VOLUME 2, SET 1 URE's Flashcards
(001) Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight,
beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
a. Radio Frequency Transmission Systems (3D1X3).
b. Cyber Transport Systems (3D1X2).
c. Spectrum Operations (3D1X4).
d. Client Systems (3D1X1).
a. Radio Frequency Transmission Systems (3D1X3).
(002) Which of the following is not a communications security program duty and responsibility for Cyber Transport Systems?
a. Transmission security.
b. Technical security.
c. Emission security.
d. Physical security.
b. Technical security.
(003) What is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field?
a. Core duty.
b. Core value.
c. Core competency.
d. Core responsibility.
c. Core competency.
(003) Which of the following is a core competency of Cyber Transport Systems?
a. Fixed cable systems.
b. Voice network systems.
c. Application software systems.
d. Client-server database systems
b. Voice network systems.
(004) Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?
a. 1118.
b. 457.
c. 55.
d. 3
b. 457.
(005) Which hazard is not one of the four major types of hazards?
a. Biological.
b. Chemical.
c. Physical.
d. Nuclear.
d. Nuclear.
(005) Which hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?
a. Biological.
b. Chemical.
c. Physical.
d. Stress.
d. Stress.
(005) To prevent manual handling hazards, utilize team lifting when lifting items that weigh more than how many pounds?
a. 25.
b. 50.
c. 75.
d. 100.
a. 25.
(005) When working on electrical circuits, the role of safety observer is normally performed by the
a. trainer.
b. certifier.
c. technician.
d. supervisor
d. supervisor
(005) When working on electrical circuits, you may only wear metal framed eyeglasses if
a. the circuit is energized.
b. you have a valid prescription.
c. they are certified for high voltage.
d. they are secured with a nonmetallic cord.
d. they are secured with a nonmetallic cord.
(006) To whom does the risk management (RM) process apply?
a. All personnel.
b. Only safety personnel.
c. Only civilian personnel.
d. Only medical personnel
a. All personnel.
(006) What simple, systematic process allows commanders to maximize combat capability, while
limiting risk?
a. Risk control.
b. Safety control.
c. Risk management.
d. Safety management.
c. Risk management.
(007) Which of the following is a principle of risk management (RM)?
a. Accept unnecessary risk.
b. Apply the RM process continuously.
c. Train and adhere to safety guidelines.
d. Make risk decisions at the lowest level.
b. Apply the RM process continuously.
(007) How many steps are in the risk management (RM) process?
a. Four.
b. Five.
c. Six.
d. Seven.
b. Five.
(008) An enclave that does not have a firewall and intrusion detection system (IDS) is classified
as having what category of vulnerability?
a. I.
b. II.
c. III.
d. IV.
a. I.
(008) How many Integrated Network and Operation Security Centers (INOSC) does the Air Force have?
a. One.
b. Two.
c. Three.
d. Four.
b. Two.
(008) The Integrated Network Operations and Security Centers (INOSC) has several responsibilities except?
a. maintain sole administrative privileges on the firewall.
b. standardize, configure, back up, and otherwise maintain the firewall.
c. maintain a single naming/configuration standard for boundary devices.
d. install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).
d. install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).
(009) Which term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP)?
a. IP telephony.
b. Network telephony.
c. Voice protection system.
d. Voice over Internet Protocol (VoIP).
a. IP telephony.
(009) You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except?
a. enabling access control lists (ACL) on firewalls, routers, and switches.
b. deploying protection from dynamic host configuration protocol (DHCP) spoofing.
c. consolidating your voice with your data using virtual local area networks (VLAN).
d. enabling port security access to only allow the required devices needed by the client.
c. consolidating your voice with your data using virtual local area networks (VLAN).
(009) At which open systems interconnect (OSI) layer does a packet filter gateway operate at?
a. 2.
b. 3.
c. 4.
d. 5.
b. 3.
(009) At which open systems interconnect (OSI) layer does a circuit layer gateway operate?
a. 3.
b. 4.
c. 5.
d. 6.
b. 4.
(009) At which open systems interconnect (OSI) layer does an application-level firewall operate?
a. 4.
b. 5.
c. 6.
d. 7.
d. 7.
(010) The disadvantage of a host-based intrusion detection system (HIDS) is that it
a. can analyze any encrypted data if it is decrypted before reaching the target host.
b. consumes resources on the host it resides on and slows that device down.
c. monitors log files for inadvisable settings or passwords.
d. monitors traffic on the host on which it is installed.q
b. consumes resources on the host it resides on and slows that device down.
(010) One advantage of a network-based intrusion detection system (NIDS) is that it
a. can decrypt data.
b. uses very few network resources.
c. monitors logs for policy violations.
d. can analyze encrypted network traffic.
b. uses very few network resources.
(010) Which intrusion detection system (IDS) uses software sensors?
a. Active.
b. Passive.
c. Host-based.
d. Network-based.
c. Host-based.
(010) Which intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures?
a. Active.
b. Passive.
c. Host-based.
d. Network-based.
d. Network-based.
(010) Host-based intrusion detection systems (HIDS) are?
a. active only.
b. passive only.
c. passive and active.
d. neither passive nor active.
c. passive and active.
(010) Network-based intrusion detection systems (NIDS) are?
a. active only.
b. passive only.
c. passive and active.
d. neither passive nor active
b. Passive only.
(011) What security posture permits everything that is not specifically denied?
a. Default deny.
b. Default allow.
c. Close.
d. Open.
d. Open.
(012) What type of certificate authenticates the identity of the user?
a. Digital.
b. Biometric.
c. Encryption.
d. E-mail signing.
a. Digital.
(012) What is the first line of defense in securing laptops?
a. Set a login ID and password combination for access.
b. Install biometrics and encryption certificates.
c. Place a lock on computer.
d. Store in locked case.
a. Set a login ID and password combination for access.
(013) The definition of integrity as applied to identification, authentication, and encryption is
a. having information ready when needed.
b. not being able to deny who performed network actions.
c. the protection of the network from those not authorized access.
d. the assurance that no one has changed or destroyed information without permission.
d. the assurance that no one has changed or destroyed information without permission.
(014) What Air Force Systems Security Instruction (AFSSI) series covers emission security (EMSEC)?
a. 2000.
b. 3000.
c. 7000.
d. 8500
c. 7000.
(015) Which AF System Security Instruction (AFSSI) provides the overall implementation of
DOD’s TEMPEST program?
a. 7700.
b. 7701.
c. 7702.
d. 7703
a. 7700.
(015) Which method of containing radiated emanations requires both facility and equipment testing?
a. Zoning.
b. Shielding.
c. Suppression.
d. Profile matching.
a. Zoning.
(015) A facility with an inspectable space of more than 20 meters, but less than 100 meters would
be considered to be in facility zone?
a. A.
b. B.
c. C.
d. D.
b. B.
(015) Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100 meters would
be considered to be in equipment zone
a. A.
b. B.
c. C.
d. D
c. C.
(015) Why must the use of TEMPEST-certified equipment be validated by an AF Certified
TEMPEST technical authority (CTTA) prior to testing an inspectable space?
a. It requires Department of Defense (DOD) approval.
b. It requires certification.
c. It is time consuming.
d. It is expensive.
d. It is expensive.
(015) What plays a major role in a conductor’s ability to minimizing compromising emanations?
a. Distance and angle.
b. Distance and separation.
c. Induction and grounding.
d. Induction and impedance.
a. Distance and angle.
(016) Equipment is comprised as machines that process information in electronic or electrical
form. What equipment should be designated as RED?
a. Equipment processing clear-text confidential information.
b. Equipment processing clear-text unclassified information.
c. Equipment processing encrypted classified information.
d. Equipment processing clear-text classified information.
d. Equipment processing clear-text classified information.