Exam Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

If an RF carrier is 100 percent AM modulated, what will be the RF output when the modulating signal is (a) at its negative peak and (b) at its positive peak?

(a) 0 (b) 2 times the amplitude of the unmodulated carrier

Individuals desiring to present a personal appeal must request a DOHA hearing within how many days of receipt of the Letter of Denial?

10 days

Following an unfavorable security determination, a request to re-establish eligibility may be submitted after a reasonable passage of time, normally a minimum of how many months after the concluding unfavorable determination either by PSAB is appeal rights were exercised?

12 months

Which frequency is for world-wide use when communicating with enroute aircraft participating in SAR operaitons?

123.1 MHz

How many interrupt request lines (IRQs) are there in a PC environment?

16

If a corner-reflector antenna is horizontally polarized, its radiation pattern will take on what shape?

A narrow beam in the vertical plane

In the radio frequency carrier shift system, translation of an RF signal to an audio signal is done by which of the following equipment?

A radio receiver

To measure shaft rotation rate on an engine, you should use, which, if any of the following instruments?

A tachometer

If you desire to delete an existing DCS circuit, you should submit what type of request?

A telecommunications service request

A(n) ____ is a device that accepts wireless signals from multiple nodes and retransmits them to the rest of the network.

Access Point

There are two types of communications satellites. What type acts as a repeater for the signal?

Active

An antenna which is designed especially for vertically-polarized ground waves at low frequencies is the _______

Beverage Antenna

In order to ensure effectiveness how often are DON IA policies and procedures required to be reviewed?

Annually

Operations like adding and multiplying are performed by what section?

Arithmetic Logic

What are the two most familiar of the procedure oriented languages used for scientific or mathematical problems?

BASIC and FORTRAN

Data is represented by which of the following means?

By symbols

What embodies incident detection and response?

Computer Network Defense (CND)

What always precedes geographic address groups?

Conjunctive address groups

Computers have an advantage over typewriters in what area?

Correcting errors

The loss of program files has which of the following loss potentials?

Cost to reconstruct files

Which of the following terms is used to describe what occurs when two nodes start transmitting at the same time?

Collision

Energy is fed to a parasitic element using what method?

Inductive coupling

The TRIGGER and LEVEL controls are used to synchronize the sweep generator with what signal?

Input

A measurement of the voltage to current ratio (E in/I in) at the input end of a transmission line is called the ______

Input Impedance

What is potentially more serious than the external threat because perpetrators of malicious activity or inadvertent mistakes do not have to penetrate multiple layers of defense and may have authorized access to systems

Insider threat

An ordinary ohmmeter is unsuitable for measuring insulation resistance for which of the following reasons?

Insulation resistance values are too great for an ohmmeter to measure

What supports protection of information against unauthorized modification or destruction?

Integrity

_____ refers to the soundness of a network's programs, data, services, devices and connections.

Integrity

A(n) _____ is a message to the computer that instructs it to stop what it is doing and pay attention to something else.

Interrupt Request, IRQ

In conducting a scheduled inspection, which of the following is normally the first step?

Interviewing the AIS personnel

A network or part of a network that uses browser-based services to exchange information within an enterprise is known as a(n) _____

Intranet

What uses the same web browsers and other software and the same TCP/IP protocol as the public Internet, but exist as a portion of a company's private network?

Intranet

To coat magnetic disks, what magnetizable recording material is used?

Iron oxide

In which of the following ways does smoke affect a computer?

It causes buildup on disks and disk drives

As the frequency of signal is increased, what change can be noted about its wavelength?

It decreases

Locating a near-synchronous satellite is rather simple for which of the following reasons?

It has a slow relative motion

Which of the following is a characteristics of a comprehensive inspection plan?

It is action oriented

Which of the following is known as a label-based access control method and is hardcoded into a device?

DAC

AGC circuitry within a receiver uses a portion of which of the following detector voltage components as a feedback signal to preceding stages?

DC

What traffic shall have absolute priority over all other transmissions?

Distress

Which of the following devices is used in Token Ring networks as the central device?

MSAU

In AIS security, risks are usually expressed in which of the following terms?

Dollars

Of the following communications system components, which one is a device that is nonradiating, absorbs RFm and has the characteristic impedance of the antenna?

Dummy load

In pulse modulation, what term is used to indicate the ratio of time the system is actually producing RF?

Duty cycle

What is the type of memory chip used for most of the main memory in a modern PC?

Dynamic RAM (DRAM)

Who manages NAVCIRT?

FIWC

On an ohmmeter, which of the following switches allows selection of AC or DC readings?

FUNCTION

The primary advantage of phase modulation over frequency modulation is that phase modulation has better carrier ______

Frequency stability

Sending a message on several frequencies at one is an example of which of the following transmission types?

Frequency-diversity

All transmission lines must have two ends, the input end and the output end. What other name is given to the input end?

Generator end

What are computers called that combine the functions of both analog and digital?

Hybrid computers

Semiconductor storage has which of the following drawbacks?

It is volatile

The most frequently changed element of a cryptosystem is known by what term?

Primary cryptovariable

On networks that run NetBIOS over TCP/IP, the _____ utility can provide information about NetBIOS statistics and resolve NetBIOS names to their IP addresses.

Nbtstat

Overal sensitivity of a receiver is limited by which of the following factors?

Noise

Wherever AIS equipment is used for processing classified information, which of the following instructions should be used for applying physical protection and security policy?

OPNAVINST 5239.1

The use of an intrusion detection system (IDS) in a protective program is covered in which of the following instructions?

OPNAVINST 5510.1

What must you do to replace a system board in a given notebook computer model?

Obtain an exact replacement for the board being removed

Heterodyning action in a plate modulator takes place in what circuit?

Plate

Which layer formats data to be presented to the application layer?

Presentation

Manual gain lets you adjust a receiver for maximum sensitivity and amplify weak input signals. Which of the following internal sections of the receiver are varied by this control?

Radio frequency

Which of the following types of energy CANNOT be seen, heard, or felt?

Radio waves

Which of the following is a valid boot option when using Windows 2000 and Windows XP Professional distribution CDs to start the system?

Recovery Console

Describe the Internet Layer's function

Solves the problem of sending packets across one or more networks

A lack of efficiency in a communications division is a direct reflection of the management skills of which of the following individuals?

Senior supervisor

Who is responsible for examining operational logs, monitoring equipment alignment and operation, and preventing message backlogs?

Senior watch supervisor

Which mandate was enacted to preclude the initial granting or renewal of security clearance eligibility by the DoD under specific circumstances?

Smith Amendment

Which type of malicious computer activity exploits people's human nature to fool them into providing information about themselves, their business, or their computer or network?

Social Engineering

What is the most popular generic term for computer programs?

Software

What term is used for programs such as assemblers, compilers, operating systems and applications programs?

Software

What is the term given to arranging records in a predefined sequence or order?

Sorting

Which of the following is used to identify a wireless network?

SSID

Which of the following protocols is used to secure HTTP transactions on the Internet?

SSL

In a FSK transmitter, what stage is keyed?

The oscillator

To ensure frequency stability in a CW transmitter, you should NOT key what circuit?

The oscillator

What component in a magnetic microphone causes the lines of flux to alternate?

The diaphragm

Which of the following types of PC cards are commonly used for devices such as network adapters, sound cards, and modems in laptops?

Type II

Which PCMCIA slot type can handle all the different PC card device formats?

Type III

Who will most likely be tasked with ensuring the individual is squared away and ready for XOI, Captain's Mast or court-martial?

Work Center Supervisor

Which of the following portions of the frequency spectrum contains the highest frequency?

X-Ray

Which type of threats describes state-sponsored computer network attack or espionage?

Third Generation

Why are communications satellite earth terminals generally located in areas remote from the actual users?

To minimize RF interference

What is the mission of naval communications?

To provide reliable, secure and rapid communcations

In a spark-gap modulator, what is the function of the pulse forming network?

To rapidly discharge stored energy

What is the usual speed range (in feet per minute) of a chronometric tachometer?

0 to 3,000

The output level meter of a signal generator reads 0.10 with the attenuator set to 080.0. What is the actual output in microvolts?

08.00

What is the recommended clear distance and the maximum angle specified for IrDA printer connections?

1 meter, 15º

When administering the advancement exam you must have a ratio of how many proctors to candidates?

1 to 25

The greatest hazard from thermal effects appears to come from equipment operated in which of the following frequency ranges?

1 to 3 gigahertz

In what year were the core values re-evaluated and redefined to become Honor, Courage and Commitment?

1991

An antenna with which of the following radiation resistance values will exhibit reduced efficiency?

39 Ohms

The keyer in a radio frequency carrier shift system is normally adjust for which of the following maximum frequency spreads?

850 Hz

What maximum number of disk should be stacked horizontally?

10

Which US Navy Regulations article states that if a person delegates authority, they shall not be relieved from any responsibility imposed upon them, and that they shall ensure the delegated authority is properly exercised and their orders and instructions are properly executed?

1022

When was the UNIVAC I developed?

1950

The rejection of input frequencies above 900 kilohertz is performed by which of the following circuits?

A low-pass filter

Which of the following properly describes the correct technique for installing thermal compound between a new microprocessor and it's heat sink?

A thin layer on the top of the processor

What is a DoD tool to automatically query government and commercial databases between periodic reinvestigation cycles in order to detect serious, yet unreported, issues of security concerns?

AUTOMATED CONTINUOUS EVALUATION SYSTEM (ACES)

To change sound energy into electrical energy, which of the following devices should you use?

A microphone

To make an inductance measurement on the model 250DE, you must first adjust the DET GAIN control to what position?

2

What is the maximum number of channels available when you are using the emergency portable transceiver covered in Chapter 5?

2

Material in the administrative file must be retained for what minimum time?

2 years

What is the typical speed of data transfers for hard-wired, network printers?

10/100/1000 Mbps

The first successful communications satellite for business applications was launched in what year?

1965

The usual range of rotational speed for floppy disks is what?

300 to 400 rpm

Frequency division multiplexing systems transmit and receive during a maximum of how many degrees of a sine wave?

360

As a guideline for risk analysis, which of the following FIPS publications should you use?

FIPS PUB 65

What method is normally used to transmit graphs electronically?

Facsimile

Which of the following programs must be compatible with the operating system in use?

Applications

Which of the following terms correctly describes the loss of signal while it travels down a particular medium?

Attenuation

What are the two major sections of an AM transmitter?

Audio frequency unit and radio frequency unit

An e-commerce website is using digital certificates. Which part of authentication, access control and auditing (AAA) is provided by these certificates?

Authentication

What supports verifying the identity of an individual or entity and the authority to access specific categories of information?

Authentication

What label is used to identify a test instrument that is within tolerance on all parameters?

CALIBRATED

A test instrument that has plug-in modules and/or easily accessible potentiometer or controls which affect the calibration of the instrument should have which of the following labels attached?

CALIBRATION VOID IF SEAL BROKEN

Which command line statement is used to move between directories?

CD

What drives are relatively high-capacity, removable-media, optical drives?

CD and DVD drives

Which of the following media access methods is utilized in 802.11b wireless networks?

CDMA/CA

Who is responsible for developing US military policy, positions and concepts supporting CND and IA?

Chairman of the Joint Chief's of Staff

The first art of a computer instruction, which answers the question what, is known by which of the following terms?

Command or operation

Who is responsible for ensuring a visitors eligibility, access and affiliation data are current and accurate in JPAS before allowing in a classified space?

Command sponsoring the visitor

What are the three types of authority within the Navy?

Command, General and Organizational

Who shall ensure the integrity, confidentiality, authenticity, availability and non-repudiation of information and information systems supporting Marine Corps operations and assets?

Commandant of the Marine Corps

Who has full responsibility for the internal handling of message traffic within the ship?

Commanding Officer

Who is responsible for day-to-day PSP management?

Commanding Officers

The importance given by the CO determines the effectiveness of what?

Commands security program

Who directly supervises all radiomen on watch in the message processing area and its responsible for notifying the CWO and SWS on any unusual or urgent matters?

Communications Center Supervisor

What command line statement is used to convert a FAT 32 partition to a NTFS partition in a Window XP system?

Convert C:/FS:NTFS

The field of research that is developing computer systems which mimic human thought in a specific area and improve performance with experience and operation is what field of research?

Artificial Intelligence

Which of the following electronic devices is used to radiate and/or collect electromagnetic waves?

Antenna

An increase of invulnerability to jamming of satellite communications systems is seen through the use of which of the following features?

Anti-jamming modulation techniques

What cable manages the bulk of the traffic on a network?

Backbone

What term refers to the cable that forms the main trunk of a network?

Backbone

A _____ is a record of how the network operates under normal conditions.

Baseline

The initial operating conditions of newly installed equipment are referred to as ______

Baseline operating characteristics

A large volume of light radiating in a given direction is referred to as a ____

Beam

The internal processing speeds of third generation computers are measured at what speed?

Billionths of a second

Data is stored in computers in what form?

Binary

_____ occurs when a hacker forges name server records to falsify his host's identity.

DNS spoofing

All PSIs requested to support eligibility determinations on DON employees are forwarded to who, when complete for adjudication?

DON CAF

You can use the _____ utility to free up hard drive space by removing temporary Internet files, installed components, and unused programs?

Disk Cleanup

What requires that all personnel with privileged access to DON information systems and networks, and Designate Approving Authorities (DAA's), shall receive training and be certified for their position?

DoDD 8570.1

In the process of any type of troubleshooting effort, what should you do after you've identified a problem and repaired it?

Document the steps you've performed

What type od printers are used to print continuous feed, multipart forms?

Dot Matrix Printer

Which of the following printers can produce photographic quality, continuous tone images?

Dye-sublimation printer

What does network management enable based on priority, system status and capacity?

Dynamic Rerouting

If a 28 volt 6 ampere fuse blows, the proper procedure is to replace it with which of the following devices?

A fuse of the same voltage and current rating

The action of the double-button carbon microphone is similar to which of the following electronic circuits?

A push-pull amplifier

A display similar to this A> means what in computer terminology?

A prompt

You can determine if a piece of test equipment has been calibrated by checking which of the following documents?

A tag or label attached to the instrument

Which of the following is another (and official) name for IDE and EIDE drives?

ATA

What control on the front panel of an oscilloscope limits the input signal amplitude and allows the oscilloscope to be used with a wide range of signals?

ATTENUATOR

What is the opportunity to make use of an information systems (IS) resource?

Access

A network's _____ iw its method of controlling how network nodes access the communications channel.

Access Method

When maintenance personnel are not authorized to make repairs to a piece of test equipment, what items, if any, must be sent to the calibration repair facility with the equipment?

All accessories

The impedance matching of equipment to transmission line is accomplished by which of the following equipment groups?

An antenna coupler

Describe the Transport Layer's function

End-to-end connections and reliability, flow control

Describe the Transport Layer's function

End-to-end message transfer capabilities

What should be used to determine which procedures and security features are appropriate?

Costs and Benefits Analysis

A(n) ____ is in distinct communication path between nodes.

Channel

A _____ is a place where the computers, devices and connectivity necessary to rebuild a network exist, but they are not appropriately configured, updated or connected.

Cold Site

How does a two gap head allow for increased speed?

By checking while writing

What supports the protection of both sensitive and classified information from unauthorized disclosure?

Confidentiality

Frequency-shift keying is generated using which of the following methods?

By shifting the frequency of an oscillator at an AF rate

CDP is found at what layer of the OSI model?

Data link

Who has formally responsibility for the secure operation of information systems within his/her area of responsibility?

Designated Approving Authority (DAA)

IA Publications are maintained by?

Director of COMSEC

What group of related items form a record?

Fields

_____ is equivalent to using wildcards in Windows and DOS.

File Globbing

_____ refers to the capability of a server to share data files, applications, and disk storage space.

File Services

In a single-sideband transmitter, selection of the desired sideband and suppression of the other is done by which of the following components?

Filter

Which of the following categories of AIS media is permanent in nature and is retained for a period of more than 180 days?

Finished

What is a low-capacity, removable media, magnetic-storage device?

Floppy Drive

If conversion of the digital signal to be transmitted were not carried out, it would degenerate and become what?

Garbled

Which of the following devices works at layer seven of the OSI model?

Gateway

One of the following network devices forwards the data it receives on a port to all other connected ports. Identify the device from the following:

Hub

An FM signal has which of the following characteristics when compared to an AM signal?

Less static

What type of kernel structure does the Apple OS-X operating system employ?

Linux Kernel

What is the objective of IA in a defense-in-depth strategy?

Management of risk

What type of authority is the authority that allows a person to step in and take over when action is required?

Moral

Describe the Application Layer's function

Network process to application

Which INFOCON level is described as a normal readiness of DoD information systems and networks?

Normal

Who is authorized to send PERSONAL FOR messages?

Officers of flag rank or in a command status only

DAA Authority is limited to whom?

Officers of the grade O-6 or above and civilians of grade GS-15 or equivalent

To better organize and manage objects, a network administrator places objects in _____

Organizational Units

What is the designation of security spaces requiring access control?

Restricted area

Which of the following types of AGC voltage drives an amplifier toward cutoff?

Reverse

What type of memory is available in access times of 2ns or less?

SRAM

In an AM signal that is 100 percent modulated, what maximum voltage value is present in each sideband?

Same as the carrier voltage

What is any information the loss, misuse or unauthorized access to, or modifications of which could adversely affect the national interest?

Sensitive Information

Who is responsible for assigning responsibilities for overall management of the Personnel Security Policy (PSP)?

The Chief of Naval Operations, Special Assistant for Naval Investigative Matters and Security (N09N)

Weather charts and photographs are examples of materials transmitted by ______

FAX (Facsimile)

What determines the bandwidth of an AM wave?

The number of sideband frequencies

Changes in receiver input strength due to changing atmospheric conditions is described by which of the following terms?

Fading

____ is the capacity for a component or system to continue functioning despite damage or partial malfunction.

Fault tolerance

Programs that are tailored to certain needs and permanently installed in ROM by the manufacturer are called what?

Firmware

What precedence is assigned to a message that is of such urgency that it must be brief?

Flash

Which laser printer subsystem is responsible for bonding toner to the paper?

Fuser assembly

Wide area networks are sometimes referred to as which of the following networks?

Global

What is the biggest key to maintaining accountability?

Good leadership

Within a flowchart, what type of symbols are used to specify arithmetic operations and relational conditions?

Graphic symbols

Aid in restoring downed fleet communications channels is furnished on a not-to-interfere basis by which of the following networks?

HICOM

The components or tools of a computer system can be grouped into what two categories?

Hardware and software

Who manages IA for the command under the DAA?

ISSM

The "ratio of transmitted powers" provides what information?

Improvement shown using FSK instead of CW transmission methods

Where is system hardware configuration information stored in a notebook PC?

In the CMOS

The initial waves that travel from the source to the load of a transmission line are referred to as what type of waves?

Incident

What printer type produces print by squirting ink at the page?

Inkjet

In communications, what name is given to those devices that serve to interconnect?

Interface elements

Describe the Session Layer's function

Interhost communication

Routing occurs at what layer of the TCP/IP model?

Internet

What provides information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access to, use disclosure, disruption, modification or destruction of information or information systems?

Information Assurance (IA) Policy

What is designed to provide positive control of the vulnerability notification and corrective action process within DoD?

Information Assurance Vulnerability Management (IAVM) process

What focuses on affecting human decision processes to achieve friendly objectives?

Information Operations

The Global Maritime Distress and Safety System is administered by who?

International Maritime Organization (IMO)

Where will sensitivity and IT position determinations be recorded?

JPAS

Interference detected by a receiver is often caused by the application and removal of power in nearby transmitters. This interference can be prevented by using what type of circuit in such transmitters?

Key-flick filter

What is a drawback to the specialization of a special purpose computer?

Lack of versatility

Whar defines storage that retains the data even when no power is supplied to the computer?

Non-volatile

To improve performance and operation, you should provide feedback to all but which of the following people?

Technical Administrator

Who is responsible for maintaining the status board which displays equipment, nets and circuit information?

Technical Control Supervisor

Composing a message and selecting the proper classification and precedence is the responsibility of what individual?

The drafter

In CW demodulation, the first requirement of the circuit is the ability to detect ______

The presence or absence of the carrier

The process of recovery will be carried out more effectively and economically if handled by which of the following personnel?

The users and AIS staff

What is the purpose of a variable potentiometer mounted on the VOLTS/DIV control of an oscilloscope?

To provide definite step control of the input signal

Which of the following antenna arrays consists of quarter-wave, vertically polarized stubs?

Triatic

On an open-ended transmission line that is carrying an ac signal, what is the total number of moving voltage waves?

Two

To accurately reproduce a modulating signal in a pulse modulated system, what minimum number of samples must be taken per cycle?

Two

What number of signatures is/are required in the COMSEC watch to watch inventory sheet?

Two

When selecting a specific remedial measure, a total of how many criteria should be used?

Two

Which of the following areas cause the majority of all network related problems?

User actions

Commands built into the operating system that control actions, like diskcopy and rename are what type of commands?

Utility

Under what circumstances should the USER CALIBRATION label be affixed to a piece of test equipment?

When user calibration is required before, during and after use

What one assumption may be made regarding all military radio transmission?

They have been intercepted

Amplifier tubes are added to the output of a transmitter for which of the following reasons?

To increase power

What is the purpose of a shunt in a DC ammeter?

To increase the current range of the meter

What does it mean when the computer displays a prompt on the screen?

You can tell the computer what to do next?

An oscilloscope measures voltage and displays waveforms. It can be used to measure currents, temperatures, speeds and accelerations if they are first converted to ______

Voltages

To test electrical activity, you will need which of the following pieces of test equipment?

Voltmeter

One of your customers has bought a new wireless access point. Which of the following options should you configure to make the network most secure?

WPA2

Which of the following is one of the more widespread uses of the computer in the Navy?

Word processing

When a carrier is phase-shift keying modulated, (a) a date bit ONE will normally cause the carrier to shift its phase what total number of degrees, and (b) data bit ZERO will cause the carrier to shift its phase what total number of degrees?

(a) 180 (b) 0

In phase modulation, (a) the AMPLITUDE of the modulating signal determines what characteristic of the phase shift, and (b) the FREQUENCY of the modulating signal determines what characteristic of the phase shift?

(a) Amount (b) Rate

In an FM signal, (a) the RATE of shift is proportional to what characteristic of the modulating signal, and (b) the AMOUNT of shift is proportional to what characteristic?

(a) Frequency (b) amplitude

In the collector injection modulator, AF and RF are heterodyned by injecting the RF into (a) what circuit and the AF into (b) what circuit?

(a) base (b) collector

How much voltage is discharged from the EP drum in a laser printer by the laser beam that scans the drum with the information about the image?

-100 volt

If classified material material must be jettisoned during emergency destruction, what should be the minimum depth of water?

1,000 fathoms

Your voltmeter has four ranges: 1V, 10V, 100V, and 1,000V. To measure an unknown voltage in an amplifier you should first select which range?

1,000V

In a dual trace oscilloscope, the gate that controls both sweeps is controlled by a multivibrator that operates at which of the following maximum frequencies?

1,200 kHz

What is the minimum percentage to be used in calculating the available resources for the network?

10

A Cat 3 (10BASE-T) transmission media can support up to what speed of transfer?

10 Mbps

An operation commander may authorize a delay of no more than how many days in the administration of examinations for sea going or aviation units operating in company or based outside continental US, provided candidates have no means of communication with personnel who take the examination in the interim?

10 days

Approximately how many days prior to the advancement examination should the ESO review the worksheet for each candidate?

10 days

The scope of an SSBI covers the most recent _____ years of the subjects life or from the 18th birthday, which ever is the shorter period.

10 years

A floppy disk will accept what relative humidity range?

10% to 80%

What is the minimum input voltage, in millivolts, required for a ratio detector?

100

A Cat 5 transmission media can support up to what speed of transfer?

100 Mbps

What is the maximum length of a UTP cable segment ina 10Base-T star network?

100 meters

The flashing rate of the strobotron tube affects its life expectancy. What i the range (in hours) of life expectancy of the strobotron tube?

100 to 250

A Cat 6 transmission media can support up to what speed of transfer?

1000 Mbps

Of the following available RF wattmeter power ranges, which one should you select when measuring an unknown power?

1000 watts

Which US Navy Regulations article addresses abuse of authority and forbids persons in authority from injuring their subordinates by tyrannical or capricious conduct or by abusive language?

1023

An 802.11b wireless Ethernet transmission can support up to what speed of transfer?

11 Mbps

Which USN Regulation article states "Persons in the DON, without proper authority, shall not have in their possession, obtain, sell, publish, give, purchase, receive or reproduce any examination paper, or any copy there of, or answer sheet thereto, for any examination whatsoever which has been, is or is to be, administered with in the DON"?

1145

Presidential support duties personnel must have been the subject of a favorably adjudicated SSBI completed within how many months preceding selection?

12 months

How many devices can be attached to a single Universal Serial Bus (USB) host?

127

Which of the following IP addresses is used as a loopback address?

127.0.0.1

What is the total bandwidth of an ISDN BRI connection when both data channels are used?

128 Kbps

What is the minimum temperature required to activate an automatic sprinkler system?

135ºF

You are helping a nontechnical user over the telephone and you need to have the user plug in the SVGA monitor. How would you describe the connector and number of pins in the SVGA connector?

15-pin, 3-row, D-shell

When was the first mechanical adding machine invented?

1642

Which of the following is a valid APIPA address?

169.254.0.1 with a subnet mask of 255.255.0.0

The Policy Coordinating Committee is composed of how many interagency committees established by the National Security Presidential Directive to coordinate interagency national security policy issues?

17

One earth terminal antenna uses a cluster of four 10 foot parabolic antennas. This array is effectively a total of how many feet in diameter?

18

What year did electronics enter the computer scene?

1919

Which of the following is a class C address?

193.10.160.45

Mnemonic instruction codes and symbolic addresses were developed early in what decade?

1950s

When you are testing a transistor with a transistor tester, for the reading to have ±15 percent accuracy, the resistance from emitter to base must be what minimum value?

300 Ohms

Which frequencies are common to both the Aeronautical Mobile (Route) Service (Aem(R)) and the Aeronautical Mobile (Off-Route) (Aem(OR)) Service and are available to all mobile units at the scene of a search and rescue operation, and by fixed stations for communicating with aircraft proceeding to or from a search and rescue scene?

3023 kHz and 5680 kHz

When you are using the five-unit code in teletypewriter operation, what is the maximum number of combinations available that will print letters, figures, function signs and numerals?

32

You are using five 80 Gb hard disks in your file server to configure RAID-5. What will be the maximum capacity of the RAID be after the configuration is complete?

320 Gb

Tests show that electromagnetic or acoustic emanations from AIS hardware may be intercepted up to a maximum of how many yards away?

325

How many layers are in the TCP/IP model?

4

The axes of the CRT display on the Tracker 2000 are divided into what number of quadrants?

4

You need to allow only secure Internet traffic in and out of your company network. Which of the following ports would you open on the firewall?

443

The UPS battery supply can support a facility load for a maximum of how many minutes?

45

The process of heterodyning tales place in which of the following receiver circuits? If the following frequencies, which one is a typical value of IF for Am communications receivers?

455 kilohertz

To establish a termination with NCTAMS or NAVCOMTELSTA, a ship must send a request what minimum time in advance?

48 hour

How many award points is the Navy Cross worth on the Navy wide advancement?

5

When making base to emitter bias voltage checks on a transistor, you should read which of the following voltage ranges?

5 to 20 microvolts

The designated security manager of a command must have favorably adjudicated SSBI or SSBI-PR completed within the past?

5 years

What frequency does the 802.11a standard use to conduct wireless network connectivity?

5.2 GHz

What is the recommended maximum length of an RS-232 cable?

50 feet (15 meters)

In spanning-tree, how long does it take a port to go from the blocking state to the forwarding state?

50 seconds

In actual practice, the characteristic impedance of a transmission line is usually within which of the following resistance ranges?

50 to 600 Ohms

With average program mixes, cache memory can yield what percent increase in processing speed?

50%

A one hop transmission of a tropo-scatter system can travel what maximum distance?

500 miles

Meggers with which of the following maximum voltage ratings are commonly found in the fleet?

500 volts

Typically, floppy disks will operate only in what temperature range?

50º to 100ºF

An 802.11a wireless Ethernet transmission can support up to what speed of transfer?

54 Mbps

An 802.11g wireless Ethernet transmission can support up to what speed of transfer?

54 Mbps

Which of the following frequency bands is used by 802.11a?

5GHz

The lengths of magnetic tapes used with computers have what range?

600 to 3,000 feet

What is the speed range of a magnetic drum?

600 to 6,000 rpm

In OSPF, what is the cost of a T1?

64

Hom many layers are in the OSI model?

7

After successful administration of the advancement examination, how long does the command have to forward the exams for grading?

7 days

The time interval between words when using the Morse code is equal to which of the following durations?

7 dots

A floppy disk surface has what maximum number of tracks?

77

When making ground signals you shoudl make them not less than how long in length?

8 feet

What are the most common tape densities in bits/bytes per inch?

800 to 1,600 bpi

Which of the following wireless IEEE standards uses a radio frequency of 2.4 GHz with a data transfer speed of 11 Mbps?

802.11b

What type of wireless communication is typically carried out directly between portable PC's?

802.11x

Which of the following is used to identify traffic from different VLANs?

802.1q

Which of the following can be used to check the operation of a network adapter card?

A TCP/IP Loopback test

The vulnerability of a ship or aircraft can be determined by which of the following means?

A TEMPEST vulnerability assessment

A laser printer is printing faded text in your documents. The toner cartridge has just been replaced and is not the problem. What is most likely the problem?

A bad transfer corona wire

Each of the individual electronic circuits on a silicon chip is called what?

A bit cell

Which of the following items should be used to clean dust out of the interior of a desktop PC?

A can of compressed air

In computer terminology, what is called a file?

A collection of records

Which of the following power sources is/are considered a practical choice for satellites?

A combination of solar cells and storage batteries

To change an RF signal to do pulses for teletypewriter conversion, you must use a receiver and what other piece of equipment?

A converter

When many magnetic cores are strung together on a screen of wire, what type of plane is formed?

A core plane

The most common means of obtaining a low-radiation angle from a vertical quarter-wave antenna is by what procedure?

Adding a ground plane

_____ is a Network layer protocol that obtains the MAC address of a host, or node, then creates a database that maps the MAC address to the host's IP address.

Address Resolution Protocol

The _____ account is a predefined user account that has the most extensive privileges for resources both on the computer and on the domain that it controls.

Administrator

What user group must you be a member of to install a non-hot-swappable device in a Windows XP system?

Administrators

What is defined as a removal from employment, suspension from employment of more than 14 days, reduction in grade, reduction in pay or furlough of 30 days or less?

Adverse Action

Portable radio sets are used primarily for which of the following types of communications?

Amphibious

A tone modulated radio teletypewriter system uses what modulation method to change DC mark and space impulses into audio electrical impulses?

Amplitude

A wave's _____ is a measure of its strength at any given point in time.

Amplitude

The direction in which the D'Arsonval meter pointer deflects depends on what characteristic of the current applied to the coil?

Amplitude

Vectors are used to show which of the following characteristics of a sine wave?

Amplitude

The method of RF communication that uses either the presence or absence of a carrier in a prearranged code is what type of modulation?

Amplitude modulation

In logic probes, which of the following devices is used as an indicator?

An LED

Transmitted RF energy takes what form as it is sent into space?

An electromagnetic field

The flashing rate of the strobotac is controlled by which of the following circuits?

An electronic pulse generator

Which of the following does an 802.11a Access Point use for secure (closed) authentication?

An encryption key

Which of the following meters is recommended for circuit continuity tests?

An ohmmeter

What is a rogue AP?

An unauthorized AP that is installed to facilitate the capture of information

Mechanical computers are what type of devices?

Analog

Of the following equipment which one changes teletypewriter DC pulses to mark and space modulation for the transmitter carrier wave?

A keyer

Which of the following signal generators should you select to test audio equipment?

AF signal generator

To automatically compensate for input signal strength variations within a receiver, which of the following types of circuits are added?

AGC

Which of the following expansion ports is always used for a high speed, high resolution, 3-D graphics video adapter?

AGP

To calculate a host's network ID given its IP address and subnet mask, you follow a logical process of combining bits known as _____

ANDing

Through the cooperation of several manufacturers, what a-bit code was developed for transmitting and processing data?

ASCII

When a software problem is researched, which of the following items is the most important?

Abort code

Laser transmissions during adverse weather conditions experience which of the following problems?

Absorption

What is defined as the ability and opportunity to obtain knowledge of classified information?

Access

Which type of conflict management style attempts to resolve the conflict by giving in to the other party?

Accommodating

What is the process of tracing information system activites to a responsible source known as?

Accountability

What is the formal declaration by a DAA that an information systems is approved to operate in a particular security mode at an acceptable level of risk?

Accreditation

What is the formal declaration by the DAA that an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk?

Accreditation

Trying a number of possible character combinations to find the key that will decrypt encrypted data is known as a _____

Brute Force Attack

Using a very thin crystal made of semiconductor material, what type of memory can be created?

Bubble

Errors caused by faulty logic and coding mistakes are referred to as what?

Bugs

What is the most efficient means of destroying classified material?

Burning

A computer's _____ is the circuit, or signaling pathway, used by the motherboard to transmit date to the computer's components, including its memory, processor, hard disk, and NIC

Bus

What network topology connects each computer on a network to the next computer in a linear fashion?

Bus

Which of the following network topologies does not allow you to add or remove computers without affecting the network?

Bus

A WAN in which each site is directly connected to no more than two other sites in a serial fashion is known as a _____

Bus Topology WAN

A final RF power amplifier biased for plate modulation operates in what class of operation?

C

The LCD display on a portable computer is powered by?

low-voltage DC

Which command shows you the current IOS that is in use on a router?

show version

When you use a vector to indicating force in a diagram, what do (a) length and (b) arrowhead position indicate?

(a) magnitude (b) direction

Which US Navy Regulation articles states "All persons in the Naval service are required to obey readily and strictly, and to execute promptly the lawful orders of their superiors"?

1132

A device used to radiate or receive electromagnetic wave energy is referred to as a/an _______

Antenna

Which of the following colors should be used to make pen and ink corrections to NWPL publications?

Any dark color except red

Which layer represents the services that directly support users?

Application

Who must be a US citizen, and either officers, enlisted persons E-6 or above, or civilians GS-6, or above and designate in writing?

Assistance Security Manager

_____ is an ITU networking standard describing Data Link layer protocols for both network access and signal multiplexing.

Asynchronous Transfer Mode

A laser operates in which of the following areas of the light spectrum?

At or near visible light

What is the preferred frequency at which the inspection team should convene to review progress and compare notes?

At the end of each day's activity

To prevent a transmitter from being loaded unnecessarily, where should you connect the antenna?

At the power-amplifier input

Which of the following terms is used to describe the decrease in signal strength measured in decibels per 100 feet?

Attenuation

"...the power to command, enforce laws, exact obedience, determine or judge." is the SORN definition of what?

Authority

Who has the final authority to withhold a privilege?

Authority empowered to grant that privilege

Which Windows 2000/XP service automatically delivers security updates, critical updates, and service packs to help protect computers against viruses and other security threats?

Automatic Updates

As an I/O control clerk, you can be expected to operate a variety of equipment, such as copying machines, and terminals. These are known as what type of equipment?

Auxiliary

When a program is so large and complex that it exceeds the memory capacity of a stored program computer, where is the overflow stored?

Auxiliary memory

What supports timely, reliable access to data and information systems for authorized users, and precludes denial of service or access?

Availability

Which type of conflict management style attempts to ignore conflict rather than resolve it?

Avoiding

In the computer world, what method provides a means to ensure that any data lost can be recovered?

Backup files

Spectrum analysis is used to view which of the following characteristics of an RF signal?

Bandwidth

in time division multiplexing, what drawback is encountered if an excessive number of frequency channels is used?

Bandwidth is increased

What type of connector is used to link two segments of cable in a straight run?

Barrel

A(n)_____ consists of the objects, classes and properties a networktypically needs.

Base Schema

The control grid modulator is similar to which of the following modulator circuits?

Base-injection

Filters applied early in the transmission are known by which of the following terms?

Baseband

The communications channel that uses the basic frequency band of radio waves and a coaxial cable is what type?

Baseband

The power required to operate a basic ohmmeter comes from which of the following sources?

Batteries

When you are referring to the unit of teletypewriter signaling speed, the reciprocal of the time (in seconds) of the shortest signal element is described by which of the following terms?

Baud rate

The FOCUS control on the front of an oscilloscope is used to adjust what characteristic on the CRT display?

Beam size

To notify a system administrator when there is a problem with the machine the POST uses what?

Beep Codes

When is a packet processed by an inbound access list?

Before it is sent to an outbound interface

To send commands to devices not under direct command of the control section, what type of instructions are used?

Control

What part of the computer dictates how and when each specific operation is to be performed?

Control section

Skin effect is classified as which of the following types of loss?

Copper

What is the most common method of creating a back up for a microcomputer?

Copying the disk onto a magnetic tape

In AIS security terminology, the controls to lessen or eliminate known threats and vulnerabilities are called _______

Countermeasures

In a manual telegraph circuit, the only two connections are marking and spacing. Marking is characterized by which of the following descriptions?

Current is flowing

An individual who is responsible for safeguarding and accounting for classified material is known by what term?

Custodian

Which of the following files are used in NWPL maintenance?

Custody and administrative files

When checking the power supply unit with a digital multimeter, it should be set to?

DC Voltage

______ rearranges noncontiguous files into a more efficient, contiguous arrangement on the disk.

DEFRAG

What command-line utility can be used to rearrange the data on an HDD so that it is located in contiguous, efficient links?

DEFRAG.EXE

IRQ values for a device may be set through software or manually by which of the following ways?

DIP switches

DON IT systems are registered where?

DON IT Registration Database

Who is the only entity that can authorize temporary access for SCI?

DONCAF

In the character at a time impact printer class, which printer has the most professional looking, pleasing to the eye print?

Daisy-wheel

What is the best type of cleaning tool for use on the exterior of computer components?

Damp Cloth

What type of software allows you to enter data and then retrieve it in a variety of ways?

Data Management

Which of the following terms describes the prevention of files from being updated by more than one user at a time?

Data integrity

Which layer provides error free transmission of information over the physical medium?

Data link

To copy data from one storage location to another and to rearrange and change data elements in some prescribed manner, what type of instructions are used?

Data movement

Describe the Presentation Layer's function

Data representation, encryption and decryption, convert machine dependent data to machine independent data

Who is responsible for deciding appeals of unfavorable personnel security determinations (including SCI access) made by the DON CAF?

Department of the Navy Personnel Security Appeals Board

In minimizing an AIS building's exposure to fire damage, which of the following factors should be considered?

Design and location

If you require a microphone that is lightweight, has a high sensitivity, is rugged requires no external voltage, can withstand temperature, vibration, and moisture extremes, and has a uniform frequency response of 40 to 15,000 hertz, which of the following types of microphones should you select?

Dynamic

What type of authority grows out of the respect a leader commands. It stems from leadership qualities that make others obey, even if no law requires them to do so?

Earned

You have been working on a piece of equipment and your eyes have been exposed to high intensity microwaves. Which of the following types of eye problems may occur?

Cataracts

What is the comprehensive evaluation of the technical and non-technical security features of an information system, and other safeguards to establish the extent that a particular design and implementation meets a set of specified security requirements?

Certification

All IT systems that are under Department of the Navy authority are required to be what?

Certified and Accredited

A(n) _____ is a process or program that provides support personnel with a centralized means of documenting changes to the network/

Change Management System

In teletypewriter operation, what term defines the length of time required to transmit one letter, figure, function sign or numeral?

Character Interval

For a given voltage, what determines the amount of current that will flow in a transmission line?

Characteristic impedance

Which of the following measures is used to represent the printing speed of a dot-matrix printer?

Characters per second

_____ is a fault-tolerance technique that links multiple servers together to act as a single server.

Clustering

Numeric, alphabetic, and special characters are represented in a computer's internal storage and on magnetic media through the use of what kind of system?

Coding

What enables operations and intelligence collection to gather data from target or adversary automated information systems or networks?

Computer Network Exploitation (CNE)

To assure that someone will be alerted to a fire, which of the following alarm locations is recommended as the primary location?

Computer room

Fourth generation technology has which of the following results for the computer industry?

Computers that are significantly smaller and lower in cost

SSB transmissions have which of the following characteristics when compared to an AM transmission?

Concentrated power

Which of the following devices serves as a termination point for a cable running from individual nodes in a network?

Concentrator

The tiny doughnut shaped rings used to make up magnetic core storage are mode of what material?

Ferrite

The ratio of energy radiated by an array in the principal direction of radiation to the energy radiated in the opposite direction describes which of the following relationships?

Front-to-back ratio

Which of the following categories of test equipment is/are designed to test, without modification, a range of electronic parameters needed for two or more systems that are different in design?

GPETE

Two or more circuits within a receiver are varied by a single control through the use of which of the following processes?

Ganged tuning

A(n) _____ facilitates communication between different networks or subnets.

Gateway

What type of authority stems from the requirement to maintain good order and discipline with all matters that affect the efficiency of the command?

General

The phosphor bronze ribbon in the galvanometer serves the same purpose as what component in the D'Arsonval meter?

Hairspring

Of the following terms, which one describes the period of time required for one earth terminal to yield control of a satellite to another?

Handover

Whenever data is transferred between devices, it also involves an exchange of prearranged signals known as what?

Handshaking

What is th eprimary high-capacity storage media for the system?

Hard Disk

Component failures are categorized into which of the following types of faults?

Hard and soft

The _____ lists all computer components proven to be compatible with Windows Server 2003.

Hardware Compatibility List HCL

Which of the following protocols is responsible for addressing hosts in a TCP/IP-based network?

IP

You are receiving an IP address of 169.254.0.0. What utility can you use to find this address?

IPCONFIG

What part of the program must the programmer prepare according to the format required by the language and the computer to be used?

Instructions

Which of the following steps should you take to help ensure that metal case test equipments are safe to use?

Insulate the metal case from the ground

When working on energized equipment, you should follow which of the following practices?

Insulate yourself from the ground

Which of the following terms describes a network of computers and other devices that is confined to a relatively small space, such as one building or even on office?

LAN

Inserting an inductor or capacitor in series with an antenna is one method of electrical length of an antenna. What is this method called?

Loading

THe process by which instructions and data are read into a computer is called what?

Loading

A network consists of various machines linked together within a building or adjacent buildings is what type?

Local Area

What type of network is formed from computers and components in a single office or building?

Local Area Network (LAN)

What does the command line CDKDSK/R statement do?

Locates bad sectors on the disk and recovers readable information

A _____ is the original PC file system that was designed in the 1970's to support floppy disks and later hard disks.

FAT

Which type of file system was the standard file system supported by DOS and Windows 9x/Me?

FAT (File Allocation Table)

Which type of file system was the optional file system supported by Windows 95 OSR2 (OEM Service Release 2) and later?

FAT32 (File Allocation Table, 32-bit)

Which of the following networks is configured in dual rings to provide fault tolerance?

FDDI

_____ is a network technology whose standards were originally specified by ANSI in the mid-1980's and later refined by ISO.

FDDI

FSK has which of the following advantages over CW?

FSK rejects unwanted weak signals

What does POST stand for?

Power On Self Test

Average power in a pulse modulation system is defined as the?

Power during each pulse averaged over one operating cycle

PC tests are stored in ROM are known by which of the following terms?

Power on self tests

When troubleshooting transistorized circuits, you should first check the condition of which of the following circuits?

Power supplies

What field travels through space after being detached from the current-carrying rod of an antenna?

Radiation

What transmission-line loss is caused by magnetic lines of force not returning to the conductor?

Radiation

Who is responsible for preparing and maintaining the communications watch, quarter and station bill?

Radio Officer

What are two types of electrical communications?

Radio and wire

You want to transmit high speed automatic page or tape copy across an ocean area. Which of the following methods should you choose?

Radio-teletypewriter

CW transmissions have narrow bandwidths and a high degree of intelligibility under severe noise conditions. What is the primary Navy use for CW?

Radiotelegraphy

A transmitted electromagnetic wave enters an antenna, induces a voltage into it, and passes that voltage to a receiver. What is this chain of events called?

Reception

The antenna property that allows the same antenna to both transmit and receive energy is _____

Reciprocity

You can make all but which of the following changes to the operating system?

Reconfigure disk drives

What are the primary colors of light?

Red, Blue, Green

When compared to a conventional AM signal, an SSB signal provides which of the following advantages?

Reduced bandwidth

The term _____ refers to an implementation in which more the one component is installed and ready to use for storing, processing or transporting data.

Redundancy

Login procedures that are accomplished by dialing into an access server are known by which of the following terms?

Remote access

At boot, a computer system makes a loud noise, and smoke is seen coming from the unit. What is the first thing you should do?

Remove power from the computer

What network topology connects each computer on a network to the others in a loop or ring?

Ring

To express the cost of a loss or abuse from an adverse event over time, what AIS security term is used?

Risk

In oscilloscopes using electrostatic CRTs, what type of signal is used to produce horizontal beam movement?

Sawtooth wave

Which of the following facsimile transceiver operations consists of subdividing the picture in an orderly manner and into a large number of segments?

Scanning

What is the primary advantage of a rigid coaxial line?

Low radiation losses

What system is used to provide for a standardized recall and scheduling of test equipment into calibration facilities?

MEASURE

Which MILSPERMAN article does the Selective Conversion and Re-enlistment (SCORE) Program fall under?

MILSPERMAN 1160-090

Which MILSPERMAN article does the Selective Training and Re-enlistment (STAR) Program fall under?

MILSPERMAN 1160-100

Which MILSPERMAN article does the Accelerated Advancement Program fall under?

MILSPERMAN 1430-010

What is software transferred from remote systems (normally outside the enclave boundary), then downloaded and executed on a local system without explicit installation or execution by recipient?

Malicious mobile code

Which of the following terms is used for the vehicle through which a wave travels from point to point?

Medium

Satellite down-link frequency variations occur most often from satellites in which of the following orbits?

Medium altitude circular

The first thing that the initialization program checks is which of the following areas?

Memory

The _____ indicates, in hexadecimal notation, the area of memory that the NIC and CPU will use for exchanging, or buffering, data.

Memory Range

The function of the ZERO OHM control on a multimeter is to compensate for which of the following conditions?

Meter battery aging

What should you use to clean an LCD display on a notebook PC?

Mild soap and water on a soft cloth

When making resistance measurements on a transistor with an ohmmeter, you should allow what maximum current in the transistor?

Milliampere

Internal processing speeds of second generation computers were measured at what speed?

Millionths of a second

Third generation computers are characterized by what technology?

Miniaturized circuits

The IF frequency in a receiver is produced by which of the following methods?

MixerHeterodyning

_____ is a software based tool that continually monitors network traffic from a server or workstation attached to the network.

Network Monitor

When a network malfunction is detected, the alarm is sent to which of the following persons?

Network Supervisor

The _____ is a simple Application layer protocol used to synchornize the clocks of computers on a network.

Network Time Protocol (NTP)

The teletypewriter condition where current flow represents a mark and no current flow represents a space occurs in which of the following types of operation?

Neutral

Which of the following is a characteristic of a PCM system that makes it advantageous for use in multiple-relay link systems?

Noise is not cumulative at relay stations

What provides assurance to the sender of data with proof of delivery and to the recipient of the sender's identity, so that neither can later deny having processed the data?

Non-repudiation

The sensitivity level that has the potential for no impact and/or damage as duties have limited relation to the agency mission is known as?

Non-sensitive (NS)

The sensitivity level that has the potential for some to serious impact and/or damage is known as?

Noncritical Sensitive (NCS)

A(n) _____ issues and receives wireless signals with equal strength and clarity in all directions.

Omni-directional Antenna

An isotropic radiator radiates energy in which of the following patterns?

Omnidirectional

Which phase of security education when security procedures for the assigned position are learned?

On the job training

The physical layer is which layer number of the OSI reference model?

One

When you are using a transmitter transfer switchboard, what is the maximum number of transmitters that may be connected to a single remote control station?

One

The physical layout of you office should be arranged so that paperwork will flow in what direction(s)?

One direction

What is the basic configuration of the typical dual trace oscilloscope?

One gun assembly with two vertical channels

COs/OICs may waive up to how many years of the required TIR for Sailors in paygrades E-5 to E-6 who received a promotion recommendation of Early Promote on their most recent observed periodic evaluation in that paygrade?

One year

PSIs will not normally be requested for any civilian or military personnel who will be retired, resigned or separated with less than?

One year service remaining

Which of the following authentication methods are defined by the 802.11 wireless standard?

Open and shared key

A continuity test is performed on a piece of electronic equipment to discover what kind of fault?

Open circuits

The time base of an oscilloscope is variable to enable the instrument to ________

Operate over a wide range of input frequencies

What must you load into a computer to manage its resources and operations?

Operating system

What is a central set of programs called that manages execution of other programs and performs common functions like read, write and print?

Operation System

How do fleet commanders assign communications responsibilities to their respective fleets?

Operations Orders (OPORDs)

What type of storage is similar to magnetic disk storage in basic operation, but it reads and records using light (optically) instead of magnetism?

Optical

Operators of transmitters and receivers use a circuit to coordinate the service of message and to make frequency changes. What is the name of this circuit?

Order-wire circuit

What type of authority derives from billets assigned to officers and petty officers within the organization?

Organizational

The D'Arsonval meter movement is damped to prevent which of the following conditions?

Oscillating readings

_____ is a term used by network professionals to describe the non-data information that must accompany data in order for a signal to be properly routed and interpreted by the network.

Overhead

When you are disconnecting a transistor from the transistor tester, in what position should the POLARITY switch be placed?

PNP

Representing two numeric characters in one byte (eight bits) is referred to as what?

Packing

The magnetic tape unit reads and writes data in channels or tracks along the length of the tape. How are these tracks referenced to each other?

Parallel

The test bit for bit count is called the what?

Parity check

A customer has brought a laser printer into your repair area because it produces a paper feed error when the customer tries to print a document. Where is the first place to check given this symptom?

Pick-up rollers

The voltage produced by mechanical stress placed on certain crystals is a result of which of the following effects?

Piezoelectric

Which of the following troubleshooting utilities is common to all operation systems and is used for testing connectivity of two hosts on a network?

Ping

If you know the hostname of a PC on a network, what would you type to find its IP address?

Ping hostname

Which of the following terms is used to describe the process used by an application to test a remote device?

Pinging

In UNIX, two or more commands connected by a pipe are called a(n) _____

Pipeline

What are the three basic characteristics of sound?

Pitch, intensity, and quality

DON organization shall develop what to delineate the tasks and schedule necessary to successfully achieve system certification and accreditation?

Plan of Action and Milestones (POA&Ms)

A satellite orbiting with an angel of inclination of approximately 90 degrees describes which of the following types of orbit?

Polar

What type of technology would you use to prevent unauthorized hosts from accessing the LAN?

Port security

The part of the sine wave that is above the voltage reference line is referred to as the ______

Positive Alternation

What type of circuit is used to remove the AM component in the output of a semiconductor reactance modulator?

A limiter

Energy is transmitted from a transmitter into space using which of the following devices?

A transmitting antenna

Which computer is used with the SNAP II system?

AN/UYK-62 (V)

What is the total number of frequency bands the military is currently using for communications?

9

Under AIS security, countermeasures (controls) that are embedded in hardware, software and telecommunications equipment are what type of controls?

Technical

To ensure that all safety requirements of the AIS facility are satisfied, the AIS technical manager and the operations division officer should review the protective plans with what frequency?

Semiannually

Which of the following instruments is used to check transistors for collector leakage current and current gain?

Semiconductor test set

The control circuitry for a static transfer switch performs which of the following functions?

Senses an overcurrent condition

Which of the following test instruments produce a standard of measurement of AC energy for testing electronics equipment?

Signal Generator

A circuit and it's components can be etched onto which of the following materials?

Silicon

Raw data is typically written on some type of paper document referred to as what type of document?

Source document

Radio energy is transmitted through which of the following mediums?

Space

What type of diversity uses physically separated transmit or receive antennas to improve communications?

Space

The sensitivity level that has the potential for inestimable impact and/or damage is known as?

Special Sensitive (SS)

In a stowage space aboard ship, what device should be used to hold the test equipment in place?

Stretch seat-belt-type straps

RAID 0 is also known as?

Striped disk array

What device would you use to create more collision domains on your network?

Switch

_____ enables multiple nodes to simultaneously transmit and receive data over different logical network segments.

Switched Ethernet

_____ are connectivity devices that subdivide a network into smaller logical pieces.

Switches

The transmission method that uses a single set of start and stop message characters per block of data is which of the following types?

Synchronous

When the period of an orbit is identical to that of the earth, the orbit is _______

Synchronous

Which, if any, of the following modes of teletypewriter operation is more often used in high-speed data systems?

Synchronous

What two types of flowcharts are there?

System and programming

Scheduled maintenance in support of QMCS is designed to alert you to which fo the following problems?

System degradation

The frequency of the sine wave is determined by which of the following sine-wave factors?

The rate at which the vector rotates

A satellite communications system is limited by which of the following characteristics?

The technical design of the satellite

Which of the following has the necessary privileges to assign permissions to a shared resource when the discretionary access control method is used?

The owner of the resource

What is a consequence of incorrectly setting the paper tray switches in a laser printer?

The paper will not feed

The advancement exam for PO1 is administered on the first ______ of March and on the first _______ of September

Tuesday/Thursday

When measuring 300 volts or more, you should first take what step?

Turn off equipment power

Horizontal half-wave antennas mounted at right angles to each other in the same horizontal plane make up which of the following antennas?

Turnstile

To achieve 100 percent modulation in a plate modulator, what maximum voltage must the modulator tube be capable of providing to the final power amplifier (fpa)?

Twice the fpa plate voltage

For network purposes, 22 and 24 gauge wire are the most common types of which of the following types of cables?q

Twisted pair

Which of the following cable types is the least expensive?

Twisted pair

Which of the following cables is identified by a designation number of RG-11?

Twisted pair

Firewalls can be divided into how many different categories?

Two

How many types of line conditioning are available?

Two

The galvanometer-type meter movement differs from the electrodynamometer meter movement in that the electrodynamometer type uses which of the following components to produce the magnetic field?

Two sets of coils

_____ is a standard interface used to connect multiple types of peripherals, including modems, mice, audio players, and NICS.

USB

What type of cable would you plug into a T1 interface with a built-in CSU/DSU?

UTP

Who is the senior DoD official charged by the Secretary of Defense with responsibility for development of policies and procedures governing information and personnel security policy programs?

Under Secretary of Defense for Intelligence (USD(I))

The Windows Recovery Console does all of the following except?

Uninstall Programs

When using the reference designator 1A6A4J6, what level does the number 1 refer to?

Unit

What is the maximum hop count for OSPF?

Unlimited

Transmission of information to a satellite is done on what frequency?

Up-Link

A(n) _____ is the creation of a communications channel for a transmission from an earth-based transmitter to an orbiting satellite.

Uplink

When you cannot work around a problem to continue operating, what priority should you assign to the trouble report?

Urgent

In AIS security terminology, what term is used for the things that can destroy AIS assets?

Threats

A total of how many different types of contingency plans make up a COOP security plan?

Three

Communication line problems fall into how many different categories?

Three

How many members serve on the panel for the Personnel Security Appeals Board (PSAB)?

Three

How many methods are used to provide service restoration after system degradation?

Three

How many primary culprits are there to network malfunctions?

Three

The network layer is which layer number of the OSI reference model?

Three

How many levels of sensitivity are there?

Three and non-sensitive

All other stations which hear the Urgency signal are to continue to listen for at least how long?

Three minutes

What is the purpose of this instruction?

To establish Information Assurance (IA) policy for the DON consistent with National and DoD policies.

Transmitter machine keying was developed for which of the following purposes?

To increase the speed of communication

A megger is widely used for which of the following purposes?

To measure insulation resistance

What is the purpose of the antistatic wrist strap?

To protect the equipment from electrostatic discharge

It is important to set a voltmeter on its highest range scale before taking a measurement for which of the following reasons?

To protect the meter from damage

The relationship between two domains in which one allows the other to authenticate it's users is known as a(n) _____

Trust Relationship

The primary corona wire (conditioning roller) in a laser printer_______

Applies a uniform negative charge to the drum

Manual volume control of a receiver internally varies the input to which of the circuits?

Audio amplifier

Which of the following ca be used to control the boot process in a Window XP system?

BOOTCFG.EXE

____ is the provess of assigning one network component to work with another.

Binding

What type of message is destined for two or more addressees, none of whom is informed of any other addressee?

Book

What is another term for "initial program load" the system?

Boot

An auxiliary (wired) memory is used in some computers to permanently store a small program that makes manual loading unnecessary. What is the program called?

Bootstrap

Which of the following factors need to be decided on before determining the type of connector to use?

Both architecture and cable

An ordinary flashlight is an example of what type of radiator?

Anisotropic

Detailed information for various ship departments is contained in what two enclosures?

Annexes and appendices

With what frequency should a scheduled inspection take place?

Annually

Which of the following protocol suites includes the Routing Table Maintenance Protocol (RTMP)?

AppleTalk

Who is the official with the authority to formally assume responsibility for operating a system at an acceptable level of risk?

Designated Approving Authority

What causes sunlight to separate into different wavelengths and display a rainbow of colors when passed through a prism?

Dispersion

Digital multimeters can be divided into three functional sections: (1) signal conditioning, (2) analog-to-digital, and what third section?

Display

IA requirements should be validated by whom?

Fleet Commanders-in-Chief or other Echelon II Commanders

What type of message has a wide, predetermined standard distribution?

General

An OPORD is made up of what three parts?

Heading, body and ending

What determines the length of time that a nonsynchronous satellite in a circular orbit will be in the zone of mutual visibility?

Height of the orbit

Which of the following numbering systems has a base of 16?

Hexadecimal

In sound terminology, which of the following terms is the same as a wave reflection?

Echo

On a computer, what is the sequence of characters called?

Collating sequence

What must be standardized and managed at a service level to provide interoperability with everyone?

Critical IA components

Which command prompt operation can be used to compare the contents of two disks?

DISKCOMP

Which, if any, of the following advantages is a primary benefit of plate modulation?

It operates with high efficiency

The term _____ topology refers to the way in which data is transmitted between nodes rather than the physical layout of the paths that data takes.

Logical

Which of the following advantages is a benefit of CW communications?

Long-range operation

Which of these methods can be used to test a 10/100 Mbps network port built on the motherboard without connecting it to the network?

Loopback adapter

On a standing wave, the points of a high current an voltage are identified by which of the following terms?

Loops

The safeguarding of information and information systems shall be accomplished through the employment of what?

Multi-disciplined defensive layers

_____ allows one device to send data to a specific group of devices.

Multicasting

The Yagi antenna is an example of what type of antenna array?

Multielement parasitic

The process of simultaneous transmission of several intelligible signals on the same frequency during the same period of time is called _______

Multiplexing

Who maintains investigative authority for criminal acts or espionage related to computer network security incidents?

NCIS

What intergrates the three primary functions of network management, information dissmination managment (IDM) and IA?

NETOPS

What is an organizational, procedural and technological construct for ensuring information superiority and enabling speed of command for the war-fighter?

NETOPS

Which of the following categories of electromagnetic interference includes interference generated by electrically charged raindrops?

Natural

As a reference, perigee and apogee are measured in which of the following units?

Nautical Miles

Who shall carry out an annual independent evaluation of DON Information Assurance programs?

Naval Inspector General

_____ are connectivity devices that enable a workstation, server, printer, or other node to receive and transmit data over the network media.

Network Interface Cards (NIC)

Describe the Physical Layer's function

Media, signal and binary transmission

A transmit multicoupler provides which of the following functions?

Isolation between transmitters

What information system (IS) assessed occurrence having actual or potentially adverse effects on an IS?

Incident

Who is responsible for proper handling, accountability and stowage of Navy-wide examinations?

Individual commands

When processing is taking place, data is transferred back and forth between what two sections?

Internal storage and arithmetic logic

What is the unauthorized act of bypassing the security mechanism of a system?

Intrusion

The goal of an ______ is to detect and identify unauthorized use, misuse and abuse of computer systems by both internal network users and external attackers in "near real time".

Intrusion Detection System (IDS)

HF communications over long distance trunks, or links between fixed terminals are examples of which of the following types of systems?

Point-to-point

You are working with a teletypewriter patch panel. What color signifies that secure information is being passed?

Red

Which of the following terms implies a fluctuation in voltage levls caused by other devices on the network or electromagnetic interference?

Noise

In a voltmeter, the meter scale is calibrated in which of the following categories?

Voltage

The total charge on a transmission line is equal to the current multiplied by which of the following factors?

Voltage

In a CW transmitter, a buffer stage performs which of the following functions?

Voltage amplifier

Applying RF energy to the elements of an antenna results in what phase relationship between voltage and current?

Voltage lags current by 90 degrees

Operator controlled tuning of the antenna coupler group by the use of front panel controls is possible during which of the following modes of operation?

Silent and manual

Electric and magnetic fields on an antenna reach their maximum intensity at which of the following times?

When they are a quarter-cycle apart

The storage capacity of an address is designed and built into the computer by which of the following terms?

Word

Who is the first leadership position in the chain of command responsible for the growth, development and daily direction of subordinates?

Work Center Supervisor

Where are the user terminals for SNAP II placed on board ship?

Work centers

What category of AIS media is considered temporary in nature and is retained for 180 days or less?

Working

What precedence is limited to designated emergency action command and control messages within the AUTODIN system?

Yankee

If a candidate is taking his/her perspective advancement exam and notices that a page is missing out of the book for a total of 9 questions, there are no other candidates taking the same exam, and nobody to share with will the test still be valid?

Yes anything under 10 missing questions is still valid

How can you create an ERD for a Windows XP Professional computer?

You cannot do it

In the Navy, what organization authorizes frequency assignment applications?

The Naval Electromagnetic Spectrum Center (NAVEMSCEN)

The precedence of a message should be based on what factor?

The urgency of the message

Which of the following methods for preventing social engineering attacks?

User education

Who said "Strange as it sounds, great leaders gain authority by giving it away."?

VADM James Stockdale

The ratio of maximum voltage to minimum voltage on a transmission line is referred to as the

VSWR

First generation computers were characterized by what technology?

Vacuum tubes

In early electronic computers, what was the weak link in electrical computations?

Vacuum tubes

Network layer addresses are also called _____

Virtual Addresses

The electric field radiated from an antenna is produced by what electrical property?

Voltage

The development of ADA was initiated by what organization?

US DoD

Which of the following is considered to be the fastest port and is commonly used on laptops?

USB

Which of the following types of cable can handle a data flow of up to approximately one Mbps?

Twisted pair

Which of the following commands will display IP to MAC address mappings on a Windows PC?

arp -a

What command would you use to see if clocking is stopped on an interface?

show controllers

Which of the following commands shows you if a router is acting as the designated router for one of its interfaces?

show ip ospf interface

As the positive potential is increased on the cathode of a varactor, (a) what happens to reverse bias and (b) how is dielectric width affected?

(a) Increases (b) Decreases

With a sine-wave input, how will the output compare to the input in (a) a linear circuit and (b) a nonlinear circuit?

(a) Proportional (b) Not proportional

For the heterodyning action to occur in a circuit, (a) what number of frequencies must be present and (b) to what type of circuit must they be applied?

(a) Two (b) Nonlinear

What is the maximum range for low-power (Class-3) bluetooth devices?

1 Meter

In a demodulator circuit, which of the following components is required for demodulation to occur?

A nonlinear device

A _____ modulates outgoing signals and demodulates incoming signals.

DSL Modem

In addition to hardware and software, what are the other three areas of consideration for the Navy's AIS security program?

Data, human resources and communications

If the AIS technical manager plans to take measures to control compromising the emanations, those measures are subject to approval under the provisions of which of the following DoD directive?

C5200.19

Transfer of control instructions are classified as which of the following types?

Conditional and unconditional

What provides the measures taken by an organization to ensure the availability, integrity, authentication, confidentiality and non-repudiation of its information and information systems ?

Information Systems Security (INFOSEC)

What is the first thing to do with a new inkjet printer installation?

Print a test page from the printer

What type of modulation is/are normally detected by first converting it/them to another type of modulation?

PPM, PFM, and PCM

Which of the following protocols can be used to secure remote access connections when they are established through the Internet?

PPTP

A special device is needed to burn the program into what type of memory?

PROM

Which of the following ports cannot be used to connact a scanner?

PS/2

Which of the following ports is commonly used to connect a keyboard and a mouse?

PS/2

In a basic oscilloscope, what is the purpose of the deflection system?

To position the beam on the screen

In AIS environmental security, emergency lights are installed in computer facilities for what primary reason?

To protect personnel

A rhombic antenna is essentially a combination of which of the following antennas?

Two V antennas placed side by side

Call signs for assigned SAR craft will consist of which prefix followed by the normal SAR call sign?

"RESCUE"

The International Distress and Calling frequency for voice on what frequency is used by mobile stations, survival craft and emergency postition-indicating radiobeacons using frequencies in the authorized bands between 1605 and 4000 kHz when requesting assistance from the maritime services?

2182 kHz

In the absence of any response to this initial transmission the aircraft, ship or survival craft will preferably inititate a distress call on the Internationall Aeronautical Emergency Frequency 121.5 MHz or on the Distress and Emergency Frequency of what?

243.0 MHz

The voice alarm signal consists of two substantially sinusoidal audio frenquency tones transmitted alternatively. One tone has a frequency of 2200 Hz and the other 1300 Hz. The duration of each tone is how long?

250 milliseconds

What is the service between aeronautical stations (normally a land station but may be placed onboard a ship or an earth satellite) and aircraft stations or between aircraft stations in which survival craft stations may also participate?

Aeronautical Mobile Service

Which INFOCON level has increased intelligence watches and strengthened security measures of DoD information systems and networks?

Alpha

What provides the timely, reliable access to data and services for authorized users?

Availability

What consists of low level software that controls the system hardware and acts as an interface between the operating system and the hardware?

BIOS

What does BIOS stand for?

Basic Input/Output System

What are automated methods of authenticating or verifying an individual based upon a physical or behavioral characteristic?

Biometrics

Which INFOCON level has a further increase in CND force readiness above that required for normal readiness?

Bravo

What is the frame or the chassis that houses the motherboard, power supply, disk drives, adapter cards and any other physical components of the system?

Case

Which INFOCON level has a further increase in CND force readiness but less than maximum CND force readiness?

Charlie

What are operations to disrupt, deny, degrade or destroy information resident in computers and computer networks, or the computers and networks themselves?

Computer Network Attack

When a station in distress has delegated control of distress working to another station the person in charge of the station in distress should, when he considers silence no longer justified, immediately inform the what?

Controlling station

What are the measures that protect and defend information and information systems by ensuring availability integrity, authentication, confidentiality and non-repudiation?

Information Assurance

What is hardware, software or firmware capable of performing an unauthorized function on an information system?

Malicious Logic

What provides visibility of extent and intensity of the activity, traffic, load and throughput potential, as well as detction of significant degradation of service?

Network Management

What holds all the programs and data the processor is using at a given time?

RAM

What safety is that condition which necessitates the transmission of a message concerning the safety of navigation or providing important meteorological warnings?

Safety

What indicates that the station is about to transmit a message containing an important navigational or meteorological warning?

Safety signal

Which type of threats describes non state-sponsored computer network attack, espionage or data theft?

Second Generation

An aircraft seeing but not understanding ground signals by day will fly a complete right circle and by night will make red flashes with what?

Signal lamp

What enables the PC to generate complex sounds?

Sound Card

In cases of distress, urgency or safety transmissions by radiotelephony they shall be made slowly and distinctly, each word being clearly pronounced to facilitate what?

Transcription

How are records on a track separated?

By a gap in which no data is recorded

What operates whenever any PC is powered up?

POST

Magnetic tape stores data in what manner?

Sequential

DCS circuits are owned or leased by what organization?

The US government

Who installs the programs in read-only memory?

The manufacturer

The _____ is the main circuit that controls the computer

Motherboard

How many digits make up the Julian date?

Seven

Who is responsible for changes or corrections to NWPL publications?

The NWPL clerk

Which of the following printer types requires special paper?

Thermal

Electronic mail is classified as what type of software program?

Utility

DC power is stated in which of the following units?

Watts

An electromagnetic wavefront moves through free space at approximately what speed in meters per second?

300,000,000

The output power of the transmitter unit drives which of the following units?

The RF amplifier

Fire, flood and sabotage, in varying degrees, result in which of the following losses?

Physical destruction

Which instruction does the Command Achievement Program (CAP) fall under

BUPERSINST 1430.17E

For local area networks, what two designs are used?

Broadband and baseband

Which INFOCON level is described as the maximum CND force readiness?

Delta

For high-frequency operation, which of the following antenna polarization patterns is preferred?

Horizontally polarized

What is the simplest form of pulse modulation?

Pulse-amplitude modulation

How many award points is the Medal of Honor worth on the Navy wide advancement exam?

10

A CW transmitter must contain which of the following components?

A keyer

Describe the Data Link Layer's function

Physical addressing

In a voice distress signal the word MAYDAY is pronounced as which French expression?

"m'aider"

What voltages are present on the power supply's 4 pin auxiliary (disk drive) power connector?

+5/+12Vdc

How many PNA points are credited to an exam candidate who scored between the 76th and 50th percentile?

.5

A simple phase modulator consists of a capacitor in a series with a variable resistance. What total amount of the carrier shift will occur when X C is 10 times the resistance?

0 degrees

A multivibrator frequency modulator is limited to frequencies below what maximum frequency?

1 MHz

A nanosecond is defined as?

1 billionth of a second

In a different voltmeter, an adjustable reference voltage can be produced in increments as small as how many microvolts?

10

On a dipole antenna, the sinusoidal variation in charge magnitude lags the sinusoidal variation in current by what amount?

1/4 cycle

What is the length of each half of the wire for a dipole antenna?

1/4 wavelength

How many PNA points are credited to an exam candidate who scored between the 49th and 25th percentile?

1.0

How many PNA points are credited to an exam candidate who scored in the top 25th percentile but did not advance?

1.5

Search and rescue stations are divided into groups that have distinct rescue functions. Emergency lifeboat transmissions are designed for reception by a total of how many of these groups?

2

You are thinking about setting up a simple striped array on your email server at the office. What is the minimum number of drives required to implement a RAID 0 solution?

2

Records of destruction of classified material must be maintained for what minimum length of time?

2 years

Requirements for new telecommunications services should be defined and submitted what minimum time in advance?

2 years

How many times per cycle is a practical time division multiplex system optimally sampled?

2.4

As a manager, what percentage of your time wil you spend resolving conflicts?

20

What two well known TCP ports are associated with FTP functions?

20 and 21

On the spectrum analyzer, the RF input jack is used to accept what maximum frequency input signals?

21 GHz or below

What is the maximum hop count for EIGRP?

224

The world is divided into what total number of GMT time zones?

24

A break in service is when continuous service is disrupted for a period of time greater than how long?

24 months

Tactical communications is usually considered as line-of-sight. What maximum distance is normally within the line-of-sight range?

25 Miles

An 802.11n wireless Ethernet transmission can support up to what speed of transfer?

250 Mbps

How many award points is the Purple Heart worth on the Navy wide advancement exam?

3

In order to cover most of the earth except the polar regions, what is the minimum number of satellites that must be orbited?

3

What is the size range of the diameters of magnetic disks?

3 to 4 inches

Floppy disks come in several sizes with diameters of what size range?

3 to 8 inches

The drive motor of a disk drive unit rotates the disk at a constant speed, normally how many revolutions per minute?

3,200 rpm

What is the maximum allowable size of material shredded by a crosscut shredding machine?

3/64 inch wide by 1/2 inch long

DOHA will normally schedule the personal appearance to be accomplished within how many days of receipt of the individuals request?

30 days

What component in an antenna system transfers energy from the transmitter to the antenna?

A feeder

Which of the following is a biometric authentication device?

A fingerprint scanner

What type of circuit can be used to convert from PPM to PDM for demodulation?

A flip flop

Navy funds cannot be obligated for developing or procuring communications equipment that uses a portion of the frequency spectrum until what is obtained?

A frequency allocation

A megger uses high voltage to check the insulation leakage in the megohm range. What is the source of this voltage?

A hand-driven DC generator

In an AM transmitter, audio frequencies are converted into corresponding electrical energy by which of the following components?

A microphone

Which of the following operating systems is distributed as open source and does not have a standard GUI?

Linux

The demodulation of SSB, CW and FSK signals is performed by which of the following circuits?

A product detector

When keying a high-power transmitter, what component should you use to reduce the shock hazard?

A relay

What are two basic components of a galvanometer?

A stationary permanent magnet and a movable coil

Of the following amplifiers, which one has a high gain, low noise, wide bandwidth and is operated in the microwave region?

A traveling wave tube

Which solution can be used for antistatic cleaning?

A water and fabric softener solution

Name the layers of the OSI model

Physical, Data Link, Network, Transport, Session, Presentation, Application

The purpose of what signal is to alert the operators on watch or to activate 2182 kHz watchkeeping recievers to warn operators that distress call or message is to follow?

Alarm signal

Which of the following actions would be regarded as part of corrective maintenance?

Alignment of a servo assembly after a repair

Electrical constants in a transmission line are distributed in which of the following ways?

Along the length of the line

How often must all personnel who have access to classified information receive a refresher briefing designed to enhance security awareness?

Annually

The transmission of voice as well as data and text can be handled by what type of communications channels?

Broadband

Which of the following methods uses the physical characteristics of a user to verify identity?

Biometrics

A single binary digit is called what?

Bit

Which of the following terns is associated with a power outage for a long period of time?

Blackout

To increase the amount of data we can store on one track, what technique can be used?

Blocking

Which of the following methods of reducing RF burn hazards is the most useful and widespread technique used?

Bond and ground all metallic objects

Broadcast screen requests should be sent to what organization?

Broadcast keying station

A momentary decrease in voltage is known as a(n) _____

Brownout

In a cathode modulator, the modulating voltage is in series with which of the following voltages?

Both the grid and plate voltages

What do Commanders of DON organizations use to limit access to internal networks?

Boundary Defense

Which of the following devices handles the first two layers of the OSI model?

Bridge

Which of the following devices is used to connect identical network segments?

Bridge

Which of the following statements must appear on the CALIBRATION NOT REQUIRED label affixed to an instrument?

By what authority the label was affixed

When you are discussing the memory capacity of a memory module, the capacity is specified in?

Bytes

Which of the following authentication technologies utilizes a challenge text?

CHAP

What is the sole authority for advancement of personnel to pay grades E-7-E-9?

CHNAVPERS

Who is responsible for managing the command's CMS account and for advising the commanding officer on all matters concerning CMS?

CMS Officer

Who approves and issues the Navy IA Master Plan?

CNO

Who is responsible for ensuring full implementation and coordination of the Navy's IA program?

CNO

Who is responsible for policy guidance, education requirements and support for the DON security education program?

CNO

Who issued OPNAVINST 5239.1?

CNO

Who shall develop Navy IA education, training and awareness programs in accordance with DoD and DON?

CNO

Who has the authority to advance personnel to the pay-grades of E2-E6?

CO after all advancement requirements are met

What recommendation is the most important advancement eligibility requirement?

CO/OIC

When an emergency plan is implemented, which of the following material should be destroyed first?

COMSEC material

How do you get a list of options that can be used with the COPY at the command prompt?

COPY /

In what type of environment should test equipment be stowed?

Dry

What section/unit is the brain of a computer system?

CPU

What section/unit is the computing center of a computer system?

CPU

When a node needs to send data, it waits until the line is quite and then transmits. This protocol is known by what term?

CSMA/CD

On what type of device would you typically configure the clock rate?

CSU/DSU

In an MF transmitter, the frequency generator is used during which of the following modes of operation?

CW

This measurement provides an indication of dielectric strength and is used to determine the power factor.

Capacitance

The velocity of propagation on a transmission line is controlled by which of the following line characteristics?

Capacitance and inductance

When a series-resonant circuit is resonant at a frequency above the generator frequency, it acts as what type of circuit?

Capacitive

A varactor is a variable device that acts as which of the following components?

Capacitor

Prior to working on a circuit, you use shorting probe discharge which of the following types of components?

Capacitors and cathode-ray tubes

What component in a carbon microphone converts a DC voltage into a varying current?

Carbon granules

Single sideband receivers use a special oscillator. The output of that oscillator is fed directly to the detector circuit. What type of oscillator is used?

Carrier reinsertion

In RF communications, modulation impresses information on which of the following types of waves?

Carrier wave

Why is fiber optic cable immune to electrical interference of any kind?

Carries no electrical current

A teletypewriter code signal consists of 7 units. Of the following functions, which describes the middle 5 units?

Carries the intelligence

When you are using the teletypewriter five-unit code which of the following signals are used to increase the printing capacity of the equipment?

Case-shift

The parity bit is also called the what?

Check bit

What two modes are used to obtain the dual trace on an oscilloscope?

Chop and alternate

In _____ , a connection is established between two network nodes before the bgin transmitting data.

Circuit Switching

Every command in the Navy and Marine Corps eligible to receive what is required to designate a security manager in writing?

Classified Information

Prior to being granted initial access to classified information what form must individuals fill out?

Classified Information Nondisclosure Agreement (SF 312)

What is the proper way to remove a USB device from a Windows 2000-based notebook PC system?

Click the Safe Hardware Removal icon in the system tray

Which type of conflict management style attempts to jointly resolve conflict with the best solution that is agreeable to all parties?

Collaborating

A single address group that represents a set of four or more activities, including the cognizant authority, is known by what term?

Collective address group

Which of the following transistor parameters are measured with the transistor tester?

Collector leakage and current gain

An antenna arrangement that has elements aligned in a straight line is referred to as what type of array?

Collinear

A(n) _____ is a logically or physically distinct Ethernet network segemtn on which all participating devices must detect and accommodate data collisions.

Collision Domain

What is it called when you adjust the color settings of a monitor, a printer, and a scanner to a standard?

Color management

Who is responsible for the overall management of IA at the command level?

Commanding Officer

Who maintains the ships System Security Authorization Agreement (SSAA)?

Commanding Officer

What does the acronym COBOL stand for?

Common business oriented language

Who is responsible for the organization, supervision, and coordination of the command's external communications?

Communications Officer

Who is responsible to the communications officer for compliance with communications directives and for the accurate and rapid handling of messages?

Communications Watch Officer

When it needs to shift broadcast guard, a ship sends what type of message?

Communications guard shift

Which type of conflict management style attempts to resolve conflict through give and take and by making concessions?

Compromising

What are teams composed of personnel with technical expertise and organic equipment that may deploy to assist remote sites in the restoration of a computer services?

Computer Emergency Response Team

What consists of actions and operations to defend computer systems and networks from unauthorized activities that degrad mission performance and adversely impact survivability?

Computer Network Defense

Which of the following is the best way to improve privacy on an 802.11 wireless network?

Configure WEP to encrypt network transfers

What type of address group must always have more information added to it to serve as a completed station and address designator?

Conjunctive address group

____ protocols ensure that data arrives exactly as it was sent by establishing a connection with another node before they begin transmitting data.

Connection-oriented

What forms the origin and heritage of the Navy's Core Values?

Constitution and federal law

In regard to AIS security, the continuation of an activity's mission during abnormal operating conditions is provided by which of the following means?

Contingency plans

Which of the following types of modulation is a form of amplitude modulation?

Continuous-wave

An oscilloscope that can display two vertical input signals at the same time is said to be what type?

Dual trace

The sensitivity level that has the potential for grave to exceptionally grave impact and/or damage is known as?

Critical Sensitive (CS)

A(n) _____ cable is useful for quickly and easily verifying that a node's NIC is transmitting and receiving signals properly.

Crossover

What type of cable should you use between two switches?

Crossover cable

____ occurs when a signal traveling on one wire or cable infringes on the signal traveling over an adjacent wire or cable.

Crosstalk

A failure that adversely affects the security of a cryptosystem is known by what term?

Cryptoinsecurity

What key combination opens the start menu in Windows XP?

Ctrl+Esc

Meter sensitivity is determined by the amount of current required by the ammeter coil to provide full scale deflection of the pointer. An ammeter movement is caused to move by what electrical action?

Current

The magnetic field radiated from an antenna is produced by what electrical property?

Current

This measurement is rarely taken in preventive or corrective maintenance or testing because unsoldering is usually required. Ohm's law is normally applied to this value.

Current

You have a single network connected to you ISP. What type of routing would you allow the internal clients to reach the Internet?

Default route

What is the DoD consolidated world wide enterprise level telecommuncations infrastructure that provides the end-to-end information transfer network for supporting military operations?

Defense Information Systems Network

Who coordinates the intelligence efforts of the Army, Navy and Air Force and is responsible for implementation of standards and operational management of Sensitive Compartmented Information (SCI) for the DoD?

Defense Intelligence Agency (DIA)

What is the preferred Department of the Navy security strategy where by layers of protection establish an adequate security posture for a system?

Defense-in-depth

What level of IA training should all personnel receive who use or support DON IS?

Degree commensurate with their duties

A circuit that is nonlinear, provides filtering, and is sensitive to the type of modulation applied to it fulfills the requirements of which, if any, of the following circuits?

Demodulator

What type of attack involves a flooding of SYN packets to open TCP sessions to a server?

Denial of Service

A(n) _____ occurs when a system becomes unable to function because it has been deluged with data transmissions or otherwise disrupted data.

Denial-Of-Service Attack

Which one of the following types of memory can be used to permanently store data and instructions?

ROM devices

To detect pulse duration modulation, the low pass filter components must be selected so that they pass only the ______

Desired modulating frequency

In a basic tone modulate radio teletypewriter system, separation of the audio signal from the carrier is accomplished by what process?

Detection

When a receiver separates the audio frequencies from the radio-frequency carrier it is performing which of the following basic functions?

Detection

Which of the following wave-guides is seldom used because of its large energy loss characteristics?

Dielectric

The reception of an AM-band radio signal over mountains can be explained by which of the following principles of wave propagation?

Diffraction

A _____ is a password-protected and encrypted file that holds an individual's identification information, including a public key.

Digital Certificate

When using a modem, what are the two methods of data transmission?

Digital and analog

The magnetic drum is another example of what type of access storage device?

Direct

When data can be obtained quickly from anywhere on the media without having to read the records in front of it, which of the following types of storage is being used?

Direct-access

When a core is magnetized, what characteristic of magnetism determines whether it contains a binary 0 or a binary 1?

Direction

What communications link mode of operation provides telecommunications capability between stations at the same time in both directions?

Duplex

When you are measuring voltage using a voltmeter, where should you stand to view the meter reading?

Directly in front of the meter

Who shall maintain the IA Library and distribute all keying material for the Navy?

Director of COMSEC

What is used by some commands as a part of the administrative process for handling report chits?

Disciplinary Review Board (DRB)

When the AIS system contains classified information, what action, if any, must be taken for each remote terminal that is not controlled?

Disconnect

When preparing to use an ohmmeter to test a circuit for grounds, you should first take which of the following actions?

Disconnect all intentional grounds

What two media are commonly used for back up?

Disk and Magnetic Tape

What requires all personnel who access DON Information and Information Systems receive annual IA and Security Awareness Training, to include emphasis on Internet security?

DoDD 8570.1, Information Assurance Training, Certification and Workforce Management

A definition of the problem, a description of the system, a description of the program, and operator instructions make up what package?

Documentation

What wave propagation principle accounts for the apparent increase in frequency as a train whistle approaches ad the apparent decrease in frequency as it moves away?

Doppler effect

Which of the following printers is suitable for printing multipart invoices?

Dot Matrix Printer

An earth terminal receives signals on what frequency?

Down-link

Identify the 802.1x method that can be used for mutual authentication of the supplicant and the authenticator.

EAP-TLS

What is defined as instruction in a phase of military duty in which an individual is deficient?

EMI

Which of the following affects the performance of an 802.11b network?

EMI

What is a key component of an effective continuous evaluation program?

Effective security education program

The polarization plane of the radiation field is determined by which of the following fields?

Electric field only

Besides a physical interface between the device and the computer, what other type of interface does a port provide?

Electrical

Which of the following is an acceptable method of cleaning oxide buildups from adapter board contacts?

Electrical Contact Cleaner Spray

The electric field and magnetic field combine to form which of the following types of waves?

Electromagnetic

Of the following terms, which one is defined as the ability of an electronic system to perform its indivudual functions without interference?

Electromagnetic Compatibility

The sources of electromagnetic radiations that reduce receiver performance are known by which of the following terms?

Electromagnetic interference

What DoD electronic PSI request tool was developed to support the Defense Security Service?

Electronic Personnel Security Questionnaire (EPSQ)

What is the federal government standard automated request tool for personnel security investigations (PSI)?

Electronic Questionnaires for Investigations Processing (e-QIP)

To establish radio contact with a satellite, an earth terminal must know which of the following satellite data?

Elevation

An electrical field that rotates as it travels through space exhibits what type of polarization?

Elliptical

Of the following orbit parameters, which one describes the basic orbit shape of a communications satellite?

Elliptical or Circular

What is a collection of computing enviroments connected by one or more internal networks under the control of a single authority and security policy, including personnel and physical security?

Enclave

Cryptographic equipment performs which, if any, of the following functions?

Encodes and decodes messages

The use of an algorithm to scramble data into a format that can be read only by reversing the algorithm is known as a(n) _____

Encryption

What is the purpose of the grounding cable attached to the frame of a generator aboard ship?

Ensure equipment is at same ground potential as the ship

What is the name of the table that provides coordinates of a satellite at specific times?

Ephemeris

What is a common spirit of comradeship, enthusiasm and devotion to a cause among the members of a group?

Esprit de Corps

Electronics circuits are placed on a silicon chip by what method?

Etched

____ is a networking technology originally developed at Xerox in the early 1970s and improved by Digital Equipment Corporation, Intel, and Xerox

Ethernet

What are standards of conduct that indicate how one (or a group) should behave, based on a set of moral principles or a system of values?

Ethics

The combination to a classified material container must be changed at what maximum interval?

Every 24 months

The three characters following each directory entry are called what?

Extensions

Intranets that share a portion of their content with customers, suppliers, or other businesses but not with the general public are called?

Extranet

What type of motivation occurs when external rewards direct behaviors into specific patterns?

Extrinsic

Of the following body organs, which are considered the most vulnerable to radiation hazards (RADHAZ)?

Eyes and testes

Which function key can be used to access the Advanced Startup Options menu in Windows 2000 or XP systems?

F8

Which of the following types of cables is most expensive in terms of cost, installation and maintenance?

Fiber Optic

Which of the following types of cable is not prone to electromagnetic interferences?

Fiber Optical Cable

Which of the following cables is the best choice if a secure network is needed?

Fiber optic

The ability of a circuit to faithfully reproduce the input signal in the output is known by what term?

Fidelity

To reduce the depth of the CRT caused by the length of the tube, what type of displays were designed?

Flat panel

Navy use of the LF band is mainly for which, if any, of the following broadcasts?

Fleet multichannel

In modern digital computers, circuits that store information, perform arithmetic operations, and control the timing sequences are known as what?

Flip-flops

Once you have a thorough understanding of the problem, what is the next step in programming?

Flowcharting

What product is recommended for manual cleaning of floppy disk drives and tape R/W heads?

Foam swabs

What is the one element all leaders and effective leadership depend on?

Followership

How are the instructions that control a computer applied to a special purpose computer?

From built-in instructions

How many fundamental and discrete steps are involved in solving a problem on a computer?

Four

How many types of backbone cables are there?

Four

Radio set control units are often used aboard ship to remotely control transmitters and receivers. Under standard operating conditions what is the maximum number of units that can be paralleled with a single transmitter and receiver group?

Four

The transport layer is which layer number of the OSI reference model?

Four

The world is divided into what total number of Naval Communications Areas (NAVCOMMAREAS)?

Four

What is the maximum number of elements ordinarily used in a collinear array?

Four

What is the minimum number of times the dial of a security container must be rotated in the same direction to ensure that it is locked?

Four

_____ is an updated, digital version of X.25 that relies on packet switching.

Frame Relay

The electromagnetic spectrum represents the entire range of electromagnetic waves arranged in the order of their _____

Frequency

The vertical axis on a frequency spectrum graph represents which of the following waveform characteristics?

Frequency

Varying which of the following wave characteristics will cause the length of sound waves to vary?

Frequency

Which of the following electrical quantities can be measured using an oscilloscope?

Frequency

The frequency spectrums of a phase modulated signal resemble the spectrum of which, if any, of the following types of modulation?

Frequency modulation

A typical shipboard receive-only satellite system uses which of the following types of modulation?

Frequency or phase shift key

A megger is prevented from exceeding its rated output voltage by which of the following actions?

Friction clutch spillage

Which of the following components must be large enough to support air conditioning or minimum lighting as well as the UPS load?

Generator

What provides globally interconnected capabilities, processes and personnel for collecting, processing, storing, disseminating and managing information for all DoD war-fighters, policy makers, and support personnel?

Global Information Grid (GIG)

The Navy uses GMT as a common 24-hour worldwide time standard in messages for the date-time group and time of file. What does GMT stand for?

Greenwich Mean Time

A series of conductors arranged in a radial pattern and buried in the ground beneath the antenna is referred to as a ______

Ground screen

On Linux or Solaris system, the _____ command creates a new group ID and makes the group available for use.

Groupadd

Frequencies that are located between adjacent channels to prevent interference are referred to as ______

Guard Bands

What is the primary use of analog computers in the Navy?

Gun fire controls

To aid in distinguishing between two or more CW signals that are close to the same frequency, which of the following detectors is used?

Heterodyne

Which of the following types of circuits are most affected by the loading effect of voltmeters?

High resistance

Modulation produced in the plate circuit of the last radio stage of a system is known by what term?

High-level modulation

Describe the Application Layer's function

Higher-level protocols used by most applications for network communication

A vertically mounted transmission line is LEAST affected by which of the following antenna radiation patterns?

Horizontally polarized

You have installed an intrusion detection system on one of the production servers to monitor malicious activites of applications and users only on that server. What kind of IDS is this?

Host-based IDS

The term _____ refers to identical components that can be changed while a machine is still running.

Hot Swappable

What introduces and summarizes the Department of the Navy's approach to IA?

IA Pub 01

Information Assurance related technology research and development efforts are responsive to what?

IA needs of the DON

Who is responsible for directing the implementation of the information assurance (IA) program within the command?

IAM

Navy Component Task Force shall monitor what?

IAVA compliance

What protocol suite is utilized by mainly Novell 4.x and earlier networks?

IPX/SPX

Which of the following protocols uses a MAC address as part of the host address?

IPX/SPX

When is a unit considered "commissioned" or "established"?

If it is listed in the Standard Navy Distribution List (SNDL)

A(n) _____ is a file that contains instructions for performing a specific task, such as reading data from and writing data to a hard drive.

Kernel Module

On UNIX-type systems, the _____ utility allows you to modify TCP/IP settings for a network interface, release and renew DHCP-assigned addresses, or simply check the status of your machine's TCP/IP settings.

Ifconfig

Which of the following utilities is used on Linux system to verify TCP/IP configuration?

Ifconfig

Which of the following terms is a measure of electrical resistance?

Impedance

Data may be misrouted, mislabeled, or it may contain unexpected personal information as a result of which of the following data security risks?

Improper data dissemination

The triggered oscilloscope has which of the following advantages over a basic oscilloscope?

Improved presentation stability

In what arrangement is an ammeter connected to a circuit?

In series

In a frequency-shift keyed signal, where is the intelligence contained?

In the frequency of the RF energy

In an AM wave, where is the audio intelligence located?

In the spacing between the carrier and sideband frequencies

Adding more elements to a collinear antenna array produces which of the following effects?

Increased gain

This measurement is seldom taken during troubleshooting. It can be taken using a bridge or another instrument that is primarily designed to measure another quantity; however, a conversion chart is required

Inductance

What field exists close to the conductor of an antenna and carries the current?

Induction

If a transmission line is open ended, which of the following conditions describes its terminating impedance?

Infinitely large

What provides the measures taken by an organization to ensure the availability, integrity, authentication, confidentiality, and non-repudiation of its information and information systems?

Information Assurance

Which of the following personnel serves as the single point of contact for all matters related to AIS security?

Information System Security Manager

What is the fundamental element in programing preparation?

Instruction

Which, if any, of the following is the primary disadvantage of pulse position modulation?

It depends on transmitter receiver synchronization

Compared to FM, increasing the modulating frequency in phase modulation has what effect, if any, on the bandwidth of the phase modulated signal?

It increases

When data is written on a disk in the same area where data is already stored, the old data is affected in which of the following ways, if at all?

It is replaced

What happen's when you press the Window's logo along with the "L" key?

It locks the computer

The damping diode in a thyratron modulator serves which of the following purposes?

It prevents the breakdown of the thyratron by reverse-voltage transients

When a line is terminated in a capacitance, the capacitor performs which, if any, of the following circuit actions?

It reflects all the energy

Compared to a plate modulator, the control grid modulator has which of the following advantages?

It requires less power from the modulator

In an FM transmitter, a varicap performs which of the following functions?

It varies the oscillator frequency

Who no modulating signal applied, a reactance tube has which, if any, of the following effects on the output of an oscillator?

It will change resonant frequency

Overmodulation of an AM signal will have which, if any, of the following effects on the bandwidth?

It will decrease

Which of the following is a device that handles electrical signals improperly, usually affecting the rest of the network?

Jabber

What system is currently used by the US military services to identify electronic equipment with standardized nomenclature?

Joint Electronic Typ Designation System (JETDS)

Information assurance is defined in what publication?

Joint Pub 3-13

Who is the lead organization designated to identify and mitigate threats to the DoD information networks, and to direct the defense of the Global Information Grid?

Joint Task Force for Global Network Operations (JTF-GNO)

Which of the following authentication methods is used with timestamped session tickets?

Kerberos

The core of all UNIX-type systems is called the _____

Kernel

Telephone lines are frequently used type of communications channel. They are often referred to by which of the following terms?

Landlines

The principal disadvantage of the rhombic antenna is its ________

Large antenna site

Which of the following layers of the OSI network model does a network adapter work?

Layer 2

What is ineffective without a successful balance of responsibility, authority and accountability?

Leadership

What two responsibilities belong to the Work Center Supervisor?

Leadership and Personal

What type of authority is set forth in Navy Regulations and the UCMJ and ensures orders are backed by the punitive articles that provide punishment for insubordinate conduct or failure to obey a lawful order?

Legal

What are the three universal types of authority in the Navy?

Legal, Earned and Moral

The scientist, J. C. Maxwell, developed the theory that small packets of electromagnetic energy called photons produce _____

Light

Which of the following components is a close relative of the laser?

Light Emitting Diode (LED)

Which of the following equipment is used to extend the transmission range between devices that are connected directly to each other?

Line driver

Which of the following indicates that an operating "physical" connections is in place to a local area network?

Link lights are present and operating on the back of the NIC

Name the layers of the TCP/IP model

Link, Internet, Transport, Application

Which Windows utility is used to isolate conflicting items in the startup sequencing?

MSCONFIG

Which of the following contains essential information about handling, storage and safe disposal of hazardous chemicals?

MSDA

A computer language that is a string of numbers which represents the instruction code and operand addresses is what type?

Machine

What type of computer language was used with first generation computers?

Machine

An instruction that allows the programmer to write a single instruction which is equivalent to a specified sequence of machine instructions is what type of instruction?

Macroinstruction

What are the secondary colors of light?

Magenta, Yellow, Cyan

What type of storage is represented by the standard floppy and hard disks installed in most PC systems, where the data is recorded magnetically on rotating disks?

Magnetic

What are the two types of disk storage for computers?

Magnetic and Optical

_____ coordinate the storage and transfer of e-mail between users on a network.

Mail services

The end-fire array produces what type of lobes, if any, along the axis of the array?

Major lobes

After you've removes the outer case from a CRT display, what precaution should you take before troubleshooting it?

Make sure it is discharged

Every UNIX-type system contains full documentation of UNIX commands in the _____

Manual Pages

_____ involves associating a letter, such as M: or T: with a disk, directory, or other resources.

Mapping

What is the service between coast stations and ship stations, or between ship stations, in which survival craft stations may also participate?

Maritime Mobile Service

You have been asked to install an IDE disk to a personal computer. This will be the only disk in the computer connected to the primary channel. How would you set the jumper?

Master

A folded dipole can be used instead of a simple, center-fed dipole for which of the following purposes?

Matching impedance

To figure the total value of series resistance needed to extend the range of a voltmeter, you need to know the value of current to cause full scale deflection of the meter and what other value?

Maximum applied current

Frequency counters serve which of the following purposes?

Measure frequencies in a circuit

To endure the frequency stability of an FM transmitter, which, if any, of the following actions could be taken?

Modulate a low-frequency oscillator, and the heterodyne it with a higher frequency oscillator to achieve the desired frequency

The action of impressing intelligence pan a transmission medium is referred to as ______

Modulating

Which of the following functions is performed by the exciter stage of an earth terminal transmitter?

Modulation of the IF carrier

The final audio stage in an AM transmitter is the ______

Modulator

What is a major responsibility of a supervisor?

Monitor production

The main importance of reviewing audit/event logs is which of the following functions?

Monitor system security

How often should the Personnel Security Appeals Board convene?

Monthly

How often should you perform a defrag operation on a desktop PC used in an office setting?

Monthly

What reflects a more personal conviction than values, and relate to principles of right and wrong behavior?

Morals

_____ is a specialized storrage device or group of storage devices that provides centralized fault-tolerance data storage for a network.

Network Attached Storage

In order for data to be read from or written on a magnetic tape, the tape must do what?

Move at a predetermined speed

_____ is the ability of a processor to perform many different operations in a very brief period of time.

Multitasking

Who is the Navy Senior Information Systems Security Manager (SISSM)?

N6

What document contains guidance for taking extracts from a NATO publication?

NATO letter off promulgation

Who is responsible for reporting incidents and associated analytical results to the JTF-GNO?

NAVCIRT and MCNOSC

Who is responsible for developing, publishing, and distributing Navy-wide advancement in rate examinations for the purpose of testing and rank ordering personnel who are qualified for advancement?

NETPDTC

What is the lowest form of punishment in the Navy?

NJP

Which of the following motherboards users a riser card for providing expansion slots?

NLX

Which of the following switched networks extends tactical voice to shorebased operational commands?

NORATS

What is the native file system for Windows NT and later?

NTFS (Windows NT File System)

What publication lists the types of ships that are required to have a communications department?

NWP 4 (NWP 6-01)

_____ contain databases of associated names and IP addresses and provide this information to resolvers on request.

Name servers

Who provides centralized coordination and direction for signals intelligence and communications security for the Federal Government?

National Security Agency

Who provides overall policy guidance on information and personnel security matters?

National Security Council (NSC)

What authority grants Navy and Marine Corps activities within the US permission to use radio frequencies?

National Telecommunications and Information Administration (NTIA)

Who shall collect, track and report on threats to DON information systems and disseminate this information to the DON CIO?

Naval Inspector General

VLF transmitters are used primarily for which of the following purposes?

Navigation and fleet communications

Which of the following locations on the meter scale provides the most accurate reading for resistance?

Near the center of the scale

A commonly used measure of interference in twisted pair cable is referred to by which of the following names?

Near-end crosstalk

Access is only permitted to eligible individuals after determining that the individual has what?

Need to Know

Quadrant 2 on the Tracker 2000 CRT is used to display what signal information?

Negative voltage and positive current

The _____ utility displays TCP/IP statistics and details about TCP/IP components and connections on a host.

Netstat

A ____ is group of computers and other devices that are connected by some type of transmission media.

Network

Any system composed of one or more computers and terminals is the definition for what?

Network

Ping and Traceroute operate at what layer of the OSI model?

Network

Which layer performs the functions that enable two applications to communicate across the network?

Network

_____ viruses propagate themselves via network protocols, commands, messaging programs and data links.

Network

Which of the following pieces of test equipment is the best tool to use for network malfunctions?

Network Analyzer

Which instruction provides information on selection of senior enlisted personnel for promotion to commissioned officer status such as LDO or CWO?

OPNAVINST 1420.1 and NAVPERS 15627

Which instruction allows COMNAVCRUITCOM Enlisted Recruiter of the Year (EROY) to be advanced to the next pay grade?

OPNAVINST 1700.11

Who shall serve as DAA for Navy SCI systems?

Office of Naval Intelligence (ONI)

Commands that handle Top Secret material will be designated a TS Control Officer (TSCO) in writing. The TSCO must be an?

Officer, senior non-commissioned officer E-7 or above, or a civilian employee, GS-7 or above

Knowledge, possession of, or access to classified information is not provided to any individual solely by virtue of the individual's what?

Official, rank or position

Resistance is measured in _____

Ohms

Describe the Network Layer's function

Path determination and logical addressing

The same pulse characteristic is varied in which of the following types of pulse modulation?

Pdm and Pwm

Windows XP Home includes what type of networking access control as its default?

Peer-to-peer

In a _____ network, every computer can communicate directly with any other computer.

Peer-to-peer (P2P)

In which of the following steps in planning an AIS security program, will major problem areas be identified?

Perform a preliminary risk analysis

What is the parameter in the orbit of a satellite that refers to the point nearest the center of the earth?

Perigee

When the annual security survey is conducted, it should begin at which of the following areas?

Perimeter

At what layer of the OSI model would you find windowing and sequence numbers?

Physical

The _____ is the lowest, or first layer of the OSI model.

Physical Layer

The length of time the phosphor coating on the CRT remains bright after the electron beam is removed depends on which of the following characteristics?

Persistance of the coating

How are personnel advanced to the pay grades of E2-E3?

Personnel meeting minimum time in rate (TIR) requirements will be advanced automatically form E-2 and E-3 with out local actioni

The degree to which a cycle has been completed at any given instant is referred to as the ______

Phase

Sort merge programs usually have which of the following characteristics?

Phases

A _____ topology does not specift device types, connectivity methods, or addressing schemes for the network.

Physical

Protocols at the ____ layer accept Application layer data and format it so that one type of application and host can understand date from another type of application and host.

Presentation

_____ layer services manage data encryption and decryption.

Presentation

Who bears executive responsibility for the security of the Nation?

President of the US

A ____ is a rule that governs how networks communicate.

Protocol

What is the highest precedence that is normally authorized for administrative messages?

Priority

The specific set of rules used to govern handshaking and message characters is called what?

Protocol

For the purpose of making backup resources available, which of the following tasks can be set aside?

Program development

What is the step called in which you code a program that can be translated by a computer into a set of instructions it can execute?

Programing code

What are report program generators designed to save?

Programming time

When office layout is being planned, what is the primary consideration?

Proper flow of paper and work

Information Assurance includes providing for the restoration of information systems by incorporating what three capabilities?

Protection, Detection and Reaction

_____ ensure that data are transferred whole, in sequence, and without error from one node on the network to another.

Protocols

In a CSMA/CD system, the media access method uses which of the following signals before sending a frame onto the network?

RTS and CTS

What provides digital identification, signature and encryption services to a broad range of applications at various levels of assurance?

Public Key Infrastructure (PKI)

To transmit intelligence using pulse modulation, which of the following pulse characteristics may be varied?

Pulse repetition time

Which of the following actions would be classified as preventive maintenance?

Purchasing a new piece of test equipment

What are the two style of typewriter keyboard arrangements used with a computer?

QWERTY or DVORAK

To demodulate a phase modulated signal, which, if any, of the following types of demodulators may be used?

Quadrature

The process of arbitrarily dividing a wave into a series of standard values is referred to as ______

Quantization

For any control item that is still open, it is recommended that reports be turned in to upper management with what frequency?

Quarterly

What kind of memory used inside computers has a read/write capability without any additional special equipment?

RAM

Which of the following labels is attached to an unusable instrument, and may have an additional tag attached?

REJECTED

A thermocouple ammeter is used to measure which of the following quantities?

RF current

Which of the following connectivity methods are used with 802.11g?

RF signals and antennas

What type of connector is used to connect telephone to the wall?

RJ

What is the major advantage of the telegraph over earlier methods of communication?

Range

Which of the following file permissions is not a standard NTFS permission but a special permission?

Read Attributes

When using the vibrating-reed frequency meter, you take the reading in which of the following ways?

Read the reed that is vibrating the most

What does the acronym ROM stand for?

Read-only memory

The _____ tool us used to access console commands through a Web browser on another computer on the network.

Remote Manager

Waves that travel from the output end to the input end of a transmission line are referred to what type of waves?

Reflected

When pulse modulation is used for range finding in a radar application, which of the following types of pulse information is used?

Reflected pulse return interval

Radiotelegraph (CW) is valuable when communicating to, from and among widely separated naval units. What is the main advantage of the CW mode?

Reliablity

Which Windows XP utility enables support personnel to take control of a remote computer and perform troubleshooting steps while involving the user if necessary?

Remote Assistance

Which of the following devices used to amplify electrical signals carried by the network?

Repeater

The receiver action of converting electrical energy to a usable format, such as sound, is an example of which of the following basic functions?

Reproduction

Which of the following contingency plans for dealing with classified material should NOT be considered in emergencies?

Reproduction

The sun, gas flames, and electric light filaments are visble because they are ______

Self-luminous

Conductance is the reciprocal of what electrical property?

Resistance

The Wheatstone bridge can be used for precision measurements of which of the following quantities?

Resistance

This is a valuable aid in locating faults during corrective maintenance, but cannot be made with power applied. Many technical manuals contain charts that indicate the test points for this measurement.

Resistance

_____ are any hosts on the Internet that need to look up domain name information.

Resolvers

A cavity that vibrates as its own natural frequency and produces a sound that that is louder than at other frequencies is demonstrating which of the following sound characteristics?

Resonance

The presence of standing waves indicates which of the following conditions of an antenna?

Resonance

In a phase modulator, the frequency during the constant amplitude portion of the modulating wave is the ______

Rest frequency

Multiple reflections of sound waves are referred to as ______

Reverberation

Longitudinal wave disturbances that travel through a medium are known as what type of waves?

Sound

You are working with a public school to improve its networking capabilities. As you survey the wireless signal strength levels throughout the facility, you find a hidden, unauthorized WAP sitting on top of a filing cabinet in a main office. WHat is this type of WAP called?

Rogue WAP

At what point does heat buildup become a problem for most PC's?

Room temperatures above 85ºF

The most common way to measure latency on data networks is by calculating a packet's _____

Round Trip Time

Which of the following devices connects different network segments and uses tables to create a map of the network topology?

Router

Which of the following devices works at the third layer of the OSI model?

Router

A carbon microphone has which of the following advantages over other types of microphones?

Ruggedness

Touching the exposed area seen through the timing hole and the read/write slots on a floppy disk can do what, if anything, to the data in that area?

Ruin it

Work Center Supervisors have roles that come with unique responsibilities. These responsibilities are based on what?

Rules, regulations and tradition

You are using neutral keying and the teletypewriter type hammer continually strikes the type box but there is no printing or type box movement across the page. What is the name of this condition?

Running open

Which of the following ACPI-defined power states specifies the standby mode in Windows?

S3

Which of the following systems provides an inventory of test equipment actually located in the Fleet?

SCLSIS

Which printer interface is fastest for local printers?

SCSI

Who is the Department of the Navy agency head responsible under EO 12968 for establishing and maintaining an effective PSP to ensure that access to classified information by each DON employee is clearly consistent with the interests of national security?

SECNAV

Which instruction would you consult concerning foreign vistors, whether or not the visitor requires access to classified, or CUI or material?

SECNAVINST 5510.34A

When storing advancement exams the border color on the exams reflects the classification of the exam. Which of the following correctly labels the colors with their respective classifications?

SECRET - RED; CONFIDENTIAL - BLUE; and FOR OFFICIAL USE ONLY (FOUO) - BLACK

Which Windows utility can be used to verify the integrity of the Windows XP operation system files?

SFC

_____ is a simple subprotocol, incapable of doing anything more than transporting mail or holding it in a queue.

SMTP

Which of the following ratios is used to determine how long a cable segment can be before the signal loss is unacceptably high?

SNR

What type of RAM do you typically find in a notebook PC?

SODIMM

Who maintains the Navy INFOSEC Website and IA Help Desk?

SPAWAR

What type of message is placed in the cryptocenter file?

SPECAT

What type of cable is a 100 ohm multipair cable used for voice grade communications?

STP

Transmitting antenna patch panels are interlocked with the transmitter for which of the following reasons?

Safety

What is data to be represented called?

Source data

To physically organize data on diskettes, what method is used?

Sector

Tracks are divided into several numbered divisions known as?

Sectors

Which of the following terms, refers to a thorough examiniation of each aspect of a network to determine how it might be compromised?

Security Audit

Which of the following is the loss potential that may result from the indirect theft of assets?

Security compromise

Transport layer protocols break large data units received from the Session layer in mulitple smaller units called _____

Segments

When a receiver picks one frequency out from all other frequencies, it's performing which of the following functions?

Selection

A quartz crystal filter is used in a communications receiver to improve which of the following characteristics?

Selectivity

How is receiver's ability to reject unwanted signals and receive desired signals determined?

Selectivity

____ is a method of identifying segements that belong to the same group of subdivided data.

Sequencing

To take power readings, you connect an in-line RF power meter in what configuration in the transmission line?

Series

Which of the following messages are described as short and concise messages between operators dealing with message corrections, broadcast reruns and missent or misrouted messages?

Service only

Which of the following measurements provides an indication of the ability of a receiver to reproduce weak signals?

Sesitivity

Which type of illegal computer activity involves taking control of a legitimate user's web application session while it is in progress?

Session Hijacking

How many layers are there in the OSI reference model?

Seven

Networking gives an individual the capability to communicate and connect with another individual or another system in order to accomplish which of the following tasks?

Share resources

Uniform capacitance throughout the length of the line is an advantage of which of the following transmission lines?

Shielded pair

The AIS technical manager can develop measures to use in case of emergency by reviewing operations and records with which of the following personnel?

Shift leaders

What does the acronym SNAP stand for?

Shipboard Non-tactical ADP Program

Which of the following is used to allow users to access resources on different servers in the domain when they log on to their computers?

Single sign-on

The simplest and the most commonly used operating systems on microcomputers are which of the following types?

Single user/single tasking

Prompt fire detection is best accomplished through the use of which of the following detectors?

Smoke

What type of cleaning solution should be used on the exterior of computer components?

Soap and water

The term ____ refers to those skills that are not easily measurable, such as customer relations, oral and written communications, dependability, teamwork, and leadership abilities.

Soft Skills

A computer that is designed to perform a specific operation is what kind of computer?

Special purpose

All analog computers are what type?

Special purpose

A _____ is a tool that can be used to assess the quality of a wireless signal

Spectrum Analyzer

Of the following advantages, which one is primary to the NTDS when compared with conventional data systems?

Speed

Radio waves travel at what speed?

Speed of light

Which of the following can you use to restart the print spooler from the command prompt?

Spoolsv.exe

What artificial satellite is credited with starting the era of space technology?

Sputnik

_____ are physicallt designed to be linked with other hubs in a single telecommunications closet.

Stackable Hubs

What is the relationship between the values of the bel and the decibel?

The decibel is 1/10 the bel

What is the currently approved method of requesting PSI products from OPM to support determinations of eligibility for assignment to sensitive national security positions or access to classified national security information?

Standard Form 86

A document issued by an organization to advise its personnel of internal routine practices is most commonly issued in what format?

Standard operating procedure

____ are documented agreements containing technical specifications or other precise criteria that stipulate how a particular product or service shoudl be designed or performed.

Standards

Which power conservation mode used in portable PC's turns off selected components such as the hard drive and display, until a system event, such as a keyboard entry or a mouse movement, occurs?

Standby mode

The resultant waveform obtained by adding the incident wave to the reflected wave is referred to as a/an ______

Standing wave

What network topology connects each computer on a network to a central access point?

Star

When measuring unknown currents, you should determine the range scaled that is appropriate in what way?

Start with the highest scale and work down

Which of the following methods to build and maintain routing tables takes maximum administrative efforts and time in a large network?

Static

Floppy disks provide which of the following functions?

Store data

What type of cable would you use between a router and a switch?

Straight-through cable

A complex of links make up a major communications system. The naval communications system is further broken down into what two groups?

Strategic and tactical

Extremely low-frequency transmissions are primarily directed at which of the following users?

Submarines

Which of the following components of an IP address is used to distinguish the network address from a host address?

Subnet Mask

A(n) _____ is a special 32-bit number that, when combined with a device's IP address informs the rest of the network about the segment or network to which it is attached.

Subnet mask

_____ separates a network into multiple logically defined segments.

Subnetting

Each time there is a control break, what does the program developed by the report program generator print?

Summary information

What are the three types of keying material in descending priority of destruction?

Superseded, effective, reserve

You have decided to use WEP for securing the wireless network segment in the organization. Which of the following terms describes the user who wants to connect to this secure network?

Supplicant

Which of the following transport protocols is used by TACACS+?

TCP

What protocol suite is utilized by most Windows-based networks, as well as Linuz, Unix, MacOS and other networks?

TCP/Ip

The setting of what control establishes the amplitude point of the input waveform at which the display sweep will begin?

TRIGGER LEVEL

The risk analysis should be reviewed by which of the following people?

Technical manager

CND synchronizes what?

Technical, operational and intelligence assessments of the network

Which of the following terms includes intelligence produced by wire, radio, visual means, oral means or electromagnetic systems?

Telecommunications

What is perhaps the most common source of magnetic field that can a floppy disk?

Telephone

Any modern client running the TCP/IP protocol suite will be capable of connecting to a UNIX-type of host via _____

Telnet

One of the network administrators in your company has asked you to block port 23 on the router. Which of the follwoing services is he asking you to block?

Telnet

_____ is a terminal emulation protocol used to log on to remote hosts using the TCP/IP protocol suite.

Telnet

Of the following terms, which one is primarily concerned with compromising emanations?

Tempest

A(n) _____ converts digital signals into analog signals for use with ISDN phones and other analog devices;

Terminal Adapter (TA)

The unidirectional radiation pattern of the rhombic antenna is caused by which of the following antenna characteristics?

Termination resistance

Which of the following equipment is used to absorb a transmission at the end of a network?

Terminators

Describe the Link Layer's function

The networking scope of the local network connection to which a host is attached

Which group can run Remote Assistance function?

The Help Assistance group

You are using the CW mode of the radio transmitter unit. The 500-kilohertz local carrier is directly inserted into which of the following circuits?

The IF amplifiers

What Windows tool can be used to configure most modern routers?

The Internet Explorer web browser

Which Windows tool is used to safely remove hot swappable devices in Windows XP?

The Safely Remove Hardware utility

When you start up your PC, there are several unfamiliar icons in the notification area of the taskbar and the system's startup response is noticeably slow. What Windows utility should you use to troubleshoot these symptoms?

The MSCONFIG utility

Which Windows utility can be used to automate many routine or periodic functions?

The Schedule Tasks tool

Plate- and collector injection modulators are the most commonly used modulators for which of the following reasons?

The RF amplifier stagescan be operated class C for maximum efficiency

Which of the following statements about a wave is the law of reflection?

The angle of incidence is equal to the angle or reflection

A rotating coil in the uniform magnetic field between two magnets produces a sine wave. It is called a sine wave because the voltage depends on which of the following factors?

The angular position of the coil in the magnetic field

What determines the size of an analog computer?

The number of functions it has to perform

When submitting a trouble report, you must follow the instruction from which of the following commands?

The command receiving the trouble report

Who is responsible for implementing the recommendations received from the inspection?

The commanding officer

For which of the following reasons does the Navy use only the upper and lower ends of the MF band?

The commercial AM band occupies the middle

When you are selecting forward or reverse power measurements, what component(s) of the RF wattmeter is/are restricted to a 180º rotation range?

The coupler detector

Excessive modulation signal levels have which, if any, of the following effects on a control-grid modulator?

The create distortion

For a meter to read linearly, its face is divided into equal segments. What meter feature makes this possible?

The curved poles of the permanent magnet

What is an important point to remember about the MIKE and YANKEE zones?

The day changes, but the time remains the same

When you are testing an in-circuit diode with the transistor tester, the meter pointer deflects below the midscale point. What does this indicate?

The diode is faulty

Which scanner component converts the scanned image into a digital format?

The diodes in the light detector array

The state of each core in magnetic core storage is changed by what?

The direction of magnetism

When a pencil or ballpoint pen is used to write on the label after it is attached to the disk, what, if anything, can happen to a disk?

The disk can be destroyed

Which of the following is the main weakness of symmetric encryption algorithms?

The distribution of keys

The distance between the read/write head and the surface of a hard disk is called what?

The flying height

When the amount of oscillator frequency shift in an FSK transmitter is determined, which of the following factors must be considered?

The frequency multiplication factor for the transmitter amplifers

Many complex antennas are constructed from what basic antenna?

The half-wave antenna

You have been called to troubleshoot a desktop PC system that produces frequent, intermittent shutdowns, blue screen errors, and makes loud clicking sounds. What is the cause of these problems?

The hard disk drive is failing

If the PC system briefly shows a blue screen and continuously reboots, which of the following is likely causing this condition?

The hard drive is full

Damaging electrostatic discharge is most likely to occur when?

The humidity is low

The bel is a unit of measure used with voltage, current or power that compares which of the following circuit values?

The input to the output

What development in satellite communications improved back up power during eclipses?

The installation of a battery back up

What is the preferred method of ordering advancement examinations?

The internet

There were many limitations that cause problems on the first communications satellites. Of the following problems, which one was considered the most severe?

The lack of a suitable power source

The availability of a satellite to act as a relay station between two earth terminals depends upon which of the following considerations?

The location of the earth terminals

Who exercises operational control over the DCS?

The military head of DISA

A detector uses which of the following signals to approximate the original waveform?

The modulation envelope

After work on equipment is complete, who should remove any attached tags?

The person who signed and attached the tag

In the centrifugal tachometer, what component restricts the action on the lower collar that is produced by the centrifugal force?

The pointer

In a network printing environment, what Windows structure controls printing for everyone on the network?

The print spooler

What Windows structure allows multiple files to be loaded onto a printer for printing?

The printer queue

The scanner light comes on but you get an error message when an application calls for a scan. What is the problem?

The scanner's TWAIN drivers are not installed

The weight of the rotating coil assembly and the type of bearings used in the D'Arsonval meter are factors that affect which of the following characteristics of the meter?

The sensitivity

What are the effects of heat buildup and microprocessor fan failures on computer systems?

The system locks up after a short period of operation

In a reactance-tube modulator, the reactance tube shunts what part of the oscillator circuitry?

The tank circuit

In bubble memory, where is the control circuit imprinted on the crystal of semiconductor material?

The top

In a radio frequency carrier shift system, what equipment is the source of radio frequency excitation voltages?

The transmitter keyer

Which of the following ports is considered the fastest and supports a number of external devices for a laptop as well as for desktops?

USB

What type of printer uses a multicolored waxed ribbon that small pins heat up to melt the wax onto the paper?

Thermal Wax

You have decided to implement IPSec protocol to provide secure end-to-end communication to remote access clients. In which of the following modes should you implement this protocol?

Transport mode

CHAP can be described as what type of authentication?

Three-way handshake

How is the long term stability and accuracy required of modern communications receivers attained?

Through a process known as frequency synthesis

For ship-to-shore teletypewriter circuits, which of the following types of multiplexing is/are used?

Time and/or frequency

What is the purpose of the Fn key on a notebook PC?

To access additional functions from the keyboard

For what purpose was the ETE classification board established?

To control the increase of nonstandard GPETE

An additional bit in each storage location called parity bit is used for what purpose?

To detect errors

Data is stored on all disks in a number of invisible concentric circles called what?

Tracks

What is the purpose of address indicating groups (AIGs)?

To reduce the number of address groups required in the heading of a message

Signal generators are equipped with attenuators for which of the following purposes?

To regulate the output signal level

How should you protect information and resources?

To the degree commensurate with their value

What is the principal use of the oscilloscope?

To visually examine waveforms

In _____ , a 3-byte oacket, called a token, is transmitted from one node to another in a circular fashion around the ring.

Token Passing

In an afts transmitting system, the conversion of DC signals into audio tone shift signals is done by which of the following pieces of equipment?

Tone terminal set

In EIGRP, where would you find the feasible successor route?

Topology table

Where is the feasible successor route stored in EIGRP?

Topology table

Which of the following messages are used to determine delay or nondelivery of a message on a station-to-station basis?

Tracer only

The _____ utility uses ICMP to trace the path from one networked node to another indentifyingall intermediate hops between the two nodes

Traceroute, Tracert

What is a single ring of data on one side of a disk?

Track

The NWPL administrative file is also known by what other term?

Transaction file

Of the four major types of instructions, which one has the basic function of moving data from one location to another?

Transfer

Which of the following parts in a laser printer is used to transfer a high positive voltage to chage the paper?

Transfer corona wire

Which of the following processes help deposit the toner from the EP drum onto paper?

Transferring

Computers of the second generation were characterized by what technology?

Transistors

Which of the following terms describes the time between a space and mark or mark and space condition in a teletypewriter?

Transition

Some substances are able to transmit light waves but objects cannot be seen through them. Which of the following properties does this statement describe?

Translucence

The self authentication method is used in which of the following transmissions?

Transmission and Authentication

The dimensions of transmitting antenna are determined by which of the following factors?

Transmitted frequency

Substances that transmit almost all of the light waves falling upon them posses which of the following properties?

Transparence

Which layer ensures data units are delivered error free, in sequence, with no losses or duplications?

Transport

In a LoS communications system, propagation is affected by which of the following layers of the atmosphere?

Troposphere

Normally the transmission range of VHF is limited to LoS. What technique is used to increase range?

Tropospheric scatter

What are principles, standards or qualities considered worthwhile by an individual or a group?

Values

The horizontal sweep channels of the dual trace oscilloscopes have which of the following time base circuit configurations?

Variations of all the above configurations

The full accuracy of the frequency standard is sacrificed when which of the following types of tuning is used?

Vernier

For ground-wave transmissions, what type of polarization is required?

Vertical

The VERT control adjustment controls what position of the signal on the CRT display?

Vertical

The POSITION control on the spectrum analyzer is used to adjust which of the following CRT display features?

Vertical and horizontal position

Omnidirectional transmission is obtained from which of the following antennas?

Vertical half-wave

Adjacent channel selectivity and image frequency suppression have been improved in this receiver by the addition to which of the following features

Very accurate frequency standard

What controls the informaiton you see on the monitor?

Video Card

Administrators' access to IT systems from outside the enclave must use what?

Virtual Private Network (VPN)

The distance between corresponding points on a wave's cycle is called its ____

Wavelength

A(n) ____ is a computer installed with the appropriate software to supply Web pages to many different clients upon demand.

Web Server

The RCL bridge measures an unknown resistance by balancing the resistance value of the unknown component with that of known components inside the test set. What type of circuit is used in this method of measurement?

Wheatstone bridge

A cathode modulator is used in which of the following situations?

When AF power is limited and distortion cannot be tolerated

Phase-shift keying is most useful under which of the following code element conditions?

When mark and space elements are the same length

The second specific part of the predicate in a computer instruction, known as the operand, in general answers what question?

Where

The utility that allows you to query the DNS registration database and obtain information about a domain name is called _____

Whois

LANs in differenct locations can be connected by high-speed fiber-optic, satellite, or leased phone lines form a?

Wide Area Network (WAN)

When a pulse duration modulated signal is determined by using a low pass filter, what characteristic of the signal is used?

Width

Designers were able to increase the data density of a disk by increasing the number of tracks. What code name was given to this technology?

Winchester

Hard disk drives are sometimes referred to as?

Winchester Drives

The _____ provides a means of resolving NetBIOS names to IP addresses.

Windows Internet Naming Service

What is another name for a dot matrix printer?

Wire-matrix

EPROM can be erased by what method?

With a burst of ultra-violet light

The POST routines are contained where?

Within the motherboard ROM as well as ROMs on expansion cards

The time zone which passes through Greenwich, England, is most commonly known by what term?

ZULU time zone

Before you can take an accurate resistance measurement with an ohmmeter, what meter adjustment must you complete?

Zero resistance

In addition of four numeric bits, there are four other bit positions used in an a-bit code, what are they called?

Zone bits

Which of the following commands would you use to display an administrative message when a person connects to a router?

banner motd

Certifcation and accreditation (C&A) of information systems that process Top Secret Sensitive Compartmented Information will comply with the requirements of what?

Director of Central Intelligence Directive

What frequency is used for the International Aeronautical Emergency Frequency for aircraft and those aeronautical stations primarily concerned with the safety and regularity of flight along national or international civil air routes and having equipment in the 118-136 MHz band?

121.5 MHz

What frequency is for international use by the Maritime Mobile VHF Radiotelephone Service as a distress, safety and calling frequency?

156.8 MHz

What frequency is the International Distress, Safety and Calling frequency for the maritime mobile VHF radiotelephone service?

156.8 MHz

What frequency is agreed internationally for use by equipment provided for use in Survival Craft Stations, which is capable of operatiing on bands between 235 and 328.6 MHz?

243 MHz

Which frequencies are used to supplement the carrier frequency 2182 kHz for Distress and Safety purposes and for call and reply?

4125 kHz and 6215 kHz

What motherboard form factor is used in Standard tower and desktop systems; most common form factor from mid-1996 through thr present; supports high-end systems?

ATX

What limits access to information system resources only to authorized users, programs, processes or other systems?

Access Control

What is the primary device on a PC that is used by a human to communicate with a control system?

Keyboard

What is a chronological record of system activities to enable the reconstruction and examination of the sequence of events and/or changes in an event?

Audit Trail

What is the security measure designed to establish the validity of a transmission, messge or originator, or as a means of verifiying an individual's authorization to access specific categories of information?

Authentication

What motherboard form factor is used in tower and desktop systems; popular in high-end major OEM systems starting in 2007?

BTX

What is the probability that a particular vulnerability will be exploited within an interacting population and adversely impact some members of that population?

Community Risk

What provides the assurance the information is not disclosed to unauthorized entities or processes?

Confidentiality

What kind of plan is maintained for emergency response, backup operations, and post-disaster recovery for an information system, to ensure the availability of critical resources and to facilitate the continuity of operations in an emergency situation?

Contingency Plan

Immediately before a crash landing or a forced landing (on land or sea) of an aircraft, as well as before total abandonment of a ship or an aircraft, the radio equipment should be set for what type of emmission?

Continuous

What physical and cyber-based systems are essential to the minimum operations of the economy and government?

Critical Infrastructures

What is a condition of being threatened by serious and/or imminent danger and of requiring immediate assistance?

Distress

What is a type of incident resulting from any action or series of actions that prevents any part of an information system (IS) from functioning?

Distributed Denial of Service

Which instruction states that all DoD information systems and networks will be certified and accredited IAW with the DoD policy and guidance, currently the DoD Information Technology Security Certification and Accredidation Process (DITSCAP)?

DoD Instruction 5200.40

What is an occurrence, not yet assessed, that may effect the performance of an IS?

Event

What is a system designed to defend against unauthorized access to or from a private network?

Firewall

What is a program recorded in permanent or semi-permanent computer memory?

Firmware

Which type of threats describes common hacker tools and techniques used in a non-sophisticated manner?

First Generation

What intergrates an organized, manned, equipped and trained workforce to guard, secure and secure information and information systems by providing the security services/attributes of availability, authentication, confidentiality, integrity and non-repudiation?

Information Assurance

Who is the individual responsible for the information assurance program of a DoD information system or organization?

Information Assurance Manager

Who is the individual responsible to the IAM for ensuring the appropriate operational IA posture is maintained for a DoD informatioin system or organization?

Information Assurance Officer

What is the ability to rapidly collect, process, and disseminate information while denying these capabilities to adversaries?

Information Superiority

What is the quality of an information system reflecting the logical correctness and reliablity of the operating system?

Integrity

What is the core of the system?

Motherboard

What was the first and most popular pointing device on the market?

Mouse

What is the assurance the sender of the data is provided with proof of delivery and the recipient is provided with proof of the sender's identity, so neither can later deny having processed the data?

Non-repudiation

What feeds electrical power to the internal components in the PC?

Power Supply

What is often thought of as the "engine" of the computer?

Processor

What are the three main types of physical memory that are used in modern PC's?

ROM, DRAM, SRAM

What is a type of momry that can permanently or semi-permanently store data?

Read-only memory (ROM)

What is the possibility that a particular threat will adversly impact an IS by exploiting a particular vulnerability?

Risk

What is a condition concerning the security of a ship, aircraft or other vehicle, or of some person on board or within sight, but which does not require immediate assistance?

Urgency

What traffic shall have priority over all othe communications except distress?

Urgency

The frequency 2182 kHz (and it's supplementary frequencies 4125 and 6215 kHz) is the International Distress frequency for what?

Voice

What is a weakness in an information system, system security procedures, internal controls or implementation that could be exploited?

Vulnerability

What is a formal description and evaluation of vulnerabilities of an information system?

Vulnerability Assessment


Conjuntos de estudio relacionados

PRT 3206 Hospitality Law Final Review

View Set

ATI Practice Test (Anticoagulants)

View Set

Male reproductive system Chapter 28

View Set

Chapter 9 Commercial General Liability Coverage

View Set