Term
What condition occurs when a signal is induced into one circuit from another?
a. Noise.
b. Jabber.
c. Crosstalk.
d. Intelligence. |
|
Definition
a. Noise.
b. Jabber.
c. Crosstalk.
d. Intelligence. |
|
|
Term
What cabling is the most commonly used?
a. Unshielded twisted pair (UTP).
b. Screened twisted pair (ScTP).
c. Shielded twisted pair (STP).
d. Foiled twisted pair (FTP). |
|
Definition
a. Unshielded twisted pair (UTP).
b. Screened twisted pair (ScTP).
c. Shielded twisted pair (STP).
d. Foiled twisted pair (FTP). |
|
|
Term
Which category (Cat) of cable can support data rates up to 100Mbps?
a. Cat 3.
b. Cat 5.
c. Cat 6.
d. Cat 5E. |
|
Definition
a. Cat 3.
b. Cat 5.
c. Cat 6.
d. Cat 5E. |
|
|
Term
Which principle is not addressed in the ANSI/TIA/EIA–568–B standard?
a. Connector and pin assignment.
b. Subsystems of structured cabling.
c. Installation methods and practices.
d. Recommended wireless topology and distances. |
|
Definition
a. Connector and pin assignment.
b. Subsystems of structured cabling.
c. Installation methods and practices.
d. Recommended wireless topology and distances. |
|
|
Term
Which principle is not addressed in the ANSI/TIA/EIA–568–B standard?
a. Minimum requirements for telecommunications cabling.
b. Life span of a telecommunications cabling system.
c. Connecting hardware performance specifications.
d. Color of the cable. |
|
Definition
a. Minimum requirements for telecommunications cabling.
b. Life span of a telecommunications cabling system.
c. Connecting hardware performance specifications.
d. Color of the cable. |
|
|
Term
Which TIA/EIA parameter test is a measure of the decrease of signal strength as it travels
down the media?
a. Absorption loss.
b. Insertion loss.
c. Penetration loss.
d. Return loss. |
|
Definition
a. Absorption loss.
b. Insertion loss.
c. Penetration loss.
d. Return loss. |
|
|
Term
Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a
transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?
a. Near-end crosstalk (NEXT).
b. Powersum near-end crosstalk (PSNEXT).
c. Powersum alien near-end crosstalk (PSANEXT).
d. Powersum insertion loss to alien crosstalk ratio far-end (PSAACRF). |
|
Definition
a. Near-end crosstalk (NEXT).
b. Powersum near-end crosstalk (PSNEXT).
c. Powersum alien near-end crosstalk (PSANEXT).
d. Powersum insertion loss to alien crosstalk ratio far-end (PSAACRF). |
|
|
Term
Which TIA/EIA parameter test is a measure of the degree of impedance mismatch between
two impedances?
a. Absorption loss.
b. Insertion loss.
c. Penetration loss.
d. Return loss. |
|
Definition
a. Absorption loss.
b. Insertion loss.
c. Penetration loss.
d. Return loss. |
|
|
Term
Which subsystem of the ANSI/TIA/EIA–568-B structured cabling system provides the point
at which outdoor cabling interfaces with the intrabuilding backbone cabling?
a. Entrance facility.
b. Equipment room.
c. Commercial demark.
d. Telecommunications room. |
|
Definition
a. Entrance facility.
b. Equipment room.
c. Commercial demark.
d. Telecommunications room. |
|
|
Term
What cabling system subsystem provides any or all of the functions of a
telecommunications room?
a. Entrance facility.
b. Equipment room.
c. Systems room.
d. Work area. |
|
Definition
a. Entrance facility.
b. Equipment room.
c. Systems room.
d. Work area. |
|
|
Term
Which subsystem of the ANSI/TIA/EIA–568–B structured cabling can be used for
connections between floors?
a. Intra cabling.
b. Backbone cabling.
c. Vertical cabling.
d. Horizontal cabling. |
|
Definition
a. Intra cabling.
b. Backbone cabling.
c. Vertical cabling.
d. Horizontal cabling. |
|
|
Term
Which subsystem of the ANSI/TIA/EIA–568–B structured cabling can be used to
interconnect buildings?
a. Inter cabling.
b. Backbone cabling.
c. Vertical cabling.
d. Horizontal cabling. |
|
Definition
a. Inter cabling.
b. Backbone cabling.
c. Vertical cabling.
d. Horizontal cabling. |
|
|
Term
Which subsystem of the ANSI/TIA/EIA–568–B structured cabling extends from the
telecommunications room to the work area telecommunications information outlets
a. Intra cabling.
b. Backbone cabling.
c. Vertical cabling.
d. Horizontal cabling. |
|
Definition
a. Intra cabling.
b. Backbone cabling.
c. Vertical cabling.
d. Horizontal cabling. |
|
|
Term
Which subsystem of the ANSI/TIA/EIA–568–B structured cabling recognizes multimode
cable?
a. Intra cabling.
b. Backbone cabling.
c. Vertical cabling.
d. Horizontal cabling. |
|
Definition
a. Intra cabling.
b. Backbone cabling.
c. Vertical cabling.
d. Horizontal cabling. |
|
|
Term
The work area of the ANSI/TIA/EIA–568–B structured cabling system consists of all except
which components?
a. Patch cables.
b. Adapters.
c. Patch panels.
d. Station equipment. |
|
Definition
a. Patch cables.
b. Adapters.
c. Patch panels.
d. Station equipment. |
|
|
Term
Which ANSI/TIA/EIA standard defines labeling cables and patch panels?
a. 606–A.
b. 666–A.
c. 568–A.
d. 568–B. |
|
Definition
a. 606–A.
b. 666–A.
c. 568–A.
d. 568–B. |
|
|
Term
What Air Force Systems Security Instruction (AFSSI) directs implementation of protected
distribution systems?
a. 33–202.
b. 7700.
c. 7703.
d. 7007. |
|
Definition
a. 33–202.
b. 7700.
c. 7703.
d. 7007. |
|
|
Term
Which method is not a means for secure telecommunications?
a. Using Defense Courier Service.
b. Using protected distribution system.
c. Using communications security equipment.
d. Using intrusion detection optical communications system. |
|
Definition
a. Using Defense Courier Service.
b. Using protected distribution system.
c. Using communications security equipment.
d. Using intrusion detection optical communications system.. |
|
|
Term
In the RED/BLACK concept, what type of traffic do RED lines carry?
a. Encrypted classified.
b. Encrypted unclassified.
c. Unencrypted classified.
d. Unencrypted unclassified. |
|
Definition
a. Encrypted classified.
b. Encrypted unclassified.
c. Unencrypted classified.
d. Unencrypted unclassified. |
|
|
Term
The RED/BLACK concept has which two parts?
a. Physical separation and electromagnetic separation.
b. Electromagnetic separation and electrical separation.
c. Physical separation and electrical separation.
d. Physical separation and emission separation. |
|
Definition
a. Physical separation and electromagnetic separation.
b. Electromagnetic separation and electrical separation.
c. Physical separation and electrical separation.
d. Physical separation and emission separation. |
|
|
Term
|
Definition
an unclassified term and a US Government code word that identifies a classified set of
standards. |
|
|
Term
What is the purpose of the TEMPEST program?
a. Eliminate all instances of radiation of electrical impulses.
b. Reduce the chances of radiation of electrical impulses.
c. Improve the signal of radiation of electrical impulses.
d. Increase the range of radiation of electrical impulses. |
|
Definition
a. Eliminate all instances of radiation of electrical impulses.
b. Reduce the chances of radiation of electrical impulses.
c. Improve the signal of radiation of electrical impulses.
d. Increase the range of radiation of electrical impulses. |
|
|
Term
What is the TEMPEST program in the Air Force called?
a. Communications Security.
b. Transmission Security.
c. Emission Security.
d. Computer Security. |
|
Definition
a. Communications Security.
b. Transmission Security.
c. Emission Security.
d. Computer Security. |
|
|
Term
What area is described as the complete building or facility area under direct physical control
within which unauthorized persons are denied unrestricted access and are either escorted by
authorized persons or are under continuous physical or electronic surveillance?
a. Controlled Access Area (CAA).
b. Restricted Access Area (RAA).
c. Limited-Control Area (LCA).
d. Uncontrolled Access Area (UAA). |
|
Definition
a. Controlled Access Area (CAA).
b. Restricted Access Area (RAA).
c. Limited-Control Area (LCA).
d. Uncontrolled Access Area (UAA). |
|
|
Term
Protected distribution systems (PDS) require which scheduled inspections?
a. Communications security inspections.
b. Separation inspections.
c. Line route inspections.
d. Electrical inspections. |
|
Definition
a. Communications security inspections.
b. Separation inspections.
c. Line route inspections.
d. Electrical inspections. |
|
|
Term
Protected distribution systems (PDS) events such as alarms and inspections are recorded
where?
a. Emission security (EMSEC) log.
b. TEMPEST log.
c. Protected distribution system (PDS) log.
d. Inspection log. |
|
Definition
a. Emission security (EMSEC) log.
b. TEMPEST log.
c. Protected distribution system (PDS) log.
d. Inspection log. |
|
|
Term
A line route inspection of a protected distribution system (PDS) consists of a close visual
inspection that must include the
a. total surface.
b. visible area.
c. observable area.
d. concealed area. |
|
Definition
a. total surface.
b. visible area.
c. observable area.
d. concealed area. |
|
|
Term
When using a Secure Terminal Equipment (STE), what is encrypted?
a. The analog signal.
b. The digital signal.
c. The multiplexed signal.
d. The sender’s private key. |
|
Definition
a. The analog signal.
b. The digital signal.
c. The multiplexed signal.
d. The sender’s private key. |
|
|
Term
What is the difference between data encryption and voice encryption?
a. Data is faster.
b. Voice is faster.
c. In data, the encryption is handled by separate device.
d. In voice, the encryption is handled by a separate device. |
|
Definition
a. Data is faster.
b. Voice is faster.
c. In data, the encryption is handled by separate device.
d. In voice, the encryption is handled by a separate device. |
|
|
Term
What components are used in both encryption and decryption?
a. Algorithm and key.
b. Algorithm and certificate.
c. Certificate and key.
d. Telephone and receiver. |
|
Definition
a. Algorithm and key.
b. Algorithm and certificate.
c. Certificate and key.
d. Telephone and receiver. |
|
|
Term
What are the two basic types of computer cryptology?
a. Symmetric-public key system and asymmetric-secret key system.
b. Symmetric-secret key system and asymmetric-secret key system.
c. Symmetric-secret key system and asymmetric-public key system.
d. Symmetric-public key system and asymmetric-public key system. |
|
Definition
a. Symmetric-public key system and asymmetric-secret key system.
b. Symmetric-secret key system and asymmetric-secret key system.
c. Symmetric-secret key system and asymmetric-public key system.
d. Symmetric-public key system and asymmetric-public key system. |
|
|
Term
Which cryptology system has a disadvantage of using more processing power and time?
a. Symmetric.
b. Asymmetric.
c. Diametric.
d. None of the above, they’re all the same. |
|
Definition
a. Symmetric.
b. Asymmetric.
c. Diametric.
d. None of the above, they’re all the same. |
|
|
Term
Which authorities are trusted entities that issue certificates?
a. Hash.
b. Repository.
c. Certification.
d. Authentication. |
|
Definition
a. Hash.
b. Repository.
c. Certification.
d. Authentication. |
|
|
Term
What infrastructure is a set of hardware, software, policies and procedures used to create,
manage, store, distribute and revoke digital certificates?
a. Private Key.
b. Public Key.
c. Secure Key.
d. Authentication Key. |
|
Definition
a. Private Key.
b. Public Key.
c. Secure Key.
d. Authentication Key. |
|
|
Term
In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?
a. Its public key.
b. Its private key.
c. Its public certificate.
d. Its private certificate. |
|
Definition
a. Its public key.
b. Its private key.
c. Its public certificate.
d. Its private certificate. |
|
|
Term
What are the two major types of encryption algorithms in use today that operate by
encrypting or decrypting one chunk of data at a time?
a. Stream algorithms and block ciphers.
b. Secure algorithms and block ciphers.
c. Block algorithms and stream ciphers.
d. Block algorithms and secure ciphers. |
|
Definition
a. Stream algorithms and block ciphers.
b. Secure algorithms and block ciphers.
c. Block algorithms and stream ciphers.
d. Block algorithms and secure ciphers. |
|
|
Term
Data Encryption Standard (DES) uses how many bits for its key?
a. 64.
b. 128.
c. 192.
d. 256. |
|
Definition
a. 64.
b. 128.
c. 192.
d. 256. |
|
|
Term
Triple Data Encryption Standard (DES) is based on three compound operations of
encryption/decryption and can incorporate the use of how many individual keys?
a. One.
b. Two.
c. Three.
d. Four. |
|
Definition
a. One.
b. Two.
c. Three.
d. Four. |
|
|
Term
Which encryption is not a telecommunications encryption type?
a. Narrowband.
b. Network.
c. Bulk.
d. Open. |
|
Definition
a. Narrowband.
b. Network.
c. Bulk.
d. Open. |
|
|
Term
Communications Security (COMSEC) is defined as the measures and controls taken to deny
unauthorized persons information and to ensure
a. authenticity.
b. compliance.
c. integrity.
d. validity. |
|
Definition
a. authenticity.
b. compliance.
c. integrity.
d. validity. |
|
|
Term
The Communications Security (COMSEC) program is designed to
a. relocate classified material to strengthen security.
b. conduct assessments to evaluate compromise of national security.
c. deflect unauthorized interception and analysis of compromising emanations.
d. detect and correct procedural weaknesses that could expose critical information. |
|
Definition
a. relocate classified material to strengthen security.
b. conduct assessments to evaluate compromise of national security.
c. deflect unauthorized interception and analysis of compromising emanations.
d. detect and correct procedural weaknesses that could expose critical information. |
|
|
Term
What reference would you use for guidance on Air Force messaging?
a. AFI 33–119.
b. AFI 33–129.
c. AFI 33–219.
d. AFI 33–329. |
|
Definition
a. AFI 33–119.
b. AFI 33–129.
c. AFI 33–219.
d. AFI 33–329. |
|
|
Term
Which Communications Security (COMSEC) application provides us with guidance to
deter, detect, and defeat hostile acts against US Air Force priority resources?
a. Cyptosecurity.
b. Physical security.
c. Emission security.
d. Transmission security. |
|
Definition
a. Cyptosecurity.
b. Physical security.
c. Emission security.
d. Transmission security. |
|
|
Term
Where would you find guidance on how to properly store, control, safeguard, transfer, and
destroy Communications Security (COMSEC) material?
a. AFI 33–201, Volume 1.
b. AFI 33–202, Volume 1.
c. AFI 31–201, Volume 1.
d. AFI 31–202, Volume 1. |
|
Definition
a. AFI 33–201, Volume 1.
b. AFI 33–202, Volume 1.
c. AFI 31–201, Volume 1.
d. AFI 31–202, Volume 1. |
|
|
Term
Top secret keying material must be handled, stored, transported and destroyed under
a. courier control.
b. COMSEC manager control.
c. TPI control.
d. CRO control. |
|
Definition
a. courier control.
b. COMSEC manager control.
c. TPI control.
d. CRO control. |
|
|
Term
Which form is used with a transfer report to accompany a Communications Security
(COMSEC) package?
a. Standard Form (SF) 135.
b. SF 153.
c. SF 351.
d. SF 531. |
|
Definition
a. Standard Form (SF) 135.
b. SF 153.
c. SF 351.
d. SF 531. |
|
|
Term
When a security container is opened, it is inventoried at the
a. beginning of the week.
b. beginning of the duty day.
c. end of the week or month.
d. end of the shift or duty day. |
|
Definition
a. beginning of the week.
b. beginning of the duty day.
c. end of the week or month.
d. end of the shift or duty day. |
|
|
Term
Which form is used as a register log to record visitors into restricted areas?
a. AF Form 1019.
b. AF Form 1109.
c. AF Form 1119.
d. AF Form 1190. |
|
Definition
a. AF Form 1019.
b. AF Form 1109.
c. AF Form 1119.
d. AF Form 1190. |
|
|
Term
What is the newest generation of secure voice telephone?
a. Secure Telephone Unit (STU).
b. Cryptographic Telephone (CT).
c. Secure Terminal Equipment (STE).
d. Pretty Good Privacy Phone (PGPfone). |
|
Definition
a. Secure Telephone Unit (STU).
b. Cryptographic Telephone (CT).
c. Secure Terminal Equipment (STE).
d. Pretty Good Privacy Phone (PGPfone). |
|
|
Term
Which secure voice telephone can be used on the Integrated Services Digital Network
(ISDN)?
a. Secure Telephone Unit (STU).
b. Cryptographic Telephone (CT).
c. Secure Terminal Equipment (STE).
d. Pretty Good Privacy Phone (PGPfone). |
|
Definition
a. Secure Telephone Unit (STU).
b. Cryptographic Telephone (CT).
c. Secure Terminal Equipment (STE).
d. Pretty Good Privacy Phone (PGPfone). |
|
|
Term
The Secure Telephone Equipment (STE) consists of what two parts?
a. Host terminal and removable security core.
b. Security core and removable host terminal.
c. Host terminal and removable secret core.
d. Secret core and removable host terminal. |
|
Definition
a. Host terminal and removable security core.
b. Security core and removable host terminal.
c. Host terminal and removable secret core.
d. Secret core and removable host terminal. |
|
|
Term
The Secure Telephone Equipment (STE) cannot communicate securely with the
a. STU-III.
b. satellite telephone.
c. cellular telephone.
d. land mobile radio. |
|
Definition
a. STU-III.
b. satellite telephone.
c. cellular telephone.
d. land mobile radio. |
|
|
Term
Which port on the office version Secure Telephone Equipment (STE) can be used to
connect to a fax machine?
a. Universal Serial Bus (USB).
b. EIA 530.
c. RS–232.
d. Firewire. |
|
Definition
a. Universal Serial Bus (USB).
b. EIA 530.
c. RS–232.
d. Firewire. |
|
|
Term
What provides the Secure Telephone Equipment (STE) with its security services?
a. Fortezza card.
b. Crypto ignition key.
c. Common access card.
d. Traffic Encryption Key. |
|
Definition
a. Fortezza card.
b. Crypto ignition key.
c. Common access card.
d. Traffic Encryption Key. |
|
|
Term
The KIV–7 cryptographic device provides protection up to what classification level?
a. Secret.
b. Top Secret.
c. Confidential.
d. For Official Use Only (FOUO). |
|
Definition
a. Secret.
b. Top Secret.
c. Confidential.
d. For Official Use Only (FOUO). |
|
|
Term
The KIV–7 does not support which set of electrical standards?
a. RS–422.
b. EIA–644.
c. EIA–530.
d. RS–232. |
|
Definition
a. RS–422.
b. EIA–644.
c. EIA–530.
d. RS–232. |
|
|
Term
TACLANE–Classic and TACLANE–E100 are high-speed encryption devices that provide
confidentiality, data integrity, and authentication security services for which type of network?
a. Serial networks.
b. Tactical networks.
c. Point to point connections.
d. Internet Protocol networks. |
|
Definition
a. Serial networks.
b. Tactical networks.
c. Point to point connections.
d. Internet Protocol networks. |
|
|
Term
What is the maximum throughput in megabits per second (Mbps) for the TACLANE–E100? |
|
Definition
165 for full-duplex and 100 for half-duplex. |
|
|
Term
The KG–175D is what type of Tactical Local Area Network Encryptor (TACLANE)?
a. TACLANE–Classic.
b. TACLANE–E–100.
c. TACLANE–Duro.
d. TACLANE–Micro. |
|
Definition
a. TACLANE–Classic.
b. TACLANE–E–100.
c. TACLANE–Duro.
d. TACLANE–Micro. |
|
|
Term
The Tactical Local Area Network Encryptor (TACLANE)–Micro is a packet encryption
device for Internet Protocol (IP)
a. version 4 only.
b. version 5 only.
c. version 4 and version 5.
d. version 4 and version 6. |
|
Definition
a. version 4 only.
b. version 5 only.
c. version 4 and version 5.
d. version 4 and version 6. |
|
|
Term
The Tactical Local Area Network Encryptor (TACLANE)–Micro may be equipped to
handle all of the following types of networks except?
a. Asynchronous Transfer Mode (ATM).
b. Gigabit Ethernet.
c. Fast Ethernet.
d. Wireless. |
|
Definition
a. Asynchronous Transfer Mode (ATM).
b. Gigabit Ethernet.
c. Fast Ethernet.
d. Wireless. |
|
|
Term
The Tactical Local Area Network Encryptor (TACLANE)–Micro can acquire an Internet
Protocol (IP) address via Dynamic Host Configuration Protocol (DHCP) on which side?
a. Static IP only.
b. Plaintext only
c. Ciphertext only.
d. Ciphertext or plaintext. |
|
Definition
a. Static IP only.
b. Plaintext only
c. Ciphertext only.
d. Ciphertext or plaintext. |
|
|
Term
The Tactical Local Area Network Encryptor (TACLANE)–Micro can be used to overlay
what type of networks on top of existing public and private network infrastructures?
a. Non-Secure Internet Protocol Router Networks.
b. Secret Internet Protocol Router Networks.
c. Other public or private networks.
d. Secure Virtual Networks. |
|
Definition
a. Non-Secure Internet Protocol Router Networks.
b. Secret Internet Protocol Router Networks.
c. Other public or private networks.
d. Secure Virtual Networks. |
|
|
Term
Which common crypto fill device is battery powered and has no internal memory storage?
a. KOI–18 General Purpose Tape Reader.
b. KYK–13 Electronic Transfer Device.
c. AN/PYQ–10 Simple Key Loader.
d. AN/CYZ–10 Data Transfer Device. |
|
Definition
a. KOI–18 General Purpose Tape Reader.
b. KYK–13 Electronic Transfer Device.
c. AN/PYQ–10 Simple Key Loader.
d. AN/CYZ–10 Data Transfer Device. |
|
|
Term
Which common crypto fill device is a hand-held personal computer compatible device and
is a Cryptographic Controlled Item (CCI)?
a. KOI–18 General Purpose Tape Reader.
b. KYK–13 Electronic Transfer Device.
c. AN/PYQ–10 Simple Key Loader.
d. AN/CYZ–10 Data Transfer Device. |
|
Definition
a. KOI–18 General Purpose Tape Reader.
b. KYK–13 Electronic Transfer Device.
c. AN/PYQ–10 Simple Key Loader.
d. AN/CYZ–10 Data Transfer Device. |
|
|
Term
Which common crypto fill device is capable of downloading cryptographic keys to over 70
end item Communication Security (COMSEC) equipment and communications systems?
a. KOI–18 General Purpose Tape Reader.
b. KYK–13 Electronic Transfer Device.
c. AN/PYQ–10 Simple Key Loader.
d. AN/CYZ–10 Data Transfer Device. |
|
Definition
a. KOI–18 General Purpose Tape Reader.
b. KYK–13 Electronic Transfer Device.
c. AN/PYQ–10 Simple Key Loader.
d. AN/CYZ–10 Data Transfer Device. |
|
|
Term
Which common crypto fill device uses the Windows CE operating system?
a. KOI–18 General Purpose Tape Reader.
b. KYK–13 Electronic Transfer Device.
c. AN/PYQ–10 Simple Key Loader.
d. AN/CYZ–10 Data Transfer Device. |
|
Definition
a. KOI–18 General Purpose Tape Reader.
b. KYK–13 Electronic Transfer Device.
c. AN/PYQ–10 Simple Key Loader.
d. AN/CYZ–10 Data Transfer Device. |
|
|
Term
In Remedy, tickets can be assigned to whom?
a. A resolution group only.
b. A specific technician only.
c. A resolution group or specific technician.
d. Remedy automatically assigns tickets. |
|
Definition
a. A resolution group only.
b. A specific technician only.
c. A resolution group or specific technician.
d. Remedy automatically assigns tickets. |
|
|
Term
Who may close tickets in Remedy?
a. Customer.
b. Technician.
c. Shift lead.
d. Help Desk. |
|
Definition
a. Customer.
b. Technician.
c. Shift lead.
d. Help Desk. |
|
|
Term
Only after what, are tickets allowed to be placed in the “Closed” status in Remedy?
a. Confirmation has been received from the customer.
b. Step-by-step fix actions have been annotated.
c. 24 hours after repairing the problem.
d. Verification by the Help Desk. |
|
Definition
a. Confirmation has been received from the customer.
b. Step-by-step fix actions have been annotated.
c. 24 hours after repairing the problem.
d. Verification by the Help Desk. |
|
|
Term
Integrate Maintenance Data System (IMDS) is an Air Force enterprise-level automated
maintenance management information system for
a. weapons systems and support equipment.
b. weapons systems and operations equipment.
c. communication systems and support equipment.
d. communication systems and operations equipment. |
|
Definition
a. weapons systems and support equipment.
b. weapons systems and operations equipment.
c. communication systems and support equipment.
d. communication systems and operations equipment. |
|
|
Term
Which is not a function that maintainers perform with the Integrate Maintenance Data
System (IMDS)?
a. Automate equipment history, scheduling, and other processes.
b. Function as a common interactive interface for other systems.
c. Roll base-level logistics data up to the Air Force level.
d. Provide status and inventory data. |
|
Definition
a. Automate equipment history, scheduling, and other processes.
b. Function as a common interactive interface for other systems.
c. Roll base-level logistics data up to the Air Force level.
d. Provide status and inventory data. |
|
|
Term
The Asset Inventory Management (AIM) is part of what?
a. Air Force Equipment Management System (AFEMS).
b. Telecommunications Management System (TMS).
c. Integrated Maintenance Data System (IMDS).
d. Automated Information System (AIS). |
|
Definition
a. Air Force Equipment Management System (AFEMS).
b. Telecommunications Management System (TMS).
c. Integrated Maintenance Data System (IMDS).
d. Automated Information System (AIS). |
|
|
Term
The Asset Inventory Management (AIM) system includes what type of database and is
located where?
a. Access database at Randolph AFB.
b. Access database at Wright-Patterson AFB.
c. Oracle database at Wright-Patterson AFB.
d. Oracle database at Randolph AFB. |
|
Definition
a. Access database at Randolph AFB.
b. Access database at Wright-Patterson AFB.
c. Oracle database at Wright-Patterson AFB.
d. Oracle database at Randolph AFB. |
|
|
Term
Which voicemail system was one of the earliest digital voicemail systems running on a
private branch exchange (PBX)?
a. Nortel mail.
b. Meridian mail.
c. Avaya mail.
d. Call pilot. |
|
Definition
a. Nortel mail.
b. Meridian mail.
c. Avaya mail.
d. Call pilot. |
|
|
Term
Which way to send a network message using the Call Pilot voice mail system is only
available with the Audio Message Interchange Specification (AMIS) protocol?
a. Network delivery mailbox.
b. Site-based addressing.
c. Direct addressing.
d. Auto Attendant. |
|
Definition
a. Network delivery mailbox.
b. Site-based addressing.
c. Direct addressing.
d. Auto Attendant. |
|
|
Term
Which application has not been used for automating central office records?
a. CAIRS
b. Telephone Plant Automated Records System (Telpars).
c. Integrated Maintenance Data System (IMDS).
d. Microsoft Access. |
|
Definition
a. CAIRS
b. Telephone Plant Automated Records System (Telpars).
c. Integrated Maintenance Data System (IMDS).
d. Microsoft Access. |
|
|
Term
The Air Force has adopted Telecommunications Management System (TMS) as the
standard application to maintain and generate
a. telephone numbers.
b. central office records.
c. global office records.
d. base office records. |
|
Definition
a. telephone numbers.
b. central office records.
c. global office records.
d. base office records. |
|
|
Term
Which feature is an automated Telecommunications Management System (TMS)
advantage?
a. Design.
b. Site specific.
c. Software compatibility.
d. Data network restrictions. |
|
Definition
a. Design.
b. Site specific.
c. Software compatibility.
d. Data network restrictions. |
|
|
Term
Which feature is an automated Telecommunications Management System (TMS)
advantage?
a. Site specific.
b. Software compatibility.
c. Data network restrictions.
d. Network management functions. |
|
Definition
a. Site specific.
b. Software compatibility.
c. Data network restrictions.
d. Network management functions. |
|
|
Term
Which Telecommunications Management System (TMS) network management functional
area contains line, circuit, cable, and customer information?
a. Fault management.
b. Security management.
c. Performance management.
d. Configuration management. |
|
Definition
a. Fault management.
b. Security management.
c. Performance management.
d. Configuration management. |
|
|
Term
Which network management functional area monitors and audits the Telecommunications
Management System (TMS) operating level?
a. Fault management.
b. Security management.
c. Performance management.
d. Configuration management. |
|
Definition
a. Fault management.
b. Security management.
c. Performance management.
d. Configuration management. |
|
|
Term
What are the two types of accounts supported by Windows operation systems?
a. Network and domain.
b. Network and local.
c. Domain and local.
d. User and email. |
|
Definition
a. Network and domain.
b. Network and local.
c. Domain and local.
d. User and email. |
|
|
Term
Which is not a use for local user accounts?
a. To have a computer act as a stand-alone system.
b. To control a user’s permissions on the local network.
c. To limit a user’s access to the printers on the local machine.
d. To limit a user’s access to the programs on the local machine. |
|
Definition
a. To have a computer act as a stand-alone system.
b. To control a user’s permissions on the local network.
c. To limit a user’s access to the printers on the local machine.
d. To limit a user’s access to the programs on the local machine. |
|
|
Term
Why are users required to change their passwords upon logging onto the network for the
first time?
a. To ensure users don’t create vulnerability by leaving the default password in place.
b. To ensure users understand how to create a password.
c. To ensure the integrity of each user’s unique password.
d. To ensure users remember their unique password. |
|
Definition
a. To ensure users don’t create vulnerability by leaving the default password in place.
b. To ensure users understand how to create a password.
c. To ensure the integrity of each user’s unique password.
d. To ensure users remember their unique password. |
|
|
Term
What publication governs the format of Alias names for email accounts?
a. Air Force Instruction (AFI) 33–119.
b. Air Force System Security Instruction (AFSSI) 8502.
c. AFI 33–201.
d. AFSSI 7700. |
|
Definition
a. Air Force Instruction (AFI) 33–119.
b. Air Force System Security Instruction (AFSSI) 8502.
c. AFI 33–201.
d. AFSSI 7700. |
|
|