• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/65

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

65 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
What is the first logical step in network troubleshooting?
Define the main problem.
What is the maximum time between Emergency Action Plan exercises at COMSEC responsibility officers' accounts?
6 months.
What part of the CPU does all the computing?
ALU.
The IEEE 802.5 standard was developed to cover what LAN topology?
Token ring.
What diagnostics command is used exclusively on Windows NT machines?
Ipconfg
What factor about the Linux™ operating system is demonstrated by each new version of the operating system being rapidly viewed and tested by thousands of programmers world wide?
Reliability
421
Which class of certification requires the user to personally appear before a Certificate Management Authority (CMA), and present two forms of identification or credentials?
4.
218
What UNIX™ command displays a list of the login names of users logged onto the system, along with the user's complete name?
finger.
415
What is one of the most common types of hardware devices used for network troubleshooting?
Loopback plug.
816
What training aid allows you to do training in-house on all the functions in the information's systems flight?
QTPs.
009
What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?
Standard mask.
612
What type of network problem(s) is caused by collisions on the domain?
High utilization or jabbers
814
Who is the Air Force focal point for design and construction of facilities containing radio frequency interference (RFI) and electromagnetic interference (EMI) shielding?
HQ USAF/ILE.
022
What type of optic fiber is used to span extremely long distances?
Single mode.
606
To create a digital signature, the private-key cryptography operation requires
a fixed-size input and computes a fixed-size output.
216
What ASIM vulnerability category is a probing attack in the form of a Finger probe, FTP breakout, anonymous FTP, Telnet breakout or RFC?
Category IV.
032
Who issues a COMSEC incident a case number and determines when to close the case?
Air Force Communications Agency (AFCA).
210
What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?
Vulnerability scanners
822
In what step of the Barrier Reef process do you start a Base Network Steering Group?
Determine requirements
821
Resource protection program reviews are often accomplished by
unit controlled area monitor.
025
Operations Security (OPSEC) weaknesses tend to fall into what three broad categories?
Operations, administrative, and communications.
013
How many different categories of information does the performance monitor provide you about your network?
21.
818
What is a web-based process that incorporates identification and evaluation of new vulnerabilities disseminates technical responses and tracks compliance within the DoD community?
IAVA.
825
How many users are in a multi-server network?
50-250.
604 - Not high speed backbone
In what type of key cryptography are keys so different, that it would be possible to publicize one without danger of anyone being able to derive or compute the other?
Asymetric cypher.
215
Which form can be considered a daily physical security inventory of your environment?
SF701.
202 - Not a security container checklist(SF702)
From what level can all other command modes be accessed?
Privileged Exec level.
618
In which layer of the OSI model do you find database management programs and electronic mail?
Application.
608
What is used as a segment disposition record of accessed and destroyed multiple keytape?
AFCOMSEC Form 22.
207
When a volume is formatted with NTFS, what group is automatically assigned full control permission to the volume?
Everyone group.
808
At what layers of the OSI model do switches work?
Data link and network.
616
What network policy is a combination of user and computer settings that control a user's working environment?
System policies
805
Who do you notify upon finding an improperly marked classified document?
Unit security manager.
020
In what Windows NT System directory is the profiles directory located?
WINNT_ROOT
807
Most bases require a network password to be at least how many characters long?
8
820
Recertification/Accreditation on systems with no changes to the baseline are accomplished at a maximum of
36 months.
819
What memory stores things like the current time and date, type and number of disk drives, and the total amount of memory available to the CPU?
CMOS.
407
In what category does a programming language fit that operates by a sequence of commands and changes the value of data elements?
Imperative language.
431
What does Network Security work to ensure about a network?
Availability, confidentiality and integrity of data.
602
The element of communications security (COMSEC) resulting from applying all available measures designed to protect information systems traffic from interception and exploitation is
transmission security.
015 - Interception
Network management protocols are designed (in most cases) to reside above what layer of the OSI model?
Session
803
The minimum amount of time required to gain job experience before attending 7-level school is
18 months.
002
The term used when referring to specific COMSEC material (other than equipment) is COMSEC
aids.
204
When was the present Operations Security (OPSEC) program established?
1970.
012
Disposition records and/or destruction reports are not required for material that has been issued to
transient aircrews.
205
Where are original SF 153 hand-receipts maintained?
COMSEC manager's replica of the CRO's 6-part folder.
205
What does a station specifically send when it sends a general request through the network asking any station to respond in order to receive the token?
Solicit successor frame.
609
On the SF-153 is the transfer voucher number is placed in block number
4.
206
Who handles the day-to-day operations of the base (Communications Sq) account?
COMSEC accountants.
201
What operational SNMP message is used to modify the value of one or more instances of management information?
Set
803 - Key word is modify.
What type of switch reads the first 64 bytes before forwarding the frame?
Fragment free.
616
What are the months of responsibility for Air and Space Expeditionary Forces 9 and 10?
Sept through Nov.
011
In what step of the Barrier Reef process do you start a Base Network Steering Group?
Determine requirements
821
What action identifies options for minimizing the effects of detected or predicted faults?
Fault correction
811
What form do we use to annotate storage media has been sanitized?
Standard Form 711.
824
What software program protects classified data by erasing it from the disk so that it is unrecoverable?
WIPEINFO
824
What routing stability feature is used to prevent regular update messages from inappropriately reinstating a route that has gone bad?
Hold downs.
617
What prevents a router from sending route information back to the router from which it came?
Split horizons.
617
What layer in the OSI reference model adds a trailer to the packet?
Data link layer.
611
What do we call a set of subnets that are connected with routers?
Internetwork.
604
In most cases the frequencies used by wireless networks are in what frequency band?
ISM.
604
What does a station specifically send when it sends a general request through the network asking any station to respond in order to receive the token?
Solicit successor frame.
609
Who assists organizations in obtaining new communications and information capabilities through equipment purchases?
Communications and information systems officer (CSO).
222
What is the last step in file management?
Archiving files.
809
What is measured to determine the level of network service provided to the users?
The total response time, rejection rate, and availability of the network.
602