Weak test questions
Terms
undefined, object
copy deck
- What is the first logical step in network troubleshooting?
- Define the main problem.
- What is the maximum time between Emergency Action Plan exercises at COMSEC responsibility officers' accounts?
- 6 months.
- What part of the CPU does all the computing?
- ALU.
- The IEEE 802.5 standard was developed to cover what LAN topology?
- Token ring.
- What diagnostics command is used exclusively on Windows NT machines?
- Ipconfg
- What factor about the Linuxâ„¢ operating system is demonstrated by each new version of the operating system being rapidly viewed and tested by thousands of programmers world wide?
- Reliability
- Which class of certification requires the user to personally appear before a Certificate Management Authority (CMA), and present two forms of identification or credentials?
- 4.
- What UNIXâ„¢ command displays a list of the login names of users logged onto the system, along with the user's complete name?
- finger.
- What is one of the most common types of hardware devices used for network troubleshooting?
- Loopback plug.
- What training aid allows you to do training in-house on all the functions in the information's systems flight?
- QTPs.
- What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?
- Standard mask.
- What type of network problem(s) is caused by collisions on the domain?
- High utilization or jabbers
- Who is the Air Force focal point for design and construction of facilities containing radio frequency interference (RFI) and electromagnetic interference (EMI) shielding?
- HQ USAF/ILE.
- What type of optic fiber is used to span extremely long distances?
- Single mode.
- To create a digital signature, the private-key cryptography operation requires
- a fixed-size input and computes a fixed-size output.
- What ASIM vulnerability category is a probing attack in the form of a Finger probe, FTP breakout, anonymous FTP, Telnet breakout or RFC?
- Category IV.
- Who issues a COMSEC incident a case number and determines when to close the case?
- Air Force Communications Agency (AFCA).
- What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?
- Vulnerability scanners
- In what step of the Barrier Reef process do you start a Base Network Steering Group?
- Determine requirements
- Resource protection program reviews are often accomplished by
- unit controlled area monitor.
- Operations Security (OPSEC) weaknesses tend to fall into what three broad categories?
- Operations, administrative, and communications.
- How many different categories of information does the performance monitor provide you about your network?
- 21.
- What is a web-based process that incorporates identification and evaluation of new vulnerabilities disseminates technical responses and tracks compliance within the DoD community?
- IAVA.
- How many users are in a multi-server network?
- 50-250.
- In what type of key cryptography are keys so different, that it would be possible to publicize one without danger of anyone being able to derive or compute the other?
- Asymetric cypher.
- Which form can be considered a daily physical security inventory of your environment?
- SF701.
- From what level can all other command modes be accessed?
- Privileged Exec level.
- In which layer of the OSI model do you find database management programs and electronic mail?
- Application.
- What is used as a segment disposition record of accessed and destroyed multiple keytape?
- AFCOMSEC Form 22.
- When a volume is formatted with NTFS, what group is automatically assigned full control permission to the volume?
- Everyone group.
- At what layers of the OSI model do switches work?
- Data link and network.
- What network policy is a combination of user and computer settings that control a user's working environment?
- System policies
- Who do you notify upon finding an improperly marked classified document?
- Unit security manager.
- In what Windows NT System directory is the profiles directory located?
- WINNT_ROOT
- Most bases require a network password to be at least how many characters long?
- 8
- Recertification/Accreditation on systems with no changes to the baseline are accomplished at a maximum of
- 36 months.
- What memory stores things like the current time and date, type and number of disk drives, and the total amount of memory available to the CPU?
- CMOS.
- In what category does a programming language fit that operates by a sequence of commands and changes the value of data elements?
- Imperative language.
- What does Network Security work to ensure about a network?
- Availability, confidentiality and integrity of data.
- The element of communications security (COMSEC) resulting from applying all available measures designed to protect information systems traffic from interception and exploitation is
- transmission security.
- Network management protocols are designed (in most cases) to reside above what layer of the OSI model?
- Session
- The minimum amount of time required to gain job experience before attending 7-level school is
- 18 months.
- The term used when referring to specific COMSEC material (other than equipment) is COMSEC
- aids.
- When was the present Operations Security (OPSEC) program established?
- 1970.
- Disposition records and/or destruction reports are not required for material that has been issued to
- transient aircrews.
- Where are original SF 153 hand-receipts maintained?
- COMSEC manager's replica of the CRO's 6-part folder.
- What does a station specifically send when it sends a general request through the network asking any station to respond in order to receive the token?
- Solicit successor frame.
- On the SF-153 is the transfer voucher number is placed in block number
- 4.
- Who handles the day-to-day operations of the base (Communications Sq) account?
- COMSEC accountants.
- What operational SNMP message is used to modify the value of one or more instances of management information?
- Set
- What type of switch reads the first 64 bytes before forwarding the frame?
- Fragment free.
- What are the months of responsibility for Air and Space Expeditionary Forces 9 and 10?
- Sept through Nov.
- What action identifies options for minimizing the effects of detected or predicted faults?
- Fault correction
- What form do we use to annotate storage media has been sanitized?
- Standard Form 711.
- What software program protects classified data by erasing it from the disk so that it is unrecoverable?
- WIPEINFO
- What routing stability feature is used to prevent regular update messages from inappropriately reinstating a route that has gone bad?
- Hold downs.
- What prevents a router from sending route information back to the router from which it came?
- Split horizons.
- What layer in the OSI reference model adds a trailer to the packet?
- Data link layer.
- What do we call a set of subnets that are connected with routers?
- Internetwork.
- In most cases the frequencies used by wireless networks are in what frequency band?
- ISM.
- Who assists organizations in obtaining new communications and information capabilities through equipment purchases?
- Communications and information systems officer (CSO).
- What is the last step in file management?
- Archiving files.
- What is measured to determine the level of network service provided to the users?
- The total response time, rejection rate, and availability of the network.