3D151 Client Systems U.R.E. Vol 2 (Edit Code 2)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dmkogot
D
Dmkogot
Community Contributor
Quizzes Created: 4 | Total Attempts: 2,567
| Attempts: 539 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. Which of these is a task completed by the unit personal wireless communications system (PWCS) manager?

Explanation

The unit personal wireless communications system (PWCS) manager is responsible for completing all of the tasks mentioned. They brief users on the proper use of PWCS equipment, implement a unit-level customer education program, and turn in excess equipment over to the base PWCS manager. This means that they not only educate users on how to use the equipment correctly but also ensure that there is a comprehensive program in place for customer education and manage the inventory of equipment within their unit.

Submit
Please wait...
About This Quiz
3D151 Client Systems U.R.E. Vol 2 (Edit Code 2) - Quiz

This quiz assesses knowledge on client systems management, focusing on the use of Remedy for ticketing and the integration of IMDS with ES-S. It tests understanding of system... see morereplacement, ticket assignment, and forms used in problem resolution, crucial for IT and support roles. see less

2. What are the two different types of current used for power?

Explanation

The two different types of current used for power are 110 volts and 220 volts. These are standard voltages used in many countries for household electrical systems. The lower voltage of 110 volts is typically used for smaller appliances and electronics, while the higher voltage of 220 volts is used for larger appliances and equipment.

Submit
3. Which of these statements pertains to configuration management?

Explanation

All of the above statements pertain to configuration management. Configuration management involves identifying and documenting the functional and physical characteristics of a Configuration Item (CI), recording and reporting change processing and implementation status, as well as controlling changes to the functional and physical characteristics of a CI. These activities are essential in ensuring that the configuration of a system or product is properly managed and maintained throughout its lifecycle.

Submit
4. Which form is used as a register log to record visitors into restricted areas?

Explanation

AF Form 1109, Visitor Register Log is the correct answer because it is specifically designed for recording visitors into restricted areas. This form serves as a register log to maintain a record of individuals who have accessed these areas, ensuring security and accountability. The other forms listed are not relevant to visitor registration or restricted areas.

Submit
5. In Remedy, to whom are the tickets assigned to fix problems?

Explanation

In Remedy, tickets for fixing problems can be assigned to either a resolution group or a specific technician. This means that the responsibility for resolving the issues can be distributed among a group of individuals or assigned to a single technician based on the nature of the problem and the availability of resources.

Submit
6. What automatically happens to an e-mail account when the user's domain account is deleted?

Explanation

When a user's domain account is deleted, their e-mail account is also deleted. This means that all the data and settings associated with the e-mail account, such as emails, contacts, and preferences, are permanently removed and cannot be accessed anymore. Deleting the domain account essentially terminates the user's access to the e-mail account as well.

Submit
7. What is the only authorized Air Force inventory control software used to account for personal wireless communications system ( PWCS) assets?

Explanation

The only authorized Air Force inventory control software used to account for personal wireless communications system (PWCS) assets is the Asset Inventory Management System (AIMS). This system is specifically designed to track and manage the inventory of PWCS assets, ensuring accurate and up-to-date records of these assets. The other options listed, such as the Tracking and Reporting System, Integrated Maintenance Data System, and Core Automated Maintenance System, are not specifically designed for PWCS assets and therefore are not the correct answer.

Submit
8. Which personal wireless communications system (PWCS) device's original intent was for use by family, friends, and associates to communicate among themselves within a small area?

Explanation

The Family Radio Service (FRS) device was originally intended for use by family, friends, and associates to communicate among themselves within a small area. This service provides a low-cost and easy-to-use wireless communication option for personal use. It allows individuals to stay connected and communicate with each other in situations such as outdoor activities, shopping, or during emergencies. The FRS device operates on a set of specific frequencies and does not require a license to use, making it accessible and convenient for personal wireless communication needs.

Submit
9. Each cell in a service area has what tower and transceiver assembly that transmits to and receives from the cell phones in that area?

Explanation

The correct answer is "Central" because the question is asking about the tower and transceiver assembly that transmits to and receives from the cell phones in each cell of a service area. The term "Central" suggests that this tower and assembly are located centrally within the service area, allowing for efficient coverage and communication with cell phones in that area.

Submit
10. Asset Inventory Management System (AIMS) is used to track and manage what Air Force assets?

Explanation

AIMS is an Asset Inventory Management System used by the Air Force to track and manage various assets. The correct answer, "Communications," refers to the specific type of assets that AIMS is used to track and manage. This could include equipment, devices, and systems related to communication within the Air Force, such as radios, satellites, and network infrastructure. By using AIMS, the Air Force can effectively monitor and maintain their communication assets for optimal performance and readiness.

Submit
11. Which fuel is not used for reciprocating generators?

Explanation

Fossil fuel is not used for reciprocating generators. Reciprocating generators typically use diesel or gasoline as fuel sources. Fossil fuel is a general term that includes coal, oil, and natural gas, which are not typically used directly as fuel for reciprocating generators. Liquid petroleum is a type of fossil fuel, so it is also not used for reciprocating generators.

Submit
12. What ratio is used to measure the desired signal strength relative to the background noise?

Explanation

Signal-to-noise ratio is used to measure the desired signal strength relative to the background noise. It is a measure of the level of a desired signal compared to the level of background noise. A higher signal-to-noise ratio indicates a stronger, clearer signal, while a lower ratio indicates more noise interference. This ratio is commonly used in various fields, such as telecommunications, audio engineering, and data analysis, to assess the quality and reliability of signals.

Submit
13. Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

Explanation

The correct answer is Secure Terminal Equipment (STE). STE is a secure voice telephone that can be used on the Integrated Services Digital Network (ISDN). It provides encryption and decryption capabilities to ensure the confidentiality and integrity of voice communications over ISDN lines. STE is commonly used by government and military organizations to protect sensitive information during telephone conversations.

Submit
14. What is the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program in the Air Force called?

Explanation

The Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program in the Air Force is called "Emission security." Emission security refers to the measures taken to protect against the unintentional release of compromising emanations from electronic equipment. These emanations can be intercepted and exploited by adversaries to gather sensitive information. The TEMPEST program focuses on ensuring that electronic equipment used by the Air Force does not emit any compromising signals that could be intercepted. Therefore, emission security is the correct term for the TEMPEST program in the Air Force.

Submit
15. Protected distribution systems (PDS) require which scheduled inspections?

Explanation

Protected distribution systems (PDS) require scheduled inspections of the line route or visual. This means that regular inspections need to be conducted to ensure that the physical route of the distribution system is secure and free from any potential vulnerabilities or threats. This includes visually inspecting the line and its surroundings to identify any signs of tampering or damage that could compromise the security of the system. These inspections help to maintain the integrity and effectiveness of the PDS in protecting sensitive information and communication.

Submit
16. The Tactical Local Area Network Encryption (TACLANE)–Micro is a packet encryption device for Internet Protocol (IP)

Explanation

The TACLANE-Micro is a packet encryption device that is designed to encrypt Internet Protocol (IP) packets. It is capable of encrypting both version 4 and version 6 of the IP protocol. This means that it can secure communications over both IPv4 and IPv6 networks, ensuring the confidentiality and integrity of the data being transmitted.

Submit
17. Which commercial satellite communication system offers true pole-to-pole global coverage?

Explanation

Iridium is the correct answer because it is the only commercial satellite communication system that offers true pole-to-pole global coverage. The other options mentioned are organizations, but they do not provide the same level of global coverage as Iridium.

Submit
18. Up to what level of classification does the Iridium Secure Module (ISM) provide secure voice communications?

Explanation

The Iridium Secure Module (ISM) provides secure voice communications up to the level of Top Secret. This means that the module is designed to protect sensitive information and conversations that are classified as Top Secret, ensuring that they cannot be intercepted or accessed by unauthorized individuals.

Submit
19. Cell sites are generally thought of as being a

Explanation

Cell sites are generally designed in a hexagonal shape because it provides the most efficient coverage and minimizes signal interference. The hexagon shape allows for equal distance between each cell tower, ensuring that the signal strength is consistent throughout the network. Additionally, the hexagonal shape allows for easy expansion and scalability of the network by adding more cell sites in a systematic pattern. This shape also helps in reducing the number of dead zones and maximizing the overall coverage area.

Submit
20. Depending on the problem type, what are the two types of forms used in Remedy?

Explanation

The correct answer is "Software or hardware." In Remedy, there are two types of forms used depending on the problem type, which can either be related to software or hardware. This suggests that Remedy is a system that deals with both software and hardware issues, and provides specific forms for each type of problem.

Submit
21. Which method is not a means for secure telecommunications?

Explanation

The Defense Courier Service is not a means for secure telecommunications because it is a physical delivery service used for transporting classified and sensitive materials, rather than transmitting information electronically. The other options, such as the protected distribution system, communications security equipment, and intrusion detection optical communications system, are all methods that are specifically designed to ensure secure telecommunications by encrypting, protecting, and detecting any unauthorized access or interception of data during transmission.

Submit
22. How many objects can be manipulated at a time in directory and resource administrator (DRA)?

Explanation

In directory and resource administrator (DRA), only one object can be manipulated at a time. This means that users can perform actions on a single object, such as modifying its properties or permissions, at any given time. The system does not allow simultaneous manipulation of multiple objects in DRA.

Submit
23. What are the voice messages encoded into when making a phone call using Voice over Internet Protocol (VoIP)?

Explanation

When making a phone call using Voice over Internet Protocol (VoIP), voice messages are encoded into packets. VoIP technology breaks down the voice data into small packets, which are then transmitted over the internet. These packets contain the encoded voice information and are sent individually across the network. At the receiving end, the packets are reassembled and decoded to recreate the original voice message. This packetization process allows for efficient transmission of voice data over IP networks.

Submit
24. What is the advantage of symmetric cryptology?

Explanation

Symmetric cryptology offers the advantage of speed. This means that the encryption and decryption processes using symmetric algorithms are faster compared to asymmetric algorithms. In symmetric cryptology, the same key is used for both encryption and decryption, which eliminates the need for complex mathematical operations involved in asymmetric encryption. As a result, symmetric cryptology is ideal for applications that require quick and efficient encryption and decryption, such as secure communication and data transfer.

Submit
25. Which cryptology system has a disadvantage of using more processing power and time?

Explanation

Asymmetric cryptology system has a disadvantage of using more processing power and time compared to symmetric cryptology system. This is because asymmetric encryption involves the use of two different keys, a public key for encryption and a private key for decryption. The process of generating and managing these keys requires more computational resources and time compared to symmetric encryption, where the same key is used for both encryption and decryption.

Submit
26. Triple data encryption standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

Explanation

Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption. Each operation uses a different key, resulting in a total of three individual keys being used in Triple DES. This provides a higher level of security compared to regular DES, as it requires an attacker to break through three layers of encryption.

Submit
27. Which encryption is not a telecommunications encryption type?

Explanation

The encryption type "Open" is not a telecommunications encryption type. This is because "Open" refers to a lack of encryption, indicating that the data is transmitted without any form of encryption. In contrast, "Narrowband," "Network," and "Bulk" are all encryption types commonly used in telecommunications to secure data transmission.

Submit
28. Which uninterruptible power supply (UPS) system is generally used for larger loads and currents?

Explanation

Flywheel UPS systems are generally used for larger loads and currents. Unlike storage batteries, which store electrical energy chemically, flywheel UPS systems store energy mechanically. They use a spinning flywheel to store kinetic energy, which can be converted back to electrical energy when needed. This makes flywheel UPS systems more suitable for applications that require high power and short duration backup, such as data centers or industrial facilities.

Submit
29. Which does not fit the "Peaceful Purposes" clause of using the International Mobile Satellite Organization ( Inmarsat) system?

Explanation

The "Peaceful Purposes" clause of using the International Mobile Satellite Organization (Inmarsat) system implies that the system should be used for non-military activities and should not involve armed conflict. Therefore, military use involving armed conflict does not fit this clause as it goes against the principle of peaceful purposes.

Submit
30. Which personal wireless communications system (PWCS) device can be used for command and control?

Explanation

Land mobile radio (LMR) is the correct answer because it is a type of personal wireless communications system (PWCS) device that is commonly used for command and control purposes. LMR devices are widely used by public safety agencies, military organizations, and other industries that require reliable and secure communication between personnel in the field and command centers. LMR devices provide clear and instant communication over a dedicated frequency band, allowing for effective coordination and management of operations.

Submit
31. The Asset Inventory Management System (AIMS) system includes what type of database and is located where?

Explanation

The Asset Inventory Management System (AIMS) system includes an Oracle database located at Wright-Patterson AFB.

Submit
32. What is the purpose of the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program?

Explanation

The purpose of the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program is to reduce the chances of radiation of electrical impulses. TEMPEST is a set of standards and guidelines that aim to prevent the unintentional electromagnetic radiation that can be emitted from electronic devices. By implementing TEMPEST measures, the risk of sensitive information being intercepted or compromised through the unintentional electromagnetic radiation is minimized.

Submit
33. Who is usually responsible for their air time charges and must budget accordingly?

Explanation

The unit is usually responsible for their air time charges and must budget accordingly. This means that the unit is accountable for managing and paying for their own air time expenses. They need to plan and allocate their budget accordingly to ensure that they have enough funds to cover the costs of their air time usage.

Submit
34. How many channels are used when a Voice over Internet Protocol (VoIP) session is established between a private branch exchange (PBX) and another Internet Protocol (IP) host?

Explanation

When a Voice over Internet Protocol (VoIP) session is established between a private branch exchange (PBX) and another Internet Protocol (IP) host, two channels are used, one for each direction. This means that there is a separate channel for transmitting data from the PBX to the IP host and another channel for transmitting data from the IP host to the PBX. This allows for two-way communication between the two devices during the VoIP session.

Submit
35. What Air Force instruction (AFI) governs personal wireless communications system (PWCS) management?

Explanation

Air Force instruction 17-210 governs personal wireless communications system (PWCS) management.

Submit
36. A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the

Explanation

The correct answer is "total surface" because a line route inspection of a protected distribution system (PDS) requires a close visual inspection of the entire surface area of the system. This includes both the visible and concealed areas, ensuring that all parts of the system are thoroughly examined for any potential issues or damages. The observable area may not cover all parts of the system, so it is important to inspect the total surface to ensure the safety and functionality of the PDS.

Submit
37. What system serves as the focal point for suggested upgrades for personal wireless communications systems ( PWCS) assets?

Explanation

The Asset Inventory Management System (AIMS) serves as the focal point for suggested upgrades for personal wireless communications systems (PWCS) assets. This system is responsible for managing and tracking the inventory of PWCS assets, including suggesting upgrades or replacements when necessary. It helps ensure that the PWCS assets are up to date and functioning optimally by providing a centralized platform for managing upgrades and maintenance.

Submit
38. Which is not a consideration when selecting storage batteries for the central office?

Explanation

When selecting storage batteries for the central office, the number of alternating current converters in the office is not a consideration. The other options, such as the office power requirements, the amount of floor space available, and future subscriber growth and reserve time required, are all important factors to consider when choosing storage batteries for the central office. The number of alternating current converters does not directly impact the selection of storage batteries.

Submit
39. Which Inmarsat terminals have a land mobile terminal, typically has a one-meter flat array antenna, and weights 30 to 40 pounds?

Explanation

The correct answer is B. The explanation for this answer is that Inmarsat terminals that have a land mobile terminal, typically have a one-meter flat array antenna, and weigh 30 to 40 pounds are represented by option B.

Submit
40. What component in the video teleconferencing (VTC) system converts analog signals to digital signals?

Explanation

The correct answer is the Coder-decoder (CODEC). The CODEC is responsible for converting analog signals, such as audio and video, into digital signals that can be transmitted over a network. It performs the encoding of the analog signals into a digital format and the decoding of the digital signals back into analog format for display or playback. This conversion is essential in video teleconferencing systems to ensure the transmission and reception of high-quality audio and video signals.

Submit
41. The Tactical Local Area Network Encryption (TACLANE)–Micro can acquire an Internet Protocol (IP) address by Dynamic Host Configuration Protocol (DHCP) on which side?

Explanation

The TACLANE-Micro can acquire an IP address by DHCP on either the ciphertext or plaintext side. This means that it can obtain an IP address regardless of whether the data is encrypted or not.

Submit
42. What component of Voice over Internet Protocol (VoIP) is an endpoint on the network that provides real time, bi-directional communications between H.323 terminals and other switch circuit networks (SCN)?

Explanation

A gateway is a component of Voice over Internet Protocol (VoIP) that acts as an endpoint on the network. It provides real-time, bi-directional communication between H.323 terminals and other switch circuit networks (SCN). Gateways are responsible for converting voice signals into data packets and vice versa, allowing communication between different networks. They facilitate the interoperability between different protocols and enable communication between VoIP networks and traditional telephone networks. Gateways play a crucial role in connecting different networks and ensuring seamless communication between various devices and systems.

Submit
43. What is a system of error control for data transmission, where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors without the need to ask the sender for additional data?

Explanation

Forward error correction (FEC) is a system of error control for data transmission where the sender adds redundant data to its messages. This allows the receiver to detect and correct errors without having to request additional data from the sender. By including extra information in the transmission, FEC enables the receiver to identify and fix errors, improving the reliability and accuracy of data transmission. Unlike other options such as Quality of Service (QoS), Real-Time Protocol (RTP), and Real-Time Control Protocol (RTCP), FEC specifically focuses on error detection and correction without relying on additional data from the sender.

Submit
44. In electrical power equipment, the generator can be two types, reciprocating or

Explanation

The correct answer is a turbine engine. In electrical power equipment, generators can be either reciprocating or turbine engines. Reciprocating engines use pistons to convert the energy of the fuel into mechanical energy, which is then converted into electrical energy. On the other hand, turbine engines use a turbine to convert the energy of a fluid (such as steam, gas, or water) into mechanical energy, which is then converted into electrical energy. Therefore, a turbine engine is a valid type of generator in electrical power equipment.

Submit
45. What type of areas is International Mobile Satellite Organization (Inmarsat) coverage separated?

Explanation

Inmarsat coverage is separated into ocean areas. Inmarsat is a global satellite communications company that provides coverage for maritime communications. Since the company primarily focuses on providing satellite services for maritime industries, its coverage is divided into ocean areas rather than geographical, continental, or regional areas. This allows Inmarsat to provide reliable and efficient communication services for ships and vessels at sea.

Submit
46. Which form is used with a transfer report to accompany a communications security (COMSEC) package?

Explanation

The correct answer is SF 153, COMSEC Material Report. This form is used to accompany a communications security (COMSEC) package. It is specifically designed for reporting and tracking COMSEC material, ensuring that it is properly documented and accounted for during transfer. The SF 135 is used for general records transmittal and receipt, while SF 701 and SF 702 are checklists used for activity and security container security, respectively.

Submit
47. What tool must you use in order to create a new ticket?

Explanation

To create a new ticket, you must use the tool called "Remedy user." This tool is specifically designed for users to create and manage tickets within the Remedy system. It provides the necessary interface and functionalities to input all the required information and details for the new ticket.

Submit
48. Which is not a reason why extreme caution should be used when deleting an e-mail account?

Explanation

Extreme caution should be used when deleting an e-mail account because the wrong account could be deleted. This means that if the person deleting the account is not careful, they might accidentally delete the wrong account, resulting in the loss of important emails and data. This emphasizes the need for caution and double-checking before deleting an account to prevent any irreversible mistakes.

Submit
49. What area is described as a complete building or facility area under direct physical control where unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

Explanation

A controlled access area (CAA) is described as a complete building or facility area under direct physical control. This means that unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance. This ensures that only authorized individuals are allowed access to the area, enhancing security and preventing unauthorized entry. Restricted access areas (RAA), limited control areas (LCA), and uncontrolled access areas (UAA) do not necessarily have the same level of security measures in place as a controlled access area.

Submit
50. Who appoints the unit personal wireless communications system (PWCS) manager?

Explanation

The unit commander is responsible for appointing the unit personal wireless communications system (PWCS) manager. This individual is in charge of overseeing and managing the PWCS within the unit. They are selected by the unit commander based on their qualifications and expertise in communications and information systems. The unit commander has the authority to make this appointment and ensure that the PWCS is effectively managed within the unit.

Submit
51. What are the two major types of encryption algorithms in use today that operate by encrypting or decrypting one chunk of data at a time?

Explanation

Block algorithms and stream ciphers are the two major types of encryption algorithms that operate by encrypting or decrypting one chunk of data at a time. Block algorithms divide the data into fixed-size blocks and process each block separately, while stream ciphers encrypt or decrypt the data one bit or byte at a time. These two types of algorithms provide different levels of security and are suitable for different applications.

Submit
52. Which encryption handles multiplexed lines that come from combining multiple single data and voice lines into one?

Explanation

Bulk encryption is the correct answer because it refers to the encryption technique that is used to handle multiplexed lines. When multiple single data and voice lines are combined into one, bulk encryption ensures that the combined line is encrypted to maintain the security and confidentiality of the transmitted information. This encryption method is specifically designed to handle the encryption needs of combined or multiplexed lines.

Submit
53. Who becomes responsible for life-cycle maintenance once the installation of cyberspace equipment is complete?

Explanation

Once the installation of cyberspace equipment is complete, the responsibility for life-cycle maintenance falls on the production work center or the contractor. This means that either the production work center, which is responsible for the production and maintenance of the equipment, or the contractor, who may have been hired to handle the maintenance, will be accountable for ensuring the equipment's ongoing maintenance and upkeep.

Submit
54. What mode of operation do cell phones use?

Explanation

Cell phones use duplex mode of operation, which allows for simultaneous two-way communication. This means that both parties can talk and listen at the same time, just like in a regular telephone conversation. This mode is essential for effective communication on cell phones as it enables real-time interaction and eliminates the need for one party to wait for the other to finish speaking before responding.

Submit
55. Communications security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure

Explanation

Communications security (COMSEC) refers to the protective measures and protocols implemented to prevent unauthorized individuals from accessing information and to guarantee the genuineness of the communicated data. It involves safeguarding the authenticity of the information, ensuring that it has not been tampered with or altered in any way during transmission. This is crucial to maintain the trustworthiness and reliability of the communication process, as any unauthorized modifications could lead to misinformation or unauthorized access to sensitive data.

Submit
56. What needs to be higher to improve the audio quality?

Explanation

To improve audio quality, the bit rate needs to be higher. Bit rate refers to the amount of data processed per unit of time in audio files. A higher bit rate means more data is being processed, resulting in better audio quality. This is because a higher bit rate allows for more precise representation of the audio, capturing more details and nuances. Therefore, increasing the bit rate can enhance the clarity and fidelity of the audio, resulting in an improved listening experience.

Submit
57. What publication governs the format of Alias names for e-mail accounts?

Explanation

The correct answer is Air Force Instruction (AFI) 17–130, Cybersecurity Program Management. This publication governs the format of Alias names for e-mail accounts in the Air Force.

Submit
58. The Integrated Maintenance Data System (IMDS) interface with the Enterprise System- Supply (ES-S) replaces what system throughout the maintenance complex?

Explanation

The Integrated Maintenance Data System (IMDS) interface with the Enterprise System- Supply (ES-S) replaces the Standard Base Supply System (SBSS) throughout the maintenance complex.

Submit
59. Which is not a function of the Integrated Maintenance Data System (IMDS)?

Explanation

The Integrated Maintenance Data System (IMDS) is a system that is designed to automate equipment history, scheduling, and other processes. It also functions as a common interactive interface for other systems and provides status and inventory data. However, it does not roll base-level logistics data up to the Air Force level. This means that it does not transfer or consolidate logistics data from lower-level units to the Air Force level.

Submit
60. Which port on the office version Secure Terminal Equipment (STE) can be used to connect to a fax machine?

Explanation

RS-232 is a standard for serial communication between devices. It is commonly used for connecting modems and other communication devices, including fax machines. Therefore, the RS-232 port on the office version Secure Terminal Equipment (STE) can be used to connect to a fax machine.

Submit
61. In secure socket layer (SSL), before an encrypted transaction takes place, what does the Web server give to the browser?

Explanation

In secure socket layer (SSL), the Web server gives the browser its public key before an encrypted transaction takes place. This public key is used by the browser to encrypt data that will be sent to the server. The server will then use its corresponding private key to decrypt the data. The public key is shared openly, while the private key is kept secure and not shared with anyone. This ensures that the data transmitted between the server and the browser remains confidential and secure.

Submit
62. What combination of Air Force instructions (AFI), Air Force Systems Security instructions (AFSSI), and Air Force manuals (AFMAN) do you use for guidance when determining a technical solution for personal wireless communications systems (PWCS)?

Explanation

The combination of AFI 17–210, AFI 17–220, AFSSI 7702, and AFMAN 17–1302–O is used for guidance when determining a technical solution for personal wireless communications systems (PWCS).

Submit
63. The approval or disapproval of all approved changes in the configuration is known as

Explanation

Configuration control refers to the process of reviewing, approving, and managing all approved changes in the configuration. It ensures that any changes made to the configuration are properly assessed, authorized, and implemented. This helps in maintaining the integrity and consistency of the configuration, as well as ensuring that all changes align with the defined standards and requirements.

Submit
64. In the RED/BLACK concept, what type of traffic do RED lines carry?

Explanation

In the RED/BLACK concept, RED lines carry unencrypted classified traffic. This means that the information being transmitted over the RED lines is classified but is not encrypted, making it potentially vulnerable to interception or unauthorized access.

Submit
65. In the RED/BLACK concept, what type of traffic do BLACK lines carry?

Explanation

The BLACK lines in the RED/BLACK concept carry encrypted traffic that can be either classified or unclassified. This means that the information transmitted through these lines is protected and can include sensitive or confidential data. The encryption ensures that the data remains secure and inaccessible to unauthorized individuals.

Submit
66. What components are used in both encryption and decryption?

Explanation

In both encryption and decryption processes, two main components are used: algorithm and key. The algorithm is a set of rules and procedures that determine how the encryption or decryption is performed. The key is a specific value or piece of information that is used in conjunction with the algorithm to transform the data. The algorithm provides the instructions, while the key provides the necessary information to carry out the encryption or decryption. Both components are essential for secure and effective encryption and decryption processes.

Submit
67. What is the maximum throughput in megabits per second (Mbps) for the Tactical Local Area Network Encryption ( TACLANE)–E100?

Explanation

The maximum throughput for the TACLANE-E100 is 165 Mbps for full-duplex and 100 Mbps for half-duplex. This means that in a full-duplex configuration, data can be transmitted and received simultaneously at a rate of 165 Mbps, while in a half-duplex configuration, data can only be transmitted or received at a rate of 100 Mbps.

Submit
68. What percent packet loss should a network expect in order to implement Voice over Internet Protocol (VoIP)?

Explanation

In order to implement Voice over Internet Protocol (VoIP), a network should expect a packet loss of less than 1 percent. This is because VoIP relies on real-time communication, and any significant packet loss can result in poor call quality and disruptions. Therefore, it is crucial to have a reliable network with minimal packet loss to ensure smooth and uninterrupted VoIP communication.

Submit
69. In response to disaster relief operations, the Department of Defense (DOD) Policy on Procurement of mobile satellite services (MSS) was amended in 2006 to allow the DOD to use additional MSS providers for

Explanation

The correct answer is "unclassified purposes within the CONUS". The Department of Defense amended its policy on procurement of mobile satellite services in 2006 to allow the use of additional MSS providers for unclassified purposes within the continental United States (CONUS). This means that the DOD can now utilize these services for non-confidential operations and communications within the country.

Submit
70. Which communications security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

Explanation

Physical security refers to the measures taken to protect physical assets, such as buildings, equipment, and personnel, from unauthorized access, damage, or theft. In the context of communications security (COMSEC), physical security plays a crucial role in safeguarding priority resources of the US Air Force. By implementing physical security measures, such as access controls, surveillance systems, and secure storage facilities, the Air Force can deter, detect, and defeat hostile acts that may compromise the security of their communications systems and infrastructure.

Submit
71. What are the two standards for termination of Category 5 (CAT 5) and Category 6 (CAT 6)?

Explanation

The correct answer is T–568A and T–568B. These two standards refer to the wiring schemes used for terminating Category 5 (CAT 5) and Category 6 (CAT 6) cables. T–568A and T–568B specify the arrangement of the individual wire pairs within the cable and determine the pin assignments for the connectors. These standards ensure that the cables are properly terminated and allow for consistent and reliable network connections.

Submit
72. The Asset Inventory Management System (AIMS) is an online database program that is a part of the

Explanation

The correct answer is Air Force Equipment Management System (AFEMS). This is because the question asks for the online database program that is a part of the given systems, and AFEMS is the only system mentioned that fits this description.

Submit
73. How many milliseconds should the one-way delay be from endpoint to endpoint in order to implement Voice over Internet Protocol (VoIP)?

Explanation

In order to implement Voice over Internet Protocol (VoIP), the one-way delay should be less than 150 milliseconds. This is because any delay greater than this threshold can result in noticeable and disruptive audio delays or interruptions during a conversation. Therefore, to ensure a smooth and seamless VoIP experience, it is important to keep the one-way delay below 150 milliseconds.

Submit
74. Which encryption handles software encryption?

Explanation

Network encryption refers to the encryption of data at the network level, which ensures that data is secure during transmission over a network. This type of encryption is typically implemented in software and is used to protect sensitive information from being intercepted or accessed by unauthorized individuals. Therefore, the correct answer is Network.

Submit
75. What are the two basic types of computer cryptology?

Explanation

The two basic types of computer cryptology are symmetric-secret key system and asymmetric-public key system. In a symmetric-secret key system, the same key is used for both encryption and decryption. This means that both the sender and the receiver need to have the same key in order to communicate securely. In an asymmetric-public key system, there are two different keys: a public key and a private key. The public key is used for encryption, while the private key is used for decryption. This allows for secure communication without the need for both parties to have the same key.

Submit
76. The Tactical Local Area Network Encryption (TACLANE)–Micro may be equipped to handle all types of networks except

Explanation

The TACLANE-Micro is capable of handling various types of networks such as gigabit Ethernet, fast Ethernet, and asynchronous transfer mode (ATM). However, it is not equipped to handle wireless networks. This means that it cannot provide encryption and security for wireless communications.

Submit
77. How many channels do the intra-squad radios operate on?

Explanation

The correct answer is 14. This means that the intra-squad radios operate on 14 different channels. These channels allow for communication within the squad, ensuring that each member can stay connected and informed. Having multiple channels also helps to minimize interference and confusion by providing separate frequencies for different teams or purposes.

Submit
78. What channel access method assigns each call a certain portion of time on a designated frequency?

Explanation

TDMA is a channel access method that assigns each call a specific portion of time on a designated frequency. This means that multiple calls can share the same frequency by dividing the time into slots, with each call being allocated a specific slot. This allows for efficient use of the available frequency spectrum and enables multiple users to access the channel simultaneously without interference.

Submit
79. Permanent markings can be completed by how many different methods?

Explanation

Permanent markings can be completed by two different methods. The question is asking how many different methods can be used to create permanent markings. The correct answer is 2, suggesting that there are two distinct ways to create permanent markings.

Submit
80. The Secure Terminal Equipment ( STE) consists of a

Explanation

The correct answer is "host terminal and removable security core". This means that the Secure Terminal Equipment (STE) is made up of a host terminal and a removable security core. The host terminal is the main device that is used to interact with the STE, while the removable security core is responsible for providing the necessary security features and encryption capabilities. This configuration allows for the security core to be easily removed and replaced if needed, while still maintaining the functionality of the host terminal.

Submit
81. When using a Secure Terminal Equipment (STE), what is encrypted?

Explanation

When using a Secure Terminal Equipment (STE), the digital signal is encrypted. This means that the information transmitted through the STE is encoded in a way that makes it unreadable to anyone who does not have the proper decryption key. Encrypting the digital signal ensures that sensitive information remains secure and protected from unauthorized access or interception.

Submit
82. Which set of electrical standards does the KIV–7 not support?

Explanation

The KIV-7 does not support the RS-422 electrical standard.

Submit
83. Who coordinates the management of personal wireless communications system (PWCS) assets for the installation commander?

Explanation

The correct answer is the Base communications and information systems officer (CSO). The CSO is responsible for coordinating the management of personal wireless communications system (PWCS) assets for the installation commander. They oversee the planning, implementation, and maintenance of the PWCS, ensuring that it meets the needs of the installation and its personnel. They also work closely with other units and agencies to ensure effective communication and coordination within the installation.

Submit
84. How many bits for its key does data encryption standard (DES) use?

Explanation

Data Encryption Standard (DES) uses 64 bits for its key. DES is a symmetric encryption algorithm that was widely used in the past for securing sensitive data. The 64-bit key size refers to the length of the secret key used in the encryption and decryption process. The use of a 64-bit key provides a total of 2^64 possible key combinations, which was considered secure at the time of its development. However, due to advances in computing power and security vulnerabilities, DES is now considered relatively weak and has been replaced by more robust encryption algorithms with larger key sizes.

Submit
85. The Secure Terminal Equipment (STE) cannot communicate securely with what device?

Explanation

The Secure Terminal Equipment (STE) is designed to provide secure communication. It is specifically designed to communicate securely with devices such as the Secure Telephone Unit (STU)-III, satellite telephones, and cellular telephones. However, it cannot communicate securely with a land mobile radio. This may be because land mobile radios do not have the necessary encryption capabilities or protocols to establish a secure communication channel with the STE.

Submit
86. How fast you sample the audio to get your digital signal is called

Explanation

The correct answer is sample rate. The sample rate refers to the number of samples of audio taken per second, which determines the accuracy and quality of the digital signal. Bit rate, on the other hand, refers to the number of bits used to represent each sample, while bite rate and samp rate are incorrect terms.

Submit
87. What protocol does the Integrated Services Digital Network (ISDN) use to transmit video teleconferencing (VTC) data?

Explanation

ISDN uses the H.320 protocol to transmit video teleconferencing (VTC) data. H.320 is a standard protocol that is specifically designed for videoconferencing over ISDN networks. It defines the necessary procedures and codecs for transmitting audio, video, and data in real-time. H.320 provides a reliable and efficient method for video teleconferencing, ensuring high-quality communication between participants.

Submit
88. Which two parts does the RED/BLACK concept have?

Explanation

The RED/BLACK concept refers to the practice of physically separating networks and using electrical separation to prevent information leakage between them. Physical separation involves physically isolating the networks from each other, while electrical separation involves using techniques such as firewalls and air gaps to prevent the transfer of electrical signals between the networks. Therefore, the correct answer is physical separation and electrical separation.

Submit
89. The Secure Terminal Equipment (STE) Integrated Subscriber Digital Network (ISDN) setting supports what speeds in kilobits per second (Kbps)?

Explanation

The Secure Terminal Equipment (STE) Integrated Subscriber Digital Network (ISDN) setting supports a speed of 128 kilobits per second (Kbps).

Submit
90. Protected distribution systems (PDS) events such as alarms, technical inspections, and other pertinent information are recorded in which log?

Explanation

Protected Distribution Systems (PDS) is the log in which events such as alarms, technical inspections, and other relevant information related to PDS are recorded. This log is specifically designed to keep track of all activities and occurrences within the PDS, ensuring its security and functionality. It serves as a valuable resource for monitoring and managing the PDS, allowing for timely identification and resolution of any issues or concerns that may arise.

Submit
91. What are the two main options for storing electricity in an uninterruptible power supply (UPS)?

Explanation

The two main options for storing electricity in an uninterruptible power supply (UPS) are batteries or a flywheel. Batteries are commonly used in UPS systems as they can store a large amount of energy and provide power for an extended period of time. On the other hand, a flywheel is a mechanical device that stores kinetic energy and can provide short-term backup power in case of a power outage. Both options offer reliable backup power solutions for uninterrupted operation of critical systems.

Submit
92. Which of these is not part of the personal wireless communications system (PWCS) manager's duties?

Explanation

The personal wireless communications system (PWCS) manager is responsible for various duties related to managing the system. These include maintaining the Asset Inventory Management System (AIMS) database, handling technical solutions, and carrying out maintenance tasks. However, conducting technical reviews is not mentioned as one of the PWCS manager's duties.

Submit
93. What component in the video teleconferencing (VTC) system converts incoming four wire transmissions into two wire transmissions?

Explanation

The network termination (NT) 1 component in the video teleconferencing (VTC) system converts incoming four wire transmissions into two wire transmissions. This means that it takes the audio signals from the four wire transmission and converts them into a format that can be transmitted over a two wire connection, such as a telephone line. This conversion allows for seamless communication between the VTC system and other devices or networks that use two wire transmissions.

Submit
94. What exchange tab is used to add, delete, or modify user accounts that can receive as or send as for the account?

Explanation

Mailbox security is the correct answer because it is the tab used to add, delete, or modify user accounts that can receive as or send as for the account. This tab allows administrators to manage the security settings for a mailbox, including granting or revoking permissions for other users to access or send emails on behalf of the mailbox owner. By modifying the mailbox security settings, administrators can control and manage the user accounts that have these specific permissions for the mailbox.

Submit
95. The Tactical Local Area Network Encryption (TACLANE)–Micro can be used to overlay what type of networks on top of existing public and private network infrastructures?

Explanation

The TACLANE-Micro can be used to overlay Secure Virtual Networks on top of existing public and private network infrastructures. This means that it can create a secure and isolated network environment within the existing infrastructure, allowing for secure communication and data transfer between connected devices.

Submit
96. What exchange tab is used to add, delete, or modify user accounts that have special permissions to the account?

Explanation

Mailbox rights is the correct answer because it refers to the exchange tab that is used to add, delete, or modify user accounts that have special permissions to the account. By accessing the mailbox rights tab, administrators can manage and control the level of access that different users have to a specific mailbox, allowing them to grant or revoke permissions as needed. This tab is essential for maintaining the security and privacy of mailbox data, as well as ensuring that the appropriate individuals have the necessary access privileges.

Submit
97. What is the control system that generates a signal with a fixed relation to the phase of a reference signal and responds to both the frequency and the phase of the input signals?

Explanation

A phase-locked loop (PLL) is a control system that generates a signal with a fixed relation to the phase of a reference signal and responds to both the frequency and the phase of the input signals. It is commonly used in electronic devices to synchronize and track the phase of a signal. By comparing the phase of the input signal with the reference signal, the PLL adjusts its output signal to maintain a fixed phase relationship. This makes it useful for applications such as frequency synthesis, clock recovery, and demodulation.

Submit
98. Which one of these requires the use of the latest technical order (TO) information listed?

Explanation

A configuration item refers to any component or element of a system that is identified and managed as a single entity. In order to effectively manage and maintain configuration items, it is necessary to have access to the latest technical order (TO) information. This information includes instructions, specifications, and guidelines for the configuration item. By using the latest TO information, organizations can ensure that they are following the most up-to-date procedures and requirements for managing and maintaining the configuration item. Therefore, the use of the latest TO information is essential for effectively managing configuration items.

Submit
99. Tactical Local Area Network Encryption (TACLANE)–Classic and TACLANE–E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for

Explanation

TACLANE devices, including TACLANE-Classic and TACLANE-E100, are designed to provide high-speed encryption for Internet Protocol (IP) networks. This means that they ensure confidentiality, data integrity, and authentication security services for communication over IP networks. These devices are not specifically designed for serial networks, tactical networks, or point-to-point connections, but rather for securing communication over IP networks.

Submit
100. Which encryption handles data that can come from equipment such as computers?

Explanation

Wideband encryption is the correct answer because it is designed to handle data that can come from equipment such as computers. Wideband encryption is capable of encrypting and decrypting large amounts of data at high speeds, making it suitable for handling data from computer systems and other equipment that generate large volumes of data. Narrowband encryption, on the other hand, is designed for low-speed data transmission, while network and bulk encryption are more general terms that do not specifically refer to encryption methods suitable for handling data from computers.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 24, 2019
    Quiz Created by
    Dmkogot
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which of these is a task completed by the unit personal wireless...
What are the two different types of current used for power?
Which of these statements pertains to configuration management?
Which form is used as a register log to record visitors into...
In Remedy, to whom are the tickets assigned to fix problems?
What automatically happens to an e-mail account when the user's domain...
What is the only authorized Air Force inventory control software used...
Which personal wireless communications system (PWCS) device's original...
Each cell in a service area has what tower and transceiver assembly...
Asset Inventory Management System (AIMS) is used to track and manage...
Which fuel is not used for reciprocating generators?
What ratio is used to measure the desired signal strength relative to...
Which secure voice telephone can be used on the Integrated Services...
What is the Transient Electromagnetic Pulse Emanation Standard...
Protected distribution systems (PDS) require which scheduled...
The Tactical Local Area Network Encryption (TACLANE)–Micro is a...
Which commercial satellite communication system offers true...
Up to what level of classification does the Iridium Secure Module...
Cell sites are generally thought of as being a
Depending on the problem type, what are the two types of forms used in...
Which method is not a means for secure telecommunications?
How many objects can be manipulated at a time in directory and...
What are the voice messages encoded into when making a phone call...
What is the advantage of symmetric cryptology?
Which cryptology system has a disadvantage of using more processing...
Triple data encryption standard (DES) is based on three compound...
Which encryption is not a telecommunications encryption type?
Which uninterruptible power supply (UPS) system is generally used for...
Which does not fit the "Peaceful Purposes" clause of using the...
Which personal wireless communications system (PWCS) device can be...
The Asset Inventory Management System (AIMS) system includes what type...
What is the purpose of the Transient Electromagnetic Pulse Emanation...
Who is usually responsible for their air time charges and must budget...
How many channels are used when a Voice over Internet Protocol (VoIP)...
What Air Force instruction (AFI) governs personal wireless...
A line route inspection of a protected distribution system (PDS)...
What system serves as the focal point for suggested upgrades for...
Which is not a consideration when selecting storage batteries for the...
Which Inmarsat terminals have a land mobile terminal, typically has a...
What component in the video teleconferencing (VTC) system converts...
The Tactical Local Area Network Encryption (TACLANE)–Micro can...
What component of Voice over Internet Protocol (VoIP) is an endpoint...
What is a system of error control for data transmission, where the...
In electrical power equipment, the generator can be two types,...
What type of areas is International Mobile Satellite Organization...
Which form is used with a transfer report to accompany a...
What tool must you use in order to create a new ticket?
Which is not a reason why extreme caution should be used when deleting...
What area is described as a complete building or facility area under...
Who appoints the unit personal wireless communications system (PWCS)...
What are the two major types of encryption algorithms in use today...
Which encryption handles multiplexed lines that come from combining...
Who becomes responsible for life-cycle maintenance once the...
What mode of operation do cell phones use?
Communications security (COMSEC) is defined as the measures and...
What needs to be higher to improve the audio quality?
What publication governs the format of Alias names for e-mail...
The Integrated Maintenance Data System (IMDS) interface with the...
Which is not a function of the Integrated Maintenance Data System...
Which port on the office version Secure Terminal Equipment (STE) can...
In secure socket layer (SSL), before an encrypted transaction takes...
What combination of Air Force instructions (AFI), Air Force Systems...
The approval or disapproval of all approved changes in the...
In the RED/BLACK concept, what type of traffic do RED lines carry?
In the RED/BLACK concept, what type of traffic do BLACK lines carry?
What components are used in both encryption and decryption?
What is the maximum throughput in megabits per second (Mbps) for the...
What percent packet loss should a network expect in order to implement...
In response to disaster relief operations, the Department of Defense...
Which communications security (COMSEC) application provides us with...
What are the two standards for termination of Category 5 (CAT 5) and...
The Asset Inventory Management System (AIMS) is an online database...
How many milliseconds should the one-way delay be from endpoint to...
Which encryption handles software encryption?
What are the two basic types of computer cryptology?
The Tactical Local Area Network Encryption (TACLANE)–Micro may...
How many channels do the intra-squad radios operate on?
What channel access method assigns each call a certain portion of time...
Permanent markings can be completed by how many different methods?
The Secure Terminal Equipment ( STE) consists of a
When using a Secure Terminal Equipment (STE), what is encrypted?
Which set of electrical standards does the KIV–7 not support?
Who coordinates the management of personal wireless communications...
How many bits for its key does data encryption standard (DES) use?
The Secure Terminal Equipment (STE) cannot communicate securely with...
How fast you sample the audio to get your digital signal is called
What protocol does the Integrated Services Digital Network (ISDN) use...
Which two parts does the RED/BLACK concept have?
The Secure Terminal Equipment (STE) Integrated Subscriber Digital...
Protected distribution systems (PDS) events such as alarms, technical...
What are the two main options for storing electricity in an...
Which of these is not part of the personal wireless communications...
What component in the video teleconferencing (VTC) system converts...
What exchange tab is used to add, delete, or modify user accounts that...
The Tactical Local Area Network Encryption (TACLANE)–Micro can...
What exchange tab is used to add, delete, or modify user accounts that...
What is the control system that generates a signal with a fixed...
Which one of these requires the use of the latest technical order (TO)...
Tactical Local Area Network Encryption (TACLANE)–Classic and...
Which encryption handles data that can come from equipment such as...
Alert!

Advertisement