1509 Flashcards
Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
Radio Frequency Transmission Systems (3D1X3)
What is not a communications security program duty and responsibility for Cyber Transport Systems? A. Transmission security B. Technical security C. Emission security D. Physical security
Technical Security
What is defined as an integrated bundle of expert knowledge and organization skills inherent to a particular career field?
Core Competency
Which of the following is a core competency of Cyber Transport Systems? A. Fixed cable systems B. Voice Network systems C. Application software systems D. Client-server database systems
Voice network systems
Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?
AF Form 457
What is not one of the four major types of hazards? A. Biological B. Chemical C. Physical D. Nuclear
Nuclear
What hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?
Stress
To prevent manual handling hazards, utilize team lifting when lifting items that weigh more that how many pounds?
25
When working on electrical circuits, the role of safety observer is normally performed by the…
Supervisor
When working on electrical circuits, you may only wear metal framed eyeglasses if…
They are secured with a nonmetallic cord
To whom does the risk management (RM) process apply
All personnel
What simple, systematic process allows commanders to maximize combat capability, while limiting risk?
Risk Management
Which is a principle of Risk Management? A. Accept unnecessary risk B. Apply RM process continuously C. Train and adhere to safety guidelines D. Make risk decisions at the lowest level
Apply the RM process continuously
How many steps are in the risk management process?
5
An enclave that does not have a firewall and IDS is classified as having what category of vulnerability?
Category I
How many Integrated Network and Operation Security Centers (INOSCs) does the Air Force have?
Two
The Integrated Network and Operation Security Center (INOSC) has several responsibilities except…
A. Maintain sole administrative privileges on the firewall
B. Standardize, configure, backup, and otherwise maintain the firewall
C. Maintain a single naming/configuration standard for boundary devices
D. Install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN)
Standardize, configure, back up, and otherwise maintain the firewall
What term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol?
IP Telephony
What security feature should you not implement to help defend IP telephony systems from attackers?
A. enabling ACLs on firewalls, routers, and switches
B. deploying protection from DHCP spoofing
C. consolidating your voice with your data using VLANs
D. enabling port security access to only allow the required devices needed by the client
consolidating your voice with your data using VLANs
At which OSI layer does a packet filter gateway operate at?
3 (Network)
At which OSI layer does a circuit layer gateway operate?
4 (Transport)
At which OSI layer does an application-level firewall operate?
7 (Application)
The disadvantage of a host-based intrusion detection system (HIDS) is that it…
A. can analyze any encrypted data if it is decrypted before reaching the target host
B. consumes resources on the host it resides on and slows that device down
C. monitors log files for inadvisable settings or passwords
D. monitors traffic on the host on which it is installed
Consumes resources on the host it resides on and slows that device down.
One advantage of a network-based intrusion detection system (NIDS) is that it... A. can decrypt data B. uses very few network resources C. Monitors logs for policy violations D. Can analyze encrypted network traffic
uses very few network resources
Which intrusion detection system uses software sensors?
Host-based
Which intrusion detection system monitors packets for protocol anomalies and known virus signatures?
Network-based
Host-based intrusion detection systems (HIDS) are... A. Active only B. Passive only C. Passive or active D. Neither passive nor active
Passive and active
Network-based intrusion detection systems (NIDS) are... A. Active only B. Passive only C. Passive or active D. Neither passive nor active
Passive only
What security posture permits everything that is not specifically denied?
Open
What type of certificate authenticates the identify of a user?
Digital
What is the first line of defense in securing laptops?
Set a login ID and password combination for access
The definition of integrity as applied to identification, authentication, and encryption is…
A. having information ready when needed
B. not being able to deny who performed network actions.
C. the protection of the network from those not authorized access.
D. the assurance that no one has changed or destroyed information without permission.
the assurance that no one has changed or destroyed information without permission
What Air Force Systems Security Instructions (AFSSI) series covers emission security (EMSEC)?
7000
Which AF System Security Instruction (AFSSI) provides the overall implementation of DOD’s TEMPEST program?
7700
Which method of containing radiated emanations requires both facility and equipment testing?
Zoning
A facility with and inspectable space of more than 20 meters but less than 100 meters would be considered to be in facility zone…
B
Equipment with an equipment radation TEMPEST zone (ERTZ) of 20 to 100 meters would be considered to be in equipment zone…
C
Why must the use of TEMPEST-certified equipment be validated by an AF Certified TEMPEST technical authority (CTTA) prior to testing an inspectable space?
It is expensive
What plays a major role in a conductor’s ability to minimizing compromising emanations?
Distance and angle
Equipment is comprised as machines that process information in electronic or electrical form. What equipment should be designated as RED?
Equipment processing clear-text classified information
What equipment should be designated as BLACK when designating equipment that supports physical and electrical concepts?
Equipment processing encrypted classified information
Which type of separation ensure that every signal conductor from a RED device routes to another RED device, or becomes encrypted before connecting to a BLACK device?
Electrical
What is the grounding resistance goal for military communications electronics (C-E) facilities?
10 ohms or less
What facility ground subsystem uses surge arrestors?
Lightning protection
What facility ground subsystem is also called the safety ground?
Fault protection
Which facility ground subsystem is also called the “signal ground” and controls electrical noise and static in a facility?
Signal reference
Bonds in the earth electrode subsystem normally are direct permanent bonds and do not exceed a resistance of…
1 milliohm
What kind of bond is normally applied to signal reference bonds?
Mechanical
What is required in electronic settings to prevent equipment and signals from propagating interference and to protect equipment and signals from the effects of interference propagated by other devices?
Shielding
What type of shielding utilizes braid, foil, metal wrap, conduit or twisted wire around a conductor?
Cable
What does an integral system of air terminals, roof conductors, and down conductors, securely interconnected to the shortest practicable path to earth provide for a facility?
Protection from lightning
Which ESD sensitive class has a sensitivity range from 0-999 volts?
Class I
Which activity generates the most electrostatic current? A: Working at a bench B: Walking across carpet C: Walking across a vinyl floor D: Picking up a common plastic bag
Walking across carpet
What power line fault category is symptomatic of a total loss of utility power?
Blackout
What power line fault category is symptomatic of an instantaneous or dramatic increase in voltage?
Spike
What power line fault category is typically referred to as electro-magnetic interference and radio frequency interference?
Noise
What type of UPS is traditionally referred to as “offline”?
Passive Standby
What type of UPS offers the highest level of protection?
Double conversion
How many phases of generator power are usually required for industrial and commercial applications?
Three
Which is not a consideration for selecting facility batteries?
A. Facility power requirements
B. Facility power reserve time
C. Number of AC converters required for the facility
D. Amount of current and future floor space available
Number of AC converters required for the facility
What function do facility batteries provide during normal operating conditions (commercial AC power available)?
Act as a DC filter for the commercial AC power
What publication series covers standard Air Force installation practices?
TO 31-10 series
How are connectorized cables labeled?
First label is placed within 12 inches of the connector and marked “TO”, and the second is placed within 2 inches of the first label and marked “FROM”
What section of a horizontal cable duct is used for signal and control cables?
Upper
Support intervals for cables required surface installation will not exceed how many feet?
5
The advantage of using coaxial cable over paired cable is that coaxial cable... A. is less expensive B. is easier to install C. does not radiate energy D. has a low frequency range.
does not radiate energy
What type of cable does not radiate energy and is not affected by nearby magnetic fields?
Shielded
The thin plastic colored tape that spirals around a specific number of pairs that replicate in color is a…
Binder
What is used to identify the polarity of a wire pair in a cable?
Tip and Ring
What is the standard conductor used for data networking?
RJ-45
Pin 1 on a typical Electronics Industry Association/Telecommunications Industry Association (EIA/TIA) 568B connector is what color?
White/orange
What cable type connects devices that operate at similar layers of the OSI model?
Crossover
What has made very high data rate transmission possible on a fiber optics cable?
Use of light-emitting diodes
What is the maximum operating temperature of fiber optic cable?
1000 Degrees C
What are the three sections of a fiber optic cable?
Core, cladding, jacket
What type of cable is the easiest to splice?
Multimode step index fiber
How long do most fiber optic epoxies take to set?
12-24 hours
What do you use to remove excess fiber after the connector has cooled and epoxy has dried on a fiber cable?
Scribe
When using polishing cloth, remove a little bit of the protruding fiber at a time, until the fiber is perfectly…
flat and level
When a multimeter has three input terminal jacks, which jack is always used?
Common
When using an ohmmeter to take a resistance reading, what preliminary precaution should you take?
Disconnect the power from the circuit being tested
The purpose of a breakout box is to…
A. provide wiring maps at both ends of the cable
B. allow monitoring and access to multiple conductors
C. measure electrical voltage, current, frequency, and resistance
D. locate sheath faults, damaged conductors, splices, bridge taps, and split pairs.
allow monitoring and access to multiple conductors
What is the purpose of the miniature ON/OFF switches on a breakout box?
Allow the interruption of the individual interface conductors for isolated testing.
What do the jumper cables and side switch pins on a breakout box allow?
Cross-patching of individual interface conductors
What happens to the observed signal if you advance the oscilloscope synchronizing control too far?
Distortion
Sampled data points are stored in the memory of a digital storage oscilloscope as…
waveform points
What area of a digital storage oscilloscope takes digitized samples and performs numerous manipulations on the data including measuring rise and fall times, periods, time intervals, and math computations?
Microprocessor
What type of sampling does a digital storage oscilloscope normally use on single-shot or seldom-occurring signals?
Real-time
What is the standard operating mode for the acquisition mode on a digital storage oscilloscope?
Sample mode
Which digital storage oscilloscope button controls all waveforms displayed in the STORE mode?
CURSORS control
Which section of a bit error test (BERT) set measures the received test pattern?
Receiver
What determines the size of a test pattern segment transmitted from a bit error rate test (BERT)?
Number of bits that can represent the total number of bits in the test pattern
What type of error is the result of two successive logic one pulses of the same polarity that violates alternate mark inversion coding rules?
Bipolar violation
When using an optical time-domain reflectometer (OTDR), what action might a manufacturer require to prevent false readings?
Connect a launch cable between the test set and the cable being tested
What component of a protocol analyzer discards frames based on its definition or activates a trigger based on the trigger definition?
Filter
What protocol analyzer test window provides information concerning the network utilization and frame rate error that are related to a specific protocol?
Protocol statistics
What protocol analyzer test window reports errors that occur at the physical layer such as bad frame check sequences (FCS), short frames, and jabbers?
Media access control (MAC) node statistics
What protocol analyzer test window automatically runs in the background when the protocol analyzer application is activated?
Node discovery
What active test is selected on a protocol analyzer to determine if a network node is connected or responding?
PING
What active test on a protocol analyzer is selected to see the path that the packets are traveling and the time it takes the packets to complete the trip?
Trace route
Which 3D career field will develop, govern and monitor processes, technologies, and practices that support organizations to identify, capture, organize, and employ information in both fixed and deployed environments
Knowledge Operations Management (3D0X1)
What 3D career field Installs, supports, and maintains servers or other computer systems and responds to service outages and interruptions to network operations. Administers server-based networked systems, distributed applications, network storage, messaging and application monitoring required to provision, sustain, operate and integrate cyber networked systems and applications in garrison and at deployed locations.
Cyber Systems Operations (3D0X2)
Supervises or operates fixed and deployed information technology (IT) and telecommunications resources to monitor, evaluate, and maintain systems, policy and procedures to protect clients, networks, data/voice systems, and databases from unauthorized activity
Cyber Surety (3D0X3)
Supervises and performs as computer analyst, coder, tester and manager in the design, development, maintenance, testing, configuration management and documentation of application software systems, client-server and web-enabled software and relational database systems critical to warfighting capabilities.
Computer Systems Programming (3D0X4)
Deploys, sustains, troubleshoots and repairs standard voice, data, video network and cryptographic client devices in fixed and deployed environments. Sustains and operates systems through effective troubleshooting, repair, and system performance analysis.
Client Systems (3D1X1)
Analyzes requirements and requests frequencies to support terrestrial, aircraft and space systems and coordinates radio, radar, land and other electromagnetic radiating or receiving requirements.
Spectrum Operations (3D1X4)
Provides command and control (C2) capabilities through installation, maintenance, fault isolation and reconstitution of fixed cable and wireless distribution systems, local area networks (LAN) and wide area networks (WAN) in support of tactical and strategic operations. Monitors and analyzes performance of underground, buried and aerial cable and antenna networks.
Cable and Antenna Systems (3D1X7)
Knowledge Operations Management
3D0X1
Cyber Systems Operations
3D0X2
Cyber Surety
3D0X3
Computer Systems Programming
3D0X4
Client Systems
3D1X1
Radio Frequency Transmission Systems
3D1X3
Spectrum Operations
3D1X4
Cable and Antenna Systems
3D1X7