CDC EOC combined vs 1

Is this your test? Login to manage it. If not, you can generate an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
(227) While using UNIX vi to edit a file, what would you enter to save the buffer contents and stay in same file
2.
1 point
(010) What is the process of physically damaging the media to render it unusable in a computer and render the data on the media irretrievable by any known exploitation methods?
3.
1 point
(221) Which UNIX shell is the most compact and is often used for writing shell scripts?
4.
1 point
(203) What is an advantage of using a storage area network (SAN) architecture?
5.
1 point
(012) What is the simplest and least expensive way to stop inappropriate network addresses?
6.
1 point
The ICAP is compatible with local phone systems worldwide through the commercial ______, which provides voice interoperability worldwide.
7.
1 point
(003) What Air Force instruction provides policy, direction, and structure for the Air Force global
information grid (AF-GIG)?
8.
1 point
A _____battery is used to maintain the CMOS settings when power is removed from the computer. 1-2
9.
1 point
(011) What is a comprehensive evaluation and validation of an Air Force information system (IS) to establish the degree to which it complies with assigned information assurance (IA) controls based on standardized procedures?
10.
1 point
(011) What is the database of record for registering all systems and applications?
11.
1 point
(223) The /dev/dsk and /dev/rdsk directories are subdirectories of which directory?
12.
1 point
(225) Which UNIX command sets access and modification times for each file to the current time?
13.
1 point
(006) Network management protocols are designed (in most cases) to reside above what layer of the operational system interface (OSI) model?
14.
1 point
(011) What do you call the consolidated list of requirements that a program office must adhere to when fielding a system?
15.
1 point
(008) What provides information concerning the network utilization and frame errors that are related to a specific protocol?
16.
1 point
_______is a data integrity method that is used in high-end PCs and file servers
17.
1 point
What is the minimum number of computers needed for a computer network?
18.
1 point
During the computer boot-up process, the computer______ its bytes of memory
19.
1 point
A ______ query is when a name can’t resolve a query, so it asks other name servers until it gets the answer. 2-15
20.
1 point
(004) What level of network management activity are you working at when the automated monitoring of components provides problem analysis, giving a root cause alarm for the problem at-hand?
21.
1 point
(224) Which UNIX command deletes files from within a directory?
22.
1 point
(221) Which UNIX component provides a logical way to organize, store, retrieve, manipulate, and manage data
23.
1 point
__________ is a container object to organize your domain and build your hierarchical domain structure. Page 2-3
24.
1 point
This is a gigabit network technology primarily used for storage networking
25.
1 point
(002) How many bits are typically covered in an internet protocol version 6 (IPv6) subnet mask?
26.
1 point
Risk Management identifies three main classifications of threats: Natural, Human, and _______.
27.
1 point
(205) Which is not a characteristic of high-order languages?
28.
1 point
The difference between differential & incremental backups are:
29.
1 point
There are ____ core DNS server clusters located world-wide which form the upper most layer of the DNS namespace.
30.
1 point
(006) What simple network management protocol (SNMP) node is responsible for monitoring, collecting and reporting management data to the management system?
31.
1 point
(223) What does the 0 following the c in the device name c0t6d0s7 represent?
32.
1 point
The __________ is the device used to carry your certificates and keys around 2-29
33.
1 point
(208) Which numbering system characteristic is the leftmost non-zero digit of a numeric value?
34.
1 point
(007) What component of the systems management automated report tracking system (SMARTS) application contains knowledge of available domain managers?
35.
1 point
(013) What is a cryptographic key and certificate delivery system that makes possible secure electronic transactions and exchanges of sensitive information between relative strangers?
36.
1 point
What feature of UNIX allows many users to work on the same computer system at the same time by sharing the computer’s resources?
37.
1 point
(218) When a new folder or file is created on a new technology file system (NTFS) partition, what permissions are automatically assigned?
38.
1 point
(228) What is the most common UNIX windows system?
39.
1 point
(012) What type of malicious logic can become active on an information system without the need to infect a file?
40.
1 point
(006) What operational simple network management protocol (SNMP) message is used to modify the value of one or more instances of management information.
41.
1 point
Using a ___________ setup the application is shared between two users and would normally be located on the hard drive. NLM
42.
1 point
The _____________ used today always start with iso.org.dod.internet (1.3.6.1).
43.
1 point
A __________ is usually a program created by Microsoft to quickly fix or patch a particular problem with one of their software products. 2-13
44.
1 point
The _____shell, which is a surrogate of the Bourne shell that allows you to edit the command, line.
45.
1 point
(228) Which UNIX default command starts the X windows system?
46.
1 point
(014) Which component of the public key infrastructure (PKI) is responsible for establishing, authenticating, maintaining, and revoking certificates?
47.
1 point
Disk drive speeds are measured in ______ 1-2
48.
1 point
What publication specifically provides for a discussion of the known threats and vulnerabilities associated with clearing, sanitizing, and destroying storage media; procedures for clearing storage media and restriction on the cleared media’s reuse; and procedures for sanitizing storage media and other components?
49.
1 point
If greater phone capacity is needed and adding more BAMs would not be cost effective, then a __________ can be added to increase the capacity 2-36
50.
1 point
Unlike the parity method, the ___________ method can both detect and correct errors.
51.
1 point
What is the Air Force minimum password requirements according to AFMAN 33–223, Identification and Authentication? 2-2
52.
1 point
_____ is a powerful tool that allows multiple sites, domains, and even the Internet to fully integrate together. 2-2
53.
1 point
(211) Where does a copy of the active directory database reside?
54.
1 point
What is defined as a measure used to verify the eligibility of a subject and the ability of the subject to access certain information? 2-1
55.
1 point
The_______ controls many important functions for the central processing unit (CPU) 1-1
56.
1 point
In regards to deployments, the warning order tells you: 2-40
57.
1 point
(002) What is the network id of internet protocol (IP) address 131.10.230.120/24?
58.
1 point
(007) What is the type of probe that collects inter-device connectivity information using proprietary topology management information bases (MIB)?
59.
1 point
In general terms,___________ is software that sits between one thing and another to allow communication between the two. 2-31
60.
1 point
What is a feature of networking that enables individuals to designate resources they want other users to be able to access through the network? 2-35
61.
1 point
What is a communications network that serves users within a confined geographical area? 001
62.
1 point
A __________ ip address does not change once it is set 2-11
63.
1 point
(209) What should each organization have that spells out which systems are prioritized in what order for the basis of protecting those systems from disasters?
64.
1 point
(212) Sitting at a computer and loading a software patch onto it is an example of what type of software patch?
65.
1 point
The Computer Security Act of ________ established the requirement for every information system to be certified and accredited.
66.
1 point
(003) What network entity provides reliable, secure networks and network services for base level
customers?
67.
1 point
The Cyber _______ __________ Plan establishes procedures to address cyber attacks against an organization’s IT system(s).
68.
1 point
What is the use of prescribed safeguards and controls to prevent reconstruction or disclosure of sensitive or classified information to persons who do not have the proper clearance or need to know for this information?
69.
1 point
_____________ is a programming and reporting standard that defines how computer hardware and software products can integrate “agent” software to collect information to report to a management system.
70.
1 point
___________ is a feature included in Microsoft Windows 2003 server that allows network administrators to install the Windows Client Software and its upgrades to any number of client computers at one time from a centralized location. 2-19
71.
1 point
(222) What do you type to quit a UNIX shell?
72.
1 point
There are two types of DNS queries, ______ and ______.
2-15
73.
1 point
In regards to deployments, the warning order tells you: 2-40
74.
1 point
Resolving www.google.com to 74.125.93.103 is an example of a: 2-15
75.
1 point
(004) Which of the following are the three most common network management architectures?
76.
1 point
(220) Which is the most commonly used sequential query language (SQL) data statement?
77.
1 point
(206) A standard Web application used to pass a Web user’s request to a server’s application program and to exchange data back to the user is called a
78.
1 point
What chip is installed on the system board and works in conjunction with the CPU to move data, freeing up the CPU to process data? 1-5
79.
1 point
Which of the following is the ACTUAL size of 1 kilobyte?
80.
1 point
___________ turns a server into a Web server that can provide World Wide Web publishing services, file transfer protocol (FTP) services, simple mail transport protocol (SMTP) services, and network news transfer protocol (NNTP) services. Page 2-19
81.
1 point
(017) Which team provides a communication link between forces securing the area and setting up support facilities?
82.
1 point
Use the _______ command to launch the AD Installation Wizard to promote a server to a domain controller for a new domain.
83.
1 point
(229) The first step in quitting an xterm session is to
84.
1 point
(010) What regulation covers remanence security?
85.
1 point
(005) Which function of performance management tracks historical data by tracking activities on the network.
86.
1 point
(009) Knowledge-based identification and authentication methods require the user to provide something you
87.
1 point
(015) Which public key algorithm is exclusively a key establishment protocol?
88.
1 point
(206) Which selection is a set of markup symbols or codes inserted in a file intended for display on a Web browser page?
89.
1 point
(230) Which UNIX command does the system administrator need to use to create the manual database prior to users being able to access the man –k command?
90.
1 point
(012) What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?
91.
1 point
A(n) ________ is a collection of computing environments connected by one or more internal networks under the control of a single approval authority and security policy, including personnel and physical security.
92.
1 point
(223) Hard links are created using which UNIX command?
93.
1 point
In a _______configuration, data is mirrored amongst the drives. 1-13
94.
1 point
(018) Who provides uninterrupted flow of mission critical information to field and in-garrison units for the duration of a contingency
95.
1 point
Of the four SNMP commands, which DOES NOT have the ability to request an action from an agent device?
96.
1 point
(224) Which UNIX command displays the current working directory?
97.
1 point
RAID ____ is considered to be the most versatile RAID configuration.
98.
1 point
(011) What is the Department of Defense process for certifying and accrediting information systems to operate on the global information grid (GIG)?
99.
1 point
(008) How many different categories of information does the performance monitor provide you about your network?
100.
1 point
__________ storage media retains data after power is removed, and must be protected for the highest classification of information processed or stored on the automated information system (AIS).
101.
1 point
The range of values in the hexadecimal numbering system are
1-30
102.
1 point
In asymmetric ciphers, you can:
103.
1 point
What is an interface for a program designed to integrate with the Microsoft Management Console (MMC)? 2-23
104.
1 point
Initial communications support is designed to provide basic communications to a bare base operation within 24 to 72 hours of deployment notification and remain in place for up to ________ days. 2-34
105.
1 point
(007) What color on the systems management automated report tracking system (SMARTS) alarm log indicates one or more events?
106.
1 point
(227) Which UNIX vi mode allows users to execute set commands?
107.
1 point
When using a ___________ interface, the user makes requests of the system by typing in commands at a prompt that usually looks like C>. 2-9
108.
1 point
(211) What kind of server contains the master listing of all active directory objects in the forest?
109.
1 point
What form is used to annotate media as cleared?
110.
1 point
When changing a group scope, which operation has no restrictions? 2-30
111.
1 point
As more and more device driver, hot fixes, and software patches are developed, Microsoft combines them into a software package known as a ___________. 2-13
112.
1 point
__________ teams are part of the first support teams to enter a deployed location because communications are paramount. Page 2-34
113.
1 point
(221) The simplest place to put your function definitions is in your
114.
1 point
What is the earliest public-key algorithm which is exclusively a key establishment protocol? 2-26
115.
1 point
(210) Which type of backup will backup all files that have been altered in the last 24 hours?
116.
1 point
(002) What is used to identify network nodes on a physically connected network?
117.
1 point
How many users are in a multi-server network? 001
118.
1 point
012) What device is placed outside the boundary protection mechanism to monitor all attempted attacks?
119.
1 point
What Windows installation method requires the computer to have a NIC? 2-8
120.
1 point
(223) Which UNIX mechanism enables programs to communicate with one another through the file system?
121.
1 point
The memory storage of both data and programs is known as:
122.
1 point
_______________ and authentication is the process of proving that a subject (e.g., a user or a system) is what the subject claims to be
123.
1 point
(220) Which type of lists uses pointers to connect each element together?
124.
1 point
(008) What provides information concerning the bandwidth utilization and the number of connections that are related to specific nodes?