3d052 CDC Vol 1 UREs

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Henckel
H
Henckel
Community Contributor
Quizzes Created: 3 | Total Attempts: 5,234
| Attempts: 858
SettingsSettings
Please wait...
  • 1/100 Questions

    (009) Knowledge-based identification and authentication methods require the user to provide something you __________

    • Know
    • Have
    • Need
    • Read
Please wait...
About This Quiz

These are the 3D052 Volume 1 UREs. This quiz is to help you study for your CDC exams. This should not be used as the only means of studying. You should also read through your CDCs in preparation for your exams.

3d052 CDC Vol 1 UREs - Quiz

Quiz Preview

  • 2. 

    (001) What is the minimum number of computers needed for a computer network?

    • 1

    • 2

    • 5

    • 10

    Correct Answer
    A. 2
    Explanation
    A computer network requires at least two computers to be connected and communicate with each other. With only one computer, there would be no network as there would be no other device to connect to. Therefore, the minimum number of computers needed for a computer network is 2.

    Rate this question:

  • 3. 

    (001) What type of network is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system?

    • Internetwork

    • Intranetwork

    • Homogeneous network

    • Heterogeneous network

    Correct Answer
    A. Homogeneous network
    Explanation
    A homogeneous network is a type of network that is made up of components from the same vendor or compatible equipment that all run under the same operating system or network operating system. This means that all the devices and equipment in the network are from the same manufacturer or are compatible with each other, allowing for seamless integration and communication. This type of network is often easier to manage and troubleshoot as there is a standardized system in place.

    Rate this question:

  • 4. 

    (001) What type of network environments consist of computer systems from different vendors that run different operating systems and communication protocols?

    • Internetwork

    • Intranetwork

    • Homogeneous network

    • Heterogeneous network

    Correct Answer
    A. Heterogeneous network
    Explanation
    A heterogeneous network consists of computer systems from different vendors that run different operating systems and communication protocols. This means that the network is made up of diverse devices and software that may not be compatible with each other. This can present challenges in terms of communication and interoperability between the different systems.

    Rate this question:

  • 5. 

    (010) What is the preferred method of sanitizing magnetic media?

    • Degaussing

    • Overwriting

    • Formatting

    • Deleting

    Correct Answer
    A. Degaussing
    Explanation
    Degaussing is the preferred method of sanitizing magnetic media because it uses a powerful magnetic field to completely erase all data on the media. This method ensures that the data cannot be recovered or reconstructed. Overwriting, formatting, and deleting methods may leave traces of data that can potentially be recovered, making them less secure than degaussing.

    Rate this question:

  • 6. 

    (016) What is the primary unclassified public key infrastructure (PKI) token for individual PKI keys and certificates in the Air Force?

    • Hardware token

    • Software token

    • Common access card

    • Identification (ID) key

    Correct Answer
    A. Common access card
    Explanation
    The correct answer is a Common Access Card (CAC). In the Air Force, a CAC is the primary unclassified PKI token used for individual PKI keys and certificates. It serves as an identification card and contains a microchip that securely stores digital credentials, allowing individuals to authenticate their identity and access various systems and resources. CACs are widely used in the military to ensure secure access to sensitive information and protect against unauthorized access.

    Rate this question:

  • 7. 

    (001) How many users are normally in a peer-to-peer network?

    • 2-10

    • 10-50

    • 50-250

    • 250-1000

    Correct Answer
    A. 2-10
    Explanation
    In a peer-to-peer network, the number of users typically ranges from 2 to 10. This is because peer-to-peer networks are designed for small-scale connections between devices, where each device can act as both a client and a server. These networks are commonly used for file sharing, online gaming, and collaboration among a small group of users. With a limited number of users, the network can maintain efficient communication and resource sharing without becoming overwhelmed.

    Rate this question:

  • 8. 

    (005) What network management area is concerned with controlling access points to information?

    • Configuration

    • Performance

    • Accounting

    • Security

    Correct Answer
    A. Security
    Explanation
    The network management area concerned with controlling access points to information is security. Security measures are put in place to protect the network and its resources from unauthorized access, ensuring that only authorized individuals have access to sensitive information. This includes implementing firewalls, encryption, access control lists, and other security measures to prevent unauthorized access and protect the network from potential threats.

    Rate this question:

  • 9. 

    (009) What are three primary ways to authenticate one-self?

    • Finger and voiceprints, or retinal scans

    • Passwords, finger prints, or identification cards

    • Passwords, fortezza cards, or identification cards

    • Something you know, something you have, or something you are

    Correct Answer
    A. Something you know, something you have, or something you are
    Explanation
    The correct answer is "Something you know, something you have, or something you are." This answer refers to the three primary ways of authentication. "Something you know" refers to passwords or PINs that only the authorized user should know. "Something you have" refers to physical objects like identification cards or security tokens that the user possesses. "Something you are" refers to biometric characteristics like fingerprints, voiceprints, or retinal scans that are unique to an individual. These three factors provide a layered approach to authentication, increasing the security of the system.

    Rate this question:

  • 10. 

    (011) What documentation signifies that a system is not allowed to connect to the global information grid (GIG)?

    • Denial of authorization to operation (DATO)

    • Interim authorization to operate (IATO)

    • Authorization to operate (ATO)

    • Interim authorization to test (IATT)

    Correct Answer
    A. Denial of authorization to operation (DATO)
    Explanation
    The correct answer is Denial of authorization to operation (DATO). This documentation signifies that a system is not allowed to connect to the global information grid (GIG). It indicates that the system has been denied authorization to operate, meaning it does not meet the necessary security requirements or has not undergone the necessary testing and certification processes. This prevents the system from accessing or connecting to the GIG, ensuring the security and integrity of the network.

    Rate this question:

  • 11. 

    (012) A base web-server that interfaces with the public must be placed in what area of a base network?

    • At the core

    • None are allowed

    • Outside the base network

    • De-militarized zone (DMZ)

    Correct Answer
    A. De-militarized zone (DMZ)
    Explanation
    A base web-server that interfaces with the public must be placed in a de-militarized zone (DMZ). This is because a DMZ is a separate network segment that is isolated from the internal network and is designed to provide a layer of security for publicly accessible services. By placing the web-server in a DMZ, it adds an additional layer of protection by separating it from the internal network, reducing the risk of unauthorized access to sensitive data and resources.

    Rate this question:

  • 12. 

    (001) What is a privately-owned network whose access is restricted to authorized personnel is called?

    • Homogeneous network

    • Internetwork

    • Intranetwork

    • Local area network

    Correct Answer
    A. Intranetwork
    Explanation
    An intranetwork is a privately-owned network that is restricted to authorized personnel. It is a network that is internal to an organization and is used for communication and data sharing among employees or members of the organization. This network is not accessible to the public or unauthorized individuals, ensuring the security and privacy of the organization's data and resources.

    Rate this question:

  • 13. 

    (001) What type of communications network links different interconnected networks over an unlimited geographical region?

    • Global area network (GAN)

    • Local area network (LAN)

    • Metropolitan area network (MAN)

    • Wide area network (WAN)

    Correct Answer
    A. Global area network (GAN)
    Explanation
    A Global Area Network (GAN) is a type of communications network that connects different interconnected networks over an unlimited geographical region. Unlike other types of networks such as Local Area Networks (LANs), Metropolitan Area Networks (MANs), or Wide Area Networks (WANs) which have limitations in terms of geographical coverage, GANs have the ability to span across the globe. GANs are typically used by large organizations or multinational companies that have branches or offices in different countries or continents and need a network infrastructure to connect them all together.

    Rate this question:

  • 14. 

    (003) What series of Air Force instruction series covers communications and information?

    • 10

    • 29

    • 30

    • 33

    Correct Answer
    A. 33
    Explanation
    Air Force Instruction series 33 covers communications and information.

    Rate this question:

  • 15. 

    (003) What network entity provides reliable, secure networks and network services for base level customers?

    • Network control center (NCC)

    • Network control center-deployable (NCC-D)

    • Network operations center (NOSC)

    • Air Force network operations center (AFNOSC)

    Correct Answer
    A. Network control center (NCC)
    Explanation
    The network control center (NCC) is the network entity that provides reliable, secure networks and network services for base level customers. It is responsible for monitoring and managing the network infrastructure, ensuring its availability and security. The NCC is typically staffed by trained personnel who are responsible for troubleshooting network issues, managing network resources, and coordinating with other network entities to ensure smooth operations.

    Rate this question:

  • 16. 

    (011) What documentation is required to permanently connect to the global information grid (GIG) system?

    • Denial of authorization to operation (DATO)

    • Interim authorization to operate (IATO)

    • Authorization to operate (ATO)

    • Interim authorization to test (IATT)

    Correct Answer
    A. Authorization to operate (ATO)
    Explanation
    To permanently connect to the global information grid (GIG) system, an authorization to operate (ATO) is required. This means that the organization or system has met all the necessary security requirements and has been granted permission to operate on the GIG. The ATO ensures that the system has undergone the necessary security assessments and has implemented the required safeguards to protect the information on the GIG. It signifies that the system is authorized to access and exchange information on the GIG network.

    Rate this question:

  • 17. 

    (001) How many users are in a multi-server high-speed backbone network?

    • 2-10

    • 10-50

    • 50-250

    • 250-1000

    Correct Answer
    A. 250-1000
    Explanation
    A multi-server high-speed backbone network typically consists of multiple servers and is designed to handle a large amount of traffic. Therefore, it is reasonable to expect that the number of users in such a network would fall within the range of 250-1000. This range allows for a significant number of users to be connected to the network while still maintaining its high-speed and efficient performance.

    Rate this question:

  • 18. 

    (002) What is used to identify network nodes on a physically connected network?

    • Media access control address

    • Network server name

    • Subnet mask address

    • Node serial number

    Correct Answer
    A. Media access control address
    Explanation
    The media access control address is used to identify network nodes on a physically connected network. This address is a unique identifier assigned to each network interface card (NIC) and is used by the data link layer of the network protocol to ensure that data is delivered to the correct destination. The MAC address is typically a 48-bit hexadecimal number and is hard-coded into the NIC by the manufacturer.

    Rate this question:

  • 19. 

    (010) What is the process of erasing magnetic media by reducing the magnetic flux to virtual zero by applying a reverse magnetizing field?

    • Degausser

    • Degaussing

    • Destroying

    • Sanitizing

    Correct Answer
    A. Degaussing
    Explanation
    Degaussing is the process of erasing magnetic media by reducing the magnetic flux to virtual zero by applying a reverse magnetizing field. This process effectively removes all data from the magnetic media, making it impossible to recover any information. Degaussing is commonly used to securely erase sensitive data from hard drives, tapes, and other magnetic storage devices. It is a reliable method for ensuring that data cannot be accessed or recovered, making it an important step in the data sanitization process.

    Rate this question:

  • 20. 

    (012) What do you call a current and perceived capability, intention, or attack, directed to cause denial of service?

    • Vulnerability

    • Threat

    • Compromise

    • Tunneling

    Correct Answer
    A. Threat
    Explanation
    A threat refers to a current and perceived capability, intention, or attack that is directed towards causing denial of service. It can be any potential danger or harm that could exploit vulnerabilities in a system or compromise its security. Threats can come from various sources such as malicious individuals, hackers, or even natural disasters. It is important to identify and assess threats in order to implement appropriate security measures and protect against potential attacks.

    Rate this question:

  • 21. 

    (018) Sustained communications support becomes a part of the deployment if it exceeds __________

    • 15 days

    • 30 days

    • 45 days

    • 90 days

    Correct Answer
    A. 30 days
    Explanation
    Sustained communications support becomes a part of the deployment if it exceeds 30 days. This means that if the deployment lasts for more than 30 days, there will be ongoing and continuous support for communication needs. This could include maintaining communication channels, ensuring connectivity, providing technical assistance, and addressing any communication-related issues that may arise during the deployment.

    Rate this question:

  • 22. 

    (003) According to the Air Force network structure, what tier is the Air Force network operations center (AFNOSC)?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 1
    Explanation
    The Air Force network operations center (AFNOSC) is classified as Tier 1 in the Air Force network structure. This means that it is the highest level of network support and is responsible for managing and maintaining the overall network infrastructure. Tier 1 centers typically have the most advanced technology and resources, and they provide critical support for all lower tiers. They are responsible for monitoring network performance, troubleshooting issues, and coordinating with other network centers to ensure smooth operations.

    Rate this question:

  • 23. 

    (010) What is the process of physically damaging the media to render it unusable in a computer and render the data on the media irretrievable by any known exploitation methods?

    • Destroying

    • Degaussing

    • Sanitizing

    • Overwriting

    Correct Answer
    A. Destroying
    Explanation
    Destroying refers to the process of physically damaging the media to make it unusable and rendering the data irretrievable. This can involve methods such as shredding, incineration, or crushing the media to a point where it cannot be reconstructed or accessed. Unlike degaussing, sanitizing, or overwriting, destroying ensures that the data on the media cannot be recovered through any known exploitation methods.

    Rate this question:

  • 24. 

    (011) What is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security policy?

    • Enclave

    • Bastion

    • Circuits

    • Base

    Correct Answer
    A. Enclave
    Explanation
    An enclave refers to a collection of computing environments that are connected by one or more internal networks and are under the control of a single approval authority and security policy. This means that the computing environments within the enclave are interconnected and managed by a central authority, ensuring that they adhere to specific security measures and policies. The term "enclave" is commonly used in the context of secure and controlled computing environments, such as military or government networks.

    Rate this question:

  • 25. 

    (013) What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers?

    • Public key cryptography

    • Public key infrastructure (PKI)

    • Key distribution center

    • Asymmetric key infrastructure

    Correct Answer
    A. Public key infrastructure (PKI)
    Explanation
    Public key infrastructure (PKI) is a cryptographic key and certificate delivery system that enables secure electronic transactions and exchanges of sensitive information between relative strangers. PKI uses a combination of public and private keys to encrypt and decrypt data, ensuring confidentiality, integrity, and authentication. It involves the use of digital certificates, which are issued by a trusted third party called a certificate authority (CA), to verify the identity of parties involved in the transaction. PKI is widely used in various applications such as secure email, e-commerce, and online banking to establish a secure and trusted communication channel.

    Rate this question:

  • 26. 

    (014) Which component of the public key infrastructure (PKI) is responsible for establishing, authenticating, maintaining, and revoking certificates?

    • Certificate policy manager

    • Registration authority

    • Certificate authority

    • Certificate repository

    Correct Answer
    A. Certificate authority
    Explanation
    The correct answer is Certificate authority. A certificate authority is responsible for establishing, authenticating, maintaining, and revoking certificates in a public key infrastructure (PKI). It is the trusted entity that issues digital certificates to individuals or organizations, verifying their identity and ensuring the integrity and confidentiality of their communications. The certificate authority plays a crucial role in ensuring the security and trustworthiness of a PKI system.

    Rate this question:

  • 27. 

    (002) How many octets is the standard internet protocol broken down into?

    • 2

    • 4

    • 6

    • 8

    Correct Answer
    A. 4
    Explanation
    The standard internet protocol is broken down into 4 octets. An octet is a unit of digital information that consists of 8 bits, and it is commonly used to represent IP addresses in the IPv4 format. IPv4 addresses are made up of four sets of numbers, each ranging from 0 to 255, separated by periods. Each set of numbers represents one octet, resulting in a total of 32 bits or 4 octets. This allows for a maximum of approximately 4.3 billion unique IP addresses in the IPv4 addressing scheme.

    Rate this question:

  • 28. 

    (007) What color on the systems management automated report tracking system (SMARTS) alarm log indicates one or more events?

    • Blue

    • Orange

    • Purple

    • Yellow

    Correct Answer
    A. Purple
    Explanation
    Purple color on the SMARTS alarm log indicates one or more events. This means that when there is an event or multiple events recorded in the log, they are highlighted in purple.

    Rate this question:

  • 29. 

    (012) What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall?

    • Tunneling

    • Identification spoofing

    • Application-based attacks

    • Second message encryption

    Correct Answer
    A. Tunneling
    Explanation
    Tunneling is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through the firewall. This technique allows the attacker to bypass the firewall's security measures by hiding the malicious content within a legitimate message. By using tunneling, the attacker can successfully deliver the payload to the target system without being detected or blocked by the firewall.

    Rate this question:

  • 30. 

    (012) What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?

    • Network management software

    • Intrusion detection devices

    • Vulnerability scanners

    • Firewalls

    Correct Answer
    A. Vulnerability scanners
    Explanation
    Vulnerability scanners are network devices that perform rigorous examinations of systems to identify weaknesses that might allow security violations. These scanners are designed to scan networks, systems, or applications for any vulnerabilities or weaknesses in their security settings. By identifying these weaknesses, vulnerability scanners help organizations to proactively address and fix potential security issues before they can be exploited by attackers. This makes vulnerability scanners an essential tool in maintaining the security and integrity of network systems.

    Rate this question:

  • 31. 

    (012) An information system on your network that is not set to require the use of a common access card (CAC) or password would be considered a __________

    • Threat

    • Vulnerability

    • Compromise

    • Risk

    Correct Answer
    A. Vulnerability
    Explanation
    An information system on a network that is not set to require the use of a common access card (CAC) or password would be considered a vulnerability. This means that the system is exposed to potential risks and attacks as it does not have proper authentication measures in place. Without the requirement of a CAC or password, unauthorized individuals may be able to gain access to the system, compromising its security. Therefore, this lack of security measures represents a vulnerability in the network.

    Rate this question:

  • 32. 

    (004) What network architecture has a network management platform on one computer system at a location that is responsible for all network management duties?

    • Centralized

    • Distributed

    • Hierarchical

    • Hybrid

    Correct Answer
    A. Centralized
    Explanation
    A centralized network architecture has a network management platform on one computer system at a location that is responsible for all network management duties. This means that all network management tasks, such as monitoring, configuration, and troubleshooting, are handled by a single central system. This architecture offers simplicity and efficiency in managing the network, as all management tasks can be performed from one location.

    Rate this question:

  • 33. 

    (006) What operational simple network management protocol (SNMP) message asks for a specific instance of management information?

    • Get

    • Set

    • Trap

    • GetNext

    Correct Answer
    A. Get
    Explanation
    The operational SNMP message that asks for a specific instance of management information is "Get". The "Get" message is used to retrieve the value of a specific object or variable from a managed device. It allows the network management system to request specific information from the SNMP agent running on the device, such as the status of a particular interface or the amount of available memory.

    Rate this question:

  • 34. 

    (006) What operational simple network management protocol (SNMP) message is an unsolicited message from an agent to the manager?

    • Get

    • Set

    • Trap

    • GetNext

    Correct Answer
    A. Trap
    Explanation
    A Trap message is an unsolicited message sent from an agent to the manager in the Simple Network Management Protocol (SNMP). It is used to notify the manager about a specific event or condition that has occurred in the network. Unlike other SNMP messages like Get, Set, and GetNext, which are initiated by the manager to retrieve or modify information, a Trap message is sent proactively by the agent without any prior request from the manager.

    Rate this question:

  • 35. 

    (012) What type of malicious logic can form large networks that can be used to launch a variety of attacks without an information system owner’s knowledge?

    • Virus

    • Trojan horse

    • Worm

    • Bot

    Correct Answer
    A. Bot
    Explanation
    A bot is a type of malicious logic that can form large networks, known as botnets, without the knowledge of the information system owner. These botnets can then be used to launch various attacks, such as Distributed Denial of Service (DDoS) attacks, spamming, or stealing sensitive information. Bots typically infect a system by exploiting vulnerabilities or tricking users into downloading them, and once installed, they can be controlled remotely by the attacker. This allows the attacker to use the compromised systems to carry out their malicious activities without the owner's knowledge.

    Rate this question:

  • 36. 

    (001) What is a communications network that serves users within a confined geographical area?

    • Global area network (GAN)

    • Local area network (LAN)

    • Metropolitan area network (MAN)

    • Wide area network (WAN)

    Correct Answer
    A. Local area network (LAN)
    Explanation
    A local area network (LAN) is a communications network that serves users within a confined geographical area. It is typically used in homes, offices, or educational institutions. LANs provide high-speed connections and allow users to share resources such as printers and files. They are cost-effective and easy to set up and maintain. Unlike wide area networks (WANs) or global area networks (GANs), LANs have a limited coverage area and are designed for local use. Metropolitan area networks (MANs) cover a larger geographical area than LANs but smaller than WANs.

    Rate this question:

  • 37. 

    (002) What is the binary equivalent to the dotted decimal number 96?

    • 01100000

    • 01100110

    • 00001100

    • 10000001

    Correct Answer
    A. 01100000
    Explanation
    The binary equivalent to the dotted decimal number 96 is 01100000.

    Rate this question:

  • 38. 

    (002) What is the network id of internet protocol (IP) address 131.10.230.120/24?

    • 0.0.0.120

    • 0.10.230.0

    • 131.10.230.0

    • 255.255.255.0

    Correct Answer
    A. 131.10.230.0
    Explanation
    The network ID of an IP address is the portion of the IP address that identifies the network. In this case, the given IP address is 131.10.230.120/24. The /24 indicates that the first 24 bits of the IP address are the network ID. So, the network ID would be 131.10.230.0.

    Rate this question:

  • 39. 

    (018) What program is known as a state of the art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base?

    • Commercial-off-the-shelf (COTS)

    • Combat integrated systems

    • Theater deployable communications (TDC)

    • Integrated communications access package (ICAP)

    Correct Answer
    A. Theater deployable communications (TDC)
    Explanation
    The correct answer, Theater deployable communications (TDC), is a program that is known as a state-of-the-art ground-to-ground communications infrastructure designed to provide base level full spectrum communications to the commander and all agencies on base. This program is specifically designed to be deployable and can be set up quickly in theater environments to ensure effective and efficient communication among all personnel and agencies involved.

    Rate this question:

  • 40. 

    (001) How many users are in a multi-server network?

    • 2-10

    • 10-50

    • 50-250

    • 250-1000

    Correct Answer
    A. 50-250
    Explanation
    In a multi-server network, the number of users typically falls within the range of 50-250. This range indicates that the network is capable of accommodating a moderate number of users, making it suitable for small to medium-sized organizations. Having a larger number of users would require a more robust network infrastructure to ensure optimal performance and reliability. Conversely, a smaller number of users may not fully utilize the capabilities of a multi-server network. Therefore, the 50-250 range strikes a balance between scalability and efficiency.

    Rate this question:

  • 41. 

    (003) What Air Force instruction provides policy, direction, and structure for the Air Force global information grid (AF-GIG)?

    • AFPD 33-1

    • AFI 33-112

    • AFI 33-115v1

    • AFI 29-2603v2

    Correct Answer
    A. AFI 33-115v1
    Explanation
    AFI 33-115v1 provides policy, direction, and structure for the Air Force global information grid (AF-GIG). This instruction outlines the guidelines and procedures for managing and securing the AF-GIG, which is the Air Force's worldwide network of information systems. It establishes the roles and responsibilities of personnel involved in the operation and maintenance of the AF-GIG and ensures the proper handling and protection of sensitive information. AFI 33-115v1 is essential for maintaining the integrity and security of the Air Force's information infrastructure.

    Rate this question:

  • 42. 

    (007) What component of the systems management automated report tracking system (SMARTS) application contains knowledge of available domain managers?

    • Broker

    • Clients

    • Probes

    • Consoles

    Correct Answer
    A. Broker
    Explanation
    The correct answer is "Broker." In the systems management automated report tracking system (SMARTS) application, the broker component is responsible for maintaining knowledge of available domain managers. The broker acts as an intermediary between the clients and the domain managers, allowing clients to access and interact with the domain managers' resources. It helps in managing the communication and coordination between the different components of the SMARTS application, ensuring efficient and effective system management.

    Rate this question:

  • 43. 

    (009) The Air Force requires a network password to be at least how many characters long?

    • 6

    • 7

    • 8

    • 9

    Correct Answer
    A. 9
    Explanation
    The Air Force requires a network password to be at least 9 characters long. This ensures that the password is strong and secure, as longer passwords are generally more difficult to guess or crack. A longer password also provides a larger number of possible combinations, making it harder for unauthorized individuals to gain access to the network.

    Rate this question:

  • 44. 

    (012) What are examples of network attacks that bypass the firewall?

    • Identification spoofing and tunneling

    • Tunneling and application-based attacks

    • Second message encryption and identification

    • Application-based attacks and second message encryption

    Correct Answer
    A. Tunneling and application-based attacks
    Explanation
    Tunneling and application-based attacks are examples of network attacks that can bypass the firewall. Tunneling involves encapsulating one protocol within another to bypass network security measures. This allows attackers to hide their malicious activities and gain unauthorized access to the network. Application-based attacks target vulnerabilities in specific applications or services, exploiting them to gain access to the network. By targeting the application layer, these attacks can bypass the firewall's protection and compromise the network's security.

    Rate this question:

  • 45. 

    (012) A program that replicates by attaching itself to a program is a __________

    • Virus

    • Trojan horse

    • Worm

    • Bot

    Correct Answer
    A. Virus
    Explanation
    A program that replicates by attaching itself to a program is referred to as a virus. Viruses are malicious software that can infect other programs or files, causing damage or spreading to other systems. They often attach themselves to legitimate programs, allowing them to spread unnoticed and carry out their malicious activities. Unlike Trojan horses, worms, and bots, viruses specifically replicate by attaching themselves to other programs.

    Rate this question:

  • 46. 

    (014) What is an electronic document that officially links together a user’s identity with his public key?

    • Token

    • Public key

    • Private key

    • Public key infrastructure (PKI) certificate

    Correct Answer
    A. Public key infrastructure (PKI) certificate
    Explanation
    A Public Key Infrastructure (PKI) certificate is an electronic document that officially links together a user's identity with his public key. This certificate is issued by a trusted third-party called a Certificate Authority (CA) and is used to verify the authenticity of the user's public key. It ensures that the user's public key can be trusted and establishes a secure communication channel between the user and other parties.

    Rate this question:

  • 47. 

    (015) Which public key algorithm is exclusively a key establishment protocol?

    • Rivest-Shamir-Adleman (RSA)

    • Diffie and Hellman

    • Elliptic curve digital signature algorithm (ECDSA)

    • Elliptic curve Diffie-Hellman (ECDH)

    Correct Answer
    A. Diffie and Hellman
    Explanation
    Diffie and Hellman is the correct answer because it is exclusively a key establishment protocol. Diffie and Hellman algorithm is used to securely exchange cryptographic keys over an insecure communication channel. It allows two parties to establish a shared secret key without having to share any information beforehand. This key can then be used for symmetric encryption or other cryptographic operations. RSA, ECDSA, and ECDH are also public key algorithms, but they have other purposes such as encryption, digital signatures, and key agreement.

    Rate this question:

  • 48. 

    (018) Who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency?

    • Open system standards teams

    • Combat integrated system teams

    • Initial communications support teams

    • Sustained communications support teams

    Correct Answer
    A. Sustained communications support teams
    Explanation
    Sustained communications support teams are responsible for providing uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency. This means that they ensure that communication channels remain open and operational, allowing important information to be relayed effectively between different units. These teams are crucial for maintaining effective communication during contingency operations, ensuring that vital information is shared and received in a timely manner.

    Rate this question:

  • 49. 

    (001) What type of communications network links a broad geographical region?

    • Global area network (GAN)

    • Local area network (LAN)

    • Metropolitan area network (MAN)

    • Wide area network (WAN)

    Correct Answer
    A. Wide area network (WAN)
    Explanation
    A wide area network (WAN) is a type of communications network that connects a broad geographical region. Unlike local area networks (LANs) that are limited to a small area, WANs cover larger areas and can connect multiple LANs together. WANs are commonly used by businesses and organizations to connect their offices and branches across different cities or even countries. They provide a wide range of communication services, such as internet access, data sharing, and remote access. Therefore, the correct answer to the question is wide area network (WAN).

    Rate this question:

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 29, 2014
    Quiz Created by
    Henckel
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.