• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/81

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

81 Cards in this Set

  • Front
  • Back
How many volts of static electricity does it take to destroy a computer chip?
 More than 200
What do we call the emitted gas from new computer equipment or computers that are exposed to ultraviolet light and sunlight?
 Out-gassing
To prevent headaches caused by the almost invisible flicker of the monitor as the image on the screen is refreshed; you should increase the refresh rate of the monitor to at least?
 75 hertz
At what minimum decibel (dB) level shall signs be placed notifying occupants they have entered a “hazardous noise area”?
 85
In which electrostatic discharge (ESD) class would sensitive items be when the voltage ranges from 1,000 to 3,999?
 2
What numbering system term indicates the number of digits used in a particular numbering system?
 Radix
What numbering system term indicates how many times a number is to be multiplied by itself?
 Exponent
To change a decimal to metric prefix format, you must first convert the number to a value multiplied by the base
 10 multiplier associated with the prefix you want to use
How many symbols does the binary numbering system use?
 2
What is used as placeholders in the binary numbering system?
 Zeros
What decimal number is represented by 11110112 in the binary numbering system?
 12310
What does the power in the binary system do as the exponent increases by one?
 Doubles its value
When developing a place value chart, what is the power of the exponent at the far right of the chart’s base or radix line?
 (®)
What is a set of rules that defines how network communications are to take place?
 Protocols
In which layer of the Open Systems Interconnect (OSI) Model does the checksum and the cyclic redundancy checksum (CRC) reside?
 Data-link
Which layer of the Open Systems Interconnect (OSI) Model is responsible for reliable end-to-end, also called host-to-host, packet delivery?
 Transport
How many layers are there in the Transmission Control Protocol/Internet Protocol (TCP/IP) suite and the Open Systems Interconnect (OSI) Model?
 Five and seven, respectively
Which protocol standard is one that has become popular without the guidance of any standards organization?
 De facto
What is a family of protocols working together in a consistent fashion to provide communication services?
 Protocol suite
Internet Protocol version(IPv6) has help alleviate the problem brought about from IPv4 by
 Expanding Internet addressing from 32 to 128 bits
Which type of computer system port is used to transmit system data one bit at a time to external devices?
 Serial
Which type of computer system port can transfer eight bits of data or one byte simultaneously through eight separate lines in a single cable?
 Parallel
Which computer system port would you use to encrypt credit card transactions with e-commerce sites?
 Port 443
Which is a common computer system port that contains HTTP servers and proxies?
 Port 8080
What is the “brain” of the computer system?
 Central processing unit
What is a permanent type of memory storage used by the computer for important data that does not change?
 Read-only memory
Which network configuration is best suited for serving a small geographic area?
 Local area network
Which network configuration is best suited to serve a regional area subject to local or state utility commission’s regulations?
 Metropolitan area network
What are the two main reasons for using a virtual private network?
 Remote access and extranet
A virtual private network can also work as an extranet connection which allows?
 Outside users access to data on the network trough a secure Web browser connection
Which network topology has the advantage of having each node act as a repeater?
 Physical ring
Which network topology has all devices attached to the same transmission medium or cable backbone?
 Physical bus
Which network topology transmits all data simultaneously to all nodes on the backbone media?
 Logical bus
What type of video teleconferencing center (VTC) is being conducted when transmissions are from one point to several locations?
 Multipoint
A terrestrial network transmits signals by
 Land lines
Switches work at what layers of the Open Systems Interconnection (OSI) model?
 Data Link and Network
Switching conducted at the layer 2 category is based solely upon what information?
 The media access control (MAC) address
Switching conducted at the layer 3 category is based upon what information?
 The media access control (MAC) and Internet protocol (IP) addresses
What type of switch is designed for enterprise wide applications, where error checking and throughput are concerned?
 Store and forward
What type of switch reads the first 64 bytes before forwarding the frame?
 Fragment free
What is the technology that allows network interface card (NIC) to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?
 Autonegotiation
Which communications networking device modulates outgoing digital signals to analog signals for telephone line usage?
 Modems
Which communications networking device converts data from one network format type to another and can also act as a bridge to another network?
 Gateways
Which communications networking device channels incoming data from any multiple input ports to a specified output port, thus advancing data towards its intended destination?
 Switches
Which communications networking device evaluates multiple telecommunication paths before transferring data to other network devices or networks?
 Routers
Which Crypto device is able to encrypt trunk-level high speed circuits?
 TSEC/KIV-19
What network device provides high-speed secure data transfers up to 38.4 kilobits per second (kbps) for asynchronous or 128 kbps for synchronous?
 The secure Terminal Equipment (STE)
The Secure Terminal Equipment (STE) has an asynchronous secure data transfer rate of
 38.4 Kbps
What fill device can hold up to 500 separate cryptographic keys?
 AN/CYZ-10/Data Transfer Device (DTD)
What type of media has no physical constraints confining the signal to a set path?
 Unguided/unbound
Which cable contains four pairs of wire with each pair of wire twisted together a precise number of turns per meter?
 Shield twisted-pair
Which cable contains eight insulated wires with two insulated wires twisted together a precise number of turns per meter to form a pair?
 Unshielded twisted-pair
What is an advantage of unguided media?
 There is no physical cabling to tie down the location of a node on a network
Which local area network (LAN) architecture is implemented in the physical layer of the Open System Interconnection layer?
 Ethernet
Which architecture has system rules in the protocol specifications mandating how long a device may keep the token, how long it can transmit, and how to generate a token if one is not circulating?
 Token ring
What are the sex categories of the operating systems tasks?
 Processor, memory, device, and storage management, and application and user interface
Which category of operating systems task consists of a special program that is the path between the operating system and virtually all hardware not on the computer’s motherboard?
 Device management
Which category of operating systems task allows application programmers to use functions of the computer and operating system without having to directly keep track of all the details in the central processing units (CPU) operation?
 Application interface
The core operating-system function is the management of the computer system which resides with the kernel of the operating system in which category of operating systems task?
 User interface
What Windows operating system was designed to prevent the user or user’s applications from accidentally changing the core operating system files?
 Windows XP
What antivirus software feature is designed to keep viruses from infecting your system?
 Prevention
Human attempt to defy nature and make computers that use square waves known as?
 Digital signals
In reference to basic circuit theory, what is it called when extra energy is radiated from the circuit?
 Noise
What element of communications security (COMSEC) results from taking all measures available to deny unauthorized persons information of value that might be derived from interception form cryptological and information processing equipment?
 Emission security
Which action is not a good communications security (COMSEC) practice?
 Talking around classified information when you are on a non-approved system.
Network vulnerabilities are anything that causes
 Availability, integrity, confidential and accountability to suffer where automated systems are concerned
What are network attacks that bypass the firewall?
 Tunneling and application-based attacks
What is the intrusion practice of encapsulating a message that would be rejected by the firewall inside a second message that will pass through it?
 Tunneling
What type of firewall is used to separate secure sites, networks, or network segments form less secure areas?
 Bastion host
What component ensures a public key for a certificate functions correctly with the corresponding private key owned by the PKI client?
 Digital Certificates
The advantages of a fixed wireless local area network (LAN) versus a traditional wired LAN include
 The ability to connect with users in remote areas
In what year was the present operations security (OPEC) program we use today established?
 1970
In which operations security (OPSEC) step would program managers and coordinators recommend actions to senior decision-makers and commanders?
 Risk assessment
Specific facts about friendly activities, intentions, and capabilities or limitations vitally needed by adversaries for them to plan act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment best describe
 Critical information
Which operation security (OPSEC) indicator would abrupt changes or cancellations of schedules fall under?
 Operational
76. Deviating from normal procedures would fall under which operations security (OPSEC) indicator?
 Logistic and maintenance support
What are among the most problematic operations security (OPSEC) vulnerabilities in the Air Force today?
 Telephones and cell phones
What standard form is annotated at the end-of-day security check to ensure classified material is stored appropriately?
 701
What is the protection resulting from all measures taken to deny unauthorized personnel information of value that might be derived from communications systems and cryptographic intercepts?
 Emissions security (EMSEC)
80. What is a three-dimensional space surrounding equipment that processes classified or sensitive information?
 Inspectable Space
Air Force personnel and contractors who do business with the Air Force must apply emissions security (EMSEC) proportional to
 The threat of exploitation