3D152 Flashcards

1
Q

How many B and D channels does the standard configuration in North American Integrated
Services Digital Network (ISDN) primary rate interface (PRI) application use?

A

23, 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the most serious threat to voice network system integrity?

A

Subversion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the event of a power failure, how many hours can the vertical taut-wire sensor (VTWS) remain operational?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an example of analog-to-digital and digital-to-analog techniques?

A

Pulse code modulation (PCM) and continuously variable slope delta (CVSD) modulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the range of the alternate current (AC) presence time delay relay in the AN/GSS-39
system before a power loss is reported?

A

1.5 to 15 seconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What converts analog signal information into a digital carrier signal?

A

Digital modulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Amplitude modulation (AM) requires a bandwidth that is

A

twice that of the modulating signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The information-carrying components that occur on either side of a carrier are called

A

sidebands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The upper sideband in a single-sideband suppressed carrier (SSBSC) modulation is eliminated by

A

filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

We can express the 6-to-1 improvement of the single-sideband suppressed carrier (SSBSC)
modulation over conventional amplitude modulation (AM) as

A

8 dB of improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A modulated waveform that contains a carrier plus two sidebands for each modulation frequency is a description of

A

an amplitude modulation (AM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If 100 percent modulation is exceeded and there is distortion in the modulating signal, additional sidebands are generated. We identify these sidebands as what?

A

Splatter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The only basic waveform in nature is a

A

pure sine wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The amount of deviation in a frequency modulation (FM) signal is directly proportional to the modulating signal’s

A

amplitude

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The amount of phase shift in a phase modulation (PM) signal is directly proportional to the

A

amplitude of the modulating signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In quadrature-phase shift keying (QPSK) the radio frequency (RF) bandwidth for a quadriphase signal is what of that required by a bi-phase signal, given the same data rate.

A

half

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What form of modulation is insensitive to signal variations?

A

Binary-phase shift keying or bi-phase shift keying (BPSK).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the main advantage of differential phase shift keying (DPSK)?

A

It requires a less complex receiver than a basic phase shift keying (PSK) signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many bits per character of a 16-step pulse-code modulation (PCM) system are used to describe the quantized analog sample?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Quantized analog modulation is actually

A

analog-to-digital conversion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The form of pulse modulation in which the pulse is varied within a set range of positions is known as

A

pulse-position modulation (PPM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The process of coding pulse code modulation (PCM) quantized pulses to make them a constant duration and amplitude is

A

encoding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which of the following is not considered an analog modulation techniques?

A

Pulse-Code Modulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

In Time Division Multiplexing (TDM), the transmitting multiplexer will put a bit or a byte from each of the incoming lines into a specifically allocated what?

A

Time Slot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The method of multiplexing the T1 multiplexer uses is

A

time division

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The two major types of frame structures are

A

CCITT and low speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

The most common wave-division multiplexing (WDM) system uses how many wavelengths?

A

Two wavelengths.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Wave-division multiplexing (WDM) creates the virtual channels for multiplexing them together for transmission by using different

A

wavelengths or lambdas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Bit count integrity problems are primarily caused by

A

system timing faults.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Individual pulses within a digital signal are

A

bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What unit is most commonly used in data systems to express signaling speed?

A

Baudot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A digital signal that contains synchronizing bits within the signal stream describes

A

asynchronous operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Three categories of synchronization used in digital data circuits are

A

synchronous, asynchronous, and isochronous.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which option is a characteristic of synchronous data operation?

A

All data bits are the same length in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

In what type of signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

A

Return-to-zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to

A

operate at higher data rates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The major difference between conditioned di-phase (CDI) and other schemes is the

A

use of mid-bit transitions for timing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

A

Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which statement best describes an alternate mark inversion (AMI) signal?

A

A logic one is transmitted as positive voltage if the previous logic one was negative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

How many bits are in the D4 framing sequence?

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

How many bits are in the extended superframe format (ESF) framing sequence?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What communications information signal uses a continuous 350- and 440-Hz frequency pair?

A

Dial tone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What communications supervisory signal uses a continuous application of direct current voltage for signaling?

A

Loop-start

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used to convey signaling information known as?

A

Bit robbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

In what common channel signaling (CCS) mode are the messages relating to signaling between two points conveyed directly interconnecting these signaling points?

A

Associated mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

While timing makes sure the equipment is sending and receiving bits at the same time intervals, synchronization makes sure that the

A

receive equipment can find its place in the bit stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What term is associated with the delay or lag introduced in the application of voltage from one section to the next?

A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Jamming a portion of the frequency spectrum is an example of

A

electronic attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The definition of electronic attack can be found in which publication?

A

Air Force Doctrine Document 2-5.1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Any actions we take to protect our forces, facilities, and equipment for electronic action that can destroy or degrade our capabilities is considered

A

electronic protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Varying the pulse repetition frequency on a radar set is an example of

A

electronic protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

When a multimeter has three input terminal jacks, which jack is always used?

A

Voltage terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

When using a multimeter, which mode should be used if the reading fluctuates and a more accurate reading is desired?

A

Minimum/maximum (MIN/MAX).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

When using an ohmmeter to take a resistance reading, what preliminary precaution should you take?

A

Disconnect the power from the circuit being tested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What principle of operation does the time domain reflectometer use to test cables?

A

Radar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which push-buttons would you select to get 125-ohm (Ω) impedance on the time domain reflectometer?

A

50Ω and 75Ω

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What are the two major sections of a bit error rate test (BERT) set?

A

Extended superframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

When performing a bit error rate test (BERT), what determines the size of a test pattern segment?

A

The number of bits that can represent the total number of bits in the test pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which section of a bit error rate test (BERT) set measures the received test pattern?

A

Receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

On a breakout box, how many RS-232 key interface signals can be monitored and accessed individually?

A

12.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

The purpose of the miniature ON/OFF switches on a breakout box is to

A

allow the interruption of the individual interface conductors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What communications control signal uses a two-frequency dialing combination?

A

Tone dialing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What communications information signal uses a signal cycled on and off for 0.5 second and contains the generation of a 480- and 620-Hz frequency pair?

A

Busy signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

When is the voltage applied in loop-start signaling?

A

Off-hook condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What are the two principle weighting characteristics in use with telecommunication circuit noise?

A

CCITT psophometric and C-message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Attenuation distortion is caused by

A

differing attenuation rates for the various frequency components comprising a voice frequency transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Electronic warfare support includes devices such as

A

radar warning receivers and intelligence systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

When using a multimeter, which mode should be used if the reading is unreadable due to fluctuations?

A

Display hold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What is the power that is reflected back to an optical source in the time domain reflectometer (TDR)?

A

Backscatter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

How many possible symbols can 4 bits represent?

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?

A

A code set is established.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

In networking, a byte is identified as a/an

A

octet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA)
standard is used for commercially building telecommunications cabling?

A

568A.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What organization sets important computer networking wiring standards for residential and
commercial network cabling?

A

Electronic Industries Alliance (EIA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the

A

Institute of Electrical and Electronics Engineers (IEEE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the

A

International Organization for Standardization (ISO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

The “parent” organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the

A

International Telecommunication Union (ITU).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

There is a worldwide nonprofit association of technical professionals that promotes the
development of standards called the

A

Institute of Electrical and Electronics Engineers (IEEE).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What organization is responsible for the X-series and V-series standards?

A

International Telecommunication Union Telecommunications Standardization Sector (ITU-T)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which of the following is an International Telecommunication Union (ITU) standardized
format used for digital telecommunications services backbone system?

A

E-carrier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which series of standards are recommended for data transmission using the telephone network?

A

V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What transmission rates does Electronic Industries Alliance (EIA) RS-530 accommodate?

A

20 Kbps to 2 megabits per second (Mbps).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balanced or unbalanced electrical circuits?

A

RS-530

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Within how many feet of the data communications equipment (DCE) connection does the
Electronics Industries Alliance (EIA) RS-232-C standard prescribes bipolar-voltage serial data transmission?

A

50.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

At what Open System Interconnect (OSI) layer are common data compression and encryption schemes used?

A

Presentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What Open System Interconnect (OSI) layer is closest to the end user?

A

Application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?

A

Logical Link Control (LLC) and Media Access Control (MAC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

A

Lowest layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which information unit, whose source and destination are network-layer entities, uses connectionless network service?

A

Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

In binary-synchronous protocol, what character is used to establish and maintain character
synchronization prior to the message block and during transmission?

A

SYN.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

What data communication protocol is used to govern the flow and format of information between systems?

A

Character-oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What data communication protocol ensures that the receiving station can distinguish information from garbage?

A

High-Level Data Link Control (HDLC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

What data communication protocol is based on bits and the position of the bits?

A

Bit-oriented.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

A group of computers and associated devices that share a common communications line within a small geographic area is a

A

Local area network (LAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

The interconnection of several networks in a city into a single larger network is a

A

Metropolitan area network (MAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What type of network connects networks that are typically separated by geographical distances?

A

Wide area network (WAN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What type of network enables a group of two or more computer systems to communicate over the public Internet?

A

Virtual private network (VPN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Which type network enables users to share resources, files, and printers in a decentralized way?

A

Peer-to-peer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What Network layer protocol provides information about how and where data should be delivered, including the data’s source and destination addresses?

A

Internet protocol (IP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

Which Network layer protocol matches a known internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

A

Address Resolution Protocol (ARP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Which Network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?

A

Reverse Address Resolution Protocol (RARP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

Which Transport layer protocol does not guarantee that packets will be received at all?

A

User Datagram Protocol (UDP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

Which Application layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?

A

Dynamic Host Configuration Protocol (DHCP).

104
Q

Which Application layer protocol is a terminal emulation used to log on to remote hosts?

A

Teletype Network.

105
Q

Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?

A

Ping.

106
Q

Which Application layer protocol is used to send and receive files by way of transmission control protocol/internet protocol (TCP/IP)?

A

File Transfer Protocol (FTP).

107
Q

Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers

A

Trivial File Transfer Protocol (TFTP).

108
Q

The physical address of any device on the network is a/an

A

Media Access Control (MAC) address.

109
Q

What are the two parts to an Internet Protocol version 4 (IPv4) address?

A

Network and host.

110
Q

What is used on a transmission control protocol/internet protocol (TCP/IP) network to
determine which network a computer is on?

A

Subnet mask.

111
Q

How many bits are available for host bits on a Class B network using seven bits?

A

Nine.

112
Q

How many subnet bits are required to support 90 subnets on a Class B network?

A

Seven.

113
Q

What is not a recommendation for planning networks using variable length subnet masking (VLSM)?

A

Re-address the entire network.

114
Q

What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?

A

Auto configuration.

115
Q

Teredo has four tunneling components. Which one is not one of them?

A

Teredo agent.

116
Q

Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4 (IPv4), IP protocol 41 issue?

A

Teredo.

117
Q

Which one of the following is not an Internet protocol version 6 (IPv6) transition approach?

A

Auto configuration

118
Q

The combination transmitter/receiver device, in a single package, is called a

A

transceiver.

119
Q

What device provides the physical, electrical, and electronic connections to the network media?

A

Network interface card (NIC).

120
Q

What layers of the open system interconnection (OSI) model do network interface cards (NIC) belong?

A

Physical and Data Link layers.

121
Q

A repeater with more than one output port is a

A

hub.

122
Q

What can be used to extend the size of a network?

A

Active hubs.

123
Q

The time it takes a switch to figure out where to forward a data unit is called

A

latency.

124
Q

What device subdivides a network into smaller logical pieces, or segments?

A

Switch.

125
Q

A router’s strength is its

A

intelligence.

126
Q

What is the oldest routing protocol?

A

Routing Information Protocol (RIP).

127
Q

Which device has multiport connectivity that directs data between nodes on a network?

A

Router.

128
Q

Which routing protocol does internet backbones use?

A

Border Gateway Protocol (BGP).

129
Q

What type of gateway can restrict the kind of access local area network (LAN) users have to the internet, and vice versa?

A

Internet.

130
Q

What type of gateway might include remote access servers that allow dial-up connectivity to a local area network (LAN)?

A

LAN.

131
Q

Virtual private networks (VPN) allow the AF to extend network resources across a/an

A

public network.

132
Q

Which of the following is not a function that a virtual private network (VPN) concentrator performs?

A

Encapsulates data.

133
Q

A cable scanner wire-map display identifies crossover and straight-through cables by

A

providing wiring maps at both ends of the cable.

134
Q

What cable discrepancies can a time-domain reflectometer (TDR) detect?

A

Kinks, opens, and corroded connectors

135
Q

What type of cable property changes does a time-domain reflectometer (TDR) detect to identify problems?

A

Impedance.

136
Q

When using an optical time-domain reflectometer (OTDR), what action is suggested by
most manufacturers to prevent false readings?

A

Connect a launch cable between the test set and the cable being tested.

137
Q

What component of a protocol analyzer processes the frames based on the selected test and the user configuration inputs?

A

Central processing unit (CPU).

138
Q

What protocol analyzer feature automatically runs in the background when the protocol analyzer application is activated?

A

Node discovery.

139
Q

What protocol analyzer utility is used to determine if a network node is connected or responding?

A

Ping.

140
Q

What protocol analyzer utility is used to see the path that packets are traveling and the time it takes the packets to complete the trip?

A

Trace Route.

141
Q

What test equipment has the capability of diagnosing digital network and developing communications software?

A

Protocol analyzer.

142
Q

Which component of a protocol analyzer discards frames based on its definition or activates a trigger based on the trigger definition?

A

Filter

143
Q

A Management Information Base (MIB) can be identified by either its object name or its object what?

A

Descriptor.

144
Q

Simple Network Management Protocol (SNMP) has three components: a managed device, an agent and a

A

Get.

145
Q

Which network management function obtains the utilization and error rates of network devices and provides statistical data about the network?

A

Performance.

146
Q

The community name that is used with the network management systems (NMS) authenticates

A

simple network management protocol (SNMP) requests.

147
Q

What defines the format and type of data in a network management system (NMS) report?

A

Report template.

148
Q

The World Wide Web (WWW) proxy provides three benefits: it conceals internal network configuration, provides a means to monitor and eliminate traffic to unofficial WWW sites, and

A

provides much faster access to the internet.

149
Q

What defines traffic flow and is a basic protection mechanism on routers?

A

Access lists.

150
Q

What process provides the overall process to secure and protect our information networks?

A

Barrier Reef.

151
Q

What is one of the primary functions of the Network Control Center (NCC), usually done in real time, and ensures the system is being operated within the parameters established by network security policy?

A

System monitoring.

152
Q

What security posture permits everything that is not specifically blocked?

A

Open

153
Q

What security posture prevents everything that is not specifically authorized?

A

Default deny.

154
Q

What is the first line of defense when gaining access to a laptop computer’s operating system?

A

Logon identification and password combination.

155
Q

Who has unrestricted access to system commands and data?

A

Supersusers.

156
Q

What method is approved for changing passwords through the use of remote access?

A

Strongly encrypted virtual private network.

157
Q

What must be employed to ensure data integrity?

A

Check sums.

158
Q

An intrusion detection system (IDS) may miss attacks that bypass the firewall like application-based attacks and

A

tunneling.

159
Q

What are the two vulnerability scanner examination techniques?

A

Passive and active.

160
Q

What type of firewall can filter messages according to a set of rules for a specific application?

A

Proxy server.

161
Q

One disadvantage of microwave wavelengths is that the frequencies are susceptible to

A

weather effects.

162
Q

The determining factor in calculating the correct size of a waveguide is

A

frequency.

163
Q

What is not a factor in determining the refractive index of air?

A

Propagation medium.

164
Q

How many miles above the earth are satellites placed in orbit?

A

22,300.

165
Q

Which satellite communications system is used to transmit space operations?

A

Defense Satellite Communications System (DSCS).

166
Q

To transmit an audio signal over radio frequency (RF), it first has to be

A

modulated.

167
Q

What is one path high frequency (HF) transmissions follow from the antenna to the distant end?

A

Groundwave

168
Q

Which is not a disadvantage of laser light transmission?

A

No need for careful alignment of transmitter and receiver.

169
Q

Broadband refers to a technology that can transmit

A

a relatively wide range of frequencies.

170
Q

Broadband technology uses all of these transmission mediums except?

A

laser light

171
Q

The Integrated Services Digital Network (ISDN) configuration normally used to connect switches together is the

A

primary rate interface (PRI).

172
Q

What was the primary driving factor behind the invention of the telephone exchange system?

A

Point-to-point telephone access caused cabling issues.

173
Q

When a telephone network is circuit switched, each call

A

has a dedicated circuit

174
Q

The three cornerstones of voice network system security are availability

A

confidentiality, and integrity.

175
Q

How many serial data interface ports does the Meridian Option 11C Small System Controller have

A

3

176
Q

What role does the Private Branch Exchange (PBX) play in the telephony industry?

A

A small scale switch that handles internal calls for an organization.

177
Q

Base cables normally enter the central office (CO) facility through a

A

cable vault.

178
Q

The primary reason you should measure the voltage across terminal or distribution frame protectors before removing and replacing them is to

A

ensure dangerous voltages are not present on the line.

179
Q

What components are directly connected to the input/output controller (IOC)?

A

A pair of SuperNode message controllers and the device controllers.

180
Q

What is the maximum number of ports that a digital multiplex system-100 (DMS-100) supports?

A

100,000.

181
Q

What link is used to connect the digital multiplex system (DMS)-core to the DMS-bus?

A

DS-512.

182
Q

Which elements make up the control component of the SuperNode central control?

A

CM and system load module (SLM).

183
Q

Which major component of the NorTel digital switching system (DSS) interfaces line and trunk subscribers?

A

peripheral module (PM).

184
Q

Which models of the digital multiplex system (DMS) family are commonly used at Air Force bases to provide base telephone services?

A

DMS-100 and Meridian System Logic (MSL)-100.

185
Q

Because the enhanced network (ENET) is a matrix, any input channel has access to any available..

A

output channel.

186
Q

Where do incoming unswitched circuits from a peripheral module (PM) enter the NT9X35A cross-point card matrix?

A

Vertical bus.

187
Q

Which digital multiplex system (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?

A

Table control.

188
Q

Which digital multiplex system (DMS)-100 database facility provides facilities for preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system should fail?

A

Journal file.

189
Q

Which digital multiplex system (DMS)-100 database facility provides facilities for storing
data modifications orders (DMO) and for retrieving them at a specified time for execution?

A

Pending order file

190
Q

What voice mail interface allows a user’s mailbox to be partitioned into a main mailbox and up to eight submailboxes?

A

Voice Messaging User Interface Forum.

191
Q

What voice mail interface has the capability to support the temporary absence greeting (TAG) feature?

A

Meridian mail user interface.

192
Q

The red, green, and blue (RGB) outputs from the camera go to the

A

encoder.

193
Q

Why are the R-Y and B-Y signals shifted 33° counterclockwise?

A

R-Y was shifted to maximum and B-Y was shifted to minimum color acuity, respectively for human vision.

194
Q

How many lines of video are discarded in high-definition 1080 line video encoded with 1920x1088 pixel frames prior to display?

A

8

195
Q

What modulation technique is used by the Advanced Television Systems Committee (ATSC) system?

A

8-vestigial sideband (8-VSB).

196
Q

What modulation technique is used for Digital Video Broadcasting - Cable transmission?

A

MPEG-2.

197
Q

An important concept to understand is that digital video is merely an alternate means for

A

carrying a video waveform.

198
Q

How is information recorded or stored on the videotape?

A

Series of magnetic patterns.

199
Q

What function in a video tape recorder (VTR) is accomplished by transporting the videotape across the head gap at the same speed at which it was recorded?

A

Playback.

200
Q

What is a major advantage of digital recording over analog recording?

A

Material can be edited generation after generation without noticeable degradation in quality.

201
Q

What is the means of measuring the amount of time that has been played or recorded on a video tape recorder (VTR)?

A

Counter.

202
Q

Which digital video tape format uses a 4:2:2 standard, with an 8 bit sampling rate, 19mm wide tape, and has a 94 minute recording time?

A

D1.

203
Q

You can compare a video tape recorder (VTR) head to a/an

A

electromagnet.

204
Q

The GVG-110 video switcher effects key fills with

A

key bus video or an internally-generated color matte signal.

205
Q

The GVG-110 video switcher serial interface allows

A

remote control of the switcher by a personal computer or digital picture manipulator.

206
Q

The purpose of the GVG-110 general purpose contact-closure editor interface (GPI) is to allow

A

remote control of switcher transitions.

207
Q

What part of the video switcher allows titles or other video scenes to be inserted into a full screen background?

A

Effects keyer.

208
Q

What are the frequencies at which the two common mode nulling adjustments are set in the video distribution amplifier?

A

60 Hz and 5.5 MHz.

209
Q

What component carries the signal to individual subscribers?

A

Trunk line.

210
Q

What device is used to combine TV channels into a single line?

A

Modulator.

211
Q

What is the beginning of a cable system called?

A

Head-end.

212
Q

The security lighting inside the restricted area is used to

A

facilitate the detection and tracking of intruders.

213
Q

What is the main purpose of a boundary fence?

A

To present a physical and psychological deterrent to unauthorized entry.

214
Q

What must a line of detection detect?

A

Walking, running, rolling, crawling, or jumping through the line of detection.

215
Q

The basic configuration of the entry control facility (ECF) includes a

A

gatehouse, personnel entry gate, inspection equipment, and vehicle entrapment area.

216
Q

Between what ranges can you adjust the SDI-76 microwave sensor?

A

15-75 feet.

217
Q

What annunciator is used with the Advisor VIII control unit?

A

Small permanent communications and display segment (SPCDS).

218
Q

What does the AN/GSS-39 system use to monitor the integrity of all sensor wiring to the

A

EOL module.

219
Q

What interior intrusion detection system (IIDS) is designed to detect intruders attempting to enter a shelter, storage igloo, or building?

A

AN/GSS-39

220
Q

Which sensor uses heat radiation to detect intruders?

A

Passive infrared.

221
Q

A standard Air Force E-Flex II monitors how many meters?

A

300.

222
Q

At what distance does the detection pattern of the infrared perimeter detection sensor (IPDS) transmitters change, and to what pattern does it change?

A

150 feet; signal transmitted to two receivers

223
Q

How many inches is the beam width at the widest portion of the infrared perimeter detection sensor?

A

2.

224
Q

What is the maximum length of the vertical taut-wire sensor (VTWS)?

A

328 feet.

225
Q

What is the maximum length of the Y taut-wire sensor (YTWS)?

A

200 feet.

226
Q

What is the operating frequency of the synchronizing oscillator in the “A” sensor post of the infrared pulsed intrusion detection system (IPIDS)?

A

1200 Hz.

227
Q

What is the primary mode of detection for the microwave fence sensor?

A

Beam break.

228
Q

What type alarm occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is removed?

A

Tamper.

229
Q

What type signal is sent to the fence protection system (FPS) signal processor when an alarm is detected?

A

Analog.

230
Q

When aligning a microwave fence sensor, what reading do you look for from the automatic gain control (AGC) using a multimeter?

A

Lowest possible.

231
Q

Which is not a selectable option of the E-Flex II system?

A

Sector reporting priority.

232
Q

Asymmetric trunk operation provides more efficient use of bandwidth by

A

not utilizing the bandwidth in the opposite direction of a one-way call.

233
Q

How does the T-Bus relate to the function of the Promina?

A

The information that is multiplexed/demultiplexed travels over the T-Bus.

234
Q

If all deployed and fixed locations use global positioning system (GPS) referenced clocks, we can eliminate crypto-sync loss due to

A

timing slips.

235
Q

Which module provides encryption/decryption of traffic into and out of the theater deployable communications/integrated communications access package (TDC/ICAP) network?

A

Crypto.

236
Q

How many card slots does the FCC-100 have, and how many of them are available for user configuration?

A

16, 8.

237
Q

What is the maximum number of channels of voice and/or data traffic that the FCC-100 can handle?

A

16.

238
Q

For a theater deployable communications (TDC) network design that has the crypto interface module (CIM) and the Promina Multiplexer (P-MUX) in separate locations, which piece of equipment is necessary?

A

CV-2048/8448-D.

239
Q

For either secure or nonsecure data network in theater deployable communications (TDC), the Crypto Interface Module’s router normally acts as the

A

external router.

240
Q

The Integrated Services Digital Network (ISDN) Gateway Exchange (IGX) switch allows for stacks of up to 8 IGX switches, while the Avaya Prologix switch can operate in a stack of

A

2

241
Q

The tactical interface gateway (TIG) uses what protocol to allow backwards compatibility between the Avaya Prologix and legacy Triservice Tactical Communications (TRI-TAC) equipment?

A

Internet.

242
Q

What configuration does the Red Data Module normally operate in?

A

Gateway/client.

243
Q

The next generation receive terminal (NGRT) accepts feeds from which two satellite bands?

A

Ku, Ka.

244
Q

What receive broadcast manager (RBM) processes military specific and classified information?

A

Type one.

245
Q

Which piece of the receive broadcast manager (RBM) functions as a common television set-top converter box?

A

Video converter.

246
Q

A status acquisition message (SAM) is sent from

A

Defense Informaiton Technology Contracting Office (DITCO).

247
Q

Circuits that fail to meet all parameters specified in the appropriate technical schedule when
test and acceptance (T&A) is done may not be accepted for service without the express approval
of

A

the Telecommunications Service Order (TSO) issuing authority.

248
Q

What report must be sent if the circuit does not meet all required parameters and the
Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

A

Exception.

249
Q
Within how many normal duty hours of completion action on the Telecommunications 
 Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?
A

72.

250
Q

If a circuit fails its management threshold (MT), what test might be performed?

A

Quality control (QC).

251
Q

Trend Analysis is a program that ensures circuits meet management thresholds (MT) on what basis?

A

Monthly.

252
Q

Trend Analysis is a program that trends all of these outage data except

A

preempted outages

253
Q

The first position of a trunk identifier indicates the

A

responsible operations and maintenance (O&M) agency.

254
Q

Which Defense Information Systems Agency Circular(s) (DISAC) contain information needed to assign a temporary command communications service designator (CCSD)?

A

310-70-1 and 310-55-1.

255
Q

What are the two parts/priorities to the Telecommunications Service Priority (TSP)?

A

provisioning and restoration.

256
Q

Which office or system confirms a restoration priority?

A

National Communications System (NCS).