Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Exam Questions & Answers ( CORREET ANSWERS 2024)
Typology: Exams
1 / 183
What is a condition of being threatened by serious and/or imminent danger and of requiring immediate assistance? - Correct Answers ✅✅Distress What is a condition concerning the security of a ship, aircraft or other vehicle, or of some person on board or within sight, but which does not require immediate assistance? - Correct Answers ✅✅Urgency What safety is that condition which necessitates the transmission of a message concerning the safety of navigation or providing important meteorological warnings? - Correct Answers ✅✅Safety What traffic shall have absolute priority over all other transmissions? - Correct Answers ✅✅Distress What traffic shall have priority over all othe communications except distress? - Correct Answers ✅✅Urgency In cases of distress, urgency or safety transmissions by radiotelephony they shall be made slowly and distinctly, each word being clearly pronounced to facilitate what? - Correct Answers ✅✅Transcription What is the service between aeronautical stations (normally a land station but may be placed onboard a ship or an earth satellite) and aircraft stations or between aircraft stations in which survival craft stations may also participate? - Correct Answers ✅✅Aeronautical Mobile Service
What is the service between coast stations and ship stations, or between ship stations, in which survival craft stations may also participate? - Correct Answers ✅✅Maritime Mobile Service The Global Maritime Distress and Safety System is administered by who? - Correct Answers ✅✅International Maritime Organization (IMO) In a voice distress signal the word MAYDAY is pronounced as which French expression? - Correct Answers ✅✅"m'aider" The voice alarm signal consists of two substantially sinusoidal audio frenquency tones transmitted alternatively. One tone has a frequency of 2200 Hz and the other 1300 Hz. The duration of each tone is how long? - Correct Answers ✅✅250 milliseconds The purpose of what signal is to alert the operators on watch or to activate 2182 kHz watchkeeping recievers to warn operators that distress call or message is to follow? - Correct Answers ✅✅Alarm signal The frequency 2182 kHz (and it's supplementary frequencies 4125 and 6215 kHz) is the International Distress frequency for what? - Correct Answers ✅✅Voice What frequency is the International Distress, Safety and Calling frequency for the maritime mobile VHF radiotelephone service? - Correct Answers ✅✅156. MHz
Immediately before a crash landing or a forced landing (on land or sea) of an aircraft, as well as before total abandonment of a ship or an aircraft, the radio equipment should be set for what type of emmission? - Correct Answers ✅✅Continuous When a station in distress has delegated control of distress working to another station the person in charge of the station in distress should, when he considers silence no longer justified, immediately inform the what? - Correct Answers ✅✅Controlling station All other stations which hear the Urgency signal are to continue to listen for at least how long? - Correct Answers ✅✅Three minutes What indicates that the station is about to transmit a message containing an important navigational or meteorological warning? - Correct Answers ✅✅Safety signal An aircraft seeing but not understanding ground signals by day will fly a complete right circle and by night will make red flashes with what? - Correct Answers ✅✅Signal lamp When making ground signals you shoudl make them not less than how long in length? - Correct Answers ✅✅8 feet In the absence of any response to this initial transmission the aircraft, ship or survival craft will preferably inititate a distress call on the Internationall
Aeronautical Emergency Frequency 121.5 MHz or on the Distress and Emergency Frequency of what? - Correct Answers ✅✅243.0 MHz The International Distress and Calling frequency for voice on what frequency is used by mobile stations, survival craft and emergency postition-indicating radiobeacons using frequencies in the authorized bands between 1605 and 4000 kHz when requesting assistance from the maritime services? - Correct Answers ✅✅2182 kHz Which frequencies are used to supplement the carrier frequency 2182 kHz for Distress and Safety purposes and for call and reply? - Correct Answers ✅✅4125 kHz and 6215 kHz What frequency is used for the International Aeronautical Emergency Frequency for aircraft and those aeronautical stations primarily concerned with the safety and regularity of flight along national or international civil air routes and having equipment in the 118-136 MHz band? - Correct Answers ✅✅121.5 MHz What frequency is for international use by the Maritime Mobile VHF Radiotelephone Service as a distress, safety and calling frequency? - Correct Answers ✅✅156.8 MHz What frequency is agreed internationally for use by equipment provided for use in Survival Craft Stations, which is capable of operatiing on bands between 235 and 328.6 MHz? - Correct Answers ✅✅243 MHz
Which frequencies are common to both the Aeronautical Mobile (Route) Service (Aem(R)) and the Aeronautical Mobile (Off-Route) (Aem(OR)) Service and are available to all mobile units at the scene of a search and rescue operation, and by fixed stations for communicating with aircraft proceeding to or from a search and rescue scene? - Correct Answers ✅✅3023 kHz and 5680 kHz Which frequency is for world-wide use when communicating with enroute aircraft participating in SAR operaitons? - Correct Answers ✅✅123.1 MHz Call signs for assigned SAR craft will consist of which prefix followed by the normal SAR call sign? - Correct Answers ✅✅"RESCUE" What is the ability to rapidly collect, process, and disseminate information while denying these capabilities to adversaries? - Correct Answers ✅✅Information Superiority What are the measures that protect and defend information and information systems by ensuring availability integrity, authentication, confidentiality and non- repudiation? - Correct Answers ✅✅Information Assurance What consists of actions and operations to defend computer systems and networks from unauthorized activities that degrad mission performance and adversely impact survivability? - Correct Answers ✅✅Computer Network Defense What focuses on affecting human decision processes to achieve friendly objectives? - Correct Answers ✅✅Information Operations
What enables operations and intelligence collection to gather data from target or adversary automated information systems or networks? - Correct Answers ✅✅Computer Network Exploitation (CNE) What provides globally interconnected capabilities, processes and personnel for collecting, processing, storing, disseminating and managing information for all DoD war-fighters, policy makers, and support personnel? - Correct Answers ✅✅Global Information Grid (GIG) What is an organizational, procedural and technological construct for ensuring information superiority and enabling speed of command for the war-fighter? - Correct Answers ✅✅NETOPS What intergrates the three primary functions of network management, information dissmination managment (IDM) and IA? - Correct Answers ✅✅NETOPS What provides visibility of extent and intensity of the activity, traffic, load and throughput potential, as well as detction of significant degradation of service? - Correct Answers ✅✅Network Management What does network management enable based on priority, system status and capacity? - Correct Answers ✅✅Dynamic Rerouting What intergrates an organized, manned, equipped and trained workforce to guard, secure and secure information and information systems by providing the
security services/attributes of availability, authentication, confidentiality, integrity and non-repudiation? - Correct Answers ✅✅Information Assurance What provides the timely, reliable access to data and services for authorized users? - Correct Answers ✅✅Availability What is the security measure designed to establish the validity of a transmission, messge or originator, or as a means of verifiying an individual's authorization to access specific categories of information? - Correct Answers ✅✅Authentication What provides the assurance the information is not disclosed to unauthorized entities or processes? - Correct Answers ✅✅Confidentiality What is the quality of an information system reflecting the logical correctness and reliablity of the operating system? - Correct Answers ✅✅Integrity What is the assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data? - Correct Answers ✅✅Non-repudiation Which instruction states that all DoD information systems and networks will be certified and accredited IAW with the DoD policy and guidance, currently the DoD Information Technology Security Certification and Accredidation Process (DITSCAP)? - Correct Answers ✅✅DoD Instruction 5200.
Certifcation and accreditation (C&A) of information systems that process Top Secret Sensitive Compartmented Information will comply with the requirements of what? - Correct Answers ✅✅Director of Central Intelligence Directive Who is responsible for developing US military policy, positions and concepts supporting CND and IA? - Correct Answers ✅✅Chairman of the Joint Chief's of Staff What is the opportunity to make use of an information systems (IS) resource? - Correct Answers ✅✅Access What limits access to information system resources only to authorized users, programs, processes or other systems? - Correct Answers ✅✅Access Control What is the process of tracing information system activites to a responsible source known as? - Correct Answers ✅✅Accountability What is the formal declaration by a DAA that an information systems is approved to operate in a particular security mode at an acceptable level of risk? - Correct Answers ✅✅Accreditation What is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event? - Correct Answers ✅✅Audit Trail
What are automated methods of authenticating or verifying an individual based upon a physical or behavioral characteristic? - Correct Answers ✅✅Biometrics What is the probability that a particular vulnerability will be exploited within an interacting population and adversely impact some members of that population? - Correct Answers ✅✅Community Risk What are teams composed of personnel with technical expertise and organic equipment that may deploy to assist remote sites in the restoration of a computer services? - Correct Answers ✅✅Computer Emergency Response Team What are operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computers and networks themselves?
supporting military operations? - Correct Answers ✅✅Defense Information Systems Network What is a type of incident resulting from any action or series of actions that prevents any part of an information system (IS) from functioning? - Correct Answers ✅✅Distributed Denial of Service Who is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk? - Correct Answers ✅✅Designated Approving Authority What is a collection of computing enviroments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security? - Correct Answers ✅✅Enclave What is an occurrence, not yet assessed, that may effect the performance of an IS? - Correct Answers ✅✅Event What is a system designed to defend against unauthorized access to or from a private network? - Correct Answers ✅✅Firewall What is a program recorded in permanent or semi-permanent computer memory? - Correct Answers ✅✅Firmware What information system (IS) assessed occurrence having actual or potentially adverse effects on an IS? - Correct Answers ✅✅Incident
Which INFOCON level is described as a normal readiness of DoD information systems and networks? - Correct Answers ✅✅Normal Which INFOCON level has increased intelligence watches and strengthened security measures of DoD information systems and networks? - Correct Answers ✅✅Alpha Which INFOCON level has a further increase in CND force readiness above that required for normal readiness? - Correct Answers ✅✅Bravo Which INFOCON level has a further increase in CND force readiness but less than maximum CND force readiness? - Correct Answers ✅✅Charlie Which INFOCON level is described as the maximum CND force readiness? - Correct Answers ✅✅Delta Who is the individual responsible for the information assurance program of a DoD information system or organization? - Correct Answers ✅✅Information Assurance Manager Who is the individual responsible to the IAM for ensuring the appropriate operational IA posture is maintained for a DoD informatioin system or organization? - Correct Answers ✅✅Information Assurance Officer
What is the unauthorized act of bypassing the security mechanism of a system? - Correct Answers ✅✅Intrusion What is hardware, software or firmware capable of performing an unauthorized function on an information system? - Correct Answers ✅✅Malicious Logic Which type of threats describes common hacker tools and techniques used in a non-sophisticated manner? - Correct Answers ✅✅First Generation Which type of threats describes non state-sponsored computer network attack, espionage or data theft? - Correct Answers ✅✅Second Generation Which type of threats describes state-sponsored computer network attack or espionage? - Correct Answers ✅✅Third Generation What is the possibility that a particular threat will adversly impact an IS by exploiting a particular vulnerability? - Correct Answers ✅✅Risk What is a weakness in an information system, system security procedures, internal controls or implementation that could be exploited? - Correct Answers ✅✅Vulnerability What is a formal description and evaluation of vulnerabilities of an information system? - Correct Answers ✅✅Vulnerability Assessment What is the core of the system? - Correct Answers ✅✅Motherboard
What is often thought of as the "engine" of the computer? - Correct Answers ✅✅Processor What holds all the programs and data the processor is using at a given time? - Correct Answers ✅✅RAM What is the frame or the chassis that houses the motherboard, power supply, disk drives, adapter cards and any other physical components of the system? - Correct Answers ✅✅Case What feeds electrical power to the internal components in the PC? - Correct Answers ✅✅Power Supply What is a low-capacity, removable media, magnetic-storage device? - Correct Answers ✅✅Floppy Drive What is th eprimary high-capacity storage media for the system? - Correct Answers ✅✅Hard Disk What drives are relatively high-capacity, removable-media, optical drives? - Correct Answers ✅✅CD and DVD drives What is the primary device on a PC that is used by a human to communicate with a control system? - Correct Answers ✅✅Keyboard
What was the first and most popular pointing device on the market? - Correct Answers ✅✅Mouse What controls the informaiton you see on the monitor? - Correct Answers ✅✅Video Card What enables the PC to generate complex sounds? - Correct Answers ✅✅Sound Card What motherboard form factor is used in tower and desktop systems; popular in high-end major OEM systems starting in 2007? - Correct Answers ✅✅BTX What motherboard form factor is used in Standard tower and desktop systems; most common form factor from mid-1996 through thr present; supports high-end systems? - Correct Answers ✅✅ATX What does BIOS stand for? - Correct Answers ✅✅Basic Input/Output System What consists of low level software that controls the system hardware and acts as an interface between the operating system and the hardware? - Correct Answers ✅✅BIOS What are the three main types of physical memory that are used in modern PC's?
What is a type of momry that can permanently or semi-permanently store data? - Correct Answers ✅✅Read-only memory (ROM) What is the type of memory chip used for most of the main memory in a modern PC? - Correct Answers ✅✅Dynamic RAM (DRAM) What type of memory is available in access times of 2ns or less? - Correct Answers ✅✅SRAM A nanosecond is defined as? - Correct Answers ✅✅1 billionth of a second Whar defines storage that retains the data even when no power is supplied to the computer? - Correct Answers ✅✅Non-volatile Hard disk drives are sometimes referred to as? - Correct Answers ✅✅Winchester Drives What is a single ring of data on one side of a disk? - Correct Answers ✅✅Track Tracks are divided into several numbered divisions known as? - Correct Answers ✅✅Sectors Which type of file system was the optional file system supported by Windows 95 OSR2 (OEM Service Release 2) and later? - Correct Answers ✅✅FAT32 (File Allocation Table, 32-bit)
Which type of file system was the standard file system supported by DOS and Windows 9x/Me? - Correct Answers ✅✅FAT (File Allocation Table) What is the native file system for Windows NT and later? - Correct Answers ✅✅NTFS (Windows NT File System) What are the two types of disk storage for computers? - Correct Answers ✅✅Magnetic and Optical What type of storage is represented by the standard floppy and hard disks installed in most PC systems, where the data is recorded magnetically on rotating disks? - Correct Answers ✅✅Magnetic What type of storage is similar to magnetic disk storage in basic operation, but it reads and records using light (optically) instead of magnetism? - Correct Answers ✅✅Optical What type of network is formed from computers and components in a single office or building? - Correct Answers ✅✅Local Area Network (LAN) LANs in differenct locations can be connected by high-speed fiber-optic, satellite, or leased phone lines form a? - Correct Answers ✅✅Wide Area Network (WAN)
What uses the same web browsers and other software and the same TCP/IP protocol as the public Internet, but exist as a portion of a company's private network? - Correct Answers ✅✅Intranet Intranets that share a portion of their content with customers, suppliers, or other businesses but not with the general public are called? - Correct Answers ✅✅Extranet A Cat 3 (10BASE-T) transmission media can support up to what speed of transfer?
An 802.11n wireless Ethernet transmission can support up to what speed of transfer? - Correct Answers ✅✅250 Mbps What network topology connects each computer on a network to a central access point? - Correct Answers ✅✅Star What network topology connects each computer on a network to the next computer in a linear fashion? - Correct Answers ✅✅Bus What network topology connects each computer on a network to the others in a loop or ring? - Correct Answers ✅✅Ring What protocol suite is utilized by most Windows-based networks, as well as Linuz, Unix, MacOS and other networks? - Correct Answers ✅✅TCP/Ip What protocol suite is utilized by mainly Novell 4.x and earlier networks? - Correct Answers ✅✅IPX/SPX What does POST stand for? - Correct Answers ✅✅Power On Self Test What operates whenever any PC is powered up? - Correct Answers ✅✅POST The POST routines are contained where? - Correct Answers ✅✅Within the motherboard ROM as well as ROMs on expansion cards
To notify a system administrator when there is a problem with the machine the POST uses what? - Correct Answers ✅✅Beep Codes A ____ is group of computers and other devices that are connected by some type of transmission media. - Correct Answers ✅✅Network In a _____ network, every computer can communicate directly with any other computer. - Correct Answers ✅✅Peer-to-peer (P2P) Which of the following terms describes a network of computers and other devices that is confined to a relatively small space, such as one building or even on office?
The term ____ refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities. - Correct Answers ✅✅Soft Skills _____ refers to the capability of a server to share data files, applications, and disk storage space. - Correct Answers ✅✅File Services ____ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service shoudl be designed or performed. - Correct Answers ✅✅Standards Protocols at the ____ layer accept Application layer data and format it so that one type of application and host can understand date from another type of application and host. - Correct Answers ✅✅Presentation ____ is a networking technology originally developed at Xerox in the early 1970s and improved by Digital Equipment Corporation, Intel, and Xerox - Correct Answers ✅✅Ethernet ____ is a method of identifying segements that belong to the same group of subdivided data. - Correct Answers ✅✅Sequencing ____ protocols ensure that data arrives exactly as it was sent by establishing a connection with another node before they begin transmitting data. - Correct Answers ✅✅Connection-oriented
Transport layer protocols break large data units received from the Session layer in mulitple smaller units called _____ - Correct Answers ✅✅Segments Network layer addresses are also called _____ - Correct Answers ✅✅Virtual Addresses The _____ is the lowest, or first layer of the OSI model. - Correct Answers ✅✅Physical Layer _____ layer services manage data encryption and decryption. - Correct Answers ✅✅Presentation A wave's _____ is a measure of its strength at any given point in time. - Correct Answers ✅✅Amplitude A(n) ____ is in distinct communication path between nodes. - Correct Answers ✅✅Channel The most common way to measure latency on data networks is by calculating a packet's _____ - Correct Answers ✅✅Round Trip Time A(n) _____ issues and receives wireless signals with equal strength and clarity in all directions. - Correct Answers ✅✅Omni-directional Antenna
A(n) ____ is a device that accepts wireless signals from multiple nodes and retransmits them to the rest of the network. - Correct Answers ✅✅Access Point The distance between corresponding points on a wave's cycle is called its ____ - Correct Answers ✅✅Wavelength _____ is a term used by network professionals to describe the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network. - Correct Answers ✅✅Overhead ____ occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable. - Correct Answers ✅✅Crosstalk ____ is the capacity for a component or system to continue functioning despite damage or partial malfunction. - Correct Answers ✅✅Fault tolerance A ____ is a rule that governs how networks communicate. - Correct Answers ✅✅Protocol _____ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address. - Correct Answers ✅✅Address Resolution Protocol _____ contain databases of associated names and IP addresses and provide this information to resolvers on request. - Correct Answers ✅✅Name servers
The _____ provides a means of resolving NetBIOS names to IP addresses. - Correct Answers ✅✅Windows Internet Naming Service ____ is the provess of assigning one network component to work with another. - Correct Answers ✅✅Binding _____ allows one device to send data to a specific group of devices. - Correct Answers ✅✅Multicasting A(n) _____ is a special 32-bit number that, when combined with a device's IP address informs the rest of the network about the segment or network to which it is attached. - Correct Answers ✅✅Subnet mask _____ are any hosts on the Internet that need to look up domain name information. - Correct Answers ✅✅Resolvers _____ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite. - Correct Answers ✅✅Telnet The _____ is a simple Application layer protocol used to synchornize the clocks of computers on a network. - Correct Answers ✅✅Network Time Protocol (NTP) _____ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media. - Correct Answers ✅✅Network Interface Cards (NIC)
A computer's _____ is the circuit, or signaling pathway, used by the motherboard to transmit date to the computer's components, including its memory, processor, hard disk, and NIC - Correct Answers ✅✅Bus _____ is a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NICS. - Correct Answers ✅✅USB _____ are physicallt designed to be linked with other hubs in a single telecommunications closet. - Correct Answers ✅✅Stackable Hubs _____ are connectivity devices that subdivide a network into smaller logical pieces. - Correct Answers ✅✅Switches A(n) _____ is a message to the computer that instructs it to stop what it is doing and pay attention to something else. - Correct Answers ✅✅Interrupt Request, IRQ The _____ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchanging, or buffering, data. - Correct Answers ✅✅Memory Range A(n) _____ is a logically or physically distinct Ethernet network segemtn on which all participating devices must detect and accommodate data collisions. - Correct Answers ✅✅Collision Domain
A _____ topology does not specift device types, connectivity methods, or addressing schemes for the network. - Correct Answers ✅✅Physical The term _____ topology refers to the way in which data is transmitted between nodes rather than the physical layout of the paths that data takes. - Correct Answers ✅✅Logical In _____ , a connection is established between two network nodes before the bgin transmitting data. - Correct Answers ✅✅Circuit Switching _____ is a network technology whose standards were originally specified by ANSI in the mid-1980's and later refined by ISO. - Correct Answers ✅✅FDDI _____ is an ITU networking standard describing Data Link layer protocols for both network access and signal multiplexing. - Correct Answers ✅✅Asynchronous Transfer Mode A network's _____ iw its method of controlling how network nodes access the communications channel. - Correct Answers ✅✅Access Method _____ enables multiple nodes to simultaneously transmit and receive data over different logical network segments. - Correct Answers ✅✅Switched Ethernet In _____ , a 3-byte oacket, called a token, is transmitted from one node to another in a circular fashion around the ring. - Correct Answers ✅✅Token Passing