Volume 2 Flashcards
What tool must you use in order to create a new ticket?
a. Remedy.
b. Remedy new.
c. Remedy user.
d. Remedy ticket.
c. Remedy user.
Depending on the problem type, what are the two types of forms used in Remedy?
a. Software or hardware.
b. Software and equipment.
c. Application or hardware.
d. Application and equipment.
a. Software or hardware.
In Remedy, to whom are the tickets assigned to fix problems?
a. A resolution group only.
b. A specific technician only.
c. Remedy automatically assigns tickets.
d. A resolution group or specific technician.
d. A resolution group or specific technician.
The Integrated Maintenance Data System (IMDS) interface with the Enterprise System-Supply (ES-S) replaces what system throughout the maintenance complex?
a. Reliability and Maintainability System (REMIS).
b. Telephone Management System.
c. Standard Base Supply System (SBSS).
d. Remedy.
c. Standard Base Supply System (SBSS).
Which is not a function of the Integrated Maintenance Data System (IMDS)?
a. Automate equipment history, scheduling, and other processes.
b. Function as a common interactive interface for other systems.
c. Roll base-level logistics data up to the Air Force level.
d. Provide status and inventory data.
c. Roll base-level logistics data up to the Air Force level.
The Asset Inventory Management System (AIMS) is an online database program that is a part of the
a. Air Force Equipment Management System (AFEMS).
b. Telecommunications Management System (TMS).
c. Integrated Maintenance Data System (IMDS).
d. Automated Information System (AIS).
a. Air Force Equipment Management System (AFEMS).
Asset Inventory Management System (AIMS) is used to track and manage what Air Force assets?
a. Weapons.
b. Support.
c. Telephone.
d. Communications.
d. Communications.
The Asset Inventory Management System (AIMS) system includes what type of database and is located where?
a. Access database at Randolph Air Force Base (AFB).
b. Access database at Wright-Patterson AFB.
c. Oracle database at Wright-Patterson AFB.
d. Oracle database at Randolph AFB.
c. Oracle database at Wright-Patterson AFB.
Which method is not a means for secure telecommunications?
a. Defense Courier Service.
b. Protected distribution system.
c. Communications security equipment.
d. Intrusion Detection Optical Communications System.
a. Defense Courier Service.
In the RED/BLACK concept, what type of traffic do RED lines carry?
a. Encrypted classified.
b. Encrypted unclassified.
c. Unencrypted classified.
d. Unencrypted unclassified.
c. Unencrypted classified.
In the RED/BLACK concept, what type of traffic do BLACK lines carry?
a. Encrypted classified or unclassified.
b. Encrypted classified only.
c. Unencrypted classified.
d. Unclassified only.
a. Encrypted classified or unclassified.
Which two parts does the RED/BLACK concept have?
a. Physical separation and electromagnetic separation.
b. Electromagnetic separation and electrical separation.
c. Physical separation and electrical separation.
d. Physical separation and emission separation.
c. Physical separation and electrical separation.
What is the purpose of the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program?
a. Eliminate all instances of radiation of electrical impulses.
b. Reduce the chances of radiation of electrical impulses.
c. Improve the signal of radiation of electrical impulses.
d. Increase the range of radiation of electrical impulses.
b. Reduce the chances of radiation of electrical impulses.
What is the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program in the Air Force called?
a. Communications security.
b. Transmission security.
c. Emission security.
d. Computer security.
c. Emission security.
What area is described as a complete building or facility area under direct physical control where unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?
a. Controlled access area (CAA).
b. Restricted access area (RAA).
c. Limited control area (LCA).
d. Uncontrolled access area (UAA).
a. Controlled access area (CAA).
Protected distribution systems (PDS) require which scheduled inspections?
a. Communications security.
b. Line route or visual.
c. Separation.
d. Electrical.
b. Line route or visual.
Protected distribution systems (PDS) events such as alarms, technical inspections, and other pertinent information are recorded in which log?
a. Emission security (EMSEC).
b. Transient Electromagnetic Pulse Emanation Standard (TEMPEST).
c. Inspection.
d. Protected Distribution Systems (PDS).
d. Protected Distribution Systems (PDS).
A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the
a. total surface.
b. visible area.
c. concealed area.
d. observable area.
a. total surface.
What are the two different types of current used for power?
a. 100 v (volts) and 210 v.
b. 105 v and 215 v.
c. 110 v and 220 v.
d. 115 v and 225 v.
c. 110 v and 220 v.
What are the two main options for storing electricity in an uninterruptible power supply (UPS)?
a. Storage batteries or a power wheel.
b. Storage batteries or a flywheel.
c. Batteries or a power wheel.
d. Batteries or a flywheel.
d. Batteries or a flywheel.
Which uninterruptible power supply (UPS) system is generally used for larger loads and currents?
a. Storage batteries.
b. Power wheel.
c. Flywheel.
d. Batteries.
c. Flywheel.
Which is not a consideration when selecting storage batteries for the central office?
a. The office power requirements.
b. The amount of floor space available.
c. Future subscriber growth and reserve time required.
d. The number of alternating current converters in the office.
d. The number of alternating current converters in the office.
In electrical power equipment, the generator can be two types, reciprocating or
a. turbine batteries.
b. a turbine engine.
c. an engine.
d. batteries.
b. a turbine engine.
Which fuel is not used for reciprocating generators?
a. Diesel.
b. Gasoline.
c. Fossil fuel.
d. Liquid petroleum.
c. Fossil fuel.
Who becomes responsible for life-cycle maintenance once the installation of cyberspace equipment is complete?
a. Production work center or communication squadron.
b. Production work center or contractor.
c. Communications squadron.
d. Production work center.
b. Production work center or contractor.
The approval or disapproval of all approved changes in the configuration is known as
a. configuration.
b. configuration item.
c. configuration control.
d. configuration identification.
c. configuration control.
Which one of these requires the use of the latest technical order (TO) information listed?
a. Configuration.
b. Configuration item.
c. Configuration control.
d. Configuration identification.
b. Configuration item.
Which of these statements pertains to configuration management?
a. Identify and document the functional and physical characteristics of a CI.
b. Record and report change processing and implementation status.
c. Control changes to the functional and physical characteristics of a CI.
d. All of the above.
d. All of the above.
What are the two standards for termination of Category 5 (CAT 5) and Category 6 (CAT 6)?
a. T–586 and T–586A.
b. T–586A and T–586B.
c. T–568 and T–568A.
d. T–568A and T–568B.
d. T–568A and T–568B.
Permanent markings can be completed by how many different methods?
a. 1.
b. 2.
c. 3.
d. 4.
b. 2.
What publication governs the format of Alias names for e-mail accounts?
a. Air Force Systems Security Instruction (AFSSI) 8502, Organizational Computer Security.
b. Air Force Instruction (AFI) 17–130, Cybersecurity Program Management.
c. AFI 33–201, Communications Security (COMSEC).
d. AFSSI 7700, Emission Security.
b. Air Force Instruction (AFI) 17–130, Cybersecurity Program Management.
What exchange tab is used to add, delete, or modify user accounts that can receive as or send as for the account?
a. Intercluster Lookup Service (ILS) settings.
b. Mailbox rights.
c. Mailbox security.
d. Custom attributes.
c. Mailbox security.
What exchange tab is used to add, delete, or modify user accounts that have special permissions to the account?
a. Intercluster Lookup Service (ILS) settings.
b. Mailbox rights.
c. Mailbox security.
d. Custom attributes.
b. Mailbox rights.
Which is not a reason why extreme caution should be used when deleting an e-mail account?
a. The user’s e-mail will be deleted from the Exchange server.
b. Restoring deleted e-mail requires proper justification.
c. The wrong account could be deleted.
d. Restoring deleted e-mail is difficult.
b. Restoring deleted e-mail requires proper justification.
What automatically happens to an e-mail account when the user’s domain account is deleted?
a. Changed.
b. Deleted.
c. Updated.
d. Reviewed.
b. Deleted.
How many objects can be manipulated at a time in directory and resource administrator (DRA)?
a. 1.
b. 2.
c. 3.
d. 4.
a. 1.
When using a Secure Terminal Equipment (STE), what is encrypted?
a. The analog signal.
b. The digital signal.
c. The multiplexed signal.
d. The sender’s private key.
b. The digital signal.
What components are used in both encryption and decryption?
a. Algorithm and key.
b. Certificate and key.
c. Telephone and receiver.
d. Algorithm and certificate.
a. Algorithm and key.
What are the two basic types of computer cryptology?
a. Symmetric-public key system and asymmetric-secret key system.
b. Symmetric-secret key system and asymmetric-secret key system.
c. Symmetric-secret key system and asymmetric-public key system.
d. Symmetric-public key system and asymmetric-public key system.
c. Symmetric-secret key system and asymmetric-public key system.
What is the advantage of symmetric cryptology?
a. Speed.
b. Storage.
c. Security.
d. Standards.
a. Speed.