Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
81 Cards in this Set
- Front
- Back
How many volts of static electricity does it take to destroy a computer chip?
|
More than 200
|
|
What do we call the emitted gas from new computer equipment or computers that are exposed to ultraviolet light and sunlight?
|
Out-gassing
|
|
To prevent headaches caused by the almost invisible flicker of the monitor as the image on the screen is refreshed; you should increase the refresh rate of the monitor to at least?
|
75 hertz
|
|
At what minimum decibel (dB) level shall signs be placed notifying occupants they have entered a “hazardous noise area”?
|
85
|
|
In which electrostatic discharge (ESD) class would sensitive items be when the voltage ranges from 1,000 to 3,999?
|
2
|
|
What numbering system term indicates the number of digits used in a particular numbering system?
|
Radix
|
|
What numbering system term indicates how many times a number is to be multiplied by itself?
|
Exponent
|
|
To change a decimal to metric prefix format, you must first convert the number to a value multiplied by the base
|
10 multiplier associated with the prefix you want to use
|
|
How many symbols does the binary numbering system use?
|
2
|
|
What is used as placeholders in the binary numbering system?
|
Zeros
|
|
What decimal number is represented by 11110112 in the binary numbering system?
|
12310
|
|
What does the power in the binary system do as the exponent increases by one?
|
Doubles its value
|
|
When developing a place value chart, what is the power of the exponent at the far right of the chart’s base or radix line?
|
(®)
|
|
What is a set of rules that defines how network communications are to take place?
|
Protocols
|
|
In which layer of the Open Systems Interconnect (OSI) Model does the checksum and the cyclic redundancy checksum (CRC) reside?
|
Data-link
|
|
Which layer of the Open Systems Interconnect (OSI) Model is responsible for reliable end-to-end, also called host-to-host, packet delivery?
|
Transport
|
|
How many layers are there in the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and the Open Systems Interconnect (OSI) Model?
|
Five and seven, respectively
|
|
Which protocol standard is one that has become popular without the guidance of any standards organization?
|
De facto
|
|
What is a family of protocols working together in a consistent fashion to provide communication services?
|
Protocol suite
|
|
Internet Protocol version(IPv6) has help alleviate the problem brought about from IPv4 by
|
Expanding Internet addressing from 32 to 128 bits
|
|
Which type of computer system port is used to transmit system data one bit at a time to external devices?
|
Serial
|
|
Which type of computer system port can transfer eight bits of data or one byte simultaneously through eight separate lines in a single cable?
|
Parallel
|
|
Which computer system port would you use to encrypt credit card transactions with e-commerce sites?
|
Port 443
|
|
Which is a common computer system port that contains HTTP servers and proxies?
|
Port 8080
|
|
What is the “brain” of the computer system?
|
Central processing unit
|
|
What is a permanent type of memory storage used by the computer for important data that does not change?
|
Read-only memory
|
|
Which network configuration is best suited for serving a small geographic area?
|
Local area network
|
|
Which network configuration is best suited to serve a regional area subject to local or state utility commission’s regulations?
|
Metropolitan area network
|
|
What are the two main reasons for using a virtual private network?
|
Remote access and extranet
|
|
A virtual private network can also work as an extranet connection which allows?
|
Outside users access to data on the network trough a secure Web browser connection
|
|
Which network topology has the advantage of having each node act as a repeater?
|
Physical ring
|
|
Which network topology has all devices attached to the same transmission medium or cable backbone?
|
Physical bus
|
|
Which network topology transmits all data simultaneously to all nodes on the backbone media?
|
Logical bus
|
|
What type of video teleconferencing center (VTC) is being conducted when transmissions are from one point to several locations?
|
Multipoint
|
|
A terrestrial network transmits signals by
|
Land lines
|
|
Switches work at what layers of the Open Systems Interconnection (OSI) model?
|
Data Link and Network
|
|
Switching conducted at the layer 2 category is based solely upon what information?
|
The media access control (MAC) address
|
|
Switching conducted at the layer 3 category is based upon what information?
|
The media access control (MAC) and Internet protocol (IP) addresses
|
|
What type of switch is designed for enterprise wide applications, where error checking and throughput are concerned?
|
Store and forward
|
|
What type of switch reads the first 64 bytes before forwarding the frame?
|
Fragment free
|
|
What is the technology that allows network interface card (NIC) to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?
|
Autonegotiation
|
|
Which communications networking device modulates outgoing digital signals to analog signals for telephone line usage?
|
Modems
|
|
Which communications networking device converts data from one network format type to another and can also act as a bridge to another network?
|
Gateways
|
|
Which communications networking device channels incoming data from any multiple input ports to a specified output port, thus advancing data towards its intended destination?
|
Switches
|
|
Which communications networking device evaluates multiple telecommunication paths before transferring data to other network devices or networks?
|
Routers
|
|
Which Crypto device is able to encrypt trunk-level high speed circuits?
|
TSEC/KIV-19
|
|
What network device provides high-speed secure data transfers up to 38.4 kilobits per second (kbps) for asynchronous or 128 kbps for synchronous?
|
The secure Terminal Equipment (STE)
|
|
The Secure Terminal Equipment (STE) has an asynchronous secure data transfer rate of
|
38.4 Kbps
|
|
What fill device can hold up to 500 separate cryptographic keys?
|
AN/CYZ-10/Data Transfer Device (DTD)
|
|
What type of media has no physical constraints confining the signal to a set path?
|
Unguided/unbound
|
|
Which cable contains four pairs of wire with each pair of wire twisted together a precise number of turns per meter?
|
Shield twisted-pair
|
|
Which cable contains eight insulated wires with two insulated wires twisted together a precise number of turns per meter to form a pair?
|
Unshielded twisted-pair
|
|
What is an advantage of unguided media?
|
There is no physical cabling to tie down the location of a node on a network
|
|
Which local area network (LAN) architecture is implemented in the physical layer of the Open System Interconnection layer?
|
Ethernet
|
|
Which architecture has system rules in the protocol specifications mandating how long a device may keep the token, how long it can transmit, and how to generate a token if one is not circulating?
|
Token ring
|
|
What are the sex categories of the operating systems tasks?
|
Processor, memory, device, and storage management, and application and user interface
|
|
Which category of operating systems task consists of a special program that is the path between the operating system and virtually all hardware not on the computer’s motherboard?
|
Device management
|
|
Which category of operating systems task allows application programmers to use functions of the computer and operating system without having to directly keep track of all the details in the central processing units (CPU) operation?
|
Application interface
|
|
The core operating-system function is the management of the computer system which resides with the kernel of the operating system in which category of operating systems task?
|
User interface
|
|
What Windows operating system was designed to prevent the user or user’s applications from accidentally changing the core operating system files?
|
Windows XP
|
|
What antivirus software feature is designed to keep viruses from infecting your system?
|
Prevention
|
|
Human attempt to defy nature and make computers that use square waves known as?
|
Digital signals
|
|
In reference to basic circuit theory, what is it called when extra energy is radiated from the circuit?
|
Noise
|
|
What element of communications security (COMSEC) results from taking all measures available to deny unauthorized persons information of value that might be derived from interception form cryptological and information processing equipment?
|
Emission security
|
|
Which action is not a good communications security (COMSEC) practice?
|
Talking around classified information when you are on a non-approved system.
|
|
Network vulnerabilities are anything that causes
|
Availability, integrity, confidential and accountability to suffer where automated systems are concerned
|
|
What are network attacks that bypass the firewall?
|
Tunneling and application-based attacks
|
|
What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through it?
|
Tunneling
|
|
What type of firewall is used to separate secure sites, networks, or network segments form less secure areas?
|
Bastion host
|
|
What component ensures a public key for a certificate functions correctly with the corresponding private key owned by the PKI client?
|
Digital Certificates
|
|
The advantages of a fixed wireless local area network (LAN) versus a traditional wired LAN include
|
The ability to connect with users in remote areas
|
|
In what year was the present operations security (OPEC) program we use today established?
|
1970
|
|
In which operations security (OPSEC) step would program managers and coordinators recommend actions to senior decision-makers and commanders?
|
Risk assessment
|
|
Specific facts about friendly activities, intentions, and capabilities or limitations vitally needed by adversaries for them to plan act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment best describe
|
Critical information
|
|
Which operation security (OPSEC) indicator would abrupt changes or cancellations of schedules fall under?
|
Operational
|
|
76. Deviating from normal procedures would fall under which operations security (OPSEC) indicator?
|
Logistic and maintenance support
|
|
What are among the most problematic operations security (OPSEC) vulnerabilities in the Air Force today?
|
Telephones and cell phones
|
|
What standard form is annotated at the end-of-day security check to ensure classified material is stored appropriately?
|
701
|
|
What is the protection resulting from all measures taken to deny unauthorized personnel information of value that might be derived from communications systems and cryptographic intercepts?
|
Emissions security (EMSEC)
|
|
80. What is a three-dimensional space surrounding equipment that processes classified or sensitive information?
|
Inspectable Space
|
|
Air Force personnel and contractors who do business with the Air Force must apply emissions security (EMSEC) proportional to
|
The threat of exploitation
|