Block 1 All Units May 2024
Quiz yourself by thinking what should be in
each of the black spaces below before clicking
on it to display the answer.
Help!
|
|
||||
---|---|---|---|---|---|
What are the three main functions of grounding? | show 🗑
|
||||
What are the three subsystems of the facility ground system? | show 🗑
|
||||
show | The fault protection subsystem
🗑
|
||||
show | Voltage Reference
🗑
|
||||
The signal reference subsystem establishes a multipoint signal reference subsystem by bonding equipment cabinets, racks,conduits,ducts,bus bars, wires and conductors to a common sheet or grid resulting in a network known as an | show 🗑
|
||||
show | Grounding
🗑
|
||||
show | Bonding
🗑
|
||||
show | Direct and Indirect bonds
🗑
|
||||
Corrosion introduces impedance, or opposition to the total current flow, into the bond which is why you do not want to bond _____ metals which are particularly susceptible to corrosion. | show 🗑
|
||||
Electrostatic Discharge (ESD) is the sudden _____ flow of electricity between two electrically charged objects and is caused by the _____ of an electric charge on one surface that _____ transferred to another surface when they touch. | show 🗑
|
||||
______ is another name for static electricity or electricity at rest | show 🗑
|
||||
A buildup of static electricity can be caused by friction between dissimilar materials and can be transferred through a _____ _____ _____. | show 🗑
|
||||
show | Catastrophic
🗑
|
||||
What type of ESD failure has happened when the component appears to be operating normally but may experience premature failure? | show 🗑
|
||||
What are the three primary control measures for the ESD program? | show 🗑
|
||||
What is the best method for controlling electrostatic discharge across an ESDS device? | show 🗑
|
||||
Before removing an ESDS circuit card from equipment, the technician will | show 🗑
|
||||
show | Ensure all hand tools are properly grounded prior to use.
🗑
|
||||
show | ESDS Caution Label
🗑
|
||||
show | use ESDS packaging
🗑
|
||||
____ ____ is that part of security concerned with active and passive measures designed to prevent unauthorized access to any Air Force resource. | show 🗑
|
||||
show | Type and level of the information handled in the facility
Type of equipment
missions of the unit to which assigned
duty hours of the facility
🗑
|
||||
List the three access areas related to physical security. | show 🗑
|
||||
show | Know the requirements for your unit of assignment and apply common sense security practices
🗑
|
||||
show | Active
🗑
|
||||
The use of hedges or ditches around a building, bright lighting and limiting the number of entrances to a building are examples of ____ measures. | show 🗑
|
||||
Which AF publication series covers all safety topics? | show 🗑
|
||||
show | all personnel
🗑
|
||||
show | DoDIs
🗑
|
||||
_____ consist of procedures that usually contains examples for performing specific tasks, may be separated into volumes, and may contain a policy section. | show 🗑
|
||||
_____ provide and implement guidance and procedures on policies dictated by Air Force Policy Directive, DODIs, DODMs and other policy documents. | show 🗑
|
||||
show | Contractors
🗑
|
||||
_____ ________ are commercial publications products that are used in designing and installing networks and are reviewed every __ years for currency. | show 🗑
|
||||
show | MIL STD
🗑
|
||||
A _____ is a DoD defense standard that is managed by DISA and is a _________ methodology for standardizing security protocols within networks, servers, computers, and logical designs in order to enhance overall security. | show 🗑
|
||||
________ vulnerabilities can allow unauthorized access to classified data or facilities, and can lead to a denial of service or access | show 🗑
|
||||
show | CAT II
🗑
|
||||
________ vulnerabilities degrades measures to protect against loss of confidentiality, availability, or integrity. | show 🗑
|
||||
How are STIGs viewed? | show 🗑
|
||||
What is the International Organization for Standardization (ISO) most famous standard? | show 🗑
|
||||
show | Lower, Moving Data Around
🗑
|
||||
show | Application, Presentation, Session, Transport, Network, Data Link, Physical
🗑
|
||||
show | Application
🗑
|
||||
The _____ layer of the OSI reference model relates to the services that directly support user applications. | show 🗑
|
||||
The _____ of the OSI Model is where the ____ system lies and is where information received from Session layer in decrypted and/or reformatted back into words, pictures, video, or audio needed by apps in the _____ layer. | show 🗑
|
||||
show | FTP, DHCP, SMTP, SNMP and Telnet
🗑
|
||||
show | Presentation Layer
🗑
|
||||
The OSI reference model layer that exchanges, and dialogues between the applications on each host is the ______ layer. | show 🗑
|
||||
Which layer of the OSI reference model is responsible for end-to-end recovery, flow control and ensures complete data transfer? | show 🗑
|
||||
What layer of the OSI reference model is responsible for addressing packets and translating logical addresses and name into physical addresses? | show 🗑
|
||||
Which layer provides the functional and procedural means to transfer data between network entities and may provide the means to correct errors? | show 🗑
|
||||
show | Routers
🗑
|
||||
___, which connect computers, printers, servers, and other devices to the private network, operate at the Data Link Layer/Layer 2 of the OSI Model. | show 🗑
|
||||
show | Address Resolution Protocol (ARP)
Routing Information Protocol (RIP)
IPSec
IPv4
IPV6
🗑
|
||||
The _______ sub layer controls how a computer on the network gain access to the data and permission to transmit it | show 🗑
|
||||
The data link layer is divided into the _______ and _______ layers. | show 🗑
|
||||
show | Data Link Layer
🗑
|
||||
show | Physical Layer
🗑
|
||||
show | Protocol
🗑
|
||||
What are the five layers of TCP/IP? | show 🗑
|
||||
show | Hyper Text Transfer Porotcol (FTP)
🗑
|
||||
What is the purpose of Simple Mail Transfer Protocol (SMTP)? | show 🗑
|
||||
show | File Transfer Protocol (FTP
🗑
|
||||
show | Internet Protocol(IP)
🗑
|
||||
Which protocol is created to permit remote monitoring and management of devices and hosts? | show 🗑
|
||||
The protocol that provides a friendly name to IP addresses on the internet is known as | show 🗑
|
||||
Which protocol uses broadcast UDP data packets to exchange routing information? | show 🗑
|
||||
show | Dynamic Host Configuration Protocol (DHCP)
🗑
|
||||
show | Address Resolution Protocol (ARP)
🗑
|
||||
show | a port
🗑
|
||||
show | Well-Known Ports
🗑
|
||||
show | 1024-49151
🗑
|
||||
show | Registered
🗑
|
||||
Which type of ports are temporary allocations and only valid for the duration of the communication session? | show 🗑
|
||||
What are two statuses for ports? | show 🗑
|
||||
_____ communication means the delivery of information or data is guaranteed by the protocols employed to transmit it. | show 🗑
|
||||
TCP is a connnection-oriented communication protocol which provides ____ and _____ of data packet delivery. | show 🗑
|
||||
____ is used when speed is the primary importance, such as real-time video conferencing, streaming audio and video, Voice Over IP (VOIP), music, and online games. | show 🗑
|
||||
List the header fields in a UDP header: | show 🗑
|
||||
This suite is a combination of protocol relationships, encompassing several different protocols, each having different purposes and needs and is the protocol suite the majority of the Internet uses. | show 🗑
|
||||
What are the protocols mentioned that require the reliable, ordered delivery of packets that the TCP protocol offers? | show 🗑
|
||||
show | Connectionless
🗑
|
||||
1 1 0 1 (2) ^ ^ ^ ^ a b c d | show 🗑
|
||||
show |
🗑
|
||||
show |
🗑
|
||||
Binary to Hexadecimal 8421 Method Beginning with the LSD, divide the Binary number into groups of 4 Place the 8421 above each group Directly convert each of these groups into a hexadecimal digit | show 🗑
|
||||
How many binary digits make up a hexadecimal digit? | show 🗑
|
||||
show | 1111
🗑
|
||||
Computers must have a valid ___ address in order to communicate on the network. | show 🗑
|
||||
What are the names of the two parts an IPv4 address? | show 🗑
|
||||
show | Network
🗑
|
||||
To represent a binary IP address in a more user-friendly manner ___ is used. | show 🗑
|
||||
show | Class A
🗑
|
||||
What IPv4 class is used for small networks? | show 🗑
|
||||
Which class of IPv4 address has network addresses of 128-191? | show 🗑
|
||||
Class D addresses are reserved for ___ addressing. | show 🗑
|
||||
The IPv4 class reserved for research and development is class __. | show 🗑
|
||||
show | wireless
🗑
|
||||
show | Access Point
🗑
|
||||
A ____ is a device that performs a specific function. | show 🗑
|
||||
The ___ is the identifier (name) that tells you which service set (or network) to join. | show 🗑
|
||||
show | WWAN
🗑
|
||||
Which wireless computer network links two or more devices using a wireless distribution method within a limited area such as a home, school, computer laboratory, or office building? | show 🗑
|
||||
_____ link two or more devices using a wireless distribution method within a limited area such as a home, school, computer lab, or office building, with the most common connection through Wi-Fi for distances up to ___ meters | show 🗑
|
||||
What type of address is normally used as the ID of a BSS (BSSID)? | show 🗑
|
||||
An ____ consists of all the BSSs in the network. | show 🗑
|
||||
A _____ consumes less power, provides short-range communication, is low cost, and provides a connected communication of various devices in people's personal space. | show 🗑
|
||||
show | WMAN
🗑
|
||||
What type of network relies on wireless as well as wired signals? | show 🗑
|
||||
A wireless ____ network allows one to wirelessly connect one device to another without first connecting to a wireless router or access point. | show 🗑
|
||||
List three wireless advantages. | show 🗑
|
||||
Which network is faster when transferring files over a local area network, wired or wireless? | show 🗑
|
||||
show | IEEE 802.11
🗑
|
||||
show | IEEE 802.15.1 Bluetooth
🗑
|
||||
show | IEEE 802.15.4 Zigbee
🗑
|
||||
This IEEE standard uses a form of visual light communication that uses light waves from Light Emitting Diodes (LEDs) to exchange data quickly and securely at a much lower power level compared to Wi-Fi. | show 🗑
|
||||
This IEEE standard was developed separately from Wi-Fi and designed for long-range networking (spanning miles or kilometers) as opposed to local area wireless networking. | show 🗑
|
||||
is a network contention protocol that listens to a network in order to avoid collisions. | show 🗑
|
||||
This type of wireless access point has all the software required to manage the WLAN processes with no need for additional controllers or switches. | show 🗑
|
||||
This type of wireless access point has additional device or devices merged with the access point to provide the additional functionalities along with existing functionality of the access point. | show 🗑
|
||||
This type of wireless access point works as the client of the Wireless LAN Controller (WLC) and doesn’t make any forwarding decision. | show 🗑
|
||||
This type of wireless access point has either been installed on a secure company network without explicit authorization from a local network administrator or has been created to allow a hacker to conduct a man-in-the-middle attack. | show 🗑
|
||||
he two types of twisted-pair cable are | show 🗑
|
||||
show | Twisted-pair
🗑
|
||||
Category ___ UTP is not suitable for data transmission | show 🗑
|
||||
show | 5
🗑
|
||||
A ________ ________cable has the pins on end of the cable match and is used to connect two unlike devices, such as a PC to a switch. | show 🗑
|
||||
Which type of network cable has the TX and RX pins swapped on the opposite end of the cable and is used to connect like devices, such as switch to switch? | show 🗑
|
||||
A ______ cable has the pins exactly opposite on the ends of the cables and is used to connect a PC to the console port of a switch or router. | show 🗑
|
||||
show | Shielding, Twisting
🗑
|
||||
show | Shielded Twisted Pair (STP)
🗑
|
||||
show | True
🗑
|
||||
Which cable type supports the longest segment length? | show 🗑
|
||||
One problem with light transmissions is _____ conditions, such as fog, can degrade the signal. | show 🗑
|
||||
show | Fixed Frequency
🗑
|
||||
show | Spread Spectrum
🗑
|
||||
____ and ____ are two advantages of unguided media. | show 🗑
|
||||
Three disadvantages of unguided/ unbound media are ____ , _____ and _____. | show 🗑
|
||||
show | 1) Identify the problem, 2) Establish a theory of probable cause, 3) Test the theory, 4)
Establish a plan of action, 5) Verify functionality, 6) Document the findings, actions and
outcomes
🗑
|
||||
show | 1) The user experiencing the problem, 2) the computer in the form of logs and error
messages, 3) personal observation
🗑
|
||||
show | Troubleshooting
🗑
|
||||
show | From most likely to least likely
🗑
|
||||
show | 1) The plan should identify any possible repercussions that the resolution to the problem may introduce to
the network, 2) If the problem impacts others, 3) Does it require coordination with other offices or agencies?
🗑
|
||||
show | Sometimes a fix will introduce a new issue.
🗑
|
||||
show | Root Cause Analysis
🗑
|
||||
This final troubleshooting methodology step captures a history of equipment and users so that perpetual issues become known and recorded: | show 🗑
|
||||
show | Crimper
🗑
|
||||
Tests continuity and pin-out for disconnected cables | show 🗑
|
||||
Performs cable tester functions on cables connected to a device | show 🗑
|
||||
show | Punchdown Tool
🗑
|
||||
show | OTDR
🗑
|
||||
show | Light Meter
🗑
|
||||
Isolates a single cable within a larger bundle of cables. | show 🗑
|
||||
Measures voltage, resistance, and tests continuity in electrical circuits | show 🗑
|
||||
show | Spectrum Analyzer
🗑
|
||||
Intercepts and logs network packets for malware/intrusion analysis. | show 🗑
|
||||
show | Port Scanner
🗑
|
||||
show | Protocol Analyzer
🗑
|
||||
Tests the WiFi signal for reliability, signal strength, and download speed. | show 🗑
|
||||
show | Bandwidth Speed Tester
🗑
|
||||
Queries Internet Protocol (IP) address to verify network connectivity. | show 🗑
|
||||
show | tracert
🗑
|
||||
show | nslookup
🗑
|
||||
show | ipconfig
🗑
|
||||
show | ifconfig
🗑
|
||||
show | iptables
🗑
|
||||
show | netstat
🗑
|
||||
show | tcpdump
🗑
|
||||
show | pathping
🗑
|
||||
show | nmap
🗑
|
||||
show | route
🗑
|
||||
Display/edit the Address Resolution Protocol (ARP) table on a computer. | show 🗑
|
||||
show | dig
🗑
|
||||
show | devices within a network.
🗑
|
||||
Some connectivity test sets can perform switch connectivity, Ping, and _______ testing. | show 🗑
|
||||
Some connectivity test sets can act as transmission testers, perform RF tests, check for delay skew and create ___________ maps | show 🗑
|
||||
______________________________ are used by network administrators to monitor the availability of network services, functionality of network interfaces, status of critical hardware systems, CPU, memory, or bandwidth. | show 🗑
|
||||
List three other statistics an NMS provides for servers and devices on a network. | show 🗑
|
||||
show | Discover, Map, Monitor, Alert, and Report
🗑
|
||||
show | Discover
🗑
|
||||
show | device role
device list
🗑
|
||||
show | type and vendor
🗑
|
||||
show | Map
🗑
|
||||
NMSs generate ____ _________, a powerful first response tool that enables network administrators to visualize their networks, display devices and up- to-date status. | show 🗑
|
||||
show | Monitor
🗑
|
||||
List the “big 5” network administrators want to monitor for any device on the network. | show 🗑
|
||||
show | Alert
🗑
|
||||
based alerting enables network administrators to respond to problems before they impact users, or applications. | show 🗑
|
||||
show | Syslog
🗑
|
||||
Which basic function of the NMS deals with real-time and historical reporting? | show 🗑
|
||||
show | dashboards
turn-key
🗑
|
||||
show | Intrusion Detection System
🗑
|
||||
IDSs ___, ____, and ____ the security infrastructure for signs of attack in progress | show 🗑
|
||||
List two ways that IDSs work. | show 🗑
|
||||
show | SNMP
🗑
|
||||
show | Querying agents, getting replies from agents, establishing variables in agents, and recognizing asynchronous events
🗑
|
||||
show | Management Information Base (MIB)
🗑
|
||||
show | All the information that is exposed by the managed device.
🗑
|
||||
show | Object Identifier
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
BrotherH
Popular Computers sets