3D0X2 EOC VOL 1 vs.1

Is this your test? Login to manage it. If not, you can generate a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
The _________ provides for the ability to search for individuals, access information about them such as what their work phone number is or what their e-mail address is. 2-30
2.
1 point
Which network may have a thousand or up to tens of thousands of users with a hundred thousand devices on the network and is often geographically dispersed but remains under the management of one organization?
3.
1 point
The signing operation and verification operation are both a:
4.
1 point
The ___________ program is a state-of-the-art ground communications infrastructure designed to provide deployed units with the same type of communications tools as their home station.
5.
1 point
Each IP address is divided into three different and unique fields. What are the 3 fields?
6.
1 point
Which of the following provides reliable, secure networks and network services for base-level customers?
7.
1 point
How old is concept of local area networks (LAN)?
8.
1 point
Determining IP address ranges is nothing more than figuring out the____ useable IP address to the ____useable address.
9.
1 point
What can be used in place of the standard mask?
10.
1 point
What is the base two number system that computers use to represent data?
11.
1 point
What is the earliest public-key algorithm which is exclusively a key establishment protocol? 2-26
12.
1 point
The two basic components of PKI are: 2-30
13.
1 point
There are very few companies, if any, that have _________ networks.
14.
1 point
This is the act of implementing a different subnet mask on virtually every subnet on your network
15.
1 point
The term network scalability refers to
16.
1 point
What are the two types of overwriting products used?
17.
1 point
In SMARTS, what uses the correlation model and the topology to build the codebook automatically?
18.
1 point
________ is used to effectively manage the waste of IP addresses on your network.
19.
1 point
IPv6 is ____ bits long and IPv4 is ____ bits long
20.
1 point
A(n)______network is a private network whose access is generally restricted to authorized persons.
21.
1 point
Normally certificates are set to expire after _______ years.
22.
1 point
A private key operation: 2-24
23.
1 point
Which two are operation modes of a protocol analyzer?
24.
1 point
What type of incident is it when an attacker disables a system or a worm saturates network bandwidth?
25.
1 point
The physical path through which computers send and receive signals is called the ______________.
26.
1 point
What is defined as a measure used to verify the eligibility of a subject and the ability of the subject to access certain information?
27.
1 point
What enables users of basically unsecured public networks, such as the internet, to securely and privately exchange data
through the use of public and private cryptographic key pairs obtained and shared through a trusted authority?
28.
1 point
What is the Air Forces database of record for registering all systems and applications as required by public law and DOD directives?
29.
1 point
Which of these establishes Air Force COMPUSEC requirements for IA?
30.
1 point
______ is a collection of networks under common administration that share a common routing strategy.
31.
1 point
A _____________ is responsible for the actual validation of certificates. 2-27
32.
1 point
Which protocol is used to manage applications such as SMARTS & CiscoWorks?
33.
1 point
Threats and vulnerabilities can be: 2-14
34.
1 point
The Institute of Electrical and Electronic Engineers (IEEE) has defined a standard for MANs
called _____________.
35.
1 point
IPv6 uses which kind of notation?
36.
1 point
Fingerprint and retina scanners are examples of what kind of authentication?
37.
1 point
Which of the following is NOT a drawback of symmetric ciphers?
2-21
38.
1 point
In general terms,___________ is software that sits between one thing and another to allow communication between the two. 2-31
39.
1 point
The _______ field represents bits taken from the available host bits that have been used to divide the network into smaller “networks”.
40.
1 point
What is a communications network that serves users within a confined geographical area?
41.
1 point
What is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security policy, including personnel and physical security?
42.
1 point
What is not typically in a DMZ?
43.
1 point
An SNMP agent uses what to receive and transport messages?
44.
1 point
What is the Air Force minimum password requirements according to AFMAN 33–223, Identification and Authentication?
45.
1 point
__________ teams are part of the first support teams to enter a deployed location because communications are paramount
2-34
46.
1 point
_________is used to uniquely identify all nodes that need to participate in internetworking.
47.
1 point
Because of the inherent inefficiency of the address classes, in 1993 a new system was introduced
called ________.
48.
1 point
What are the two independent network types that TDC-ICAP provides? 2-36
49.
1 point
Which of these is not a functional area of network management?
50.
1 point
What collects information from a variety of system and network sources, analyzes the information stream for signs of misuse or intrusion, and reports the outcome of the detection process?
51.
1 point
Which of the following networks would be best for 50 – 250 users?
52.
1 point
Name the two main components of SMARTS.
53.
1 point
Which of the following is not a component of the TDC program?
54.
1 point
1) Which of the following is a heterogeneous network?
55.
1 point
The key to successfully using a Variable Length Subnet Mask is…?
56.
1 point
In regards to deployments, the warning order tells you: 2-40
57.
1 point
Electronic signals using electric currents, radio waves, microwaves, or light-spectrum energy from the electromagnetic spectrum represent network data as ______________.
58.
1 point
A _________ is a network that spans a larger geographic area than a LAN, but a smaller geographic area than a WAN?
59.
1 point
What is the Air Force instruction series that covers communications-computer networking and information management?
60.
1 point
Which of the following is NOT an SNMP message?
61.
1 point
What are the two hierarchies in the SMARTS Common Information Model (CIM)?
62.
1 point
With an enterprise network, you typically have how many users?
63.
1 point
Which of the following refers to a group of computers that have been infected by bots under the control of a person or group? 2-15
64.
1 point
The transformation of cipher text to plain text is called: 2

2-21
65.
1 point
The NCC-D is used in:
66.
1 point
In what era was the minicomputer produced reducing prices and enabling departments to have their
own computers?
67.
1 point
Which of these is not a PRIMARY WAY to authenticate oneself on a network?
68.
1 point
If greater phone capacity is needed and adding more BAMs would not be cost effective, then a __________ can be added to increase the capacity. 2-36
69.
1 point
What is the simplest and least expensive type of firewall, which stops messages with inappropriate network addresses? Page 2-12
70.
1 point
Maintaining the secure access points is an example of
71.
1 point
Who can revoke certificates? 2-25
72.
1 point
CIDR distributes addresses through the technique of ___________. NLM
73.
1 point
What is a principle of network management?
74.
1 point
______________ architecture has a NM platform on one computer system at a location that is responsible for all network management duties
75.
1 point
A(n) ______network is a set of networks that are connected with routers.
76.
1 point
A digital signature fundamentally relies on the concept of:
2-23
77.
1 point
Information security-related access controls fall into which two categories? 2-13
78.
1 point
What is the DOD process for identifying, implementing, validating, certifying, and managing IA
capabilities and services, which are expressed as IA controls, and authorizing the operation of DOD
information systems in accordance with statutory, federal, and DOD requirements, C&A systems and networks for connection to the GIG?
79.
1 point
(004) What is defined as a bundle of application software designed to significantly improve network efficiency and productivity?
80.
1 point
_____________ is the process of identifying, locating, and correcting network problems
81.
1 point
What allows routers to move packets on more quickly?
82.
1 point
What does the Get operation do?
83.
1 point
Initial communications support is designed to provide basic communications to a bare base operation within ________ hours of deployment notification and remain in place for up to 30 days. 2-34
84.
1 point
What type of networks are still designed for a relatively small number of people (10-50 users), with one server managing network access, security, file storage, e-mail, web surfing, and all other needs
85.
1 point
______________ network environments consist of components from the same vendor or compatible equipment that all run under the same OS or network operating system.
86.
1 point
With a ____________ network, you have more than one server supporting (50-250 users), often with each server serving a specialized purpose?
87.
1 point
With a _____________ network, you have multiple servers as above but different
parts of the network may be located in different areas, such as different buildings connected by a central connection.
88.
1 point
What are the two ways in which vulnerability scanners identify weaknesses in a network? 2-13
89.
1 point
Initial communications support is designed to provide basic communications to a bare base operation within 24 to 72 hours of deployment notification and remain in place for up to ________ days. 2-34
90.
1 point
The __________ field represents that portion of an IP address that identifies the specific network from which the address belongs.
91.
1 point
The AN/TSC–152 trailer configuration contains all of the following equipment groups or subgroups EXCEPT: 2-35
92.
1 point
The __________ is the device used to carry your certificates and keys around. 2-29
93.
1 point
The use of prescribed safeguards and controls to prevent reconstruction or disclosure of sensitive or
classified information to persons who do not have the proper clearance or need to know for this
information is defined as:
94.
1 point
The biggest single reason for IPv6 being implemented is that with IPv4, there are a limited_______ available
95.
1 point
What is an access control mechanism that acts as a barrier between two or more segments of your network or overall
information technology (IT) architecture (2-11)
96.
1 point
What is designated as the primary unclassified PKI token for individual PKI keys and and certificates in the Air Force? 2-30
97.
1 point
Smelting a hard drive is an example of:
98.
1 point
_____________ is a legacy internet addressing system with a limited number of addresses.
99.
1 point
A ____________ is a network composed of different interconnected computer networks that cover an unlimited geographical area
100.
1 point
The ICAP is compatible with local phone systems worldwide through the commercial ______, which provides voice interoperability worldwide
101.
1 point
In which step of the DIACAP process is the system in actual operation and the IA controls must be reviewed at least annually, and if there is a significant change, the approval process must be re-initiated?
102.
1 point
How would you write 57 in binary?
103.
1 point
There are two types of nodes in a MIB tree structure, what are they?
104.
1 point
What is a communications network that serves users within a confined geographical area?
105.
1 point
A ___________ is a data communications network that serves users across a broad geographic area and often uses transmission devices provided by common carriers
106.
1 point
You are issued your CAC through the DOD Identification Card System based on information in the: 2-30
107.
1 point
Set operation:
108.
1 point
The transformation of plain text to cipher text is called: 2-21
109.
1 point
Which of the following can a firewall NOT do? (2-12)
110.
1 point
What are the two types of SNMP nodes?
111.
1 point
In the following example, identify the host portion of the ip address:
IP – 106.18.57.237
Subnet Mask – 255.255.0.0
112.
1 point
What is 2011:0db8:0000:0000:0000:0001:1428:5f9b an example of?
113.
1 point
A typical certificate normally contains all of the following information except:
114.
1 point
What is a hierarchical, structured format that defines the NM information available from network devices?
115.
1 point
Worms are similar to viruses with the exception that:
116.
1 point
SMARTS ________ are applications that provide a means of communication between a domain manager and the networked system
117.
1 point
Within SMARTS, which console allows you to enable an administrator to manage the broker server?
118.
1 point
This notation is used by internet protocol 4 (IPv4) to represent a binary IP address into a more user friendly representation.
119.
1 point
An intranetwork is ?
120.
1 point
What is the framework and services that provide for the generation, production, distribution, control, accounting, and destruction of public key certificates? P-2-29
121.
1 point
(004) What network architecture has a network management platform on one computer system at a location that is responsible for all network management duties?
122.
1 point
The ________________ concentrates multiple signals into one signal for more efficient transmission of data. Additionally it will take an incoming signal and separate it into separate lines to transmit it to separate destinations.
123.
1 point
In asymmetric ciphers, you can: 2-22
124.
1 point
What type of networks are used for a small number of systems (2-10 users), with no server and each integrated system interfacing directly with the other IS?