Term
|
Definition
| What layer of the Open System Interconnect model defines the electrical, mechanical, procedural, ad functional specifications for links between communicating network systems? |
|
|
Term
| Logical LInk COntrol and Media Access Control |
|
Definition
| The IEEE divide the OPen SYstem Interconnect Data Link Layers into what two sublayers? |
|
|
Term
|
Definition
| At what Open System Interconnect layer do network switches and bridges operate? |
|
|
Term
|
Definition
| At what Open System Interconnect layer do routers operate? |
|
|
Term
|
Definition
| At what open system interconnect layer are common data compression and encryption schemes used? |
|
|
Term
|
Definition
| What open system interconnect layer is closest to the end user? |
|
|
Term
|
Definition
| What is a formal set of rules and conventions that govern how computers exchange information over a network medium? |
|
|
Term
|
Definition
| What topology defines the layout of a network's devices and media? |
|
|
Term
|
Definition
| What topology defines the way in which devices communicate, and data is transmitted, throughout the network? |
|
|
Term
|
Definition
| What topology consists of devices connected to a common, shared cable? |
|
|
Term
|
Definition
| What topology consists of cable segments from each computer connected to a centralized component? |
|
|
Term
|
Definition
| What topology cobines two or more different physical topologies in a single network? |
|
|
Term
| Transport Control Protocol/Internet Protocol |
|
Definition
| Which network protocol has the DoD chosen as its standard to govern the flow of info? |
|
|
Term
| Address Resolution Protocol |
|
Definition
| What TCP/IP network layer protocol provides the services of matching a known IP address for a destination device to a Media Access Control address? |
|
|
Term
| Reverse Address Resolution Protocol |
|
Definition
| What TCP/IP network layer protocol provides the IP address for a device that knows its own MAC address? |
|
|
Term
| Internet Control Message Protocol |
|
Definition
| What TCP/IP network layer protocol provides messaging that can help with troubleshooting? |
|
|
Term
| Transmission Control Protocol |
|
Definition
| What TCP/IP transport layer protocol provides reliable data delivery services? |
|
|
Term
|
Definition
| What application within TCP/IP is used to send and receive files via TCP? |
|
|
Term
|
Definition
| WHat type of network connects networks that are typically separated by geographical distances between cities, states, countries, or around the world? |
|
|
Term
|
Definition
| What type of network makes use of tunneling and security protocols to enables a group of two or more computer systems to communicate over the public Internet? |
|
|
Term
|
Definition
| Which is a common port that contains HTTP servers and proxies? |
|
|
Term
|
Definition
| How many bits are in an IPv4 address? |
|
|
Term
|
Definition
| Instead of using binary, how are IPv4 addresses expressed to be more user-friendly? |
|
|
Term
|
Definition
| Using a range of 1-126 in the first octet of an IPv4 address, what class does it belong to? |
|
|
Term
|
Definition
| What IPv4 class address is used for networks with about 250 nodes? |
|
|
Term
|
Definition
| What IPv4 class address is used for multicast addressign? |
|
|
Term
|
Definition
| What IPv4 reserved address is used for loop back? |
|
|
Term
|
Definition
| What is a mechanism that allows a network device to divide an IP address into a network and host number? |
|
|
Term
|
Definition
| What is the default classful subnet mask on class B networks? |
|
|
Term
| Classles Inter-Domain Routing |
|
Definition
| What method borrows bits from the host field of an IP address to create a subnet? |
|
|
Term
|
Definition
| Instead of using binary, how are IPv6 addresses expressed to be more user-friendly? |
|
|
Term
| 1234:1234:0:0:1234:0:0:1234 |
|
Definition
| What notation is expressed in leading zero compression for IPv6? |
|
|
Term
|
Definition
| What notation is expressed in zero compression for IPv6? |
|
|
Term
|
Definition
| What Unicast address scope operates within a network segment, and will not originate from or be destined to an interface that requires a router to direct traffic? |
|
|
Term
|
Definition
| What Unicast address scope is designed to be private, internally routable adresses that do not route outside the site? |
|
|
Term
|
Definition
| What Unicast address scope is publicly accessible with the Network ID portion of the address borken up into different areas allowing for hierarchical design and allocation? |
|
|
Term
|
Definition
| The computing part of the computer is the central processing unit, also called the: |
|
|
Term
| Control unit and arithmetic logic unit |
|
Definition
| What two main components make up the central processing unit? |
|
|
Term
|
Definition
| What is the type of memory that retains data after power is removed or lost? |
|
|
Term
|
Definition
| Which landline transmission medium is the primary carrier of voice comm? |
|
|
Term
| transmitter, cable, and receiver |
|
Definition
| An optical comm system is comprised of a: |
|
|
Term
|
Definition
| Which of the following is not one of the three advantages to using wireless tech? |
|
|
Term
|
Definition
| THe ability to move about without being tethered by wires in wireless tech is called: |
|
|
Term
|
Definition
| Which of the following is not one of the four security threats to WLAN? |
|
|
Term
|
Definition
| Who is an authorized client that may unknowlingly or maliciously help outside parties gain access to a network? |
|
|
Term
| Institute of Electrical Electronics Engineers |
|
Definition
| What organization develped several wireless standards to meet the demands of security, speed, and flexibility of today's wirelss networks? |
|
|
Term
|
Definition
| How many peripherals can a Universal Serial Bus handle at once? |
|
|
Term
|
Definition
| HOw many devices can connect to a FireWire bus? |
|
|
Term
|
Definition
| What do you apply across LCD material to change the alignment and light polarizing property? |
|
|
Term
|
Definition
| What is a Datalink layer network device that logically separates a single network into two segments or collision domains in Ethernet networks? |
|
|
Term
|
Definition
| What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment? |
|
|
Term
|
Definition
| This type of bridge is used to convert one Data LInk layer protocol to another: |
|
|
Term
|
Definition
| What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery? |
|
|
Term
|
Definition
| What forwarding method is alos known as runtless switching? |
|
|
Term
|
Definition
| What layer of the OSI model do routers operate? |
|
|
Term
|
Definition
| What do routing algorithms initialize and maintain to aid the process of path determination? |
|
|
Term
|
Definition
| Which of these is an example of an Exterior Gateway Protocol? |
|
|
Term
|
Definition
| Dynamic routing automatically calcualtes the best path between how many nodes? |
|
|
Term
|
Definition
| What encryption device may you rarely see due to its lower maximum data rate? |
|
|
Term
|
Definition
| What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits? |
|
|
Term
|
Definition
| What encryption device is capable of loading up to 500 keys? |
|
|
Term
| classified as soon as the key is loaded, and holds the classification of the loaded key |
|
Definition
| The classification of a fill device is: |
|
|
Term
| digital data onto an analog carrier for transmission over an analog medium |
|
Definition
| A modem is a device that modulates: |
|
|
Term
|
Definition
| Analog modems are used over the voice band range of: |
|
|
Term
| adapt the digital data stream produced by the customer euipment to the signaling standards of the telephone carrier equipment |
|
Definition
| The main function of the Data Service Unit is to: |
|
|
Term
| systems software, operating systems software, and applications software |
|
Definition
| Software is generally divided into: |
|
|
Term
|
Definition
| Which one is not a category of the operating ystem's task categories? |
|
|
Term
|
Definition
| The path between the os and virtually all hardware not on the computer's motherboard goes thorugh a special program called a |
|
|
Term
|
Definition
| The core operating-system function is the management of the computer system which resides with the: |
|
|
Term
|
Definition
| Applications are software programs designed to perform what type of tasks? |
|
|
Term
|
Definition
| What are two anti-virus programs that the air force uses? |
|
|
Term
|
Definition
| Windows OS systems traditionally function in one of two network models. Which model does not operate using centralized user accounts? |
|
|
Term
|
Definition
| Which system provides support for features such as Windows System Resource Manager and Metadirectory Services? |
|
|
Term
|
Definition
| One of the Windows Server Editions operating systems provides support for high-end, hig traffic applications servers. Which Operating system is it? |
|
|
Term
|
Definition
| What was the first disk operating system developed to operate on a wide range of computer systems? |
|
|
Term
|
Definition
| What is the name of the standard all-purpose shell most commonly used? |
|
|
Term
|
Definition
| What directory is always identified by the slash symbol (/) and is in the "a" partion? |
|
|
Term
|
Definition
| Which pathnames begin at the current working directory? |
|
|
Term
|
Definition
| This component of the GIG consists of those items that are necessary to directly connect the warfighter to the global network: |
|
|
Term
|
Definition
| This characteristic of the GIG ensures seamless transmission of info between different service brances |
|
|
Term
| The service that owns the installation |
|
Definition
| Who bears the responsibility for maintenance of the sustaining base portion of the Defense Information System Network? |
|
|
Term
|
Definition
| Which segment of the DISN may be a person in the deployed Area of Responsibility or a person sitting in a fixed location thousands of miles from combat? |
|
|
Term
| Interconnected via the Defense Information Systems Agency Asynchronous Transfer Mode network |
|
Definition
| What is the difference between a hub router and a premise router? |
|
|
Term
| Encapsulated by the internet protocol before being transmitted across the SIPRNET |
|
Definition
| How are non-internet protocols sent across the SIPRNET? |
|
|
Term
|
Definition
| Which is an internet protocol encryption device that can be directly connected to Red local area networks? |
|
|
Term
|
Definition
| What provides conduit for JWICS data transmission from one location to another? |
|
|
Term
|
Definition
| What concerns slowed the military's adoption of wireless network tech? |
|
|
Term
| Integrating traditional TDM switches with voIP systems |
|
Definition
| What is the first step in merging voice, data and video networks into one integrated network within the air force? |
|
|
Term
| Eliminating the MAJCOM NOSC concept and integrating the functions into two Integrated NOSCs |
|
Definition
| Besides limiting connections to the GIG, what other Combat Information Systems initiative will help increase network security? |
|
|
Term
| Defense Information SYstems Agency |
|
Definition
| Which organization is responsible for the design, acquisition, and single systems management of the DSN? |
|
|
Term
| The DSN offers precedence accesss thresholding |
|
Definition
| How is responsiveness provided in teh DSN? |
|
|
Term
|
Definition
| What type of Defense Switched Netwok precedence call cannot be preempted? |
|
|
Term
|
Definition
| What is the maximum asynchronous data rate for the Defense Red Switch Network |
|
|
Term
|
Definition
| While you are using the Red Switch, what feature lets you know that you have dialed the correct number at the proper level of security |
|
|
Term
| To provide a foxhole to National Command Authority link for commanders |
|
Definition
| What is the purpose of the standardized tactical entry point terminal |
|
|
Term
|
Definition
| The Global Positioning System program is responsible for maintaining GPS time to within how many seconds of universal time code? |
|
|
Term
|
Definition
| Which security program is covered under AFI 10-701 |
|
|
Term
|
Definition
| Providing a list of where and why the information will be disclosed outside the DOD best describes which mandatory item of a Privacy Act Statement |
|
|
Term
|
Definition
| What form is used s a cover sheet to protect Privacy Act material |
|
|
Term
|
Definition
| Guidance for posting information on Air Force web sites is outlined in |
|
|
Term
|
Definition
| Official giuidance on individual security clearances and permitting access to classified information can be found in |
|
|
Term
| sensitive but unclassified |
|
Definition
| Disclosure of information that would result in the loss, misuse, modification or unauthorized access that might adversely affect national security would best be described as |
|
|
Term
| Detect and correct procedural weaknesses that could expose critical information |
|
Definition
| What is the COMSEC program designed to do |
|
|
Term
|
Definition
| What reference would you use for guidance on Air Force messaging |
|
|
Term
|
Definition
| Which form is used with a transfer report to accompany a COMSEC package |
|
|
Term
|
Definition
| Which form is used as a visitor register log to record visitors into restricted areas |
|
|
Term
|
Definition
| An uninvestigated or unevaluated occurrence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC |
|
|
Term
|
Definition
| Which organization assigns communication security incident report case numbers |
|
|
Term
| 30 days after the initial report is signed |
|
Definition
| Final reports of a communication security incident are due |
|
|
Term
|
Definition
| The Air Force Information Assurance Program is detailed in |
|
|
Term
|
Definition
| Which applied discipline applies measures and controls to protect data in computer systems against unauthorized, disclosure, modification, or destruction |
|
|
Term
|
Definition
| What best describes an unintended signals or noise appearing external to a piece of communications equipment |
|
|
Term
| Telecommunications Electronic Material Protected from Emanating Spurious Transmissions |
|
Definition
| An unclassified term referring to technical investigations for compromising emanations from electrically operated data processing equipment is known as |
|
|
Term
|
Definition
| Which condition exists when there is no apparent terrorist activity against computer networks |
|
|
Term
|
Definition
| Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present |
|
|
Term
|
Definition
| When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected |
|
|
Term
|
Definition
| Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication |
|
|
Term
|
Definition
| At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globally managed |
|
|
Term
|
Definition
| At what level do regional operation centers perform Network Operations(NETOPS) to ensure operational and administrative control by implementing Systems and Netowkr Management Information Assurance/Network Defense (IA/NetD), and Information Dissemination Management |
|
|
Term
|
Definition
| An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as |
|
|
Term
|
Definition
| Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts |
|
|
Term
|
Definition
| Which form would you use to properly label removable storage media containing "confidential" information |
|
|
Term
|
Definition
| Which of the following security programs is defined as a process of identifying critical info and subsequently analyzing friendly actions attendant to military ops and other activities? |
|
|
Term
|
Definition
| Which resources designated priority is provided when the leel of security requires a significant degree of deterrence against hostile acts? |
|
|
Term
|
Definition
| Directly connects the warfighter and their combat platforms to the global network. |
|
|
Term
|
Definition
| Warfighter uses this for the transmission of their information. The conduit by which the warfighter critical info can make it to and from the warfighter. |
|
|
Term
|
Definition
| Consists of hardware and software systems, support, and storage that enables info processing. Ex. Base email, web services, and file storage servers. |
|
|
Term
|
Definition
| Provide info transport service to all DOD users. |
|
|
Term
|
Definition
| The mortar between the component bricks in the GIG, keeps the warfighter connected to the foundation. Info Assurance is a key aspect for this. |
|
|
Term
|
Definition
| Conrtols and prioritizes info through its entire life cycle, from formation through processing, dissemination, use, storage, and disposition. Ensure integrity of info that is available. |
|
|
Term
|
Definition
| Consists of standards, plicies, doctrines, and architecture that create what is acceptable for the DOD network. |
|
|
Term
|
Definition
| THis characterisitic defines the necessary coordination and cooperation of supporting and supported comanders in relation to the NETOPS of the GIG |
|
|
Term
| Common policies and standards |
|
Definition
| The only way to ensure seamless transmission of info between different service branches, systems and applications. |
|
|
Term
| Global authentication, access control, directory services |
|
Definition
| Allows for any and all authorized users to log in and gain access to DOD info, applications, and sercices based on their clearance and access level as long as they have common and portable identity credentials. |
|
|
Term
|
Definition
| Allows DOD forces and our mission partners access to the info they require for mission accomplishment. |
|
|
Term
|
Definition
| GIG users across the DOD are able to seamlessly connect to the applications, systems, and services offered by the GIG. Architecture is common through the network. |
|
|
Term
|
Definition
| Three data networks that comprise the major data backbone of DISN. |
|
|
Term
| Defense Switched Network, Defense Red Switch Network |
|
Definition
| Two DOD standard telephone networks for DISN: |
|
|
Term
| GCCS, GCSS, JWICS, DCGS, TBMCS |
|
Definition
| C4I networks include what? |
|
|