Exam Questions
If an RF carrier is 100 percent AM modulated, what will be the RF output when the modulating signal is (a) at its negative peak and (b) at its positive peak?
(a) 0 (b) 2 times the amplitude of the unmodulated carrier
Individuals desiring to present a personal appeal must request a DOHA hearing within how many days of receipt of the Letter of Denial?
10 days
Following an unfavorable security determination, a request to re-establish eligibility may be submitted after a reasonable passage of time, normally a minimum of how many months after the concluding unfavorable determination either by PSAB is appeal rights were exercised?
12 months
Which frequency is for world-wide use when communicating with enroute aircraft participating in SAR operaitons?
123.1 MHz
How many interrupt request lines (IRQs) are there in a PC environment?
16
If a corner-reflector antenna is horizontally polarized, its radiation pattern will take on what shape?
A narrow beam in the vertical plane
In the radio frequency carrier shift system, translation of an RF signal to an audio signal is done by which of the following equipment?
A radio receiver
To measure shaft rotation rate on an engine, you should use, which, if any of the following instruments?
A tachometer
If you desire to delete an existing DCS circuit, you should submit what type of request?
A telecommunications service request
A(n) ____ is a device that accepts wireless signals from multiple nodes and retransmits them to the rest of the network.
Access Point
There are two types of communications satellites. What type acts as a repeater for the signal?
Active
An antenna which is designed especially for vertically-polarized ground waves at low frequencies is the _______
Beverage Antenna
In order to ensure effectiveness how often are DON IA policies and procedures required to be reviewed?
Annually
Operations like adding and multiplying are performed by what section?
Arithmetic Logic
What are the two most familiar of the procedure oriented languages used for scientific or mathematical problems?
BASIC and FORTRAN
Data is represented by which of the following means?
By symbols
What embodies incident detection and response?
Computer Network Defense (CND)
What always precedes geographic address groups?
Conjunctive address groups
Computers have an advantage over typewriters in what area?
Correcting errors
The loss of program files has which of the following loss potentials?
Cost to reconstruct files
Which of the following terms is used to describe what occurs when two nodes start transmitting at the same time?
Collision
Energy is fed to a parasitic element using what method?
Inductive coupling
The TRIGGER and LEVEL controls are used to synchronize the sweep generator with what signal?
Input
A measurement of the voltage to current ratio (E in/I in) at the input end of a transmission line is called the ______
Input Impedance
What is potentially more serious than the external threat because perpetrators of malicious activity or inadvertent mistakes do not have to penetrate multiple layers of defense and may have authorized access to systems
Insider threat
An ordinary ohmmeter is unsuitable for measuring insulation resistance for which of the following reasons?
Insulation resistance values are too great for an ohmmeter to measure
What supports protection of information against unauthorized modification or destruction?
Integrity
_____ refers to the soundness of a network's programs, data, services, devices and connections.
Integrity
A(n) _____ is a message to the computer that instructs it to stop what it is doing and pay attention to something else.
Interrupt Request, IRQ
In conducting a scheduled inspection, which of the following is normally the first step?
Interviewing the AIS personnel
A network or part of a network that uses browser-based services to exchange information within an enterprise is known as a(n) _____
Intranet
What uses the same web browsers and other software and the same TCP/IP protocol as the public Internet, but exist as a portion of a company's private network?
Intranet
To coat magnetic disks, what magnetizable recording material is used?
Iron oxide
In which of the following ways does smoke affect a computer?
It causes buildup on disks and disk drives
As the frequency of signal is increased, what change can be noted about its wavelength?
It decreases
Locating a near-synchronous satellite is rather simple for which of the following reasons?
It has a slow relative motion
Which of the following is a characteristics of a comprehensive inspection plan?
It is action oriented
Which of the following is known as a label-based access control method and is hardcoded into a device?
DAC
AGC circuitry within a receiver uses a portion of which of the following detector voltage components as a feedback signal to preceding stages?
DC
What traffic shall have absolute priority over all other transmissions?
Distress
Which of the following devices is used in Token Ring networks as the central device?
MSAU
In AIS security, risks are usually expressed in which of the following terms?
Dollars
Of the following communications system components, which one is a device that is nonradiating, absorbs RFm and has the characteristic impedance of the antenna?
Dummy load
In pulse modulation, what term is used to indicate the ratio of time the system is actually producing RF?
Duty cycle
What is the type of memory chip used for most of the main memory in a modern PC?
Dynamic RAM (DRAM)
Who manages NAVCIRT?
FIWC
On an ohmmeter, which of the following switches allows selection of AC or DC readings?
FUNCTION
The primary advantage of phase modulation over frequency modulation is that phase modulation has better carrier ______
Frequency stability
Sending a message on several frequencies at one is an example of which of the following transmission types?
Frequency-diversity
All transmission lines must have two ends, the input end and the output end. What other name is given to the input end?
Generator end
What are computers called that combine the functions of both analog and digital?
Hybrid computers
Semiconductor storage has which of the following drawbacks?
It is volatile
The most frequently changed element of a cryptosystem is known by what term?
Primary cryptovariable
On networks that run NetBIOS over TCP/IP, the _____ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses.
Nbtstat
Overal sensitivity of a receiver is limited by which of the following factors?
Noise
Wherever AIS equipment is used for processing classified information, which of the following instructions should be used for applying physical protection and security policy?
OPNAVINST 5239.1
The use of an intrusion detection system (IDS) in a protective program is covered in which of the following instructions?
OPNAVINST 5510.1
What must you do to replace a system board in a given notebook computer model?
Obtain an exact replacement for the board being removed
Heterodyning action in a plate modulator takes place in what circuit?
Plate
Which layer formats data to be presented to the application layer?
Presentation
Manual gain lets you adjust a receiver for maximum sensitivity and amplify weak input signals. Which of the following internal sections of the receiver are varied by this control?
Radio frequency
Which of the following types of energy CANNOT be seen, heard, or felt?
Radio waves
Which of the following is a valid boot option when using Windows 2000 and Windows XP Professional distribution CDs to start the system?
Recovery Console
Describe the Internet Layer's function
Solves the problem of sending packets across one or more networks
A lack of efficiency in a communications division is a direct reflection of the management skills of which of the following individuals?
Senior supervisor
Who is responsible for examining operational logs, monitoring equipment alignment and operation, and preventing message backlogs?
Senior watch supervisor
Which mandate was enacted to preclude the initial granting or renewal of security clearance eligibility by the DoD under specific circumstances?
Smith Amendment
Which type of malicious computer activity exploits people's human nature to fool them into providing information about themselves, their business, or their computer or network?
Social Engineering
What is the most popular generic term for computer programs?
Software
What term is used for programs such as assemblers, compilers, operating systems and applications programs?
Software
What is the term given to arranging records in a predefined sequence or order?
Sorting
Which of the following is used to identify a wireless network?
SSID
Which of the following protocols is used to secure HTTP transactions on the Internet?
SSL
In a FSK transmitter, what stage is keyed?
The oscillator
To ensure frequency stability in a CW transmitter, you should NOT key what circuit?
The oscillator
What component in a magnetic microphone causes the lines of flux to alternate?
The diaphragm
Which of the following types of PC cards are commonly used for devices such as network adapters, sound cards, and modems in laptops?
Type II
Which PCMCIA slot type can handle all the different PC card device formats?
Type III
Who will most likely be tasked with ensuring the individual is squared away and ready for XOI, Captain's Mast or court-martial?
Work Center Supervisor
Which of the following portions of the frequency spectrum contains the highest frequency?
X-Ray
Which type of threats describes state-sponsored computer network attack or espionage?
Third Generation
Why are communications satellite earth terminals generally located in areas remote from the actual users?
To minimize RF interference
What is the mission of naval communications?
To provide reliable, secure and rapid communcations
In a spark-gap modulator, what is the function of the pulse forming network?
To rapidly discharge stored energy
What is the usual speed range (in feet per minute) of a chronometric tachometer?
0 to 3,000
The output level meter of a signal generator reads 0.10 with the attenuator set to 080.0. What is the actual output in microvolts?
08.00
What is the recommended clear distance and the maximum angle specified for IrDA printer connections?
1 meter, 15º
When administering the advancement exam you must have a ratio of how many proctors to candidates?
1 to 25
The greatest hazard from thermal effects appears to come from equipment operated in which of the following frequency ranges?
1 to 3 gigahertz
In what year were the core values re-evaluated and redefined to become Honor, Courage and Commitment?
1991
An antenna with which of the following radiation resistance values will exhibit reduced efficiency?
39 Ohms
The keyer in a radio frequency carrier shift system is normally adjust for which of the following maximum frequency spreads?
850 Hz
What maximum number of disk should be stacked horizontally?
10
Which US Navy Regulations article states that if a person delegates authority, they shall not be relieved from any responsibility imposed upon them, and that they shall ensure the delegated authority is properly exercised and their orders and instructions are properly executed?
1022
When was the UNIVAC I developed?
1950
The rejection of input frequencies above 900 kilohertz is performed by which of the following circuits?
A low-pass filter
Which of the following properly describes the correct technique for installing thermal compound between a new microprocessor and it's heat sink?
A thin layer on the top of the processor
What is a DoD tool to automatically query government and commercial databases between periodic reinvestigation cycles in order to detect serious, yet unreported, issues of security concerns?
AUTOMATED CONTINUOUS EVALUATION SYSTEM (ACES)
To change sound energy into electrical energy, which of the following devices should you use?
A microphone
To make an inductance measurement on the model 250DE, you must first adjust the DET GAIN control to what position?
2
What is the maximum number of channels available when you are using the emergency portable transceiver covered in Chapter 5?
2
Material in the administrative file must be retained for what minimum time?
2 years
What is the typical speed of data transfers for hard-wired, network printers?
10/100/1000 Mbps
The first successful communications satellite for business applications was launched in what year?
1965
The usual range of rotational speed for floppy disks is what?
300 to 400 rpm
Frequency division multiplexing systems transmit and receive during a maximum of how many degrees of a sine wave?
360
As a guideline for risk analysis, which of the following FIPS publications should you use?
FIPS PUB 65
What method is normally used to transmit graphs electronically?
Facsimile
Which of the following programs must be compatible with the operating system in use?
Applications
Which of the following terms correctly describes the loss of signal while it travels down a particular medium?
Attenuation
What are the two major sections of an AM transmitter?
Audio frequency unit and radio frequency unit
An e-commerce website is using digital certificates. Which part of authentication, access control and auditing (AAA) is provided by these certificates?
Authentication
What supports verifying the identity of an individual or entity and the authority to access specific categories of information?
Authentication
What label is used to identify a test instrument that is within tolerance on all parameters?
CALIBRATED
A test instrument that has plug-in modules and/or easily accessible potentiometer or controls which affect the calibration of the instrument should have which of the following labels attached?
CALIBRATION VOID IF SEAL BROKEN
Which command line statement is used to move between directories?
CD
What drives are relatively high-capacity, removable-media, optical drives?
CD and DVD drives
Which of the following media access methods is utilized in 802.11b wireless networks?
CDMA/CA
Who is responsible for developing US military policy, positions and concepts supporting CND and IA?
Chairman of the Joint Chief's of Staff
The first art of a computer instruction, which answers the question what, is known by which of the following terms?
Command or operation
Who is responsible for ensuring a visitors eligibility, access and affiliation data are current and accurate in JPAS before allowing in a classified space?
Command sponsoring the visitor
What are the three types of authority within the Navy?
Command, General and Organizational
Who shall ensure the integrity, confidentiality, authenticity, availability and non-repudiation of information and information systems supporting Marine Corps operations and assets?
Commandant of the Marine Corps
Who has full responsibility for the internal handling of message traffic within the ship?
Commanding Officer
Who is responsible for day-to-day PSP management?
Commanding Officers
The importance given by the CO determines the effectiveness of what?
Commands security program
Who directly supervises all radiomen on watch in the message processing area and its responsible for notifying the CWO and SWS on any unusual or urgent matters?
Communications Center Supervisor
What command line statement is used to convert a FAT 32 partition to a NTFS partition in a Window XP system?
Convert C:/FS:NTFS
The field of research that is developing computer systems which mimic human thought in a specific area and improve performance with experience and operation is what field of research?
Artificial Intelligence
Which of the following electronic devices is used to radiate and/or collect electromagnetic waves?
Antenna
An increase of invulnerability to jamming of satellite communications systems is seen through the use of which of the following features?
Anti-jamming modulation techniques
What cable manages the bulk of the traffic on a network?
Backbone
What term refers to the cable that forms the main trunk of a network?
Backbone
A _____ is a record of how the network operates under normal conditions.
Baseline
The initial operating conditions of newly installed equipment are referred to as ______
Baseline operating characteristics
A large volume of light radiating in a given direction is referred to as a ____
Beam
The internal processing speeds of third generation computers are measured at what speed?
Billionths of a second
Data is stored in computers in what form?
Binary
_____ occurs when a hacker forges name server records to falsify his host's identity.
DNS spoofing
All PSIs requested to support eligibility determinations on DON employees are forwarded to who, when complete for adjudication?
DON CAF
You can use the _____ utility to free up hard drive space by removing temporary Internet files, installed components, and unused programs?
Disk Cleanup
What requires that all personnel with privileged access to DON information systems and networks, and Designate Approving Authorities (DAA's), shall receive training and be certified for their position?
DoDD 8570.1
In the process of any type of troubleshooting effort, what should you do after you've identified a problem and repaired it?
Document the steps you've performed
What type od printers are used to print continuous feed, multipart forms?
Dot Matrix Printer
Which of the following printers can produce photographic quality, continuous tone images?
Dye-sublimation printer
What does network management enable based on priority, system status and capacity?
Dynamic Rerouting
If a 28 volt 6 ampere fuse blows, the proper procedure is to replace it with which of the following devices?
A fuse of the same voltage and current rating
The action of the double-button carbon microphone is similar to which of the following electronic circuits?
A push-pull amplifier
A display similar to this A> means what in computer terminology?
A prompt
You can determine if a piece of test equipment has been calibrated by checking which of the following documents?
A tag or label attached to the instrument
Which of the following is another (and official) name for IDE and EIDE drives?
ATA
What control on the front panel of an oscilloscope limits the input signal amplitude and allows the oscilloscope to be used with a wide range of signals?
ATTENUATOR
What is the opportunity to make use of an information systems (IS) resource?
Access
A network's _____ iw its method of controlling how network nodes access the communications channel.
Access Method
When maintenance personnel are not authorized to make repairs to a piece of test equipment, what items, if any, must be sent to the calibration repair facility with the equipment?
All accessories
The impedance matching of equipment to transmission line is accomplished by which of the following equipment groups?
An antenna coupler
Describe the Transport Layer's function
End-to-end connections and reliability, flow control
Describe the Transport Layer's function
End-to-end message transfer capabilities
What should be used to determine which procedures and security features are appropriate?
Costs and Benefits Analysis
A(n) ____ is in distinct communication path between nodes.
Channel
A _____ is a place where the computers, devices and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated or connected.
Cold Site
How does a two gap head allow for increased speed?
By checking while writing
What supports the protection of both sensitive and classified information from unauthorized disclosure?
Confidentiality
Frequency-shift keying is generated using which of the following methods?
By shifting the frequency of an oscillator at an AF rate
CDP is found at what layer of the OSI model?
Data link
Who has formally responsibility for the secure operation of information systems within his/her area of responsibility?
Designated Approving Authority (DAA)
IA Publications are maintained by?
Director of COMSEC
What group of related items form a record?
Fields
_____ is equivalent to using wildcards in Windows and DOS.
File Globbing
_____ refers to the capability of a server to share data files, applications, and disk storage space.
File Services
In a single-sideband transmitter, selection of the desired sideband and suppression of the other is done by which of the following components?
Filter
Which of the following categories of AIS media is permanent in nature and is retained for a period of more than 180 days?
Finished
What is a low-capacity, removable media, magnetic-storage device?
Floppy Drive
If conversion of the digital signal to be transmitted were not carried out, it would degenerate and become what?
Garbled
Which of the following devices works at layer seven of the OSI model?
Gateway
One of the following network devices forwards the data it receives on a port to all other connected ports. Identify the device from the following:
Hub
An FM signal has which of the following characteristics when compared to an AM signal?
Less static
What type of kernel structure does the Apple OS-X operating system employ?
Linux Kernel
What is the objective of IA in a defense-in-depth strategy?
Management of risk
What type of authority is the authority that allows a person to step in and take over when action is required?
Moral
Describe the Application Layer's function
Network process to application
Which INFOCON level is described as a normal readiness of DoD information systems and networks?
Normal
Who is authorized to send PERSONAL FOR messages?
Officers of flag rank or in a command status only
DAA Authority is limited to whom?
Officers of the grade O-6 or above and civilians of grade GS-15 or equivalent
To better organize and manage objects, a network administrator places objects in _____
Organizational Units
What is the designation of security spaces requiring access control?
Restricted area
Which of the following types of AGC voltage drives an amplifier toward cutoff?
Reverse
What type of memory is available in access times of 2ns or less?
SRAM
In an AM signal that is 100 percent modulated, what maximum voltage value is present in each sideband?
Same as the carrier voltage
What is any information the loss, misuse or unauthorized access to, or modifications of which could adversely affect the national interest?
Sensitive Information
Who is responsible for assigning responsibilities for overall management of the Personnel Security Policy (PSP)?
The Chief of Naval Operations, Special Assistant for Naval Investigative Matters and Security (N09N)
Weather charts and photographs are examples of materials transmitted by ______
FAX (Facsimile)
What determines the bandwidth of an AM wave?
The number of sideband frequencies
Changes in receiver input strength due to changing atmospheric conditions is described by which of the following terms?
Fading
____ is the capacity for a component or system to continue functioning despite damage or partial malfunction.
Fault tolerance
Programs that are tailored to certain needs and permanently installed in ROM by the manufacturer are called what?
Firmware
What precedence is assigned to a message that is of such urgency that it must be brief?
Flash
Which laser printer subsystem is responsible for bonding toner to the paper?
Fuser assembly
Wide area networks are sometimes referred to as which of the following networks?
Global
What is the biggest key to maintaining accountability?
Good leadership
Within a flowchart, what type of symbols are used to specify arithmetic operations and relational conditions?
Graphic symbols
Aid in restoring downed fleet communications channels is furnished on a not-to-interfere basis by which of the following networks?
HICOM
The components or tools of a computer system can be grouped into what two categories?
Hardware and software
Who manages IA for the command under the DAA?
ISSM
The "ratio of transmitted powers" provides what information?
Improvement shown using FSK instead of CW transmission methods
Where is system hardware configuration information stored in a notebook PC?
In the CMOS
The initial waves that travel from the source to the load of a transmission line are referred to as what type of waves?
Incident
What printer type produces print by squirting ink at the page?
Inkjet
In communications, what name is given to those devices that serve to interconnect?
Interface elements
Describe the Session Layer's function
Interhost communication
Routing occurs at what layer of the TCP/IP model?
Internet
What provides information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access to, use disclosure, disruption, modification or destruction of information or information systems?
Information Assurance (IA) Policy
What is designed to provide positive control of the vulnerability notification and corrective action process within DoD?
Information Assurance Vulnerability Management (IAVM) process
What focuses on affecting human decision processes to achieve friendly objectives?
Information Operations
The Global Maritime Distress and Safety System is administered by who?
International Maritime Organization (IMO)
Where will sensitivity and IT position determinations be recorded?
JPAS
Interference detected by a receiver is often caused by the application and removal of power in nearby transmitters. This interference can be prevented by using what type of circuit in such transmitters?
Key-flick filter
What is a drawback to the specialization of a special purpose computer?
Lack of versatility
Whar defines storage that retains the data even when no power is supplied to the computer?
Non-volatile
To improve performance and operation, you should provide feedback to all but which of the following people?
Technical Administrator
Who is responsible for maintaining the status board which displays equipment, nets and circuit information?
Technical Control Supervisor
Composing a message and selecting the proper classification and precedence is the responsibility of what individual?
The drafter
In CW demodulation, the first requirement of the circuit is the ability to detect ______
The presence or absence of the carrier
The process of recovery will be carried out more effectively and economically if handled by which of the following personnel?
The users and AIS staff
What is the purpose of a variable potentiometer mounted on the VOLTS/DIV control of an oscilloscope?
To provide definite step control of the input signal
Which of the following antenna arrays consists of quarter-wave, vertically polarized stubs?
Triatic
On an open-ended transmission line that is carrying an ac signal, what is the total number of moving voltage waves?
Two
To accurately reproduce a modulating signal in a pulse modulated system, what minimum number of samples must be taken per cycle?
Two
What number of signatures is/are required in the COMSEC watch to watch inventory sheet?
Two
When selecting a specific remedial measure, a total of how many criteria should be used?
Two
Which of the following areas cause the majority of all network related problems?
User actions
Commands built into the operating system that control actions, like diskcopy and rename are what type of commands?
Utility
Under what circumstances should the USER CALIBRATION label be affixed to a piece of test equipment?
When user calibration is required before, during and after use
What one assumption may be made regarding all military radio transmission?
They have been intercepted
Amplifier tubes are added to the output of a transmitter for which of the following reasons?
To increase power
What is the purpose of a shunt in a DC ammeter?
To increase the current range of the meter
What does it mean when the computer displays a prompt on the screen?
You can tell the computer what to do next?
An oscilloscope measures voltage and displays waveforms. It can be used to measure currents, temperatures, speeds and accelerations if they are first converted to ______
Voltages
To test electrical activity, you will need which of the following pieces of test equipment?
Voltmeter
One of your customers has bought a new wireless access point. Which of the following options should you configure to make the network most secure?
WPA2
Which of the following is one of the more widespread uses of the computer in the Navy?
Word processing
When a carrier is phase-shift keying modulated, (a) a date bit ONE will normally cause the carrier to shift its phase what total number of degrees, and (b) data bit ZERO will cause the carrier to shift its phase what total number of degrees?
(a) 180 (b) 0
In phase modulation, (a) the AMPLITUDE of the modulating signal determines what characteristic of the phase shift, and (b) the FREQUENCY of the modulating signal determines what characteristic of the phase shift?
(a) Amount (b) Rate
In an FM signal, (a) the RATE of shift is proportional to what characteristic of the modulating signal, and (b) the AMOUNT of shift is proportional to what characteristic?
(a) Frequency (b) amplitude
In the collector injection modulator, AF and RF are heterodyned by injecting the RF into (a) what circuit and the AF into (b) what circuit?
(a) base (b) collector
How much voltage is discharged from the EP drum in a laser printer by the laser beam that scans the drum with the information about the image?
-100 volt
If classified material material must be jettisoned during emergency destruction, what should be the minimum depth of water?
1,000 fathoms
Your voltmeter has four ranges: 1V, 10V, 100V, and 1,000V. To measure an unknown voltage in an amplifier you should first select which range?
1,000V
In a dual trace oscilloscope, the gate that controls both sweeps is controlled by a multivibrator that operates at which of the following maximum frequencies?
1,200 kHz
What is the minimum percentage to be used in calculating the available resources for the network?
10
A Cat 3 (10BASE-T) transmission media can support up to what speed of transfer?
10 Mbps
An operation commander may authorize a delay of no more than how many days in the administration of examinations for sea going or aviation units operating in company or based outside continental US, provided candidates have no means of communication with personnel who take the examination in the interim?
10 days
Approximately how many days prior to the advancement examination should the ESO review the worksheet for each candidate?
10 days
The scope of an SSBI covers the most recent _____ years of the subjects life or from the 18th birthday, which ever is the shorter period.
10 years
A floppy disk will accept what relative humidity range?
10% to 80%
What is the minimum input voltage, in millivolts, required for a ratio detector?
100
A Cat 5 transmission media can support up to what speed of transfer?
100 Mbps
What is the maximum length of a UTP cable segment ina 10Base-T star network?
100 meters
The flashing rate of the strobotron tube affects its life expectancy. What i the range (in hours) of life expectancy of the strobotron tube?
100 to 250
A Cat 6 transmission media can support up to what speed of transfer?
1000 Mbps
Of the following available RF wattmeter power ranges, which one should you select when measuring an unknown power?
1000 watts
Which US Navy Regulations article addresses abuse of authority and forbids persons in authority from injuring their subordinates by tyrannical or capricious conduct or by abusive language?
1023
An 802.11b wireless Ethernet transmission can support up to what speed of transfer?
11 Mbps
Which USN Regulation article states "Persons in the DON, without proper authority, shall not have in their possession, obtain, sell, publish, give, purchase, receive or reproduce any examination paper, or any copy there of, or answer sheet thereto, for any examination whatsoever which has been, is or is to be, administered with in the DON"?
1145
Presidential support duties personnel must have been the subject of a favorably adjudicated SSBI completed within how many months preceding selection?
12 months
How many devices can be attached to a single Universal Serial Bus (USB) host?
127
Which of the following IP addresses is used as a loopback address?
127.0.0.1
What is the total bandwidth of an ISDN BRI connection when both data channels are used?
128 Kbps
What is the minimum temperature required to activate an automatic sprinkler system?
135ºF
You are helping a nontechnical user over the telephone and you need to have the user plug in the SVGA monitor. How would you describe the connector and number of pins in the SVGA connector?
15-pin, 3-row, D-shell
When was the first mechanical adding machine invented?
1642
Which of the following is a valid APIPA address?
169.254.0.1 with a subnet mask of 255.255.0.0
The Policy Coordinating Committee is composed of how many interagency committees established by the National Security Presidential Directive to coordinate interagency national security policy issues?
17
One earth terminal antenna uses a cluster of four 10 foot parabolic antennas. This array is effectively a total of how many feet in diameter?
18
What year did electronics enter the computer scene?
1919
Which of the following is a class C address?
193.10.160.45
Mnemonic instruction codes and symbolic addresses were developed early in what decade?
1950s
When you are testing a transistor with a transistor tester, for the reading to have ±15 percent accuracy, the resistance from emitter to base must be what minimum value?
300 Ohms
Which frequencies are common to both the Aeronautical Mobile (Route) Service (Aem(R)) and the Aeronautical Mobile (Off-Route) (Aem(OR)) Service and are available to all mobile units at the scene of a search and rescue operation, and by fixed stations for communicating with aircraft proceeding to or from a search and rescue scene?
3023 kHz and 5680 kHz
When you are using the five-unit code in teletypewriter operation, what is the maximum number of combinations available that will print letters, figures, function signs and numerals?
32
You are using five 80 Gb hard disks in your file server to configure RAID-5. What will be the maximum capacity of the RAID be after the configuration is complete?
320 Gb
Tests show that electromagnetic or acoustic emanations from AIS hardware may be intercepted up to a maximum of how many yards away?
325
How many layers are in the TCP/IP model?
4
The axes of the CRT display on the Tracker 2000 are divided into what number of quadrants?
4
You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall?
443
The UPS battery supply can support a facility load for a maximum of how many minutes?
45
The process of heterodyning tales place in which of the following receiver circuits? If the following frequencies, which one is a typical value of IF for Am communications receivers?
455 kilohertz
To establish a termination with NCTAMS or NAVCOMTELSTA, a ship must send a request what minimum time in advance?
48 hour
How many award points is the Navy Cross worth on the Navy wide advancement?
5
When making base to emitter bias voltage checks on a transistor, you should read which of the following voltage ranges?
5 to 20 microvolts
The designated security manager of a command must have favorably adjudicated SSBI or SSBI-PR completed within the past?
5 years
What frequency does the 802.11a standard use to conduct wireless network connectivity?
5.2 GHz
What is the recommended maximum length of an RS-232 cable?
50 feet (15 meters)
In spanning-tree, how long does it take a port to go from the blocking state to the forwarding state?
50 seconds
In actual practice, the characteristic impedance of a transmission line is usually within which of the following resistance ranges?
50 to 600 Ohms
With average program mixes, cache memory can yield what percent increase in processing speed?
50%
A one hop transmission of a tropo-scatter system can travel what maximum distance?
500 miles
Meggers with which of the following maximum voltage ratings are commonly found in the fleet?
500 volts
Typically, floppy disks will operate only in what temperature range?
50º to 100ºF
An 802.11a wireless Ethernet transmission can support up to what speed of transfer?
54 Mbps
An 802.11g wireless Ethernet transmission can support up to what speed of transfer?
54 Mbps
Which of the following frequency bands is used by 802.11a?
5GHz
The lengths of magnetic tapes used with computers have what range?
600 to 3,000 feet
What is the speed range of a magnetic drum?
600 to 6,000 rpm
In OSPF, what is the cost of a T1?
64
Hom many layers are in the OSI model?
7
After successful administration of the advancement examination, how long does the command have to forward the exams for grading?
7 days
The time interval between words when using the Morse code is equal to which of the following durations?
7 dots
A floppy disk surface has what maximum number of tracks?
77
When making ground signals you shoudl make them not less than how long in length?
8 feet
What are the most common tape densities in bits/bytes per inch?
800 to 1,600 bpi
Which of the following wireless IEEE standards uses a radio frequency of 2.4 GHz with a data transfer speed of 11 Mbps?
802.11b
What type of wireless communication is typically carried out directly between portable PC's?
802.11x
Which of the following is used to identify traffic from different VLANs?
802.1q
Which of the following can be used to check the operation of a network adapter card?
A TCP/IP Loopback test
The vulnerability of a ship or aircraft can be determined by which of the following means?
A TEMPEST vulnerability assessment
A laser printer is printing faded text in your documents. The toner cartridge has just been replaced and is not the problem. What is most likely the problem?
A bad transfer corona wire
Each of the individual electronic circuits on a silicon chip is called what?
A bit cell
Which of the following items should be used to clean dust out of the interior of a desktop PC?
A can of compressed air
In computer terminology, what is called a file?
A collection of records
Which of the following power sources is/are considered a practical choice for satellites?
A combination of solar cells and storage batteries
To change an RF signal to do pulses for teletypewriter conversion, you must use a receiver and what other piece of equipment?
A converter
When many magnetic cores are strung together on a screen of wire, what type of plane is formed?
A core plane
The most common means of obtaining a low-radiation angle from a vertical quarter-wave antenna is by what procedure?
Adding a ground plane
_____ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address.
Address Resolution Protocol
The _____ account is a predefined user account that has the most extensive privileges for resources both on the computer and on the domain that it controls.
Administrator
What user group must you be a member of to install a non-hot-swappable device in a Windows XP system?
Administrators
What is defined as a removal from employment, suspension from employment of more than 14 days, reduction in grade, reduction in pay or furlough of 30 days or less?
Adverse Action
Portable radio sets are used primarily for which of the following types of communications?
Amphibious
A tone modulated radio teletypewriter system uses what modulation method to change DC mark and space impulses into audio electrical impulses?
Amplitude
A wave's _____ is a measure of its strength at any given point in time.
Amplitude
The direction in which the D'Arsonval meter pointer deflects depends on what characteristic of the current applied to the coil?
Amplitude
Vectors are used to show which of the following characteristics of a sine wave?
Amplitude
The method of RF communication that uses either the presence or absence of a carrier in a prearranged code is what type of modulation?
Amplitude modulation
In logic probes, which of the following devices is used as an indicator?
An LED
Transmitted RF energy takes what form as it is sent into space?
An electromagnetic field
The flashing rate of the strobotac is controlled by which of the following circuits?
An electronic pulse generator
Which of the following does an 802.11a Access Point use for secure (closed) authentication?
An encryption key
Which of the following meters is recommended for circuit continuity tests?
An ohmmeter
What is a rogue AP?
An unauthorized AP that is installed to facilitate the capture of information
Mechanical computers are what type of devices?
Analog
Of the following equipment which one changes teletypewriter DC pulses to mark and space modulation for the transmitter carrier wave?
A keyer
Which of the following signal generators should you select to test audio equipment?
AF signal generator
To automatically compensate for input signal strength variations within a receiver, which of the following types of circuits are added?
AGC
Which of the following expansion ports is always used for a high speed, high resolution, 3-D graphics video adapter?
AGP
To calculate a host's network ID given its IP address and subnet mask, you follow a logical process of combining bits known as _____
ANDing
Through the cooperation of several manufacturers, what a-bit code was developed for transmitting and processing data?
ASCII
When a software problem is researched, which of the following items is the most important?
Abort code
Laser transmissions during adverse weather conditions experience which of the following problems?
Absorption
What is defined as the ability and opportunity to obtain knowledge of classified information?
Access
Which type of conflict management style attempts to resolve the conflict by giving in to the other party?
Accommodating
What is the process of tracing information system activites to a responsible source known as?
Accountability
What is the formal declaration by a DAA that an information systems is approved to operate in a particular security mode at an acceptable level of risk?
Accreditation
What is the formal declaration by the DAA that an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk?
Accreditation
Trying a number of possible character combinations to find the key that will decrypt encrypted data is known as a _____
Brute Force Attack
Using a very thin crystal made of semiconductor material, what type of memory can be created?
Bubble
Errors caused by faulty logic and coding mistakes are referred to as what?
Bugs
What is the most efficient means of destroying classified material?
Burning
A computer's _____ is the circuit, or signaling pathway, used by the motherboard to transmit date to the computer's components, including its memory, processor, hard disk, and NIC
Bus
What network topology connects each computer on a network to the next computer in a linear fashion?
Bus
Which of the following network topologies does not allow you to add or remove computers without affecting the network?
Bus
A WAN in which each site is directly connected to no more than two other sites in a serial fashion is known as a _____
Bus Topology WAN
A final RF power amplifier biased for plate modulation operates in what class of operation?
C
The LCD display on a portable computer is powered by?
low-voltage DC
Which command shows you the current IOS that is in use on a router?
show version
When you use a vector to indicating force in a diagram, what do (a) length and (b) arrowhead position indicate?
(a) magnitude (b) direction
Which US Navy Regulation articles states "All persons in the Naval service are required to obey readily and strictly, and to execute promptly the lawful orders of their superiors"?
1132
A device used to radiate or receive electromagnetic wave energy is referred to as a/an _______
Antenna
Which of the following colors should be used to make pen and ink corrections to NWPL publications?
Any dark color except red
Which layer represents the services that directly support users?
Application
Who must be a US citizen, and either officers, enlisted persons E-6 or above, or civilians GS-6, or above and designate in writing?
Assistance Security Manager
_____ is an ITU networking standard describing Data Link layer protocols for both network access and signal multiplexing.
Asynchronous Transfer Mode
A laser operates in which of the following areas of the light spectrum?
At or near visible light
What is the preferred frequency at which the inspection team should convene to review progress and compare notes?
At the end of each day's activity
To prevent a transmitter from being loaded unnecessarily, where should you connect the antenna?
At the power-amplifier input
Which of the following terms is used to describe the decrease in signal strength measured in decibels per 100 feet?
Attenuation
"...the power to command, enforce laws, exact obedience, determine or judge." is the SORN definition of what?
Authority
Who has the final authority to withhold a privilege?
Authority empowered to grant that privilege
Which Windows 2000/XP service automatically delivers security updates, critical updates, and service packs to help protect computers against viruses and other security threats?
Automatic Updates
As an I/O control clerk, you can be expected to operate a variety of equipment, such as copying machines, and terminals. These are known as what type of equipment?
Auxiliary
When a program is so large and complex that it exceeds the memory capacity of a stored program computer, where is the overflow stored?
Auxiliary memory
What supports timely, reliable access to data and information systems for authorized users, and precludes denial of service or access?
Availability
Which type of conflict management style attempts to ignore conflict rather than resolve it?
Avoiding
In the computer world, what method provides a means to ensure that any data lost can be recovered?
Backup files
Spectrum analysis is used to view which of the following characteristics of an RF signal?
Bandwidth
in time division multiplexing, what drawback is encountered if an excessive number of frequency channels is used?
Bandwidth is increased
What type of connector is used to link two segments of cable in a straight run?
Barrel
A(n)_____ consists of the objects, classes and properties a networktypically needs.
Base Schema
The control grid modulator is similar to which of the following modulator circuits?
Base-injection
Filters applied early in the transmission are known by which of the following terms?
Baseband
The communications channel that uses the basic frequency band of radio waves and a coaxial cable is what type?
Baseband
The power required to operate a basic ohmmeter comes from which of the following sources?
Batteries
When you are referring to the unit of teletypewriter signaling speed, the reciprocal of the time (in seconds) of the shortest signal element is described by which of the following terms?
Baud rate
The FOCUS control on the front of an oscilloscope is used to adjust what characteristic on the CRT display?
Beam size
To notify a system administrator when there is a problem with the machine the POST uses what?
Beep Codes
When is a packet processed by an inbound access list?
Before it is sent to an outbound interface
To send commands to devices not under direct command of the control section, what type of instructions are used?
Control
What part of the computer dictates how and when each specific operation is to be performed?
Control section
Skin effect is classified as which of the following types of loss?
Copper
What is the most common method of creating a back up for a microcomputer?
Copying the disk onto a magnetic tape
In AIS security terminology, the controls to lessen or eliminate known threats and vulnerabilities are called _______
Countermeasures
In a manual telegraph circuit, the only two connections are marking and spacing. Marking is characterized by which of the following descriptions?
Current is flowing
An individual who is responsible for safeguarding and accounting for classified material is known by what term?
Custodian
Which of the following files are used in NWPL maintenance?
Custody and administrative files
When checking the power supply unit with a digital multimeter, it should be set to?
DC Voltage
______ rearranges noncontiguous files into a more efficient, contiguous arrangement on the disk.
DEFRAG
What command-line utility can be used to rearrange the data on an HDD so that it is located in contiguous, efficient links?
DEFRAG.EXE
IRQ values for a device may be set through software or manually by which of the following ways?
DIP switches
DON IT systems are registered where?
DON IT Registration Database
Who is the only entity that can authorize temporary access for SCI?
DONCAF
In the character at a time impact printer class, which printer has the most professional looking, pleasing to the eye print?
Daisy-wheel
What is the best type of cleaning tool for use on the exterior of computer components?
Damp Cloth
What type of software allows you to enter data and then retrieve it in a variety of ways?
Data Management
Which of the following terms describes the prevention of files from being updated by more than one user at a time?
Data integrity
Which layer provides error free transmission of information over the physical medium?
Data link
To copy data from one storage location to another and to rearrange and change data elements in some prescribed manner, what type of instructions are used?
Data movement
Describe the Presentation Layer's function
Data representation, encryption and decryption, convert machine dependent data to machine independent data
Who is responsible for deciding appeals of unfavorable personnel security determinations (including SCI access) made by the DON CAF?
Department of the Navy Personnel Security Appeals Board
In minimizing an AIS building's exposure to fire damage, which of the following factors should be considered?
Design and location
If you require a microphone that is lightweight, has a high sensitivity, is rugged requires no external voltage, can withstand temperature, vibration, and moisture extremes, and has a uniform frequency response of 40 to 15,000 hertz, which of the following types of microphones should you select?
Dynamic
What type of authority grows out of the respect a leader commands. It stems from leadership qualities that make others obey, even if no law requires them to do so?
Earned
You have been working on a piece of equipment and your eyes have been exposed to high intensity microwaves. Which of the following types of eye problems may occur?
Cataracts
What is the comprehensive evaluation of the technical and non-technical security features of an information system, and other safeguards to establish the extent that a particular design and implementation meets a set of specified security requirements?
Certification
All IT systems that are under Department of the Navy authority are required to be what?
Certified and Accredited
A(n) _____ is a process or program that provides support personnel with a centralized means of documenting changes to the network/
Change Management System
In teletypewriter operation, what term defines the length of time required to transmit one letter, figure, function sign or numeral?
Character Interval
For a given voltage, what determines the amount of current that will flow in a transmission line?
Characteristic impedance
Which of the following measures is used to represent the printing speed of a dot-matrix printer?
Characters per second
_____ is a fault-tolerance technique that links multiple servers together to act as a single server.
Clustering
Numeric, alphabetic, and special characters are represented in a computer's internal storage and on magnetic media through the use of what kind of system?
Coding
What enables operations and intelligence collection to gather data from target or adversary automated information systems or networks?
Computer Network Exploitation (CNE)
To assure that someone will be alerted to a fire, which of the following alarm locations is recommended as the primary location?
Computer room
Fourth generation technology has which of the following results for the computer industry?
Computers that are significantly smaller and lower in cost
SSB transmissions have which of the following characteristics when compared to an AM transmission?
Concentrated power
Which of the following devices serves as a termination point for a cable running from individual nodes in a network?
Concentrator
The tiny doughnut shaped rings used to make up magnetic core storage are mode of what material?
Ferrite
The ratio of energy radiated by an array in the principal direction of radiation to the energy radiated in the opposite direction describes which of the following relationships?
Front-to-back ratio
Which of the following categories of test equipment is/are designed to test, without modification, a range of electronic parameters needed for two or more systems that are different in design?
GPETE
Two or more circuits within a receiver are varied by a single control through the use of which of the following processes?
Ganged tuning
A(n) _____ facilitates communication between different networks or subnets.
Gateway
What type of authority stems from the requirement to maintain good order and discipline with all matters that affect the efficiency of the command?
General
The phosphor bronze ribbon in the galvanometer serves the same purpose as what component in the D'Arsonval meter?
Hairspring
Of the following terms, which one describes the period of time required for one earth terminal to yield control of a satellite to another?
Handover
Whenever data is transferred between devices, it also involves an exchange of prearranged signals known as what?
Handshaking
What is th eprimary high-capacity storage media for the system?
Hard Disk
Component failures are categorized into which of the following types of faults?
Hard and soft
The _____ lists all computer components proven to be compatible with Windows Server 2003.
Hardware Compatibility List HCL
Which of the following protocols is responsible for addressing hosts in a TCP/IP-based network?
IP
You are receiving an IP address of 169.254.0.0. What utility can you use to find this address?
IPCONFIG
What part of the program must the programmer prepare according to the format required by the language and the computer to be used?
Instructions
Which of the following steps should you take to help ensure that metal case test equipments are safe to use?
Insulate the metal case from the ground
When working on energized equipment, you should follow which of the following practices?
Insulate yourself from the ground
Which of the following terms describes a network of computers and other devices that is confined to a relatively small space, such as one building or even on office?
LAN
Inserting an inductor or capacitor in series with an antenna is one method of electrical length of an antenna. What is this method called?
Loading
THe process by which instructions and data are read into a computer is called what?
Loading
A network consists of various machines linked together within a building or adjacent buildings is what type?
Local Area
What type of network is formed from computers and components in a single office or building?
Local Area Network (LAN)
What does the command line CDKDSK/R statement do?
Locates bad sectors on the disk and recovers readable information
A _____ is the original PC file system that was designed in the 1970's to support floppy disks and later hard disks.
FAT
Which type of file system was the standard file system supported by DOS and Windows 9x/Me?
FAT (File Allocation Table)
Which type of file system was the optional file system supported by Windows 95 OSR2 (OEM Service Release 2) and later?
FAT32 (File Allocation Table, 32-bit)
Which of the following networks is configured in dual rings to provide fault tolerance?
FDDI
_____ is a network technology whose standards were originally specified by ANSI in the mid-1980's and later refined by ISO.
FDDI
FSK has which of the following advantages over CW?
FSK rejects unwanted weak signals
What does POST stand for?
Power On Self Test
Average power in a pulse modulation system is defined as the?
Power during each pulse averaged over one operating cycle
PC tests are stored in ROM are known by which of the following terms?
Power on self tests
When troubleshooting transistorized circuits, you should first check the condition of which of the following circuits?
Power supplies
What field travels through space after being detached from the current-carrying rod of an antenna?
Radiation
What transmission-line loss is caused by magnetic lines of force not returning to the conductor?
Radiation
Who is responsible for preparing and maintaining the communications watch, quarter and station bill?
Radio Officer
What are two types of electrical communications?
Radio and wire
You want to transmit high speed automatic page or tape copy across an ocean area. Which of the following methods should you choose?
Radio-teletypewriter
CW transmissions have narrow bandwidths and a high degree of intelligibility under severe noise conditions. What is the primary Navy use for CW?
Radiotelegraphy
A transmitted electromagnetic wave enters an antenna, induces a voltage into it, and passes that voltage to a receiver. What is this chain of events called?
Reception
The antenna property that allows the same antenna to both transmit and receive energy is _____
Reciprocity
You can make all but which of the following changes to the operating system?
Reconfigure disk drives
What are the primary colors of light?
Red, Blue, Green
When compared to a conventional AM signal, an SSB signal provides which of the following advantages?
Reduced bandwidth
The term _____ refers to an implementation in which more the one component is installed and ready to use for storing, processing or transporting data.
Redundancy
Login procedures that are accomplished by dialing into an access server are known by which of the following terms?
Remote access
At boot, a computer system makes a loud noise, and smoke is seen coming from the unit. What is the first thing you should do?
Remove power from the computer
What network topology connects each computer on a network to the others in a loop or ring?
Ring
To express the cost of a loss or abuse from an adverse event over time, what AIS security term is used?
Risk
In oscilloscopes using electrostatic CRTs, what type of signal is used to produce horizontal beam movement?
Sawtooth wave
Which of the following facsimile transceiver operations consists of subdividing the picture in an orderly manner and into a large number of segments?
Scanning
What is the primary advantage of a rigid coaxial line?
Low radiation losses
What system is used to provide for a standardized recall and scheduling of test equipment into calibration facilities?
MEASURE
Which MILSPERMAN article does the Selective Conversion and Re-enlistment (SCORE) Program fall under?
MILSPERMAN 1160-090
Which MILSPERMAN article does the Selective Training and Re-enlistment (STAR) Program fall under?
MILSPERMAN 1160-100
Which MILSPERMAN article does the Accelerated Advancement Program fall under?
MILSPERMAN 1430-010
What is software transferred from remote systems (normally outside the enclave boundary), then downloaded and executed on a local system without explicit installation or execution by recipient?
Malicious mobile code
Which of the following terms is used for the vehicle through which a wave travels from point to point?
Medium
Satellite down-link frequency variations occur most often from satellites in which of the following orbits?
Medium altitude circular
The first thing that the initialization program checks is which of the following areas?
Memory
The _____ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchanging, or buffering, data.
Memory Range
The function of the ZERO OHM control on a multimeter is to compensate for which of the following conditions?
Meter battery aging
What should you use to clean an LCD display on a notebook PC?
Mild soap and water on a soft cloth
When making resistance measurements on a transistor with an ohmmeter, you should allow what maximum current in the transistor?
Milliampere
Internal processing speeds of second generation computers were measured at what speed?
Millionths of a second
Third generation computers are characterized by what technology?
Miniaturized circuits
The IF frequency in a receiver is produced by which of the following methods?
MixerHeterodyning
_____ is a software based tool that continually monitors network traffic from a server or workstation attached to the network.
Network Monitor
When a network malfunction is detected, the alarm is sent to which of the following persons?
Network Supervisor
The _____ is a simple Application layer protocol used to synchornize the clocks of computers on a network.
Network Time Protocol (NTP)
The teletypewriter condition where current flow represents a mark and no current flow represents a space occurs in which of the following types of operation?
Neutral
Which of the following is a characteristic of a PCM system that makes it advantageous for use in multiple-relay link systems?
Noise is not cumulative at relay stations
What provides assurance to the sender of data with proof of delivery and to the recipient of the sender's identity, so that neither can later deny having processed the data?
Non-repudiation
The sensitivity level that has the potential for no impact and/or damage as duties have limited relation to the agency mission is known as?
Non-sensitive (NS)
The sensitivity level that has the potential for some to serious impact and/or damage is known as?
Noncritical Sensitive (NCS)
A(n) _____ issues and receives wireless signals with equal strength and clarity in all directions.
Omni-directional Antenna
An isotropic radiator radiates energy in which of the following patterns?
Omnidirectional
Which phase of security education when security procedures for the assigned position are learned?
On the job training
The physical layer is which layer number of the OSI reference model?
One
When you are using a transmitter transfer switchboard, what is the maximum number of transmitters that may be connected to a single remote control station?
One
The physical layout of you office should be arranged so that paperwork will flow in what direction(s)?
One direction
What is the basic configuration of the typical dual trace oscilloscope?
One gun assembly with two vertical channels
COs/OICs may waive up to how many years of the required TIR for Sailors in paygrades E-5 to E-6 who received a promotion recommendation of Early Promote on their most recent observed periodic evaluation in that paygrade?
One year
PSIs will not normally be requested for any civilian or military personnel who will be retired, resigned or separated with less than?
One year service remaining
Which of the following authentication methods are defined by the 802.11 wireless standard?
Open and shared key
A continuity test is performed on a piece of electronic equipment to discover what kind of fault?
Open circuits
The time base of an oscilloscope is variable to enable the instrument to ________
Operate over a wide range of input frequencies
What must you load into a computer to manage its resources and operations?
Operating system
What is a central set of programs called that manages execution of other programs and performs common functions like read, write and print?
Operation System
How do fleet commanders assign communications responsibilities to their respective fleets?
Operations Orders (OPORDs)
What type of storage is similar to magnetic disk storage in basic operation, but it reads and records using light (optically) instead of magnetism?
Optical
Operators of transmitters and receivers use a circuit to coordinate the service of message and to make frequency changes. What is the name of this circuit?
Order-wire circuit
What type of authority derives from billets assigned to officers and petty officers within the organization?
Organizational
The D'Arsonval meter movement is damped to prevent which of the following conditions?
Oscillating readings
_____ is a term used by network professionals to describe the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network.
Overhead
When you are disconnecting a transistor from the transistor tester, in what position should the POLARITY switch be placed?
PNP
Representing two numeric characters in one byte (eight bits) is referred to as what?
Packing
The magnetic tape unit reads and writes data in channels or tracks along the length of the tape. How are these tracks referenced to each other?
Parallel
The test bit for bit count is called the what?
Parity check
A customer has brought a laser printer into your repair area because it produces a paper feed error when the customer tries to print a document. Where is the first place to check given this symptom?
Pick-up rollers
The voltage produced by mechanical stress placed on certain crystals is a result of which of the following effects?
Piezoelectric
Which of the following troubleshooting utilities is common to all operation systems and is used for testing connectivity of two hosts on a network?
Ping
If you know the hostname of a PC on a network, what would you type to find its IP address?
Ping hostname
Which of the following terms is used to describe the process used by an application to test a remote device?
Pinging
In UNIX, two or more commands connected by a pipe are called a(n) _____
Pipeline
What are the three basic characteristics of sound?
Pitch, intensity, and quality
DON organization shall develop what to delineate the tasks and schedule necessary to successfully achieve system certification and accreditation?
Plan of Action and Milestones (POA&Ms)
A satellite orbiting with an angel of inclination of approximately 90 degrees describes which of the following types of orbit?
Polar
What type of technology would you use to prevent unauthorized hosts from accessing the LAN?
Port security
The part of the sine wave that is above the voltage reference line is referred to as the ______
Positive Alternation
What type of circuit is used to remove the AM component in the output of a semiconductor reactance modulator?
A limiter
Energy is transmitted from a transmitter into space using which of the following devices?
A transmitting antenna
Which computer is used with the SNAP II system?
AN/UYK-62 (V)
What is the total number of frequency bands the military is currently using for communications?
9
Under AIS security, countermeasures (controls) that are embedded in hardware, software and telecommunications equipment are what type of controls?
Technical
To ensure that all safety requirements of the AIS facility are satisfied, the AIS technical manager and the operations division officer should review the protective plans with what frequency?
Semiannually
Which of the following instruments is used to check transistors for collector leakage current and current gain?
Semiconductor test set
The control circuitry for a static transfer switch performs which of the following functions?
Senses an overcurrent condition
Which of the following test instruments produce a standard of measurement of AC energy for testing electronics equipment?
Signal Generator
A circuit and it's components can be etched onto which of the following materials?
Silicon
Raw data is typically written on some type of paper document referred to as what type of document?
Source document
Radio energy is transmitted through which of the following mediums?
Space
What type of diversity uses physically separated transmit or receive antennas to improve communications?
Space
The sensitivity level that has the potential for inestimable impact and/or damage is known as?
Special Sensitive (SS)
In a stowage space aboard ship, what device should be used to hold the test equipment in place?
Stretch seat-belt-type straps
RAID 0 is also known as?
Striped disk array
What device would you use to create more collision domains on your network?
Switch
_____ enables multiple nodes to simultaneously transmit and receive data over different logical network segments.
Switched Ethernet
_____ are connectivity devices that subdivide a network into smaller logical pieces.
Switches
The transmission method that uses a single set of start and stop message characters per block of data is which of the following types?
Synchronous
When the period of an orbit is identical to that of the earth, the orbit is _______
Synchronous
Which, if any, of the following modes of teletypewriter operation is more often used in high-speed data systems?
Synchronous
What two types of flowcharts are there?
System and programming
Scheduled maintenance in support of QMCS is designed to alert you to which fo the following problems?
System degradation
The frequency of the sine wave is determined by which of the following sine-wave factors?
The rate at which the vector rotates
A satellite communications system is limited by which of the following characteristics?
The technical design of the satellite
Which of the following has the necessary privileges to assign permissions to a shared resource when the discretionary access control method is used?
The owner of the resource
What is a consequence of incorrectly setting the paper tray switches in a laser printer?
The paper will not feed
The advancement exam for PO1 is administered on the first ______ of March and on the first _______ of September
Tuesday/Thursday
When measuring 300 volts or more, you should first take what step?
Turn off equipment power
Horizontal half-wave antennas mounted at right angles to each other in the same horizontal plane make up which of the following antennas?
Turnstile
To achieve 100 percent modulation in a plate modulator, what maximum voltage must the modulator tube be capable of providing to the final power amplifier (fpa)?
Twice the fpa plate voltage
For network purposes, 22 and 24 gauge wire are the most common types of which of the following types of cables?q
Twisted pair
Which of the following cable types is the least expensive?
Twisted pair
Which of the following cables is identified by a designation number of RG-11?
Twisted pair
Firewalls can be divided into how many different categories?
Two
How many types of line conditioning are available?
Two
The galvanometer-type meter movement differs from the electrodynamometer meter movement in that the electrodynamometer type uses which of the following components to produce the magnetic field?
Two sets of coils
_____ is a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NICS.
USB
What type of cable would you plug into a T1 interface with a built-in CSU/DSU?
UTP
Who is the senior DoD official charged by the Secretary of Defense with responsibility for development of policies and procedures governing information and personnel security policy programs?
Under Secretary of Defense for Intelligence (USD(I))
The Windows Recovery Console does all of the following except?
Uninstall Programs
When using the reference designator 1A6A4J6, what level does the number 1 refer to?
Unit
What is the maximum hop count for OSPF?
Unlimited
Transmission of information to a satellite is done on what frequency?
Up-Link
A(n) _____ is the creation of a communications channel for a transmission from an earth-based transmitter to an orbiting satellite.
Uplink
When you cannot work around a problem to continue operating, what priority should you assign to the trouble report?
Urgent
In AIS security terminology, what term is used for the things that can destroy AIS assets?
Threats
A total of how many different types of contingency plans make up a COOP security plan?
Three
Communication line problems fall into how many different categories?
Three
How many members serve on the panel for the Personnel Security Appeals Board (PSAB)?
Three
How many methods are used to provide service restoration after system degradation?
Three
How many primary culprits are there to network malfunctions?
Three
The network layer is which layer number of the OSI reference model?
Three
How many levels of sensitivity are there?
Three and non-sensitive
All other stations which hear the Urgency signal are to continue to listen for at least how long?
Three minutes
What is the purpose of this instruction?
To establish Information Assurance (IA) policy for the DON consistent with National and DoD policies.
Transmitter machine keying was developed for which of the following purposes?
To increase the speed of communication
A megger is widely used for which of the following purposes?
To measure insulation resistance
What is the purpose of the antistatic wrist strap?
To protect the equipment from electrostatic discharge
It is important to set a voltmeter on its highest range scale before taking a measurement for which of the following reasons?
To protect the meter from damage
The relationship between two domains in which one allows the other to authenticate it's users is known as a(n) _____
Trust Relationship
The primary corona wire (conditioning roller) in a laser printer_______
Applies a uniform negative charge to the drum
Manual volume control of a receiver internally varies the input to which of the circuits?
Audio amplifier
Which of the following ca be used to control the boot process in a Window XP system?
BOOTCFG.EXE
____ is the provess of assigning one network component to work with another.
Binding
What type of message is destined for two or more addressees, none of whom is informed of any other addressee?
Book
What is another term for "initial program load" the system?
Boot
An auxiliary (wired) memory is used in some computers to permanently store a small program that makes manual loading unnecessary. What is the program called?
Bootstrap
Which of the following factors need to be decided on before determining the type of connector to use?
Both architecture and cable
An ordinary flashlight is an example of what type of radiator?
Anisotropic
Detailed information for various ship departments is contained in what two enclosures?
Annexes and appendices
With what frequency should a scheduled inspection take place?
Annually
Which of the following protocol suites includes the Routing Table Maintenance Protocol (RTMP)?
AppleTalk
Who is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk?
Designated Approving Authority
What causes sunlight to separate into different wavelengths and display a rainbow of colors when passed through a prism?
Dispersion
Digital multimeters can be divided into three functional sections: (1) signal conditioning, (2) analog-to-digital, and what third section?
Display
IA requirements should be validated by whom?
Fleet Commanders-in-Chief or other Echelon II Commanders
What type of message has a wide, predetermined standard distribution?
General
An OPORD is made up of what three parts?
Heading, body and ending
What determines the length of time that a nonsynchronous satellite in a circular orbit will be in the zone of mutual visibility?
Height of the orbit
Which of the following numbering systems has a base of 16?
Hexadecimal
In sound terminology, which of the following terms is the same as a wave reflection?
Echo
On a computer, what is the sequence of characters called?
Collating sequence
What must be standardized and managed at a service level to provide interoperability with everyone?
Critical IA components
Which command prompt operation can be used to compare the contents of two disks?
DISKCOMP
Which, if any, of the following advantages is a primary benefit of plate modulation?
It operates with high efficiency
The term _____ topology refers to the way in which data is transmitted between nodes rather than the physical layout of the paths that data takes.
Logical
Which of the following advantages is a benefit of CW communications?
Long-range operation
Which of these methods can be used to test a 10/100 Mbps network port built on the motherboard without connecting it to the network?
Loopback adapter
On a standing wave, the points of a high current an voltage are identified by which of the following terms?
Loops
The safeguarding of information and information systems shall be accomplished through the employment of what?
Multi-disciplined defensive layers
_____ allows one device to send data to a specific group of devices.
Multicasting
The Yagi antenna is an example of what type of antenna array?
Multielement parasitic
The process of simultaneous transmission of several intelligible signals on the same frequency during the same period of time is called _______
Multiplexing
Who maintains investigative authority for criminal acts or espionage related to computer network security incidents?
NCIS
What intergrates the three primary functions of network management, information dissmination managment (IDM) and IA?
NETOPS
What is an organizational, procedural and technological construct for ensuring information superiority and enabling speed of command for the war-fighter?
NETOPS
Which of the following categories of electromagnetic interference includes interference generated by electrically charged raindrops?
Natural
As a reference, perigee and apogee are measured in which of the following units?
Nautical Miles
Who shall carry out an annual independent evaluation of DON Information Assurance programs?
Naval Inspector General
_____ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media.
Network Interface Cards (NIC)
Describe the Physical Layer's function
Media, signal and binary transmission
A transmit multicoupler provides which of the following functions?
Isolation between transmitters
What information system (IS) assessed occurrence having actual or potentially adverse effects on an IS?
Incident
Who is responsible for proper handling, accountability and stowage of Navy-wide examinations?
Individual commands
When processing is taking place, data is transferred back and forth between what two sections?
Internal storage and arithmetic logic
What is the unauthorized act of bypassing the security mechanism of a system?
Intrusion
The goal of an ______ is to detect and identify unauthorized use, misuse and abuse of computer systems by both internal network users and external attackers in "near real time".
Intrusion Detection System (IDS)
HF communications over long distance trunks, or links between fixed terminals are examples of which of the following types of systems?
Point-to-point
You are working with a teletypewriter patch panel. What color signifies that secure information is being passed?
Red
Which of the following terms implies a fluctuation in voltage levls caused by other devices on the network or electromagnetic interference?
Noise
In a voltmeter, the meter scale is calibrated in which of the following categories?
Voltage
The total charge on a transmission line is equal to the current multiplied by which of the following factors?
Voltage
In a CW transmitter, a buffer stage performs which of the following functions?
Voltage amplifier
Applying RF energy to the elements of an antenna results in what phase relationship between voltage and current?
Voltage lags current by 90 degrees
Operator controlled tuning of the antenna coupler group by the use of front panel controls is possible during which of the following modes of operation?
Silent and manual
Electric and magnetic fields on an antenna reach their maximum intensity at which of the following times?
When they are a quarter-cycle apart
The storage capacity of an address is designed and built into the computer by which of the following terms?
Word
Who is the first leadership position in the chain of command responsible for the growth, development and daily direction of subordinates?
Work Center Supervisor
Where are the user terminals for SNAP II placed on board ship?
Work centers
What category of AIS media is considered temporary in nature and is retained for 180 days or less?
Working
What precedence is limited to designated emergency action command and control messages within the AUTODIN system?
Yankee
If a candidate is taking his/her perspective advancement exam and notices that a page is missing out of the book for a total of 9 questions, there are no other candidates taking the same exam, and nobody to share with will the test still be valid?
Yes anything under 10 missing questions is still valid
How can you create an ERD for a Windows XP Professional computer?
You cannot do it
In the Navy, what organization authorizes frequency assignment applications?
The Naval Electromagnetic Spectrum Center (NAVEMSCEN)
The precedence of a message should be based on what factor?
The urgency of the message
Which of the following methods for preventing social engineering attacks?
User education
Who said "Strange as it sounds, great leaders gain authority by giving it away."?
VADM James Stockdale
The ratio of maximum voltage to minimum voltage on a transmission line is referred to as the
VSWR
First generation computers were characterized by what technology?
Vacuum tubes
In early electronic computers, what was the weak link in electrical computations?
Vacuum tubes
Network layer addresses are also called _____
Virtual Addresses
The electric field radiated from an antenna is produced by what electrical property?
Voltage
The development of ADA was initiated by what organization?
US DoD
Which of the following is considered to be the fastest port and is commonly used on laptops?
USB
Which of the following types of cable can handle a data flow of up to approximately one Mbps?
Twisted pair
Which of the following commands will display IP to MAC address mappings on a Windows PC?
arp -a
What command would you use to see if clocking is stopped on an interface?
show controllers
Which of the following commands shows you if a router is acting as the designated router for one of its interfaces?
show ip ospf interface
As the positive potential is increased on the cathode of a varactor, (a) what happens to reverse bias and (b) how is dielectric width affected?
(a) Increases (b) Decreases
With a sine-wave input, how will the output compare to the input in (a) a linear circuit and (b) a nonlinear circuit?
(a) Proportional (b) Not proportional
For the heterodyning action to occur in a circuit, (a) what number of frequencies must be present and (b) to what type of circuit must they be applied?
(a) Two (b) Nonlinear
What is the maximum range for low-power (Class-3) bluetooth devices?
1 Meter
In a demodulator circuit, which of the following components is required for demodulation to occur?
A nonlinear device
A _____ modulates outgoing signals and demodulates incoming signals.
DSL Modem
In addition to hardware and software, what are the other three areas of consideration for the Navy's AIS security program?
Data, human resources and communications
If the AIS technical manager plans to take measures to control compromising the emanations, those measures are subject to approval under the provisions of which of the following DoD directive?
C5200.19
Transfer of control instructions are classified as which of the following types?
Conditional and unconditional
What provides the measures taken by an organization to ensure the availability, integrity, authentication, confidentiality and non-repudiation of its information and information systems ?
Information Systems Security (INFOSEC)
What is the first thing to do with a new inkjet printer installation?
Print a test page from the printer
What type of modulation is/are normally detected by first converting it/them to another type of modulation?
PPM, PFM, and PCM
Which of the following protocols can be used to secure remote access connections when they are established through the Internet?
PPTP
A special device is needed to burn the program into what type of memory?
PROM
Which of the following ports cannot be used to connact a scanner?
PS/2
Which of the following ports is commonly used to connect a keyboard and a mouse?
PS/2
In a basic oscilloscope, what is the purpose of the deflection system?
To position the beam on the screen
In AIS environmental security, emergency lights are installed in computer facilities for what primary reason?
To protect personnel
A rhombic antenna is essentially a combination of which of the following antennas?
Two V antennas placed side by side
Call signs for assigned SAR craft will consist of which prefix followed by the normal SAR call sign?
"RESCUE"
The International Distress and Calling frequency for voice on what frequency is used by mobile stations, survival craft and emergency postition-indicating radiobeacons using frequencies in the authorized bands between 1605 and 4000 kHz when requesting assistance from the maritime services?
2182 kHz
In the absence of any response to this initial transmission the aircraft, ship or survival craft will preferably inititate a distress call on the Internationall Aeronautical Emergency Frequency 121.5 MHz or on the Distress and Emergency Frequency of what?
243.0 MHz
The voice alarm signal consists of two substantially sinusoidal audio frenquency tones transmitted alternatively. One tone has a frequency of 2200 Hz and the other 1300 Hz. The duration of each tone is how long?
250 milliseconds
What is the service between aeronautical stations (normally a land station but may be placed onboard a ship or an earth satellite) and aircraft stations or between aircraft stations in which survival craft stations may also participate?
Aeronautical Mobile Service
Which INFOCON level has increased intelligence watches and strengthened security measures of DoD information systems and networks?
Alpha
What provides the timely, reliable access to data and services for authorized users?
Availability
What consists of low level software that controls the system hardware and acts as an interface between the operating system and the hardware?
BIOS
What does BIOS stand for?
Basic Input/Output System
What are automated methods of authenticating or verifying an individual based upon a physical or behavioral characteristic?
Biometrics
Which INFOCON level has a further increase in CND force readiness above that required for normal readiness?
Bravo
What is the frame or the chassis that houses the motherboard, power supply, disk drives, adapter cards and any other physical components of the system?
Case
Which INFOCON level has a further increase in CND force readiness but less than maximum CND force readiness?
Charlie
What are operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computers and networks themselves?
Computer Network Attack
When a station in distress has delegated control of distress working to another station the person in charge of the station in distress should, when he considers silence no longer justified, immediately inform the what?
Controlling station
What are the measures that protect and defend information and information systems by ensuring availability integrity, authentication, confidentiality and non-repudiation?
Information Assurance
What is hardware, software or firmware capable of performing an unauthorized function on an information system?
Malicious Logic
What provides visibility of extent and intensity of the activity, traffic, load and throughput potential, as well as detction of significant degradation of service?
Network Management
What holds all the programs and data the processor is using at a given time?
RAM
What safety is that condition which necessitates the transmission of a message concerning the safety of navigation or providing important meteorological warnings?
Safety
What indicates that the station is about to transmit a message containing an important navigational or meteorological warning?
Safety signal
Which type of threats describes non state-sponsored computer network attack, espionage or data theft?
Second Generation
An aircraft seeing but not understanding ground signals by day will fly a complete right circle and by night will make red flashes with what?
Signal lamp
What enables the PC to generate complex sounds?
Sound Card
In cases of distress, urgency or safety transmissions by radiotelephony they shall be made slowly and distinctly, each word being clearly pronounced to facilitate what?
Transcription
How are records on a track separated?
By a gap in which no data is recorded
What operates whenever any PC is powered up?
POST
Magnetic tape stores data in what manner?
Sequential
DCS circuits are owned or leased by what organization?
The US government
Who installs the programs in read-only memory?
The manufacturer
The _____ is the main circuit that controls the computer
Motherboard
How many digits make up the Julian date?
Seven
Who is responsible for changes or corrections to NWPL publications?
The NWPL clerk
Which of the following printer types requires special paper?
Thermal
Electronic mail is classified as what type of software program?
Utility
DC power is stated in which of the following units?
Watts
An electromagnetic wavefront moves through free space at approximately what speed in meters per second?
300,000,000
The output power of the transmitter unit drives which of the following units?
The RF amplifier
Fire, flood and sabotage, in varying degrees, result in which of the following losses?
Physical destruction
Which instruction does the Command Achievement Program (CAP) fall under
BUPERSINST 1430.17E
For local area networks, what two designs are used?
Broadband and baseband
Which INFOCON level is described as the maximum CND force readiness?
Delta
For high-frequency operation, which of the following antenna polarization patterns is preferred?
Horizontally polarized
What is the simplest form of pulse modulation?
Pulse-amplitude modulation
How many award points is the Medal of Honor worth on the Navy wide advancement exam?
10
A CW transmitter must contain which of the following components?
A keyer
Describe the Data Link Layer's function
Physical addressing
In a voice distress signal the word MAYDAY is pronounced as which French expression?
"m'aider"
What voltages are present on the power supply's 4 pin auxiliary (disk drive) power connector?
+5/+12Vdc
How many PNA points are credited to an exam candidate who scored between the 76th and 50th percentile?
.5
A simple phase modulator consists of a capacitor in a series with a variable resistance. What total amount of the carrier shift will occur when X C is 10 times the resistance?
0 degrees
A multivibrator frequency modulator is limited to frequencies below what maximum frequency?
1 MHz
A nanosecond is defined as?
1 billionth of a second
In a different voltmeter, an adjustable reference voltage can be produced in increments as small as how many microvolts?
10
On a dipole antenna, the sinusoidal variation in charge magnitude lags the sinusoidal variation in current by what amount?
1/4 cycle
What is the length of each half of the wire for a dipole antenna?
1/4 wavelength
How many PNA points are credited to an exam candidate who scored between the 49th and 25th percentile?
1.0
How many PNA points are credited to an exam candidate who scored in the top 25th percentile but did not advance?
1.5
Search and rescue stations are divided into groups that have distinct rescue functions. Emergency lifeboat transmissions are designed for reception by a total of how many of these groups?
2
You are thinking about setting up a simple striped array on your email server at the office. What is the minimum number of drives required to implement a RAID 0 solution?
2
Records of destruction of classified material must be maintained for what minimum length of time?
2 years
Requirements for new telecommunications services should be defined and submitted what minimum time in advance?
2 years
How many times per cycle is a practical time division multiplex system optimally sampled?
2.4
As a manager, what percentage of your time wil you spend resolving conflicts?
20
What two well known TCP ports are associated with FTP functions?
20 and 21
On the spectrum analyzer, the RF input jack is used to accept what maximum frequency input signals?
21 GHz or below
What is the maximum hop count for EIGRP?
224
The world is divided into what total number of GMT time zones?
24
A break in service is when continuous service is disrupted for a period of time greater than how long?
24 months
Tactical communications is usually considered as line-of-sight. What maximum distance is normally within the line-of-sight range?
25 Miles
An 802.11n wireless Ethernet transmission can support up to what speed of transfer?
250 Mbps
How many award points is the Purple Heart worth on the Navy wide advancement exam?
3
In order to cover most of the earth except the polar regions, what is the minimum number of satellites that must be orbited?
3
What is the size range of the diameters of magnetic disks?
3 to 4 inches
Floppy disks come in several sizes with diameters of what size range?
3 to 8 inches
The drive motor of a disk drive unit rotates the disk at a constant speed, normally how many revolutions per minute?
3,200 rpm
What is the maximum allowable size of material shredded by a crosscut shredding machine?
3/64 inch wide by 1/2 inch long
DOHA will normally schedule the personal appearance to be accomplished within how many days of receipt of the individuals request?
30 days
What component in an antenna system transfers energy from the transmitter to the antenna?
A feeder
Which of the following is a biometric authentication device?
A fingerprint scanner
What type of circuit can be used to convert from PPM to PDM for demodulation?
A flip flop
Navy funds cannot be obligated for developing or procuring communications equipment that uses a portion of the frequency spectrum until what is obtained?
A frequency allocation
A megger uses high voltage to check the insulation leakage in the megohm range. What is the source of this voltage?
A hand-driven DC generator
In an AM transmitter, audio frequencies are converted into corresponding electrical energy by which of the following components?
A microphone
Which of the following operating systems is distributed as open source and does not have a standard GUI?
Linux
The demodulation of SSB, CW and FSK signals is performed by which of the following circuits?
A product detector
When keying a high-power transmitter, what component should you use to reduce the shock hazard?
A relay
What are two basic components of a galvanometer?
A stationary permanent magnet and a movable coil
Of the following amplifiers, which one has a high gain, low noise, wide bandwidth and is operated in the microwave region?
A traveling wave tube
Which solution can be used for antistatic cleaning?
A water and fabric softener solution
Name the layers of the OSI model
Physical, Data Link, Network, Transport, Session, Presentation, Application
The purpose of what signal is to alert the operators on watch or to activate 2182 kHz watchkeeping recievers to warn operators that distress call or message is to follow?
Alarm signal
Which of the following actions would be regarded as part of corrective maintenance?
Alignment of a servo assembly after a repair
Electrical constants in a transmission line are distributed in which of the following ways?
Along the length of the line
How often must all personnel who have access to classified information receive a refresher briefing designed to enhance security awareness?
Annually
The transmission of voice as well as data and text can be handled by what type of communications channels?
Broadband
Which of the following methods uses the physical characteristics of a user to verify identity?
Biometrics
A single binary digit is called what?
Bit
Which of the following terns is associated with a power outage for a long period of time?
Blackout
To increase the amount of data we can store on one track, what technique can be used?
Blocking
Which of the following methods of reducing RF burn hazards is the most useful and widespread technique used?
Bond and ground all metallic objects
Broadcast screen requests should be sent to what organization?
Broadcast keying station
A momentary decrease in voltage is known as a(n) _____
Brownout
In a cathode modulator, the modulating voltage is in series with which of the following voltages?
Both the grid and plate voltages
What do Commanders of DON organizations use to limit access to internal networks?
Boundary Defense
Which of the following devices handles the first two layers of the OSI model?
Bridge
Which of the following devices is used to connect identical network segments?
Bridge
Which of the following statements must appear on the CALIBRATION NOT REQUIRED label affixed to an instrument?
By what authority the label was affixed
When you are discussing the memory capacity of a memory module, the capacity is specified in?
Bytes
Which of the following authentication technologies utilizes a challenge text?
CHAP
What is the sole authority for advancement of personnel to pay grades E-7-E-9?
CHNAVPERS
Who is responsible for managing the command's CMS account and for advising the commanding officer on all matters concerning CMS?
CMS Officer
Who approves and issues the Navy IA Master Plan?
CNO
Who is responsible for ensuring full implementation and coordination of the Navy's IA program?
CNO
Who is responsible for policy guidance, education requirements and support for the DON security education program?
CNO
Who issued OPNAVINST 5239.1?
CNO
Who shall develop Navy IA education, training and awareness programs in accordance with DoD and DON?
CNO
Who has the authority to advance personnel to the pay-grades of E2-E6?
CO after all advancement requirements are met
What recommendation is the most important advancement eligibility requirement?
CO/OIC
When an emergency plan is implemented, which of the following material should be destroyed first?
COMSEC material
How do you get a list of options that can be used with the COPY at the command prompt?
COPY /
In what type of environment should test equipment be stowed?
Dry
What section/unit is the brain of a computer system?
CPU
What section/unit is the computing center of a computer system?
CPU
When a node needs to send data, it waits until the line is quite and then transmits. This protocol is known by what term?
CSMA/CD
On what type of device would you typically configure the clock rate?
CSU/DSU
In an MF transmitter, the frequency generator is used during which of the following modes of operation?
CW
This measurement provides an indication of dielectric strength and is used to determine the power factor.
Capacitance
The velocity of propagation on a transmission line is controlled by which of the following line characteristics?
Capacitance and inductance
When a series-resonant circuit is resonant at a frequency above the generator frequency, it acts as what type of circuit?
Capacitive
A varactor is a variable device that acts as which of the following components?
Capacitor
Prior to working on a circuit, you use shorting probe discharge which of the following types of components?
Capacitors and cathode-ray tubes
What component in a carbon microphone converts a DC voltage into a varying current?
Carbon granules
Single sideband receivers use a special oscillator. The output of that oscillator is fed directly to the detector circuit. What type of oscillator is used?
Carrier reinsertion
In RF communications, modulation impresses information on which of the following types of waves?
Carrier wave
Why is fiber optic cable immune to electrical interference of any kind?
Carries no electrical current
A teletypewriter code signal consists of 7 units. Of the following functions, which describes the middle 5 units?
Carries the intelligence
When you are using the teletypewriter five-unit code which of the following signals are used to increase the printing capacity of the equipment?
Case-shift
The parity bit is also called the what?
Check bit
What two modes are used to obtain the dual trace on an oscilloscope?
Chop and alternate
In _____ , a connection is established between two network nodes before the bgin transmitting data.
Circuit Switching
Every command in the Navy and Marine Corps eligible to receive what is required to designate a security manager in writing?
Classified Information
Prior to being granted initial access to classified information what form must individuals fill out?
Classified Information Nondisclosure Agreement (SF 312)
What is the proper way to remove a USB device from a Windows 2000-based notebook PC system?
Click the Safe Hardware Removal icon in the system tray
Which type of conflict management style attempts to jointly resolve conflict with the best solution that is agreeable to all parties?
Collaborating
A single address group that represents a set of four or more activities, including the cognizant authority, is known by what term?
Collective address group
Which of the following transistor parameters are measured with the transistor tester?
Collector leakage and current gain
An antenna arrangement that has elements aligned in a straight line is referred to as what type of array?
Collinear
A(n) _____ is a logically or physically distinct Ethernet network segemtn on which all participating devices must detect and accommodate data collisions.
Collision Domain
What is it called when you adjust the color settings of a monitor, a printer, and a scanner to a standard?
Color management
Who is responsible for the overall management of IA at the command level?
Commanding Officer
Who maintains the ships System Security Authorization Agreement (SSAA)?
Commanding Officer
What does the acronym COBOL stand for?
Common business oriented language
Who is responsible for the organization, supervision, and coordination of the command's external communications?
Communications Officer
Who is responsible to the communications officer for compliance with communications directives and for the accurate and rapid handling of messages?
Communications Watch Officer
When it needs to shift broadcast guard, a ship sends what type of message?
Communications guard shift
Which type of conflict management style attempts to resolve conflict through give and take and by making concessions?
Compromising
What are teams composed of personnel with technical expertise and organic equipment that may deploy to assist remote sites in the restoration of a computer services?
Computer Emergency Response Team
What consists of actions and operations to defend computer systems and networks from unauthorized activities that degrad mission performance and adversely impact survivability?
Computer Network Defense
Which of the following is the best way to improve privacy on an 802.11 wireless network?
Configure WEP to encrypt network transfers
What type of address group must always have more information added to it to serve as a completed station and address designator?
Conjunctive address group
____ protocols ensure that data arrives exactly as it was sent by establishing a connection with another node before they begin transmitting data.
Connection-oriented
What forms the origin and heritage of the Navy's Core Values?
Constitution and federal law
In regard to AIS security, the continuation of an activity's mission during abnormal operating conditions is provided by which of the following means?
Contingency plans
Which of the following types of modulation is a form of amplitude modulation?
Continuous-wave
An oscilloscope that can display two vertical input signals at the same time is said to be what type?
Dual trace
The sensitivity level that has the potential for grave to exceptionally grave impact and/or damage is known as?
Critical Sensitive (CS)
A(n) _____ cable is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals properly.
Crossover
What type of cable should you use between two switches?
Crossover cable
____ occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.
Crosstalk
A failure that adversely affects the security of a cryptosystem is known by what term?
Cryptoinsecurity
What key combination opens the start menu in Windows XP?
Ctrl+Esc
Meter sensitivity is determined by the amount of current required by the ammeter coil to provide full scale deflection of the pointer. An ammeter movement is caused to move by what electrical action?
Current
The magnetic field radiated from an antenna is produced by what electrical property?
Current
This measurement is rarely taken in preventive or corrective maintenance or testing because unsoldering is usually required. Ohm's law is normally applied to this value.
Current
You have a single network connected to you ISP. What type of routing would you allow the internal clients to reach the Internet?
Default route
What is the DoD consolidated world wide enterprise level telecommuncations infrastructure that provides the end-to-end information transfer network for supporting military operations?
Defense Information Systems Network
Who coordinates the intelligence efforts of the Army, Navy and Air Force and is responsible for implementation of standards and operational management of Sensitive Compartmented Information (SCI) for the DoD?
Defense Intelligence Agency (DIA)
What is the preferred Department of the Navy security strategy where by layers of protection establish an adequate security posture for a system?
Defense-in-depth
What level of IA training should all personnel receive who use or support DON IS?
Degree commensurate with their duties
A circuit that is nonlinear, provides filtering, and is sensitive to the type of modulation applied to it fulfills the requirements of which, if any, of the following circuits?
Demodulator
What type of attack involves a flooding of SYN packets to open TCP sessions to a server?
Denial of Service
A(n) _____ occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted data.
Denial-Of-Service Attack
Which one of the following types of memory can be used to permanently store data and instructions?
ROM devices
To detect pulse duration modulation, the low pass filter components must be selected so that they pass only the ______
Desired modulating frequency
In a basic tone modulate radio teletypewriter system, separation of the audio signal from the carrier is accomplished by what process?
Detection
When a receiver separates the audio frequencies from the radio-frequency carrier it is performing which of the following basic functions?
Detection
Which of the following wave-guides is seldom used because of its large energy loss characteristics?
Dielectric
The reception of an AM-band radio signal over mountains can be explained by which of the following principles of wave propagation?
Diffraction
A _____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.
Digital Certificate
When using a modem, what are the two methods of data transmission?
Digital and analog
The magnetic drum is another example of what type of access storage device?
Direct
When data can be obtained quickly from anywhere on the media without having to read the records in front of it, which of the following types of storage is being used?
Direct-access
When a core is magnetized, what characteristic of magnetism determines whether it contains a binary 0 or a binary 1?
Direction
What communications link mode of operation provides telecommunications capability between stations at the same time in both directions?
Duplex
When you are measuring voltage using a voltmeter, where should you stand to view the meter reading?
Directly in front of the meter
Who shall maintain the IA Library and distribute all keying material for the Navy?
Director of COMSEC
What is used by some commands as a part of the administrative process for handling report chits?
Disciplinary Review Board (DRB)
When the AIS system contains classified information, what action, if any, must be taken for each remote terminal that is not controlled?
Disconnect
When preparing to use an ohmmeter to test a circuit for grounds, you should first take which of the following actions?
Disconnect all intentional grounds
What two media are commonly used for back up?
Disk and Magnetic Tape
What requires all personnel who access DON Information and Information Systems receive annual IA and Security Awareness Training, to include emphasis on Internet security?
DoDD 8570.1, Information Assurance Training, Certification and Workforce Management
A definition of the problem, a description of the system, a description of the program, and operator instructions make up what package?
Documentation
What wave propagation principle accounts for the apparent increase in frequency as a train whistle approaches ad the apparent decrease in frequency as it moves away?
Doppler effect
Which of the following printers is suitable for printing multipart invoices?
Dot Matrix Printer
An earth terminal receives signals on what frequency?
Down-link
Identify the 802.1x method that can be used for mutual authentication of the supplicant and the authenticator.
EAP-TLS
What is defined as instruction in a phase of military duty in which an individual is deficient?
EMI
Which of the following affects the performance of an 802.11b network?
EMI
What is a key component of an effective continuous evaluation program?
Effective security education program
The polarization plane of the radiation field is determined by which of the following fields?
Electric field only
Besides a physical interface between the device and the computer, what other type of interface does a port provide?
Electrical
Which of the following is an acceptable method of cleaning oxide buildups from adapter board contacts?
Electrical Contact Cleaner Spray
The electric field and magnetic field combine to form which of the following types of waves?
Electromagnetic
Of the following terms, which one is defined as the ability of an electronic system to perform its indivudual functions without interference?
Electromagnetic Compatibility
The sources of electromagnetic radiations that reduce receiver performance are known by which of the following terms?
Electromagnetic interference
What DoD electronic PSI request tool was developed to support the Defense Security Service?
Electronic Personnel Security Questionnaire (EPSQ)
What is the federal government standard automated request tool for personnel security investigations (PSI)?
Electronic Questionnaires for Investigations Processing (e-QIP)
To establish radio contact with a satellite, an earth terminal must know which of the following satellite data?
Elevation
An electrical field that rotates as it travels through space exhibits what type of polarization?
Elliptical
Of the following orbit parameters, which one describes the basic orbit shape of a communications satellite?
Elliptical or Circular
What is a collection of computing enviroments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security?
Enclave
Cryptographic equipment performs which, if any, of the following functions?
Encodes and decodes messages
The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm is known as a(n) _____
Encryption
What is the purpose of the grounding cable attached to the frame of a generator aboard ship?
Ensure equipment is at same ground potential as the ship
What is the name of the table that provides coordinates of a satellite at specific times?
Ephemeris
What is a common spirit of comradeship, enthusiasm and devotion to a cause among the members of a group?
Esprit de Corps
Electronics circuits are placed on a silicon chip by what method?
Etched
____ is a networking technology originally developed at Xerox in the early 1970s and improved by Digital Equipment Corporation, Intel, and Xerox
Ethernet
What are standards of conduct that indicate how one (or a group) should behave, based on a set of moral principles or a system of values?
Ethics
The combination to a classified material container must be changed at what maximum interval?
Every 24 months
The three characters following each directory entry are called what?
Extensions
Intranets that share a portion of their content with customers, suppliers, or other businesses but not with the general public are called?
Extranet
What type of motivation occurs when external rewards direct behaviors into specific patterns?
Extrinsic
Of the following body organs, which are considered the most vulnerable to radiation hazards (RADHAZ)?
Eyes and testes
Which function key can be used to access the Advanced Startup Options menu in Windows 2000 or XP systems?
F8
Which of the following types of cables is most expensive in terms of cost, installation and maintenance?
Fiber Optic
Which of the following types of cable is not prone to electromagnetic interferences?
Fiber Optical Cable
Which of the following cables is the best choice if a secure network is needed?
Fiber optic
The ability of a circuit to faithfully reproduce the input signal in the output is known by what term?
Fidelity
To reduce the depth of the CRT caused by the length of the tube, what type of displays were designed?
Flat panel
Navy use of the LF band is mainly for which, if any, of the following broadcasts?
Fleet multichannel
In modern digital computers, circuits that store information, perform arithmetic operations, and control the timing sequences are known as what?
Flip-flops
Once you have a thorough understanding of the problem, what is the next step in programming?
Flowcharting
What product is recommended for manual cleaning of floppy disk drives and tape R/W heads?
Foam swabs
What is the one element all leaders and effective leadership depend on?
Followership
How are the instructions that control a computer applied to a special purpose computer?
From built-in instructions
How many fundamental and discrete steps are involved in solving a problem on a computer?
Four
How many types of backbone cables are there?
Four
Radio set control units are often used aboard ship to remotely control transmitters and receivers. Under standard operating conditions what is the maximum number of units that can be paralleled with a single transmitter and receiver group?
Four
The transport layer is which layer number of the OSI reference model?
Four
The world is divided into what total number of Naval Communications Areas (NAVCOMMAREAS)?
Four
What is the maximum number of elements ordinarily used in a collinear array?
Four
What is the minimum number of times the dial of a security container must be rotated in the same direction to ensure that it is locked?
Four
_____ is an updated, digital version of X.25 that relies on packet switching.
Frame Relay
The electromagnetic spectrum represents the entire range of electromagnetic waves arranged in the order of their _____
Frequency
The vertical axis on a frequency spectrum graph represents which of the following waveform characteristics?
Frequency
Varying which of the following wave characteristics will cause the length of sound waves to vary?
Frequency
Which of the following electrical quantities can be measured using an oscilloscope?
Frequency
The frequency spectrums of a phase modulated signal resemble the spectrum of which, if any, of the following types of modulation?
Frequency modulation
A typical shipboard receive-only satellite system uses which of the following types of modulation?
Frequency or phase shift key
A megger is prevented from exceeding its rated output voltage by which of the following actions?
Friction clutch spillage
Which of the following components must be large enough to support air conditioning or minimum lighting as well as the UPS load?
Generator
What provides globally interconnected capabilities, processes and personnel for collecting, processing, storing, disseminating and managing information for all DoD war-fighters, policy makers, and support personnel?
Global Information Grid (GIG)
The Navy uses GMT as a common 24-hour worldwide time standard in messages for the date-time group and time of file. What does GMT stand for?
Greenwich Mean Time
A series of conductors arranged in a radial pattern and buried in the ground beneath the antenna is referred to as a ______
Ground screen
On Linux or Solaris system, the _____ command creates a new group ID and makes the group available for use.
Groupadd
Frequencies that are located between adjacent channels to prevent interference are referred to as ______
Guard Bands
What is the primary use of analog computers in the Navy?
Gun fire controls
To aid in distinguishing between two or more CW signals that are close to the same frequency, which of the following detectors is used?
Heterodyne
Which of the following types of circuits are most affected by the loading effect of voltmeters?
High resistance
Modulation produced in the plate circuit of the last radio stage of a system is known by what term?
High-level modulation
Describe the Application Layer's function
Higher-level protocols used by most applications for network communication
A vertically mounted transmission line is LEAST affected by which of the following antenna radiation patterns?
Horizontally polarized
You have installed an intrusion detection system on one of the production servers to monitor malicious activites of applications and users only on that server. What kind of IDS is this?
Host-based IDS
The term _____ refers to identical components that can be changed while a machine is still running.
Hot Swappable
What introduces and summarizes the Department of the Navy's approach to IA?
IA Pub 01
Information Assurance related technology research and development efforts are responsive to what?
IA needs of the DON
Who is responsible for directing the implementation of the information assurance (IA) program within the command?
IAM
Navy Component Task Force shall monitor what?
IAVA compliance
What protocol suite is utilized by mainly Novell 4.x and earlier networks?
IPX/SPX
Which of the following protocols uses a MAC address as part of the host address?
IPX/SPX
When is a unit considered "commissioned" or "established"?
If it is listed in the Standard Navy Distribution List (SNDL)
A(n) _____ is a file that contains instructions for performing a specific task, such as reading data from and writing data to a hard drive.
Kernel Module
On UNIX-type systems, the _____ utility allows you to modify TCP/IP settings for a network interface, release and renew DHCP-assigned addresses, or simply check the status of your machine's TCP/IP settings.
Ifconfig
Which of the following utilities is used on Linux system to verify TCP/IP configuration?
Ifconfig
Which of the following terms is a measure of electrical resistance?
Impedance
Data may be misrouted, mislabeled, or it may contain unexpected personal information as a result of which of the following data security risks?
Improper data dissemination
The triggered oscilloscope has which of the following advantages over a basic oscilloscope?
Improved presentation stability
In what arrangement is an ammeter connected to a circuit?
In series
In a frequency-shift keyed signal, where is the intelligence contained?
In the frequency of the RF energy
In an AM wave, where is the audio intelligence located?
In the spacing between the carrier and sideband frequencies
Adding more elements to a collinear antenna array produces which of the following effects?
Increased gain
This measurement is seldom taken during troubleshooting. It can be taken using a bridge or another instrument that is primarily designed to measure another quantity; however, a conversion chart is required
Inductance
What field exists close to the conductor of an antenna and carries the current?
Induction
If a transmission line is open ended, which of the following conditions describes its terminating impedance?
Infinitely large
What provides the measures taken by an organization to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of its information and information systems?
Information Assurance
Which of the following personnel serves as the single point of contact for all matters related to AIS security?
Information System Security Manager
What is the fundamental element in programing preparation?
Instruction
Which, if any, of the following is the primary disadvantage of pulse position modulation?
It depends on transmitter receiver synchronization
Compared to FM, increasing the modulating frequency in phase modulation has what effect, if any, on the bandwidth of the phase modulated signal?
It increases
When data is written on a disk in the same area where data is already stored, the old data is affected in which of the following ways, if at all?
It is replaced
What happen's when you press the Window's logo along with the "L" key?
It locks the computer
The damping diode in a thyratron modulator serves which of the following purposes?
It prevents the breakdown of the thyratron by reverse-voltage transients
When a line is terminated in a capacitance, the capacitor performs which, if any, of the following circuit actions?
It reflects all the energy
Compared to a plate modulator, the control grid modulator has which of the following advantages?
It requires less power from the modulator
In an FM transmitter, a varicap performs which of the following functions?
It varies the oscillator frequency
Who no modulating signal applied, a reactance tube has which, if any, of the following effects on the output of an oscillator?
It will change resonant frequency
Overmodulation of an AM signal will have which, if any, of the following effects on the bandwidth?
It will decrease
Which of the following is a device that handles electrical signals improperly, usually affecting the rest of the network?
Jabber
What system is currently used by the US military services to identify electronic equipment with standardized nomenclature?
Joint Electronic Typ Designation System (JETDS)
Information assurance is defined in what publication?
Joint Pub 3-13
Who is the lead organization designated to identify and mitigate threats to the DoD information networks, and to direct the defense of the Global Information Grid?
Joint Task Force for Global Network Operations (JTF-GNO)
Which of the following authentication methods is used with timestamped session tickets?
Kerberos
The core of all UNIX-type systems is called the _____
Kernel
Telephone lines are frequently used type of communications channel. They are often referred to by which of the following terms?
Landlines
The principal disadvantage of the rhombic antenna is its ________
Large antenna site
Which of the following layers of the OSI network model does a network adapter work?
Layer 2
What is ineffective without a successful balance of responsibility, authority and accountability?
Leadership
What two responsibilities belong to the Work Center Supervisor?
Leadership and Personal
What type of authority is set forth in Navy Regulations and the UCMJ and ensures orders are backed by the punitive articles that provide punishment for insubordinate conduct or failure to obey a lawful order?
Legal
What are the three universal types of authority in the Navy?
Legal, Earned and Moral
The scientist, J. C. Maxwell, developed the theory that small packets of electromagnetic energy called photons produce _____
Light
Which of the following components is a close relative of the laser?
Light Emitting Diode (LED)
Which of the following equipment is used to extend the transmission range between devices that are connected directly to each other?
Line driver
Which of the following indicates that an operating "physical" connections is in place to a local area network?
Link lights are present and operating on the back of the NIC
Name the layers of the TCP/IP model
Link, Internet, Transport, Application
Which Windows utility is used to isolate conflicting items in the startup sequencing?
MSCONFIG
Which of the following contains essential information about handling, storage and safe disposal of hazardous chemicals?
MSDA
A computer language that is a string of numbers which represents the instruction code and operand addresses is what type?
Machine
What type of computer language was used with first generation computers?
Machine
An instruction that allows the programmer to write a single instruction which is equivalent to a specified sequence of machine instructions is what type of instruction?
Macroinstruction
What are the secondary colors of light?
Magenta, Yellow, Cyan
What type of storage is represented by the standard floppy and hard disks installed in most PC systems, where the data is recorded magnetically on rotating disks?
Magnetic
What are the two types of disk storage for computers?
Magnetic and Optical
_____ coordinate the storage and transfer of e-mail between users on a network.
Mail services
The end-fire array produces what type of lobes, if any, along the axis of the array?
Major lobes
After you've removes the outer case from a CRT display, what precaution should you take before troubleshooting it?
Make sure it is discharged
Every UNIX-type system contains full documentation of UNIX commands in the _____
Manual Pages
_____ involves associating a letter, such as M: or T: with a disk, directory, or other resources.
Mapping
What is the service between coast stations and ship stations, or between ship stations, in which survival craft stations may also participate?
Maritime Mobile Service
You have been asked to install an IDE disk to a personal computer. This will be the only disk in the computer connected to the primary channel. How would you set the jumper?
Master
A folded dipole can be used instead of a simple, center-fed dipole for which of the following purposes?
Matching impedance
To figure the total value of series resistance needed to extend the range of a voltmeter, you need to know the value of current to cause full scale deflection of the meter and what other value?
Maximum applied current
Frequency counters serve which of the following purposes?
Measure frequencies in a circuit
To endure the frequency stability of an FM transmitter, which, if any, of the following actions could be taken?
Modulate a low-frequency oscillator, and the heterodyne it with a higher frequency oscillator to achieve the desired frequency
The action of impressing intelligence pan a transmission medium is referred to as ______
Modulating
Which of the following functions is performed by the exciter stage of an earth terminal transmitter?
Modulation of the IF carrier
The final audio stage in an AM transmitter is the ______
Modulator
What is a major responsibility of a supervisor?
Monitor production
The main importance of reviewing audit/event logs is which of the following functions?
Monitor system security
How often should the Personnel Security Appeals Board convene?
Monthly
How often should you perform a defrag operation on a desktop PC used in an office setting?
Monthly
What reflects a more personal conviction than values, and relate to principles of right and wrong behavior?
Morals
_____ is a specialized storrage device or group of storage devices that provides centralized fault-tolerance data storage for a network.
Network Attached Storage
In order for data to be read from or written on a magnetic tape, the tape must do what?
Move at a predetermined speed
_____ is the ability of a processor to perform many different operations in a very brief period of time.
Multitasking
Who is the Navy Senior Information Systems Security Manager (SISSM)?
N6
What document contains guidance for taking extracts from a NATO publication?
NATO letter off promulgation
Who is responsible for reporting incidents and associated analytical results to the JTF-GNO?
NAVCIRT and MCNOSC
Who is responsible for developing, publishing, and distributing Navy-wide advancement in rate examinations for the purpose of testing and rank ordering personnel who are qualified for advancement?
NETPDTC
What is the lowest form of punishment in the Navy?
NJP
Which of the following motherboards users a riser card for providing expansion slots?
NLX
Which of the following switched networks extends tactical voice to shorebased operational commands?
NORATS
What is the native file system for Windows NT and later?
NTFS (Windows NT File System)
What publication lists the types of ships that are required to have a communications department?
NWP 4 (NWP 6-01)
_____ contain databases of associated names and IP addresses and provide this information to resolvers on request.
Name servers
Who provides centralized coordination and direction for signals intelligence and communications security for the Federal Government?
National Security Agency
Who provides overall policy guidance on information and personnel security matters?
National Security Council (NSC)
What authority grants Navy and Marine Corps activities within the US permission to use radio frequencies?
National Telecommunications and Information Administration (NTIA)
Who shall collect, track and report on threats to DON information systems and disseminate this information to the DON CIO?
Naval Inspector General
VLF transmitters are used primarily for which of the following purposes?
Navigation and fleet communications
Which of the following locations on the meter scale provides the most accurate reading for resistance?
Near the center of the scale
A commonly used measure of interference in twisted pair cable is referred to by which of the following names?
Near-end crosstalk
Access is only permitted to eligible individuals after determining that the individual has what?
Need to Know
Quadrant 2 on the Tracker 2000 CRT is used to display what signal information?
Negative voltage and positive current
The _____ utility displays TCP/IP statistics and details about TCP/IP components and connections on a host.
Netstat
A ____ is group of computers and other devices that are connected by some type of transmission media.
Network
Any system composed of one or more computers and terminals is the definition for what?
Network
Ping and Traceroute operate at what layer of the OSI model?
Network
Which layer performs the functions that enable two applications to communicate across the network?
Network
_____ viruses propagate themselves via network protocols, commands, messaging programs and data links.
Network
Which of the following pieces of test equipment is the best tool to use for network malfunctions?
Network Analyzer
Which instruction provides information on selection of senior enlisted personnel for promotion to commissioned officer status such as LDO or CWO?
OPNAVINST 1420.1 and NAVPERS 15627
Which instruction allows COMNAVCRUITCOM Enlisted Recruiter of the Year (EROY) to be advanced to the next pay grade?
OPNAVINST 1700.11
Who shall serve as DAA for Navy SCI systems?
Office of Naval Intelligence (ONI)
Commands that handle Top Secret material will be designated a TS Control Officer (TSCO) in writing. The TSCO must be an?
Officer, senior non-commissioned officer E-7 or above, or a civilian employee, GS-7 or above
Knowledge, possession of, or access to classified information is not provided to any individual solely by virtue of the individual's what?
Official, rank or position
Resistance is measured in _____
Ohms
Describe the Network Layer's function
Path determination and logical addressing
The same pulse characteristic is varied in which of the following types of pulse modulation?
Pdm and Pwm
Windows XP Home includes what type of networking access control as its default?
Peer-to-peer
In a _____ network, every computer can communicate directly with any other computer.
Peer-to-peer (P2P)
In which of the following steps in planning an AIS security program, will major problem areas be identified?
Perform a preliminary risk analysis
What is the parameter in the orbit of a satellite that refers to the point nearest the center of the earth?
Perigee
When the annual security survey is conducted, it should begin at which of the following areas?
Perimeter
At what layer of the OSI model would you find windowing and sequence numbers?
Physical
The _____ is the lowest, or first layer of the OSI model.
Physical Layer
The length of time the phosphor coating on the CRT remains bright after the electron beam is removed depends on which of the following characteristics?
Persistance of the coating
How are personnel advanced to the pay grades of E2-E3?
Personnel meeting minimum time in rate (TIR) requirements will be advanced automatically form E-2 and E-3 with out local actioni
The degree to which a cycle has been completed at any given instant is referred to as the ______
Phase
Sort merge programs usually have which of the following characteristics?
Phases
A _____ topology does not specift device types, connectivity methods, or addressing schemes for the network.
Physical
Protocols at the ____ layer accept Application layer data and format it so that one type of application and host can understand date from another type of application and host.
Presentation
_____ layer services manage data encryption and decryption.
Presentation
Who bears executive responsibility for the security of the Nation?
President of the US
A ____ is a rule that governs how networks communicate.
Protocol
What is the highest precedence that is normally authorized for administrative messages?
Priority
The specific set of rules used to govern handshaking and message characters is called what?
Protocol
For the purpose of making backup resources available, which of the following tasks can be set aside?
Program development
What is the step called in which you code a program that can be translated by a computer into a set of instructions it can execute?
Programing code
What are report program generators designed to save?
Programming time
When office layout is being planned, what is the primary consideration?
Proper flow of paper and work
Information Assurance includes providing for the restoration of information systems by incorporating what three capabilities?
Protection, Detection and Reaction
_____ ensure that data are transferred whole, in sequence, and without error from one node on the network to another.
Protocols
In a CSMA/CD system, the media access method uses which of the following signals before sending a frame onto the network?
RTS and CTS
What provides digital identification, signature and encryption services to a broad range of applications at various levels of assurance?
Public Key Infrastructure (PKI)
To transmit intelligence using pulse modulation, which of the following pulse characteristics may be varied?
Pulse repetition time
Which of the following actions would be classified as preventive maintenance?
Purchasing a new piece of test equipment
What are the two style of typewriter keyboard arrangements used with a computer?
QWERTY or DVORAK
To demodulate a phase modulated signal, which, if any, of the following types of demodulators may be used?
Quadrature
The process of arbitrarily dividing a wave into a series of standard values is referred to as ______
Quantization
For any control item that is still open, it is recommended that reports be turned in to upper management with what frequency?
Quarterly
What kind of memory used inside computers has a read/write capability without any additional special equipment?
RAM
Which of the following labels is attached to an unusable instrument, and may have an additional tag attached?
REJECTED
A thermocouple ammeter is used to measure which of the following quantities?
RF current
Which of the following connectivity methods are used with 802.11g?
RF signals and antennas
What type of connector is used to connect telephone to the wall?
RJ
What is the major advantage of the telegraph over earlier methods of communication?
Range
Which of the following file permissions is not a standard NTFS permission but a special permission?
Read Attributes
When using the vibrating-reed frequency meter, you take the reading in which of the following ways?
Read the reed that is vibrating the most
What does the acronym ROM stand for?
Read-only memory
The _____ tool us used to access console commands through a Web browser on another computer on the network.
Remote Manager
Waves that travel from the output end to the input end of a transmission line are referred to what type of waves?
Reflected
When pulse modulation is used for range finding in a radar application, which of the following types of pulse information is used?
Reflected pulse return interval
Radiotelegraph (CW) is valuable when communicating to, from and among widely separated naval units. What is the main advantage of the CW mode?
Reliablity
Which Windows XP utility enables support personnel to take control of a remote computer and perform troubleshooting steps while involving the user if necessary?
Remote Assistance
Which of the following devices used to amplify electrical signals carried by the network?
Repeater
The receiver action of converting electrical energy to a usable format, such as sound, is an example of which of the following basic functions?
Reproduction
Which of the following contingency plans for dealing with classified material should NOT be considered in emergencies?
Reproduction
The sun, gas flames, and electric light filaments are visble because they are ______
Self-luminous
Conductance is the reciprocal of what electrical property?
Resistance
The Wheatstone bridge can be used for precision measurements of which of the following quantities?
Resistance
This is a valuable aid in locating faults during corrective maintenance, but cannot be made with power applied. Many technical manuals contain charts that indicate the test points for this measurement.
Resistance
_____ are any hosts on the Internet that need to look up domain name information.
Resolvers
A cavity that vibrates as its own natural frequency and produces a sound that that is louder than at other frequencies is demonstrating which of the following sound characteristics?
Resonance
The presence of standing waves indicates which of the following conditions of an antenna?
Resonance
In a phase modulator, the frequency during the constant amplitude portion of the modulating wave is the ______
Rest frequency
Multiple reflections of sound waves are referred to as ______
Reverberation
Longitudinal wave disturbances that travel through a medium are known as what type of waves?
Sound
You are working with a public school to improve its networking capabilities. As you survey the wireless signal strength levels throughout the facility, you find a hidden, unauthorized WAP sitting on top of a filing cabinet in a main office. WHat is this type of WAP called?
Rogue WAP
At what point does heat buildup become a problem for most PC's?
Room temperatures above 85ºF
The most common way to measure latency on data networks is by calculating a packet's _____
Round Trip Time
Which of the following devices connects different network segments and uses tables to create a map of the network topology?
Router
Which of the following devices works at the third layer of the OSI model?
Router
A carbon microphone has which of the following advantages over other types of microphones?
Ruggedness
Touching the exposed area seen through the timing hole and the read/write slots on a floppy disk can do what, if anything, to the data in that area?
Ruin it
Work Center Supervisors have roles that come with unique responsibilities. These responsibilities are based on what?
Rules, regulations and tradition
You are using neutral keying and the teletypewriter type hammer continually strikes the type box but there is no printing or type box movement across the page. What is the name of this condition?
Running open
Which of the following ACPI-defined power states specifies the standby mode in Windows?
S3
Which of the following systems provides an inventory of test equipment actually located in the Fleet?
SCLSIS
Which printer interface is fastest for local printers?
SCSI
Who is the Department of the Navy agency head responsible under EO 12968 for establishing and maintaining an effective PSP to ensure that access to classified information by each DON employee is clearly consistent with the interests of national security?
SECNAV
Which instruction would you consult concerning foreign vistors, whether or not the visitor requires access to classified, or CUI or material?
SECNAVINST 5510.34A
When storing advancement exams the border color on the exams reflects the classification of the exam. Which of the following correctly labels the colors with their respective classifications?
SECRET - RED; CONFIDENTIAL - BLUE; and FOR OFFICIAL USE ONLY (FOUO) - BLACK
Which Windows utility can be used to verify the integrity of the Windows XP operation system files?
SFC
_____ is a simple subprotocol, incapable of doing anything more than transporting mail or holding it in a queue.
SMTP
Which of the following ratios is used to determine how long a cable segment can be before the signal loss is unacceptably high?
SNR
What type of RAM do you typically find in a notebook PC?
SODIMM
Who maintains the Navy INFOSEC Website and IA Help Desk?
SPAWAR
What type of message is placed in the cryptocenter file?
SPECAT
What type of cable is a 100 ohm multipair cable used for voice grade communications?
STP
Transmitting antenna patch panels are interlocked with the transmitter for which of the following reasons?
Safety
What is data to be represented called?
Source data
To physically organize data on diskettes, what method is used?
Sector
Tracks are divided into several numbered divisions known as?
Sectors
Which of the following terms, refers to a thorough examiniation of each aspect of a network to determine how it might be compromised?
Security Audit
Which of the following is the loss potential that may result from the indirect theft of assets?
Security compromise
Transport layer protocols break large data units received from the Session layer in mulitple smaller units called _____
Segments
When a receiver picks one frequency out from all other frequencies, it's performing which of the following functions?
Selection
A quartz crystal filter is used in a communications receiver to improve which of the following characteristics?
Selectivity
How is receiver's ability to reject unwanted signals and receive desired signals determined?
Selectivity
____ is a method of identifying segements that belong to the same group of subdivided data.
Sequencing
To take power readings, you connect an in-line RF power meter in what configuration in the transmission line?
Series
Which of the following messages are described as short and concise messages between operators dealing with message corrections, broadcast reruns and missent or misrouted messages?
Service only
Which of the following measurements provides an indication of the ability of a receiver to reproduce weak signals?
Sesitivity
Which type of illegal computer activity involves taking control of a legitimate user's web application session while it is in progress?
Session Hijacking
How many layers are there in the OSI reference model?
Seven
Networking gives an individual the capability to communicate and connect with another individual or another system in order to accomplish which of the following tasks?
Share resources
Uniform capacitance throughout the length of the line is an advantage of which of the following transmission lines?
Shielded pair
The AIS technical manager can develop measures to use in case of emergency by reviewing operations and records with which of the following personnel?
Shift leaders
What does the acronym SNAP stand for?
Shipboard Non-tactical ADP Program
Which of the following is used to allow users to access resources on different servers in the domain when they log on to their computers?
Single sign-on
The simplest and the most commonly used operating systems on microcomputers are which of the following types?
Single user/single tasking
Prompt fire detection is best accomplished through the use of which of the following detectors?
Smoke
What type of cleaning solution should be used on the exterior of computer components?
Soap and water
The term ____ refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities.
Soft Skills
A computer that is designed to perform a specific operation is what kind of computer?
Special purpose
All analog computers are what type?
Special purpose
A _____ is a tool that can be used to assess the quality of a wireless signal
Spectrum Analyzer
Of the following advantages, which one is primary to the NTDS when compared with conventional data systems?
Speed
Radio waves travel at what speed?
Speed of light
Which of the following can you use to restart the print spooler from the command prompt?
Spoolsv.exe
What artificial satellite is credited with starting the era of space technology?
Sputnik
_____ are physicallt designed to be linked with other hubs in a single telecommunications closet.
Stackable Hubs
What is the relationship between the values of the bel and the decibel?
The decibel is 1/10 the bel
What is the currently approved method of requesting PSI products from OPM to support determinations of eligibility for assignment to sensitive national security positions or access to classified national security information?
Standard Form 86
A document issued by an organization to advise its personnel of internal routine practices is most commonly issued in what format?
Standard operating procedure
____ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service shoudl be designed or performed.
Standards
Which power conservation mode used in portable PC's turns off selected components such as the hard drive and display, until a system event, such as a keyboard entry or a mouse movement, occurs?
Standby mode
The resultant waveform obtained by adding the incident wave to the reflected wave is referred to as a/an ______
Standing wave
What network topology connects each computer on a network to a central access point?
Star
When measuring unknown currents, you should determine the range scaled that is appropriate in what way?
Start with the highest scale and work down
Which of the following methods to build and maintain routing tables takes maximum administrative efforts and time in a large network?
Static
Floppy disks provide which of the following functions?
Store data
What type of cable would you use between a router and a switch?
Straight-through cable
A complex of links make up a major communications system. The naval communications system is further broken down into what two groups?
Strategic and tactical
Extremely low-frequency transmissions are primarily directed at which of the following users?
Submarines
Which of the following components of an IP address is used to distinguish the network address from a host address?
Subnet Mask
A(n) _____ is a special 32-bit number that, when combined with a device's IP address informs the rest of the network about the segment or network to which it is attached.
Subnet mask
_____ separates a network into multiple logically defined segments.
Subnetting
Each time there is a control break, what does the program developed by the report program generator print?
Summary information
What are the three types of keying material in descending priority of destruction?
Superseded, effective, reserve
You have decided to use WEP for securing the wireless network segment in the organization. Which of the following terms describes the user who wants to connect to this secure network?
Supplicant
Which of the following transport protocols is used by TACACS+?
TCP
What protocol suite is utilized by most Windows-based networks, as well as Linuz, Unix, MacOS and other networks?
TCP/Ip
The setting of what control establishes the amplitude point of the input waveform at which the display sweep will begin?
TRIGGER LEVEL
The risk analysis should be reviewed by which of the following people?
Technical manager
CND synchronizes what?
Technical, operational and intelligence assessments of the network
Which of the following terms includes intelligence produced by wire, radio, visual means, oral means or electromagnetic systems?
Telecommunications
What is perhaps the most common source of magnetic field that can a floppy disk?
Telephone
Any modern client running the TCP/IP protocol suite will be capable of connecting to a UNIX-type of host via _____
Telnet
One of the network administrators in your company has asked you to block port 23 on the router. Which of the follwoing services is he asking you to block?
Telnet
_____ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.
Telnet
Of the following terms, which one is primarily concerned with compromising emanations?
Tempest
A(n) _____ converts digital signals into analog signals for use with ISDN phones and other analog devices;
Terminal Adapter (TA)
The unidirectional radiation pattern of the rhombic antenna is caused by which of the following antenna characteristics?
Termination resistance
Which of the following equipment is used to absorb a transmission at the end of a network?
Terminators
Describe the Link Layer's function
The networking scope of the local network connection to which a host is attached
Which group can run Remote Assistance function?
The Help Assistance group
You are using the CW mode of the radio transmitter unit. The 500-kilohertz local carrier is directly inserted into which of the following circuits?
The IF amplifiers
What Windows tool can be used to configure most modern routers?
The Internet Explorer web browser
Which Windows tool is used to safely remove hot swappable devices in Windows XP?
The Safely Remove Hardware utility
When you start up your PC, there are several unfamiliar icons in the notification area of the taskbar and the system's startup response is noticeably slow. What Windows utility should you use to troubleshoot these symptoms?
The MSCONFIG utility
Which Windows utility can be used to automate many routine or periodic functions?
The Schedule Tasks tool
Plate- and collector injection modulators are the most commonly used modulators for which of the following reasons?
The RF amplifier stagescan be operated class C for maximum efficiency
Which of the following statements about a wave is the law of reflection?
The angle of incidence is equal to the angle or reflection
A rotating coil in the uniform magnetic field between two magnets produces a sine wave. It is called a sine wave because the voltage depends on which of the following factors?
The angular position of the coil in the magnetic field
What determines the size of an analog computer?
The number of functions it has to perform
When submitting a trouble report, you must follow the instruction from which of the following commands?
The command receiving the trouble report
Who is responsible for implementing the recommendations received from the inspection?
The commanding officer
For which of the following reasons does the Navy use only the upper and lower ends of the MF band?
The commercial AM band occupies the middle
When you are selecting forward or reverse power measurements, what component(s) of the RF wattmeter is/are restricted to a 180º rotation range?
The coupler detector
Excessive modulation signal levels have which, if any, of the following effects on a control-grid modulator?
The create distortion
For a meter to read linearly, its face is divided into equal segments. What meter feature makes this possible?
The curved poles of the permanent magnet
What is an important point to remember about the MIKE and YANKEE zones?
The day changes, but the time remains the same
When you are testing an in-circuit diode with the transistor tester, the meter pointer deflects below the midscale point. What does this indicate?
The diode is faulty
Which scanner component converts the scanned image into a digital format?
The diodes in the light detector array
The state of each core in magnetic core storage is changed by what?
The direction of magnetism
When a pencil or ballpoint pen is used to write on the label after it is attached to the disk, what, if anything, can happen to a disk?
The disk can be destroyed
Which of the following is the main weakness of symmetric encryption algorithms?
The distribution of keys
The distance between the read/write head and the surface of a hard disk is called what?
The flying height
When the amount of oscillator frequency shift in an FSK transmitter is determined, which of the following factors must be considered?
The frequency multiplication factor for the transmitter amplifers
Many complex antennas are constructed from what basic antenna?
The half-wave antenna
You have been called to troubleshoot a desktop PC system that produces frequent, intermittent shutdowns, blue screen errors, and makes loud clicking sounds. What is the cause of these problems?
The hard disk drive is failing
If the PC system briefly shows a blue screen and continuously reboots, which of the following is likely causing this condition?
The hard drive is full
Damaging electrostatic discharge is most likely to occur when?
The humidity is low
The bel is a unit of measure used with voltage, current or power that compares which of the following circuit values?
The input to the output
What development in satellite communications improved back up power during eclipses?
The installation of a battery back up
What is the preferred method of ordering advancement examinations?
The internet
There were many limitations that cause problems on the first communications satellites. Of the following problems, which one was considered the most severe?
The lack of a suitable power source
The availability of a satellite to act as a relay station between two earth terminals depends upon which of the following considerations?
The location of the earth terminals
Who exercises operational control over the DCS?
The military head of DISA
A detector uses which of the following signals to approximate the original waveform?
The modulation envelope
After work on equipment is complete, who should remove any attached tags?
The person who signed and attached the tag
In the centrifugal tachometer, what component restricts the action on the lower collar that is produced by the centrifugal force?
The pointer
In a network printing environment, what Windows structure controls printing for everyone on the network?
The print spooler
What Windows structure allows multiple files to be loaded onto a printer for printing?
The printer queue
The scanner light comes on but you get an error message when an application calls for a scan. What is the problem?
The scanner's TWAIN drivers are not installed
The weight of the rotating coil assembly and the type of bearings used in the D'Arsonval meter are factors that affect which of the following characteristics of the meter?
The sensitivity
What are the effects of heat buildup and microprocessor fan failures on computer systems?
The system locks up after a short period of operation
In a reactance-tube modulator, the reactance tube shunts what part of the oscillator circuitry?
The tank circuit
In bubble memory, where is the control circuit imprinted on the crystal of semiconductor material?
The top
In a radio frequency carrier shift system, what equipment is the source of radio frequency excitation voltages?
The transmitter keyer
Which of the following ports is considered the fastest and supports a number of external devices for a laptop as well as for desktops?
USB
What type of printer uses a multicolored waxed ribbon that small pins heat up to melt the wax onto the paper?
Thermal Wax
You have decided to implement IPSec protocol to provide secure end-to-end communication to remote access clients. In which of the following modes should you implement this protocol?
Transport mode
CHAP can be described as what type of authentication?
Three-way handshake
How is the long term stability and accuracy required of modern communications receivers attained?
Through a process known as frequency synthesis
For ship-to-shore teletypewriter circuits, which of the following types of multiplexing is/are used?
Time and/or frequency
What is the purpose of the Fn key on a notebook PC?
To access additional functions from the keyboard
For what purpose was the ETE classification board established?
To control the increase of nonstandard GPETE
An additional bit in each storage location called parity bit is used for what purpose?
To detect errors
Data is stored on all disks in a number of invisible concentric circles called what?
Tracks
What is the purpose of address indicating groups (AIGs)?
To reduce the number of address groups required in the heading of a message
Signal generators are equipped with attenuators for which of the following purposes?
To regulate the output signal level
How should you protect information and resources?
To the degree commensurate with their value
What is the principal use of the oscilloscope?
To visually examine waveforms
In _____ , a 3-byte oacket, called a token, is transmitted from one node to another in a circular fashion around the ring.
Token Passing
In an afts transmitting system, the conversion of DC signals into audio tone shift signals is done by which of the following pieces of equipment?
Tone terminal set
In EIGRP, where would you find the feasible successor route?
Topology table
Where is the feasible successor route stored in EIGRP?
Topology table
Which of the following messages are used to determine delay or nondelivery of a message on a station-to-station basis?
Tracer only
The _____ utility uses ICMP to trace the path from one networked node to another indentifyingall intermediate hops between the two nodes
Traceroute, Tracert
What is a single ring of data on one side of a disk?
Track
The NWPL administrative file is also known by what other term?
Transaction file
Of the four major types of instructions, which one has the basic function of moving data from one location to another?
Transfer
Which of the following parts in a laser printer is used to transfer a high positive voltage to chage the paper?
Transfer corona wire
Which of the following processes help deposit the toner from the EP drum onto paper?
Transferring
Computers of the second generation were characterized by what technology?
Transistors
Which of the following terms describes the time between a space and mark or mark and space condition in a teletypewriter?
Transition
Some substances are able to transmit light waves but objects cannot be seen through them. Which of the following properties does this statement describe?
Translucence
The self authentication method is used in which of the following transmissions?
Transmission and Authentication
The dimensions of transmitting antenna are determined by which of the following factors?
Transmitted frequency
Substances that transmit almost all of the light waves falling upon them posses which of the following properties?
Transparence
Which layer ensures data units are delivered error free, in sequence, with no losses or duplications?
Transport
In a LoS communications system, propagation is affected by which of the following layers of the atmosphere?
Troposphere
Normally the transmission range of VHF is limited to LoS. What technique is used to increase range?
Tropospheric scatter
What are principles, standards or qualities considered worthwhile by an individual or a group?
Values
The horizontal sweep channels of the dual trace oscilloscopes have which of the following time base circuit configurations?
Variations of all the above configurations
The full accuracy of the frequency standard is sacrificed when which of the following types of tuning is used?
Vernier
For ground-wave transmissions, what type of polarization is required?
Vertical
The VERT control adjustment controls what position of the signal on the CRT display?
Vertical
The POSITION control on the spectrum analyzer is used to adjust which of the following CRT display features?
Vertical and horizontal position
Omnidirectional transmission is obtained from which of the following antennas?
Vertical half-wave
Adjacent channel selectivity and image frequency suppression have been improved in this receiver by the addition to which of the following features
Very accurate frequency standard
What controls the informaiton you see on the monitor?
Video Card
Administrators' access to IT systems from outside the enclave must use what?
Virtual Private Network (VPN)
The distance between corresponding points on a wave's cycle is called its ____
Wavelength
A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.
Web Server
The RCL bridge measures an unknown resistance by balancing the resistance value of the unknown component with that of known components inside the test set. What type of circuit is used in this method of measurement?
Wheatstone bridge
A cathode modulator is used in which of the following situations?
When AF power is limited and distortion cannot be tolerated
Phase-shift keying is most useful under which of the following code element conditions?
When mark and space elements are the same length
The second specific part of the predicate in a computer instruction, known as the operand, in general answers what question?
Where
The utility that allows you to query the DNS registration database and obtain information about a domain name is called _____
Whois
LANs in differenct locations can be connected by high-speed fiber-optic, satellite, or leased phone lines form a?
Wide Area Network (WAN)
When a pulse duration modulated signal is determined by using a low pass filter, what characteristic of the signal is used?
Width
Designers were able to increase the data density of a disk by increasing the number of tracks. What code name was given to this technology?
Winchester
Hard disk drives are sometimes referred to as?
Winchester Drives
The _____ provides a means of resolving NetBIOS names to IP addresses.
Windows Internet Naming Service
What is another name for a dot matrix printer?
Wire-matrix
EPROM can be erased by what method?
With a burst of ultra-violet light
The POST routines are contained where?
Within the motherboard ROM as well as ROMs on expansion cards
The time zone which passes through Greenwich, England, is most commonly known by what term?
ZULU time zone
Before you can take an accurate resistance measurement with an ohmmeter, what meter adjustment must you complete?
Zero resistance
In addition of four numeric bits, there are four other bit positions used in an a-bit code, what are they called?
Zone bits
Which of the following commands would you use to display an administrative message when a person connects to a router?
banner motd
Certifcation and accreditation (C&A) of information systems that process Top Secret Sensitive Compartmented Information will comply with the requirements of what?
Director of Central Intelligence Directive
What frequency is used for the International Aeronautical Emergency Frequency for aircraft and those aeronautical stations primarily concerned with the safety and regularity of flight along national or international civil air routes and having equipment in the 118-136 MHz band?
121.5 MHz
What frequency is for international use by the Maritime Mobile VHF Radiotelephone Service as a distress, safety and calling frequency?
156.8 MHz
What frequency is the International Distress, Safety and Calling frequency for the maritime mobile VHF radiotelephone service?
156.8 MHz
What frequency is agreed internationally for use by equipment provided for use in Survival Craft Stations, which is capable of operatiing on bands between 235 and 328.6 MHz?
243 MHz
Which frequencies are used to supplement the carrier frequency 2182 kHz for Distress and Safety purposes and for call and reply?
4125 kHz and 6215 kHz
What motherboard form factor is used in Standard tower and desktop systems; most common form factor from mid-1996 through thr present; supports high-end systems?
ATX
What limits access to information system resources only to authorized users, programs, processes or other systems?
Access Control
What is the primary device on a PC that is used by a human to communicate with a control system?
Keyboard
What is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?
Audit Trail
What is the security measure designed to establish the validity of a transmission, messge or originator, or as a means of verifiying an individual's authorization to access specific categories of information?
Authentication
What motherboard form factor is used in tower and desktop systems; popular in high-end major OEM systems starting in 2007?
BTX
What is the probability that a particular vulnerability will be exploited within an interacting population and adversely impact some members of that population?
Community Risk
What provides the assurance the information is not disclosed to unauthorized entities or processes?
Confidentiality
What kind of plan is maintained for emergency response, backup operations, and post-disaster recovery for an information system, to ensure the availability of critical resources and to facilitate the continuity of operations in an emergency situation?
Contingency Plan
Immediately before a crash landing or a forced landing (on land or sea) of an aircraft, as well as before total abandonment of a ship or an aircraft, the radio equipment should be set for what type of emmission?
Continuous
What physical and cyber-based systems are essential to the minimum operations of the economy and government?
Critical Infrastructures
What is a condition of being threatened by serious and/or imminent danger and of requiring immediate assistance?
Distress
What is a type of incident resulting from any action or series of actions that prevents any part of an information system (IS) from functioning?
Distributed Denial of Service
Which instruction states that all DoD information systems and networks will be certified and accredited IAW with the DoD policy and guidance, currently the DoD Information Technology Security Certification and Accredidation Process (DITSCAP)?
DoD Instruction 5200.40
What is an occurrence, not yet assessed, that may effect the performance of an IS?
Event
What is a system designed to defend against unauthorized access to or from a private network?
Firewall
What is a program recorded in permanent or semi-permanent computer memory?
Firmware
Which type of threats describes common hacker tools and techniques used in a non-sophisticated manner?
First Generation
What intergrates an organized, manned, equipped and trained workforce to guard, secure and secure information and information systems by providing the security services/attributes of availability, authentication, confidentiality, integrity and non-repudiation?
Information Assurance
Who is the individual responsible for the information assurance program of a DoD information system or organization?
Information Assurance Manager
Who is the individual responsible to the IAM for ensuring the appropriate operational IA posture is maintained for a DoD informatioin system or organization?
Information Assurance Officer
What is the ability to rapidly collect, process, and disseminate information while denying these capabilities to adversaries?
Information Superiority
What is the quality of an information system reflecting the logical correctness and reliablity of the operating system?
Integrity
What is the core of the system?
Motherboard
What was the first and most popular pointing device on the market?
Mouse
What is the assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data?
Non-repudiation
What feeds electrical power to the internal components in the PC?
Power Supply
What is often thought of as the "engine" of the computer?
Processor
What are the three main types of physical memory that are used in modern PC's?
ROM, DRAM, SRAM
What is a type of momry that can permanently or semi-permanently store data?
Read-only memory (ROM)
What is the possibility that a particular threat will adversly impact an IS by exploiting a particular vulnerability?
Risk
What is a condition concerning the security of a ship, aircraft or other vehicle, or of some person on board or within sight, but which does not require immediate assistance?
Urgency
What traffic shall have priority over all othe communications except distress?
Urgency
The frequency 2182 kHz (and it's supplementary frequencies 4125 and 6215 kHz) is the International Distress frequency for what?
Voice
What is a weakness in an information system, system security procedures, internal controls or implementation that could be exploited?
Vulnerability
What is a formal description and evaluation of vulnerabilities of an information system?
Vulnerability Assessment