Noise
Jabber
Crosstalk
Intelligence
Unshielded twisted pair (UTP).
Screened twisted pair (ScTP).
Shielded twisted pair (STP).
Foiled twisted pair (FTP).
Cat 3
Cat 5
Cat 6
Cat 5E
Minimum requirements for telecomunications cabling.
Life span of a telecommunications cabling system.
Connecting hardware performance specifications.
Color of the cable.
Connector and pin assignment.
Subsystems of structured cabling.
Installation methods and practices.
Recommended wireless topology and distances.
Absorption loss.
Insertion loss.
Penetration loss.
Return loss.
Near-end crosstalk (NEXT).
Powersum near-end crosstalk (PSNEXT).
Powersum alien near-end crosstalk (PSANEXT).
Powersum insertion loss to alien crosstalk ratio far-end (PSAACRF).
Absorption loss.
Insertion loss.
Penetration loss.
Return loss.
Entrance facility.
Equipment room.
Commercial demark.
Telecommunications room.
Entrance facility.
Equipment room.
Systems room.
Work area.
Intra cabling.
Backbone cabling.
Vertical cabling.
Horizontal cabling.
Intra cabling.
Backbone cabling.
Vertical cabling.
Horizontal cabling.
Intra cabling.
Backbone cabling.
Vertical cabling.
Horizontal cabling.
Intra cabling.
Backbone cabling.
Vertical cabling.
Horizontal cabling.
Patch cables.
Adapters.
Patch panels.
Station equipment.
606–A.
666–A.
568–A.
568–B.
33–202.
7700.
7703.
7007.
Using Defense Courier Service.
Using protected distribution system.
Using communications security equipment.
Using intrusion detection optical communications system.
Encrypted classified.
Encrypted unclassified.
Unencrypted classified.
Unencrypted unclassified.
Physical separation and electromagnetic separation.
Electromagnetic separation and electrical separation.
Physical separation and electrical separation.
Physical separation and emission separation.
An unclassified term and a US Government code word that identifies an unclassified set of standards.
An unclassified term and a US Government code word that identifies a classified set of standards.
A classified term and a US Government code word that identifies an unclassified set of standards.
A classified term and a US Government code word that identifies a classified set of standards.
Eliminate all instances of radiation of electrical impulses.
Reduce the chances of radiation of electrical impulses.
Improve the signal of radiation of electrical impulses.
Increase the range of radiation of electrical impulses.
Communications Security.
Transmission Security.
Emission Security.
Computer Security.
Controlled Access Area (CAA).
Restricted Access Area (RAA).
Limited-Control Area (LCA).
Uncontrolled Access Area (UAA).
Communications security inspections.
Separation inspections.
Line route inspections.
Electrical inspections.
Emission security (EMSEC) log.
TEMPEST log.
Protected distribution system (PDS) log.
Inspection log.
Total surface.
Visible area.
Observable area.
Concealed area.
The analog signal.
The digital signal.
The multiplexed signal.
The sender’s private key.
Data is faster.
Voice is faster.
In data, the encryption is handled by separate device.
In voice, the encryption is handled by a separate device.
Algorithm and key.
Algorithm and certificate.
Certificate and key.
Telephone and receiver.
Symmetric-public key system and asymmetric-secret key system.
Symmetric-secret key system and asymmetric-secret key system.
Symmetric-secret key system and asymmetric-public key system.
Symmetric-public key system and asymmetric-public key system.
Symmetric
Asymmetric.
Diametric.
None of the above, they’re all the same.
Hash.
Repository.
Certification.
Authentication.
Private Key.
Public Key.
Secure Key.
Authentication Key.
Its public key.
Its private key.
Its public certificate.
Its private certificate.
Stream algorithms and block ciphers.
Secure algorithms and block ciphers.
Block algorithms and stream ciphers.
Block algorithms and secure ciphers.
64.
128.
192.
256.
One.
Two.
Three.
Four.
Narrowband.
Network.
Bulk.
Open.
Authenticity
Compliance
Integrity
Validity
Relocate classified material to strengthen security.
Conduct assessments to evaluate compromise of national security.
Deflect unauthorized interception and analysis of compromising emanations.
Detect and correct procedural weaknesses that could expose critical information.
AFI 33–119.
AFI 33–129.
AFI 33–219.
AFI 33–329.
Cyptosecurity.
Physical security.
Emission security.
Transmission security.
AFI 33–201, Volume 1.
AFI 33–202, Volume 1.
AFI 31–201, Volume 1.
AFI 31–202, Volume 1.
Courier control.
Communications Security (COMSEC) manager control.
Two-person integrity (TPI) control.
COMSEC Responsible Officer (CRO) control.
Standard Form (SF) 135.
SF 153.
SF 351.
SF 531.
Beginning of the week.
Beginning of the duty day.
End of the week or month.
End of the shift or duty day.
AF Form 1019.
AF Form 1109.
AF Form 1119.
AF Form 1190.
Secure Telephone Unit (STU).
Cryptographic Telephone (CT).
Secure Terminal Equipment (STE).
Pretty Good Privacy Phone (PGPfone).
Secure Telephone Unit (STU).
Cryptographic Telephone (CT).
Secure Terminal Equipment (STE).
Pretty Good Privacy Phone (PGPfone).
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.