CDC 3D152 Flashcards

1
Q

What is modulation?

A

Process of modifying any characteristic of a signal so that it varies in-step with value of another signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Analog-to-Digital Technique?

Digital-to-Analog Technique?

A

PCM

CVSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the two basic types of modulation?

A

Analog & Digital

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three basic types of analog modulation?

A

AM / FM / PM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three basic types of analog modulation used to convert digital signals?

A

ASK / FSK / PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the simplest form of PSK?

A

BPSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What analog modulation technique is similar to QPSK?

A

QAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is DPSK better than PSK?

A

Easier to implement / more robust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 4 basic types of pulse modulation?

A

PAM / PDM / PPM / PCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does ADPCM differ from PCM?

A

ADPCM = 4 bits; 32K

PCM = 8 bits; 64K

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does ADM differ from DM?

A

Signal’s step size may vary from sample to sample

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a simple form of ADM?

A

CVSD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What frequencies are present at output of AM modulator?

A

Carrier Frequency, Carrier + MF, Carrier - MF

MF = Modulating Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What components of AM modulated sine wave carries information signals?

A

Upper/Lower Sidebands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the 2 bands of frequencies located below and above the carrier in AM modulated signals called?

A

Upper/Lower Sidebands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which sideband of AM modulated signal is a mirror-image of the modulating signal?

A

Lower Sideband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does the bandwidth required to transmit an AM signal compare to that for transmitting the modulating signal by itself?

A

Bandwidth required = 2x that of modulating signal itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the predominant characteristic of SSBSC modulation?

A

All of the transmitter power can be used for transmission of info signal located in one sideband w/out carrier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What advantage does SSBSC have over other forms of AM?

A

6 to 1 improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What makes SSBSC more efficient?

A

Reduced bandwidth / greater power efficiency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In AM, what products are present in the resultant waveform?

A

Carrier, upper sideband, lower sideband.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What term is used for additional sidebands that cause unwanted bandwidth and distortion transmitted in AM signal?

A

Splatter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What problem is associated with all forms of AM?

A

Susceptibility to interference.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What determines amount of deviation of an FM carrier?

A

Amplitude of modulating signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does the rate of deviation compare with the frequency of modulating signal?

A

Directly proportional.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What agency is responsible for determining maximum amount of deviation?

A

FCC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In PM, how is the transmitted signal modulated?

A

Carrier’s phase is caused to shift at rate of modulating signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What effect does a change in amplitude have on a PM signal?

A

Amount of phase signal is proportional to amplitude of modulating signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What effect does a change in frequency have on a PM signal?

A

Rate of phase shift is controlled by frequency of modulating frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

How is carrier stability maintained in a PM signal?

A

Crystal-controlled oscillators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

In BPSK, what amount of degrees of phase shift of the carrier is used to represent binary 1’s and 0’s?

A

180 degrees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the advantages of bi-phase modulation?

A

Insensitivity to level variations; low frequencies/smaller bandwidth requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are the disadvantages of BPSK?

A

Complex, costly, phase ambiguity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What are the main advantages of QPSK over BPSK?

A

Transmit 2x the amount of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

How is phase ambiguity overcome when PM techniques area used?

A

Use of a pilot tone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

How many carrier phases does quadriphase modulation have?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How is information represented in DPSK?

A

Changes in phase value form one sample to the next.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the main advantage of DPSK?

A

Less complex receiver needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What are the 3 characteristics of a pulse train that can be varied by an information signal to produce a modulated rectangular pulse train?

A

Peak voltage, period, pulse width/duration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What determines the bandwidth of a pulse train?

A

Width of pulses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What characteristics of a pulse train does frequency influence?

A

Number/spacing of harmonics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What 2 modulation processes are required to transmit pulse-modulated signals?

A

Pulse Modulation

AM / FM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are 5 pulse-modulation techniques that can be used to form composite TDM signals?

A

PAM / PDM / PPM / PCM / DM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the simplest analog pulse-modulation technique?

A

PAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the PAM process?

A

Pulse carrier is AM-modulated to convey information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the sampling rate of a 4-kHz voice channel?

A

8 kHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What determines the amplitude of a PAM pulse?

A

Amplitude of modulating signal @ point of sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What susceptibility does PAM share with AM?

A

Noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What are 2 other names for PDM?

A

PWM

PLM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

What determines PDM pulse width?

A

Amplitude of modulating signal @ point of sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Why is PDM less affected by noise than PAM?

A

Noise less likely to be correct (amplitude/time)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What disadvantage is shared by both PAM and PDM?

A

Proportionately affected by distortion in pulse width/amplitude.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

How does PPM over disadvantage of distortion experienced in PAM and PDM?

A

Pulses are at constant widths and amplitudes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

What is a disadvantage of PPM?

A

Eats up a lot of bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

What determines the time position of a PPM pulse?

A

Amplitude of modulating signal @ time of sampling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Give 2 reasons for converting analog signals to digital signals before transmission.

A

Digital media can be regenerated and easily encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

What is the principal advantage of converting analog signals to digital signals before transmission?

A

Quantizing Noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Of PAM, PDM, PPM, PCM - which is least affected by noise?

A

PCM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the PCM process?

A

Analog utililizing a band-limiting filter; binary code word; modulated using AM / FM / PSK.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What is quantizing noise?

A

PAM pulses ‘rounded off’ to nearest assigned value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

How many code bits are required to provide 16 quantized steps?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which quantizing method produces less quantizing noise?

A

Nonuniform quantizing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

How can we increase the capability for regenerating quantized pulses?

A

Keeping pulses at a constant duration and amplitude`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Companding does what?

A

Reduces the range of voice signals; compresses high-amplitude portions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Why is PCM less susceptible to noise than PAM or PDM?

A

In PCM, noise must insert or obscure pulse not just change its height or duration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is ADPCM different from PCM?

A

It generates a 4-bit word PAM rather than an 8-bit word.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Name two methods of multiplexing.

A

TDM

FDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Describe the difference between the two methods of multiplexing.

A

TDM: Time slots

FDM: Frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What type of signal(s) is the T1 able to transmit?

A

Analog, digital, video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What are some of the advantages of T1 multiplexing?

A

Simplicity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

What method of multiplexing does the T1 use?

A

TDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

WDM is considered a method of improving what?

A

Efficiency through fiber through condensing transmitted channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

How does WDM work?

A

Uses wavelengths of light or different colors in spectrum.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

What are WDM technologies?

A

WDM

CWDM

DWDM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

What does CWDM use to reduce cost?

A

Uncooled lasers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

What three characteristics must the DWDM optical demultiplexer have?

A

Stable, flat passband, must reject adjacent optical channels.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Define the term ‘bit’.

A

Bit of information based on 2 symbols, states or conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

What unit of measurement is normally used in data systems to express signaling speed for equipment?

A

Bits / second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

What does “baud” mean?

A

Unit of modulation rate of the shortest unit interval.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

What’s the difference between baud and bit.

A

Baud: Expression of time

Bit: No ‘time’ reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

What is the difference between overflow and underflow?

A

Overflow: More bits than expected

Underflow: Fewer bits received than expected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

What are the 3 terms we use to describe synchronization methods used in digital signaling?

A

Synchronous, asynchronous, isochronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

How many synchronizing pulses are needed in synchronous operation?

A

None

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

How does synchronous operation work?

A

Receiving device adjusts automatically to speed of transmitting; compares speed of incoming signal with time base.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

What constitutes an asynchronous signal?

A

Any signal with synchronizing bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

What are the principles of asynchronous operation?

A

Start / stop bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

How does asynchronous synchronization affect transmission speed?

A

Slows down transmission speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

What is an isochronous signal?

A

All bits are equal duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Which of the synchronization terms is normally used with channel-packing systems to indicate the utilization of internal timing?

A

Isochronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Name 2 factors that determine when a digital transition should occur.

A

Bit rate of signal / signals format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Define NRZ-L

A

Level / Mark-Space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

What is a BPV?

A

Bi-polar variation; 2 consecutive marks occur with same polarity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

How does the B8ZS signal format correct ones density problems?

A

By intentionally inserting BPV’s into signal to break up 0’s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which type of framing would be used for a T1 carrying video traffic?

A

ESF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Which framing sequence is used for synchronization with incoming data?

A

D4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

What are the 3 types of communcations signals that are the functions to control and process analog calls?

A

Control / Informational / Supervisory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What are the 2 methods of address signaling?

A

Pulse / Tone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

Call waiting is what type of communication signal?

A

Information signaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

What is the purpose of supervisory signaling?

A

Monitor status of line to determine state

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What are the 2 digital signaling methods to transmit supervisory signaling?

A

CAS / CCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

How does CAS signaling convey signaling information?

A

Bit-robbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

How does CCS convey signaling information?

A

Uses a separate network channel to transfer supervisory information in an out-of-band fashion and multiplexed with the digitized voice signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

What are the 3 CCS signaling modes?

A

Associated

Non-associated

Quasi-associated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

Define noise.

A

Unintelligible electrical disturbances; leads to masking/distortion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is white noise?

A

Mixture of all frequencies / if loud enough can mask.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

What is the usual circuit input impedence for a transmission line?

A

600 Ohms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

What causes impulse noise?

A

Disturbances that have abrupt amplitudes of short duration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

When is the best time to take measurements of impulse noise?

A

During times of peak system activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Define the term clocking.

A

Rate of running / keeps approximately standard time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

What is a station clock? What can a station clock minimize?

A

Clock that controls some/all of the equipment. (Requires local time control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

What are 2 types of station clocks?

A

Master / Slave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

What is the master station clock?

A

Cesium beam / GPS tied to primary communications equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

How does a slave clock get its timing?

A

Locks onto incoming data stream from a stable source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

How does synchronization distinguish positions in the data bit stream?

A

1’s and 0’s are transmitted / patterns of frame bits (known as framing formats)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

What 3 factors can affect the line quality of a long distance transmission line?

A

Attenuation distortions, delays, noise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

How can the capacitance of a transmission line cable be varied?

A

Insulation, size of wire, spacing between wires.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

A reduction in energy that is generally expressed in decibels.

A

Attenuation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

A proportionate increase that results with the length of the line.

A

Inductance (L) of the line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

A movement through a medium; transmission

A

Propagation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

A variance with frequency

A

Attentuation distortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

A means to compensate for attenuation distortions caused by transmission lines

A

Lumped Inductances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

Define electronic attack

A

Electronic Warfare utilizing the electromagnetic and directed energy and anti-radiation weapons to attack personnel, facilities and equipment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Give one example of electronic attack

A

High-speed anti-radiation missiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

Protecting people, facilities and equipment from electronic attack is known as…

A

Electronic Protection (EP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What are two examples of EP for a radar system?

A

Active decoys to draw missiles off-target. Varying pulse repetition frequency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

What is ES?

A

Electronic Warfare Support: Putting a picture together for battle commanders; accurate picture of spectrum w/in AOR (area of responsibility).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

What are two items used to provide ES capability?

A

Radar warning receivers / intelligence platforms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

What is the purpose of a multimeter?

A

Measure voltage, current and resistance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

How is a multimeter connected in a circuit to measure microamperes?

A

In series

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

How is a multimeter used as a voltmeter in a circuit/

A

In parallel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

What preliminary precaution should you take when using an ohmmeter to take a resistance reading?

A

Make sure all power is off

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

What kind of cable faults can the TDR locate?

A

Splices, water in cable, split pairs, discontinuities / faults.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

Describe a TDR’s operating principle.

A

Similar to radar where a pulse is applied; impedence changes and reflections occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

How does cable fault information appears on the TDR’s CRT?

A

View CRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Explain the purpose of the impedence selector buttons.

A

Input / Output: 50 / 75 / 95 / 125 Ω

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

Describe how you would connect a cable under test to the TDR.

A

Do not connect live cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

What do deflections (pips) indicate to the TDR user?

A

Upward deflections = Opens

Downward deflections = Shorts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

Describe 2 operating modes used by the TD-9930

A

Real-time & Average

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

What are the 4 tests and measurements performed by the OTDR?

A

Cable acceptance testing / cable installation / end-to-end tests / fault location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

What is the power that is reflected back towards the optical source?

A

Backscatter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

How is signal loss represented in an OTDR display?

A

dB drop in backscatter between 2 reflections is signal loss within fiber.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

What index factor is the TD-9930 already programmed to accept?

A

Index of 1.47

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What are the 2 major sections of a BERT set that create and receive the test pattern?

A

Data Code Generator (Transmitter) & Code Detector (Receiver)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What type of test pattern does the data code generator produce?

A

Pseudo-random

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Name 2 common signal codes that are used with BERT sets.

A

AMI / B8ZS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Name 2 framing formats used with BERT sets.

A

D4 / ESF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What does 63, 511 and 2047 in a test pattern identify?

A

Total # of bits in a pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Explain the purpose of a breakout box

A

Monitor / access all 25 conductors of RS-232 and ITU V.24 interfaces between modems and terminals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

What is the purpose of the 24 miniature ON/OFF switches on a breakout box?

A

Allow interface conductors (except frame ground pin 1); interrupted individually for isolated testing and observation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What is an example of analog-to-digital and digital-to analog techniques?

A

Pulse code modulation (PCM) and continuously variable slope delta (CVSD) modulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

What converts analog signal information into an analog carrier signal?

A

Analog modulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

What converts analog signal information into a digital carrier signal?

A

Digital Modulation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

The information-carrying components that occur on either side of a carrier are called

A

Sidebands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

Amplitude Modulation (AM) requires a bandwidth that is

A

twice that of the modulating signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

The upper sideband in a single-sideband suppressed carrier (SSBSC) modulation is eliminated by

A

filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

We can express the 6-to-1 improvement of the single-sideband suppressed carrier(SSBSC) modulation over conventional amplitude modulation (AM) as

A

8 dB of improvement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

The only basic waveform in nature is a

A

pure sine wave.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

A modulated waveform that contains a carrier plus two sidebands for each modulation frequency is a description of

A

an amplitude modulation (AM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

If 100 percent modulation is exceeded and there is distortion in the modulating signal, additional sidebands are generated. WE identify these sidebands as what?

A

Splatter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

The amount of deviation in a frequency modulation (FM) signal is directly proportional to the modulating signal’s

A

amplitude.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

The amount of phase shift in a phase modulation (PM) signal is directly proportional to the modulating signal’s

A

amplitude of the modulating signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
162
Q

What form of modulation is insensitive to signal variations?

A

Binary-phase shift keying or bi-phase shift keying (BPSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
163
Q

In quadrature-phase shift keying (QPSK) the radio frequency (RF) bandwidth for a quadriphase signal is what of that required by bi-phase signal, given the same data rate.

A

Half.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
164
Q

What is the main advantage of differential phase shift keying (DPSK)?

A

It requires a less complex receiver than a basic phase shift keying (PSK) signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
165
Q

Which of the following is not considering an analog modulation techniques?

A

Pulse-code modulation (PCM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
166
Q

The form of pulse modulation in which the pulse is varied within a set range of positions is known as

A

Pulse-duration modulation (PDM).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
167
Q

Quantized analog modulation is actually

A

analog-to-digital conversion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
168
Q

How many bits per character of a 16-step pulse-code modulation (PCM) system are used to describe the quantized analog sample?

A

4.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
169
Q

The process of coding pulse code modulation (PCM) quantized pulses to make them a constant duration and amplitude is

A

encoding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
170
Q

In Time Division Multiplexing (TDM), the transmitting multiplexer will put a bit or a byte from each of the incoming lines into a specifically allocated what?

A

time slot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
171
Q

The two major types of frame structures are

A

CCITT and low speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
172
Q

Wave-division multiplexing (WDM) creates the virtual channels for multiplexing them together for transmission by using different

A

Wavelengths or lambdas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
173
Q

The most common wave-division multiplexing (WDM) system uses how many wavelengths?

A

2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
174
Q

The method of multiplexing the T1 multiplexer uses is

A

Time division.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
175
Q

Individual pulses within digital signal are

A

bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
176
Q

What unit is most commonly used in data systems to express signaling speed?

A

Bits per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
177
Q

Bit count integrity problems are primarily caused by

A

system timing faults.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
178
Q

Three categories of synchronization used in digital data circuits are

A

synchronous, asynchronous, and isochronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
179
Q

Which option is a characteristic of synchronizing bits within the signal stream describes

A

All data bits are the same length in time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
180
Q

A digital signal that contains synchronizing bits within the signal stream describes

A

Asynchronous operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
181
Q

In what type of signal is the information contained in the transition, and there is a transition from one state to the other only when a mark bit is sent?

A

Non-return-to-zero mark.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
182
Q

In what type of signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

A

Return-to-zero.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
183
Q

Which statement best describes an alternate mark inversion (AMI) signal?

A

A logic one is transmitted as positive voltage if the previous logic one was negative.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
184
Q

Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to

A

maintain ones density standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
185
Q

Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

A

Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
186
Q

The major difference between conditioned di-phase (CDI) and other schemes is the

A

use of mid-bit transitions for timing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
187
Q

How many bits are in the D4 framing sequence?

A

12.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
188
Q

How many bits are in the extended superframe format (ESF) framing sequence?

A

24.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
189
Q

What communications control signal uses a two-frequency dialing combination?

A

Tone dialing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
190
Q

What communications information signal uses a continuous 350- and 440-Hz frequency pair?

A

Dial tone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
191
Q

What communications information signal uses a signal cycled on and off for 0.5 second and contains the generation of a 480- and 620-Hz frequency pair?

A

Busy signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
192
Q

What communications supervisory signal uses a continuous application of direct current voltage for signaling?

A

Loop-start.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
193
Q

When is the voltage applied in loop-start signaling?

A

Off-hook condition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
194
Q

In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used to convey signaling information known as?

A

Bit robbing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
195
Q

In what common channel signaling (CCS) mode are the messages relating to signaling between two points conveyed directly interconnecting these signaling points?

A

Associated mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
196
Q

What are the two principle weighting characteristics in use with telecommunication circuit noise?

A

CCIT psophometric and C-message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
197
Q

While timing makes sure the equipment is sending and receiving bits at the same time intervals, synchronization makes sure that the

A

receive equipment can find its place in the bit stream.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
198
Q

What term is associated with the delay or lag introduced in the application of voltage from one section to the next?

A

Latency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
199
Q

Attenuation distortion is caused by

A

differing attenuation rates for the various frequency components comprising a voice frequency transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
200
Q

Jamming a portion of the frequency spectrum is an example of

A

electronic attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
201
Q

The definition of electronic attack can be found in which publication?

A

Air Force Doctrine Document 2-5.1.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
202
Q

Any actions we take to protect our forces, facilities, and equipment for electronic action that can destroy or degrade our capabilities is considered

A

electronic protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
203
Q

Varying the pulse repetition frequency on a radar set is an example of

A

electronic protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
204
Q

Electronic warfare support includes devices such as

A

radar warning receivers and intelligence systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
205
Q

When a multimeter has three input terminal jacks, which jack is always used?

A

Voltage terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
206
Q

When using a multimeter, which mode should be used if the reading is unreadable due to fluctuations?

A

Display hold.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
207
Q

When using a multimeter, which mode should be used if the reading fluctuations and a more accurate reading is desired?

A

Minimum/Maximum (MIN/MAX)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
208
Q

When using an ohmmeter to take a resistance reading, what preliminary precaution should you take?

A

Disconnect the power from the circuit input terminal jack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
209
Q

What principle of operation does the time domain reflectometer use to test cables?

A

Radar.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
210
Q

Which Push-buttons would you select to get 125- ohm impedance on the time domain reflectometer?

A

50- ohm and 75-ohm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
211
Q

What is the power that is reflected back to an optical source in the time domain reflectometer (TDR)?

A

Backscatter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
212
Q

What are the two major sections of a bit error rate test (BERT) set?

A

Transmitter and receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
213
Q

What type of framing format should you use to conduct a bit error rate test (BERT) on a T1 circuit configured for binary with eight-zero substitution (B8ZS) coding?

A

Extended superframe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
214
Q

Which section of a bit error rate test (BERT) set measures the received test pattern?

A

Receiver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
215
Q

When performing a bit error rate test (BERT), what determines the size of a test pattern segment?

A

The number of bits that can represent the total number of bits in the test pattern.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
216
Q

What type of error is the result of two successive logic one pulses of the same polarity in violation of alternate mark inversion coding rules?

A

Bipolar violation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
217
Q

On a breakout box, how many RS-232 key interface signals can be monitored and accessed individually?

A

12.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
218
Q

The purpose of the miniature ON/OFF switches on a breakout box is to

A

allow the interruption of the individual interface conductors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
219
Q

What is a bit?

A

The smallest unit of information (data) a computer can process; a “1” or a “0”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
220
Q

What is a code set?

A

Preset sequence of bits that is arranged and understood by the sender and receiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
221
Q

A code set of 10 bits has how many possible combinations?

A

1024 possible choices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
222
Q

What is a byte?

A

A set of bits “1’s” and “0’s” of a specific length that represent a value in a computer coding scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
223
Q

Normally, how long is a byte?

A

8 bits long

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
224
Q

What term is used in networking when referring to 8 bits of information?

A

Octet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
225
Q

What is the ANSI’s main focus?

A

ANSI focuses on standards usd by software and hardware vendors who make the products the software engineer uses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
226
Q

What role does EIA serve?

A

Enables US electronics producers to be competitive by developing technical standards, hosting tradeshows, performing market analysis and facilitating relations with the government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
227
Q

What is NIST’s role?

A

A government organization providing servies and programs to help US industries commercialize new technologies and compete internationally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
228
Q

Which organizations’ specifications are supported by ANSI?

A

Electronic Industries Alliance (EIA) & Telecommunications Industry Assocation (TIA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
229
Q

What is the CEPT?

A

A European body for telecommunications policymaking and regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
230
Q

What does the ETSI do?

A

Develops the telecommunications standards for Europe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
231
Q

What is the E-carrier?

A

Digital telecommunications services backbone system of Europe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
232
Q

The IETF tracks ideas or suggestions. What are these ideas and suggestions called?

A

Request for Comments (RFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
233
Q

What organization assumed responsibility for the IP address space allocation?

A

ICANN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
234
Q

What are some of the Project 802 standards?

A

802.3 = Ethernet; 802.5 = Token Ring; 802.11 = Wireless; 802.13 = Cable TV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
235
Q

What organization was known as the International Telegraph and Telephone Consultative?

A

ITU Telecommunications Standardization Sector or ITU-T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
236
Q

List some X-series standards that you may encounter

A

X.20; X.20 bis; X.21; X.21 bis; X.25; X.400; X.500

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
237
Q

List the V-series standards that you may encounter

A

V.35; V.90; V.92

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
238
Q

What are 3 distinct specifications that the RS-232 standards meets?

A

(1) Type of Connector; (2) Purpose / definition of connector pins; (3) Electrical characteristics of those pins.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
239
Q

The RS-232-C pins can be understood by knowing how they are grouped. What are the different categories?

A

Data, clock, control, common, ground

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
240
Q

What is the function of the RS-232-C data leads?

A

Pins that carry the data intelligence from DTE to DCE and vice versa. 2 categories: Primary / Secondary (Channels)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
241
Q

What is the function of the RS-232-C clock leads?

A

They provide “clock” or “timing” for data transmission synchronization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
242
Q

What is the function of the RS-232-C control leads?

A

Control leads are used enable / disable data transmission and reception; they also indicate the operational status an condition of DTE / DCE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
243
Q

Name some control leads

A

RTS - Pin 4; CTS - Pin 5; DSR - Pin 6; DTR - Pin 20 and Received Line Signal Detector (Carrier Detect-CD) - Pin 8.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
244
Q

What is the function of the RS-232-C Protective Ground - Pin 1?

A

Ground connection keeps you from getting shocked when you touch the equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
245
Q

What is the function of the RS-232-C Common (Signal) Ground - Pin 7?

A

Establishes a common reference for all interchange circuits except Pin 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
246
Q

What are the 2 categories of the OSI model can be divided into?

A

Application & Data Transport (Layers)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
247
Q

What are the 4 lower layers of the OSI model responsible for?

A

Defining how data is sent across the physical media, through internetwork devices, to destination computer and to the application of the destination machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
248
Q

This layer’s specifications include physical addressing, sequencing of frames and flow control

A

Data Link (2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
249
Q

This layer includes multiplexing, virtual circuit management, error checking and recovery

A

Transport (4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
250
Q

Electrical, mechanical, procedural and functional specifications for network communications

A

Physical (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
251
Q

A hub operates at this layer

A

Physical (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
252
Q

TCP operates at this later

A

Transport (4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
253
Q

Switches and bridges operate at this layer

A

Data Link (2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
254
Q

This layer provides routing and related functions that enable multiple data links to be combined into an internetwork

A

Network (3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
255
Q

This layer provides a variety of coding and conversion functions that are applied to application layer data

A

Presentation (6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
256
Q

A router operates at this layer

A

Network (3)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
257
Q

Telnet, FTP, SMTP that exist in the TCP/IP suite operate at this layer

A

Application (7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
258
Q

This layer establishes, manages, and terminates communication sessions between presentation layer entities

A

Session (5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
259
Q

At this layer, common data compression and encryption schemes are used

A

Presentation (6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
260
Q

At what layers of the OSI model do LAN protocols operate?

A

Network & Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
261
Q

At what layers do WAN protocols operate?

A

Network, Data Link & Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
262
Q

What is the difference between routing and routed protocols?

A

Routing: Path determination / traffic switching

Routed: Preparing data to be placed onto network media.

In essence, routing protocols route routed protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
263
Q

With the exception of the layers on each end, what OSI model layers does each layer communicate with?

A

Peer layer in other network devies and the layers directly above and below

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
264
Q

What are the 2 forms of control information typically used to exchange communications between peer OSI layers?

A

Headers & Trailers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
265
Q

What is known as encapsulation as it relates to the OSI model?

A

Data portion of an information unit at a given OSI layer can potentially contain headers, trailers and data from all the higher layers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
266
Q

This is an information unit whose source and destination are network-layer entities that use connectionless network service.

A

Datagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
267
Q

This is an information unit whose source and destination are transport-layer entities.

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
268
Q

This a generic term that refers to a variety of information units.

A

Data unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
269
Q

This is an information unit whose source and destination are data link layer entities.

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
270
Q

This is an information unit whose source and destination entities exist in the application layers.

A

Message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
271
Q

This is an information unit whose source and destination are network-layer entities.

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
272
Q

The asynchronous data communications protocol data frames use what for synchronization?

A

Start & stop bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
273
Q

What 3 elements of the message block (frame) format can be contained in each BSC transmission?

A

Header, text and a trailer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
274
Q

All BOP transmissions in a link follow the frame format. The frame consists of what fields?

A

Start flag field, station address field, control field, data information field, frame check sequence and close flag field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
275
Q

In HDLC, what is used so the receiving station can determine if the data is information or a flag indicating the end of a frame?

A

Bit stuffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
276
Q

What network is an informal collection of government, military, commercial and educational computer networks that all interconnected and transmit information?

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
277
Q

A LAN may serve how many users?

A

As few as 2-3 or as many as thousands of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
278
Q

What type of network is also used as a means to interconnect several local area networks by bridging them with backbone lines?

A

MAN or campus network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
279
Q

What network provides a private tunnel through the Internet?

A

VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
280
Q

What are the advantages of using a peer-to-peer network?

A

Easy to configure, don’t require additional hardware/software, users can manage their own resources, they don’t require a network administrator and they reduce costs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
281
Q

What are the disadvantages of client/server networks?

A

Planning, design and management are complicated. Requires dedicated staff, software/hardware are expensive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
282
Q

The easiest way to break down the many protocols of the TCP/IP suite is according to where they operate within the OSI model. Each protocol in this stack operates at one of what 4 layers?

A

Data Link, Network, Transport or Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
283
Q

The protocols at the Data Link layer define the access method for the media, the architecture, and interface with the Physical layer of the network based on what protocol standards?

A

Standards adopted by IEEE; Project 802 standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
284
Q

What are the 4 most important TCP/IP protocols that function within the network layer?

A

IP, ARP, RARP, ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
285
Q

Within IP, what are the datagram fields?

A

Version, IHL, DiffServ Field, Total length, Identification, Flags, Fragment offset, TTL, Protocol, header checksum, Source IP address, Destination IP address, Options, Padding and Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
286
Q

What are the fields belonging to a TCP segment?

A

Source port, Destination port, Sequence number, ACK, TCP header length, Reserved, Flags, Sliding-window size (window), Checksum, Urgent pointer, Options, Padding and Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
287
Q

What are some reasons for implementing DHCP?

A

To reduce the time and planning spent on IP address management, to reduce the potential for errors in assigning IP addresses, to enable users to move their workstations and printers without having to change their TCP/IP configuration, and to make IP addressing transparent for mobile users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
288
Q

Between what layers do the application layer protocols reside?

A

Between the Session and Application layer of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
289
Q

What’s the difference between FTP and TFTP?

A

TFTP uses UDP which means it doesn’t guarantee deliverability. FTP uses TCP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
290
Q

What protocol is responsible for matching a host name to an IP address?

A

Domain Name System (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
291
Q

What utility sends out ICMP requests in hopes to get an ICMP echo reply?

A

The ping utility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
292
Q

Which IP address is a 32-bit number, usually represented as a four-part decimal number, with each of the four parts separated by a period or decimal point?

A

IPv4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
293
Q

IP addresses with a first octet from 192 - 223 are what of what IPv4 class?

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
294
Q

What 2 questions must you ask yourself during the selection of a subnet mask?

A

Question 1: How many routed subnets are required?

Question 2: What is the likely maximum # of hosts on any one of those subnets?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
295
Q

Nowadays, what protocol is likely employed for subnetting large networks?

A

A protocol supporting VLSM (Variable length subnet masking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
296
Q

What type of routing protocols support VLSM?

A

Classless routing protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
297
Q

What are some examples of classless routing protocols?

A

OSPF, RIP version 2, Cisco’s EIGRP / BGP / IS - IS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
298
Q

How many bits are in an IPv6 address?

A

128

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
299
Q

How many sets of 16 bit sections make up an IPv6 address?

A

8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
300
Q

What unique part of a network device is used when acquiring an IPv6 address by way of autoconfiguration?

A

MAC Address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
301
Q

What does it mean to have a dual-stack router?

A

Router has both IPv4 and IPv6 protocols running on it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
302
Q

What IPv4 protocol is needed to tunnel IPv6?

A

Protocol 41

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
303
Q

What are the two IPv6 tunneling classes?

A

Manual & Automatic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
304
Q

Which IPv6 transition approach doesn’t require a dual stack router?

A

NAT-PT (Network Address Translation-Protocol Translation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
305
Q

Transceivers are capable of operating in what modes?

A

Full-duplex, half-duplex, simplex mode(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
306
Q

At what layer of the OSI model do transceivers operate and how are they used?

A

Physical Layer (Used in ethernet networks to connect a device to fiber or copper)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
307
Q

What device can be viewed as the actual interface between workstations, servers, clients and the shared media of the network?

A

NIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
308
Q

Nearly all NIC’s contain what device that transmits and receives data signals?

A

Data transceiver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
309
Q

How do one-way repeaters overcome attenuation?

A

Repeaters remove the unwanted noise in an incoming signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
310
Q

What do all devices on a network share when connected to a hub?

A

They share the same amount of bandwidth and the same collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
311
Q

What are the 3 central hub classifications?

A

Passive, Active & Intelligent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
312
Q

What are some advantages of switches?

A

Internal processor, operating system, memory and ports that enable connections. Have multiple ports, make better use of limited bandwidth. More cost-efficient than bridges. Each device on switch receives its own dedicated channel. Limits potential for collisions.

313
Q

What are some disadvantages of switches?

A

They can become overwhelmed by continuous, heavy traffic.

314
Q

Why would you replace a backbone router with a switch?

A

A switch provides at least 2 advantages: Better security & performance

315
Q

What are the 4 types of switching devices?

A

Cut-through / Store & Forward / Hybrid / Fragment-free

316
Q

Hybrid switches represent a combination of what switching devices?

A

Cut-through / Store & Forward

317
Q

What is a major advantage of a hybrid switch?

A

Its minimal latency when error rates are low and it becomes a store & forward when error rates rise, allowing it to discard frames when error rates get high

318
Q

Routers operate at what layer of the OSI model?

A

Network (3)

319
Q

What does a typical router contain?

A

Processor, memory, input / output, management console interface

320
Q

What tasks can all routers do?

A

Connect dissimilar networks; interpret Layer 3 addressing; determine best path for data; reroute traffic if primary path is down

321
Q

Identify and define the 4 common routing protocols

A

RIP: Slower, less secure. Internal protocol. Does not work well in large environments.
OSPF: Used commonly on LANs with rely on a mix of routers from different manufacturers.
EIGRP: Cisco proprietary. Supports large / heterogeneous networks.
BGP: Used on border / exterior routers.

322
Q

What is a brouter?

A

Cross / hybrid between a bridge and a router

323
Q

Where can a gateway reside?

A

On servers, microcomputers or on connectivity devices such as routers or mainframes

324
Q

What are some popular types of gateways?

A

Email gateway, IBM host, Internet, LAN, Voice / Data, Firewall

325
Q

What do VPN concentrators create to extend a network?

A

Create tunnels using secure communications across a network such as the Internet

326
Q

What functions does a VPN concentrator perform?

A

Establish tunnels, negotiates tunnel parameters, authenticates users, assigns user addresses, encrypts and decrypts data, manages security keys, manages data transfer across the tunnel, manages data transfer inbound and outbound as a tunnel endpoint or router - invokes various standard protocols to accomplish these functions.

327
Q

What is the purpose of the TDR?

A

It uses pulses to locate and test for sheath faults, damaged conductors, loose connectors, splices, bridge taps, split pairs and other problems.

328
Q

What type of cable discrepencies can be detected by a TDR?

A

Opens, shorts and pin holes in cable shielding, kinks and mismatched / corroded cable connectors.

329
Q

How does the OTDR use “backscattered” light to make measurements?

A

It correlates the returned light pulses with a location in the fiber.

330
Q

What determines the amount of light-pulse power that is transmitted down the cable?

A

Light-pulse width

331
Q

What function of the cable scanner shows the manner in which each wire is mated to the connectors at both ends of the cable?

A

The wire map

332
Q

What are the primary capabilities provided by a protocol analyzer?

A

Digital network diagnostics & software development

333
Q

Explain the difference between a protocol analyzer NIC and other NIC’s.

A

NIC in protocol analyzer: Configured to process all frames.

Other NIC’s: Only process broadcast frames and frames with its MAC address.

334
Q

What function of the protocol analyzer excludes specific types of frames?

A

Capture filters

335
Q

List 4 types of specific occurrences that can be displayed by counters.

A

Packets transmitted, CRC errors, undersize packets, oversize packets, ARP requests, collisions and bit errors.

336
Q

What menu is best used to report errors that occur at the physical layer such as bad FCS, short frames and jabbers?

A

MAC node statistics

337
Q

What kind of information does the connection statistics menu provide?

A

Bandwidth utilization and # of connections related to specific nodes.

338
Q

Identify the 3 types of active tests that are conducted with a protocol analyzer.

A

Ping, trace route & traffic generator

339
Q

MIB’s contain a set of managed objects - how are they identified?

A

Object identifiers

340
Q

What 2 things may an MIB be indentified by?

A

Object name or object descriptor

341
Q

What TCP / IP ports are used by SNMP?

A

TCP Ports 161 / 162

342
Q

What are the 4 basic SNMP commands?

A

Read, write, trap and traversal operations

343
Q

Includes authentication, access control, data confidentiality, data integrity and nonrepudiation.

A

Security Management

344
Q

Measures network utilization of individual users.

A

Accounting Management

345
Q

Reports the occurrence of faults and corrects them automatically.

A

Fault Management

346
Q

Provides the capability to initialize and shut down managed devices.

A

Configuration Management

347
Q

Ensures a transferred message has been sent and received by the parties claiming to have sent and received the message.

A

Security Management

348
Q

It covers areas such as installation, device booting / startup, inventory management and recovery.

A

Configuration Management

349
Q

Provides statistical data about the network.

A

Performance Management

350
Q

How does the NMS notify you of the occurrence of a trigger event or alarm?

A

Change in color of a device or link on the network map that is displayed on the NNM’s monitor screen.

351
Q

What must be done to each managed device on the network so that it provides data to the NNM?

A

Each managed device on the network must be individually configured for SNMP.

352
Q

Which NNM menu includes the SNMP MIB browser selection?

A

The Tools menu from any network map

353
Q

Which NNM submenu do you use to start the data collection process?

A

The NNM’s Data Collection and Threshold submenu

354
Q

Which NNM submenu do you use to change alarm thresholds?

A

The NNM’s Data Collection and Threshold submenu

355
Q

Using the NNM, what are the steps involved in printing performance graphs?

A

Performance graphs can be printed by selecting File & Print from the Graph window.

356
Q

Name and describe the 4 types of reports that can be created using the report templates.

A

(1) Availability Report: % availability of network interfaces
(2) Exception Report: Threshold events that have been exceeded.
(3) Inventory Report: Lists all nodes in MIB.
(4) Performance Report: Summary of statistical data for network interfaces.

357
Q

When configuring a report, what data intervals can you select?

A

Data collection intervals are selected in 5, 10 or 15 minute intervals.

358
Q

What is the name of the Air Force initiative that defines and drives network information security?

A

Barrier Reef

359
Q

What is the basic stance of the network security policy?

A

To allow authorized traffic and deny all else

360
Q

What does the classic “Defense in Depth” approach to security require you to do?

A

Minimize exposure of your protective assets as much as possible

361
Q

What service is essential to network security and must not be susceptible to spoofing?

A

Network time sourcing

362
Q

What is the most common form of a proxy for common services?

A

A Firewall

363
Q

What is an adverse event that threatens some element of computer security such as loss of data?

A

Computer security incident

364
Q

What results from a denial of service security incident?

A

System is disabled or a worm has saturated network bandwidth

365
Q

What is used to protect and measure the security posture of information systems?

A

Information protection tools

366
Q

What is one of the primary functions of the NCC and what are the purposes of that function?

A

System monitoring: Verifies system is operational and makes sure that the system is being operated within parameters established by network security policy and the DAA.

367
Q

What is internal control?

A

Defines the various mechanisms employed to provide internal system security. They may include but are not limited to: access control methods, system ID and authentication programs and system configuration.

368
Q

What 2 possible security postures are used based on the information you want to protect, system usability, and the cost of required security measures?

A

“Default deny” posture and “Open” Posture

369
Q

Information security-related access controls fall into what 2 categories?

A

Technical Controls: Passwords / encryption

Administrative Controls: Segregation of duties / Security screening of users.

370
Q

What are one-time passwords?

A

Passwords used only once and change for each user access session.

371
Q

What does Biometrics refer to?

A

ID process that uses physical / behavioral characteristics unique to the user. (Fingerprints, key-stroke patterns, voice / iris / retina, facial characteristics)

372
Q

What agency approves high-robustness encryption?

373
Q

What must be employed to preclude unauthorized use of legitimate identification and authentication data?

A

Network anti-spoofing capability

374
Q

How is an IDS used in relation to a firewall?

A

Complements a firewall and provides additional protection, particularly against threats originating from outside the firewall.

375
Q

What are some examples of an intrusion a firewall might miss but IDS might catch?

A

Tunneling or application-based attacks.

376
Q

What happens when more bits are added to a digital signal arranged in a sequence understood by the sender and receiver?

A

A code set is established.

377
Q

How many possible symbols can 4 bits represent?

378
Q

In networking, a byte is identified as a/an

379
Q

What organization sets important computer networking wiring standards for residential and commercial network cabling?

A

Electronic Industries Alliance (EIA)

380
Q

Which of following is an International Telecommunication Union (ITU) standardized format used for digital telecommunications services backbone system?

A

E-carrier.

381
Q

What Electronic Industries Alliance (EIA)/Telecommunications Industry Association (TIA) standard is used for commercially building telecommunications cabling?

382
Q

There is a worldwide nonprofit association of technical professionals that promotes the development of standards called the

A

Institute of Electrical and Electronics Engineers (IEEE)

383
Q

A collection of standards for local area network (LAN) architectures, protocols, and technologies called Project 802 were developed by the

A

Institute of Electrical and Electronics Engineers (IEEE)

384
Q

The “parent” organization, headquartered in Geneva, Switzerland, for all other telecommunications organizations is the

A

International Telecommunications Union (ITU)

385
Q

What organization is responsible for the X-series and V-series standards?

A

International Telecommunication Union Telecommunications Standardization Sector (ITU-T)

386
Q

Which series of standards are recommended for data transmission using the telephone network?

387
Q

The definition of the Open System Interconnect (OSI) reference model was a major contribution to networking made by the

A

International Organization for Standardization (ISO)

388
Q

Within how many feet of the data communications equipment (DCE) connection does the Electronics Industries Alliance (EIA) RS-232-C standard prescribes bipolar-voltage serial data transmission?

389
Q

Which Electronics Industries Alliance (EIA) interface standard has the ability to work in either balance or unbalanced electrical circuits?

390
Q

What transmission rate does Electronic Industries Alliance (EIA) RS-530 accommodate?

A

20Kbps to 2Mbps

391
Q

What two sublayers did the Institute of Electrical and Electronics Engineers (IEEE) divide the Open System Interconnect (OSI) data link layers into?

A

Logical Link Control (LLC) and Media Access Control (MAC)

392
Q

What Open System Interconnect (OSI) layer are common data compression and encryption schemes used?

A

Presentation.

393
Q

What Open System Interconnect (OSI) layer is closest to the end user?

A

Application.

394
Q

In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

A

Lowest layer.

395
Q

Which information unit, whose source and destination are network-layer entities, uses connectionless network service?

396
Q

What data communication protocol is used to govern the flow and format of information between systems?

A

Character-oriented.

397
Q

In binary-synchronous protocol, what character is used to establish and maintain character synchronization prior to the message block and during transmission?

398
Q

What data communication protocol is based on bits and the position of the bits?

A

Bit-oriented.

399
Q

What data communication protocol ensures that the receiving station can distinguish information from garbage?

A

High-Level Data Link Control (HDLC)

400
Q

A group of computers and associated devices that share a common communications line within a small geographic area is a

A

Local area network (LAN)

401
Q

The interconnection of several networks in a city into a single layer network is a

A

Metropolitan area network (MAN)

402
Q

What type of network connects networks that are typically separated by geographical distances?

A

Wide area network (WAN)

403
Q

What type of network enables a group of two or more computer systems to communicate over the public Internet?

A

Virtual private network (VPN)

404
Q

Which type network enables users to share resources, files, and printers in a decentralized way?

A

Peer-to-peer.

405
Q

What network layer protocol provides information about how and where data should be delivered, including the data’s source and destination address?

A

Internet Protocol (IP).

406
Q

Which network layer protocol matches a known internet protocol (IP) address for a destination devices to a Media Access Control (MAC) address?

A

Address Resolution Protocol (ARP).

407
Q

Which network layer protocol provides the internet protocol (IP) address for a device that knows its own Media Access Control (MAC) address?

A

Reverse Address Resolution Protocol (RARP).

408
Q

Which Transport Layer protocol does not guarantee that packets will be received at all?

A

User Datagram Protocol (UDP).

409
Q

Which Application layer protocol is used to send and receive file by way of transmission control protocol/internet protocol (TCP/IP)?

A

File Transfer Protocol (FTP).

410
Q

Which protocol is simpler than File Transfer Protocol (FTP) when transferring files between computers?

A

Trivial File Transfer Protocol (TFTP).

411
Q

Which Application layer protocol is a terminal emulation used to log on to remote hosts?

A

Teletype Network.

412
Q

Which Application Layer protocol is an automated means of assigning a unique internet protocol (IP) address to every device on a network?

A

Dynamic Host Configuration (DHCP).

413
Q

Which Application layer protocol is a utility that can verify that transmission control protocol/internet protocol (TCP/IP) is installed and communicating with the network?

414
Q

The physical address of any device on the network is a/an

A

Media Access Control (MAC) address

415
Q

What are the two parts to an Internet Protocol version 4 (IPv4) address?

A

Network and Host.

416
Q

What is used on a transmission control protocol/internet protocol (TCP/IP) network to determine which network a computer is on?

A

Subnet mask.

417
Q

How many subnet bits are required to support 90 subnets on a Class B network?

418
Q

How many bits are available for host bits on a Class B network using seven bits?

419
Q

What is not a recommendation for planning networks using variable length subnet masking (VLSM)?

A

Re-address the entire network.

420
Q

What mechanism allows for easier Internet protocol version 6 (IPv6) address allocations?

A

Auto configuration.

421
Q

Which one of the following is not an Internet protocol version 6 (IPv6) transition approach.

A

Auto configuration.

422
Q

Which Internet protocol version 6 (IPv6) tunneling approach attempts to solve the issue of IPv6 to IP version 4(IPv4), IP protocol 41 issue?

423
Q

Teredo has four tunneling components. Which one is not one of them?

A

Teredo agent.

424
Q

The combination transmitter/receiver device, in a single package, is called a

A

transceiver.

425
Q

What device provides the physical, electrical, and electronic connections to the network media?

A

Network interface card (NIC).

426
Q

What layers of the open system interconnection (OSI) model do network interface cards (NIC) belong?

A

Physical and Data Link layers.

427
Q

A repeater with more than one output port is a

428
Q

What can be used to extend the size of a network?

A

Active hubs.

429
Q

What device subdivides a network into smaller logical pieces, or segments?

430
Q

The time it takes a switch to figure out where to forward a data unit is called

431
Q

Which device has multiport connectivity that directs data between nodes on a network?

432
Q

A router’s strength is its

A

intelligence.

433
Q

What is the oldest routing protocol?

A

Routing Information Protocol (RIP).

434
Q

Which routing protocol does internet backbones use?

A

Border Gateway Protocol (BGP).

435
Q

What type of gateway can restrict the kind of access local area network (LAN) users have to the internet, and vice versa?

A

Voice/data.

436
Q

What type of gateway might include remote access servers that allow dial-up connectivity to a local area network (LAN)?

437
Q

Virtual private networks (VPN) allow the AF to extend network resources across a/an

A

public network.

438
Q

Which of the following is not a function that a virtual private network (VPN) concentrator performs?

A

Encapsulates data.

439
Q

What cable discrepancies can a time-domain reflectometer (TDR) detect?

A

Kinks, opens, and corroded connectors.

440
Q

What type of cable property change does a time-domain reflectometer (TDR) detect to identify problems?

A

Impedance.

441
Q

When using optical time-domain reflectometer (OTDR), what action is suggested by most manufacturers to prevent false readings?

A

Connect a launch cable between the test set and the cable being tested.

442
Q

A cable wire scanner wire-map display identifies crossover and straight-through cables by

A

providing wiring maps at both ends of the cable.

443
Q

What test equipment has the capability of diagnosing digital network and developing communications software?

A

Protocol analyzer.

444
Q

Which component of a protocol analyzer discards frames based on its definition or activates

445
Q

What component of a protocol analyzer processes the frames based on the selected test and the user configuration inputs?

A

Central processing unit (CPU).

446
Q

What protocol analyzer feature automatically runs in the background when the protocol analyzer application is activated?

A

Node discovery.

447
Q

What protocol analyzer utility is used to determine if a network node is connected or responding?

448
Q

What protocol analyzer utility is used to see the path that packets are traveling and the time it takes the packets to complete the trip?

A

Trace Route.

449
Q

A Management Information Base (MIB) can be identified by either its object name r its object what?

A

Descriptor.

450
Q

Simple Network Management Protocol (SNMP) has three components: a managed device, an agent and a

A

Network Management System (NMS).

451
Q

Which of the following is not a basic Simple Management Protocol (SNMP) command?

452
Q

Which network management function provides the capability to initialize, operate and shut down managed devices?

A

Configuration.

453
Q

Which network management function obtains the utilization and error rates of network devices and provides statistical data about the network?

A

Performance.

454
Q

The community name that is used with the network management systems (NMS) authenticates

A

simple network management protocol (SNMP) requests.

455
Q

What defines the format and type of data in a network management system (NMS) report?

A

Report Template.

456
Q

What process provides the overall process to secure and protect our information networks?

A

Barrier Reef.

457
Q

What defines traffic flow and is a basic protection mechanism on routers?

A

Access lists.

458
Q

The World Wide Web (WWW) proxy provides three benefits: it conceals internal network configuration, provides a means to monitor and eliminate traffic to unofficial WWW sites, and

A

provides much faster access to the internet.

459
Q

What is one of the primary functions of the Network Control Center (NCC), usually done in real time, and ensures the system is being operated within the parameters established by network security policy?

A

System monitoring.

460
Q

What security posture permits everything that is not specifically blocked?

461
Q

What security posture prevents everything that is not specifically authorized?

A

Default deny.

462
Q

What is the first line of defense when gaining access to a laptop computer’s operating system?

A

Logon identification and password combination.

463
Q

Who has unrestricted access to system commands and data?

A

Superusers.

464
Q

What must be employed to ensure data integrity?

A

Checksums.

465
Q

What method is approved for changing passwords through the use of remote access?

A

Strongly encrypted virtual private network.

466
Q

An intrusion detection system (IDS) may miss attacks that bypass the firewall like application-based attacks and

A

tunneling.

467
Q

What type of firewall can filter messages according to a set of rules for a specific application?

A

Proxy server.

468
Q

What are the two vulnerability scanner examination techniques?

A

Passive and active.

469
Q

Of what does a firewall physically consist?

A

One or more routers and host machines with filtering software containing a series of rules that accept or reject packets of information, connection types or application specific communications attempting to cross the firewall.

470
Q

What is the simplest and least expensive type of firewall, and what is its purpose?

A

Packet filtering firewall; to stop messages with inappropriate network addresses.

471
Q

What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?

A

Bastion host.

472
Q

Name the 3 factors that affect microwave propagation.

A

Reflection, refraction and diffraction.

473
Q

Name 3 major propagation paths and identify the radio system(s) used with each.

A

Ground waves, space waves and sky waves; HF and microwave frequencies.

474
Q

A space wave and a reflected wave arrive at the receive antenna 180° out-of-phase. What effect will this have on the received receiver signal level (RSL)?

A

RSL will decrease due to partial or total cancellation.

475
Q

What happens to the RSL when reflected waves and space waves pass in and out-of-phase at the receive antenna?

A

RSL will vary due to the aiding and opposing of the 2 signals.

476
Q

How much further is the radio horizon than the true horizon in a standard atmosphere?

A

33% further

477
Q

K experiences a significant decrease in value. What effect does this have on the radio horizon?

A

Wave is bent more and radio horizon decreases an is known as superstandard refraction.

478
Q

As the atmosphere becomes less dense, what happens to the speed of the propagated wave?

A

As K varies, the distance the wave travels to the radio horizon varies, causing fading at the receive antenna.

479
Q

Define the term diffraction?

A

Down bending of radio waves as they graze the surface of an obstruction.

480
Q

What determines the size of the waveguide?

A

Wavelength of the energy to be transmitted.

481
Q

What is the waveguide’s cutoff frequency?

A

A limiting frequency below microwave range where it cannot transmit a signal.

482
Q

How many miles are satellites placed in orbit and why?

A

22,300 miles above Earth to maintain stability. At this distance the satellite does not fall back to Earth and does not drift off into space.

483
Q

In what way is satellite communications a deficiency?

A

Transmitting on uplink is secure; transmission on downlink is in broadcast mode which makes it unsecure.

484
Q

Name 2 satellite communications systems.

A

AFSATCOM / DSCS

485
Q

Why is modulation used?

A

To transmit audio frequencies over appreciable distances and to send more than 1 message at a time over same medium.

486
Q

What is the frequency bandwidth of a high frequency signal?

A

3 - 30 MHz

487
Q

What are the 2 paths that an HF signal can travel?

A

Ground wave & sky wave transmission.

488
Q

What is referred to as coherency?

A

Properties of a laser light that make a narrow beam and does not diverge or spread out like light from a flashlight.

489
Q

Name 3 disadvantages to laser light transmission?

A

Laser light is strictly a LOS transmission media. Great care is required to properly align the transmitting and receiving equipment. Laser light is susceptible to atmospheric interference, and cannot penetrate walls or very thin coverings such as curtains or paper.

490
Q

What is one of laser light transmissions greatest advantages?

A

No FCC license is required. Equipment is moderate in cost and undetected eavesdropping is difficult.

491
Q

Broadband is a term that refers to what type of signaling method?

A

Signaling method that can handle a relatively large range (band) of frequencies.

492
Q

Give 2 examples of broadband technology.

A

ADSL / Cable TV

493
Q

What transmission media can utilize broadband signaling?

A

Copper, fiber, or wireless

494
Q

What are the 2 main interfaces used in ISDN?

A

PRI and BRI

495
Q

There are 2 channel configurations for PRI, what are they?

A

30 bearer channels and 2 delta channels for E1.

23 bearer channels and 1 delta channel for T1.

496
Q

What is the primary application for PRI connections?

A

Higher xfer speeds and call setup times.

497
Q

What are the 2 uses for BRI in the military?

A

Video teleconferencing & STE.

498
Q

How is voice transmitted and received by a telephone?

A

Voice of talker vibrates membrane that has magnet attached to it. Magnet causes changes in current in coil. Current changes are transmitted to speaker on other end causing another membrane with a magnet attached to vibrate and reproduce the sound.

499
Q

The telephone exchange system was developed to address what problem?

A

Get rid of point-to-point setup

500
Q

What was the impact of conversion from manual switchboards to electro-mechanical switches?

A

Electro-mechanical switches = Speed and reliability and allowed telephone companies to cut personnel costs.

501
Q

What is a dial tone signal?

A

User that the telephone line is connected to the switch and is ready to transmit dialing digits.

502
Q

What are the 3 cornerstones of voice network system security?

A

Confidentiality, Integrity and Availability

503
Q

Inadvertent disclosure of communications violates which cornerstone of voice network system security?

A

Confidentiality

504
Q

Problems that affect the QoS and functionality customers require are related to what cornerstone of voice network system security?

A

System Integrity

505
Q

Ensuring redundancy in a voice network system so that system operations are maintained if there is a failure at any single point in the system relates to which cornerstone of voice network system security?

A

Availability

506
Q

PBX switches generally handle what kind of traffic?

A

Internal call traffic and connection to outside public switched telephone network.

507
Q

What types of services can the Meridian Option 11C PBX support?

A

60 - 720 lines. VoIP, ISDN BRI, VM, Call center operations.

508
Q

What are the 2 models of the DMS-100?

A

DMS-100 & MSL-100

509
Q

What is the maximum # of ports that a fully-expanded DMS-100 and MSL-100 can support?

A

DMS-100 = 100,000 ports

MSL-100 = 30,000 ports

510
Q

What is the physical difference between the DMS-100 and MSL-100?

A

DMS-100 = 6-foot equipment racks.

MSL-100 = 6-foot modular cabinets.

511
Q

Which major area monitors and controls all system activity by executing stored computer programs?

A

Central control area

512
Q

What are the elements that make up the control components for the SuperNode central control area?

A

CM, SLM, MS

513
Q

What is the SLM used for?

A

Boot load CM and MS from disk/tape, load an office image into the inactive CPU, dump an image to disk, perform offline transfers from tape to disk.

514
Q

What 3 services/facilities does a PM interface?

A

Analog/digital trunk, subscriber lines and test/service trunks.

515
Q

What component in a PM performs local processing functions?

516
Q

How many analog circuits can be connected to a TM8?

517
Q

How many line cards are controlled by one of the two processors in an LCM?

518
Q

How many LCM’s can occupy a single bay?

519
Q

Which major area provides an interface between the maintenance subsystem software and the maintenance technician?

A

I/O or MAP

520
Q

To what central control component(s) does the IOC interface?

A

MC in the SuperNode

521
Q

How many DC’s can be connected to 1, IOC?

A

Up to 9 DC Cards

522
Q

What IOC card is required to interface a tape drive?

A

A 1X68 MTD Controller

523
Q

What IOC card is required to interface a disk drive?

A

A 1X55 DDU Controller

524
Q

What is terminated on the vertical and horizontal sides of the MDF?

A

Circuits routed over base cable plant leading to subscriber’s buildings are terminated on the vertical side. Equipment from peripheral area of telephone switch are terminated on the horizontal side.

525
Q

What is the function of protectors installed on the MDF?

A

Protect switching system from damage due to high voltages that could enter the central office via the base cable plant.

526
Q

What is the function of jumpers on the MDF?

A

Connect telephone numbers from the switching system to specific cable pairs that are routed to various telephone subscribers.

527
Q

What precaution should you take before removing / replacing faulty terminal or distribution frame protectors?

A

Measure voltage across the protector prior to removing it to ensure dangerous voltages are not still present on the line.

528
Q

What are the safety rules you need to remember when using a ladder?

A

Use wood or reinforced fiberglass ladders and remove any finger rings.

529
Q

How many planes and shelves per plane are provisioned in a fully equipped ENET?

A

2 planes and 4 shelves per plane

530
Q

What 2 switch functions does the ENET provide access to?

A

Messaging and a speech / signaling path

531
Q

How many horizontal buses are provided on each ENET shelf and what is their designation?

A

Two H-buses per shelf designated odd and even

532
Q

How many PM’s are connected to the ENET?

A

Hardwired to a designated port

533
Q

How does a circuit entering the ENET on an odd card slot gain access to the even H-bus?

A

Through a V-bus extension to its mate even card

534
Q

How many sections is each H-bus divided into?

A

8 Sections numbered 0-7

535
Q

What major DMS database facility provides facilities for mapping data from its external character string format to its logical binary format?

A

The formatter

536
Q

When changing the DMS database, you are required to name particular entries. Which major database facility stores these entries?

A

The data dictionary

537
Q

What is the purpose of the POF system?

A

It provides facilities for storing DMO’s and for retrieving them at a specified time for execution

538
Q

Which database facility preserves DMO on tape or disk so that data tables can be restored if the switch should fail?

539
Q

What user interfaces are available on the MSM that use Meridian Mail software?

A

Nortel’s proprietary MMUI and VMUIF

540
Q

What is the storage capacity of a single SPN?

A

75 or 150 hours

541
Q

What are the Meridian mail user interface user options that VMUIF does not support?

A

TAG, timed delivery, added to an already existing recorded message and save copies of message.

542
Q

How does the system notify a VMUIF mailbox user they have received a message?

A

Message waiting indicator (either a light on the phone or an interrupted dial tone)

543
Q

What is the maximum # of submailboxes that can be partitioned from a VMUIF main mailbox?

A

Up to 8 submailboxes

544
Q

What is a typical adminstration configuration for the MSM administration and maintenance interface?

A

One main system administration terminal and up to 3 MAT’s

545
Q

How is remote administration access activated in the administration and maintenance interface?

A

From the main system administration terminal

546
Q

Why did the NTSC decide to shift the R-Y and B-Y signals 33° counterclockwise?

A

To place the R-Y signal on the axis of maximum visual acuity and the B-Y signal on the axis of minimum visual acuity.

547
Q

What were the bandwidths and limitations of the R-Y and B-Y signals, and what were the shifted signals?

A

R-Y is called the I signal for in-phase. Bandwidth: 1.5MHz

B-Y is called the Q signal for quadrature. Bandwidth: .5MHz

548
Q

List the functions of the encoder

A

Derive the luminance (brightness) signal, derive the I and Q signals, use I and Q to modulate suppressed subcarrier balanced modulator to represent hue and saturation, combine luminance and chrominance signals, add sync and burst to combined luminance and chrominance signal.

549
Q

What are the 5 components of the NTSC color video signal?

A

Luminance, chroma, blanking, sync, colorburst

550
Q

What digital broadcasting system was adopted as a standard in the USA?

A

ATSC (Advanced Television Systems Committee)

551
Q

What type of modulation is used in ATSC?

A

8-vestigial sideband technique

552
Q

Name the format used by ATSC to provide 5.1 channel surround sound?

A

Dolby Digital AC-3

553
Q

List the advantage of OFDM

A

Reduces the amount of interference caused by multipath

554
Q

Explain video tape recording

A

Means of storing information in a memory device wherein the memory is provided by a series of magnetic patterns on tape.

555
Q

What type of function is the playback process?

A

Voltage function

556
Q

A VTR head can be compared to what?

A

An electromagnet

557
Q

Before being applied to the head, the incoming signal in a reorder is converted to what type of waveform?

558
Q

List the 4 signals recorded on tape.

A

One video track, two audio tracks and a control track.

559
Q

What is the maximum recording and/or playback time allowed by the Betacam SP format?

A

90 minutes on a large cassette.

560
Q

List some of the advantages of digital video recording.

A

Superior image quality and ability to dupe down unlimited generations (cloning), edit layer upon layer of effects without quality loss, record in one TV standard and accurately reproduce in a different standard.

561
Q

List 3 conversion methods available when working with digital video.

A

Analog-to-digital (A/D); Digital-to-analog (D/A); Digital-to-digital (D/D).

562
Q

What is the purpose of the D/A converter?

A

Change binary data stream back into the continuous electrical waveform that a binary data stream represents.

563
Q

What format is used in D2 digital recording?

A

A 4 fsc sampling frequency with 8-bit quantizing.

564
Q

What are the benefits of XDCAM recording in MPEG HD format?

A

Data can quickly be transferred over computer networks and easily edited in the field with a laptop computer and made readily available to a wide variety of applications.

565
Q

What is the main benefit of having time counters on VTR’s?

A

Timesave that enables the operator or editor to find a specific clip and/or segment at a later time.

566
Q

What GVG-110 system allows you to insert titles or other video scenes into a full-screen background scene?

A

Effects Keyer

567
Q

What can you use to fill an effects key when using the GVG-110?

A

Key bus video or an internally-generated color matte signal.

568
Q

What type of downstream keys can you use to layer over the picture coming out of the effects keyer?

A

Linear or luminance

569
Q

What is the purpose of the GVG-110 effects memory?

A

Store effects for recall later

570
Q

How many effects storage registers are there in the GVG-110 switcher?

571
Q

What circuit re-inserts reference blanking into the program output to prevent noisy sync in the GVG-110?

A

Blanking processor

572
Q

What is the purpose of the GVG-110 GPI?

A

Allows remote control of information

573
Q

What allows a personal computer or digital picture manipulator to remote control all of the switcher’s functions?

A

Serial interface

574
Q

The VDA is designed for what type of video signal?

A

75Ω composite video signal

575
Q

The VDA is capable of how much gain?

A

+ or - 6dB

576
Q

The high frequency speaker is adjusted to maintain flat response through what frequency?

577
Q

Which stage of the VDA has the provision for delay adjustment?

A

Fixed gain and level shift

578
Q

In the output driver of the DA, what assures a linear operating characteristic?

A

Generous amount of feedback

579
Q

What is a head-end system?

A

Beginning of a cable system

580
Q

State the purpose of a head-end system.

A

Master facility that receives TV signals for processing and distribution over a cable TV infrastructure.

581
Q

What device is used to combine the different channel inputs received into one output for distribution?

A

Modulator (multiplexer)

582
Q

What device is used to make up for cable losses in the line?

A

Trunk amplifiers

583
Q

What factors should you take into consideration when planning the installation of an IDS?

A

Equipment capabilities and limitations, mission criticality and threat to resources that are to be protected.

584
Q

What must a line of detection detect?

A

A person walking, running, rolling crawling or jumping through line of detection.

585
Q

What is the main purpose of a boundary fence?

A

Present a physical and psychological deterrent to unauthorized entry.

586
Q

What does a clear zone consist of?

A

A 30 foot area inside and outside the site perimeter fence.

587
Q

Why does the area lighting need to illuminate the interior of the restricted area?

A

To help personnel detect and track intruders.

588
Q

How does an IDS assist SF capabilities?

A

Increase detection capability by alerting security personnel to an approach, intrusion or attempted intrusion.

589
Q

Why type of system should the installed IDS be?

A

A closed system, not allowing access from external source.

590
Q

What is the point from which control of personnel and vehicle entry is conducted?

A

Entry control facility

591
Q

How many hours of battery power are needed to operate sensor, alarm, delay/denial and communication components in case of an AC power failure?

592
Q

What sensors provide an early detection and near real-time assessment to any attempt to penetrate the perimeter security system?

A

Exterior sensors

593
Q

What are the primary parts of the AN/GSS-39 system?

A

Main control panel, mixture of sensors, associated equipment.

594
Q

When the SPCDS annunciator is used in the IDS, what control unit should be used?

A

Advisor VIII

595
Q

What information can be obtained from the ZIPS?

A

What sensors have gone into alarm since it was last reset

596
Q

Why is the model TROS 8/4 multiplexer used with the STAS and SMAS instead of Advisor VIII?

A

Multiplexers are standard equipment with these annunciators and directly interface with them

597
Q

What are the IIDS’s primary AC power requirements?

A

115 or 220 VAC; through a step-down transformer to the 12 VDC power supply.

598
Q

What is the frequency of the tamper alarm?

599
Q

What is a dual-phenomenology sensor?

A

One that uses a combination of microwave and passive infrared sensors in the same physical circuit and housing

600
Q

How many feet of coverage does the DR-301, PIR sensor provide?

601
Q

How many frequencies are there in a SD80DC microwave sensor and what is the minimum and maximum frequency range?

A

10 frequencies. 9.45 and 10.545 GHz

602
Q

What is the minimum and maximum range of control, in feet, for the PIRAMID sensor, model SDI-76?

A

15 - 75 feet

603
Q

What is the maximum coverage, field of view, # of beams of a SDI-76 sensor equipped with the standard high-density lens?

A

75 x 75 feet; 100 degrees; 24 beams.

604
Q

What is the difference between the FPS-2 and FPS-2-2R?

A

FPS-2 is single-channel and can cover up to 100 meters. FPS-2-2R has 2, 100 meter zones.

605
Q

What has been done to the FPS cables to help detect cuts or shorts?

A

A 1 megaohm resister is placed in the end of the line termination kit.

606
Q

In a typical Air Force installation, how much area can the E-Flex II cover?

A

Up to 1,000 feet (300 meters)

607
Q

How, if at all, can cutting of the E-Flex II cable be detected?

A

If the cable is cut, resistance drops and causes a supervision tamper alarm.

608
Q

What is the purpose of the TWS’s?

A

To detect an intruder climbing over or through the barbed wire of a security fence.

609
Q

What tension should be maintained on the TWS’s?

A

90 + or - 15 lbs.

610
Q

What is the maximum allowable distance the barbed wire can be pulled before an alarm is generated?

611
Q

What is the normal length of a VTWS sensor sector?

A

328 feet (100 meters)

612
Q

What type of IR technology does the Birdseye use?

613
Q

How many sensors does a typical Birdseye sector transmit/receive pole contain?

A
  1. Transmit pole: 6 transmitters / 3 receivers. Receive pole: 6 receivers / 3 transmitters.
614
Q

How does the detection pattern change, if a sector is set up to cover an area of 175 feet instead of 125 feet?

A

Each transmitted beam is sent to two receivers.

615
Q

What is the maximum intrusion detection barrier length that an IPIDS system can provide?

616
Q

For how long will a generated alarm signal remain active on the IPIDS?

A

2 seconds or as long as the beam is broken.

617
Q

How can the MFS detect intruders?

A

By an intruder breaking the beam or by multipath return signal.

618
Q

Normally how many MFS’s are used to establish a microwave line-of-sight detection sector?

A

Two (one transmitter and one receiver)

619
Q

Describe the subcarrier frequency in a MFS.

A

Amplitude modualtion frequency that canc be set to 3, 5, 8, or 13 kHz.

620
Q

What is the purpose of the multipath/amplifier detector?

A

It looks for increases in the fluctuation level of this signal caused by an intruder disturbance of the multipath field and generates an alarm when fluctuations are large enough.

621
Q

The P-MUX provides what functions?

A

Multiplexing / demultiplexing of aggregate signals.

622
Q

What are the different categories of cards found in the Promina Multiplexer?

A

Common equipment, voice/data/trunk and server cards.

623
Q

What is the C-Bus used for?

A

Communication with other cards in Promina.

624
Q

The PLM’s flash memory provides the data storage of what?

A

Boot code, system software and config database.

625
Q

The USD card’s port 0 can be used for what purpose?

A

Accept an external clock for network synchronization.

626
Q

The purpose of the PRC (Primary Rate Card) is to?

A

Provide and manage incoming/outgoing calls to network.

627
Q

Symmetric trunk operation means?

A

Both directions of trunk (transmit and receive) operate at the same bit rate and all calls that traverse the trunk are symmetric and full-duplex.

628
Q

What is the purpose of the CM?

A

Encryption and decryption; convert traffic to/from NRS/CDI, reachback and internal ICAP equipment; receive GPS timing for external timing interface of P-Mux.

629
Q

KIV 19A

A

Encrypting NRZs signals at data rates between 9.6 Kbps and 13 Mbps

630
Q

CV 8448D

A

Converting NRS signals to Balanced, Unbalanced or Optical CDI signals.

631
Q

True Time Xli/Zypher GPS Receiver

A

Disciplined precision timing reference

632
Q

The crypto module is typically found where in the TDC network?

A

Located between P-Mux and ground satellite terminal.

633
Q

The True Time Xli/Zypher GPS receiver can provide what range of clock rates?

A

8 KHz to 8192KHz

634
Q

What are the differences between the KIV 19 and the KIV 19A?

A

KIV19A provides enhanced features that enable configuration of local strap settings using the control panel.

635
Q

What is the CV8448 necessary?

A

Data interfaces like EIA-530 are designed for short interoffice connections and the 25 wire cables used for this standard are too bulky for long distance tactical use.

636
Q

What application does the FCC-100 Tactical Module have in the TDC network?

A

To provide low rate communiations channels to smaller sites.

637
Q

What services does the FCC-100 provide?

A

It can serve as a long local telephone channel for TRI-TAC devices or common two-wire desk telephones or fax machines, and for NRZ or CDI data channels.

638
Q

What task does the CIM normally perform in the TDC network?

A

Acts as the external router for secure / non-secure data network.

639
Q

The Cisco 3460 and 3745 modular routers provide what for the ICAP data backbone?

A

Connectivity between classified or unclassified ICAP backbon

640
Q

What devices are compatible with the KIV-7HS/HSB?

A

KIV-7HS/HSB; KIV-7 or KG84

641
Q

When is the CV 2048-M/CV 8448-D used?

A

When CIM and P-Mu are not in the same location.

642
Q

What are the primary components of the BAM v3?

A

REDCOM IGX-C and 2 Cisco switches

643
Q

What role does the BAM play in the deployed TDC network?

A

Voice and data access for 50 users in a single location

644
Q

What cards are required for operation of the REDCOM IGX-C Circuit switch?

A

Modular Switching unit (MSU), Expanded Timeslot Interchange Board (ETSI), Ringing Generator Card.

645
Q

What is the main limiting factor in the configuration of the IGX switch?

A

Limited # of timeslots

646
Q

How does stacking work with the Avaya Prologix Switch?

A

Can only be stacked in pairs, with the 2nd switch in the stack acting as a pair of expansion shelves with no processing capability.

647
Q

What signaling can the Avaya DS1 card be configured to support?

A

DTMF, Multi-frequency and Primary Rate Interface

648
Q

What purpose does the tactical interface gateway serve?

A

Provides backwards compatibility with TRI-TAC devices such as tactical radios, DNVT and DSVT’s

649
Q

What are the Cisco switches in the BAM used for?

A

Connect workstations and other network devices

650
Q

What is the normal data path for the Red Data Module to send traffic to a SIPRNet user on a TDC network?

A

SIPR traffic comes through Promina as encrypted. Pass through KIV-7 to be decrypted. Decrypted traffic is routed to TACLANE which then encrypts each IP frame before sending back through black network. Client RDM then decrypts the frames for reception by SIPR user.

651
Q

What type of encryption does the TACLANE utilize?

A

Ethernet frame encryption

652
Q

The MRV console server provides what service?

A

Secure remote configuration and management of TDC modules.

653
Q

What components make up the NGRT?

A

Reflector dish, tracking receiver and pedestal motor assembly with tripod.

654
Q

What purpose does the STRC have in the AF IP Receive Suite?

A

STRC contains all the computer elements required for operating the NGRT, including initial heading settings for satellite acquisition and test circuitry for troubleshooting.

655
Q

What is the function of the RBM?

A

Receives data streams sent by satellite through NGRT and relay that information to the subscribers connected to the terminal.

656
Q

What is the difference in function of the Type 1 and Type 2 RBM?

A

Type 1: Military specific / classified data.

Type 2: Handles commercial / unclassified data.

657
Q

What does the video converter in the RBM do?

A

Takes input signal and converts it to an NTSC standard video signal.

658
Q

What is the difference in equipment between the Type 1 and the Type 2 RBM?

A

Type 1 RBM contains a crypto unit to decrypt military specific information carried in the data feed from the Type 2 RBM. Type 2 RBM contains an IRD to extract data content from the incoming video stream and to transmit that data to an Ethernet switch for distribution. The IRD also descrambles the video content before processing.

659
Q

What is an RFS?

A

A request for communications service from a user to DISA.

660
Q

What is a TSR?

A

A request to staff, stop, or change circuits, trunks, links, or systems.

661
Q

What is the purpose of the TSO?

A

To authorize activations, deactivations, or changes to circuits, trunks, links, or systems. It also gives the
O&M agencies authority to procure equipment.

662
Q

Who normally receives TSOs?

A

All DII stations that a trunk or circuit traverses, the designated DII control office, the leasing agency
(if applicable), and other DISA area offices if the trunk or circuit enters their area. Information copies of the
TSO are sent to the O&M agency, the TCO and the user of the circuit or trunk.

663
Q

What does a SAM identify?

A

Time for installation of the leased service at your facility, contract service completion, delay in service,
contractor supplies information (that is. reference number, cost, service date), any additional information
that is required.

664
Q

Where do you look to determine circuit requirements of circuits composed entirely of
government-owned facilities?

A

DISAC 300–175–9, DII Technical Schedules.

665
Q

The TSO issuing authority keeps current listings of circuits accepted for service that do not meet
required parameters and ensures what?

A

Outstanding exceptions are cleared at the earliest possible date.

666
Q

A TSO designated DII facility must do what for initial acceptance of a leased circuit?

A

(1) Ensure that leased circuit segments meet all circuit parameters for the ToS specified in the TSO.
(2) Contact the TSO issuing authority when the carrier fails to meet all required circuit parameters.

667
Q

List the three types of reports used by the CCO for circuit activation.

A

In-effect, exception, and delayed service.

668
Q

What is the purpose of the trend analysis program?

A

The program trends the number of outages, outage times, reason for outage, calculate availability and
reliability, and determine if circuit reliability meets MT on a monthly calendar basis.

669
Q

When are outages analyzed to determine if corrective actions are required?

A

Anytime a link, trunk, or circuit fails monthly MT.

670
Q

Who do you notify when a circuit fails MT for three or more consecutive months?

A

The CCO, or servicing SCF/PTF, should notify the appropriate LCC/NCO and O&M command of all links,
trunks, and circuit that fail MT for three or more consecutive months.

671
Q

How many character positions are there in a trunk identifier?

672
Q

Which position of a trunk identifier would indicate the receive side area of a trunk?

A

Second position, the “To” area.

673
Q

What publication can you use to locate the codes of trunk identifiers?

A

DISAC 310–65–1.

674
Q

Which position of a trunk number indicates the type of trunk or media?

675
Q

What is the purpose of a CCSD?

A

To provide each circuit a specific identity for reporting and status keeping.

676
Q

What position and part of a CCSD contains the type of circuit identified?

A

Fourth position, third part.

677
Q

What are the two classes of CCSDs?

A

Permanent and temporary.

678
Q

Who has responsibility for constructing and assigning temporary CCSDs?

A

SCF Technician.

679
Q

What are the two parts of the TSP restoration priority code?

A

(1) TSP provisioning priority field.

(2) TSP restoration priority field.

680
Q

When restoring circuits, what type of facility do you use first?

A

Use all available spare channels first.

681
Q

One disadvantage of microwave wavelengths is that the frequencies are susceptible to

A

weather effects

682
Q

What is not a factor in determining the refractive index of air?

A

Propagation medium.

683
Q

The determining factor in calculating the correct size of a waveguide is

A

frequency.

684
Q

How many miles above the earth are satellites placed in orbit?

685
Q

Which satellite communications system is used to transmit space operations?

A

Defense Satellite Communications System (DSCS).

686
Q

To transmit an audio signal over radio frequency (RF), it first has to be

A

modulated.

687
Q

What is one path high frequency (HF) transmissions follow from the antenna to the distant end?

A

Groundwave.

688
Q

Which is not a disadvantage of laser light transmission?

A

No need for careful alignment of transmitter and receiver.

689
Q

Broadband refers to a technology that can transmit

A

a relatively wide range of frequencies.

690
Q

Broadband technology uses all of these transmission mediums except?

A

laser light.

691
Q

The Integrated Services Digital Network (ISDN) configuration normally used to connect

A

primary rate interface (PRI).

692
Q

How many B and D channels does the standard configuration in North American Integrated Services Digital Network (ISDN) primary rate interface (PRI) application use?

693
Q

What was the primary driving factor behind the invention of the telephone exchange
system?

A

Point-to-point telephone access caused cabling issues.

694
Q

When a telephone network is circuit switched, each call

A

has a dedicated circuit created by the switch.

695
Q

The three cornerstones of voice network system security are availability,

A

confidentiality, and integrity.

696
Q

What is the most serious threat to voice network system integrity?

A

Subversion

697
Q

What role does the Private Branch Exchange (PBX) play in the telephony industry?

A

A small scale switch that handles internal calls for an organization.

698
Q

How many serial data interface ports does the Meridian Option 11C Small System
Controller have?

699
Q

Which models of the digital multiplex system (DMS) family are commonly used at Air
Force bases to provide base telephone services?

A

DMS-100 and Meridian System Logic (MSL)-100.

700
Q

Which elements make up the control component of the SuperNode central control?

A

CM and system load module (SLM).

701
Q

What link is used to connect the digital multiplex system (DMS)-core to the DMS-bus?

702
Q

Which major component of the NorTel digital switching system (DSS) interfaces line and
trunk subscribers?

A

peripheral module (PM).

703
Q

What components are directly connected to the input/output controller (IOC)?

A

A pair of SuperNode message controllers and the device controllers.

704
Q

Base cables normally enter the central office (CO) facility through a

A

cable vault.

705
Q

The primary reason you should measure the voltage across terminal or distribution frame protectors before removing and replacing them is to

A

ensure dangerous voltages are not present on the line.

706
Q

Where do incoming unswitched circuits from a peripheral module (PM) enter the NT9X35A cross-point card matrix?

A

Vertical bus.

707
Q

Because the enhanced network (ENET) is a matrix, any input channel has access to any available

A

output channel.

708
Q

Which digital multiplex system (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?

A

Table control.

709
Q

Which digital multiplex system (DMS)-100 database facility provides facilities for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?

A

Pending order file.

710
Q

Which digital multiplex system (DMS)-100 database facility provides facilities for
preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system should fail?

A

Journal file.

711
Q

What voice mail interface has the capability to support the temporary absence greeting (TAG) feature?

A

Meridian mail user interface.

712
Q

What voice mail interface allows a user’s mailbox to be partitioned into a main mailbox and up to eight submailboxes?

A

Voice Messaging User Interface Forum.

713
Q

Why are the R-Y and B-Y signals shifted 33° counterclockwise?

A

R-Y was shifted to maximum and B-Y was shifted to minimum color acuity, respectively for
human vision.

714
Q

The red, green, and blue (RGB) outputs from the camera go to the

715
Q

What modulation technique is used by the Advanced Television Systems Committee
(ATSC) system?

A

8-vestigial sideband (8-VSB).

716
Q

What modulation technique is used for Digital Video Broadcasting - Cable transmission?
a. Motion Picture Experts Group (MPEG)-1.

717
Q

How many lines of video are discarded in high-definition 1080 line video encoded with 1920x1088 pixel frames prior to display?

718
Q

How is information recorded or stored on the videotape?

A

Series of magnetic patterns.

719
Q

You can compare a video tape recorder (VTR) head to a/an

A

electromagnet.

720
Q

What function in a video tape recorder (VTR) is accomplished by transporting the videotape
across the head gap at the same speed at which it was recorded?

721
Q

An important concept to understand is that digital video is merely an alternate means for

A

minimizing video loss.

722
Q

What is a major advantage of digital recording over analog recording?

A

Material can be edited generation after generation without noticeable degradation in quality.

723
Q

Which digital video tape format uses a 4:2:2 standard, with an 8 bit sampling rate, 19mm
wide tape, and has a 94 minute recording time?

724
Q

What is the means of measuring the amount of time that has been played or recorded on a
video tape recorder (VTR)?

725
Q

What part of the video switcher allows titles or other video scenes to be inserted into a full screen background?

A

Effects keyer.

726
Q

The GVG-110 video switcher effects key fills with

A

key bus video or an internally-generated color matte signal.

727
Q

The purpose of the GVG-110 general purpose contact-closure editor interface (GPI) is to allow

A

remote control of switcher transitions.

728
Q

The GVG-110 video switcher serial interface allows

A

remote control of the switcher by a personal computer or digital picture manipulator.

729
Q

What are the frequencies at which the two common mode nulling adjustments are set in the video distribution amplifier?

A

60 Hz and 5.5 MHz.

730
Q

What is the beginning of a cable system called?

731
Q

What device is used to combine TV channels into a single line?

A

Modulator.

732
Q

What component carries the signal to individual subscribers?

A

Trunk line.

733
Q

What must a line of detection detect?

A

Walking, running, rolling, crawling, or jumping through the line of detection.

734
Q

What is the main purpose of a boundary fence?

A

To present a physical and psychological deterrent to unauthorized entry.

735
Q

The security lighting inside the restricted area is used to

A

facilitate the detection and tracking of intruders.

736
Q

The basic configuration of the entry control facility (ECF) includes a

A

gatehouse, personnel entry gate, inspection equipment, and vehicle entrapment area.

737
Q

What interior intrusion detection system (IIDS) is designed to detect intruders attempting to
enter a shelter, storage igloo, or building?

A

AN/GSS-39.

738
Q

What annunciator is used with the Advisor VIII control unit?

A

Small permanent communications and display segment (SPCDS).

739
Q

What does the AN/GSS-39 system use to monitor the integrity of all sensor wiring to the
control panel?

A

EOL module.

740
Q

Which sensor uses heat radiation to detect intruders?

A

Passive infrared.

741
Q

What is the range of the alternate current (AC) presence time delay relay in the AN/GSS-39 system before a power loss is reported?

A

1.5 to 15 seconds.

742
Q

Between what ranges can you adjust the SDI-76 microwave sensor?

A

15-75 feet.

743
Q

What type signal is sent to the fence protection system (FPS) signal processor when an
alarm is detected?

744
Q

A standard Air Force E-Flex II monitors how many meters?

745
Q

Which is not a selectable option of the E-Flex II system?

A

Sector reporting priority.

746
Q

What is the maximum length of the vertical taut-wire sensor (VTWS)?

747
Q

What is the maximum length of the Y taut-wire sensor (YTWS)?

748
Q

What type alarm occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is
removed?

749
Q

In the event of a power failure, how many hours can the vertical taut-wire sensor (VTWS) remain operational?

750
Q

How many inches is the beam width at the widest portion of the infrared perimeter detection
sensor?

751
Q

At what distance does the detection pattern of the infrared perimeter detection sensor
(IPDS) transmitters change, and to what pattern does it change?

A

150 feet; signal transmitted to two receivers.

752
Q

What is the operating frequency of the synchronizing oscillator in the “A” sensor post of the infrared pulsed intrusion detection system (IPIDS)?

753
Q

What is the primary mode of detection for the microwave fence sensor?

A

Beam break.

754
Q

When aligning a microwave fence sensor, what reading do you look for from the automatic gain control (AGC) using a multimeter?

A

Lowest possible.

755
Q

How does the T-Bus relate to the function of the Promina?

A

The information that is multiplexed/demultiplexed travels over the T-Bus.

756
Q

Asymmetric trunk operation provides more efficient use of bandwidth by

A

not utilizing the bandwidth in the opposite direction of a one-way call.

757
Q
Which module provides encryption/decryption of traffic into and out of the theater
deployable communications/integrated communications access package (TDC/ICAP) network?
758
Q

If all deployed and fixed locations use global positioning system (GPS) referenced clocks,
we can eliminate crypto-sync loss due to

A

timing slips.

759
Q

What is the maximum number of channels of voice and/or data traffic that the FCC-100 can
handle?

760
Q

How many card slots does the FCC-100 have, and how many of them are available for user
configuration?

761
Q

For either secure or nonsecure data network in theater deployable communications (TDC),
the Crypto Interface Module’s router normally acts as the

A

external router.

762
Q

For a theater deployable communications (TDC) network design that has the crypto
interface module (CIM) and the Promina Multiplexer (P-MUX) in separate locations, which piece
of equipment is necessary?

A

CV-2048/8448-D.

763
Q

The Integrated Services Digital Network (ISDN) Gateway Exchange (IGX) switch allows
for stacks of up to 8 IGX switches, while the Avaya Prologix switch can operate in a stack of.

764
Q

The tactical interface gateway (TIG) uses what protocol to allow backwards compatibility between the Avaya Prologix and legacy Triservice Tactical Communications (TRI-TAC)
equipment?

765
Q

What configuration does the Red Data Module normally operate in?

A

Gateway/client.

766
Q

The next generation receive terminal (NGRT) accepts feeds from which two satellite bands?

767
Q

What receive broadcast manager (RBM) processes military specific and classified
information?

768
Q

Which piece of the receive broadcast manager (RBM) functions as a common television settop
converter box?

A

Video converter.

769
Q

A status acquisition message (SAM) is sent from

A

Defense Informaiton Technology Contracting Office (DITCO).

770
Q

Circuits that fail to meet all parameters specified in the appropriate technical schedule when
test and acceptance (T&A) is done may not be accepted for service without the express approval
of

A

the Telecommunications Service Order (TSO) issuing authority.

771
Q
Within how many normal duty hours of completion action on the Telecommunications
Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?
772
Q

What report must be sent if the circuit does not meet all required parameters and the
Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

A

Exception.

773
Q

Trend Analysis is a program that trends all of these outage data except

A

preempted outages.

774
Q

Trend Analysis is a program that ensures circuits meet management thresholds (MT) on
what basis?

775
Q

If a circuit fails its management threshold (MT), what test might be performed?

A

Quality control (QC).

776
Q

The first position of a trunk identifier indicates the

A

“from” (sending) station.

777
Q

Which Defense Information Systems Agency Circular(s) (DISAC) contain information
needed to assign a temporary command communications service designator (CCSD)?

A

310-70-1 and 310-55-1.

778
Q

Which office or system confirms a restoration priority?

A

National Communications System (NCS).

779
Q

What are the two parts/priorities to the Telecommunications Service Priority (TSP)?

A

provisioning and restoration.