shared...
(203) What application within Transmission Control Protocol/Internet...
(204) What type of network connects networks that are typically...
(207) Which landline transmission medium is the primary carrier of...
(215) What are two anti-virus programs that the Air Force uses?
(223) What concerns slowed the military's adoption of wireless...
(201) What Open System Interconnect layer is closest to the end user?
(203) Which network protocol has the Department of Defense chosen as...
(204) What type of network makes use of tunneling and security...
(205) Using a range of 1-136 in the first octet of an IPv4 address,...
(205) What IPv4 reserved address is used for loop back?
(207) What is the type of memory that retains data after power is...
(207) An optical communications system is comprised of a 
(211) What is the method called when the entire frame is received and...
(212) Dynamic routing automatically calculates the best path between...
(215) Applications are software programs designed to perform what type...
(217) What was the first disk operating system developed to operate on...
(217) What directory is always identified by the slash symbol (/) and...
(225) While you are using the Red Switch, what feature lets you know...
(231) An uninvestigated or unevaluated occurrence that potentially...
(234) Which condition permits non-essential networks to be taken...
(201) What is a formal set of rules and conventions that govern how...
(203) What Transmission Control Protocol/Internet Protocol network...
(205) What is a mechanism that allows a network device to divide an IP...
(206) What notation is expressed in zero compression for IPv6?
(207) The computing part of the computer is the central processing...
(207) What two main components make up the central processing unit?
(207) Which of the following is not one of the four security threats...
(202) What topology consists of cable segments from each computer...
(203) What Transmission Control Protocol/Internet Protocol network...
(204) Which is a common port that contains Hyper Text Transfer...
(205) Instead of using binary, how are IPv4 addresses expressed to be...
(210) What rule establishes the percent of data that should be local...
(215) Which one is not a category of the operating...
(215) The core operating-system function is the management of the...
(201) The Institute of Electrical and Electronics Engineers divide the...
(201) At what Open System Interconnect layer do routers operate?
(206) What Unicast address scope is designed to be private, internally...
(207) Which of the following is not one of the three...
(208) How many peripherals can a Universal Serial Bus handle at once?
(213) What encryption device may you rarely see due to its lower...
(215) Software is generally divided into
(201) What layer of the Open System Interconnect model defines the...
(205) How many bits are in an IPv4 address?
(205) What IPv4 class address is used for networks with about 250...
(205) What iPv4 class address is used for multicast addressing?
(205) What is the default classful subnet mask on class B networks?
(209) What do you apply across Liquid Crystal Display material to...
(212) Which of these is an example of an Exterior Gateway Protocol?
(214) Analog modems are used over the voice band range of
(224) What type of Defense Switched Network precedence...
(231) Final reports of a communication security incident are due
(232) Which applied discipline applies measures and controls to...
(213) What encryption device is certified to secure all classification...
(213) What encryption device is capable of loading up to 500 keys?
(214) The main function of the Data Service Unit is to
(217) What is the name of the standard all-purpose shell most commonly...
(218) This component of the Global Information Grid consists of those...
(228) Which of the following security programs is defined as a process...
(203) What Transmission Control Protocol/Internet Protocol network...
(203) What Transmission Control Protocol/Internet Protocol transport...
(206) What Unicast address scope is publicly accessible with the...
(210) This type of bridge is used to convert one Data Link layer...
(227) The Global Positioning System program is responsible for...
(233) What best describes an unintended signals or noise...
(234) When a risk of a network system attack has been identified,...
(235) At what level do regional operation centers perform Network...
(206) What notation is expressed in leading zero compression for IPv6?
(210) What is a Data Link layer network device that logically...
(216) One of the Windows Server Editions operating systems provides...
(223) What is the first step in merging voice, data and video networks...
(229) Disclosure of information that would result in the loss, misuse,...
(236) Which resources designated priority is provided when the level...
(206) Instead of using binary, how are IPv6 addresses expressed to be...
(208) How many devices can connect to a FireWire bus?
(211) What forwarding method is also known as runtless switching?
(216) Windows operating systems traditionally function in one of two...
(216) Which system provides support for features such as Windows...
(221) How are non-internet protocols sent across the Secret Internet...
(225) What is the maximum asynchronous data rate for the...
(235) An accreditation decision which allows a system to operate in an...
(201) At what Open System Interconnect layer do network switches and...
(212) What layer of the open system interconnection model do routers...
(220) What is the difference between a hub router and a premise...
(224) Which organization is responsible for the design, acquisition,...
(230) What is the COMSEC program designed to do?
(233) An unclassified term referring to technical investigations for...
(234) Which condition exists when there is no apparent terrorist...
(201) At what Open System Interconnect layer are common data...
(217) Which pathnames begin at the current working directory?
(222) What provides conduit for Joint Worldwide Intelligence...
(226) What is the purpose of the standardized tactical entry point...
(228) Which security program is covered under AFI 10-701?
(224) How is responsiveness provided in the Defense Switched...
(230) Which form is used as a visitor register log to record visitors...
(214) A modem is a device that modulates
(234) Which condition requires the mandate of increased monitoring of...
(235) At which NETOPS level is responsibility for the worldwide...
(230)  What reference would you use for guidance on Air Force...
(219) Who bears the responsibility for maintenance of the sustaining...
(219) Which segment of the Defense Information System Network (DISN)...
(221) Which is an internet protocol encryption device that can be...
(205) What method borrows bits from the host field of an IP address to...
(206) What Unicast address scope operates within a network segment,...
(230) Which form is used with a transfer report to accompany a COMSEC...
(231) Which organization assigns communication security incident...
(229) Providing a list of where and why the information will be...
(229) Guidance for posting information on Air Force web sites is...
(229) Official guidance on individual security clearances and...
(229) What form is used as a cover sheet ​to protect Privacy...
(232) The Air Force Information Assurance Program is detailed in
(218) This characteristic of the Global Information Grid ensures...
(223) Besides limiting connections to the Global Information Grid,...
(236) Which form would you use to properly label removable storage...
(236) Which resources designated priority is provided when the level...
Alert!

Advertisement