Grounding has three main functions: Electrical Noise Reduction, Personnel Safety, and what?
What is Equipment Protection?
Between DoD Instructions and DoD Manuals, one implements policy, while one establishes policy. Which is Which?
What is DoDIs establish policy and DoDMs implement policy?
TRUE/FALSE: Layers 5-7 are responsible for moving data around.
What is FALSE?
This can be thought of as a spoken language.
What is a protocol?
This designation is for the left most digit of a value.
What is the Most Significant Digit (MSD)?
The ____________ is the identifier (name) that tells you which service set (or network) to join.
What is the Service Set Identifier (SSID)?
This physical property of Twisted-Pair Cable limits signal degradation from electromagnetic interference (EMI) and radio frequency interference (RFI).
What is the twisted wire?
What are two of the three sources you can use to gather information in hopes of identifying a problem?
What are the user experiencing the problem, computer logs and error messages, and personal observation?
This secures cable ends to connectors through the application of mechanical pressure, such as used to attach RJ-45 connectors to ethernet cables.
What is the only food that can never go bad?
What is honey?
The unicorn is the national animal of which country?
What is Scotland?
The student text details physical security requirements for a particular facility. It lists four requirements; name two.
What are type and level of the information handled in a facility, type of equipment, mission of the unit to which assigned, and duty hours of the facility?
This type of publication generally instructs readers on “what to do,” i.e., direct action, ensure compliance to standard actions Air Force-wide.
What is an Air Force Instruction (AFI)?
Which network device operates at the Data link layer (Layer 2)?
What is a network switch?
Which layers from the OSI model were combined in the TCP/IP Suite?
What are the Application, Presentation, and Session Layers (Layers 5-7)?
Which digit in a value represents the Least Significant Digit (LSD)?
This is a collection of all the Basic Service Sets on a network and is essentially the name of a wireless network or access point.
Example: AWAKEN
What is the Extended Service Set Identifier (ESSID)?
This category of Unshielded Twisted Pair Cable can support up to 1 Gbps.
What is Category 5e?
What is troubleshooting step number 2?
What is Establish a Theory of Probable Cause?
This tool checks for breaks in fiber optic cable by sending a signal and measuring the light that is reflected off the break, splice, or defect in the fiber. Test can determine approximate distance into the cable for the defect.
What is an Optical Time Domain Reflectometer (OTDR)?
What does “Hakuna matata” mean?
What is "no worries"?
What fictional character is believed to be real by more than 25% of Americans?
Who is Sherlock Holmes?
The goal of ___________ is to minimize impedance between metallic objects.
What is bonding?
This organization develops industry standards used in our Cyber environment, including 568, 569, and 606.
What is the Telecommunications Industry Association (TIA)?
What main two protocols are used in the Transport layer (Layer 4)?
What are Transmission Control Protocol (TCP) and User Datagram Protocol (UDP)?
With this protocol, if a segment goes missing, the receiving system must request the missing segments. This protocol guarantees data packets transfer and arrive in the same order in which they were sent.
What is Transmission Control Protocol (TCP)?
Convert 200(10) into Binary on the board.
You have 90 seconds to complete, and no help from the crowd.
Hint: Build a weighted table for the number system you're converting to!
What is...
11001000?
This type of network is intended to cover an area that ranges around 31 miles, or 50 kilometers, and can also be called a Base Area Network (BAN) or a Campus Area Network (CAN).
What is a Wireless Metropolitan Area Network (WMAN)?
A ___________ cable is used to connect like devices.
Ex: Computer to Computer, Switch to Switch, etc.
What is a Cross-Over Cable?
Within this troubleshooting step, you should take a moment to consider whether you can troubleshoot the issue on your own or if escalating it to a higher authority is called for.
What is Test the Theory?
This software tool captures and analyzes individual packets to examine information like protocols used, source and destination addresses, the size of the packet, and sometimes payload data.
What is a protocol analyzer?
Which comic book character did Michael Jackson want to play so much that he considered buying Marvel Comics in the 1990s?
Who is Spider-Man?
How many different characters does Tom Hanks play in the 2004 Christmas movie The Polar Express?
What is five?
When it comes to Direct Bonds, welding is an example of ____________, and lock-washers are an example of ____________.
What is permanent bond and semi-permanent bond, respectively?
This provides a graphical user interface to effectively address network vulnerabilities and maintain security protocols within networks, servers, computers, and logical designs.
What is STIG Viewer?
Name the OSI Layers as a user is receiving information that someone/something sent them.
What is Physical, Data link, Network, Transport, Session, Presentation, and Application?
This protocol is used when speed is of primary importance, such as during real-time video conferencing, streaming audio and video, Voice over Internet Protocol (VoIP), and online gaming.
What is User Datagram Protocol (UDP)?
Convert 11100010(2) into Decimal on the board.
You have one minute to complete. No help from the crowd.
Hint: Build a weighted table in the number system you're currently in!
What is...
226?
In this network setting, one can wirelessly connect one device to another without first connecting to a wireless router or access point.
What is a Wireless Ad Hoc Network?
Name the two types of Fiber-Optic Cable.
What are Single-Mode and Multi-Mode Fiber?
What may be, arguably, the most important step in this process?
What is documenting your findings, actions, and outcomes?
This command line input provides detailed network configuration settings for the local host including IP addresses, subnet mask, default gateway, and DNS settings.
What is ipconfig?
The bald eagle is the national bird of the United States … but in this context, bald doesn’t mean hairless. The bald part of the bird’s name comes from an Old English word meaning what?
What is white?
What is the most common street name in the United States?
What is Second Street?
Name the ESD failure that may cause a component to sometimes work correctly and sometimes not.
What is Intermittent?
When utilizing publications, what should you always ensure?
What is verify that you have the most up to date version?
What is header information is placed into a Network (Layer 3) Packet?
What is Source and Destination Internet Protocol (IP or Logical) Address?
Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP) all utilize which Transport Layer (Layer 4) Protocol?
What is Transmission Control Protocol (TCP)?
Convert 5F89(16) into Binary on the board.
You have 90 seconds to complete. No help from the crowd.
Hint: Inspection Method!
What is...
101111110001001?
**********!!DAILY DOUBLE!!**********
There were four Wireless Disadvantages explained in the student text. Name three of them.
What are Speed, Reliability, Security, and Reduced Management Control?
An example of a __________ signal is a radio station.
What is a Fixed Frequency Signal?
While verifying functionality, incorporating ______________ into your troubleshooting process to identify the underlying reasons for the system issues helps you make more informed decisions.
What is Root Cause Analysis (RCA)?
This scans, audits, and monitors the security infrastructure for signs of attacks in progress.
What is an Intrusion Detection System (IDS)?
What is the only U.S. state that does not have a rectangular flag?
What is Ohio?
What color is a polar bear’s skin?
What is black?
There are ways to dissipate a charge buildup and eliminate the possibility of damage. The USAF ESD Control Program focuses on the following three primary control measures. Workstation and Personnel Grounding is one; what are the other two?
What are Handling Precautions and Protective Packaging?
The Wi-Fi standard, 802.11, was created by which organization?
What is the Institute of Electrical and Electronics Engineers (IEEE)?
This type of address is typically hard-coded into the network hardware and remains the same for the device’s lifetime.
What is a MAC (or Media Access Control) address?
These Ports range from 49152–65535 and cannot be registered with the Internet Assigned Numbers Authority (IANA).
What are Dynamic, Private, or Ephemeral Ports?
How many Octet(s) are allocated towards the Host ID in a Class A IPv4 address?
What is three?
This standard contributes to network traffic because, before any real data is transmitted, it must broadcast a signal onto the network to listen for collision scenarios and to tell other devices not to broadcast.
What is Carrier Sense Multiple Access/Collision Avoidance (CSMA/CA)?
The major benefit of this type of cable is that it reduces electrical noise both within the cable (pair-to-pair crosstalk) and outside the cable (Electromagnetic Interference and Radio Frequency Interference).
What is Shielded Twisted-Pair Cable?
Name all six troubleshooting steps.
What are:
1. Identify the problem.
2. Establish a theory of probable cause.
3. Test the theory to determine the cause.
4. Establish a plan of action.
5. Verify full system functionality.
6. Document the findings, actions and outcomes.
Objects queried by SNMP are maintained in a _______________.
What is a Management Information Base (MIB)?
In what country did the tradition of the Easter bunny originate?
What is Germany?
Which classical composer was deaf?
Who is Ludwig van Beethoven?
**********!!DAILY DOUBLE!!**********
When it comes to the three factors that are measured when considering human factors in safety, there are psychological, physical, and organizational factors. Which examples fall into which factors?
- Worker ignores directions from supervisors and work leaders.
- There is an emphasis on production over work safety.
- Worker performs tasks while under the influence of alcohol or illegal drugs.
What is Psychological, Organizational, and Physical factors, respectively?
STIGs fall under three vulnerability categories: Categories 1, 2, and 3. Which category of vulnerabilities can allow unauthorized access to classified data or facilities and can lead to a denial of service or access?
What is Category 1?
This layer establishes, manages and terminates connections between applications located on different devices.
What is Session Layer (Layer 5)?
This protocol stays within the boundaries of a single network, never routed across Internetwork nodes. It is a request and reply protocol. The sending station sends a packet requesting the MAC address of the receiving node and once it finds that address forwards the packet.
What is Address Resolution Protocol (ARP)?
Automatic Private IP Addressing (APIPA) addresses are identified by having which number in the first octet of the address?
What is 169?
In this configuration, the ___________ works with the Lightweight Access Point to dictate forwarding decisions.
What is the Wireless Local Area Network Controller (WLC)?
Name the two advantages of unguided media explained in the student text.
As a starting point, network administrators want to monitor the “big 5” for any device on the network. Name three.
What are Ping availability and latency, CPU, memory, disk, and interface utilization?
Where was German chocolate cake invented?
What is Texas?
This brand name is a combination of “spice” and “ham”.
What is Spam?
Who/what is at risk for failing to comply to a warning sign? Who/what is at risk for failing to comply to a caution sign?
What is Personnel and Equipment, respectively?
How often are TIA standards reaffirmed, rescinded, or revised according to any submitted updates?
What is every five years?
This is a conceptual framework to better understand the complex interactions between devices on a network.
What is the Open Systems Interconnection (OSI) model?
What is the port number range for Registered/User Ports?
What are 1024 to 49,151?
Compress the following IPv6 address on the board:
2447:0DB8:BC10:0E01:1000:0000:0000:0000
You have one minute to complete. No help from the crowd!
What is...
2447:DB8:BC10:E01:1000::?
What may an attacker use to conduct a man-in-the-middle attack?
What is a Rogue Access Point?
Signals being more susceptible to interception and monitoring describe which unguided media disadvantage?
What is Security?
The Network Monitoring System provides five basic functions. Name all of them.
What are Discover, Map, Monitor, Alert, and Report?
Between Lemons and Limes, which one(s) floats and/or which one(s) sink?
What is Lemons float, and Limes sink?
This popular restaurant once made bubblegum-flavored broccoli.
What is McDonald's?