Annex C and D
Which of the following best describes the primary purpose of a virtual machine?
Allows better management of resources such as CPU, disk space, and memory
Who are wholesale supplies within the Marine Corps managed by?
Commander, Marine Corps Logistics Bases
RO appointment letters are an agreement between the the RO and the __________.
Commanding Officer
Responsible for cybersecurity practices for all information systems and networks within their purview and to ensure systems' site Assessment and Authorization (A&A) is in accordance with D0D policy.
Commanding Officer
Routers use hop count to determine shortest ways to send packets. Routers forward their routing table to all of their directly connected neighbors, then those routers forward that information on to routers that are further away while adding a 'Hop'.
Distance Vector Routing
What are the two types of VoIP call processing?
Distributed, Centralized
With regards to Client/Server configurations, what is an example of fault tolerance?
DYNAMIC FAILOVER
What is the purpose of the TCP/IP Network Layer?
Defines how to deliver IP packets over the entire trip, from the original device that creates the packet to the device that needs to receive the packet.
A hacker launches an attack at what stage of the cyber kill chain?
Delivery
VLANs are created based on the following considerations: security, spacific projects, performance, broadcast domains, and ________.
Device Type (server, phone, laptop)
What is a T/O&E?
A report that consolidates both manpower and equipment requirements into one document
What is an operating system?
A type of software that works as an interface between the user and computer to perform all the tasks like memory management, file management, input & output handling, security, process management, Job accounting, error detecting, system performance controlling, peripheral devices controlling
What is an Operating System (OS)?
A type of software that works as an interface between the user and computer to perform all the tasks.
What three letters can TAMCNs for communications-electronics equipment start with?
A, H, T
With regards to Client/Server configurations, what is an example of scalability?
ABILITY TO ADD SERVERS
The ____________ primary mission is to develop the communications plan in support of (ISO) the Division / Marine Aircraft Wing / Marine Logistics Group.
AC/S G-6
Implemented on routers and firewalls to identify what traffic is allowed and denied
ACCESS CONTROL LISTS
The most common type of service request is typically ______
ACCOUNT CREATION
This message is a unicast message sent from a DHCP Server and includes all information on a DHCP Lease.
ACKNOWLEDGE
A list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.
ACL
This is commonly used to control the type of traffic both into and out of a network.
ACL
A hacker achieves their original goals at what stage of the cyber kill chain?
ACTIONS ON OBJ
A hacker conducts data theft, destruction, encryption, or exfiltration at what stage of the cyber kill chain?
ACTIONS ON OBJECTIVE
By definition, a Microsoft Exchange organization is a common security context of Microsoft Exchange Server systems and their resources. What is the Exchange organization most closely related to?
AD FOREST
What are topic-based messages?
Allow receivers to register to consume messages selectively based on particular topics of interest.
What is the point of the Global Combat Support System - Marine Corps (GCSS-MC)?
Allows Marines to have a single point of entry for all supply and logistics-related product and service requests
Which of the following is NOT a disadvantage of a Peer to Peer server architecture?
High cost to implement
What characteristics does Black Core Routing have relative to Enclave over Enclave (i.e. SIPR over NIPR) Routing?
Higher Availability, More Equipment, More Overhead
With regards to Client/Server configurations, what is an example of high availability?
Hot, Warm, and Cold Sites
How can an administrator enhance the functionality of a GPO?
How can an administrator enhance the functionality of a GPO?
Which of the following cloud service models provides storage, servers, and networking hardware?
IAAS
Monitor a network and send alerts when they detect suspicious event on a system or network
IDS
Which of the following is the TDL used between F-22s?
IFDL
What is a Microsoft product for hosting web pages, FTP sites, and used as the framework for supporting email?
IIS
Which IL would be a public community cloud?
IL2
You are designing a website that has information cleared for public release. You are seeking to host it in the cloud. Which IL is this?
IL2
You have a DoD public website in the cloud. Which IL is this?
IL2
Which IL would be a LIMITED public community cloud?
IL4
You have CUI information and you want to host it in the cloud. Which IL is this?
IL4
Which IL would be a federal government community cloud?
IL5
You have NSS information and you want to host it in the cloud. Which IL is this?
IL5
Which IL would be a federal government community cloud but physically separate from unclassified systems?
IL6
You have SECRET information and you want to host it in the cloud. Which IL is this?
IL6
Indicates that all traffic that is not explicitly allowed is blocked
IMPLICIT DENY
Which of the following is NOT a benefit of containerization?
INCREASED BANDWITH
Your OpsO submitted a trouble ticket for an email issue over a week ago. Her initial issue was resolved but now she contacts the help desk to request some additional information on her email's functionality. This is an example of what?
INFORMATION REQUEST
The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to ensure confidentiality, integrity, and availability. Is the definition of?
INFORMATION SECURITY
Malware is installed on a victim's system at what stage of the cyber kill chain?
INSTALLATION
Privilege escalation would most likely occur at what stage of the cyber kill chain?
INSTALLATION
You need to assure that information is not modified, tampered with, or corrupted assuring _________________.
INTEGRITY
A global system of interconnected governmental, academic, corporate, public, and private computer networks. It is based on the networking technologies of the Internet Protocol Suite.
INTERNET
Per the Joint Communications System publication, C2 systems must be __________. (The publication references four traits - select one)
INTEROPERABLE AGILE TRUSTED SHARED
Your commander has requested support from your higher headquarters to conduct planned operations with the intent of conveying selected information and indicators to foreign audeinces to influence their emotions, motives, objective reasoning, and behavior. In which information-related capability is your commander engaging?
MISO
Which of the following units is expected to have the least services requirement?
MMT
Which of the following Marine Corps platforms is currently an airborne C2 platform but will be replaced with MANGL once it is fielded?
MNM
Which of the following is NOT a warfighting function that must be supported by your data systems architecture?
MOBILITY
What does the Marine Corps utilize as its application to provide email services?
MS Exchange
This vehicle is associated with AFTADS:
MTS
The maximum size of a PDU that can be communicated at once is called _____________
MTU
One source to multiple destinations
MULTICAST
Which of the following does not fall under the broad term of "transport?"
MULTICHANNEL RADIO OR DATA SYSTEMS
Which device can do inter-VLAN routing?
MULTILAYER SWITCH
A router that takes in multiple signals to combine into a common transport network is doing what process?
MULTIPLEXING
________ provides the architectural backbone for your data systems architecture.
MULTIPLEXING
Which of the following is NOT a class of supply?
In terms of Messaging Servers, where are all mailboxes in the organization housed?
Mailbox Database
This type of work can be divided into three important groups: Hardware, OS, and Application.
Memory Management
In additional to serving as a backup capaiblity for computing ballistic firing solutions, the BUCS also provides which of the following software applications
Meteorological plotting
Which of the following does NOT help describe information exchange requirements.
Method or system used to transmit information
Once a new Mailbox Database is created, _____ must be restarted.
Microsoft Exchange Information Store
Most USMC networks/domains include _______.
Microsoft Windows
Select all the answers that are an OS:
Microsoft Windows, Apple macOS, Android, Apple iOS, Linux
This LOE strives to broaden and improve the Joint Force's ability to exchange information and coordinate actions and effects in all types of combined operations.
Modernize Mission Partner Information Sharing
What type of device is capable of inter-VLAN routing?
Multilayer Switch
This characterisitc of an OS allows an operator to execute one or more computer tasks at a time.
Multitasking
The _____ is a storage type that sits on a network and offers storage to servers on the network.
NAS
Which of the following is a type of virtual storage that the Marine Corps does NOT currently use?
NAS
The RO formally delegates authority for their assigned duties with which of the following:
NAVMC 11869
Which layer of the OSI model is concerned with logical addressing?
NETWORK
The MITSC has been phased out by the establishment of _______ and the Enterprise Service Desk
NETWORK BATTALIONS
Which of the following is NOT a common reason to contact a help desk?
NETWORK CHANGE REUEST
This protocal build a table relating the next physical link to reach a logical address. Generally used in build dynamic tunnels.
NHRP
Which of the below is a protocol used by routers for relating physical and logical interfaces in establishing a multi-point tunnel dynamic network?
NHRP
For documents and information with classification up to and including UNCLASSIFIED/FOUO. a.SIPR b.CENTRIXS c.MCEN d.NIPR
NIPR
Which of the following requires a DMVPN Connection?
NIPR Connection between multiple sites using one hub not using a KG175D
Which of the following requires a IPSec Connection?
NIPR Point to Point Connection between sites not using a KG175D
Your IP allotment is 10.10.51.0/25 for physical and 172.16.51.128/27 for logical. You must provide for 50 transmission links and 45 DMVPN spokes. Do you have the IP space for the spokes?
NO
A _______ is a robust hub that operates at higher-level units (typically MEFs, MSCs, Deployed MEBs) that specifically addresses network operations.
NOC
VLAN 403 is a
NOMRAL RANGE VLAN
What security protection is likely being applied by the modem of a VSAT-M?
NOT IPSEC
You can only take one "green case" network item and one KG175-D with you to host both NIPR and SIPR on for 50 combined users (35 SIPR and 15 NIPR). What are you grabbing off the shelf?
NOTHING MY NCOS WILL GRAB A LSM
What USMC systems utilize a KG-250X?
NOTM, VSAT-E
Which of these documents provides the foundational argument and justification for JADC2?
National Defense Strategy
____________________ is the first step to any cyberspace operation. It provides operators a visual depiction of the physical and logical terrain comprising the cyber battlespace.
Network Mapping
What information must match to develop an adjacency with another router in EIGRP
Network statment, ASN, connected network
This OS characteristic refers to the processor interacting through communications lines.
Networking
Eighteen sites are being established simultaneously via a DMVPN network. Services are hosted via the hub site. You are at a spoke site and are the first to get your V-SAT Connection "on the bird." The CO wishes to call to higher. Will he be able to?
No, because the hub site must also be established for you to pass traffic.
NIPR Connection between multiple sites using one hub not using a KG175D
No, because the hub site must also be established for you to pass traffic.
A IPSec tunnel is being established from your site to another one via V-SAT TDMA connection. Latancy has been an issue through out the operation. LCpl Smith says the VPN should correct this by establishing a PtP connection between yourself and the destination. Is she correct and why or why not?
No, it will be the same because the traffic still needs to pass through the physical network
This message is a unicast message sent from DHCP Servers in response to an asset seeking their presence.
OFFER
Which document is the TDL plan or architecture?
OPTASKLINK
What is the default Exchange organization name for USMC?
ORGANIZATION
A _____ is a type of software that works as an interface between the user and server.
OS
Containers allow for which virtualization model?
OS kernel
Which of the following are logical groupings of objects that exist inside of a domain?
OUS
What includes users, computers, printers, servers, and other network resources.and are the basic building blocks of Active Directory?
Objects
You're the S6 at V22 and your OpsO calls to notify you that her computer is unable to access the internet. What do you advise your helpdesk to do?
Open a Trouble Ticket
Select from the following the correct categories of radio nets.
Operational Nets, Fires Nets, Support Nets
What is the automation of container deployment, management, scaling, and networking?
Orchestration
Increasing the VM's RAM, CPU, etc.
PAAS
You want a place to develop an application, but you don't want to manage anything more. Which cloud service model is best for you?
PAAS
What is the PDU for the Network Layer of the TCP/IP Model?
PACKET
The VOIP Telephony Network Diagram conveys all of the following EXCEPT:
QUANTITY OF USERS
Call Admission Control (CAC) prevents IP calls from being extended across the WAN link, if the additional bandwidth required would exceed the CAC-allocated bandwidth for concurrent calls, thus preventing oversubscription.
TRUE
Which system provides complete Radio over IP (RoIP) services at your CoC, Techcon, or Ant Hill?
TRICS/WAVE
A feature that would qualify your network as having good network design is that your network is highly scalable and can grow without major design changes. Select one: a.False b.True
TRUE
A publisher server is the only Call Manager whose database can be altered.
TRUE
Class of Control is configured on a CUCM using Partitions and Calling Search Spaces.
TRUE
Data Networks typically require a lot of Coordinating Instructions.
TRUE
Directly Connected Routes are a type of Static Route.
TRUE
During orders crosswalk, the staff compares their unit's order with the orders of higher, adjacent and subordinate unit's orders to achieve unity of effort and ensure the commander's intent is met.
TRUE
Intermediate data devices, such as switches and routers, fall in between the end devices.
TRUE
Microsoft uses a protocol called Lightweight Directory Access Protocol (LDAP) for Microsoft Active Directory
TRUE
NHRPs are used to discover what physical tunnel destinations (NBMA Addresses) match a logical tunnel interface (VPN IP Address).
TRUE
NIPRNet can use DHCP.
TRUE
Peer-to-Peer Networks are notoriously easy to set up and do not require consistent maintenance.
TRUE
An physical connection between a switch and another networking device, such as a router or another switch, that carrys the traffic of multiple VLANs is called what?
VLAN TRUNK
You're the 3d MAW G6 OpsO. After establishing a data center and server room at Building 7777, your 0670 recommends migrating your virtual machines from your previous server room to the new site. Which of the following features might you recommend to migrate your file system?
VMOTION
Which of the following is most commonly used by the Marine Corps to virtualize servers?
VMWARE
Which of the following is most commonly used by the Marine Corps to virtualize servers?
VMWare
Which of the following should have priority over other traffic on your network? a.Email b.Voice c.Chat d.Web Data
VOICE
This is a method by which you logically divide the router into multiple routing devices. Each division functions seperately and must be configured to route between each other.
VRF
This method of Black Core Routing does no require the use of a seperate router specifically for the colorless network.
VRF
VRFs are the TCP/IP Layer 3 Equivalent of a
VRFs are the TCP/IP Layer 3 Equivalent of a [VLAN]
Which of the following is not a core component of a Voice over IP nework?
VTC
Combines GRE and IPsec into new tunnel interface to support encryption, multicast, and routing protocols.
VTI IPSEC
________ is a Layer-2 trunking protocol that enables a network manager to configure a single switch so that it propagates VLAN configuration information to other switches in the network.
VTP
A proactive security practice designed to prevent the exploitation of IT vulnerabilities that may exist on the MCEN. The projected benefit is to reduce the time and money spent dealing with vulnerabilities and exploitation of those vulnerabilities.
VULNERABILITY MANAGEMENT
The unit you're a part of wants to receive the air picture, but doesn't have a radar. In the battlespace you DO have line of sight with the other participants, as well as a network connection and CAC2S. What is the best way you can receive the air picture?
Via CAC2S's MIDS terminal
The unit you're a part of wants to receive the air picture, but doesn't have a radar. In the battlespace you do NOT have line of sight with any of the other participants, but you DO have a network connection and CAC2S. What is the best way you can receive the air picture?
Via JREAP-C
The ___________ is a family of interoperable video exploitation and management systems designed for capturing, classifying, archiving, and disseminating video.
Video Scout
What is a ISO file (ISO.)?
Virtual Copy of a Disk
_____ run on a software platform that runs an operating system and applications.
Virtual Machines
What is an ADSI?
Virtual server that combines and displays track information
Microsegmentation provides consistent security across private and publics clouds by what three key principles?
Visibility, Granularity Security, Dynamic Adaptation
Which of the following documents supports the Marine Corps' Network Modernization policy and establishes the way forward in advancing the competitve edge in the modern battlespace?
DoD CIO CPG
IL5 can accommodate what type of information?
DoD CUI and National Security Systems (NSS)
IL6 can accommodate what type of information?
DoD Classified Information up to SECRET
IL4 can accommodate what type of information?
DoD Controlled Unclassified Information (CUI)
IL2 can accommodate what type of information?
DoD Information cleared for public release
What server can only be a member of one domain and provides directory services running Windows Server?
Domain Controller
You are the acting Regimental S-6 at a CLR at a Regimental Ops meeting. You know you are connecting to both Div and MLG who each have their own DMVPN Hubs who are themselves spokes to the MEF TIE network. You are drawing server services from the MEF TIE. What option below best supports redunancy?
Dual Hub Dual DMVPN to both sites
Which of the following would be done in the cyber kill chain's C2 stage?
Establishing a connection to an outside server
Layer of OSI model that deals with packets
3
You are supervising the embarkation for a site with 80 users. Your only switch has room for 48 users. You have 5 of them. Your 0631 is taking ___ of them. a.2 b.5 c.4 d.3
3
How many hosts can there be on a /27?
30
An IP address consist of how many bits?
32
What is the most likely latency across a tunnel established over LOS links?
35MS
How many 10Gb capable ports are on the LEM?
4
How many nodes does Exchange Server Enterprise Edition support when using WINDOWS 2000 SERVER?
4
Layer of OSI model that deals with Segments
4
When requesting DISN services at minimum how far out will an Exercise Authorization Package be submitted.
45 DAYS
You are in a foreign nation using NIPR, SIPR, Mission Secret, and CENTRIX enclaves. at minimum how many VRF's must be programmed on the Transport router to facilitate this.
5
When installing Exchange Server, _____ of space is required for each Language Pack.
500MB
What is the most likely latency across a tunnel established over FDMA satelite links?
500MS
What is the most likely latency across a tunnel established over Fiber links?
5MS
Which Layer translates data from lower layers into a usable format for the Application Layer?
6
How many hosts can their be on a /26?
62
How many layers are in the OSI model?
7
What primary layer of the OSI model do Data Systems Marines use?
7
What is the most likely latency across a tunnel established over TDMA satelite links?
700MS
How many nodes does Exchange Server Enterprise Edition support when using WINDOWS 2003 SERVER OR LATER?
8
What is the Maximum number of Ports that can be active in an Etherchannel Group?
8
The System Link Designator (SLD) consists of _____ characters, but often only uses _____ characters.
8 / 5
How many days out are you required to coordinate with the JICO to identify network requirements?
90
Key terrain in cyberspace is analogous to key terrain in the physical domains in that holding it affords:
A COMBATANT A POS OF MARKED ADVANTAGE
What is a GPO?
A collection of settings that define what a system will look like and how it will behave for a defined group of users.
What is a track?
A depiction of where either friendly or enemy units are currently located
What is storage vMotion?
A feature that allows the live migration of a running virtual machine's VMDKs from one storage system to another, with no downtime for the VM.
What is an SCCM?
A paid lifecycle management solution from Microsoft that keeps track of a network's inventory, assists in application installation, and deploys updates and security patches across a network.
What is Metadata cleanup?
A procedure conducted via GUI, CLI or within ADDS after a forced removal of a domain controller.
What is Cisco Jabber/Webex?
A program that provides unified communications for information, instant messaging, voice and video communication, web conferencing and desktop sharing.
Which MOS designates a Data Systems Engineering Officer?
0670
Which MOS designates a Data Systems Administrator?
0671
How many roles can a server have?
250
The subnet mask for a /24 network is:
255.255.255.0
For a requirement of 8 hosts, which of the following would work best?
255.255.255.240
The subnet mask for a /27 network is:
255.255.255.240
For a requirement of 4 hosts, which of the following would work best?
255.255.255.248
The subnet mask for a /30 network is:
255.255.255.252
The subnet mask for a /31 network is:
255.255.255.254
How much Random Access Memory (RAM) is in each server of the Application Services Module?
256
What is the primary MOS of a Gunnery Sergeant Networking Marine? Select one: a. 0651 b. 0631 c. 0639 d. 0630 e. 0659
0639
This MOS is responsible for training, advanced routing/switching, cybersecurity, locating and correcting faults, quality of service (QOS), implementation/ management of the cable plan, long haul transport, internet (IP) management, encryption management, network monitoring, end to end systems integration and troubleshooting.
0639
Which of these commands prepares Active Directory for the Exchange Organization during the deployment of Exchange Server 2016?
.\setup.exe /PrepareAD /OrganizationName:Domain /IAcceptExchangeServerLicenseTerms
Which of these commands prepares the Domain for Exchange during the deployment of Exchange Server 2016?
.\setup.exe /PrepareDomain:Domain.Local /IAcceptExchangeServerLicenseTerms
Which of these commands prepares the Schema for the deployment of Exchange Server 2016?
.\setup.exe /PrepareSchema /IAcceptExchangeServerLicenseTerms
If I am planning a subnet for a site with 70 computers, what size subnet do I need to allocate?
/25
What is the CIDR Notation for a subnet mask of 255.255.255.128?
/25
Which of the following breakdowns would best accomodate the following host requirements: 33 Users, 25 VOIP, 17 Servers, 3 VTC, and 2 Printers?
/26,/26,/27,/29,/29
From the options below, what is the most common CIDR notation for a WAN point-to-point connection?
/30
Convert 31 to bianary.
00011111
Convert 99 to bianary.
01100011
Which MOS is a prerequisite to obtaining the MOS of Satellite Communication Operator? a. 0623 b. 0631 c. 0671 d. 0621
0621
Which of the following MOSs are typically NOT found on a help desk?
0629
This MOS analyze, design, deploy, maintain and manage network infrastructure and application components in support of command and control. a.0631 b.0630 c.0639 d.0633
0630
This MOS will install operate and maintain local area networks (LAN) and wide area networks (WAN) to enable command and control. a.0639 b.0633 c.0631 d.0630
0631
What is the primary MOS of a Corporal Networking Marine?
0631
Which MOS is responsible for installing, operating and maintaining local area networks and wide area networks to enable command and control.
0631
Which MOS is responsible for installing, operating and maintaining local area networks and wide area networks to enable command and control. a. 0621 b. 0627 c. 0671 d. 0631
0631
This MOS is responsible for performing duties in commercial outside plant, cable distribution systems, install and maintain fiber optic, copper, and coaxial cable according to safety regulations and standards
0633
You're drafting a Feasilibity of Support request to your higher headquarters after you've identified a critical shortfall in your section. You currently do not possess a suficient number of systems administrators at your help desk. What MOS do you request?
0671
The ______ MOS is specifically trained to produce and program applications and software in support of assured C2.
0673
Which of the following MOSs are typically NOT found on a helpdesk?
0673
Which MOS designates a Data Systems Chief?
0679
You're drafting a Feasilibity of Support request to your higher headquarters after you've identified a critical shortfall in your section. You currently do not possess any MOS capable of providing supervision of your systems administrators in the execution of their duties. What MOS do you request?
0679
How many Domain Controllers can be Schema Master and Domain Naming Master within the forest?
1
How many Domain Controllers can be the Primary Domain Controller (PDC) Emulator, Infrastructure Master, Relative ID (RID) Master within a domain?
1
How many schema are located within a forest?
1
Layer of OSI model that deals with bits
1
There is/are ____________ Exchange Organization/s in an Active Directory Forest.
1
What layer should all troubleshooting begin at?
1
What are the AL Code numbers?
1, 2, 4, 6, 7
How many classes of supply are there?
10
What is the Maximum distance for any UTP Copper Cabling? (10Base-T, 100Base-T, 1000Base-T, 10GBase-T)
100M
How many hosts can there be in a /25?
126
What is the absolute minimum compression standard for Video Teleconferencing that you would need to plan for?
128 kbps
Which is the a class B address range
128.0.0.0/16 - 191.255.0.0/16
All of the following units are likely to have an 0670 on their staff with the EXCEPTION of:
12TH MAR REG
How would you express the Binary number 1101 in Decimal format?
13
What Port Number is used by IMAP?
143
This address may used by a computer which fails the DHCP process.
169.168.25.3
It is best practice to use which of the followinng addresses for the Default Gateway for the following network: 172.16.17.128/25?
172.16.17.129
Which of the following is the Broadcast address of this network: 192.168.17.192/26
172.16.17.255
Which of the following is NOT a part of this network: 172.16.17.0/26
172.16.17.66
Which OccField primarily plans and conducts DCO?
17XX
How many processor cores are in a single processor of the Dell R630 server inside the ASM?
18
Which of the following is a host address of this network: 192.168.17.128/27
192.168.17.141
Which of the following is a host address of this network: 192.168.17.0/26
192.168.17.16
Which of the following is the Broadcast address of this network: 192.168.17.0/26
192.168.17.63
A switch operates at ______ of the OSI model.
2
Layer of OSI model that deals with Frames
2
What is the maximum number of TEO IP Phones that a single TSC, employed by the USMC, can support?
200
Exchange originally had five server roles. At what version of Exchange were those server roles condensed down to just THREE roles?
2013
Convert 11010001 to decimal.
209
Which C2 System provides Commanders the ability to rapidly integrate all fire support assets into maneuver plans via digital data communications links?
AFATDS
You're the communications officer of 2/10. You Battalion Commander has made it clear that digital fires integration are a top priority. Which of the following PORs should you direct your Marines to integrate first into your network architecture?
AFATDS
This is primary Fires C2 system used by the Marine Corps:
AFTADS
What is a messaging system consisting of government and COTS software and hardware used to prepare, submit, transport, deliver, store, and retrieve organizational messages?
AMHS
Who is the senior management official or executive with the authority to formally approve the operation of an IS at an acceptable level of risk?
AO
What Appendix is the Multi-Channel Radio Network Plan found in Annex K?
APPENDIX 5
Which appendix of the Annex K denotes the Telephone Network Plan?
APPENDIX 7
Match each Layer of the TCP/IP Model with it's description. Provides software access to services such as HTTP/HTTPs Associates a service to a port number and defines whether that service would use UDP or TCP Includes the IP address of both the sender and recipient. Defines how data will be routed to the recipient Includes the MAC address of both the sender and recipient. Devices in this layer include switches and hubs that allow access to routing Represents the signal pattern and medium used to pass bits of data included in a frame
APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL
What is the primary module used by the 067X community used to host services?
ASM
Which component of the CDN most closely relates to your job as a Systems Administrator?
ASM
_____ contains (2) servers, (1) UPS, (1) transit case.
ASM
______ contains (2) servers, (1) UPS, (1) transit case.
ASM
Independent comprehensive risk evaluation of the technical and non-technical security features and safeguards of an IS; the output of which, is used in an effort to assist the Security Control Assessor (SCA) in the provision of risk recommendation to the Authorizing Official (AO).
ASSESSMENT
The Firefly Key uses
ASSYMETRIC CRYPTOGRAPHY
You need to send an email to your CO. It contains PII and other sensitive information so you encrypt it and digitally sign it. What did you just use?
ASSYMETRIC CRYPTOGRAPHY
__________________ has 2 uses; to make a meesage unreadable and to digitally sign.
ASSYMETRIC CRYPTOGRAPHY
You need to assure that information is accessible to all who have a proper need to know assuring _________________.
AVAILABILITY
At a simplistic level, how should a Messaging Server architecture function?
Accept incoming mail from external sites, determine the user mailbox to deliver these messages to and route them accordingly. Accept incoming mail from internal hosts, determine the destination system to deliver these messages to and route them accordingly.
The RO formally accepts their CMR account with which of the following:
Acceptance Letter
A layer 2 switch traditionally belongs at what level of the hierarchical network design?
Access layer
Horizontal scaling, also known as scaling out, refers to which of the following?
Adding additional VM instances
The Air Force's contribution to JADC2 is referred to as
Advanced Battlemanagement System
Microsegmentation controls are broken down into what three categories?
Agent, Network, Native
What is supply officially defined as?
All materiel and items used in the equipment, support, and maintenance of military forces
A thorough battlespace analysis includes all of the following EXCEPT:
Analysis of each course of action developed by the staff
You are a Systems Control Watch Officer for Marine Wing Communications Squadron 38 conducting a Wing-Level training exercise. Your Marines are reporting that your satellite communications system is having difficult tracking your assigned satellite. What component of your satellite communications system is malfunctioning?
Antenna Control Unit
________ is a mobile operating system used exclusively for iPhones.
Apple iOS
________ is seeing greater use with the Marine Corps mobility infrastructure than previously before.
Apple iOS
Although not commonly seen on USMC networks, _____ is a large competitor of the Microsoft OS.
Apple macOS
Which are the Seven Layers of the Open Systems Interconnect Model?
Application, Presentation, Session, Transport, Network, Data Link, Physical
You are having issues with SIPR video feeds lagging or dropping during crucial time in you operation. You know you have the bandwidth though your single LRS link to support the feeds, but it is being used by other traffic. You are about to contact the SPE Cell for assistance. What are you likely to be focussed on asking about?
Assigning QoS statements to prioritize the feed traffic
Assumes control of multiple systems to coordinate attacks and distribute phishing schemes, spam, and malicious code. Breaks into networks for the thrill and challenge or for bragging rights in the attacker community. Seeks to attack systems for monetary gain Uses cyber tools as part of their information gathering and espionage activities. Individuals or small groups that execute phishing schemes to steal identities or information for monetary gain.
Assumes control of multiple systems to coordinate attacks and distribute phishing schemes, spam, and malicious code. → Bot-Network Operator, Breaks into networks for the thrill and challenge or for bragging rights in the attacker community. → Attacker, Seeks to attack systems for monetary gain → Criminal Group, Uses cyber tools as part of their information gathering and espionage activities. → Foreign Intelligence Service, Individuals or small groups that execute phishing schemes to steal identities or information for monetary gain. → Phisher
__________________ uses a public and a private key.
Asymmetric Cryptography
Formal decision by the Authorizing Official (AO) that an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.
Authorization
Which of the following is not one of the available Port States for the Spanning Tree Protocol? (Multiple Answers Allowed)
BALANCED PASSING TESTING
The total traffic of data transmitted over the media.
BANDWIDTH
______ is the theoretical network performance. ____ is the actual network performance. ____ is the measure of the transfer of usable data (after overhead is removed).
BANDWIDTH THROUGHPUT GOODPUT
Which hypervisor type is most commonly used by the Marine Corps?
BAREMETAL
Which Link-16 capable radio would a JTAC use?
BATS-D
The Marine Corps uses what routing protocol to connect two (2) autonomous systems?
BGP
Any encrypted classified traffic circuit is often referred to as _______________ when it is ready for transmission.
BLACK
_______ provides the transport network for multiple networks (SIPR, NIPR, CENTRIX, etc).
BLACK CORE ROUTING
DCO-IDM is primarily conducted in which type of cyberspace?
BLUE
What type of cyberspace does the U.S. and our mission partners protect?
BLUE
One source to all destinations within a network.
BROADCAST
A _________ is a collection of network devices that can all be reached by a broadcast at the data link layer.
BROADCAST DOMAIN
Which hypervisor type runs as its own operating system, without a host?
Baremetal
A set of specifications for a system, or Configuration Item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures.
Baseline Configuration
What does the Kernal provide the operating system?
Basic control of all the computer peripherals.
How do programs communicate?
By sending packets of data (messages) to each other.
A hacker assumes remote control of a device at what stage of the cyber kill chain?
C2
Which C2 application is designed to facilitate military command and control functions by improving maneuver situational awareness (SA) enhancing operational and tactical decisions?
C2PC
______ exchanges position tactical track data to form a Common Operational Picture.
C2PC
You're the communications officer at MWCS-38. The Wing Commanding General wants to establish Common Operational Picture in the Wing Operations Center. He specifically wants to integrate with his Division counterparts. Which of the following would you recommend?
C2PC TAK
You're the communications officer at MWCS-38. The Wing Commanding General wants to establish Common Operational Picture in the Wing Operations Center. He specifically wants to see where his fighter aircraft are. Which of the following would you recommend?
CAC2S
_________ provides for the transfer of digital voice and data in support of aviation.
CAC2S
is a VoIP management application which runs on an Integrated Services Router's (ISR) Internet-working Operating System (IOS) in order to provide call processing in a VoIP network.
CALL MANAGER EXPRESS
Shipboard network which enables collaborative information sharing across forces afloat with reach-back capabilities to supporting shore establishments via system management, voice, video, and data services a.DISA b.CANES c.DoDIN d.CENTRIXS
CANES
Any vulnerability, the exploitation of which will directly and immediately result in loss of Confidentiality, Availability, or Integrity.
CAT 1
A collection of classified coalition networks, called enclaves, that enable information sharing through the use of email and Web services, instant messaging or chat, the Common Operational Picture service, and Voice over IP. CENTRIXS supports combatant commands throughout the world a.DoDIN b.CANES c.DISA d.CENTRIXS
CENTRIX
The Subnet Mask identifies which portion of an IPv4 address?
CIDR PORTION
Which of the following is included with an LEM? a.Cisco 4451-X b.Microchip SyncServer S650 c.Cisco Catalyst 3850 d.CV-MCU2
CISCO CATALYST 3850
Which of the following is included with an LSM?
CISCO CATALYST 3850 Cisco 4451-X
The following effort belongs to which agency: Transitioning JADC2 from concept to policies, doctrine, and requirements.
CJCS
Match the IP Address Class with the appropriate first Octet Range. 128 to 191 1 to 126 192 to 223
CLASS B CLASS A CLASS C
Which of the following CUCM functions can help you implement River City?
CLASS OF CONTROL
This combat service support management tool provides improved management and control of tactical-level resources and services support requirements.
CLC2S
Which C2 System provides accurate, near real time integrated logistics information, tactical level visibility of logistics data, and allows logistics planners and operators to make informed decisions about the logistics chain?
CLC2S
Which of the following PORs do NOT directly support maneuver as a warfighting function:
CLC2S
Which of the following server architecture is most commonly used in the Marine Corps?
CLIENT/SERVER
You're an 0679 at an infantry battalion. Your CommO is requesting a an architecture that is both resilient and easily accessible. There is an extended lead time before the servers have to be employed, so time to build the servers isn't an issue. What do you recommend?
CLIENT/SERVER
Limited technical solutions at the tactical edge challenges which enabling technology?
CLOUD
Your Network LCpl is configuring an LSM. What piece of equipment is he likely using?
CM (CONFIGURATION MODULE)
Which of the following is the MOST responsible for the conduct of offensive cyberspace operations (OCO)?
CMTs
You're a communications officer establishing a COOP site for your unit. Your commander is requesting the ability to rapidly shift from a degraded site to another fully prepared site, but presently non-operational site. What kind of site is your commander referring to?
COLD SITE
This style of encryption would be applied to a SIPR circuit?
COMSEC
You have a SIPR circuit encrypted by a TACLANE and then entering a Black Core Router. This router is connected to the modem on a VSAT-M. What security protection is likely being applied by the TACLANE?
COMSEC
__________________ is used for line ecnryption.
COMSEC
What are the two main types of encryption employed in the USMC?
COMSEC, TRANSEC
You need to assure that information is limited to only those who have the proper credentials assuring _________________.
CONFIDENTIALITY
Your help desk is troubleshooting an issue on the network and are making changes as they work to resolve the issue. As your help desk SNCOIC is briefing you the latest updates, you realize that all of these changes have been made unilaterally and without notifying higher and adjacent units. What concept can be implemented to prevent this?
CONFIGURATION MANAGEMENT
What is the technique of packaging software code with just the OS libraries and code dependencies into a lightweight executable called?
CONTAINERIZATION
What type of standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another?
CONTAINERS
When a dynamically routed network changes, the routers share routing updates via a process called what?
CONVERGENCE
A user calls you at the help desk and complains about their computer preforming slow while using 10+ applications. What (2) Operating components are being over utilized?
CPU & Ram
Which of the following would be done in the cyber kill chain's weaponization stage?
CREATING AN INFECTED DOC
What are the types of Twisted Pair cables?
CROSSOVER STRAIGHT-THROUGH ROLLOVER
For converting serial to coax or fiber, what should you add to your EDL?
CSM
Higher is expecting you to terminate a SMART-T link. Which of the following pieces of equipment might be required for the connection?
CSM
In a IaaS cloud service model, whose responsibility is it to install, configure, and manage software, applications, middleware, and operating systems?
CUSTOMER
In a PaaS cloud service model, whose responsibility is it to secure applications, data, and user access?
CUSTOMER
Incident Management can also be referred to as _________
CUSTOMER SERVICE
Which of the following is included with a CSM?
CV-MCU2
________ supervise, direct, and provide guidance on all aspects of the employment of cyberspace personnel and systems.
CYBERSPACE OFFICERS
Which of the following is a standard telephony feature CUCM supports
Call Pickup, Call Forward, Group Call Pickup, Music on Hold
Reconnaissance (Event), Activity (scan or probe) that seeks to identify a computer, an open port, an open service, or any combination for later exploitation. This activity does not directly result in a compromise.
Category 6 Event
_______ is a computer or host that requests and uses resources and information from another computer or server.
Client
You're an 0602 planning a server architecture for your unit. You're planning to pull your services from a centralized location with dedicated servers. Your plan is to provide centralized security and easy access for your users. What architecture are you planning?
Client / Server
What model does the chat process work on?
Client-server networking
In a PaaS cloud service model, whose responsibility are cybersecurity updates and patches on the physical infrastructure?
Cloud provider
What is the term that describes the pooling of resources of multiple servers together for fail-over or high availability?
Clustering
Who is responsible for monitoring compliance for the Cyber IT/CSWF?
Command Cyber IT/Cybersecurity Workforce Program Manager
In order to send emails to external organizations, what type of DNS record must you first create?
Conditional Forwarder
Which of the following are the duties of a Responsible Officer? Select all that apply: a. Assign configurations (Parent-Child relationship) by NIIN and serial number for each item via GCSS-MC b. Conduct maintenance on all equipment listed on the CMR that is within your skillset to repair c.Conduct quarterly CMR reconciliations with the supply section d. Report changes of equipment custody to the SupO on an as-occurring basis e. Request necessary investigative action in writing for equipment abuse, gains, or losses, via the SupO, to the CO f. Request a change of RO from the CO via the Supply Officer and conduct a joint inventory no less than 30 calendar days prior to your date of relief g. Account for equipment received and maintain a record of custody for such equipment on a CMR h. Conduct necessary investigative actions for equipment abuse, gains, losses, reporting to the CO i. Maintain assigned equipment in a ready-for-use and serviceable condition j. Validate configuration management (Parent-Child relationship) by NIIN and serial number for each item on hand k. The account must be transferred prior to the RO's transfer from the command
Conduct quarterly CMR reconciliations with the supply section , Maintain assigned equipment in a ready-for-use and serviceable condition , Account for equipment received and maintain a record of custody for such equipment on a CMR , Report changes of equipment custody to the SupO on an as-occurring basis , Request necessary investigative action in writing for equipment abuse, gains, or losses, via the SupO, to the CO , Validate configuration management (Parent-Child relationship) by NIIN and serial number for each item on hand , Request a change of RO from the CO via the Supply Officer and conduct a joint inventory no less than 30 calendar days prior to your date of relief , The account must be transferred prior to the RO's transfer from the command
Which of the following answers lists the advantages of IMAP over POP3?
Connected and Disconnected modes, Multiple simultaneous clients, Message state information stored on server, Server side searches.
What is a battalion level inventory defined as?
Consumer Inventory
What is the Application Layer?
Contains the communications protocols and interface methods used by hosts in a communications network.
What are some best practices for GPO's?
Create well-designed unit structure, give GPO's descriptive names, add comments to each GPO, don't set GPO's at the domain level, don't use the root computers or user folders in Active Directory, don't disable a GPO, rather, delete the link.
A Network is defined as a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of __________.
DATA
A DoD federated data environment for sharing information through interfaces and services to discover, understand and exchange data with partners across all domains, echelons and security levels refers to what enabling technology?
DATA FABRIC
The following challenges: assessing and verifying data within DoD networks, stove-piped data, and a lack of interoperability standards are viewed as impediments to what enabling technology?
DATA FABRIC
Responsible for ensuring the physical procedures of data transfer are carried out, and will ensure the Transfer Log is accurate, current, and properly maintained.
DATA TRANSFER AGENT
What is the correct conceptual order of the processes that occur whenever a group policy is applied?
DC discovery, DN discovery, domain Scope of Management (SOM) search, Scope of Management (SOM), site SOM search, GPO search, GPO filter evaluation, WMI filter evaluation, policy change event
What type of cyberspace operation is "threat focused, network agnostic?"
DCO
Which of the following missions are typically in foreign cyberspace?
DCO IRA
What are the 3 types of routes that can populate a routing table?
DYNAMIC DIRECTLY CONNECTED STATIC
In a brief to your commander, you advise her of actions an attached team of Marines has taken to secure the network through active monitoring and probing of all friendly networks. This is an example of what facet of cyberspace operations?
DCO-IDM
The RO formally submits a ______ in the event of KNOWN loss, damage, or destruction of government property.
DD Form 200
ROs will be formally appointed by the CO in writing via an appointment letter and _________.
DD Form 577
Providing computing capability to the tactical edge supports operations under what conditions?
DDIL C2D2E
A common security strategy used to provide a protective multilayer barrier against various forms of attack.
DEFENSE IN DEPTH
What command will delete VLAN's from your device?
DEL VLAN.DAT
Identify the Metrics used by the Diffusing Update Algorithm (DUAL).
DELAY RELIABILITY BANDWIDTH LOAD MTU
A hacker sends email attachments or malicious links at what stage of the cyber kill chain?
DELIVERY
This is what is being used on your network. a.Devices b.Medium c.Messages d.Rules
DEVICES
Match the network element with its definition. Items used to communicate with one another Govern how messages flow across a network Method in which devices are connected The Information that travels over the medium
DEVICES RULES MEDIUMS MESSAGES
Network management protocol used on IP networks whereby a server dynamically assigns an IP Address and other network configuration parameters to each device on a network.
DHCP
This protocol is used to assign IP addresses automatically on a network
DHCP
What is utilized to push IP address, subnet mask, and default gateway to user computers and phones?
DHCP
Provides 10 connections into the Internet via Internet Access Points (IAP).
DISA
Provides 10 connections into the Internet via Internet Access Points (IAP). a.DISA b.CENTRIXS c.CANES d.DoDIN
DISA
This message is a broadcast message sent from an asset to seek out available DHCP Servers.
DISCOVER
What type of groups are email lists?
DISTROBUTION
Adds IPsec encryption to mGRE tunnel to enable secure multipoint tunneling
DMVPN
Adds IPsec encryption to mGRE tunnel to enable secure multipoint tunneling.
DMVPN
This feature provides encrypted multipoint tunnels
DMVPN
Provides a layer of protection for these Internet-facing servers, while also allowing clients to connect to them
DMZ
Conditional Forwarders are created in the ______ of your domain.
DNS
Used to resolve fully qualified internet domain names (also known as Uniform Resource Locators, or URLs) into internet protocol (IP) addresses.
DNS
What is highly integrated into Active Directory and utilized to translate Domain Names into IP Addresses?
DNS
Where in your domain do you create MX Records from?
DNS
Match each type of server to its definition: Receives requests for an IP address and responds with a corresponding domain name hostname Caches all pages accessed through the network which allow users who to visit Used for storage and designed for users to access information by executing a query A centralized remote computer that holds e-mail messages for the client on a particular network Highly distributed, massive storage, and high-end processing power servers Utilized in developing, processing, and running web-based applications
DNS PROXY DATABASE MAIL CLOUD APPLICATION
Match the following ports with their port numbers. DNS POP3 HTTP HTTPS SMTP SSH
DNS 53 POP3 110 HTTP 80 HTTPS 443 SMTP 25 SSH 22
The following effort belongs to which agency: Lead a cross-functional team to explore JADC2 as it evolves as a concept.
DOD
Identifies a set of cybersecurity activities that are required for to protect the DoDIN.
DODI 8530.01
The globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating and managing information on demand for warfighters, policy makers, and support personnel.
DODIN
In a brief to your commander, you advise her of actions you've taken to secure the network through appropriate STIG and antivirus software. This is an example of what facet of cyberspace operations?
DODIN OPS
What type of cyberspace operation does the 06XX community direct?
DODIN OPS
What type of cyberspace operation is "network focused, threat agnostic?"
DODIN OPS
_____________ are network focused and threat-agnostic while _____________ are threat-specific and frequently support mission assurance objectives.
DODIN, DCO
What is depicted by a triangle, is the basic organizational structure of Active Directory, and contains organizational units?
DOMAINS
A blank requires more IPs than a blank .
DUAL HUB/DUAL DMVPN REQUIRES MORE IPS THAN A DUAL HUB/SINGLE DMVPN
You are the acting Regimental S-6 at a CLR at a Regimental Ops meeting. You know you are connecting to both Div and MLG who each have their own DMVPN Hubs who are themselves spokes to the MEF TIE network. You are drawing server services from the Div. What option below best supports redunancy?
Dual Hub Single DMVPN to Div
You are the acting Regimental S-6 at a CLR at a Regimental Ops meeting. You know you are connecting to both Div and MLG who each have their own DMVPN Hubs who are themselves spokes to the MEF TIE network. You are drawing server services from the MLG. What option below best supports redunancy?
Dual Hub Single DMVPN to MLG
Which of the following is a MAC address:
E4-54-E8-FB-D8-59
Which is NOT part of orchestration of container management?
EASE OF USE
The following terms are associated with a Call Manager EXCEPT:
EDITER
What is Cisco's best hybrid protocol that is also the most common Enhanced Distance Vector Routing Protocol used by the Marine Corps' packet switching network?
EIGRP
Select the configuration item not required for a VTC and VOIP Phone to interface with a network via a switch.
EIGRP AS Number
Which of the following is NOT a characteristic of good system design?
EMMISSIONS CONTROL FLEXIBILITY centralized command
__________________ is the transformation of data into a form unreadable by anyone without a secret decryption key
ENCRYPTION
What attribute would likely call for an MTU adjustment on your network?
ENCRYPTION ADDED BY HAIPE
Uses Diffusing Update Algorithm (DUAL) to calculate best route to subnet and alternative routes if primary fails
ENHANCED DISTANCE VECTOR PROTOCOL
An Authorized User (military, civilian, FN, or contractor) who requires detailed knowledge of Cyber IT and/or cybersecurity to support work in the development, maintenance, or operation of Marine Corps systems, including weapons, tactical, electronic and electrical services, navigation, and engineering.
ENHANCED USER
is the top tier of support for Marine Corps enterprise services including MCEN-N and MCEN-S accounts, email, and web browsing.
ENTERPRISE HELPDESK
The MITSC has been phased out by the establishment of the ______ and the Network Battalions
ESD
The MITSC has been phased out by the establishment of the ______ and the Network Battalions.
ESD
________ is a type-1 hypervisor used to deploy, create, and serve virtual machines.
ESXi
The most specific type of ACL is ______
EXTENDED NUMBERED ACL
VLAN 1403 is a
EXTENDED RANGE LAN
Routing Protocol(s) are used to connect Autonomous Systems. Routing Protocol(s) are used in Autonomous Systems
EXTERIOR INTERIOR
A set of protocols used to interconnect routers and networks that ARE NOT part of the same autonomous system are commonly referred to as what?
EXTRIOR GATEWAY PROTOCOLS
Which of the following is not a requirement for configuring an SVI?
Encapsulation
Which of the following would be done in the cyber kill chain's actions on objectives stage?
Encrypting a victim's hard drive DESTROY HARD DRIVE
What administrator has the permissions to do anything in the forest?
Enterprise
Identify from the list below correctly formatted Network Tasks.
Establish circuit SIPRPP01 at 8192K to 2/1. Attach one VSAT-S from RCT Main, Utilize the 200.5.36.128/25 to address your Black Core WAN requirements.
Enabling the Joint Force Commander's ability to manage and use information to drive decision making and action taking is supported by what LOE?
Establish the JADC2 Data Enterprise
Focusing on and enabling the performance of the DoD work force via training and education supports which LOE?
Establish the JADC2 Human Enterprise
This LOE addresses enhanced shared situational awareness, synchronous and asynchronous global collaboration, stragic and operational joint planning, real-time global force visualization and management, predictive force readiness and logistics, real-time synchronization and integration of kinetic and non-kinetic joint and long-range precision fires, and enhanced abilities to assess Joint Force and mission partner performance.
Establish the JADC2 Technical Enterprise
How does a global catalog server function?
Every domain controller stores the objects for the domain in which it is installed. However, a domain controller designated as a global catalog server stores the objects from all domains in the forest.
Which of these options is used to manage Exchange services?
Exchange Administration Center
ACL number 151 is a ______
Extended Numbered ACL
An AD domain is restricted to a physical site, defined by an IP allocation.
FALSE
DMVPNs require multiple static VPN connections.
FALSE
Inter-Cluster Trunks are trunks routed between a Cisco Unified Communication Manager (CUCM) cluster and a Circuit Switching Private Branch Exchange (PBX).
FALSE
Is a security clearance required for access to unkeyed CCI?
FALSE
It authenticates logons and controls access to directory resources.
FALSE
Network Address Translation bridges IPv4 and IPv6 networks.
FALSE
Peer-to-Peer Networks are notoriously difficult to set up and require consistent maintenance.
FALSE
SIPRNet uses DHCP.
FALSE
Symmetric cryptography involves the use of a public and private key.
FALSE
TRANSEC is always required, even on a secure link.
FALSE
The AN-80i Redline Ethernet radio operates in the 4.4-5.0 GHz frequency range and therefore has the potential to interfere with the AN/TRC-170.
FALSE
The Cisco Unified Communications Manager is a device whose sole purpose is to implement Real-Time Transfer Protocol to allow chat clients to function.
FALSE
The POP3 Protocol was designed on the assumption that most users would have a high bandwidth, consistent internet connection.
FALSE
The VSAT operates within the K-Band of the electromagnetic spectrum. Select one: False True
FALSE
The following are terrestrial wideband transmissions systems: VSAT, SMART-T, and GATR.
FALSE
The process of moving segments through the network is called routing.
FALSE
The two operating modes for MUOS are: Point to Point and Point to Multipoint.
FALSE
Traffic does not require TRANSEC before being sent via RF Transmission if it has already been secured by a KG-175 TACLANE.
FALSE
UDP uses a Three-way Handshake to initiate a connection.
FALSE
USMC networks have star physical topologies and ring logical topologies.
FALSE
WAN Diagrams should include Layer 3 Switches.
FALSE
The TCP/IP Model has 7 layers
FALSE (TCP/IP MODEL HAS 5, OSI HAS 7)
_________________ is the capability of a network to deliver uninterrupted service, despite one or more of its components failing. a.Fault Tolerance b.Quality of Service c.Security d.Scalability
FAULT TOLERANCE
The fastest currently available media is _______________.
FIBER OPTIC
Which of the following Marine Corps platforms will serve as an airborne C2 platform able to retransmit various TDL information in UAS?
FINN
__________________ is used on multiple types of Marine Corps systems and is individualized per device.
FIREFLY
Filter incoming and outgoing traffic for a single host or between networks
FIREWALL
There are two physical links that are operating with identical properties. Packets are being routed over both without any priority being asigned to one link or the other. What problem with a tunnel interface is likely to result from this?
FLAPPING
Which of the following is NOT one of the three types of clouds?
FLEXIBLE CLOUD
MAC ________ attempt to overload a switch with different MAC addresses associated with each physical port
FLOOD ATTACKS
Limit the amount of memory used to store MAC addresses for each port / Sends a Simple Network Management Protocol (SNMP) trap or error message in response to exceeding MAC entry threshold / Allow an administrator to set a maximum number of MACs supported by a port
FLOOD GUARDS
_______decisions are influenced by the C2 system's ability to network the force.
FORCE EMPLOYMENT
What is the PDU for the Datalink Layer of the OSI Model?
FRAME
Standard Network Protocol used for the transfer of computer files between a client and server on a computer network.
FTP
Which of the following is NOT a type of virtual storage?
FTP
Which of the following is NOT an example of a service?
FTP HTTPS
When a Mailbox server is added to a DAG, the _____ Windows role is installed on the server and all required clustering resources are created.
Failover Clustering
IPv6 addresses are 64 bits long.
False
During a confirmation brief, your battalion commander expresses concern with the potential of issues arising with a physical server and what impacts might result if it becomes damaged. Which characteristic of services planning is she concerned about?
Fault Tolerance
What is the primary purpose of the Direct Air Support Center (DASC)?
Fulfills requests for immediate air support and provides other airspace control functions to a Ground Combat Element.
How can an administrator enhance the functionality of a GPO?
Functionality can be enhanced through the implementation of policy extension
What is the correct name for first SIPR Exchange server for the GCEFWD domain?
GCEFWDS01E
As a CMR holder, which system will you use to assist you with accounting for your equipment?
GCSS-MC
Which of the following is NOT used to establish a Common Operational Picture?
GCSS-MC
______ provides accurate, near-real-time integrated logistics information, enterprise-wide visibility of logistics data, and allows logistics planners and operators to make informed decisions about the logistics chain.
GCSS-MC
What server is a domain controller that maintains a subset of the most commonly used Active Directory objects and their attributes?
GLOBAL CATALOG
Term used to describe the amount of useable data that is left after all of the protocol overhead traffic from the higher TCP/IP layers are removed
GOODPUT
A router in a foreign nation is a temporary stepping point for a cyberattack. What type of cyberspace is the router?
GRAY
A router in the US is a temporary stepping point for a cyberattack. What type of cyberspace is the router?
GRAY
DCO-RA is primarily conducted in which type of cyberspace?
GRAY
Point-to-point tunnel where new IP and GRE headers are added, but no encryption or security.
GRE
This feature provides unencrypted Point to Point tunnels
GRE
_______ is primarily used with the Marine Corps mobility infrastructure.
Google's Android OS
What type of cyberspace is used by both friendly forces and the adversary for operations and targeting?
Gray cyberspace
s the single point of contact between the service provider and the user.
HELP DESK
WHICH HYPERVISOR RUNS IN AN EXISTING APPLICATION ON TOP OF AN EXISTING OPERATING SYSTEM?
HOSTED
Which hypervisor type is best used for labs, tests, training, and demonstrations?
HOSTED
RAPIDLY SHIFT FROM A DEGRADED SITE TO ANOTHER FULLY PREPARED SITE. WHAT KIND OF SITE IS YOUR COMMANDER REFERRING TO?
HOT SITE
The foundation of data communication for the World Wide Web.
HTTP
List the benefits of Active Directory Domain Services. (select all that apply)
Hierarchical structure, flexibility, single point of access, redundancy
They give a reliable technique for the OS to communicate & react to their surroundings. Work can be divided into three important groups like memory management of hardware, OS and application memory management. A GUI or user interface (UI) is the part of an OS that permits an operator to get the information Provides the basic level of control on all the computer peripherals Allows an operator to execute one or more computer tasks at a time This will allow monitoring the request from accessibility to other resources The program can connect through the hardware device by simply following procedures & principles configured into the OS When the processor interacts with each other through communication lines
INTERRUPT MEMORY MANAGEMENT USER INTERFACE KERNAL MULTITASKING SECURITY PROCESS EXECUTION NETWORKING
Select the types of VLAN tagging/encapsulation below
INTERSWITCH LINK (ISL) IEEE 802.1Q
A set of networks that are under the control of a single administrative entity who only allows authorized users access. It is based on the networking technologies of the Internet Protocol Suite.
INTRANET
Match the primary functions of the Network Layer with their descriptions. Used to identify a packet's source and destination host computer. These rules also organize addresses into groups, which greatly assist the routing process. The process of hosts and routers forwarding IP packets, while relying on the underlying LANs and WANs to forward the bits. Aids routers by dynamically learning about the IP address groups so that the router knows were to route IP packets so that they go to the right destination host.
IP ADDRESSING IP ROUTING IP ROUTING PROTOCOL
What command will convert a layer 2 switch into a multi-layer switch?
IP ROUTING
The three primary functions at the Network Layer Are :
IP ROUTING IP ADDRESSING IP ROUTING PROTOCOL
Encryption/authentication provided through crypto maps. Does not support multicast or dynamic routing protocols.
IP SEC
What three logical addressing items must be assigned to a host?
IP address, Subnet Mask, Default Gateway
What are the four basic components of a VoIP network?
IP network, Call processor, Media, Endpoints
What is an integrated suite of tools to enable end-to-end planning, deploying, managing and monitoring of the IP address infrastructure.
IPAM
What service distributes directory data across the network?
IPAM REPLICATION
React to attacks in progress and prevent them from reaching systems and network
IPS
This feature provides encryption Point to Point tunnels
IPSEC
This style of encryption would be applied to a NIPR circuit?
IPSEC
You have a SIPR circuit encrypted by a TACLANE and then entering a Black Core Router. This router is connected to the modem on a VSAT-M. What security protection is likely being applied by the Black Core Router?
IPSEC
The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber-attacks against an organization's information systems(s).
IRP
The _______ is often a non-communications MOS Marine from each staff section who is very well-trained in the inforamtion contained in the Smart Pack/User Guide.
ISC
Which of the following is NOT a self-aid style of help desk support?
ISC
Your unit is deploying to the field and your S3 is curious as to what everyone's contact information will be on the newly installed network your Marines have established. What document can meet your OpsO's requirements?
ISD
Reports to the ISSM and ensure an appropriate cybersecurity posture is maintained for a command, site, system, or enclave in accordance with command Cybersecurity Program
ISSO
A unit policy on "Bring your own device to work" is an example of a:
ISSUE SPECIFIC POLICY
You are tunneling SIPR through NIPR. The NIPR link has gone down. What effect will this have on SIPR?
IT GOES DOWN WITH THE NIPR LINK
________ is the delivery of or access to networked information resources which enable command and control.
IT SERVICES
Which of the following locations does not maintain a CTC?
IWAKUNI
Where are GPO attributes stored?
In Active Directory Users and Computers
Vertical scaling, also known as scaling up, refers to which of the following?
Increasing the VM's RAM, CPU, etc.
What is the purpose of a CMR?
Indicates what equipment is assigned to a specific RO
Which of the following is a characteristic of virtual machines?
Insulated from hardware and physical changes to the host
How does ADDS integrate security?
It authenticates logons and controls access to directory resources
A collection of settings that define what a system will look like and how it will behave for a defined group of users.
It authenticates logons and controls access to directory resources.
What is the Group Policy Core Protocol?
It is a client/server protocol that enables a Group Policy client to discover and retrieve policy settings that are created by a Group Policy administrator and stored as a Group Policy Object (GPO) in Active Directory.
Why is messaging important to a network?
It provides a way to stay up to date on all relevant information.
How does a DAG work?
It replicates mailbox databases between mailbox servers.
How does Microsoft Exchange work?
It sends and receives messages
You are using Black Core Routing. The NIPR link has gone down. What effect will this have on SIPR?
It will remain up because it is independant of NIPR
You are trying to ensure targeting data is sent from an aircraft to an artillery battery in a TDL network. Assuming the entire chain is fully digital and the sensor sends a surface track message, what message conversion is occurring between the sensor and the fires C2 application?
J SERIES TO K SERIES
Which of the following is a Department-level initiative designed to generate a joint capability to sense, make sense, and act at all levels and phases of war?
JADC2
______ is the effort to develop capabilities for commanders to prosecute high-speed, globe-spanning conflict by linking all US military sensors to all shooters across the land, sea, air, space and cyberspace domains.
JADC2
is the effort to develop capabilities for commanders to prosecute high-speed, globe-spanning conflict by linking all US military sensors to all shooters across the land, sea, air, space and cyberspace domains.
JADC2
Who is the person that normally creates a TDL architecture?
JICO
Which of the following JREAPs uses a satellite to extend TDL information?
JREAP A
Which of the following JREAPs uses a TCP/IP connection to extend TDL information?
JREAP C
Which form of Joint Range Extension Application Protocol does not exist?
JREAP IP
Which of the following occasions rates an extension for the previously provided 15 days for CMR Inventory?
Joint Inventory between newly appointed and outgoing ROs
You have to encrypt a serial link What should you start looking for?
KIV-7M
A _____ provides the basic level of control on all computer peripherals.
Kernal
Select which of the following are OS components:
Kernel, API, File System, Device Drivers
A _______ is a collection of network devices that are connected in one physical location and share a broadcast domain.
LAN
Any network linking two or more computer and related devices within a limited geographical area.
LAN
Match the below Protocol Data Units with the appropriate TCP/IP Layer. Layer 3: Network Layer 4: Transport Layer 2: Data Link
LAYER 3 --> PACKET LAYER 4 --> SEGMENT LAYER 2 --> FRAME
What protocol do Mailbox servers use to gain access to recipient, server, and organization configuration information from active directory?
LDAP
What CDN module provides network connections for devices with 48 Power over Ethernet (POE) ports and an integrated UPS?
LEM
What is the PRIMARY USMC DDS-M Module used at the Data Link Layer?
LEM
Which of the following are the names of modular devices within the USMC Data Distribution System?
LEM LSM WSM
Which of the following TDLs primarily uses HF?
LINK 11
Which of the following TDLs are Navy ships currently moving toward?
LINK 22
Which of the following TDLs uses a combination of UHF and HF?
LINK 22
_________ differs from Windows and Apple, in that it's not a proprietary software.
LINUX OPERATING SYSTEM
A feature of virtual private networking is that it is a _________ Point-to-Point connection between two routers.
LOGICAL
A _____ is a telephone set residing at a different site than the CUCM it is associated with.
LONG LOCAL
A _______ is used to increase redundancy or to provide telephone services to remote locations where the installation of a CUCM would not be feasible.
LONG LOCAL
Spanning Tree Protocol (STP) or the newer Rapid STP (RSTP)
LOOP PREVENTION
Which of the following is NOT an advantage of a Client/Server architecture?
LOW COST TO EMPLOY
You're the S6 at 3/12. One of your subordinate Battery Commanders contacts your deployed helpdesk stating that his phone is non-operational. He still has the means to communicate with Battalion HQ via chat, radio, and email. What is the perceived impact of this user-issue and what is the level of prioritization applied to its resolution?
LOW IMPACT LOW PRIORITY
Your CO wants to know which of the three transmission paths the traffic is taking to the MEF TIE. You have a VSAT-L at 2Mbs tied to the TIE directly, LRS at 54Mbs with 1 additional hop to the TIE, and a MRC-142D at 16Mbs tied to the same site as the LRS. You are running EIGRP. Which is the most likely path?
LRS due the higher bandwidth and reduced latency
With regard to Help Desk procedures, limiting access drives efficiency of your staff by:
Limiting access between the customers and the help desk supervisors and SNCOIC
Each node in the network constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes.
Link-State Routing
CUCM, ACAS, and some Remote Administration Servers use _______.
Linux Operating System
_________ differs from Windows and Apple, in that it's not a proprietary software
Linux Operating System
What are the three types of GPO's?
Local Group Policy Objects, Non-local Group Policy Objects, and Starter Groups
A switch examins destination ________ addresses inorder to determin what interface for forward frames.
MAC
Layer 2 communication is based on the ID of a NIC known as a
MAC
This information is NOT included in a DHCP Acknowledgement.
MAC ADDRESS
Manually configure each port to accept traffic only from specific MAC addresses / Limits port's connectivity to a specific device using specific MAC address
MAC ADDRESS FILTERING
What is the name of the table that switches use to make switching decisions?
MAC TABLE
What is CAC2S?
MACCS POR that is used to C2 aviation
Which of the following is the TDL used between F-35s?
MADL
Which of the following is NOT an aviation POR?
MAKO AFAST TLCM-OST
You're the communications officer of 2/10. You Battalion Commander is satisfied with the current state of digital fires integration, but is getting frustrated with the unit's current inability to communicate via chat. Which of the following applications should you direct your Marines to integrate first into your network architecture?
MAKO, TRANSVERSE
Which of the following Marine Corps platforms will serve as an airborne C2 platform able to retransmit various TDL information in rotary wing aircraft?
MANGL
Where in the MAGTF would you find an 0630? Select one or more: a. Infantry Battalion b. Artillery Regiment c. Marine Division d.Radio Battalion e. MEF
MARINE DIVISION AND MEF
Which of the following units is expected to have the greater services requirement?
MAW or DIV
The foundation of the Marine Corps cloud computing strategy, which envisions access to IT services and resources in a seamless manner, enhancing operational effectiveness. a.DoDIN b.MCEITS c.SIPR d.MCEN
MCEITS
This includes all Marine Corps systems deployed or garrison right down to the individual application on the desktop computer. a.MCEN b.DoDIN c.CANES d.CENTRIXS
MCEN
This system could be considered a backbone item in your networking architecture. a.DISA b.DODIN c.MCR d.MCEN
MCR
________ provides the architectural backbone for your network systems architecture.
MCR
What role or feature must be installed before preparing the Active Directory environment for the deployment of Exchange Server?
MEDIA FOUNDATION
This is how your networks are connected. a.Messages b.Devices c.Medium d.Rules
MEDIUM
This is what is being passed along your network.
MESSAGES
What of the following are the Parts of a Network? Select one or more: a. Protocols b. Messages c. Devices d. Standards e. Cables f. Rules g. Fault Tolerance h. Medium
MESSAGES DEVICES RULES MEDIUM
In additional to serving as a backup capaiblity for computing ballistic firing solutions, the BUCS also provides which of the following software applications:
METEORLOGICAL PLOTTING
A _____________ can be changed to alter which of two static routes is used as primary.
METRIC
Dynamic routing protocols choose primary routs based on ______?
METRIC
This feature provides multipoint tunnels via NHRP
MGRE
Uses Next Hop Resolution Protocol (NHRP) to provide multipoint capability without need to manually define each endpoint. No encryption.
MGRE
Which of the following devices requires a SatComm Antenna?
MICROCHIP SYNCSERVER S650
Which of the following is included with an WSM-H?
MICROCHIP SYNCSERVER S650
Containers are often used to package single functions that perform specific tasks known as a _________?
MICROSERVICE
You are the OIC for a Comm Platoon tasked with establishing a PtP GRE Tunnel to higher. You're mission invloves being as light and mobile as possible What equipment should be the minumum required (assume mirrored equipment on distant end) to meet requirements?
PACSTAR, KG250X, 117G, CM, User device
Which of the following is the TDL used internal to the Patriot missile system?
PADIL
__________ refers to the systematic notification, identification, deployment, installation, and verification of operating system and application software code revisions. These revisions are known as patches, hot fixes, and service packs.
PATCH MANAGEMENT
You're an 0602 planning a server architecture for your unit. You're planning to integrate an AFATDS connection with your adjacent unit. The architecture is going to be simple, cheap to employ, and rapidly executable. What architecture are you planning?
PEER TO PEER
You're an 0679 at an infantry battalion. Your CommO is requesting a cost effective and rapidly employable server architecture. The information is unclassified and non-essential, so centralized security and data recovery are not a concern. What do you recommend?
PEER TO PEER
o establish a tunnel the base requirements are; Source, Destination, IPaddress, and ____________
PING TUNNEL DESTINATION
This protocol is utilized for downloading email and works on port 110?
POP3
Provides access for a user client application to a mailbox maintained on a mail server.
POP3/IMAP
Select common applications/protocols from the list below that primarily utilize TCP over UDP.
POP3/IMAP HTTP/HTTPS CHAT FTP
Which of the following is NOT a type of scan required by TASKORD 17-0019?
PORT SCAN
Limits the computers that can connect to physical ports on a switch
PORT SECURITY
What tool can you use to quickly install all required Windows Features for Exchange Server, using the Install Windows Feature command?
POWERSHELL
__________________ is used placed on TACLANES and is used for Secure Dynamic Discovery (SDD).
PPK
Which of the following is an element of the Help Desk SOP that needs to be planned for?
PRIORITIES FFIR
The Army''s contribution to JADC2 is referred to as _______.
PROJECT CONVERGENCE
The Army's contribution to JADC2 is referred to as _______.
PROJECT CONVERGENCE
The Navy's contribution to JADC2 is referred to as _______.
PROJECT OVERMATCH
A __________________ in the data world that has been endorsed by the networking industry and ratified by a standards organization a.Rule b.Protocol c.Regulation d.Order
PROTOCOL
Also called a multi-tenant environment, which type of cloud computing involves shared resources?
PUBLIC CLOUD
Which Cisco Unified Communications Manager server type functions as the primary call controller within a Cisco Call Manager cluster?
PUBLISHER
Which of the following would be done in the cyber kill chain's installation stage?
Placing malware on an asset
This refers to the procedures and principles configued into an OS.
Process Execution
Your Marines are tracing cables to find the switch interface tied to a specific computer in your COC. they have been at this for 20 minutes in front of your unit's S3 section and CO. What could have prevented their requirement to do this?
Proper desciption on each port in the CLI of the switch.
What are the primary functions of Active Directory Sites and Services?
Provides a way for the administrator of a domain to map the physical layout of the network in a way that active directory can understand.
What does Microsoft Online Certificate Status Protocol (OCSP) do?
Provides an efficient mechanism for distributing certificate revocation info.
What is not a feature of Microsoft Active Directory?
QOS
With regards to Client/Server configurations, what is an example of traffic shaping?
QOS
During a confirmation brief, your battalion commander expresses concern with bandwidth utilization when migrating VMs. Which characteristic of services planning is she concerned about?
QUALITY OF SERVICE
_________________ is a description or measurement of the overall performance of a network, particularly the performance seen by the users of the network. a.Quality of Service b.Scalability c.Security d.Fault Tolerance
QUALITY OF SERVICE
You are a systems administrator conducting the initial configurations for a server deployment for a field exercise. Your NCO tells you that you must select a hard drive configuration that is redundant and more efficient than other configurations. What methodology would you use to fulfil this request?
RAID 5
Mutual agreement among participating enterprises to accept each other's security assessments in order to reuse information system resources and/or to accept each other's assessed security posture in order to share information.
RECIPROCITY
A hacker harvests email addresses at what stage of the cyber kill chain?
RECON
A cyberattack occurs against an adversary's switch. What type of cyberspace is the switch?
RED
Any unencrypted classified traffic circuit is often referred to as _______________ before it is encrypted by a device.
RED
DCO-RA can be conducted into which type of cyberspace?
RED
OCO is primarily conducted in which type of cyberspace?
RED
What type of cyberspace is owned or controlled by an adversary where they seek to operate freely?
RED CYBERSPACE
You are in charge of briefing the comm plan to your infantry batallion commander. He asks why each site has two pathways out which requires extre equipment. He says, "If you can answer in one word, I will approve your plan." What do you say? a.Redundancy b.Scalability c.Security d.Quality
REDUNDANCY
The most common means of Trouble Ticket tracking is ______
REMEDY
This message is a broadcast message sent from an asset identifying its acceptance of an IP from a specific DHCP Server and is noted by all available DHCP Servers on the network.
REQUEST
Which of the following is NOT an advantage of a Client/Server architecture?
REQUIRES LITTLE EQPT STRING OR PLANNING
Who is the person that is responsible for managing TDLs in an assigned region or sector?
RICO OR SICO
This system is maintained by an 0631. a.computer b.router c.server d.VTC
ROUTER
What device operates at the Network Layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) Model?
ROUTER
A router's __________ holds information that allows the router to decide which interface to forward packets.
ROUTING TABLE
This information stored on a router containing the information about adjacent networks that allows the router to make a decision as to which interface to forward the packet down the TCP/IP model is best described as a/an:
ROUTING TABLE
This regulates the traffic on your network. a.Messages b.Rules c.Medium d.Devices
RULES
You're planning a communications architecture for an exercise and note that one of your two wideband satcom systems has just been released from maintenance giving you two satcom systems. What option is now available in terms of services planning is now available moving forward? Choose the best answer.
Reachback
What software allows administrators to Remotely manage Windows server roles and features ADDS and ADUC from a Windows 10 workstation?
Remote Server Administrative Tools (RSAT)
Which of the following is NOT a characteristic of a virtual server?
Requires additional hardware to improve performance Difficult to move or copy
Which is NOT a use for containers?
Requires more overhead
An advantage of a tunnel is
Secures the information moving through the transport network
Your COC has 25 users on SIPR and 20 on NIPR in a location 200m from your TCF. You need to provide network connectivity. The entire area is secure. Which of the below is the best way to accomplish this task?
Run 2 fiber lines and position 2 LEM's with each hosting its own enclave
Microsoft 365, Xbox Live, and One Drive are examples of which cloud computing service?
SAAS
Which of the following cloud service models provides access to a cloud-based web application and requires no installation or downloads?
SAAS
The ________ is a network storage device generally not accessible through the regulr network by regular devices.
SAN
During a confirmation brief, your battalion commander expresses concern with the quantity of servers in use and the shortage of any spares. Which characteristic of services planning is she concerned about?
SCALABILITY
_________________ is the ability of a network to grow and manage increased demand. a.Fault Tolerance b.Quality of Service c.Security d.Scalability
SCALABILITY
What server deploys updates and security patches across a network?
SCCM
There exists one per Active Directory instance and is the collection of objects, and their attributes.
SCHEMA
This OS characteristic enables monitoring.
SECURITY
What is a disadvantage with using public cloud computing?
SECURITY
What type of groups applies permissions to an OU or individual users?
SECURITY
This piece of equipment is commonly configured by 0671s:
SERVER
This system is maintained by an 0671. a.server b.router c.switch d.cabling
SERVER
_______ is a computer on the network from which you can request information, resources, services, and applications.
SERVER
ARE DESIGNED TO SHARE DATA, RESOURCES, OR DISTRIBUTE WORK.
SERVERS
Data systems are defined as a collection of _______ provided by servers to facilitate the sharing of data.
SERVICES
What does the UPS in the ASM provide?
SHORT DURATION POWER
What signaling protocol is typically used to connect CUCMs across a WAN connection
SIP
On this enclave, connections between routers are protected by Type 1 Comsec (KIV-7M) or HAIPE (KG-175) encryption.
SIPR
Which of the following allows for a MGRE Connection?
SIPR Connection between multiple sites from one hub using a KG175D
You are alone and unafraid during a training exercise so your Marines can get some much needed sleep. You have tripped over two cables and pulled them out from the TACLANE. One goes to the SIPR Router and one to the Black Core Router. What Enclaves have you brought down?
SIPR ONLY
Which of the following allows for a GRE Connection?
SIPR Point to Point Connection between sites from one hub using a KG250X
You are alone and unafraid during a training exercise so your Marines can get some much needed sleep. You have tripped over two cables and pulled them out from the TACLANE. One goes to the SIPR Router and one to the Black Core Router. Which do you plug into the PT interface on the TACLANE to bring the network back up?
SIPR Router
What are two main differences between Containers and Virtual Machines?
SIZE AND PORTABILITY
Network communication protocol for providing shared access to files, printers, and serial ports between nodes on a network.
SMB
This is attached to an IP address when using PAT so that the router can differentiate traffic among devices.
SOCKET NUMBER
Which system is a powerful network monitoring, alerting, and reporting capability for the Syscon Watch Officer?
SOLARWINDS
___________ is a powerful network monitoring, alerting, and reporting capability.
SOLARWINDS
Broadcast Storms can be avoided by using what?
SPANNING TREE PROTOCOL
Security incident that results in the transfer of classified information onto an information system not authorized to store or process that information.
SPILLAGE
Attackers use ______ to impersonate or masquerade as someone or something else
SPOOFING
Provides a secure channel over an unsecured network in a client-server architecture.
SSH
ACL USER-PERMITED is a ______
STANDARD NAMED ACL
ACL number 99 is a ______
STANDARD NUMBERED ACL
Which Link-16 capable radio would a helicopter use?
STT
FIREFLY vector sets use __________________ .
SYMMETRIC CRYPTOGRAPHY
Provides technical expertise in the preparation and conduction of comprehensive security assessments based on the managerial, operational, and technical security requirements documented within the Security Authorization Package (SAP).
Security Control Assessor
In order to send e-mails outside of your organization, what must you configure?
Send Connectors
Which of the following would be done in the cyber kill chain's delivery stage?
Sending payload via email
In a PaaS cloud service model, whose responsibility are cybsecurity updates and patches?
Shared responsibility
Which C2 System is a web-based collaborative platform that integrates with Microsoft's office products and is utilized primarily as a document management and storage system in the Marine Corps?
Sharepoint
What is application software?
Software that performs specific tasks for an end-user.
What is the correct order of troubleshooting steps for Microsoft GPO's?
Start with the scope, dive into delegation, learn your links, loopback.
What is RAID 0?
Striping
What is RAID 10?
Striping & Mirroring
What are the two types of T/O&Es?
Supporting Establishments (SE) and Operating Forces
Which of the following radio nets would usually be VHF?
TACP-L
Which of the following radio nets would usually be UHF?
TAD
Which of the following radio nets would usually be UHF?
TATC
The following are web-based applications EXCEPT:
TBMCS
Which of the following is NOT a component of CAC2S?
TBMCS
What Layer 4 protocol would I use to connect to MOL?
TCP
_______________ is a connection-oriented protocol
TCP
_______________ uses a three-way handshake, retransmission, and error-detection to add reliability
TCP
What are/is the Protocol(s) used by Layer 4: Transport Layer?
TCP / UDP
Provides access to a Command Line Interface (CLI) on a remote host.
TELNET
The amount of data that is actually transmitted over the media
THROUGHPUT
Which of the following is NOT a post-closure action required of the help desk?
TICKET DELETION
A User Education plan could include which of the following:
TRAINED ISCS S6 IN-BRIEF SMART PACK ISD
This style of encryption would be applied to a VSAT-S?
TRANSEC
You have a SIPR circuit encrypted by a TACLANE and then entering a Black Core Router. This router is connected to the modem on a VSAT-M. What security protection is likely being applied by the VSAT-M?
TRANSEC
__________________ is used for bulk ecnryption.
TRANSEC
________ is a term that broadly captures all architectures designed to support the transfer of information and the data systems architecture.
TRANSPORT
is a term that broadly captures all architectures designed to support the transfer of information and the data systems architecture.
TRANSPORT
Select whether the following statement is true or false. Where the battalion OPT is nested inside of the regimental OPT, which is further nested inside the Division OPT, the battalion S-6 holds a communications working group, while members participate in the regimental S-6's communications working group, while members of the regimental S-6 participate in the Division's communications working group.
TRUE
Software includes the operating system and the programs running on the computer.
TRUE
The Acronym "SIPRNet" stands for the Secure Internet Protocol Router Network.
TRUE
The Acronym "SIPRNet" stands for the Secure Internet Protocol Router Network. Select one: True False
TRUE
The Principles of Security are Confidentiality, Integrity and Availability. Select one: True False
TRUE
There are 65,536 possible ports available to the Transport Layer.
TRUE
There is only 1 schema per active directory instance.
TRUE
VLANs are utilized to secure assets on your network.
TRUE
Voice over Internet Protocol is a technology which allows Internet Protocol-based networks to be utilized for real-time voice applications.
TRUE
Which of the following prevents packets from routing around the internet indefinitely?
TTL
Loopback interfaces are most commonly used for _________________
TUNNEL SOURCES
Provides an efficient way to accredit systems and network components meeting specified security requirements and employing selected security controls.
TYPE AUTHORIZATION
A computer on your network has an IP address of 169.235.1.12. All 24 other computers are functioning on DHCP and have IP's in the 192.168.17.0/24 network. It cannot connect to any services. What is the most likely problem?
That laptop has no connection to the DHCP server
Your Bn Adjutant is unable to access a site that is blocked by an ACL entry that most Marines should not have access to but is required for his work. You have your Marines modify the ACL to allow his specific IP access to that site. It still doesn't work, and is corrected. Then two days later it is again not working. Why did it not likely work at first and why did it likely stop working again later?
The "Permit" statement for the Adjutant's IP address was added to the end of the pre-existing ACL. Then the IP of his computer changed due to DHCP.
Who are LE personnel primarily responsible to?
The Commanding Officer (CO)
What does GPMC allow an administrator to do?
The GPMC allows administrators to create a GPO that defines registry based polices, security options, software installation and maintenance options, scripts options and folder redirection options.
Which government credit card is used for ordering supplies that are not available through the normal supply system?
The International Merchant Purchase Authorization Card (IMPAC) Visa Credit Card
Your Marines are re-imaging laptops that have a SSD and HDD. Which drive should the Operating System be installed?
The SSD uses Flash memory and has a much faster read/write speeds that will speed up the operating system.
NIPR Point to Point Connection between sites not using a KG175D
The ability to ping the physical address of the destination router
To establish a tunnel the base requirements are; Source, Destination, IPaddress, and
The ability to ping the tunnel destination
What is the DoD Information Network?
The globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating and managing information on demand for warfighters, policy makers, and support personnel.
Your S-3 calls you away from testing your VoIP capabilities to ask you about how you're going to be able to guarantee the CO can connect to the network from his own workstation and other terminal devices. He tells you that in the past, he's had bad experiences where the CO's devices have not been able to pass traffic on unclassified networks, even though other devices that had already been added were working just fine. What problem might he be talking about, and how can you guarantee that it doesn't happen this time around?
The previous S-6 allowed the DHCP server to dynamically allocate IPs to the entire network, and exhausted the S-6 IP allocation before the CO was able to connect his device to the network. You will solve this issue by statically assigning IPs to your CO's devices to ensure the DHCP server does not assign those IPs to other devices.
What is the purpose of video teleconferencing (VTC)?
The purpose of video teleconferencing is to offer commanders an unclassified or classified closed video network capable of voice, video, and data exchange to facilitate face-to-face communication, meetings, and planning sessions.
A Marine in the COC says the track quality of one track is better than another track. What does this mean for the tracks?
The track with better quality has a more accurate position
What are the requirements for a witness server?
The witness server can't be a member of the DAG.2. The witness server must be in the same Active Directory forest as the DAG.3. The witness server must be running Windows Server 2008 or later.4. A single server can serve as a witness for multiple DAGs.
What does a messaging system do?
They manage the channels that define the paths of communication between the applications and the sending and receiving of messages.
This network and enterprise service enables collaborative information sharing across forces afloat with reach-back capabilities to supporting shore establishments via system management, voice, video, and data services.
This network and enterprise service enables collaborative information sharing across forces afloat with reach-back capabilities to supporting shore establishments via system management, voice, video, and data services.
You are validating your platoon's Active Directory services. You submit a request that requires the Global Catalog to search all of the objects of which it has a full or partial record, searching for an object that you know for a fact exists within another Active Directory domain. The request goes through, Global Catalog is unable to locate any record of this object. What might explain this?
This object exists in a domain that is not within the same forest as our domain; Global Catalog is limited by the fact that it only keeps replicas of objects within the forest.
The measure of data that is actually successfully transmitted over the network.
Throughput
Select the answer that best describes why VoIP (Voice over Internet Protocol) protocols exist.
To setup, maintain, and terminate a bi-directional real-time media stream between VoIP terminals, also provide the necessary signaling for VoIP networks to interface with the Public Switched Telephone Network (PSTN).
What is the purpose of Total Force Structure Process (TFSP)?
To translate necessary organizational capabilities into force structure solutions and measure the cost of providing those capabilities consistent with financial resources available to the CMC
A domain arranged into a hierarchical structure is called what?
Tree
What Layer 4 protocol would I use to make a phone call?
UDP
What protocol at layer 4 of the OSI model would is used to stream a video?
UDP
What would I use to stream a video?
UDP
_______________ is a connectionless protocol
UDP
What band does ANW2 operate in?
UHF
An event involving the exposure of information to entities not authorized access to the information.
UNAUTHORIZED DISCLOSURE
One source to one destination
UNICAST
The power just went out and "should be restored" in 5 min. What device inside most network equipment is keeping your network alive? How long do you have ideally?
UPS, 15MIN
The following effort belongs to which agency: Employ a modernization strategy and prove its concept through a series of training evolutions, referred to a Project Convergence.
US ARMY
The following effort belongs to which agency: Develop the Advanced Battle Management System, intended to provide data to pass information across all domains.
USAF
Which of the following would be done in the cyber kill chain's exploitation stage?
USING A VULN TO EXECUTE CODE
The following effort belongs to which agency: Develop a fleet architecture using AI and manned/unmanned teaming to enable Distributed Maritime Operations.
USN
security appliances combines the features of multiple security solutions into a single appliance
UTM
Users can setup, accept or cancel meetings and can listen to and send calendar information using _____.
Unified Messaging
________ is a software for automating patch management.
Update Manager
You have a router, KG175D, and a switch for network equipment. You need to set up a NIPR and SIPR network with a colorless transport. How would you accomplish this?
Use the router to establish three VRF's. Then route the SIPR KG to the swith to host SIPR services. Inform your Ops O that SIPR and NIPR will be limited reach.
This OS characteristic a means for the user to interact with the OS itself.
User interface
Which of the following is NOT a characteristic of Link-16?
Uses IFF frequencies
Depending on the level of staff, the help desk should define key members of the staff that rate ________ support.
VIP
Which of the following is NOT an element of a deployed help desk?
VIP SUPPORT
What is the process of implementing multiple operating systems on the same set of physical hardware to better utilize the hardware?
VIRTUALIZATION
_____ is the process of implementing multiple operating systems on the same set of physcial hardware to better utilize the hardware.
VIRTUALIZATION
What is not a common Exchange problem?
VIRTUALIZATION SERVICE EXCEEDED
Why are Power over Ethernet (PoE) switches required in Marine Corps VoIP Networks? Pick the best answer.
VoIP telephones require power to operate, many of them were fielded without external power blocks that can provide power so the only way to provide the phones with power is via PoE enables switches.
Where does the IP address associated with your Call Manager originate?
Voice VLAN
A ______ interconnects two high speed networks over a geographic distance; usually much slower than other networks.
WAN
Interconnects Two or More Networks over a geographic distance.
WAN
Departmental and Service-Level delays in divesting of legacy systems and environments, coupled with delays in incorporating technological advances into enterprise solutions challenges which enabling technology?
WARFIGHTING NETWORK
FULLY PREPARED, CURRENTLY ON STANDBY
WARM SITE
A hacker creates an attack or malicious software at what stage of the cyber kill chain?
WEAPONIZATION
After returning from a sleeping post, you notice that various services essential to the field exercise are down and the previous administrator is not there to explain. Where can you go to get information on what might have happened?
WINDOWS EVENT LOGS
What command will delete the start-up configuration from your device?
WRITE ERASE
Which DDS-M Device is the PRIMARY system used to connect unit routing devices together?
WSM
Which DSN module is the PRIMARY device used at the Network Layer/ Layer 3 of the OSI model?
WSM
Which Network Device is the PRIMARY USMC DDS-M device used at the Network Layer?
WSM
You are standing up a Div Comm Co TCF that is expected to be static for an extended period. It is acting as a major communications hub for adjacent, subordinate, and DISA links and routing. Which of the following would you most likely to use in your plan for core network routing?
WSM-H
Which of the following is a best solution for a light mobile unit requiring fast set up and tear down times and man pack equipment?
WSM-L
Which of the following is an enabling technology of JADC2?
Warfighting Network SOFTWARE
You're a communications officer establishing a COOP site for your unit. Your commander is requesting the ability to rapidly shift from a degraded site to another fully prepared site, currently on standby. What kind of site is your commander referring to?
Warm Site
What is the TDF?
What actually displays the air picture
Can you use an ACL to block Web access to a specific user on your network?
YES
Can you use an ACL to block access to a specific URL to a specific user on your network?
YES
Do domain controllers house the responsibility for allowing authentication and access for network logon?
YES
Your IP allotment is 10.10.51.0/24 for physical and 172.16.51.128/26 for logical. You must provide for 110 transmission links and 55 DMVPN spokes. Do you have the IP space to do this?
YES
You are preparing for a training exercise and your Chief is on leave. A Cpl asks you if he is allowed to put DHCP on the SIPR router. Is this permitted?
Yes, it is common practice and authorized on USMC networks
An Authorized User (military, civilian, FN, or contractor) who requires detailed knowledge of Cyber IT and/or cybersecurity to support work in the development, maintenance, or operation of Marine Corps systems, including weapons, tactical, electronic and electrical services, navigation, and engineering.
ZONE 1
Which of these commands prepares the Domain for Exchange during the deployment of Exchange Server 2016?
\setup.exe /PrepareDomain:Domain.Local /IAcceptExchangeServerLicenseTerms
Frames sent to a Multicast Ethernet address will be copied and forwarded to ________________.
a subset of devices on the Ethernet LAN that volunteers to receive frames sent to a specific address.
A multi-channel radio network diagram is complete with unit names, unit locations, multi-channel radio system symbols, a legend and what other pieces of information?
appropriate data rates
A cyberattack occurs against a MCEN router. What type of cyberspace is the router?
blue
DoDIN Ops is conducted in which type of cyberspace?
blue
The process of tracking and approving changes to the system.
configuration managment
Which of the following is the MOST responsible for the conduct of DCO - Internal Defense Measures?
cpts
What administrator has the permissions to do anything in the domain?
domain
Consists of the management server responsible for collecting events, controlling policies, and maintaining updated content for end-point product modules.
ePO Management Suite
When tasking units in support of a multi-channel radio network, it is important to remember to include attach and detach equipment statements as well as ______ links.
establish and terminate
Malicious code is executed in a system at what stage of the cyber kill chain?
exploitation
What are multiple trees that share the same schema?
forest
An internet-enabled fridge in the US is a staging point for a cyberattack. What type of cyberspace is the fridge?
gray
_______ is the single point of contact between the service provider and the user.
helpdesk
Which hypervisor type runs in an existing application on top of an existing operating system?
hosted
A hacker puts malware on an asset at what stage of the cyber kill chain?
installation
This gives a reliable technique for the OS to communicate and react to surroundings.
interrupt
Establishes and manages the cybersecurity program within a command, site, system, or enclave in accordance with DoD, DON, and Marine Corps cybersecurity guidance and policies
issm
is the DoD's concept to connect sensors from all military services into a single network.
jadc2
What two tunneling protocols does DMVPN rely on?
mGRE NHRP
Which of the following is NOT a limitation of containerization?
not interoperable with cloud computing
The Main advantage is that administrator permissions can be delegated to these containers for objects and groups.
ou
The layer three PDU is known as (a)
packet
Which of the following is NOT included with the WSM Lite?
pacstar 440
This process is designed to account for assets that cannot be patched on time. The intent of the process is the development of a plan that ultimately ends with assets patched or updated.
poam
What is RAID 5?
striping and parity
What is the purpose of VLSM?
to support more efficient use of IP Address space
What tables does a Router with EIGRP enabled have other than a Routing Table?
topology, neighbor
________ is a server that is a centralized management application for virtual machines and ESXi.
vCenter
is a component of vSphere that allows the live migration of a running VM's file system from one storage system to another.
vMotion
________ is a hyper-converged, software-defined storage (SDS) product that pools together direct-attached storage devices across a vSphere cluster to create a distributed, shared data store.
vSAN
You are the S-6/communications platoon commander for an infantry battalion. Who fills the role of the responsible officer (RO) for the battalion's communications gear?
you