This site is 100% ad supported. Please add an exception to adblock for this site.

Weak questions #2

Terms

undefined, object
copy deck
What are network attacks that bypass the firewall?
Tunneling and application based attacks.
Areas of consideration for network planning include the
Licensing mode
Under what class of ESD would an item fall if it was sensitive to 900 volts?
1
After the system completes the Power-on self-test, what happens next?
The master boot record is loaded and executed.
What Windows NT line command is used to manually collect interface statistics on a particular network node?
netstat
What Unix line command is used to manually collect interface statistics on a particular network node?
rnetstat.
ESD items sensitive to more than 4000 but less than 15,000 volts fall into category
3
Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
100 miles
In what type of key cryptography are keys so different, that it would be possible to publicize one without danger of anyone being able to derive or compute the other?
Asymetric cypher.
What type of network server is dedicated to an intensive application or database
Member servers
What NCC function remotely performs the functions and duties of a DCS Primary Systems Control Facility, a patch and test facility and a DCS switching center when it is technically and economically feasible?
Configuration management.
What is the third logical step in troubleshooting?
Resolve the problem.
What is the primary device used for connecting these networks, both within and between networks?
Routers
What are the network connections through which network traffic enters and exits a router called?
Interfaces.
Who is the approval authority for primary COMSEC responsibility officer (CRO) grade waivers?
The COMSEC manager.
What do you type to change to the Bourne shell?
sh
AF Forms 1109 are destroyed after
90 days.

Deck Info

17

permalink