Volume 3 Flashcards

0
Q

What cabling is the most commonly used?

A

Unshielded twisted pair (UTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

What condition occurs when a signal is induced into one circuit from another?

A

Crosstalk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which category (Cat) of cable can support data rates up to 100 Mbps?

A. Cat 3
B. Cat 5
C. Cat 6
D. Cat 5E

A

B. Cat 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which principle is not addressed in the ANSI/TIA/EIA–568–B standard?

A. Connector and pin assignment
B. Subsystems of structured cabling
C. Installation methods and practices
D. Recommended wireless topology and distances

A

D. Recommended wireless topology and distances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?

A. Minimum requirements for telecommunications cabling
B. Life span of a telecommunications cabling system
C. Connecting hardware performance specifications
D. Color of the cable

A

D. Color of the cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which TIA/EIA parameter test is a measure of the decrease of signal strength as he travels down the media?

A

Insertion loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?

A

Near-end Crosstalk (NEXT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which parameter test is a measure of the degree of impedance mismatch between two impedances?

A

Return loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system provides the point at which outdoor cabling interfaces with the the intrabuilding backbone cabling?

A

Entrance facility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What cabling system subsystem provides any or all of the functions of a telecommunications room?

A

Equipment room

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which subsystem of the ANSI/TIA/EIA-568-B structured cabling can be used for connections between floors?

A

Backbone cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which subsystem of the ANSI/TIA/EIA-568-B structured cabling can be used to interconnect buildings?

A

Backbone cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which subsystem of the ANSI/TIA/EIA-568-B structured cabling extends from the telecommunications room to the work area telecommunications information outlets?

A

Horizontal cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which subsystem of the ANSI/TIA/EIA-568-B structured cabling recognizes multimode cable?

A

Horizontal cabling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The work area of the ANSI/TIA/EIA-568-B structured cabling system consists of all except which components?

A. Patch cables
B. Adapters
C. Patch panels
D. Station equipment

A

C. Patch panels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which ANSI/TIA/EIA standard defines labeling cables and patch panels?

A

606-A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What Air Force systems security instruction (AFSSI) directs implementation of protected distribution systems?

A

7703

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which method is not a means for secure telecommunications?

A. Using Defense Courier service
B. Using protected distribution system
C. Using communications security equipment
D. Using intrusion detection optical communications system

A

A. Using Defense Courier service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In the RED/BLACK concept, what type of traffic do RED lines carry?

A

Unencrypted classified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The RED/BLACK concept has which two parts?

A

Physical separation and electrical separation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TEMPEST is

A

An unclassified term and a US Government code word that identifies a classified set of standards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the purpose of the TEMPEST program?

A

Reduce the chances of radiation of electrical impulses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the TEMPEST program in the Air Force called?

A

Emission security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What area is described as the complete building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

A

Controlled Access Area (CAA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Protected distribution systems (PDS) require which scheduled inspections?

A

Line route inspections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Protected distribution systems (PDS) events such as alarms and inspections are recorded where?

A

Protected distribution system (PDS) log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

A line route inspection of the protected distribution system (PDS) consists of a close visual inspection that must include the

A

Total surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

When using a Secure Terminal Equipment (STE), what is encrypted?

A

The digital signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is the difference between data encryption and voice encryption?

A

In data, the encryption is handled by a separate device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What components are used in both encryption and decryption?

A

Algorithm and key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are the two basic types of computer cryptology?

A

Symmetric-secret key system and asymmetric-public key system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which cryptology system has a disadvantage of using more processing power and time?

A

Asymmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which authorities are trusted entities that issue certificates?

A

Certification Authorities (CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What infrastructure is a set of hardware, software, policies and procedures used to create, manage, store, distribute and revoke digital certificates?

A

Public Key Infrastructure (PKI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the Web server give to the browser?

A

Its public key

35
Q

What are the two major types of encryption algorithms in use today that operate by encrypting or decrypting one chunk of data at a time?

A

Block algorithms and stream ciphers

36
Q

Data Encryption Standard (DES) uses how many bits for its key?

A

64

37
Q

Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

A

Three

38
Q

Which encryption is not a telecommunications encryption type?

A

Open

39
Q

Communications Security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure

A

Authenticity

40
Q

The Communications Security (COMSEC) program is designed to

A

Deflect unauthorized interception and analysis of compromising emanations

41
Q

What reference would you use for guidance on Air Force messaging?

A

AFI 33-119

42
Q

Which Communications Security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

A

Physical security

43
Q

Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy Cmmunications security (COMSEC) material?

A

AFI 33-201, Volume 1

44
Q

Top secret keying material must be handled, stored, transported and destroyed under

A

COMSEC responsible officer (CRO) control

45
Q

Which form is used with a transfer report to accompany a communications security (COMSEC) package?

A

SF 153 (COMSEC material report)

46
Q

When a security container is opened, it is inventoried at the

A

End of the shift or duty day

47
Q

Which form is used as a register log to record visitors into restricted areas?

A

AF Form 1109

48
Q

What is the newest generation of secure voice telephone?

A

Secure terminal equipment (STE)

49
Q

Which secure voice telephone can be used on the integrated services digital network (ISDN)?

A

STE

50
Q

The secure telephone equipment (STE) consists of what two parts?

A

Host terminal and removable security core

51
Q

The secure telephone equipment (STE) cannot communicate securely with the

A

Land mobile radio

52
Q

Which port on the office version STE can be used to connect to a fax machine?

A

RS-232

53
Q

What provides the STE with its security services?

A

Fortezza card

54
Q

The KIV-7 crypto graphic device provides protection up to what classification level?

A

Top secret

55
Q

The KIV-7 does not support which set of electrical standards?

A

RS-422

56
Q

TACLANE-Classic and TACLANE-E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for which type of network?

A

Internet protocol networks

57
Q

What is the maximum throughput in megabits per second (Mbps) for the TACLANE-E100?

A

165 for full duplex and 100 for half duplex

58
Q

The KG-175D is what type of tactical local area network encryptor (TACLANE)?

A

TACLANE-micro

59
Q

The TACLANE-micro is a packet encryption device for Internet protocol

A

Version 4 and version 6

60
Q

TACLANE-micro maybe equipped to handle all of the following types of networks except?

A

Wireless

61
Q

The TACLANE-micro can acquire an IP address via DHCP on which side?

A

Ciphertext or plaintext

62
Q

The TACLANE-micro can be used to overlay what type of networks on top of existing public and private network infrastructures?

A

Secure virtual networks

63
Q

Which common crypto fill device is battery powered and has no internal memory storage?

A

KOI-18 General purpose tape reader

64
Q

Which common crypto fill device is a handheld personal computer compatible device and is a cryptographic controlled item (CCI)?

A

AN/CYZ-10 Data transfer device

65
Q

Which common crypto fill device is capable of downloading cryptographic keys to over 70 end item communications security (COMSEC) equipment and Communications Systems?

A

AN/PYQ-10 Simple key loader

66
Q

Which common crypto fill device uses the Windows CE operating system?

A

AN/PYQ-10 Simple key loader

67
Q

In Remedy, tickets can be assigned to whom?

A

A resolution group or specific technician

68
Q

Who may close tickets in Remedy?

A

Help desk

69
Q

Only after what, are tickets allowed to be placed in the “Closed” status in Remedy?

A

Step-by-step fix actions have been annotated

70
Q

Integrate maintenance data system (IMDS) is an Air Force enterprise-level automated maintenance management information system for

A

Weapons systems and support equipment

71
Q

Which is not a function that maintainers perform with the IMDS?

A. Automate equipment history, scheduling, and other processes
B. Function as a common interactive interface for other systems
C. Roll base level logistics data up to the Air Force level
D. Provide status and inventory data

A

C. Roll base level logistics data up to the Air Force level

72
Q

The asset inventory management (AIM) is part of what?

A

Air Force equipment management system (AFEMS)

73
Q

The asset inventory management (AIM) system includes what type of database and is located where?

A

Oracle database at Wright Patterson Air Force Base

74
Q

Which voicemail system was one of the earliest digital voice mail systems running on a private branch exchange (PBX)?

A

Meridian mail

75
Q

Which way to send a network message using the Call Pilot voice mail system is only available with the Audio Message Interchange Specification (AMIS) protocol?

A

Direct addressing

76
Q

Which application has not been used for automating central office records?

A

Integrated maintenance data system (IMDS)

77
Q

The Air Force has adopted Telecommunications Management System (TMS) as the standard application to maintain and generate

A

Central office records

78
Q

Which feature is an automated Telecommunications Management System (TMS) advantage?

A. Design
B. Site specific
C. Software Compatibility
D. Data network restrictions

A

A. Design

79
Q

Which feature is an automated TMS advantage?

A. Site specific
B. Software compatibility
C. Data network restrictions
D. Network management functions

A

D. Network management functions

80
Q

Which TMS network management functional area contains line, circuit, cable, and customer information?

A

Configuration management

81
Q

Which network management functional area monitors and audits the TMS operating level?

A

Performance management

82
Q

What are the two types of accounts supported by Windows operation systems?

A

Domain and local

83
Q

Which is not a use for local user accounts?

A. To have a computer act as a stand-alone system
B. To control a user’s permissions on the local network
C. To limit a user’s access to the printers on the local machine
D. To limit a user’s access programs on the local machine

A

B. To control a user’s permissions on the local network

84
Q

Why are users required to change their passwords upon logging onto the network for the first time?

A

To ensure users don’t create vulnerability by leaving the default password in place

85
Q

What publication governs the format of alias means for email accounts?

A

AFI 33-119