Noise
Jabber
Crosstalk
Intelligence
Unshielded twisted pair (UTP)
Screened twisted pair (ScTP)
Shielded twisted pair (STP)
Foiled twisted pair (FTP)
Cat 3
Cat 5
Cat 6
Cat 5E
Connector and pin assignment
Subsystems of structured cabling
Installation methods and practices
Recommended wireless topology and distances
Minimum requirements for telecommunications cabling
Life span of a telecommunications cabling system
Connecting hardware performance specifications
Color of the cable
Absorption loss
Insertion loss
Penetration loss
Return loss
Near-end crosstalk (NEXT)
Powersum near-end crosstalk (PSNEXT)
Powersum alien near-end crosstalk (PSANEXT)
Powersum insertion loss to alien crosstalk ratio far-end PSAACRF)
Absorption loss
Insertion loss
Penetration loss
Return loss
Entrance facility
Equipment room
Commercial demark
Telecommunications room
Entrance facility
Equipment room
Systems room
Work area
Intra cabling
Backbone cabling
Vertical cabling
Horizontal cabling
Inter-cabling
Backbone cabling
Veritcal cabling
Horizontal cabling
Intra-cabling
Backbone cabling
Vertical cabling
Horizontal cabling
Intra-cabling
Backbone cabling
Vertical cabling
Horizontal cabling
Patch cables
Adapters
Patch panels
Station equipment
606-A
666-A
568-A
568-B
33-202
7700
7703
7007
Using Defense Courier Service
Using protected distribution system
Using communications security equipment
Using intrusion detection optical communication system
Encrypted classified
Encrypted unclassified
Unencrypted classified
Unencrypted unclassified
Physical separation and electromagnetic separation
Electromagnetic separation and electrical separation
Physical separation and electrical separation
Physical separation and emmission separation
An unclassified term and a US GOVT code word that identifies an unclassified set of standards
An unclassified term and a US GOVT code word that identifies a classified set of standards
A classified term and a US GOVT code word that identifies an unclassified set of standards
A classified term and a US GOVT code word that identifies a classified set of standards
Eliminate all instances of radiation of electrical impulses
Reduce the chances of radiation of electrical impulses
Improve the signal of radiation of electrical impulses
Increase the range of radiation of electrical impulses
Communications Security
Transmission Security
Emission Security
Computer Security
Controlled Access Area (CAA)
Restricted Access Area (RAA)
Limited-Control Area (LCA)
Uncontrolled Access Area (UAA)
Communications security inspections
Separation inspections
Line route inspections
Electrical inspections
Emission security (EMSEC) log
TEMPEST log
Protected distribution system (PDS) log
Inspection log
Total surface
Visible area
Observable area
Concealed area
The analog signal
The digital signal
The multiplexed signal
The sender's private key
Data is faster
Voice is faster
In data, the encryption is handled by a separate device
In voice, the encryption is handled by a separate device
Algorithm and key
Algorithm and certificate
Certificate and key
Telephone and receiver
Symmetric-public key system and asymmetric-secret key system
Symmetric-secret key system and asymmetric-secret key system
Symmetric-secret key system and asymmetric-public key system
Symmetric-public key system and asymmetric-public key system
Symmetric
Asymmetric
Diametric
None of the above, they're all the same
Hash
Repository
Certification
Authentication
Private Key
Public Key
Secure Key
Authentication Key
Its public key
Its private key
Its public certificate
Its private certificate
Stream algorithms and block ciphers
Secure algorithms and block ciphers
Block algorithms and stream ciphers
Block algorithms and secure ciphers
64
128
192
256
One
Two
Three
Four
Narrowband
Network
Bulk
Open
Authenticity
Compliance
Integrity
Validity
Relocate classified material to strengthen security
Conduct assessments to evaluate compromise of national security
Deflect unauthorized interception and analysis of compromising emanations
Detect and correct procedural weaknesses that could expose critical information
AFI 33-119
AFI 33-129
AFI 33-219
AFI 33-329
Cryptosecurity
Physical security
Emission security
Transmission security
AFI 33-201, Volume 1
AFI 33-202, Volume 1
AFI 31-201, Volume 1
AFI 31-202, Volume 1
Courier control
Communications Security (COMSEC) manager control
Two-person integrity (TPI) control
COMSEC Responsible Officer (CRO) control
Standard Form (SF) 135
SF 153
SF 351
SF 531
Beginning of the week
Beginning of the duty day
End of the week or month
End of the shift or duty day
AF Form 1019
AF Form 1109
AF Form 1119
AF Form 1190
Secure Telephone Unit (STU)
Cryptographic Telephone (CT)
Secure Terminal Equipment (STE)
Pretty Good Privacy Phone (PGPfone)
Secure Telephone Unit (STU)
Cryptographic Telephone (CT)
Secure Terminal Equipment (STE)
Pretty Good Privacy Phone (PGPfone)
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.