3DX7X Volume 1 URE

Descripción

Test sobre 3DX7X Volume 1 URE, creado por Evelyn Hernandez el 30/05/2016.
Evelyn Hernandez
Test por Evelyn Hernandez, actualizado hace más de 1 año
Evelyn Hernandez
Creado por Evelyn Hernandez hace alrededor de 8 años
124
3

Resumen del Recurso

Pregunta 1

Pregunta
Which Air Force Specialty Code (AFSC) requires members to pass the Air Force Electronic Data Processing Test?
Respuesta
  • Computer Systems Programing
  • Cyber Systems Operations
  • Cyber Transport Systems
  • Cyber Surety

Pregunta 2

Pregunta
Which of the following is NOT a mandatory requirement for the advancement to the 7-skill level?
Respuesta
  • Minimum rank of SSgt
  • 6 months on-the-job training (OJT) for retrainees
  • Completion of Air Force Specialty Code (AFSC) specific requirements
  • Completion of Air Education and Training Command (AETC) Supplemental training courses

Pregunta 3

Pregunta
Which of the following functions is PRIMARILY STAFFED by Client Systems personnel but may have a variety of Air Force Specialty Codes (AFSCs) based upon the unit mission?
Respuesta
  • Communications Focal Point
  • Unit Deployment Monitor
  • Enterprise Service Desk
  • Quality Assurance

Pregunta 4

Pregunta
What document directs the Communication Focal Point KEY PROCESSES?
Respuesta
  • TO 00-5-15
  • MPTO 00-33A-1001-WA
  • Air Force Enlisted Classification Directory
  • Career Field Education and Training Plan (CFETP) Part II

Pregunta 5

Pregunta
Where is the Air Force active component manpower planning and programming CENTRALIZED?
Respuesta
  • at major command functional managers
  • at Headquarters Air Force (HAF)
  • at the Air Force Personnel Center
  • with career field managers

Pregunta 6

Pregunta
Which of the following is the OFFICIAL SOURCE OF MANPOWER INFORMATION for an organization and is used as a tool to manage positions?
Respuesta
  • Program Element Code (PEC)
  • Unit Manpower Document (UMD)
  • Authorization Change Request (ACR)
  • Unit Personnel Management Roster (UPMR)

Pregunta 7

Pregunta
Which of the following is a subdivision of programmed cost data related to a weapon system or support function?
Respuesta
  • Program Element Code (PEC)
  • Special Experience Identifier (SEI)
  • Authorization Change Request (CR)
  • Unit Personnel Management Resource (UPMR)

Pregunta 8

Pregunta
Which of the following is NOT a responsibility of the Air Force Career Field Manager (AFCFM)?
Respuesta
  • Construct career paths
  • Manage skill-level training requirements
  • Establish requirements for entry into the career field
  • Distribute personnel throughout their respective major command (MAJCOM)

Pregunta 9

Pregunta
Who serves as the Major Command (MAJCOM) voting representative during career field Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)?
Respuesta
  • MAJCOM director of Communications (A6)
  • MAJCOM Functional Manager
  • Career Field Manager (CFM)
  • SAF/CIO (A6)

Pregunta 10

Pregunta
Which Segment of the Utilization and Training Workshop (U&TW)/Specialty Training Requirements Team (STRT) process concentrates on TRAINING PROFICIENCY LEVELS AND TRAINING RESOURCING?
Respuesta
  • Segment 1
  • Segment 2
  • Segment 3
  • Segment 4

Pregunta 11

Pregunta
Which of the following is NOT an action of the Specialty Training Requirements Team (STRT)?
Respuesta
  • Draft and sign minutes
  • Finalize part 1 of the career field education and training plan (CFETP)
  • Finalize Air Force Enlisted Classification Directory (AFECD) specialty description
  • Finalize Specialty Training Standards (STS)/Course Training Standards (CTS) for all courses

Pregunta 12

Pregunta
Which of the following is an OPTIONAL ATTENDEE for the Utilization and Training Workshop (U&TW)?
Respuesta
  • Air Education and Training Command (AETC)/Training Pipeline Manager (TPM)
  • AETC Career Development Course (CDC) writer
  • Air Force Career Field Manager (AFCFM)
  • MAJCOM Functional Manager

Pregunta 13

Pregunta
What is used as a starting point to develop the Career Field Education and Training Plan (CFETP) and Specialty Training Standard (STS) during the Specialty Training Requirements Team (STRT) and Utilization and Training Workshop (U&TW)?
Respuesta
  • Occupational Analysis Report (OAR)
  • Quality Training Package (QTP)
  • Subject Matter Experts (SME)
  • Job Quality Standards (JQS)

Pregunta 14

Pregunta
What Automated Information System (AIS) is used to document actions on any item with an assigned Standard Reporting Designator (SRD)?
Respuesta
  • Remedy
  • Situational Report (SITREP)
  • Telephone Management System (TMS)
  • Integrated Maintenance Data System (IMDS)

Pregunta 15

Pregunta
Which of the following is NOT a common duty of the Maintenance Data Collection (MDC) monitor?
Respuesta
  • Review Integrated Maintenance Data System (IMDS) reports to ensure job status is reflected properly
  • Ensures equipment status is entered into Equipment Status Reporting (ESR)
  • Match reports with Open Incident Listing (OIL)
  • Schedule and distribute daily maintenance actions

Pregunta 16

Pregunta
Who establishes the necessary controls to ensure periodic inspections are accomplished?
Respuesta
  • Communications Focal Point
  • Flight Commander/Chief
  • Production Controller
  • Commander

Pregunta 17

Pregunta
Which of the following is included in the Master Training Plan ONLY IF APPLICABLE TO THE WORK CENTER?
Respuesta
  • Master Task List
  • Job Qualification Standard
  • Current Career Field Education and Training Plan (CFETP)
  • Milestones for tasks and Career Development Course (CDC) completion

Pregunta 18

Pregunta
Special Personnel Evaluations (SPEs) are required on a sampling of Air Reserve Component (ARC) personnel within how many days of NEW EQUIPMENT/SYSTEM ACCEPTANCE?
Respuesta
  • 30
  • 60
  • 90
  • 120

Pregunta 19

Pregunta
Which statement is NOT a goal of Operational Risk Management (ORM)?
Respuesta
  • Enhance mission effectiveness at all levels, while preserving assets and safeguarding health and welfare
  • Integrate ORM into mission processes, ensuring decisions are based upon assessments of risk integral to the activity and mission
  • Create an Air Fore in which every leader, Airman and employee is trained and motivated to manage risk in all their on and off-duty activities
  • Identify opportunities to decrease Air Force warfighting effectiveness on the battlefield and in the operational aerospace environment, helping to ensure decisive victory in any future conflict at the least possible cost

Pregunta 20

Pregunta
How many steps are there in Operational Risk Management (ORM)?
Respuesta
  • 2
  • 4
  • 6
  • 8

Pregunta 21

Pregunta
Supervisors document and maintain COMPLETED SAFETY TRAINING on
Respuesta
  • AF Form 55
  • AF Form 971
  • AF Form 623A
  • AF Form 623A and AF Form 55

Pregunta 22

Pregunta
Which of the following is NOT a term for Job Safety Analysis?
Respuesta
  • Job Safety Training (JST)
  • Job Hazard Analysis (JHA)
  • Task Hazard Analysis (THA)
  • Activity Hazard Analysis (AHA)

Pregunta 23

Pregunta
Which of the following is NOT contained in Technical Order (TO) 00-5-1?
Respuesta
  • Time Compliance Technical Order (TCTO) Procedures
  • Resources required to manage and use TOs
  • Infrastructure to manage and use TOs
  • Training to manage and use TOs

Pregunta 24

Pregunta
Recommended technical order (TO) changes are REQUIRED to be submitted on
Respuesta
  • AFTO Form 673
  • AFTO Form 22
  • AF Form 673
  • AF Form 22

Pregunta 25

Pregunta
Who determines is local checklists and/or work cards are required for specific equipment?
Respuesta
  • Library Custodian
  • Flight commander/chief
  • Technical Order Distribution Office (TODO)
  • Technical Order Distribution Account (TODA)

Pregunta 26

Pregunta
Who provides accreditation for the Telecommunications Industry Association?
Respuesta
  • Electronic Industries Alliance (EIA)
  • American National Standard Institute (ANSI)
  • Information and Communications Technology (ICT)
  • Electronic Components Industry Association (ECIA)

Pregunta 27

Pregunta
Who develops standards for Interconnect, Passive and Electro-mechanical (IP&E) electronic components under the American National Standard Institute (ANSI) designation of Electronic Industries Alliance (EIA) standards?
Respuesta
  • Electronic Industries Alliance (EIA)
  • American National Standard Institute (ANSI)
  • Information and Communications Technology (ICT)
  • Electronic Components Industry Association (ECIA)

Pregunta 28

Pregunta
Who should endorse the AF Form 673 as the Certifying Official?
Respuesta
  • The Authoring Office of Primary Responsibility (OPR)
  • Commander/director responsible for the guidance
  • The authoring OPR's supervisor
  • Publications Manager

Pregunta 29

Pregunta
What systems allow for a commonly understood, maintainable, and defendable domain through all federal and non-federal systems?
Respuesta
  • Air Force Network Operating Instructions (AFNOI)
  • Telecommunications industry Association (TIA)
  • Commercial Off-The-Shelf (COTS)
  • Military Only

Pregunta 30

Pregunta
The creation of the DOD as an executive component of the government is authorized by United States Code (USC) Title
Respuesta
  • 10
  • 15
  • 37
  • 50

Pregunta 31

Pregunta
Procedures and circumstances for Congress to order units into active Federal duty are established in United States Code (USC) Title?
Respuesta
  • 15
  • 18
  • 32
  • 37

Pregunta 32

Pregunta
Who appoints Air Force Portal Content Managers and Content Publishers for PUBLIC AND PRIVATE WEBSITES?
Respuesta
  • Wing Commander
  • Numbered Air Force Commander
  • Communications Squadron Commander
  • Cyber Readiness Squadron Commander

Pregunta 33

Pregunta
When a person uses his or her position for private or personal gain it is called
Respuesta
  • misuse of position
  • a covered relationships
  • non-public information
  • personal conflict of interest

Pregunta 34

Pregunta
Which type of fund convers the COST OF RELOCATING FACILITIES?
Respuesta
  • Military Personnel (MILPERS)
  • Military Construction (MILCON)
  • Operation and Maintenance (O&M)
  • Research, Development, Test and Evaluation (RDT&E)

Pregunta 35

Pregunta
What is the maximum amount for minor construction projects that Operation and Maintenance (O&M) funds will cover under normal conditions?
Respuesta
  • $100,000
  • $250,000
  • $750,000
  • $1,000,000

Pregunta 36

Pregunta
In-depth information for administering the Government Purchase Card program at all responsible levels is found in Air Force Instruction (AFI)
Respuesta
  • 10–401
  • 33–360
  • 38–101
  • 64–117

Pregunta 37

Pregunta
At the installation level which office is responsible for program implementation, administration, training, and monitoring the Government Purchase Card (GPC) Program?
Respuesta
  • Approval Official (AO).
  • Agency/Organization Program Coordinator (A/OPC).
  • DoD Purchase Card Program Management Office (PCPMO).
  • Office of the Deputy Secretary of the Air Force for Acquisition Contracting (SAF/AQC).

Pregunta 38

Pregunta
Which of the following is not a responsibility of Government Purchase Card (GPC) cardholders?
Respuesta
  • Making authorized transactions.
  • Reconciling transactions.
  • Logging transactions.
  • Funds accountability.

Pregunta 39

Pregunta
Detailed instructions for submitting a reclama or shortfall request are found in
Respuesta
  • Air Force Instruction (AFI) 10–201.
  • Joint Publication 1–02.
  • Joint Publication 1–03.
  • AFI 10–401.

Pregunta 40

Pregunta
Who reviews the selections after the board selects the 12 Outstanding Airmen of the Year?
Respuesta
  • Air Force Chief of Staff.
  • Secretary of the Air Force.
  • Selected major command Command Chiefs.
  • Chief Master Sergeant of the Air Force.

Pregunta 41

Pregunta
Which of the following is the highest level in which quarterly awards are normally presented?
Respuesta
  • Wing
  • Group
  • Squadron
  • Major Command

Pregunta 42

Pregunta
Guidance for awards specific to the Cyber community are found in Air Force instruction
Respuesta
  • 36–2604
  • 36–2803
  • 36–2805
  • 36–2845.

Pregunta 43

Pregunta
What are the inclusive dates for Secretary of the Air Force/Chief Information Officer (SAF/CIO) annual awards?
Respuesta
  • 1 October - 30 September.
  • 1 January - 31 December.
  • 1 April - 31 March.
  • 1 July - 30 June.

Pregunta 44

Pregunta
The maximum number of devices a FireWire bus can take is up to
Respuesta
  • 53
  • 63
  • 73
  • 83

Pregunta 45

Pregunta
What device is a series of single-pole, single-throw switches mounted to a circuit board?
Respuesta
  • Monitor.
  • Scanner.
  • Keyboard.
  • Graphics card.

Pregunta 46

Pregunta
A workgroup is a simple grouping of how many computers?
Respuesta
  • At least 5.
  • No more than 10.
  • No more than 20.
  • 20 or more.

Pregunta 47

Pregunta
Which is not a type of UNIX pathname?
Respuesta
  • Simple.
  • Relative.
  • Positive.
  • Absolute.

Pregunta 48

Pregunta
Which application includes tools to help recover lost files and protect against computer failure?
Respuesta
  • Norton Utilities.
  • Acrobat Reader.
  • Virus Scan.
  • WinZip.

Pregunta 49

Pregunta
The Institute of Electrical and Electronics Engineers (IEEE) divides the Open System Interconnect (OSI) Data Link Layers into what two sublayers?
Respuesta
  • High Level Data Link Control (HDLC) and Synchronous Data Link Control (SDLC).
  • Logical Link Control (LLC) and Media Access Control (MAC).
  • Distance Vector and Link State.
  • RS–232 and RS–530.

Pregunta 50

Pregunta
Network switches and bridges operate at what Open System Interconnect (OSI) layer?
Respuesta
  • Network.
  • Physical.
  • Data Link.
  • Transport.

Pregunta 51

Pregunta
Routers operate at what Open System Interconnect (OSI) layer?
Respuesta
  • Network.
  • Physical.
  • Data Link.
  • Transport.

Pregunta 52

Pregunta
Virtual circuits are established, maintained, and terminated at what Open System Interconnect (OSI) layer?
Respuesta
  • Network.
  • Physical.
  • Data Link.
  • Transport.

Pregunta 53

Pregunta
What is the combat information technology (IT) communication support agency of the DoD called?
Respuesta
  • Defense Intelligence Agency.
  • Defense Information Systems Agency.
  • Defense Information Systems Network.
  • Department of Defense Information Networks.

Pregunta 54

Pregunta
Who must provide encryption devices for connection to the Secret Internet Protocol (IP) Data service?
Respuesta
  • The customer
  • Security Manager
  • National Security Agency
  • Communications Squadron

Pregunta 55

Pregunta
What are two classifications for TRANSPORT PROTOCOLS?
Respuesta
  • Connection Oriented and Connectionless Oriented
  • Classful and Connectionless Oriented
  • Connectionless Oriented and Classless
  • Classful and Classless

Pregunta 56

Pregunta
In a connection-oriented protocol, such as Transmission Control Protocol (TCP), what MUST HAPPEN BEFORE DATA IS TRANSMITTED BETWEEN CLIENTS
Respuesta
  • Authorization
  • Connection establishment
  • Establishment of a clear channel
  • End-to-end connectivity between host applications

Pregunta 57

Pregunta
What regulates how much information passes over a Transmission Control Protocol (TCP) connection before the receiving host must send an acknowledgement?
Respuesta
  • Data receive message
  • Sliding Window
  • Buffer
  • Socket

Pregunta 58

Pregunta
Which of these lists the fields in the User Datagram Protocol (UDP) segment?
Respuesta
  • Source Port, Destination Port, Length, Checksum, Data
  • Source Port, Destination Port, Length, Windowing, Data
  • Source Port, Destination Port, Length, Acknowledgement, Data
  • Channel Clear, Source Port, Destination Port, Length, Checksum, Data

Pregunta 59

Pregunta
How many bits are in an INTERNET PROTOCOL VERSION 4 (IPv4) ADDRESS?
Respuesta
  • 16
  • 32
  • 64
  • 128

Pregunta 60

Pregunta
What class uses a rang of 1-126 in the first octet of an INTERNET PROTOCOL VERSION 4 (IPv4)?
Respuesta
  • Class A
  • Class B
  • Class C
  • Class D

Pregunta 61

Pregunta
What INTERNET PROTOCOL VERSION 4 (IPv4) class address is used for networks with about 250 nodes?
Respuesta
  • Class C
  • Class D
  • Class E
  • Class F

Pregunta 62

Pregunta
What INTERNET PROTOCOL VERSION 4 (IPv4) class address is used for multicast addressing?
Respuesta
  • Class C
  • Class D
  • Class E
  • Class F

Pregunta 63

Pregunta
What INTERNET PROTOCOL VERSION 4 (IPv4) RESERVED ADDRESS is used for LOOP BACK?
Respuesta
  • 0.0.0.0
  • 127.0.0.1
  • 207.55.157.255
  • 255.255.255.255

Pregunta 64

Pregunta
Instead of using binary, how are INTERNET PROTOCOL VERSION 6 (IPv6) ADDRESS expressed to be MORE USER-FRIENDLY?
Respuesta
  • Colon Hexadecimal Format
  • Dotted Decimal Notation
  • Hexadecimal
  • Octal

Pregunta 65

Pregunta
The range of WELL-KNOWN PORT NUMBERS is
Respuesta
  • 1024 to 49151
  • 49152 to 65535
  • 0 to 1023
  • 0 to 1024

Pregunta 66

Pregunta
Which common port contains Hyper Text Transfer Protocol (HTTP) servers and proxies?
Respuesta
  • Port 80
  • Port 110
  • Port 443
  • Port 8080

Pregunta 67

Pregunta
The design of communications network is known as
Respuesta
  • an internet suite
  • the physical layer
  • network architecture
  • network implementation

Pregunta 68

Pregunta
What kind of network is a group of computers and associated devices that share a common communication line within a small geographic area?
Respuesta
  • Metropolitan Area Network (MAN)
  • Virtual Private Network (VPN)
  • Local Area Network (LAN)
  • Wide Area Network (WAN)

Pregunta 69

Pregunta
What kind of network interconnects users with computer resources in a geographic area or region like a city?
Respuesta
  • Local Area Network (LAN)
  • Wide Area Network (WAN)
  • Virtual Private Network (VPN)
  • Metropolitan Area Network (MAN)

Pregunta 70

Pregunta
Which 802.11 standard has a throughput of 11 Mbps and runs at the 2.4 GHz frequency?
Respuesta
  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n

Pregunta 71

Pregunta
Which 802.11 standard is designed to operate at both 2.4 GHz and 5 GHz?
Respuesta
  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n

Pregunta 72

Pregunta
What topology defines the layout of a network's devices and media?
Respuesta
  • Physical
  • Logical
  • Hybrid
  • Star

Pregunta 73

Pregunta
What topology consists of cable segments from each computer connected to a centralized component?
Respuesta
  • Bus
  • Star
  • Ring
  • Hybrid

Pregunta 74

Pregunta
Over a single pair cable, Integrated Services Digital Network (ISDN) is capable of transmission rates of
Respuesta
  • 256 Kbps
  • 256 Mbps
  • 144 Mbps
  • 144 Kbps

Pregunta 75

Pregunta
A modem is a device that
Respuesta
  • transmits on every link attached to it
  • modulates and demodulates data signals
  • uses algorithms to determine optimal path to end destination
  • operates on the Network layer of the Open Systems Interconnection (OSI) model

Pregunta 76

Pregunta
What Data Link Layer network device logically separates a single network into two segments or collision domains in Ethernet networks?
Respuesta
  • Hub
  • Bridge
  • Switch
  • Router

Pregunta 77

Pregunta
Two basic routing activities are determining optimal routing paths and
Respuesta
  • modulation of datagrams through an internetwork.
  • Layer–1 error determination and correction through an internetwork
  • Virtual Private Network (VPN) tunnel determination through an internetwork
  • transporting information groups (packets) through an internetwork

Pregunta 78

Pregunta
Dynamic routing automatically calculates the best path between how many nodes?
Respuesta
  • 2
  • 3
  • 4
  • 5

Pregunta 79

Pregunta
What type of encryption is applied to each end of a communications line in a distributed network, and ensures all information flowing is unintelligible to an unauthorized intruder?
Respuesta
  • Line encryption.
  • Link encryption.
  • Device encryption.
  • End-to-end encryption

Pregunta 80

Pregunta
Which type of cable is associated with the original designs of the Ethernet standard?
Respuesta
  • Coaxial cable.
  • Fiber optic cable.
  • Shielded twisted-pair (STP).
  • Unshielded twisted-pair (UTP).

Pregunta 81

Pregunta
Which transmission medium is the PRIMARY CARRIER OF VOICE COMMUNICATION?
Respuesta
  • Twisted pair cable.
  • Fiber optic cable.
  • Coaxial cable
  • Twinax cable.

Pregunta 82

Pregunta
What is the most common wireless networking standard?
Respuesta
  • 802.3
  • 802.9
  • 802.11
  • 802.14

Pregunta 83

Pregunta
What are the three major considerations that apply to Cyberspace Operations?
Respuesta
  • Policy, Security, Authority
  • Authority, Security, Law
  • Law, Authority, Policy
  • Security, Policy, Law

Pregunta 84

Pregunta
What title status must National Guard Guardsmen be in to EXECUTE cyber operations?
Respuesta
  • Title 10
  • Title 30
  • Title 50
  • Title 52

Pregunta 85

Pregunta
Which operations center monitors and controls Air Force network access points, boundary protection devices and network activity to provide situational awareness, and report suspicious/malicious activity?
Respuesta
  • Integrated Network Operations Security Center (I-NOSC)
  • Base Defense Operations Center
  • 624th Operations Center
  • Air Operations Center

Pregunta 86

Pregunta
Within the information environment what term describes the advantage, or imbalance, in one's favor?
Respuesta
  • Information Management
  • Network-centric warfare
  • Information Superiority
  • Information Operations

Pregunta 87

Pregunta
What is critical to mitigating unintended or undesirable effects, on either our behalf or the adversary's, and maximizing cyberspace superiority?
Respuesta
  • Careful planning
  • Reactive operations
  • Immediate response
  • Information Operations

Pregunta 88

Pregunta
Which Electronic Warfare capability uses jamming to reduce the adversary's use of the electromagnetic spectrum (EMS)?
Respuesta
  • Electronic Attack
  • Electronic protection
  • Network Exploitation
  • Electronic warfare support

Pregunta 89

Pregunta
Which of the following is a true statement about Electronic Warfare (EW) and Computer Network Operations (CNO)
Respuesta
  • EW concerns RADIATED energy
  • CNO concerns RADIATED energy
  • EW is only used for OFFENSIVE purposes
  • CNO is only used for DEFENSIVE purposes

Pregunta 90

Pregunta
Which Cyberspace Defense Weapon System sub-discipline determines the extent of intrusions, develops courses of action required to mitigate threats, and determines and executes response actions?
Respuesta
  • Computer Forensics.
  • Incident Prevention.
  • Incident Detection.
  • Incident Response.

Pregunta 91

Pregunta
Which Intranet Control Weapon System sub-discipline conducts continuous monitoring to ensure timely delivery of critical information?
Respuesta
  • Defense-in-Depth.
  • Proactive Defense
  • Situational Awareness.
  • Network Standardization

Pregunta 92

Pregunta
Which Supervisory Control and Data Acquisition (SCADA) subsystem gathers data on the process and sends commands to the processor?
Respuesta
  • Supervisory System.
  • Remote Terminal Unit.
  • Human Machine Interface
  • Programmable Logic Controller.

Pregunta 93

Pregunta
Which Supervisory Control and Data Acquisition (SCADA) subsystem connects to sensors in the process, converting sensor signals to digital data?
Respuesta
  • Supervisory System.
  • Remote Terminal Unit.
  • Human Machine Interface.
  • Programmable Logic Controller.

Pregunta 94

Pregunta
Which threat vector is considered MORE OF AN ANNOYANCE THAN AN ATTACK?
Respuesta
  • Virus.
  • Spam.
  • Spyware.
  • Phishing.

Pregunta 95

Pregunta
Which vulnerability preventive measure is a small piece of code that software developers create to address the flaws found in the original code of a program?
Respuesta
  • Patches.
  • Antivirus
  • Software removal.
  • Vulnerability scanner.

Pregunta 96

Pregunta
Which identity management process uses a FINGERPRINT TO AUTHENTICATE A USER?
Respuesta
  • Token.
  • Biometrics.
  • Multifactor.
  • Knowledge-based.

Pregunta 97

Pregunta
Which identity management process uses a PASSWORD to authenticate a user?
Respuesta
  • Token
  • Biometrics
  • Multifactor
  • Knowledge-based

Pregunta 98

Pregunta
What system monitoring concept uses long trend analysis of network devices and is performed in order to identify future constraints with results incorporated into future technical baselines?
Respuesta
  • Intrusion Detection and Prevention Systems
  • End-to-End Performance Monitoring
  • Vulnerability scanners
  • Capacity Planning

Pregunta 99

Pregunta
Who provides the formal declaration that an information system is approved to operate in a particular security mode using a prescribed set of safeguards and acceptable risk?
Respuesta
  • Wing commander
  • Authorizing Official (AO)
  • Wing information security office (WIAO)
  • Communications and information systems officer (CSO)

Pregunta 100

Pregunta
The TECHNICAL SOLUTION for a communications and information system requirement summarizes
Respuesta
  • only full costs
  • recommended course of action only
  • full cost and recommended course of action
  • full cost, recommended course of action, and security requirements
Mostrar resumen completo Ocultar resumen completo

Similar

Examen Inglés Selectividad
maya velasquez
Faltas de Orotografía
Diego Santos
Causas principales de la Primera Guerra Mundial
crisferroeldeluna
Ramas y etapas de la Filosofía
maya velasquez
20 Frases de Motivación para Estudiantes
maya velasquez
Elaboración de mapas mentales
ortenzias
ELEMENTOS Y CONCEPTOS FUNDAMENTALES trabajo final
supervisortropi
FGM-8. RÉGIMEN DISCIPLINARIO DE LAS FUERZAS ARMADAS
antonio del valle
LITERATOS...
JL Cadenas
ORTOGRAFÍA: B/V, H, G/J, LL/Y, C-Z/S...
Ulises Yo
MAPA MENTAL - BASES EPISTEMOLÓGICAS
Víctor Giovanny Alvarez Gómez