3DX5X VOL 2 UNIT 2

Card Set Information

Author:
Anonymous
ID:
227883
Filename:
3DX5X VOL 2 UNIT 2
Updated:
2013-07-22 21:38:41
Tags:
3DX5X CDC
Folders:

Description:
Cyber Career Field CDC
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. The computing part of the computer is the central processing unit, also called the...
    microprocessor
  2. What two main components make up the central processing unit?
    Control unit and arithmetic logic unit
  3. What is the type of memory that retains data after power is removed or lost?
    Nonvolatile
  4. Which landline transmission medium is the primary carrier of voice communications?
    Twisted pair cable
  5. An optical communications system is comprised of a....
    transmitter, cable, and receiver
  6. Which of the following is not one of the three advantages to using wireless technology?
    Safety
  7. The ability to move about without being tethered by wires in wireless technology is called...
    mobility
  8. Which of the following is not one of the four security threats to Wireless Local Area Network?
    Direct Connections
  9. Who is an authorized client that may unknowingly or maliciously help outside parties gain access to a network?
    Employee
  10. What organization developed several wireless standards to meet the demands of security, speed, and flexibility of today's wireless networks?
    Institute of Electrical Electronics Engineers
  11. How many peripherals can a Universal Serial Bus handle at once?
    127
  12. How many devices can connect to a FireWre bus?
    63
  13. What do you apply across Liquid Crystal Display material to change the alignment and light polarizing property?
    Voltage
  14. What is a Data Link layer network device that logically separates a singe network into two segments or collision domains in Ethernet networks?
    Bridge
  15. What rule establishes the percent of data that should be local to a segment and the percentage of data that should be destined to traverse a bridge to the other segment?
    80/20 rule
  16. This type of bridge is used to convert one Data Link layer protocol to another...
    Translational
  17. What is the method called when the entire frame is received and placed into the buffer, an error check is performed, and the frame is sent to the proper port for delivery?
    Store-and-forward
  18. What forwarding method is also known as runtless switching?
    Fragment-free
  19. What layer of the open system interconnection model do routers operate?
    Layer 3
  20. What do routing algorithms initialize and maintain to aid the process of path determination?
    Routing tables
  21. Which of these is an example of an Exterior Gateway Protocol?
    Border Gateway Protocol
  22. Dynamic routing automatically calculates the best path between how many nodes?
    2
  23. What encryption device may you rarely see due to its lower maximum data rate?
    TSEC/KIV-7
  24. What encryption device is certified to secure all classification levels and categories and is able to encrypt trunk-level high-speed circuits?
    TSEC/KIV-19
  25. What encryption device is capable of loading up to 500 keys?
    AN/CYZ-10 /DTD
  26. The classification of a fill device is...
    classified as soon as a key is loaded, and holds the classification of the loaded key
  27. A modem is a device that modulates...
    digital data onto an analog carrier for transmission over an analog modem
  28. Analog modems are used over the voice band range of...
    20 Hz to 20 kHz
  29. The main function of the Data Service Unit is to...
    adapt the digital data stream produced by the customer equipment to the signaling standards of the telephone carrier equipment
  30. Software is generally divided into...
    systems software, operating systems software, and applications software
  31. Which one is not a category of the operating system's task categories?
    Troubleshoot interface
  32. The path between the operating system and virtually all hardware not on the computer's motherboard goes through a special program called a...
    driver
  33. The core operating-system function is the management of the computer system which resides with the...
    kernel
  34. Applications are software programs designed to perform what type of tasks?
    specific
  35. What are two anti-virus programs that the Air Force uses?
    Norton and McAfee
  36. Windows operating systems traditionally function in one of two network models. Which modes does not operate using centralized user accounts?
    Workgroup
  37. Which system provides support for features such as Windows System Resource Manager and Metadirectory Services?
    Enterprise Services
  38. One of the Windows Server Editions operating systems provides supports high-end, high traffic applications servers. Which Operating system is it?
    Datacenter Edition
  39. What was the first disk operating system developed to operate on a wide range of computer systems?
    UNIX
  40. What is the name of the standard all-purpose shell most commonly used?
    Bourne shell
  41. What directory is always identified by the slash symbol (/) and is in the "a" partition?
    root
  42. Which pathnames begin at the current working directory?
    Relative

What would you like to do?

Home > Flashcards > Print Preview