Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Block 1 All Units May 2024

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
What are the three main functions of grounding?   show
🗑
What are the three subsystems of the facility ground system?   show
🗑
show The fault protection subsystem  
🗑
show Voltage Reference  
🗑
The signal reference subsystem establishes a multipoint signal reference subsystem by bonding equipment cabinets, racks,conduits,ducts,bus bars, wires and conductors to a common sheet or grid resulting in a network known as an   show
🗑
show Grounding  
🗑
show Bonding  
🗑
show Direct and Indirect bonds  
🗑
Corrosion introduces impedance, or opposition to the total current flow, into the bond which is why you do not want to bond _____ metals which are particularly susceptible to corrosion.   show
🗑
Electrostatic Discharge (ESD) is the sudden _____ flow of electricity between two electrically charged objects and is caused by the _____ of an electric charge on one surface that _____ transferred to another surface when they touch.   show
🗑
______ is another name for static electricity or electricity at rest   show
🗑
A buildup of static electricity can be caused by friction between dissimilar materials and can be transferred through a _____ _____ _____.   show
🗑
show Catastrophic  
🗑
What type of ESD failure has happened when the component appears to be operating normally but may experience premature failure?   show
🗑
What are the three primary control measures for the ESD program?   show
🗑
What is the best method for controlling electrostatic discharge across an ESDS device?   show
🗑
Before removing an ESDS circuit card from equipment, the technician will   show
🗑
show Ensure all hand tools are properly grounded prior to use.  
🗑
show ESDS Caution Label  
🗑
show use ESDS packaging  
🗑
____ ____ is that part of security concerned with active and passive measures designed to prevent unauthorized access to any Air Force resource.   show
🗑
show Type and level of the information handled in the facility Type of equipment missions of the unit to which assigned duty hours of the facility  
🗑
List the three access areas related to physical security.   show
🗑
show Know the requirements for your unit of assignment and apply common sense security practices  
🗑
show Active  
🗑
The use of hedges or ditches around a building, bright lighting and limiting the number of entrances to a building are examples of ____ measures.   show
🗑
Which AF publication series covers all safety topics?   show
🗑
show all personnel  
🗑
show DoDIs  
🗑
_____ consist of procedures that usually contains examples for performing specific tasks, may be separated into volumes, and may contain a policy section.   show
🗑
_____ provide and implement guidance and procedures on policies dictated by Air Force Policy Directive, DODIs, DODMs and other policy documents.   show
🗑
show Contractors  
🗑
_____ ________ are commercial publications products that are used in designing and installing networks and are reviewed every __ years for currency.   show
🗑
show MIL STD  
🗑
A _____ is a DoD defense standard that is managed by DISA and is a _________ methodology for standardizing security protocols within networks, servers, computers, and logical designs in order to enhance overall security.   show
🗑
________ vulnerabilities can allow unauthorized access to classified data or facilities, and can lead to a denial of service or access   show
🗑
show CAT II  
🗑
________ vulnerabilities degrades measures to protect against loss of confidentiality, availability, or integrity.   show
🗑
How are STIGs viewed?   show
🗑
What is the International Organization for Standardization (ISO) most famous standard?   show
🗑
show Lower, Moving Data Around  
🗑
show Application, Presentation, Session, Transport, Network, Data Link, Physical  
🗑
show Application  
🗑
The _____ layer of the OSI reference model relates to the services that directly support user applications.   show
🗑
The _____ of the OSI Model is where the ____ system lies and is where information received from Session layer in decrypted and/or reformatted back into words, pictures, video, or audio needed by apps in the _____ layer.   show
🗑
show FTP, DHCP, SMTP, SNMP and Telnet  
🗑
show Presentation Layer  
🗑
The OSI reference model layer that exchanges, and dialogues between the applications on each host is the ______ layer.   show
🗑
Which layer of the OSI reference model is responsible for end-to-end recovery, flow control and ensures complete data transfer?   show
🗑
What layer of the OSI reference model is responsible for addressing packets and translating logical addresses and name into physical addresses?   show
🗑
Which layer provides the functional and procedural means to transfer data between network entities and may provide the means to correct errors?   show
🗑
show Routers  
🗑
___, which connect computers, printers, servers, and other devices to the private network, operate at the Data Link Layer/Layer 2 of the OSI Model.   show
🗑
show Address Resolution Protocol (ARP) Routing Information Protocol (RIP) IPSec IPv4 IPV6  
🗑
The _______ sub layer controls how a computer on the network gain access to the data and permission to transmit it   show
🗑
The data link layer is divided into the _______ and _______ layers.   show
🗑
show Data Link Layer  
🗑
show Physical Layer  
🗑
show Protocol  
🗑
What are the five layers of TCP/IP?   show
🗑
show Hyper Text Transfer Porotcol (FTP)  
🗑
What is the purpose of Simple Mail Transfer Protocol (SMTP)?   show
🗑
show File Transfer Protocol (FTP  
🗑
show Internet Protocol(IP)  
🗑
Which protocol is created to permit remote monitoring and management of devices and hosts?   show
🗑
The protocol that provides a friendly name to IP addresses on the internet is known as   show
🗑
Which protocol uses broadcast UDP data packets to exchange routing information?   show
🗑
show Dynamic Host Configuration Protocol (DHCP)  
🗑
show Address Resolution Protocol (ARP)  
🗑
show a port  
🗑
show Well-Known Ports  
🗑
show 1024-49151  
🗑
show Registered  
🗑
Which type of ports are temporary allocations and only valid for the duration of the communication session?   show
🗑
What are two statuses for ports?   show
🗑
_____ communication means the delivery of information or data is guaranteed by the protocols employed to transmit it.   show
🗑
TCP is a connnection-oriented communication protocol which provides ____ and _____ of data packet delivery.   show
🗑
____ is used when speed is the primary importance, such as real-time video conferencing, streaming audio and video, Voice Over IP (VOIP), music, and online games.   show
🗑
List the header fields in a UDP header:   show
🗑
This suite is a combination of protocol relationships, encompassing several different protocols, each having different purposes and needs and is the protocol suite the majority of the Internet uses.   show
🗑
What are the protocols mentioned that require the reliable, ordered delivery of packets that the TCP protocol offers?   show
🗑
show Connectionless  
🗑
1 1 0 1 (2) ^ ^ ^ ^ a b c d   show
🗑
show  
🗑
show  
🗑
Binary to Hexadecimal 8421 Method Beginning with the LSD, divide the Binary number into groups of 4 Place the 8421 above each group Directly convert each of these groups into a hexadecimal digit   show
🗑
How many binary digits make up a hexadecimal digit?   show
🗑
show 1111  
🗑
Computers must have a valid ___ address in order to communicate on the network.   show
🗑
What are the names of the two parts an IPv4 address?   show
🗑
show Network  
🗑
To represent a binary IP address in a more user-friendly manner ___ is used.   show
🗑
show Class A  
🗑
What IPv4 class is used for small networks?   show
🗑
Which class of IPv4 address has network addresses of 128-191?   show
🗑
Class D addresses are reserved for ___ addressing.   show
🗑
The IPv4 class reserved for research and development is class __.   show
🗑
show wireless  
🗑
show Access Point  
🗑
A ____ is a device that performs a specific function.   show
🗑
The ___ is the identifier (name) that tells you which service set (or network) to join.   show
🗑
show WWAN  
🗑
Which wireless computer network links two or more devices using a wireless distribution method within a limited area such as a home, school, computer laboratory, or office building?   show
🗑
_____ link two or more devices using a wireless distribution method within a limited area such as a home, school, computer lab, or office building, with the most common connection through Wi-Fi for distances up to ___ meters   show
🗑
What type of address is normally used as the ID of a BSS (BSSID)?   show
🗑
An ____ consists of all the BSSs in the network.   show
🗑
A _____ consumes less power, provides short-range communication, is low cost, and provides a connected communication of various devices in people's personal space.   show
🗑
show WMAN  
🗑
What type of network relies on wireless as well as wired signals?   show
🗑
A wireless ____ network allows one to wirelessly connect one device to another without first connecting to a wireless router or access point.   show
🗑
List three wireless advantages.   show
🗑
Which network is faster when transferring files over a local area network, wired or wireless?   show
🗑
show IEEE 802.11  
🗑
show IEEE 802.15.1 Bluetooth  
🗑
show IEEE 802.15.4 Zigbee  
🗑
This IEEE standard uses a form of visual light communication that uses light waves from Light Emitting Diodes (LEDs) to exchange data quickly and securely at a much lower power level compared to Wi-Fi.   show
🗑
This IEEE standard was developed separately from Wi-Fi and designed for long-range networking (spanning miles or kilometers) as opposed to local area wireless networking.   show
🗑
is a network contention protocol that listens to a network in order to avoid collisions.   show
🗑
This type of wireless access point has all the software required to manage the WLAN processes with no need for additional controllers or switches.   show
🗑
This type of wireless access point has additional device or devices merged with the access point to provide the additional functionalities along with existing functionality of the access point.   show
🗑
This type of wireless access point works as the client of the Wireless LAN Controller (WLC) and doesn’t make any forwarding decision.   show
🗑
This type of wireless access point has either been installed on a secure company network without explicit authorization from a local network administrator or has been created to allow a hacker to conduct a man-in-the-middle attack.   show
🗑
he two types of twisted-pair cable are   show
🗑
show Twisted-pair  
🗑
Category ___ UTP is not suitable for data transmission   show
🗑
show 5  
🗑
A ________ ________cable has the pins on end of the cable match and is used to connect two unlike devices, such as a PC to a switch.   show
🗑
Which type of network cable has the TX and RX pins swapped on the opposite end of the cable and is used to connect like devices, such as switch to switch?   show
🗑
A ______ cable has the pins exactly opposite on the ends of the cables and is used to connect a PC to the console port of a switch or router.   show
🗑
show Shielding, Twisting  
🗑
show Shielded Twisted Pair (STP)  
🗑
show True  
🗑
Which cable type supports the longest segment length?   show
🗑
One problem with light transmissions is _____ conditions, such as fog, can degrade the signal.   show
🗑
show Fixed Frequency  
🗑
show Spread Spectrum  
🗑
____ and ____ are two advantages of unguided media.   show
🗑
Three disadvantages of unguided/ unbound media are ____ , _____ and _____.   show
🗑
show 1) Identify the problem, 2) Establish a theory of probable cause, 3) Test the theory, 4) Establish a plan of action, 5) Verify functionality, 6) Document the findings, actions and outcomes  
🗑
show 1) The user experiencing the problem, 2) the computer in the form of logs and error messages, 3) personal observation  
🗑
show Troubleshooting  
🗑
show From most likely to least likely  
🗑
show 1) The plan should identify any possible repercussions that the resolution to the problem may introduce to the network, 2) If the problem impacts others, 3) Does it require coordination with other offices or agencies?  
🗑
show Sometimes a fix will introduce a new issue.  
🗑
show Root Cause Analysis  
🗑
This final troubleshooting methodology step captures a history of equipment and users so that perpetual issues become known and recorded:   show
🗑
show Crimper  
🗑
Tests continuity and pin-out for disconnected cables   show
🗑
Performs cable tester functions on cables connected to a device   show
🗑
show Punchdown Tool  
🗑
show OTDR  
🗑
show Light Meter  
🗑
Isolates a single cable within a larger bundle of cables.   show
🗑
Measures voltage, resistance, and tests continuity in electrical circuits   show
🗑
show Spectrum Analyzer  
🗑
Intercepts and logs network packets for malware/intrusion analysis.   show
🗑
show Port Scanner  
🗑
show Protocol Analyzer  
🗑
Tests the WiFi signal for reliability, signal strength, and download speed.   show
🗑
show Bandwidth Speed Tester  
🗑
Queries Internet Protocol (IP) address to verify network connectivity.   show
🗑
show tracert  
🗑
show nslookup  
🗑
show ipconfig  
🗑
show ifconfig  
🗑
show iptables  
🗑
show netstat  
🗑
show tcpdump  
🗑
show pathping  
🗑
show nmap  
🗑
show route  
🗑
Display/edit the Address Resolution Protocol (ARP) table on a computer.   show
🗑
show dig  
🗑
show devices within a network.  
🗑
Some connectivity test sets can perform switch connectivity, Ping, and _______ testing.   show
🗑
Some connectivity test sets can act as transmission testers, perform RF tests, check for delay skew and create ___________ maps   show
🗑
______________________________ are used by network administrators to monitor the availability of network services, functionality of network interfaces, status of critical hardware systems, CPU, memory, or bandwidth.   show
🗑
List three other statistics an NMS provides for servers and devices on a network.   show
🗑
show Discover, Map, Monitor, Alert, and Report  
🗑
show Discover  
🗑
show device role device list  
🗑
show type and vendor  
🗑
show Map  
🗑
NMSs generate ____ _________, a powerful first response tool that enables network administrators to visualize their networks, display devices and up- to-date status.   show
🗑
show Monitor  
🗑
List the “big 5” network administrators want to monitor for any device on the network.   show
🗑
show Alert  
🗑
based alerting enables network administrators to respond to problems before they impact users, or applications.   show
🗑
show Syslog  
🗑
Which basic function of the NMS deals with real-time and historical reporting?   show
🗑
show dashboards turn-key  
🗑
show Intrusion Detection System  
🗑
IDSs ___, ____, and ____ the security infrastructure for signs of attack in progress   show
🗑
List two ways that IDSs work.   show
🗑
show SNMP  
🗑
show Querying agents, getting replies from agents, establishing variables in agents, and recognizing asynchronous events  
🗑
show Management Information Base (MIB)  
🗑
show All the information that is exposed by the managed device.  
🗑
show Object Identifier  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: BrotherH
Popular Computers sets