Annex C and D

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following best describes the primary purpose of a virtual machine?

Allows better management of resources such as CPU, disk space, and memory

Who are wholesale supplies within the Marine Corps managed by?

Commander, Marine Corps Logistics Bases

RO appointment letters are an agreement between the the RO and the __________.

Commanding Officer

Responsible for cybersecurity practices for all information systems and networks within their purview and to ensure systems' site Assessment and Authorization (A&A) is in accordance with D0D policy.

Commanding Officer

Routers use hop count to determine shortest ways to send packets. Routers forward their routing table to all of their directly connected neighbors, then those routers forward that information on to routers that are further away while adding a 'Hop'.

Distance Vector Routing

What are the two types of VoIP call processing?

Distributed, Centralized

With regards to Client/Server configurations, what is an example of fault tolerance?

DYNAMIC FAILOVER

What is the purpose of the TCP/IP Network Layer?

Defines how to deliver IP packets over the entire trip, from the original device that creates the packet to the device that needs to receive the packet.

A hacker launches an attack at what stage of the cyber kill chain?

Delivery

VLANs are created based on the following considerations: security, spacific projects, performance, broadcast domains, and ________.

Device Type (server, phone, laptop)

What is a T/O&E?

A report that consolidates both manpower and equipment requirements into one document

What is an operating system?

A type of software that works as an interface between the user and computer to perform all the tasks like memory management, file management, input & output handling, security, process management, Job accounting, error detecting, system performance controlling, peripheral devices controlling

What is an Operating System (OS)?

A type of software that works as an interface between the user and computer to perform all the tasks.

What three letters can TAMCNs for communications-electronics equipment start with?

A, H, T

With regards to Client/Server configurations, what is an example of scalability?

ABILITY TO ADD SERVERS

The ____________ primary mission is to develop the communications plan in support of (ISO) the Division / Marine Aircraft Wing / Marine Logistics Group.

AC/S G-6

Implemented on routers and firewalls to identify what traffic is allowed and denied

ACCESS CONTROL LISTS

The most common type of service request is typically ______

ACCOUNT CREATION

This message is a unicast message sent from a DHCP Server and includes all information on a DHCP Lease.

ACKNOWLEDGE

A list of permissions associated with an object. The list specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.

ACL

This is commonly used to control the type of traffic both into and out of a network.

ACL

A hacker achieves their original goals at what stage of the cyber kill chain?

ACTIONS ON OBJ

A hacker conducts data theft, destruction, encryption, or exfiltration at what stage of the cyber kill chain?

ACTIONS ON OBJECTIVE

By definition, a Microsoft Exchange organization is a common security context of Microsoft Exchange Server systems and their resources. What is the Exchange organization most closely related to?

AD FOREST

What are topic-based messages?

Allow receivers to register to consume messages selectively based on particular topics of interest.

What is the point of the Global Combat Support System - Marine Corps (GCSS-MC)?

Allows Marines to have a single point of entry for all supply and logistics-related product and service requests

Which of the following is NOT a disadvantage of a Peer to Peer server architecture?

High cost to implement

What characteristics does Black Core Routing have relative to Enclave over Enclave (i.e. SIPR over NIPR) Routing?

Higher Availability, More Equipment, More Overhead

With regards to Client/Server configurations, what is an example of high availability?

Hot, Warm, and Cold Sites

How can an administrator enhance the functionality of a GPO?

How can an administrator enhance the functionality of a GPO?

Which of the following cloud service models provides storage, servers, and networking hardware?

IAAS

Monitor a network and send alerts when they detect suspicious event on a system or network

IDS

Which of the following is the TDL used between F-22s?

IFDL

What is a Microsoft product for hosting web pages, FTP sites, and used as the framework for supporting email?

IIS

Which IL would be a public community cloud?

IL2

You are designing a website that has information cleared for public release. You are seeking to host it in the cloud. Which IL is this?

IL2

You have a DoD public website in the cloud. Which IL is this?

IL2

Which IL would be a LIMITED public community cloud?

IL4

You have CUI information and you want to host it in the cloud. Which IL is this?

IL4

Which IL would be a federal government community cloud?

IL5

You have NSS information and you want to host it in the cloud. Which IL is this?

IL5

Which IL would be a federal government community cloud but physically separate from unclassified systems?

IL6

You have SECRET information and you want to host it in the cloud. Which IL is this?

IL6

Indicates that all traffic that is not explicitly allowed is blocked

IMPLICIT DENY

Which of the following is NOT a benefit of containerization?

INCREASED BANDWITH

Your OpsO submitted a trouble ticket for an email issue over a week ago. Her initial issue was resolved but now she contacts the help desk to request some additional information on her email's functionality. This is an example of what?

INFORMATION REQUEST

The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to ensure confidentiality, integrity, and availability. Is the definition of?

INFORMATION SECURITY

Malware is installed on a victim's system at what stage of the cyber kill chain?

INSTALLATION

Privilege escalation would most likely occur at what stage of the cyber kill chain?

INSTALLATION

You need to assure that information is not modified, tampered with, or corrupted assuring _________________.

INTEGRITY

A global system of interconnected governmental, academic, corporate, public, and private computer networks. It is based on the networking technologies of the Internet Protocol Suite.

INTERNET

Per the Joint Communications System publication, C2 systems must be __________. (The publication references four traits - select one)

INTEROPERABLE AGILE TRUSTED SHARED

Your commander has requested support from your higher headquarters to conduct planned operations with the intent of conveying selected information and indicators to foreign audeinces to influence their emotions, motives, objective reasoning, and behavior. In which information-related capability is your commander engaging?

MISO

Which of the following units is expected to have the least services requirement?

MMT

Which of the following Marine Corps platforms is currently an airborne C2 platform but will be replaced with MANGL once it is fielded?

MNM

Which of the following is NOT a warfighting function that must be supported by your data systems architecture?

MOBILITY

What does the Marine Corps utilize as its application to provide email services?

MS Exchange

This vehicle is associated with AFTADS:

MTS

The maximum size of a PDU that can be communicated at once is called _____________

MTU

One source to multiple destinations

MULTICAST

Which of the following does not fall under the broad term of "transport?"

MULTICHANNEL RADIO OR DATA SYSTEMS

Which device can do inter-VLAN routing?

MULTILAYER SWITCH

A router that takes in multiple signals to combine into a common transport network is doing what process?

MULTIPLEXING

________ provides the architectural backbone for your data systems architecture.

MULTIPLEXING

Which of the following is NOT a class of supply?

Mail

In terms of Messaging Servers, where are all mailboxes in the organization housed?

Mailbox Database

This type of work can be divided into three important groups: Hardware, OS, and Application.

Memory Management

In additional to serving as a backup capaiblity for computing ballistic firing solutions, the BUCS also provides which of the following software applications

Meteorological plotting

Which of the following does NOT help describe information exchange requirements.

Method or system used to transmit information

Once a new Mailbox Database is created, _____ must be restarted.

Microsoft Exchange Information Store

Most USMC networks/domains include _______.

Microsoft Windows

Select all the answers that are an OS:

Microsoft Windows, Apple macOS, Android, Apple iOS, Linux

This LOE strives to broaden and improve the Joint Force's ability to exchange information and coordinate actions and effects in all types of combined operations.

Modernize Mission Partner Information Sharing

What type of device is capable of inter-VLAN routing?

Multilayer Switch

This characterisitc of an OS allows an operator to execute one or more computer tasks at a time.

Multitasking

The _____ is a storage type that sits on a network and offers storage to servers on the network.

NAS

Which of the following is a type of virtual storage that the Marine Corps does NOT currently use?

NAS

The RO formally delegates authority for their assigned duties with which of the following:

NAVMC 11869

Which layer of the OSI model is concerned with logical addressing?

NETWORK

The MITSC has been phased out by the establishment of _______ and the Enterprise Service Desk

NETWORK BATTALIONS

Which of the following is NOT a common reason to contact a help desk?

NETWORK CHANGE REUEST

This protocal build a table relating the next physical link to reach a logical address. Generally used in build dynamic tunnels.

NHRP

Which of the below is a protocol used by routers for relating physical and logical interfaces in establishing a multi-point tunnel dynamic network?

NHRP

For documents and information with classification up to and including UNCLASSIFIED/FOUO. a.SIPR b.CENTRIXS c.MCEN d.NIPR

NIPR

Which of the following requires a DMVPN Connection?

NIPR Connection between multiple sites using one hub not using a KG175D

Which of the following requires a IPSec Connection?

NIPR Point to Point Connection between sites not using a KG175D

Your IP allotment is 10.10.51.0/25 for physical and 172.16.51.128/27 for logical. You must provide for 50 transmission links and 45 DMVPN spokes. Do you have the IP space for the spokes?

NO

A _______ is a robust hub that operates at higher-level units (typically MEFs, MSCs, Deployed MEBs) that specifically addresses network operations.

NOC

VLAN 403 is a

NOMRAL RANGE VLAN

What security protection is likely being applied by the modem of a VSAT-M?

NOT IPSEC

You can only take one "green case" network item and one KG175-D with you to host both NIPR and SIPR on for 50 combined users (35 SIPR and 15 NIPR). What are you grabbing off the shelf?

NOTHING MY NCOS WILL GRAB A LSM

What USMC systems utilize a KG-250X?

NOTM, VSAT-E

Which of these documents provides the foundational argument and justification for JADC2?

National Defense Strategy

____________________ is the first step to any cyberspace operation. It provides operators a visual depiction of the physical and logical terrain comprising the cyber battlespace.

Network Mapping

What information must match to develop an adjacency with another router in EIGRP

Network statment, ASN, connected network

This OS characteristic refers to the processor interacting through communications lines.

Networking

Eighteen sites are being established simultaneously via a DMVPN network. Services are hosted via the hub site. You are at a spoke site and are the first to get your V-SAT Connection "on the bird." The CO wishes to call to higher. Will he be able to?

No, because the hub site must also be established for you to pass traffic.

NIPR Connection between multiple sites using one hub not using a KG175D

No, because the hub site must also be established for you to pass traffic.

A IPSec tunnel is being established from your site to another one via V-SAT TDMA connection. Latancy has been an issue through out the operation. LCpl Smith says the VPN should correct this by establishing a PtP connection between yourself and the destination. Is she correct and why or why not?

No, it will be the same because the traffic still needs to pass through the physical network

This message is a unicast message sent from DHCP Servers in response to an asset seeking their presence.

OFFER

Which document is the TDL plan or architecture?

OPTASKLINK

What is the default Exchange organization name for USMC?

ORGANIZATION

A _____ is a type of software that works as an interface between the user and server.

OS

Containers allow for which virtualization model?

OS kernel

Which of the following are logical groupings of objects that exist inside of a domain?

OUS

What includes users, computers, printers, servers, and other network resources.and are the basic building blocks of Active Directory?

Objects

You're the S6 at V22 and your OpsO calls to notify you that her computer is unable to access the internet. What do you advise your helpdesk to do?

Open a Trouble Ticket

Select from the following the correct categories of radio nets.

Operational Nets, Fires Nets, Support Nets

What is the automation of container deployment, management, scaling, and networking?

Orchestration

Increasing the VM's RAM, CPU, etc.

PAAS

You want a place to develop an application, but you don't want to manage anything more. Which cloud service model is best for you?

PAAS

What is the PDU for the Network Layer of the TCP/IP Model?

PACKET

The VOIP Telephony Network Diagram conveys all of the following EXCEPT:

QUANTITY OF USERS

Call Admission Control (CAC) prevents IP calls from being extended across the WAN link, if the additional bandwidth required would exceed the CAC-allocated bandwidth for concurrent calls, thus preventing oversubscription.

TRUE

Which system provides complete Radio over IP (RoIP) services at your CoC, Techcon, or Ant Hill?

TRICS/WAVE

A feature that would qualify your network as having good network design is that your network is highly scalable and can grow without major design changes. Select one: a.False b.True

TRUE

A publisher server is the only Call Manager whose database can be altered.

TRUE

Class of Control is configured on a CUCM using Partitions and Calling Search Spaces.

TRUE

Data Networks typically require a lot of Coordinating Instructions.

TRUE

Directly Connected Routes are a type of Static Route.

TRUE

During orders crosswalk, the staff compares their unit's order with the orders of higher, adjacent and subordinate unit's orders to achieve unity of effort and ensure the commander's intent is met.

TRUE

Intermediate data devices, such as switches and routers, fall in between the end devices.

TRUE

Microsoft uses a protocol called Lightweight Directory Access Protocol (LDAP) for Microsoft Active Directory

TRUE

NHRPs are used to discover what physical tunnel destinations (NBMA Addresses) match a logical tunnel interface (VPN IP Address).

TRUE

NIPRNet can use DHCP.

TRUE

Peer-to-Peer Networks are notoriously easy to set up and do not require consistent maintenance.

TRUE

An physical connection between a switch and another networking device, such as a router or another switch, that carrys the traffic of multiple VLANs is called what?

VLAN TRUNK

You're the 3d MAW G6 OpsO. After establishing a data center and server room at Building 7777, your 0670 recommends migrating your virtual machines from your previous server room to the new site. Which of the following features might you recommend to migrate your file system?

VMOTION

Which of the following is most commonly used by the Marine Corps to virtualize servers?

VMWARE

Which of the following is most commonly used by the Marine Corps to virtualize servers?

VMWare

Which of the following should have priority over other traffic on your network? a.Email b.Voice c.Chat d.Web Data

VOICE

This is a method by which you logically divide the router into multiple routing devices. Each division functions seperately and must be configured to route between each other.

VRF

This method of Black Core Routing does no require the use of a seperate router specifically for the colorless network.

VRF

VRFs are the TCP/IP Layer 3 Equivalent of a

VRFs are the TCP/IP Layer 3 Equivalent of a [VLAN]

Which of the following is not a core component of a Voice over IP nework?

VTC

Combines GRE and IPsec into new tunnel interface to support encryption, multicast, and routing protocols.

VTI IPSEC

________ is a Layer-2 trunking protocol that enables a network manager to configure a single switch so that it propagates VLAN configuration information to other switches in the network.

VTP

A proactive security practice designed to prevent the exploitation of IT vulnerabilities that may exist on the MCEN. The projected benefit is to reduce the time and money spent dealing with vulnerabilities and exploitation of those vulnerabilities.

VULNERABILITY MANAGEMENT

The unit you're a part of wants to receive the air picture, but doesn't have a radar. In the battlespace you DO have line of sight with the other participants, as well as a network connection and CAC2S. What is the best way you can receive the air picture?

Via CAC2S's MIDS terminal

The unit you're a part of wants to receive the air picture, but doesn't have a radar. In the battlespace you do NOT have line of sight with any of the other participants, but you DO have a network connection and CAC2S. What is the best way you can receive the air picture?

Via JREAP-C

The ___________ is a family of interoperable video exploitation and management systems designed for capturing, classifying, archiving, and disseminating video.

Video Scout

What is a ISO file (ISO.)?

Virtual Copy of a Disk

_____ run on a software platform that runs an operating system and applications.

Virtual Machines

What is an ADSI?

Virtual server that combines and displays track information

Microsegmentation provides consistent security across private and publics clouds by what three key principles?

Visibility, Granularity Security, Dynamic Adaptation

Which of the following documents supports the Marine Corps' Network Modernization policy and establishes the way forward in advancing the competitve edge in the modern battlespace?

DoD CIO CPG

IL5 can accommodate what type of information?

DoD CUI and National Security Systems (NSS)

IL6 can accommodate what type of information?

DoD Classified Information up to SECRET

IL4 can accommodate what type of information?

DoD Controlled Unclassified Information (CUI)

IL2 can accommodate what type of information?

DoD Information cleared for public release

What server can only be a member of one domain and provides directory services running Windows Server?

Domain Controller

You are the acting Regimental S-6 at a CLR at a Regimental Ops meeting. You know you are connecting to both Div and MLG who each have their own DMVPN Hubs who are themselves spokes to the MEF TIE network. You are drawing server services from the MEF TIE. What option below best supports redunancy?

Dual Hub Dual DMVPN to both sites

Which of the following would be done in the cyber kill chain's C2 stage?

Establishing a connection to an outside server

Layer of OSI model that deals with packets

3

You are supervising the embarkation for a site with 80 users. Your only switch has room for 48 users. You have 5 of them. Your 0631 is taking ___ of them. a.2 b.5 c.4 d.3

3

How many hosts can there be on a /27?

30

An IP address consist of how many bits?

32

What is the most likely latency across a tunnel established over LOS links?

35MS

How many 10Gb capable ports are on the LEM?

4

How many nodes does Exchange Server Enterprise Edition support when using WINDOWS 2000 SERVER?

4

Layer of OSI model that deals with Segments

4

When requesting DISN services at minimum how far out will an Exercise Authorization Package be submitted.

45 DAYS

You are in a foreign nation using NIPR, SIPR, Mission Secret, and CENTRIX enclaves. at minimum how many VRF's must be programmed on the Transport router to facilitate this.

5

When installing Exchange Server, _____ of space is required for each Language Pack.

500MB

What is the most likely latency across a tunnel established over FDMA satelite links?

500MS

What is the most likely latency across a tunnel established over Fiber links?

5MS

Which Layer translates data from lower layers into a usable format for the Application Layer?

6

How many hosts can their be on a /26?

62

How many layers are in the OSI model?

7

What primary layer of the OSI model do Data Systems Marines use?

7

What is the most likely latency across a tunnel established over TDMA satelite links?

700MS

How many nodes does Exchange Server Enterprise Edition support when using WINDOWS 2003 SERVER OR LATER?

8

What is the Maximum number of Ports that can be active in an Etherchannel Group?

8

The System Link Designator (SLD) consists of _____ characters, but often only uses _____ characters.

8 / 5

How many days out are you required to coordinate with the JICO to identify network requirements?

90

Key terrain in cyberspace is analogous to key terrain in the physical domains in that holding it affords:

A COMBATANT A POS OF MARKED ADVANTAGE

What is a GPO?

A collection of settings that define what a system will look like and how it will behave for a defined group of users.

What is a track?

A depiction of where either friendly or enemy units are currently located

What is storage vMotion?

A feature that allows the live migration of a running virtual machine's VMDKs from one storage system to another, with no downtime for the VM.

What is an SCCM?

A paid lifecycle management solution from Microsoft that keeps track of a network's inventory, assists in application installation, and deploys updates and security patches across a network.

What is Metadata cleanup?

A procedure conducted via GUI, CLI or within ADDS after a forced removal of a domain controller.

What is Cisco Jabber/Webex?

A program that provides unified communications for information, instant messaging, voice and video communication, web conferencing and desktop sharing.

Which MOS designates a Data Systems Engineering Officer?

0670

Which MOS designates a Data Systems Administrator?

0671

How many roles can a server have?

250

The subnet mask for a /24 network is:

255.255.255.0

For a requirement of 8 hosts, which of the following would work best?

255.255.255.240

The subnet mask for a /27 network is:

255.255.255.240

For a requirement of 4 hosts, which of the following would work best?

255.255.255.248

The subnet mask for a /30 network is:

255.255.255.252

The subnet mask for a /31 network is:

255.255.255.254

How much Random Access Memory (RAM) is in each server of the Application Services Module?

256

What is the primary MOS of a Gunnery Sergeant Networking Marine? Select one: a. 0651 b. 0631 c. 0639 d. 0630 e. 0659

0639

This MOS is responsible for training, advanced routing/switching, cybersecurity, locating and correcting faults, quality of service (QOS), implementation/ management of the cable plan, long haul transport, internet (IP) management, encryption management, network monitoring, end to end systems integration and troubleshooting.

0639

Which of these commands prepares Active Directory for the Exchange Organization during the deployment of Exchange Server 2016?

.\setup.exe /PrepareAD /OrganizationName:Domain /IAcceptExchangeServerLicenseTerms

Which of these commands prepares the Domain for Exchange during the deployment of Exchange Server 2016?

.\setup.exe /PrepareDomain:Domain.Local /IAcceptExchangeServerLicenseTerms

Which of these commands prepares the Schema for the deployment of Exchange Server 2016?

.\setup.exe /PrepareSchema /IAcceptExchangeServerLicenseTerms

If I am planning a subnet for a site with 70 computers, what size subnet do I need to allocate?

/25

What is the CIDR Notation for a subnet mask of 255.255.255.128?

/25

Which of the following breakdowns would best accomodate the following host requirements: 33 Users, 25 VOIP, 17 Servers, 3 VTC, and 2 Printers?

/26,/26,/27,/29,/29

From the options below, what is the most common CIDR notation for a WAN point-to-point connection?

/30

Convert 31 to bianary.

00011111

Convert 99 to bianary.

01100011

Which MOS is a prerequisite to obtaining the MOS of Satellite Communication Operator? a. 0623 b. 0631 c. 0671 d. 0621

0621

Which of the following MOSs are typically NOT found on a help desk?

0629

This MOS analyze, design, deploy, maintain and manage network infrastructure and application components in support of command and control. a.0631 b.0630 c.0639 d.0633

0630

This MOS will install operate and maintain local area networks (LAN) and wide area networks (WAN) to enable command and control. a.0639 b.0633 c.0631 d.0630

0631

What is the primary MOS of a Corporal Networking Marine?

0631

Which MOS is responsible for installing, operating and maintaining local area networks and wide area networks to enable command and control.

0631

Which MOS is responsible for installing, operating and maintaining local area networks and wide area networks to enable command and control. a. 0621 b. 0627 c. 0671 d. 0631

0631

This MOS is responsible for performing duties in commercial outside plant, cable distribution systems, install and maintain fiber optic, copper, and coaxial cable according to safety regulations and standards

0633

You're drafting a Feasilibity of Support request to your higher headquarters after you've identified a critical shortfall in your section. You currently do not possess a suficient number of systems administrators at your help desk. What MOS do you request?

0671

The ______ MOS is specifically trained to produce and program applications and software in support of assured C2.

0673

Which of the following MOSs are typically NOT found on a helpdesk?

0673

Which MOS designates a Data Systems Chief?

0679

You're drafting a Feasilibity of Support request to your higher headquarters after you've identified a critical shortfall in your section. You currently do not possess any MOS capable of providing supervision of your systems administrators in the execution of their duties. What MOS do you request?

0679

How many Domain Controllers can be Schema Master and Domain Naming Master within the forest?

1

How many Domain Controllers can be the Primary Domain Controller (PDC) Emulator, Infrastructure Master, Relative ID (RID) Master within a domain?

1

How many schema are located within a forest?

1

Layer of OSI model that deals with bits

1

There is/are ____________ Exchange Organization/s in an Active Directory Forest.

1

What layer should all troubleshooting begin at?

1

What are the AL Code numbers?

1, 2, 4, 6, 7

How many classes of supply are there?

10

What is the Maximum distance for any UTP Copper Cabling? (10Base-T, 100Base-T, 1000Base-T, 10GBase-T)

100M

How many hosts can there be in a /25?

126

What is the absolute minimum compression standard for Video Teleconferencing that you would need to plan for?

128 kbps

Which is the a class B address range

128.0.0.0/16 - 191.255.0.0/16

All of the following units are likely to have an 0670 on their staff with the EXCEPTION of:

12TH MAR REG

How would you express the Binary number 1101 in Decimal format?

13

What Port Number is used by IMAP?

143

This address may used by a computer which fails the DHCP process.

169.168.25.3

It is best practice to use which of the followinng addresses for the Default Gateway for the following network: 172.16.17.128/25?

172.16.17.129

Which of the following is the Broadcast address of this network: 192.168.17.192/26

172.16.17.255

Which of the following is NOT a part of this network: 172.16.17.0/26

172.16.17.66

Which OccField primarily plans and conducts DCO?

17XX

How many processor cores are in a single processor of the Dell R630 server inside the ASM?

18

Which of the following is a host address of this network: 192.168.17.128/27

192.168.17.141

Which of the following is a host address of this network: 192.168.17.0/26

192.168.17.16

Which of the following is the Broadcast address of this network: 192.168.17.0/26

192.168.17.63

A switch operates at ______ of the OSI model.

2

Layer of OSI model that deals with Frames

2

What is the maximum number of TEO IP Phones that a single TSC, employed by the USMC, can support?

200

Exchange originally had five server roles. At what version of Exchange were those server roles condensed down to just THREE roles?

2013

Convert 11010001 to decimal.

209

Which C2 System provides Commanders the ability to rapidly integrate all fire support assets into maneuver plans via digital data communications links?

AFATDS

You're the communications officer of 2/10. You Battalion Commander has made it clear that digital fires integration are a top priority. Which of the following PORs should you direct your Marines to integrate first into your network architecture?

AFATDS

This is primary Fires C2 system used by the Marine Corps:

AFTADS

What is a messaging system consisting of government and COTS software and hardware used to prepare, submit, transport, deliver, store, and retrieve organizational messages?

AMHS

Who is the senior management official or executive with the authority to formally approve the operation of an IS at an acceptable level of risk?

AO

What Appendix is the Multi-Channel Radio Network Plan found in Annex K?

APPENDIX 5

Which appendix of the Annex K denotes the Telephone Network Plan?

APPENDIX 7

Match each Layer of the TCP/IP Model with it's description. Provides software access to services such as HTTP/HTTPs Associates a service to a port number and defines whether that service would use UDP or TCP Includes the IP address of both the sender and recipient. Defines how data will be routed to the recipient Includes the MAC address of both the sender and recipient. Devices in this layer include switches and hubs that allow access to routing Represents the signal pattern and medium used to pass bits of data included in a frame

APPLICATION TRANSPORT NETWORK DATA LINK PHYSICAL

What is the primary module used by the 067X community used to host services?

ASM

Which component of the CDN most closely relates to your job as a Systems Administrator?

ASM

_____ contains (2) servers, (1) UPS, (1) transit case.

ASM

______ contains (2) servers, (1) UPS, (1) transit case.

ASM

Independent comprehensive risk evaluation of the technical and non-technical security features and safeguards of an IS; the output of which, is used in an effort to assist the Security Control Assessor (SCA) in the provision of risk recommendation to the Authorizing Official (AO).

ASSESSMENT

The Firefly Key uses

ASSYMETRIC CRYPTOGRAPHY

You need to send an email to your CO. It contains PII and other sensitive information so you encrypt it and digitally sign it. What did you just use?

ASSYMETRIC CRYPTOGRAPHY

__________________ has 2 uses; to make a meesage unreadable and to digitally sign.

ASSYMETRIC CRYPTOGRAPHY

You need to assure that information is accessible to all who have a proper need to know assuring _________________.

AVAILABILITY

At a simplistic level, how should a Messaging Server architecture function?

Accept incoming mail from external sites, determine the user mailbox to deliver these messages to and route them accordingly. Accept incoming mail from internal hosts, determine the destination system to deliver these messages to and route them accordingly.

The RO formally accepts their CMR account with which of the following:

Acceptance Letter

A layer 2 switch traditionally belongs at what level of the hierarchical network design?

Access layer

Horizontal scaling, also known as scaling out, refers to which of the following?

Adding additional VM instances

The Air Force's contribution to JADC2 is referred to as

Advanced Battlemanagement System

Microsegmentation controls are broken down into what three categories?

Agent, Network, Native

What is supply officially defined as?

All materiel and items used in the equipment, support, and maintenance of military forces

A thorough battlespace analysis includes all of the following EXCEPT:

Analysis of each course of action developed by the staff

You are a Systems Control Watch Officer for Marine Wing Communications Squadron 38 conducting a Wing-Level training exercise. Your Marines are reporting that your satellite communications system is having difficult tracking your assigned satellite. What component of your satellite communications system is malfunctioning?

Antenna Control Unit

________ is a mobile operating system used exclusively for iPhones.

Apple iOS

________ is seeing greater use with the Marine Corps mobility infrastructure than previously before.

Apple iOS

Although not commonly seen on USMC networks, _____ is a large competitor of the Microsoft OS.

Apple macOS

Which are the Seven Layers of the Open Systems Interconnect Model?

Application, Presentation, Session, Transport, Network, Data Link, Physical

You are having issues with SIPR video feeds lagging or dropping during crucial time in you operation. You know you have the bandwidth though your single LRS link to support the feeds, but it is being used by other traffic. You are about to contact the SPE Cell for assistance. What are you likely to be focussed on asking about?

Assigning QoS statements to prioritize the feed traffic

Assumes control of multiple systems to coordinate attacks and distribute phishing schemes, spam, and malicious code. Breaks into networks for the thrill and challenge or for bragging rights in the attacker community. Seeks to attack systems for monetary gain Uses cyber tools as part of their information gathering and espionage activities. Individuals or small groups that execute phishing schemes to steal identities or information for monetary gain.

Assumes control of multiple systems to coordinate attacks and distribute phishing schemes, spam, and malicious code. → Bot-Network Operator, Breaks into networks for the thrill and challenge or for bragging rights in the attacker community. → Attacker, Seeks to attack systems for monetary gain → Criminal Group, Uses cyber tools as part of their information gathering and espionage activities. → Foreign Intelligence Service, Individuals or small groups that execute phishing schemes to steal identities or information for monetary gain. → Phisher

__________________ uses a public and a private key.

Asymmetric Cryptography

Formal decision by the Authorizing Official (AO) that an information system is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.

Authorization

Which of the following is not one of the available Port States for the Spanning Tree Protocol? (Multiple Answers Allowed)

BALANCED PASSING TESTING

The total traffic of data transmitted over the media.

BANDWIDTH

______ is the theoretical network performance. ____ is the actual network performance. ____ is the measure of the transfer of usable data (after overhead is removed).

BANDWIDTH THROUGHPUT GOODPUT

Which hypervisor type is most commonly used by the Marine Corps?

BAREMETAL

Which Link-16 capable radio would a JTAC use?

BATS-D

The Marine Corps uses what routing protocol to connect two (2) autonomous systems?

BGP

Any encrypted classified traffic circuit is often referred to as _______________ when it is ready for transmission.

BLACK

_______ provides the transport network for multiple networks (SIPR, NIPR, CENTRIX, etc).

BLACK CORE ROUTING

DCO-IDM is primarily conducted in which type of cyberspace?

BLUE

What type of cyberspace does the U.S. and our mission partners protect?

BLUE

One source to all destinations within a network.

BROADCAST

A _________ is a collection of network devices that can all be reached by a broadcast at the data link layer.

BROADCAST DOMAIN

Which hypervisor type runs as its own operating system, without a host?

Baremetal

A set of specifications for a system, or Configuration Item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures.

Baseline Configuration

What does the Kernal provide the operating system?

Basic control of all the computer peripherals.

How do programs communicate?

By sending packets of data (messages) to each other.

A hacker assumes remote control of a device at what stage of the cyber kill chain?

C2

Which C2 application is designed to facilitate military command and control functions by improving maneuver situational awareness (SA) enhancing operational and tactical decisions?

C2PC

______ exchanges position tactical track data to form a Common Operational Picture.

C2PC

You're the communications officer at MWCS-38. The Wing Commanding General wants to establish Common Operational Picture in the Wing Operations Center. He specifically wants to integrate with his Division counterparts. Which of the following would you recommend?

C2PC TAK

You're the communications officer at MWCS-38. The Wing Commanding General wants to establish Common Operational Picture in the Wing Operations Center. He specifically wants to see where his fighter aircraft are. Which of the following would you recommend?

CAC2S

_________ provides for the transfer of digital voice and data in support of aviation.

CAC2S

is a VoIP management application which runs on an Integrated Services Router's (ISR) Internet-working Operating System (IOS) in order to provide call processing in a VoIP network.

CALL MANAGER EXPRESS

Shipboard network which enables collaborative information sharing across forces afloat with reach-back capabilities to supporting shore establishments via system management, voice, video, and data services a.DISA b.CANES c.DoDIN d.CENTRIXS

CANES

Any vulnerability, the exploitation of which will directly and immediately result in loss of Confidentiality, Availability, or Integrity.

CAT 1

A collection of classified coalition networks, called enclaves, that enable information sharing through the use of email and Web services, instant messaging or chat, the Common Operational Picture service, and Voice over IP. CENTRIXS supports combatant commands throughout the world a.DoDIN b.CANES c.DISA d.CENTRIXS

CENTRIX

The Subnet Mask identifies which portion of an IPv4 address?

CIDR PORTION

Which of the following is included with an LEM? a.Cisco 4451-X b.Microchip SyncServer S650 c.Cisco Catalyst 3850 d.CV-MCU2

CISCO CATALYST 3850

Which of the following is included with an LSM?

CISCO CATALYST 3850 Cisco 4451-X

The following effort belongs to which agency: Transitioning JADC2 from concept to policies, doctrine, and requirements.

CJCS

Match the IP Address Class with the appropriate first Octet Range. 128 to 191 1 to 126 192 to 223

CLASS B CLASS A CLASS C

Which of the following CUCM functions can help you implement River City?

CLASS OF CONTROL

This combat service support management tool provides improved management and control of tactical-level resources and services support requirements.

CLC2S

Which C2 System provides accurate, near real time integrated logistics information, tactical level visibility of logistics data, and allows logistics planners and operators to make informed decisions about the logistics chain?

CLC2S

Which of the following PORs do NOT directly support maneuver as a warfighting function:

CLC2S

Which of the following server architecture is most commonly used in the Marine Corps?

CLIENT/SERVER

You're an 0679 at an infantry battalion. Your CommO is requesting a an architecture that is both resilient and easily accessible. There is an extended lead time before the servers have to be employed, so time to build the servers isn't an issue. What do you recommend?

CLIENT/SERVER

Limited technical solutions at the tactical edge challenges which enabling technology?

CLOUD

Your Network LCpl is configuring an LSM. What piece of equipment is he likely using?

CM (CONFIGURATION MODULE)

Which of the following is the MOST responsible for the conduct of offensive cyberspace operations (OCO)?

CMTs

You're a communications officer establishing a COOP site for your unit. Your commander is requesting the ability to rapidly shift from a degraded site to another fully prepared site, but presently non-operational site. What kind of site is your commander referring to?

COLD SITE

This style of encryption would be applied to a SIPR circuit?

COMSEC

You have a SIPR circuit encrypted by a TACLANE and then entering a Black Core Router. This router is connected to the modem on a VSAT-M. What security protection is likely being applied by the TACLANE?

COMSEC

__________________ is used for line ecnryption.

COMSEC

What are the two main types of encryption employed in the USMC?

COMSEC, TRANSEC

You need to assure that information is limited to only those who have the proper credentials assuring _________________.

CONFIDENTIALITY

Your help desk is troubleshooting an issue on the network and are making changes as they work to resolve the issue. As your help desk SNCOIC is briefing you the latest updates, you realize that all of these changes have been made unilaterally and without notifying higher and adjacent units. What concept can be implemented to prevent this?

CONFIGURATION MANAGEMENT

What is the technique of packaging software code with just the OS libraries and code dependencies into a lightweight executable called?

CONTAINERIZATION

What type of standard unit of software that packages up code and all its dependencies so the application runs quickly and reliably from one computing environment to another?

CONTAINERS

When a dynamically routed network changes, the routers share routing updates via a process called what?

CONVERGENCE

A user calls you at the help desk and complains about their computer preforming slow while using 10+ applications. What (2) Operating components are being over utilized?

CPU & Ram

Which of the following would be done in the cyber kill chain's weaponization stage?

CREATING AN INFECTED DOC

What are the types of Twisted Pair cables?

CROSSOVER STRAIGHT-THROUGH ROLLOVER

For converting serial to coax or fiber, what should you add to your EDL?

CSM

Higher is expecting you to terminate a SMART-T link. Which of the following pieces of equipment might be required for the connection?

CSM

In a IaaS cloud service model, whose responsibility is it to install, configure, and manage software, applications, middleware, and operating systems?

CUSTOMER

In a PaaS cloud service model, whose responsibility is it to secure applications, data, and user access?

CUSTOMER

Incident Management can also be referred to as _________

CUSTOMER SERVICE

Which of the following is included with a CSM?

CV-MCU2

________ supervise, direct, and provide guidance on all aspects of the employment of cyberspace personnel and systems.

CYBERSPACE OFFICERS

Which of the following is a standard telephony feature CUCM supports

Call Pickup, Call Forward, Group Call Pickup, Music on Hold

Reconnaissance (Event), Activity (scan or probe) that seeks to identify a computer, an open port, an open service, or any combination for later exploitation. This activity does not directly result in a compromise.

Category 6 Event

_______ is a computer or host that requests and uses resources and information from another computer or server.

Client

You're an 0602 planning a server architecture for your unit. You're planning to pull your services from a centralized location with dedicated servers. Your plan is to provide centralized security and easy access for your users. What architecture are you planning?

Client / Server

What model does the chat process work on?

Client-server networking

In a PaaS cloud service model, whose responsibility are cybersecurity updates and patches on the physical infrastructure?

Cloud provider

What is the term that describes the pooling of resources of multiple servers together for fail-over or high availability?

Clustering

Who is responsible for monitoring compliance for the Cyber IT/CSWF?

Command Cyber IT/Cybersecurity Workforce Program Manager

In order to send emails to external organizations, what type of DNS record must you first create?

Conditional Forwarder

Which of the following are the duties of a Responsible Officer? Select all that apply: a. Assign configurations (Parent-Child relationship) by NIIN and serial number for each item via GCSS-MC b. Conduct maintenance on all equipment listed on the CMR that is within your skillset to repair c.Conduct quarterly CMR reconciliations with the supply section d. Report changes of equipment custody to the SupO on an as-occurring basis e. Request necessary investigative action in writing for equipment abuse, gains, or losses, via the SupO, to the CO f. Request a change of RO from the CO via the Supply Officer and conduct a joint inventory no less than 30 calendar days prior to your date of relief g. Account for equipment received and maintain a record of custody for such equipment on a CMR h. Conduct necessary investigative actions for equipment abuse, gains, losses, reporting to the CO i. Maintain assigned equipment in a ready-for-use and serviceable condition j. Validate configuration management (Parent-Child relationship) by NIIN and serial number for each item on hand k. The account must be transferred prior to the RO's transfer from the command

Conduct quarterly CMR reconciliations with the supply section , Maintain assigned equipment in a ready-for-use and serviceable condition , Account for equipment received and maintain a record of custody for such equipment on a CMR , Report changes of equipment custody to the SupO on an as-occurring basis , Request necessary investigative action in writing for equipment abuse, gains, or losses, via the SupO, to the CO , Validate configuration management (Parent-Child relationship) by NIIN and serial number for each item on hand , Request a change of RO from the CO via the Supply Officer and conduct a joint inventory no less than 30 calendar days prior to your date of relief , The account must be transferred prior to the RO's transfer from the command

Which of the following answers lists the advantages of IMAP over POP3?

Connected and Disconnected modes, Multiple simultaneous clients, Message state information stored on server, Server side searches.

What is a battalion level inventory defined as?

Consumer Inventory

What is the Application Layer?

Contains the communications protocols and interface methods used by hosts in a communications network.

What are some best practices for GPO's?

Create well-designed unit structure, give GPO's descriptive names, add comments to each GPO, don't set GPO's at the domain level, don't use the root computers or user folders in Active Directory, don't disable a GPO, rather, delete the link.

A Network is defined as a collection of computers, servers, mainframes, network devices, peripherals, or other devices connected to one another to allow the sharing of __________.

DATA

A DoD federated data environment for sharing information through interfaces and services to discover, understand and exchange data with partners across all domains, echelons and security levels refers to what enabling technology?

DATA FABRIC

The following challenges: assessing and verifying data within DoD networks, stove-piped data, and a lack of interoperability standards are viewed as impediments to what enabling technology?

DATA FABRIC

Responsible for ensuring the physical procedures of data transfer are carried out, and will ensure the Transfer Log is accurate, current, and properly maintained.

DATA TRANSFER AGENT

What is the correct conceptual order of the processes that occur whenever a group policy is applied?

DC discovery, DN discovery, domain Scope of Management (SOM) search, Scope of Management (SOM), site SOM search, GPO search, GPO filter evaluation, WMI filter evaluation, policy change event

What type of cyberspace operation is "threat focused, network agnostic?"

DCO

Which of the following missions are typically in foreign cyberspace?

DCO IRA

What are the 3 types of routes that can populate a routing table?

DYNAMIC DIRECTLY CONNECTED STATIC

In a brief to your commander, you advise her of actions an attached team of Marines has taken to secure the network through active monitoring and probing of all friendly networks. This is an example of what facet of cyberspace operations?

DCO-IDM

The RO formally submits a ______ in the event of KNOWN loss, damage, or destruction of government property.

DD Form 200

ROs will be formally appointed by the CO in writing via an appointment letter and _________.

DD Form 577

Providing computing capability to the tactical edge supports operations under what conditions?

DDIL C2D2E

A common security strategy used to provide a protective multilayer barrier against various forms of attack.

DEFENSE IN DEPTH

What command will delete VLAN's from your device?

DEL VLAN.DAT

Identify the Metrics used by the Diffusing Update Algorithm (DUAL).

DELAY RELIABILITY BANDWIDTH LOAD MTU

A hacker sends email attachments or malicious links at what stage of the cyber kill chain?

DELIVERY

This is what is being used on your network. a.Devices b.Medium c.Messages d.Rules

DEVICES

Match the network element with its definition. Items used to communicate with one another Govern how messages flow across a network Method in which devices are connected The Information that travels over the medium

DEVICES RULES MEDIUMS MESSAGES

Network management protocol used on IP networks whereby a server dynamically assigns an IP Address and other network configuration parameters to each device on a network.

DHCP

This protocol is used to assign IP addresses automatically on a network

DHCP

What is utilized to push IP address, subnet mask, and default gateway to user computers and phones?

DHCP

Provides 10 connections into the Internet via Internet Access Points (IAP).

DISA

Provides 10 connections into the Internet via Internet Access Points (IAP). a.DISA b.CENTRIXS c.CANES d.DoDIN

DISA

This message is a broadcast message sent from an asset to seek out available DHCP Servers.

DISCOVER

What type of groups are email lists?

DISTROBUTION

Adds IPsec encryption to mGRE tunnel to enable secure multipoint tunneling

DMVPN

Adds IPsec encryption to mGRE tunnel to enable secure multipoint tunneling.

DMVPN

This feature provides encrypted multipoint tunnels

DMVPN

Provides a layer of protection for these Internet-facing servers, while also allowing clients to connect to them

DMZ

Conditional Forwarders are created in the ______ of your domain.

DNS

Used to resolve fully qualified internet domain names (also known as Uniform Resource Locators, or URLs) into internet protocol (IP) addresses.

DNS

What is highly integrated into Active Directory and utilized to translate Domain Names into IP Addresses?

DNS

Where in your domain do you create MX Records from?

DNS

Match each type of server to its definition: Receives requests for an IP address and responds with a corresponding domain name hostname Caches all pages accessed through the network which allow users who to visit Used for storage and designed for users to access information by executing a query A centralized remote computer that holds e-mail messages for the client on a particular network Highly distributed, massive storage, and high-end processing power servers Utilized in developing, processing, and running web-based applications

DNS PROXY DATABASE MAIL CLOUD APPLICATION

Match the following ports with their port numbers. DNS POP3 HTTP HTTPS SMTP SSH

DNS 53 POP3 110 HTTP 80 HTTPS 443 SMTP 25 SSH 22

The following effort belongs to which agency: Lead a cross-functional team to explore JADC2 as it evolves as a concept.

DOD

Identifies a set of cybersecurity activities that are required for to protect the DoDIN.

DODI 8530.01

The globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating and managing information on demand for warfighters, policy makers, and support personnel.

DODIN

In a brief to your commander, you advise her of actions you've taken to secure the network through appropriate STIG and antivirus software. This is an example of what facet of cyberspace operations?

DODIN OPS

What type of cyberspace operation does the 06XX community direct?

DODIN OPS

What type of cyberspace operation is "network focused, threat agnostic?"

DODIN OPS

_____________ are network focused and threat-agnostic while _____________ are threat-specific and frequently support mission assurance objectives.

DODIN, DCO

What is depicted by a triangle, is the basic organizational structure of Active Directory, and contains organizational units?

DOMAINS

A blank requires more IPs than a blank .

DUAL HUB/DUAL DMVPN REQUIRES MORE IPS THAN A DUAL HUB/SINGLE DMVPN

You are the acting Regimental S-6 at a CLR at a Regimental Ops meeting. You know you are connecting to both Div and MLG who each have their own DMVPN Hubs who are themselves spokes to the MEF TIE network. You are drawing server services from the Div. What option below best supports redunancy?

Dual Hub Single DMVPN to Div

You are the acting Regimental S-6 at a CLR at a Regimental Ops meeting. You know you are connecting to both Div and MLG who each have their own DMVPN Hubs who are themselves spokes to the MEF TIE network. You are drawing server services from the MLG. What option below best supports redunancy?

Dual Hub Single DMVPN to MLG

Which of the following is a MAC address:

E4-54-E8-FB-D8-59

Which is NOT part of orchestration of container management?

EASE OF USE

The following terms are associated with a Call Manager EXCEPT:

EDITER

What is Cisco's best hybrid protocol that is also the most common Enhanced Distance Vector Routing Protocol used by the Marine Corps' packet switching network?

EIGRP

Select the configuration item not required for a VTC and VOIP Phone to interface with a network via a switch.

EIGRP AS Number

Which of the following is NOT a characteristic of good system design?

EMMISSIONS CONTROL FLEXIBILITY centralized command

__________________ is the transformation of data into a form unreadable by anyone without a secret decryption key

ENCRYPTION

What attribute would likely call for an MTU adjustment on your network?

ENCRYPTION ADDED BY HAIPE

Uses Diffusing Update Algorithm (DUAL) to calculate best route to subnet and alternative routes if primary fails

ENHANCED DISTANCE VECTOR PROTOCOL

An Authorized User (military, civilian, FN, or contractor) who requires detailed knowledge of Cyber IT and/or cybersecurity to support work in the development, maintenance, or operation of Marine Corps systems, including weapons, tactical, electronic and electrical services, navigation, and engineering.

ENHANCED USER

is the top tier of support for Marine Corps enterprise services including MCEN-N and MCEN-S accounts, email, and web browsing.

ENTERPRISE HELPDESK

The MITSC has been phased out by the establishment of the ______ and the Network Battalions

ESD

The MITSC has been phased out by the establishment of the ______ and the Network Battalions.

ESD

________ is a type-1 hypervisor used to deploy, create, and serve virtual machines.

ESXi

The most specific type of ACL is ______

EXTENDED NUMBERED ACL

VLAN 1403 is a

EXTENDED RANGE LAN

Routing Protocol(s) are used to connect Autonomous Systems. Routing Protocol(s) are used in Autonomous Systems

EXTERIOR INTERIOR

A set of protocols used to interconnect routers and networks that ARE NOT part of the same autonomous system are commonly referred to as what?

EXTRIOR GATEWAY PROTOCOLS

Which of the following is not a requirement for configuring an SVI?

Encapsulation

Which of the following would be done in the cyber kill chain's actions on objectives stage?

Encrypting a victim's hard drive DESTROY HARD DRIVE

What administrator has the permissions to do anything in the forest?

Enterprise

Identify from the list below correctly formatted Network Tasks.

Establish circuit SIPRPP01 at 8192K to 2/1. Attach one VSAT-S from RCT Main, Utilize the 200.5.36.128/25 to address your Black Core WAN requirements.

Enabling the Joint Force Commander's ability to manage and use information to drive decision making and action taking is supported by what LOE?

Establish the JADC2 Data Enterprise

Focusing on and enabling the performance of the DoD work force via training and education supports which LOE?

Establish the JADC2 Human Enterprise

This LOE addresses enhanced shared situational awareness, synchronous and asynchronous global collaboration, stragic and operational joint planning, real-time global force visualization and management, predictive force readiness and logistics, real-time synchronization and integration of kinetic and non-kinetic joint and long-range precision fires, and enhanced abilities to assess Joint Force and mission partner performance.

Establish the JADC2 Technical Enterprise

How does a global catalog server function?

Every domain controller stores the objects for the domain in which it is installed. However, a domain controller designated as a global catalog server stores the objects from all domains in the forest.

Which of these options is used to manage Exchange services?

Exchange Administration Center

ACL number 151 is a ______

Extended Numbered ACL

An AD domain is restricted to a physical site, defined by an IP allocation.

FALSE

DMVPNs require multiple static VPN connections.

FALSE

Inter-Cluster Trunks are trunks routed between a Cisco Unified Communication Manager (CUCM) cluster and a Circuit Switching Private Branch Exchange (PBX).

FALSE

Is a security clearance required for access to unkeyed CCI?

FALSE

It authenticates logons and controls access to directory resources.

FALSE

Network Address Translation bridges IPv4 and IPv6 networks.

FALSE

Peer-to-Peer Networks are notoriously difficult to set up and require consistent maintenance.

FALSE

SIPRNet uses DHCP.

FALSE

Symmetric cryptography involves the use of a public and private key.

FALSE

TRANSEC is always required, even on a secure link.

FALSE

The AN-80i Redline Ethernet radio operates in the 4.4-5.0 GHz frequency range and therefore has the potential to interfere with the AN/TRC-170.

FALSE

The Cisco Unified Communications Manager is a device whose sole purpose is to implement Real-Time Transfer Protocol to allow chat clients to function.

FALSE

The POP3 Protocol was designed on the assumption that most users would have a high bandwidth, consistent internet connection.

FALSE

The VSAT operates within the K-Band of the electromagnetic spectrum. Select one: False True

FALSE

The following are terrestrial wideband transmissions systems: VSAT, SMART-T, and GATR.

FALSE

The process of moving segments through the network is called routing.

FALSE

The two operating modes for MUOS are: Point to Point and Point to Multipoint.

FALSE

Traffic does not require TRANSEC before being sent via RF Transmission if it has already been secured by a KG-175 TACLANE.

FALSE

UDP uses a Three-way Handshake to initiate a connection.

FALSE

USMC networks have star physical topologies and ring logical topologies.

FALSE

WAN Diagrams should include Layer 3 Switches.

FALSE

The TCP/IP Model has 7 layers

FALSE (TCP/IP MODEL HAS 5, OSI HAS 7)

_________________ is the capability of a network to deliver uninterrupted service, despite one or more of its components failing. a.Fault Tolerance b.Quality of Service c.Security d.Scalability

FAULT TOLERANCE

The fastest currently available media is _______________.

FIBER OPTIC

Which of the following Marine Corps platforms will serve as an airborne C2 platform able to retransmit various TDL information in UAS?

FINN

__________________ is used on multiple types of Marine Corps systems and is individualized per device.

FIREFLY

Filter incoming and outgoing traffic for a single host or between networks

FIREWALL

There are two physical links that are operating with identical properties. Packets are being routed over both without any priority being asigned to one link or the other. What problem with a tunnel interface is likely to result from this?

FLAPPING

Which of the following is NOT one of the three types of clouds?

FLEXIBLE CLOUD

MAC ________ attempt to overload a switch with different MAC addresses associated with each physical port

FLOOD ATTACKS

Limit the amount of memory used to store MAC addresses for each port / Sends a Simple Network Management Protocol (SNMP) trap or error message in response to exceeding MAC entry threshold / Allow an administrator to set a maximum number of MACs supported by a port

FLOOD GUARDS

_______decisions are influenced by the C2 system's ability to network the force.

FORCE EMPLOYMENT

What is the PDU for the Datalink Layer of the OSI Model?

FRAME

Standard Network Protocol used for the transfer of computer files between a client and server on a computer network.

FTP

Which of the following is NOT a type of virtual storage?

FTP

Which of the following is NOT an example of a service?

FTP HTTPS

When a Mailbox server is added to a DAG, the _____ Windows role is installed on the server and all required clustering resources are created.

Failover Clustering

IPv6 addresses are 64 bits long.

False

During a confirmation brief, your battalion commander expresses concern with the potential of issues arising with a physical server and what impacts might result if it becomes damaged. Which characteristic of services planning is she concerned about?

Fault Tolerance

What is the primary purpose of the Direct Air Support Center (DASC)?

Fulfills requests for immediate air support and provides other airspace control functions to a Ground Combat Element.

How can an administrator enhance the functionality of a GPO?

Functionality can be enhanced through the implementation of policy extension

What is the correct name for first SIPR Exchange server for the GCEFWD domain?

GCEFWDS01E

As a CMR holder, which system will you use to assist you with accounting for your equipment?

GCSS-MC

Which of the following is NOT used to establish a Common Operational Picture?

GCSS-MC

______ provides accurate, near-real-time integrated logistics information, enterprise-wide visibility of logistics data, and allows logistics planners and operators to make informed decisions about the logistics chain.

GCSS-MC

What server is a domain controller that maintains a subset of the most commonly used Active Directory objects and their attributes?

GLOBAL CATALOG

Term used to describe the amount of useable data that is left after all of the protocol overhead traffic from the higher TCP/IP layers are removed

GOODPUT

A router in a foreign nation is a temporary stepping point for a cyberattack. What type of cyberspace is the router?

GRAY

A router in the US is a temporary stepping point for a cyberattack. What type of cyberspace is the router?

GRAY

DCO-RA is primarily conducted in which type of cyberspace?

GRAY

Point-to-point tunnel where new IP and GRE headers are added, but no encryption or security.

GRE

This feature provides unencrypted Point to Point tunnels

GRE

_______ is primarily used with the Marine Corps mobility infrastructure.

Google's Android OS

What type of cyberspace is used by both friendly forces and the adversary for operations and targeting?

Gray cyberspace

s the single point of contact between the service provider and the user.

HELP DESK

WHICH HYPERVISOR RUNS IN AN EXISTING APPLICATION ON TOP OF AN EXISTING OPERATING SYSTEM?

HOSTED

Which hypervisor type is best used for labs, tests, training, and demonstrations?

HOSTED

RAPIDLY SHIFT FROM A DEGRADED SITE TO ANOTHER FULLY PREPARED SITE. WHAT KIND OF SITE IS YOUR COMMANDER REFERRING TO?

HOT SITE

The foundation of data communication for the World Wide Web.

HTTP

List the benefits of Active Directory Domain Services. (select all that apply)

Hierarchical structure, flexibility, single point of access, redundancy

They give a reliable technique for the OS to communicate & react to their surroundings. Work can be divided into three important groups like memory management of hardware, OS and application memory management. A GUI or user interface (UI) is the part of an OS that permits an operator to get the information Provides the basic level of control on all the computer peripherals Allows an operator to execute one or more computer tasks at a time This will allow monitoring the request from accessibility to other resources The program can connect through the hardware device by simply following procedures & principles configured into the OS When the processor interacts with each other through communication lines

INTERRUPT MEMORY MANAGEMENT USER INTERFACE KERNAL MULTITASKING SECURITY PROCESS EXECUTION NETWORKING

Select the types of VLAN tagging/encapsulation below

INTERSWITCH LINK (ISL) IEEE 802.1Q

A set of networks that are under the control of a single administrative entity who only allows authorized users access. It is based on the networking technologies of the Internet Protocol Suite.

INTRANET

Match the primary functions of the Network Layer with their descriptions. Used to identify a packet's source and destination host computer. These rules also organize addresses into groups, which greatly assist the routing process. The process of hosts and routers forwarding IP packets, while relying on the underlying LANs and WANs to forward the bits. Aids routers by dynamically learning about the IP address groups so that the router knows were to route IP packets so that they go to the right destination host.

IP ADDRESSING IP ROUTING IP ROUTING PROTOCOL

What command will convert a layer 2 switch into a multi-layer switch?

IP ROUTING

The three primary functions at the Network Layer Are :

IP ROUTING IP ADDRESSING IP ROUTING PROTOCOL

Encryption/authentication provided through crypto maps. Does not support multicast or dynamic routing protocols.

IP SEC

What three logical addressing items must be assigned to a host?

IP address, Subnet Mask, Default Gateway

What are the four basic components of a VoIP network?

IP network, Call processor, Media, Endpoints

What is an integrated suite of tools to enable end-to-end planning, deploying, managing and monitoring of the IP address infrastructure.

IPAM

What service distributes directory data across the network?

IPAM REPLICATION

React to attacks in progress and prevent them from reaching systems and network

IPS

This feature provides encryption Point to Point tunnels

IPSEC

This style of encryption would be applied to a NIPR circuit?

IPSEC

You have a SIPR circuit encrypted by a TACLANE and then entering a Black Core Router. This router is connected to the modem on a VSAT-M. What security protection is likely being applied by the Black Core Router?

IPSEC

The documentation of a predetermined set of instructions or procedures to detect, respond to, and limit consequences of a malicious cyber-attacks against an organization's information systems(s).

IRP

The _______ is often a non-communications MOS Marine from each staff section who is very well-trained in the inforamtion contained in the Smart Pack/User Guide.

ISC

Which of the following is NOT a self-aid style of help desk support?

ISC

Your unit is deploying to the field and your S3 is curious as to what everyone's contact information will be on the newly installed network your Marines have established. What document can meet your OpsO's requirements?

ISD

Reports to the ISSM and ensure an appropriate cybersecurity posture is maintained for a command, site, system, or enclave in accordance with command Cybersecurity Program

ISSO

A unit policy on "Bring your own device to work" is an example of a:

ISSUE SPECIFIC POLICY

You are tunneling SIPR through NIPR. The NIPR link has gone down. What effect will this have on SIPR?

IT GOES DOWN WITH THE NIPR LINK

________ is the delivery of or access to networked information resources which enable command and control.

IT SERVICES

Which of the following locations does not maintain a CTC?

IWAKUNI

Where are GPO attributes stored?

In Active Directory Users and Computers

Vertical scaling, also known as scaling up, refers to which of the following?

Increasing the VM's RAM, CPU, etc.

What is the purpose of a CMR?

Indicates what equipment is assigned to a specific RO

Which of the following is a characteristic of virtual machines?

Insulated from hardware and physical changes to the host

How does ADDS integrate security?

It authenticates logons and controls access to directory resources

A collection of settings that define what a system will look like and how it will behave for a defined group of users.

It authenticates logons and controls access to directory resources.

What is the Group Policy Core Protocol?

It is a client/server protocol that enables a Group Policy client to discover and retrieve policy settings that are created by a Group Policy administrator and stored as a Group Policy Object (GPO) in Active Directory.

Why is messaging important to a network?

It provides a way to stay up to date on all relevant information.

How does a DAG work?

It replicates mailbox databases between mailbox servers.

How does Microsoft Exchange work?

It sends and receives messages

You are using Black Core Routing. The NIPR link has gone down. What effect will this have on SIPR?

It will remain up because it is independant of NIPR

You are trying to ensure targeting data is sent from an aircraft to an artillery battery in a TDL network. Assuming the entire chain is fully digital and the sensor sends a surface track message, what message conversion is occurring between the sensor and the fires C2 application?

J SERIES TO K SERIES

Which of the following is a Department-level initiative designed to generate a joint capability to sense, make sense, and act at all levels and phases of war?

JADC2

______ is the effort to develop capabilities for commanders to prosecute high-speed, globe-spanning conflict by linking all US military sensors to all shooters across the land, sea, air, space and cyberspace domains.

JADC2

is the effort to develop capabilities for commanders to prosecute high-speed, globe-spanning conflict by linking all US military sensors to all shooters across the land, sea, air, space and cyberspace domains.

JADC2

Who is the person that normally creates a TDL architecture?

JICO

Which of the following JREAPs uses a satellite to extend TDL information?

JREAP A

Which of the following JREAPs uses a TCP/IP connection to extend TDL information?

JREAP C

Which form of Joint Range Extension Application Protocol does not exist?

JREAP IP

Which of the following occasions rates an extension for the previously provided 15 days for CMR Inventory?

Joint Inventory between newly appointed and outgoing ROs

You have to encrypt a serial link What should you start looking for?

KIV-7M

A _____ provides the basic level of control on all computer peripherals.

Kernal

Select which of the following are OS components:

Kernel, API, File System, Device Drivers

A _______ is a collection of network devices that are connected in one physical location and share a broadcast domain.

LAN

Any network linking two or more computer and related devices within a limited geographical area.

LAN

Match the below Protocol Data Units with the appropriate TCP/IP Layer. Layer 3: Network Layer 4: Transport Layer 2: Data Link

LAYER 3 --> PACKET LAYER 4 --> SEGMENT LAYER 2 --> FRAME

What protocol do Mailbox servers use to gain access to recipient, server, and organization configuration information from active directory?

LDAP

What CDN module provides network connections for devices with 48 Power over Ethernet (POE) ports and an integrated UPS?

LEM

What is the PRIMARY USMC DDS-M Module used at the Data Link Layer?

LEM

Which of the following are the names of modular devices within the USMC Data Distribution System?

LEM LSM WSM

Which of the following TDLs primarily uses HF?

LINK 11

Which of the following TDLs are Navy ships currently moving toward?

LINK 22

Which of the following TDLs uses a combination of UHF and HF?

LINK 22

_________ differs from Windows and Apple, in that it's not a proprietary software.

LINUX OPERATING SYSTEM

A feature of virtual private networking is that it is a _________ Point-to-Point connection between two routers.

LOGICAL

A _____ is a telephone set residing at a different site than the CUCM it is associated with.

LONG LOCAL

A _______ is used to increase redundancy or to provide telephone services to remote locations where the installation of a CUCM would not be feasible.

LONG LOCAL

Spanning Tree Protocol (STP) or the newer Rapid STP (RSTP)

LOOP PREVENTION

Which of the following is NOT an advantage of a Client/Server architecture?

LOW COST TO EMPLOY

You're the S6 at 3/12. One of your subordinate Battery Commanders contacts your deployed helpdesk stating that his phone is non-operational. He still has the means to communicate with Battalion HQ via chat, radio, and email. What is the perceived impact of this user-issue and what is the level of prioritization applied to its resolution?

LOW IMPACT LOW PRIORITY

Your CO wants to know which of the three transmission paths the traffic is taking to the MEF TIE. You have a VSAT-L at 2Mbs tied to the TIE directly, LRS at 54Mbs with 1 additional hop to the TIE, and a MRC-142D at 16Mbs tied to the same site as the LRS. You are running EIGRP. Which is the most likely path?

LRS due the higher bandwidth and reduced latency

With regard to Help Desk procedures, limiting access drives efficiency of your staff by:

Limiting access between the customers and the help desk supervisors and SNCOIC

Each node in the network constructs a map of the connectivity to the network, in the form of a graph, showing which nodes are connected to which other nodes.

Link-State Routing

CUCM, ACAS, and some Remote Administration Servers use _______.

Linux Operating System

_________ differs from Windows and Apple, in that it's not a proprietary software

Linux Operating System

What are the three types of GPO's?

Local Group Policy Objects, Non-local Group Policy Objects, and Starter Groups

A switch examins destination ________ addresses inorder to determin what interface for forward frames.

MAC

Layer 2 communication is based on the ID of a NIC known as a

MAC

This information is NOT included in a DHCP Acknowledgement.

MAC ADDRESS

Manually configure each port to accept traffic only from specific MAC addresses / Limits port's connectivity to a specific device using specific MAC address

MAC ADDRESS FILTERING

What is the name of the table that switches use to make switching decisions?

MAC TABLE

What is CAC2S?

MACCS POR that is used to C2 aviation

Which of the following is the TDL used between F-35s?

MADL

Which of the following is NOT an aviation POR?

MAKO AFAST TLCM-OST

You're the communications officer of 2/10. You Battalion Commander is satisfied with the current state of digital fires integration, but is getting frustrated with the unit's current inability to communicate via chat. Which of the following applications should you direct your Marines to integrate first into your network architecture?

MAKO, TRANSVERSE

Which of the following Marine Corps platforms will serve as an airborne C2 platform able to retransmit various TDL information in rotary wing aircraft?

MANGL

Where in the MAGTF would you find an 0630? Select one or more: a. Infantry Battalion b. Artillery Regiment c. Marine Division d.Radio Battalion e. MEF

MARINE DIVISION AND MEF

Which of the following units is expected to have the greater services requirement?

MAW or DIV

The foundation of the Marine Corps cloud computing strategy, which envisions access to IT services and resources in a seamless manner, enhancing operational effectiveness. a.DoDIN b.MCEITS c.SIPR d.MCEN

MCEITS

This includes all Marine Corps systems deployed or garrison right down to the individual application on the desktop computer. a.MCEN b.DoDIN c.CANES d.CENTRIXS

MCEN

This system could be considered a backbone item in your networking architecture. a.DISA b.DODIN c.MCR d.MCEN

MCR

________ provides the architectural backbone for your network systems architecture.

MCR

What role or feature must be installed before preparing the Active Directory environment for the deployment of Exchange Server?

MEDIA FOUNDATION

This is how your networks are connected. a.Messages b.Devices c.Medium d.Rules

MEDIUM

This is what is being passed along your network.

MESSAGES

What of the following are the Parts of a Network? Select one or more: a. Protocols b. Messages c. Devices d. Standards e. Cables f. Rules g. Fault Tolerance h. Medium

MESSAGES DEVICES RULES MEDIUM

In additional to serving as a backup capaiblity for computing ballistic firing solutions, the BUCS also provides which of the following software applications:

METEORLOGICAL PLOTTING

A _____________ can be changed to alter which of two static routes is used as primary.

METRIC

Dynamic routing protocols choose primary routs based on ______?

METRIC

This feature provides multipoint tunnels via NHRP

MGRE

Uses Next Hop Resolution Protocol (NHRP) to provide multipoint capability without need to manually define each endpoint. No encryption.

MGRE

Which of the following devices requires a SatComm Antenna?

MICROCHIP SYNCSERVER S650

Which of the following is included with an WSM-H?

MICROCHIP SYNCSERVER S650

Containers are often used to package single functions that perform specific tasks known as a _________?

MICROSERVICE

You are the OIC for a Comm Platoon tasked with establishing a PtP GRE Tunnel to higher. You're mission invloves being as light and mobile as possible What equipment should be the minumum required (assume mirrored equipment on distant end) to meet requirements?

PACSTAR, KG250X, 117G, CM, User device

Which of the following is the TDL used internal to the Patriot missile system?

PADIL

__________ refers to the systematic notification, identification, deployment, installation, and verification of operating system and application software code revisions. These revisions are known as patches, hot fixes, and service packs.

PATCH MANAGEMENT

You're an 0602 planning a server architecture for your unit. You're planning to integrate an AFATDS connection with your adjacent unit. The architecture is going to be simple, cheap to employ, and rapidly executable. What architecture are you planning?

PEER TO PEER

You're an 0679 at an infantry battalion. Your CommO is requesting a cost effective and rapidly employable server architecture. The information is unclassified and non-essential, so centralized security and data recovery are not a concern. What do you recommend?

PEER TO PEER

o establish a tunnel the base requirements are; Source, Destination, IPaddress, and ____________

PING TUNNEL DESTINATION

This protocol is utilized for downloading email and works on port 110?

POP3

Provides access for a user client application to a mailbox maintained on a mail server.

POP3/IMAP

Select common applications/protocols from the list below that primarily utilize TCP over UDP.

POP3/IMAP HTTP/HTTPS CHAT FTP

Which of the following is NOT a type of scan required by TASKORD 17-0019?

PORT SCAN

Limits the computers that can connect to physical ports on a switch

PORT SECURITY

What tool can you use to quickly install all required Windows Features for Exchange Server, using the Install Windows Feature command?

POWERSHELL

__________________ is used placed on TACLANES and is used for Secure Dynamic Discovery (SDD).

PPK

Which of the following is an element of the Help Desk SOP that needs to be planned for?

PRIORITIES FFIR

The Army''s contribution to JADC2 is referred to as _______.

PROJECT CONVERGENCE

The Army's contribution to JADC2 is referred to as _______.

PROJECT CONVERGENCE

The Navy's contribution to JADC2 is referred to as _______.

PROJECT OVERMATCH

A __________________ in the data world that has been endorsed by the networking industry and ratified by a standards organization a.Rule b.Protocol c.Regulation d.Order

PROTOCOL

Also called a multi-tenant environment, which type of cloud computing involves shared resources?

PUBLIC CLOUD

Which Cisco Unified Communications Manager server type functions as the primary call controller within a Cisco Call Manager cluster?

PUBLISHER

Which of the following would be done in the cyber kill chain's installation stage?

Placing malware on an asset

This refers to the procedures and principles configued into an OS.

Process Execution

Your Marines are tracing cables to find the switch interface tied to a specific computer in your COC. they have been at this for 20 minutes in front of your unit's S3 section and CO. What could have prevented their requirement to do this?

Proper desciption on each port in the CLI of the switch.

What are the primary functions of Active Directory Sites and Services?

Provides a way for the administrator of a domain to map the physical layout of the network in a way that active directory can understand.

What does Microsoft Online Certificate Status Protocol (OCSP) do?

Provides an efficient mechanism for distributing certificate revocation info.

What is not a feature of Microsoft Active Directory?

QOS

With regards to Client/Server configurations, what is an example of traffic shaping?

QOS

During a confirmation brief, your battalion commander expresses concern with bandwidth utilization when migrating VMs. Which characteristic of services planning is she concerned about?

QUALITY OF SERVICE

_________________ is a description or measurement of the overall performance of a network, particularly the performance seen by the users of the network. a.Quality of Service b.Scalability c.Security d.Fault Tolerance

QUALITY OF SERVICE

You are a systems administrator conducting the initial configurations for a server deployment for a field exercise. Your NCO tells you that you must select a hard drive configuration that is redundant and more efficient than other configurations. What methodology would you use to fulfil this request?

RAID 5

Mutual agreement among participating enterprises to accept each other's security assessments in order to reuse information system resources and/or to accept each other's assessed security posture in order to share information.

RECIPROCITY

A hacker harvests email addresses at what stage of the cyber kill chain?

RECON

A cyberattack occurs against an adversary's switch. What type of cyberspace is the switch?

RED

Any unencrypted classified traffic circuit is often referred to as _______________ before it is encrypted by a device.

RED

DCO-RA can be conducted into which type of cyberspace?

RED

OCO is primarily conducted in which type of cyberspace?

RED

What type of cyberspace is owned or controlled by an adversary where they seek to operate freely?

RED CYBERSPACE

You are in charge of briefing the comm plan to your infantry batallion commander. He asks why each site has two pathways out which requires extre equipment. He says, "If you can answer in one word, I will approve your plan." What do you say? a.Redundancy b.Scalability c.Security d.Quality

REDUNDANCY

The most common means of Trouble Ticket tracking is ______

REMEDY

This message is a broadcast message sent from an asset identifying its acceptance of an IP from a specific DHCP Server and is noted by all available DHCP Servers on the network.

REQUEST

Which of the following is NOT an advantage of a Client/Server architecture?

REQUIRES LITTLE EQPT STRING OR PLANNING

Who is the person that is responsible for managing TDLs in an assigned region or sector?

RICO OR SICO

This system is maintained by an 0631. a.computer b.router c.server d.VTC

ROUTER

What device operates at the Network Layer of the Transmission Control Protocol/Internet Protocol (TCP/IP) Model?

ROUTER

A router's __________ holds information that allows the router to decide which interface to forward packets.

ROUTING TABLE

This information stored on a router containing the information about adjacent networks that allows the router to make a decision as to which interface to forward the packet down the TCP/IP model is best described as a/an:

ROUTING TABLE

This regulates the traffic on your network. a.Messages b.Rules c.Medium d.Devices

RULES

You're planning a communications architecture for an exercise and note that one of your two wideband satcom systems has just been released from maintenance giving you two satcom systems. What option is now available in terms of services planning is now available moving forward? Choose the best answer.

Reachback

What software allows administrators to Remotely manage Windows server roles and features ADDS and ADUC from a Windows 10 workstation?

Remote Server Administrative Tools (RSAT)

Which of the following is NOT a characteristic of a virtual server?

Requires additional hardware to improve performance Difficult to move or copy

Which is NOT a use for containers?

Requires more overhead

An advantage of a tunnel is

Secures the information moving through the transport network

Your COC has 25 users on SIPR and 20 on NIPR in a location 200m from your TCF. You need to provide network connectivity. The entire area is secure. Which of the below is the best way to accomplish this task?

Run 2 fiber lines and position 2 LEM's with each hosting its own enclave

Microsoft 365, Xbox Live, and One Drive are examples of which cloud computing service?

SAAS

Which of the following cloud service models provides access to a cloud-based web application and requires no installation or downloads?

SAAS

The ________ is a network storage device generally not accessible through the regulr network by regular devices.

SAN

During a confirmation brief, your battalion commander expresses concern with the quantity of servers in use and the shortage of any spares. Which characteristic of services planning is she concerned about?

SCALABILITY

_________________ is the ability of a network to grow and manage increased demand. a.Fault Tolerance b.Quality of Service c.Security d.Scalability

SCALABILITY

What server deploys updates and security patches across a network?

SCCM

There exists one per Active Directory instance and is the collection of objects, and their attributes.

SCHEMA

This OS characteristic enables monitoring.

SECURITY

What is a disadvantage with using public cloud computing?

SECURITY

What type of groups applies permissions to an OU or individual users?

SECURITY

This piece of equipment is commonly configured by 0671s:

SERVER

This system is maintained by an 0671. a.server b.router c.switch d.cabling

SERVER

_______ is a computer on the network from which you can request information, resources, services, and applications.

SERVER

ARE DESIGNED TO SHARE DATA, RESOURCES, OR DISTRIBUTE WORK.

SERVERS

Data systems are defined as a collection of _______ provided by servers to facilitate the sharing of data.

SERVICES

What does the UPS in the ASM provide?

SHORT DURATION POWER

What signaling protocol is typically used to connect CUCMs across a WAN connection

SIP

On this enclave, connections between routers are protected by Type 1 Comsec (KIV-7M) or HAIPE (KG-175) encryption.

SIPR

Which of the following allows for a MGRE Connection?

SIPR Connection between multiple sites from one hub using a KG175D

You are alone and unafraid during a training exercise so your Marines can get some much needed sleep. You have tripped over two cables and pulled them out from the TACLANE. One goes to the SIPR Router and one to the Black Core Router. What Enclaves have you brought down?

SIPR ONLY

Which of the following allows for a GRE Connection?

SIPR Point to Point Connection between sites from one hub using a KG250X

You are alone and unafraid during a training exercise so your Marines can get some much needed sleep. You have tripped over two cables and pulled them out from the TACLANE. One goes to the SIPR Router and one to the Black Core Router. Which do you plug into the PT interface on the TACLANE to bring the network back up?

SIPR Router

What are two main differences between Containers and Virtual Machines?

SIZE AND PORTABILITY

Network communication protocol for providing shared access to files, printers, and serial ports between nodes on a network.

SMB

This is attached to an IP address when using PAT so that the router can differentiate traffic among devices.

SOCKET NUMBER

Which system is a powerful network monitoring, alerting, and reporting capability for the Syscon Watch Officer?

SOLARWINDS

___________ is a powerful network monitoring, alerting, and reporting capability.

SOLARWINDS

Broadcast Storms can be avoided by using what?

SPANNING TREE PROTOCOL

Security incident that results in the transfer of classified information onto an information system not authorized to store or process that information.

SPILLAGE

Attackers use ______ to impersonate or masquerade as someone or something else

SPOOFING

Provides a secure channel over an unsecured network in a client-server architecture.

SSH

ACL USER-PERMITED is a ______

STANDARD NAMED ACL

ACL number 99 is a ______

STANDARD NUMBERED ACL

Which Link-16 capable radio would a helicopter use?

STT

FIREFLY vector sets use __________________ .

SYMMETRIC CRYPTOGRAPHY

Provides technical expertise in the preparation and conduction of comprehensive security assessments based on the managerial, operational, and technical security requirements documented within the Security Authorization Package (SAP).

Security Control Assessor

In order to send e-mails outside of your organization, what must you configure?

Send Connectors

Which of the following would be done in the cyber kill chain's delivery stage?

Sending payload via email

In a PaaS cloud service model, whose responsibility are cybsecurity updates and patches?

Shared responsibility

Which C2 System is a web-based collaborative platform that integrates with Microsoft's office products and is utilized primarily as a document management and storage system in the Marine Corps?

Sharepoint

What is application software?

Software that performs specific tasks for an end-user.

What is the correct order of troubleshooting steps for Microsoft GPO's?

Start with the scope, dive into delegation, learn your links, loopback.

What is RAID 0?

Striping

What is RAID 10?

Striping & Mirroring

What are the two types of T/O&Es?

Supporting Establishments (SE) and Operating Forces

Which of the following radio nets would usually be VHF?

TACP-L

Which of the following radio nets would usually be UHF?

TAD

Which of the following radio nets would usually be UHF?

TATC

The following are web-based applications EXCEPT:

TBMCS

Which of the following is NOT a component of CAC2S?

TBMCS

What Layer 4 protocol would I use to connect to MOL?

TCP

_______________ is a connection-oriented protocol

TCP

_______________ uses a three-way handshake, retransmission, and error-detection to add reliability

TCP

What are/is the Protocol(s) used by Layer 4: Transport Layer?

TCP / UDP

Provides access to a Command Line Interface (CLI) on a remote host.

TELNET

The amount of data that is actually transmitted over the media

THROUGHPUT

Which of the following is NOT a post-closure action required of the help desk?

TICKET DELETION

A User Education plan could include which of the following:

TRAINED ISCS S6 IN-BRIEF SMART PACK ISD

This style of encryption would be applied to a VSAT-S?

TRANSEC

You have a SIPR circuit encrypted by a TACLANE and then entering a Black Core Router. This router is connected to the modem on a VSAT-M. What security protection is likely being applied by the VSAT-M?

TRANSEC

__________________ is used for bulk ecnryption.

TRANSEC

________ is a term that broadly captures all architectures designed to support the transfer of information and the data systems architecture.

TRANSPORT

is a term that broadly captures all architectures designed to support the transfer of information and the data systems architecture.

TRANSPORT

Select whether the following statement is true or false. Where the battalion OPT is nested inside of the regimental OPT, which is further nested inside the Division OPT, the battalion S-6 holds a communications working group, while members participate in the regimental S-6's communications working group, while members of the regimental S-6 participate in the Division's communications working group.

TRUE

Software includes the operating system and the programs running on the computer.

TRUE

The Acronym "SIPRNet" stands for the Secure Internet Protocol Router Network.

TRUE

The Acronym "SIPRNet" stands for the Secure Internet Protocol Router Network. Select one: True False

TRUE

The Principles of Security are Confidentiality, Integrity and Availability. Select one: True False

TRUE

There are 65,536 possible ports available to the Transport Layer.

TRUE

There is only 1 schema per active directory instance.

TRUE

VLANs are utilized to secure assets on your network.

TRUE

Voice over Internet Protocol is a technology which allows Internet Protocol-based networks to be utilized for real-time voice applications.

TRUE

Which of the following prevents packets from routing around the internet indefinitely?

TTL

Loopback interfaces are most commonly used for _________________

TUNNEL SOURCES

Provides an efficient way to accredit systems and network components meeting specified security requirements and employing selected security controls.

TYPE AUTHORIZATION

A computer on your network has an IP address of 169.235.1.12. All 24 other computers are functioning on DHCP and have IP's in the 192.168.17.0/24 network. It cannot connect to any services. What is the most likely problem?

That laptop has no connection to the DHCP server

Your Bn Adjutant is unable to access a site that is blocked by an ACL entry that most Marines should not have access to but is required for his work. You have your Marines modify the ACL to allow his specific IP access to that site. It still doesn't work, and is corrected. Then two days later it is again not working. Why did it not likely work at first and why did it likely stop working again later?

The "Permit" statement for the Adjutant's IP address was added to the end of the pre-existing ACL. Then the IP of his computer changed due to DHCP.

Who are LE personnel primarily responsible to?

The Commanding Officer (CO)

What does GPMC allow an administrator to do?

The GPMC allows administrators to create a GPO that defines registry based polices, security options, software installation and maintenance options, scripts options and folder redirection options.

Which government credit card is used for ordering supplies that are not available through the normal supply system?

The International Merchant Purchase Authorization Card (IMPAC) Visa Credit Card

Your Marines are re-imaging laptops that have a SSD and HDD. Which drive should the Operating System be installed?

The SSD uses Flash memory and has a much faster read/write speeds that will speed up the operating system.

NIPR Point to Point Connection between sites not using a KG175D

The ability to ping the physical address of the destination router

To establish a tunnel the base requirements are; Source, Destination, IPaddress, and

The ability to ping the tunnel destination

What is the DoD Information Network?

The globally interconnected, end-to-end set of information capabilities, associated processes, and personnel for collecting, processing, storing, disseminating and managing information on demand for warfighters, policy makers, and support personnel.

Your S-3 calls you away from testing your VoIP capabilities to ask you about how you're going to be able to guarantee the CO can connect to the network from his own workstation and other terminal devices. He tells you that in the past, he's had bad experiences where the CO's devices have not been able to pass traffic on unclassified networks, even though other devices that had already been added were working just fine. What problem might he be talking about, and how can you guarantee that it doesn't happen this time around?

The previous S-6 allowed the DHCP server to dynamically allocate IPs to the entire network, and exhausted the S-6 IP allocation before the CO was able to connect his device to the network. You will solve this issue by statically assigning IPs to your CO's devices to ensure the DHCP server does not assign those IPs to other devices.

What is the purpose of video teleconferencing (VTC)?

The purpose of video teleconferencing is to offer commanders an unclassified or classified closed video network capable of voice, video, and data exchange to facilitate face-to-face communication, meetings, and planning sessions.

A Marine in the COC says the track quality of one track is better than another track. What does this mean for the tracks?

The track with better quality has a more accurate position

What are the requirements for a witness server?

The witness server can't be a member of the DAG.2. The witness server must be in the same Active Directory forest as the DAG.3. The witness server must be running Windows Server 2008 or later.4. A single server can serve as a witness for multiple DAGs.

What does a messaging system do?

They manage the channels that define the paths of communication between the applications and the sending and receiving of messages.

This network and enterprise service enables collaborative information sharing across forces afloat with reach-back capabilities to supporting shore establishments via system management, voice, video, and data services.

This network and enterprise service enables collaborative information sharing across forces afloat with reach-back capabilities to supporting shore establishments via system management, voice, video, and data services.

You are validating your platoon's Active Directory services. You submit a request that requires the Global Catalog to search all of the objects of which it has a full or partial record, searching for an object that you know for a fact exists within another Active Directory domain. The request goes through, Global Catalog is unable to locate any record of this object. What might explain this?

This object exists in a domain that is not within the same forest as our domain; Global Catalog is limited by the fact that it only keeps replicas of objects within the forest.

The measure of data that is actually successfully transmitted over the network.

Throughput

Select the answer that best describes why VoIP (Voice over Internet Protocol) protocols exist.

To setup, maintain, and terminate a bi-directional real-time media stream between VoIP terminals, also provide the necessary signaling for VoIP networks to interface with the Public Switched Telephone Network (PSTN).

What is the purpose of Total Force Structure Process (TFSP)?

To translate necessary organizational capabilities into force structure solutions and measure the cost of providing those capabilities consistent with financial resources available to the CMC

A domain arranged into a hierarchical structure is called what?

Tree

What Layer 4 protocol would I use to make a phone call?

UDP

What protocol at layer 4 of the OSI model would is used to stream a video?

UDP

What would I use to stream a video?

UDP

_______________ is a connectionless protocol

UDP

What band does ANW2 operate in?

UHF

An event involving the exposure of information to entities not authorized access to the information.

UNAUTHORIZED DISCLOSURE

One source to one destination

UNICAST

The power just went out and "should be restored" in 5 min. What device inside most network equipment is keeping your network alive? How long do you have ideally?

UPS, 15MIN

The following effort belongs to which agency: Employ a modernization strategy and prove its concept through a series of training evolutions, referred to a Project Convergence.

US ARMY

The following effort belongs to which agency: Develop the Advanced Battle Management System, intended to provide data to pass information across all domains.

USAF

Which of the following would be done in the cyber kill chain's exploitation stage?

USING A VULN TO EXECUTE CODE

The following effort belongs to which agency: Develop a fleet architecture using AI and manned/unmanned teaming to enable Distributed Maritime Operations.

USN

security appliances combines the features of multiple security solutions into a single appliance

UTM

Users can setup, accept or cancel meetings and can listen to and send calendar information using _____.

Unified Messaging

________ is a software for automating patch management.

Update Manager

You have a router, KG175D, and a switch for network equipment. You need to set up a NIPR and SIPR network with a colorless transport. How would you accomplish this?

Use the router to establish three VRF's. Then route the SIPR KG to the swith to host SIPR services. Inform your Ops O that SIPR and NIPR will be limited reach.

This OS characteristic a means for the user to interact with the OS itself.

User interface

Which of the following is NOT a characteristic of Link-16?

Uses IFF frequencies

Depending on the level of staff, the help desk should define key members of the staff that rate ________ support.

VIP

Which of the following is NOT an element of a deployed help desk?

VIP SUPPORT

What is the process of implementing multiple operating systems on the same set of physical hardware to better utilize the hardware?

VIRTUALIZATION

_____ is the process of implementing multiple operating systems on the same set of physcial hardware to better utilize the hardware.

VIRTUALIZATION

What is not a common Exchange problem?

VIRTUALIZATION SERVICE EXCEEDED

Why are Power over Ethernet (PoE) switches required in Marine Corps VoIP Networks? Pick the best answer.

VoIP telephones require power to operate, many of them were fielded without external power blocks that can provide power so the only way to provide the phones with power is via PoE enables switches.

Where does the IP address associated with your Call Manager originate?

Voice VLAN

A ______ interconnects two high speed networks over a geographic distance; usually much slower than other networks.

WAN

Interconnects Two or More Networks over a geographic distance.

WAN

Departmental and Service-Level delays in divesting of legacy systems and environments, coupled with delays in incorporating technological advances into enterprise solutions challenges which enabling technology?

WARFIGHTING NETWORK

FULLY PREPARED, CURRENTLY ON STANDBY

WARM SITE

A hacker creates an attack or malicious software at what stage of the cyber kill chain?

WEAPONIZATION

After returning from a sleeping post, you notice that various services essential to the field exercise are down and the previous administrator is not there to explain. Where can you go to get information on what might have happened?

WINDOWS EVENT LOGS

What command will delete the start-up configuration from your device?

WRITE ERASE

Which DDS-M Device is the PRIMARY system used to connect unit routing devices together?

WSM

Which DSN module is the PRIMARY device used at the Network Layer/ Layer 3 of the OSI model?

WSM

Which Network Device is the PRIMARY USMC DDS-M device used at the Network Layer?

WSM

You are standing up a Div Comm Co TCF that is expected to be static for an extended period. It is acting as a major communications hub for adjacent, subordinate, and DISA links and routing. Which of the following would you most likely to use in your plan for core network routing?

WSM-H

Which of the following is a best solution for a light mobile unit requiring fast set up and tear down times and man pack equipment?

WSM-L

Which of the following is an enabling technology of JADC2?

Warfighting Network SOFTWARE

You're a communications officer establishing a COOP site for your unit. Your commander is requesting the ability to rapidly shift from a degraded site to another fully prepared site, currently on standby. What kind of site is your commander referring to?

Warm Site

What is the TDF?

What actually displays the air picture

Can you use an ACL to block Web access to a specific user on your network?

YES

Can you use an ACL to block access to a specific URL to a specific user on your network?

YES

Do domain controllers house the responsibility for allowing authentication and access for network logon?

YES

Your IP allotment is 10.10.51.0/24 for physical and 172.16.51.128/26 for logical. You must provide for 110 transmission links and 55 DMVPN spokes. Do you have the IP space to do this?

YES

You are preparing for a training exercise and your Chief is on leave. A Cpl asks you if he is allowed to put DHCP on the SIPR router. Is this permitted?

Yes, it is common practice and authorized on USMC networks

An Authorized User (military, civilian, FN, or contractor) who requires detailed knowledge of Cyber IT and/or cybersecurity to support work in the development, maintenance, or operation of Marine Corps systems, including weapons, tactical, electronic and electrical services, navigation, and engineering.

ZONE 1

Which of these commands prepares the Domain for Exchange during the deployment of Exchange Server 2016?

\setup.exe /PrepareDomain:Domain.Local /IAcceptExchangeServerLicenseTerms

Frames sent to a Multicast Ethernet address will be copied and forwarded to ________________.

a subset of devices on the Ethernet LAN that volunteers to receive frames sent to a specific address.

A multi-channel radio network diagram is complete with unit names, unit locations, multi-channel radio system symbols, a legend and what other pieces of information?

appropriate data rates

A cyberattack occurs against a MCEN router. What type of cyberspace is the router?

blue

DoDIN Ops is conducted in which type of cyberspace?

blue

The process of tracking and approving changes to the system.

configuration managment

Which of the following is the MOST responsible for the conduct of DCO - Internal Defense Measures?

cpts

What administrator has the permissions to do anything in the domain?

domain

Consists of the management server responsible for collecting events, controlling policies, and maintaining updated content for end-point product modules.

ePO Management Suite

When tasking units in support of a multi-channel radio network, it is important to remember to include attach and detach equipment statements as well as ______ links.

establish and terminate

Malicious code is executed in a system at what stage of the cyber kill chain?

exploitation

What are multiple trees that share the same schema?

forest

An internet-enabled fridge in the US is a staging point for a cyberattack. What type of cyberspace is the fridge?

gray

_______ is the single point of contact between the service provider and the user.

helpdesk

Which hypervisor type runs in an existing application on top of an existing operating system?

hosted

A hacker puts malware on an asset at what stage of the cyber kill chain?

installation

This gives a reliable technique for the OS to communicate and react to surroundings.

interrupt

Establishes and manages the cybersecurity program within a command, site, system, or enclave in accordance with DoD, DON, and Marine Corps cybersecurity guidance and policies

issm

is the DoD's concept to connect sensors from all military services into a single network.

jadc2

What two tunneling protocols does DMVPN rely on?

mGRE NHRP

Which of the following is NOT a limitation of containerization?

not interoperable with cloud computing

The Main advantage is that administrator permissions can be delegated to these containers for objects and groups.

ou

The layer three PDU is known as (a)

packet

Which of the following is NOT included with the WSM Lite?

pacstar 440

This process is designed to account for assets that cannot be patched on time. The intent of the process is the development of a plan that ultimately ends with assets patched or updated.

poam

What is RAID 5?

striping and parity

What is the purpose of VLSM?

to support more efficient use of IP Address space

What tables does a Router with EIGRP enabled have other than a Routing Table?

topology, neighbor

________ is a server that is a centralized management application for virtual machines and ESXi.

vCenter

is a component of vSphere that allows the live migration of a running VM's file system from one storage system to another.

vMotion

________ is a hyper-converged, software-defined storage (SDS) product that pools together direct-attached storage devices across a vSphere cluster to create a distributed, shared data store.

vSAN

You are the S-6/communications platoon commander for an infantry battalion. Who fills the role of the responsible officer (RO) for the battalion's communications gear?

you


Ensembles d'études connexes

A&P II Chapter 21- Lymphatic System

View Set

Davis Advantage - Chapter 5 End-of-Life Care

View Set

Mortgage Loan Origination Activities

View Set

The Child with Cardiovascular Health Problems

View Set

Norton Guide - Essential Literary Terms

View Set

Chapter 16: Auditing Operations and Completing the Audit

View Set