Personal and Equipment Protection
Pubs and Directives
OSI Model
Ports, Protocols, and Svcs
IP Addressing
Wireless Networking
Wired and Wireless Media
Troubleshooting
Methodology
Specialized Tools
&
NMS
Random Trivia!
More Random Trivia!
100

Grounding has three main functions: Electrical Noise Reduction, Personnel Safety, and what?

What is Equipment Protection?

100

Between DoD Instructions and DoD Manuals, one implements policy, while one establishes policy. Which is Which?

What is DoDIs establish policy and DoDMs implement policy?

100

TRUE/FALSE: Layers 5-7 are responsible for moving data around.

What is FALSE?

100

This can be thought of as a spoken language.

What is a protocol?

100

This designation is for the left most digit of a value.

What is the Most Significant Digit (MSD)?

100

The ____________ is the identifier (name) that tells you which service set (or network) to join.

What is the Service Set Identifier (SSID)?

100

This physical property of Twisted-Pair Cable limits signal degradation from electromagnetic interference (EMI) and radio frequency interference (RFI).

What is the twisted wire?

100

What are two of the three sources you can use to gather information in hopes of identifying a problem?

What are the user experiencing the problem, computer logs and error messages, and personal observation?

100

This secures cable ends to connectors through the application of mechanical pressure, such as used to attach RJ-45 connectors to ethernet cables. 

What is a Crimper/Crimp Tool?
100

What is the only food that can never go bad?

What is honey?

100

The unicorn is the national animal of which country?

What is Scotland?

200

The student text details physical security requirements for a particular facility. It lists four requirements; name  two.

What are type and level of the information handled in a facility, type of equipment, mission of the unit to which assigned, and duty hours of the facility?

200

This type of publication generally instructs readers on “what to do,” i.e., direct action, ensure compliance to standard actions Air Force-wide.

What is an Air Force Instruction (AFI)?

200

Which network device operates at the Data link layer (Layer 2)?

What is a network switch?

200

Which layers from the OSI model were combined in the TCP/IP Suite?

What are the Application, Presentation, and Session Layers (Layers 5-7)?

200

Which digit in a value represents the Least Significant Digit (LSD)?

What is the right most digit?
200

This is a collection of all the Basic Service Sets on a network and is essentially the name of a wireless network or access point.

Example: AWAKEN

What is the Extended Service Set Identifier (ESSID)?

200

This category of Unshielded Twisted Pair Cable can support up to 1 Gbps.

What is Category 5e?

200

What is troubleshooting step number 2?

What is Establish a Theory of Probable Cause?

200

This tool checks for breaks in fiber optic cable by sending a signal and measuring the light that is reflected off the break, splice, or defect in the fiber. Test can determine approximate distance into the cable for the defect. 

What is an Optical Time Domain Reflectometer (OTDR)?

200

What does “Hakuna matata” mean?

What is "no worries"?

200

What fictional character is believed to be real by more than 25% of Americans?

Who is Sherlock Holmes?

300

The goal of ___________ is to minimize impedance between metallic objects.

What is bonding?

300

This organization develops industry standards used in our Cyber environment, including 568, 569, and 606.

What is the Telecommunications Industry Association (TIA)?

300

What main two protocols are used in the Transport layer (Layer 4)?

What are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?

300

With this protocol, if a segment goes missing, the receiving system must request the missing segments. This protocol guarantees data packets transfer and arrive in the same order in which they were sent. 

What is Transmission Control Protocol (TCP)?

300

Convert 200(10) into Binary on the board.

You have 90 seconds to complete, and no help from the crowd.

Hint: Build a weighted table for the number system you're converting to!

What is...

11001000?

300

This type of network is intended to cover an area that ranges around 31 miles, or 50 kilometers, and can  also be called a Base Area Network (BAN) or a Campus Area Network (CAN).

What is a Wireless Metropolitan Area Network (WMAN)?

300

A ___________ cable is used to connect like devices.

Ex: Computer to Computer, Switch to Switch, etc.

What is a Cross-Over Cable?

300

Within this troubleshooting step, you should take a moment to consider whether you can troubleshoot the issue on your own or if escalating it to a higher authority is called for.

What is Test the Theory?

300

This software tool captures and analyzes individual packets to examine information like protocols used, source and destination addresses, the size of the packet, and sometimes payload data. 

What is a protocol analyzer?

300

Which comic book character did Michael Jackson want to play so much that he considered buying Marvel Comics in the 1990s?

Who is Spider-Man?

300

How many different characters does Tom Hanks play in the 2004 Christmas movie The Polar Express?

What is five?

400

When it comes to Direct Bonds, welding is an example of ____________, and lock-washers are an example of ____________.

What is permanent bond and semi-permanent bond, respectively?

400

This provides a graphical user interface to effectively address network vulnerabilities and maintain security protocols within networks, servers, computers, and logical designs.

What is STIG Viewer?

400

Name the OSI Layers as a user is receiving information that someone/something sent them.

What is Physical, Data link, Network, Transport, Session, Presentation, and Application?

400

This protocol is used when speed is of primary importance, such as during real-time video conferencing, streaming audio and video, Voice over Internet Protocol (VoIP), and online gaming.

What is User Datagram Protocol (UDP)?

400

Convert 11100010(2) into Decimal on the board.

You have one minute to complete. No help from the crowd.

Hint: Build a weighted table in the number system you're currently in!

What is...

226?

400

In this network setting, one can wirelessly connect one device to another without first connecting to a wireless router or access point.

What is a Wireless Ad Hoc Network?

400

Name the two types of Fiber-Optic Cable.

What are Single-Mode and Multi-Mode Fiber?

400

What may be, arguably, the most important step in this process?

What is documenting your findings, actions, and outcomes?

400

This command line input provides detailed network configuration settings for the local host including IP addresses, subnet mask, default gateway, and DNS settings. 

What is ipconfig?

400

The bald eagle is the national bird of the United States … but in this context, bald doesn’t mean hairless. The bald part of the bird’s name comes from an Old English word meaning what?

What is white?

400

What is the most common street name in the United States?

What is Second Street?

500

Name the ESD failure that may cause a component to sometimes work correctly and sometimes not.

What is Intermittent?

500

When utilizing publications, what should you always ensure?

What is verify that you have the most up to date version?

500

What is header information is placed into a Network (Layer 3) Packet?

What is Source and Destination Internet Protocol (IP or Logical) Address?

500

Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP) all utilize which Transport Layer (Layer 4) Protocol?

What is Transmission Control Protocol (TCP)?

500

Convert 5F89(16) into Binary on the board.

You have 90 seconds to complete. No help from the crowd.

Hint: Inspection Method!

What is...

101111110001001?

500

**********!!DAILY DOUBLE!!**********

There were four Wireless Disadvantages explained in the student text. Name three of them.

What are Speed, Reliability, Security, and Reduced Management Control?

500

An example of a __________ signal is a radio station.

What is a Fixed Frequency Signal?

500

While verifying functionality, incorporating ______________ into your troubleshooting process to identify the underlying reasons for the system issues helps you make more informed decisions.

What is Root Cause Analysis (RCA)?

500

This scans, audits, and monitors the security infrastructure for signs of attacks in progress.

What is an Intrusion Detection System (IDS)?

500

What is the only U.S. state that does not have a rectangular flag?

What is Ohio?

500

What color is a polar bear’s skin?

What is black?

600

There are ways to dissipate a charge buildup and eliminate the possibility of damage. The USAF ESD Control Program focuses on the following three primary control measures. Workstation and Personnel Grounding is one; what are the other two?

What are Handling Precautions and Protective Packaging?

600

The Wi-Fi standard, 802.11, was created by which organization?

What is the Institute of Electrical and Electronics Engineers (IEEE)?

600

This type of address is typically hard-coded into the network hardware and remains the same for the device’s lifetime.

What is a MAC (or Media Access Control) address?

600

These Ports range from 49152–65535 and cannot be registered with the Internet Assigned Numbers Authority (IANA).

What are Dynamic, Private, or Ephemeral Ports?

600

How many Octet(s) are allocated towards the Host ID in a Class A IPv4 address?

What is three?

600

This standard contributes to network traffic because, before any real data is transmitted, it must broadcast a signal onto the network to listen for collision scenarios and to tell other devices not to broadcast.

What is Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)?

600

The major benefit of this type of cable is that it reduces electrical noise both within the cable (pair-to-pair crosstalk) and outside the cable (Electromagnetic Interference and Radio Frequency Interference).

What is Shielded Twisted-Pair Cable?

600

Name all six troubleshooting steps.

What are:

1. Identify the problem. 

2. Establish a theory of probable cause.

3. Test the theory to determine the cause. 

4. Establish a plan of action.

5. Verify full system functionality.

6. Document the findings, actions and outcomes.

600

Objects queried by SNMP are maintained in a _______________.

What is a Management Information Base (MIB)?

600

In what country did the tradition of the Easter bunny originate?

What is Germany?

600

Which classical composer was deaf?

Who is Ludwig van Beethoven?

700

**********!!DAILY DOUBLE!!**********


When it comes to the three factors that are measured when considering human factors in safety, there are psychological, physical, and organizational factors. Which examples fall into which factors?

- Worker ignores directions from supervisors and work leaders.

- There is an emphasis on production over work safety.

- Worker performs tasks while under the influence of alcohol or illegal drugs.

What is Psychological, Organizational, and Physical factors, respectively?

700

STIGs fall under three vulnerability categories: Categories 1, 2, and 3. Which category of vulnerabilities can allow unauthorized access to classified data or facilities and can lead to a denial of service or access?

What is Category 1?

700

This layer establishes, manages and terminates connections between applications located on different devices.

What is Session Layer (Layer 5)?

700

This protocol stays within the boundaries of a single network, never routed across Internetwork nodes. It is a request and reply protocol. The sending station sends a packet requesting the MAC address of the receiving node and once it finds that address forwards the packet.

What is Address Resolution Protocol (ARP)? 

700

Automatic Private IP Addressing (APIPA) addresses are identified by having which number in the first octet of the address?

What is 169?

700

In this configuration, the ___________ works with the Lightweight Access Point to dictate forwarding decisions.

What is the Wireless Local Area Network Controller (WLC)?

700

Name the two advantages of unguided media explained in the student text.

What are mobility and being relocatable? 
700

As a starting point, network administrators want to monitor the “big 5” for any device on the network. Name three.

What are Ping availability and latency, CPU, memory, disk, and interface utilization?

700

Where was German chocolate cake invented?

What is Texas?

700

This brand name is a combination of “spice” and “ham”.

What is Spam?

800

Who/what is at risk for failing to comply to a warning sign? Who/what is at risk for failing to comply to a caution sign?

What is Personnel and Equipment, respectively?

800

How often are TIA standards reaffirmed, rescinded, or revised according to any submitted updates?

What is every five years?

800

This is a conceptual framework to better understand the complex interactions between devices on a network.

What is the Open Systems Interconnection (OSI) model?

800

What is the port number range for Registered/User Ports?

What are 1024 to 49,151?

800

Compress the following IPv6 address on the board:

2447:0DB8:BC10:0E01:1000:0000:0000:0000

You have one minute to complete. No help from the crowd!

What is...

2447:DB8:BC10:E01:1000::?

800

What may an attacker use to conduct a man-in-the-middle attack?

What is a Rogue Access Point?

800

Signals being more susceptible to interception and monitoring describe which unguided media disadvantage?

What is Security?

800

The Network Monitoring System provides five basic functions. Name all of them.

What are Discover, Map, Monitor, Alert, and Report?

800

Between Lemons and Limes, which one(s) floats and/or which one(s) sink?

What is Lemons float, and Limes sink?

800

This popular restaurant once made bubblegum-flavored broccoli.

What is McDonald's?