3D151 Vol. 3

86 Questions | Attempts: 2017
Share

SettingsSettingsSettings
3D151 Quizzes & Trivia

Questions and Answers
  • 1. 

    What condition occurs when a signal is induced into one circuit from another?

    • A.

      Noise

    • B.

      Jabber

    • C.

      Crosstalk

    • D.

      Intelligence

    Correct Answer
    C. Crosstalk
  • 2. 

    What cabling is the most commonly used?

    • A.

      Unshielded twisted pair (UTP).

    • B.

      Screened twisted pair (ScTP).

    • C.

      Shielded twisted pair (STP).

    • D.

      Foiled twisted pair (FTP).

    Correct Answer
    A. Unshielded twisted pair (UTP).
  • 3. 

    Which category (Cat) of cable can support data rates up to 100Mbps?

    • A.

      Cat 3

    • B.

      Cat 5

    • C.

      Cat 6

    • D.

      Cat 5E

    Correct Answer
    B. Cat 5
  • 4. 

    Which principle is not addressed in the ANSI/TIA/EIA–568–B standard?

    • A.

      Minimum requirements for telecomunications cabling.

    • B.

      Life span of a telecommunications cabling system.

    • C.

      Connecting hardware performance specifications.

    • D.

      Color of the cable.

    Correct Answer
    D. Color of the cable.
  • 5. 

    Which principle is not addressed in the ANSI/TIA/EIA–568–B standard?

    • A.

      Connector and pin assignment.

    • B.

      Subsystems of structured cabling.

    • C.

      Installation methods and practices.

    • D.

      Recommended wireless topology and distances.

    Correct Answer
    D. Recommended wireless topology and distances.
  • 6. 

    Which TIA/EIA parameter test is a measure of the decrease of signal strength as it travels down the media?

    • A.

      Absorption loss.

    • B.

      Insertion loss.

    • C.

      Penetration loss.

    • D.

      Return loss.

    Correct Answer
    B. Insertion loss.
  • 7. 

    Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?

    • A.

      Near-end crosstalk (NEXT).

    • B.

      Powersum near-end crosstalk (PSNEXT).

    • C.

      Powersum alien near-end crosstalk (PSANEXT).

    • D.

      Powersum insertion loss to alien crosstalk ratio far-end (PSAACRF).

    Correct Answer
    A. Near-end crosstalk (NEXT).
  • 8. 

    Which TIA/EIA parameter test is a measure of the degree of impedance mismatch between two impedances?

    • A.

      Absorption loss.

    • B.

      Insertion loss.

    • C.

      Penetration loss.

    • D.

      Return loss.

    Correct Answer
    D. Return loss.
  • 9. 

    Which subsystem of the ANSI/TIA/EIA–568-B structured cabling system provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling?

    • A.

      Entrance facility.

    • B.

      Equipment room.

    • C.

      Commercial demark.

    • D.

      Telecommunications room.

    Correct Answer
    A. Entrance facility.
  • 10. 

    What cabling system subsystem provides any or all of the functions of a telecommunications room?

    • A.

      Entrance facility.

    • B.

      Equipment room.

    • C.

      Systems room.

    • D.

      Work area.

    Correct Answer
    B. Equipment room.
  • 11. 

    Which subsystem of the ANSI/TIA/EIA–568–B structured cabling can be used for connections between floors?

    • A.

      Intra cabling.

    • B.

      Backbone cabling.

    • C.

      Vertical cabling.

    • D.

      Horizontal cabling.

    Correct Answer
    B. Backbone cabling.
  • 12. 

    Which subsystem of the ANSI/TIA/EIA–568–B structured cabling can be used to interconnect buildings?

    • A.

      Intra cabling.

    • B.

      Backbone cabling.

    • C.

      Vertical cabling.

    • D.

      Horizontal cabling.

    Correct Answer
    B. Backbone cabling.
  • 13. 

    Which subsystem of the ANSI/TIA/EIA–568–B structured cabling extends from the telecommunications room to the work area telecommunications information outlets?

    • A.

      Intra cabling.

    • B.

      Backbone cabling.

    • C.

      Vertical cabling.

    • D.

      Horizontal cabling.

    Correct Answer
    D. Horizontal cabling.
  • 14. 

    Which subsystem of the ANSI/TIA/EIA–568–B structured cabling recognizes multimode cable?

    • A.

      Intra cabling.

    • B.

      Backbone cabling.

    • C.

      Vertical cabling.

    • D.

      Horizontal cabling.

    Correct Answer
    D. Horizontal cabling.
  • 15. 

    The work area of the ANSI/TIA/EIA–568–B structured cabling system consists of all except which components?

    • A.

      Patch cables.

    • B.

      Adapters.

    • C.

      Patch panels.

    • D.

      Station equipment.

    Correct Answer
    C. Patch panels.
  • 16. 

    Which ANSI/TIA/EIA standard defines labeling cables and patch panels?

    • A.

      606–A.

    • B.

      666–A.

    • C.

      568–A.

    • D.

      568–B.

    Correct Answer
    A. 606–A.
  • 17. 

    What Air Force Systems Security Instruction (AFSSI) directs implementation of protected distribution systems?

    • A.

      33–202.

    • B.

      7700.

    • C.

      7703.

    • D.

      7007.

    Correct Answer
    C. 7703.
  • 18. 

    Which method is not a means for secure telecommunications?

    • A.

      Using Defense Courier Service.

    • B.

      Using protected distribution system.

    • C.

      Using communications security equipment.

    • D.

      Using intrusion detection optical communications system.

    Correct Answer
    A. Using Defense Courier Service.
  • 19. 

    In the RED/BLACK concept, what type of traffic do RED lines carry?

    • A.

      Encrypted classified.

    • B.

      Encrypted unclassified.

    • C.

      Unencrypted classified.

    • D.

      Unencrypted unclassified.

    Correct Answer
    C. Unencrypted classified.
  • 20. 

    The RED/BLACK concept has which two parts?

    • A.

      Physical separation and electromagnetic separation.

    • B.

      Electromagnetic separation and electrical separation.

    • C.

      Physical separation and electrical separation.

    • D.

      Physical separation and emission separation.

    Correct Answer
    C. Physical separation and electrical separation.
  • 21. 

    TEMPEST is

    • A.

      An unclassified term and a US Government code word that identifies an unclassified set of standards.

    • B.

      An unclassified term and a US Government code word that identifies a classified set of standards.

    • C.

      A classified term and a US Government code word that identifies an unclassified set of standards.

    • D.

      A classified term and a US Government code word that identifies a classified set of standards.

    Correct Answer
    B. An unclassified term and a US Government code word that identifies a classified set of standards.
  • 22. 

    What is the purpose of the TEMPEST program?

    • A.

      Eliminate all instances of radiation of electrical impulses.

    • B.

      Reduce the chances of radiation of electrical impulses.

    • C.

      Improve the signal of radiation of electrical impulses.

    • D.

      Increase the range of radiation of electrical impulses.

    Correct Answer
    B. Reduce the chances of radiation of electrical impulses.
  • 23. 

    What is the TEMPEST program in the Air Force called?

    • A.

      Communications Security.

    • B.

      Transmission Security.

    • C.

      Emission Security.

    • D.

      Computer Security.

    Correct Answer
    C. Emission Security.
  • 24. 

    What area is described as the complete building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

    • A.

      Controlled Access Area (CAA).

    • B.

      Restricted Access Area (RAA).

    • C.

      Limited-Control Area (LCA).

    • D.

      Uncontrolled Access Area (UAA).

    Correct Answer
    A. Controlled Access Area (CAA).
  • 25. 

    Protected distribution systems (PDS) require which scheduled inspections?

    • A.

      Communications security inspections.

    • B.

      Separation inspections.

    • C.

      Line route inspections.

    • D.

      Electrical inspections.

    Correct Answer
    C. Line route inspections.
  • 26. 

    Protected distribution systems (PDS) events such as alarms and inspections are recorded where?

    • A.

      Emission security (EMSEC) log.

    • B.

      TEMPEST log.

    • C.

      Protected distribution system (PDS) log.

    • D.

      Inspection log.

    Correct Answer
    C. Protected distribution system (PDS) log.
  • 27. 

    A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the

    • A.

      Total surface.

    • B.

      Visible area.

    • C.

      Observable area.

    • D.

      Concealed area.

    Correct Answer
    A. Total surface.
  • 28. 

    When using a Secure Terminal Equipment (STE), what is encrypted?

    • A.

      The analog signal.

    • B.

      The digital signal.

    • C.

      The multiplexed signal.

    • D.

      The sender’s private key.

    Correct Answer
    B. The digital signal.
  • 29. 

    What is the difference between data encryption and voice encryption?

    • A.

      Data is faster.

    • B.

      Voice is faster.

    • C.

      In data, the encryption is handled by separate device.

    • D.

      In voice, the encryption is handled by a separate device.

    Correct Answer
    C. In data, the encryption is handled by separate device.
  • 30. 

    What components are used in both encryption and decryption?

    • A.

      Algorithm and key.

    • B.

      Algorithm and certificate.

    • C.

      Certificate and key.

    • D.

      Telephone and receiver.

    Correct Answer
    A. Algorithm and key.
  • 31. 

    What are the two basic types of computer cryptology?

    • A.

      Symmetric-public key system and asymmetric-secret key system.

    • B.

      Symmetric-secret key system and asymmetric-secret key system.

    • C.

      Symmetric-secret key system and asymmetric-public key system.

    • D.

      Symmetric-public key system and asymmetric-public key system.

    Correct Answer
    C. Symmetric-secret key system and asymmetric-public key system.
  • 32. 

    Which cryptology system has a disadvantage of using more processing power and time?

    • A.

      Symmetric

    • B.

      Asymmetric.

    • C.

      Diametric.

    • D.

      None of the above, they’re all the same.

    Correct Answer
    B. Asymmetric.
  • 33. 

    Which authorities are trusted entities that issue certificates?

    • A.

      Hash.

    • B.

      Repository.

    • C.

      Certification.

    • D.

      Authentication.

    Correct Answer
    C. Certification.
  • 34. 

    What infrastructure is a set of hardware, software, policies and procedures used to create, manage, store, distribute and revoke digital certificates?

    • A.

      Private Key.

    • B.

      Public Key.

    • C.

      Secure Key.

    • D.

      Authentication Key.

    Correct Answer
    B. Public Key.
  • 35. 

    In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the web server give to the browser?

    • A.

      Its public key.

    • B.

      Its private key.

    • C.

      Its public certificate.

    • D.

      Its private certificate.

    Correct Answer
    A. Its public key.
  • 36. 

    What are the two major types of encryption algorithms in use today that operate by encrypting or decrypting one chunk of data at a time?

    • A.

      Stream algorithms and block ciphers.

    • B.

      Secure algorithms and block ciphers.

    • C.

      Block algorithms and stream ciphers.

    • D.

      Block algorithms and secure ciphers.

    Correct Answer
    C. Block algorithms and stream ciphers.
  • 37. 

    Data Encryption Standard (DES) uses how many bits for its key?

    • A.

      64.

    • B.

      128.

    • C.

      192.

    • D.

      256.

    Correct Answer
    A. 64.
  • 38. 

    Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

    • A.

      One.

    • B.

      Two.

    • C.

      Three.

    • D.

      Four.

    Correct Answer
    C. Three.
  • 39. 

    Which encryption is not a telecommunications encryption type?

    • A.

      Narrowband.

    • B.

      Network.

    • C.

      Bulk.

    • D.

      Open.

    Correct Answer
    D. Open.
  • 40. 

    Communications Security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure

    • A.

      Authenticity

    • B.

      Compliance

    • C.

      Integrity

    • D.

      Validity

    Correct Answer
    A. Authenticity
  • 41. 

    The Communications Security (COMSEC) program is designed to

    • A.

      Relocate classified material to strengthen security.

    • B.

      Conduct assessments to evaluate compromise of national security.

    • C.

      Deflect unauthorized interception and analysis of compromising emanations.

    • D.

      Detect and correct procedural weaknesses that could expose critical information.

    Correct Answer
    D. Detect and correct procedural weaknesses that could expose critical information.
  • 42. 

    What reference would you use for guidance on Air Force messaging?

    • A.

      AFI 33–119.

    • B.

      AFI 33–129.

    • C.

      AFI 33–219.

    • D.

      AFI 33–329.

    Correct Answer
    A. AFI 33–119.
  • 43. 

    Which Communications Security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

    • A.

      Cyptosecurity.

    • B.

      Physical security.

    • C.

      Emission security.

    • D.

      Transmission security.

    Correct Answer
    B. Physical security.
  • 44. 

    Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy Communications Security (COMSEC) material?

    • A.

      AFI 33–201, Volume 1.

    • B.

      AFI 33–202, Volume 1.

    • C.

      AFI 31–201, Volume 1.

    • D.

      AFI 31–202, Volume 1.

    Correct Answer
    A. AFI 33–201, Volume 1.
  • 45. 

    Top secret keying material must be handled, stored, transported and destroyed under

    • A.

      Courier control.

    • B.

      Communications Security (COMSEC) manager control.

    • C.

      Two-person integrity (TPI) control.

    • D.

      COMSEC Responsible Officer (CRO) control.

    Correct Answer
    C. Two-person integrity (TPI) control.
  • 46. 

    Which form is used with a transfer report to accompany a Communications Security (COMSEC) package?

    • A.

      Standard Form (SF) 135.

    • B.

      SF 153.

    • C.

      SF 351.

    • D.

      SF 531.

    Correct Answer
    B. SF 153.
  • 47. 

    When a security container is opened, it is inventoried at the

    • A.

      Beginning of the week.

    • B.

      Beginning of the duty day.

    • C.

      End of the week or month.

    • D.

      End of the shift or duty day.

    Correct Answer
    D. End of the shift or duty day.
  • 48. 

    Which form is used as a register log to record visitors into restricted areas?

    • A.

      AF Form 1019.

    • B.

      AF Form 1109.

    • C.

      AF Form 1119.

    • D.

      AF Form 1190.

    Correct Answer
    B. AF Form 1109.
  • 49. 

    What is the newest generation of secure voice telephone?

    • A.

      Secure Telephone Unit (STU).

    • B.

      Cryptographic Telephone (CT).

    • C.

      Secure Terminal Equipment (STE).

    • D.

      Pretty Good Privacy Phone (PGPfone).

    Correct Answer
    C. Secure Terminal Equipment (STE).
  • 50. 

    Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

    • A.

      Secure Telephone Unit (STU).

    • B.

      Cryptographic Telephone (CT).

    • C.

      Secure Terminal Equipment (STE).

    • D.

      Pretty Good Privacy Phone (PGPfone).

    Correct Answer
    C. Secure Terminal Equipment (STE).

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 18, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • May 07, 2012
    Quiz Created by
    Cball
Back to Top Back to top
Advertisement