Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
65 Cards in this Set
- Front
- Back
- 3rd side (hint)
What is the first logical step in network troubleshooting?
|
Define the main problem.
|
|
|
What is the maximum time between Emergency Action Plan exercises at COMSEC responsibility officers' accounts?
|
6 months.
|
|
|
What part of the CPU does all the computing?
|
ALU.
|
|
|
The IEEE 802.5 standard was developed to cover what LAN topology?
|
Token ring.
|
|
|
What diagnostics command is used exclusively on Windows NT machines?
|
Ipconfg
|
|
|
What factor about the Linux™ operating system is demonstrated by each new version of the operating system being rapidly viewed and tested by thousands of programmers world wide?
|
Reliability
|
421
|
|
Which class of certification requires the user to personally appear before a Certificate Management Authority (CMA), and present two forms of identification or credentials?
|
4.
|
218
|
|
What UNIX™ command displays a list of the login names of users logged onto the system, along with the user's complete name?
|
finger.
|
415
|
|
What is one of the most common types of hardware devices used for network troubleshooting?
|
Loopback plug.
|
816
|
|
What training aid allows you to do training in-house on all the functions in the information's systems flight?
|
QTPs.
|
009
|
|
What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?
|
Standard mask.
|
612
|
|
What type of network problem(s) is caused by collisions on the domain?
|
High utilization or jabbers
|
814
|
|
Who is the Air Force focal point for design and construction of facilities containing radio frequency interference (RFI) and electromagnetic interference (EMI) shielding?
|
HQ USAF/ILE.
|
022
|
|
What type of optic fiber is used to span extremely long distances?
|
Single mode.
|
606
|
|
To create a digital signature, the private-key cryptography operation requires
|
a fixed-size input and computes a fixed-size output.
|
216
|
|
What ASIM vulnerability category is a probing attack in the form of a Finger probe, FTP breakout, anonymous FTP, Telnet breakout or RFC?
|
Category IV.
|
032
|
|
Who issues a COMSEC incident a case number and determines when to close the case?
|
Air Force Communications Agency (AFCA).
|
210
|
|
What network device performs rigorous examinations of systems to identify weaknesses that might allow security violations?
|
Vulnerability scanners
|
822
|
|
In what step of the Barrier Reef process do you start a Base Network Steering Group?
|
Determine requirements
|
821
|
|
Resource protection program reviews are often accomplished by
|
unit controlled area monitor.
|
025
|
|
Operations Security (OPSEC) weaknesses tend to fall into what three broad categories?
|
Operations, administrative, and communications.
|
013
|
|
How many different categories of information does the performance monitor provide you about your network?
|
21.
|
818
|
|
What is a web-based process that incorporates identification and evaluation of new vulnerabilities disseminates technical responses and tracks compliance within the DoD community?
|
IAVA.
|
825
|
|
How many users are in a multi-server network?
|
50-250.
|
604 - Not high speed backbone
|
|
In what type of key cryptography are keys so different, that it would be possible to publicize one without danger of anyone being able to derive or compute the other?
|
Asymetric cypher.
|
215
|
|
Which form can be considered a daily physical security inventory of your environment?
|
SF701.
|
202 - Not a security container checklist(SF702)
|
|
From what level can all other command modes be accessed?
|
Privileged Exec level.
|
618
|
|
In which layer of the OSI model do you find database management programs and electronic mail?
|
Application.
|
608
|
|
What is used as a segment disposition record of accessed and destroyed multiple keytape?
|
AFCOMSEC Form 22.
|
207
|
|
When a volume is formatted with NTFS, what group is automatically assigned full control permission to the volume?
|
Everyone group.
|
808
|
|
At what layers of the OSI model do switches work?
|
Data link and network.
|
616
|
|
What network policy is a combination of user and computer settings that control a user's working environment?
|
System policies
|
805
|
|
Who do you notify upon finding an improperly marked classified document?
|
Unit security manager.
|
020
|
|
In what Windows NT System directory is the profiles directory located?
|
WINNT_ROOT
|
807
|
|
Most bases require a network password to be at least how many characters long?
|
8
|
820
|
|
Recertification/Accreditation on systems with no changes to the baseline are accomplished at a maximum of
|
36 months.
|
819
|
|
What memory stores things like the current time and date, type and number of disk drives, and the total amount of memory available to the CPU?
|
CMOS.
|
407
|
|
In what category does a programming language fit that operates by a sequence of commands and changes the value of data elements?
|
Imperative language.
|
431
|
|
What does Network Security work to ensure about a network?
|
Availability, confidentiality and integrity of data.
|
602
|
|
The element of communications security (COMSEC) resulting from applying all available measures designed to protect information systems traffic from interception and exploitation is
|
transmission security.
|
015 - Interception
|
|
Network management protocols are designed (in most cases) to reside above what layer of the OSI model?
|
Session
|
803
|
|
The minimum amount of time required to gain job experience before attending 7-level school is
|
18 months.
|
002
|
|
The term used when referring to specific COMSEC material (other than equipment) is COMSEC
|
aids.
|
204
|
|
When was the present Operations Security (OPSEC) program established?
|
1970.
|
012
|
|
Disposition records and/or destruction reports are not required for material that has been issued to
|
transient aircrews.
|
205
|
|
Where are original SF 153 hand-receipts maintained?
|
COMSEC manager's replica of the CRO's 6-part folder.
|
205
|
|
What does a station specifically send when it sends a general request through the network asking any station to respond in order to receive the token?
|
Solicit successor frame.
|
609
|
|
On the SF-153 is the transfer voucher number is placed in block number
|
4.
|
206
|
|
Who handles the day-to-day operations of the base (Communications Sq) account?
|
COMSEC accountants.
|
201
|
|
What operational SNMP message is used to modify the value of one or more instances of management information?
|
Set
|
803 - Key word is modify.
|
|
What type of switch reads the first 64 bytes before forwarding the frame?
|
Fragment free.
|
616
|
|
What are the months of responsibility for Air and Space Expeditionary Forces 9 and 10?
|
Sept through Nov.
|
011
|
|
In what step of the Barrier Reef process do you start a Base Network Steering Group?
|
Determine requirements
|
821
|
|
What action identifies options for minimizing the effects of detected or predicted faults?
|
Fault correction
|
811
|
|
What form do we use to annotate storage media has been sanitized?
|
Standard Form 711.
|
824
|
|
What software program protects classified data by erasing it from the disk so that it is unrecoverable?
|
WIPEINFO
|
824
|
|
What routing stability feature is used to prevent regular update messages from inappropriately reinstating a route that has gone bad?
|
Hold downs.
|
617
|
|
What prevents a router from sending route information back to the router from which it came?
|
Split horizons.
|
617
|
|
What layer in the OSI reference model adds a trailer to the packet?
|
Data link layer.
|
611
|
|
What do we call a set of subnets that are connected with routers?
|
Internetwork.
|
604
|
|
In most cases the frequencies used by wireless networks are in what frequency band?
|
ISM.
|
604
|
|
What does a station specifically send when it sends a general request through the network asking any station to respond in order to receive the token?
|
Solicit successor frame.
|
609
|
|
Who assists organizations in obtaining new communications and information capabilities through equipment purchases?
|
Communications and information systems officer (CSO).
|
222
|
|
What is the last step in file management?
|
Archiving files.
|
809
|
|
What is measured to determine the level of network service provided to the users?
|
The total response time, rejection rate, and availability of the network.
|
602
|