3D151 Vol 3

86 Questions | Attempts: 347
Share

SettingsSettingsSettings
3D151 Quizzes & Trivia

Questions and Answers
  • 1. 

    What condition occurs when a signal is induced into one circuit from another?

    • A.

      Noise

    • B.

      Jabber

    • C.

      Crosstalk

    • D.

      Intelligence

    Correct Answer
    C. Crosstalk
  • 2. 

    What cabling is the most commonly used?

    • A.

      Unshielded twisted pair (UTP)

    • B.

      Screened twisted pair (ScTP)

    • C.

      Shielded twisted pair (STP)

    • D.

      Foiled twisted pair (FTP)

    Correct Answer
    A. Unshielded twisted pair (UTP)
  • 3. 

    Which category (Cat) of cable can support data rates up to 100 Mbps?

    • A.

      Cat 3

    • B.

      Cat 5

    • C.

      Cat 6

    • D.

      Cat 5E

    Correct Answer
    B. Cat 5
  • 4. 

    Which principle is not addressed in the ANSI/TIA/EIA-568-B Standard?

    • A.

      Connector and pin assignment

    • B.

      Subsystems of structured cabling

    • C.

      Installation methods and practices

    • D.

      Recommended wireless topology and distances

    Correct Answer
    D. Recommended wireless topology and distances
  • 5. 

    Which principle is not addressed in the ANSI/TIA/EIA-568-B Standard?

    • A.

      Minimum requirements for telecommunications cabling

    • B.

      Life span of a telecommunications cabling system

    • C.

      Connecting hardware performance specifications

    • D.

      Color of the cable

    Correct Answer
    D. Color of the cable
  • 6. 

    Which TIA/EIA parameter test is a measure of the decrease of signal strength as it travels down the media?

    • A.

      Absorption loss

    • B.

      Insertion loss

    • C.

      Penetration loss

    • D.

      Return loss

    Correct Answer
    B. Insertion loss
  • 7. 

    Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?

    • A.

      Near-end crosstalk (NEXT)

    • B.

      Powersum near-end crosstalk (PSNEXT)

    • C.

      Powersum alien near-end crosstalk (PSANEXT)

    • D.

      Powersum insertion loss to alien crosstalk ratio far-end PSAACRF)

    Correct Answer
    A. Near-end crosstalk (NEXT)
  • 8. 

    Which TIA/EIA parameter test is a measure of the degree of impedance mismatch between two impedances?

    • A.

      Absorption loss

    • B.

      Insertion loss

    • C.

      Penetration loss

    • D.

      Return loss

    Correct Answer
    D. Return loss
  • 9. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling?

    • A.

      Entrance facility

    • B.

      Equipment room

    • C.

      Commercial demark

    • D.

      Telecommunications room

    Correct Answer
    A. Entrance facility
  • 10. 

    What cabling system subsystem provides any or all of the functions of a telecommunications room?

    • A.

      Entrance facility

    • B.

      Equipment room

    • C.

      Systems room

    • D.

      Work area

    Correct Answer
    B. Equipment room
  • 11. 

    Which subsystem of the ANSI/TIA/EIA-568-B stuctured cabling can be used for connecting between floors?

    • A.

      Intra cabling

    • B.

      Backbone cabling

    • C.

      Vertical cabling

    • D.

      Horizontal cabling

    Correct Answer
    B. Backbone cabling
  • 12. 

    Which subsytem of the ANSI/TIA/EIA-568-B structured cabling can be used to interconnect buildings?

    • A.

      Inter-cabling

    • B.

      Backbone cabling

    • C.

      Veritcal cabling

    • D.

      Horizontal cabling

    Correct Answer
    B. Backbone cabling
  • 13. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling extends from the telecommunications room to the work area telecommunications information outlets?

    • A.

      Intra-cabling

    • B.

      Backbone cabling

    • C.

      Vertical cabling

    • D.

      Horizontal cabling

    Correct Answer
    D. Horizontal cabling
  • 14. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling recognizes multimode cable?

    • A.

      Intra-cabling

    • B.

      Backbone cabling

    • C.

      Vertical cabling

    • D.

      Horizontal cabling

    Correct Answer
    D. Horizontal cabling
  • 15. 

    The work area of the ANSI/TIA/EIA-568-B structured cabling system consists of all except which components?

    • A.

      Patch cables

    • B.

      Adapters

    • C.

      Patch panels

    • D.

      Station equipment

    Correct Answer
    C. Patch panels
  • 16. 

    Which ANSI/TIA/EIA standard defines labeling cables and patch panels?

    • A.

      606-A

    • B.

      666-A

    • C.

      568-A

    • D.

      568-B

    Correct Answer
    A. 606-A
  • 17. 

    What Air Force Systems Security Instruction (AFSSI) directs implementation of protected distribution systems?

    • A.

      33-202

    • B.

      7700

    • C.

      7703

    • D.

      7007

    Correct Answer
    C. 7703
  • 18. 

    Which method is not a means for secure telecommunications?

    • A.

      Using Defense Courier Service

    • B.

      Using protected distribution system

    • C.

      Using communications security equipment

    • D.

      Using intrusion detection optical communication system

    Correct Answer
    A. Using Defense Courier Service
  • 19. 

    In the RED/BLACK concept, what type of traffic do RED lines carry?

    • A.

      Encrypted classified

    • B.

      Encrypted unclassified

    • C.

      Unencrypted classified

    • D.

      Unencrypted unclassified

    Correct Answer
    C. Unencrypted classified
  • 20. 

    The RED/BLACK concept has which two parts?

    • A.

      Physical separation and electromagnetic separation

    • B.

      Electromagnetic separation and electrical separation

    • C.

      Physical separation and electrical separation

    • D.

      Physical separation and emmission separation

    Correct Answer
    C. Physical separation and electrical separation
  • 21. 

    TEMPEST IS:

    • A.

      An unclassified term and a US GOVT code word that identifies an unclassified set of standards

    • B.

      An unclassified term and a US GOVT code word that identifies a classified set of standards

    • C.

      A classified term and a US GOVT code word that identifies an unclassified set of standards

    • D.

      A classified term and a US GOVT code word that identifies a classified set of standards

    Correct Answer
    B. An unclassified term and a US GOVT code word that identifies a classified set of standards
  • 22. 

    What is the purpose of the TEMPEST program?

    • A.

      Eliminate all instances of radiation of electrical impulses

    • B.

      Reduce the chances of radiation of electrical impulses

    • C.

      Improve the signal of radiation of electrical impulses

    • D.

      Increase the range of radiation of electrical impulses

    Correct Answer
    B. Reduce the chances of radiation of electrical impulses
  • 23. 

    What is the TEMPEST program in the Air Force called?

    • A.

      Communications Security

    • B.

      Transmission Security

    • C.

      Emission Security

    • D.

      Computer Security

    Correct Answer
    C. Emission Security
  • 24. 

    What area is described as the completed building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

    • A.

      Controlled Access Area (CAA)

    • B.

      Restricted Access Area (RAA)

    • C.

      Limited-Control Area (LCA)

    • D.

      Uncontrolled Access Area (UAA)

    Correct Answer
    A. Controlled Access Area (CAA)
  • 25. 

    Protected distribution systems (PDS) require which schedule inspection?

    • A.

      Communications security inspections

    • B.

      Separation inspections

    • C.

      Line route inspections

    • D.

      Electrical inspections

    Correct Answer
    C. Line route inspections
  • 26. 

    Protected distribution systems (PDS) events such as alarms and inspections are recorded where?

    • A.

      Emission security (EMSEC) log

    • B.

      TEMPEST log

    • C.

      Protected distribution system (PDS) log

    • D.

      Inspection log

    Correct Answer
    C. Protected distribution system (PDS) log
  • 27. 

    A line route inspection of a  protected distribution system (PDS) consists of a close visual inspection that must include the:

    • A.

      Total surface

    • B.

      Visible area

    • C.

      Observable area

    • D.

      Concealed area

    Correct Answer
    A. Total surface
  • 28. 

    What using a Secure Terminal Equipment (STE), what is encrypted?

    • A.

      The analog signal

    • B.

      The digital signal

    • C.

      The multiplexed signal

    • D.

      The sender's private key

    Correct Answer
    B. The digital signal
  • 29. 

    What is the difference between data encryption and voice encryption?

    • A.

      Data is faster

    • B.

      Voice is faster

    • C.

      In data, the encryption is handled by a separate device

    • D.

      In voice, the encryption is handled by a separate device

    Correct Answer
    C. In data, the encryption is handled by a separate device
  • 30. 

    What components are used in both encryption and decryption?

    • A.

      Algorithm and key

    • B.

      Algorithm and certificate

    • C.

      Certificate and key

    • D.

      Telephone and receiver

    Correct Answer
    A. Algorithm and key
  • 31. 

    What are the two basic types of computer cryptology?

    • A.

      Symmetric-public key system and asymmetric-secret key system

    • B.

      Symmetric-secret key system and asymmetric-secret key system

    • C.

      Symmetric-secret key system and asymmetric-public key system

    • D.

      Symmetric-public key system and asymmetric-public key system

    Correct Answer
    C. Symmetric-secret key system and asymmetric-public key system
  • 32. 

    Which cryptology system has a disadvantage of using more processing power and time?

    • A.

      Symmetric

    • B.

      Asymmetric

    • C.

      Diametric

    • D.

      None of the above, they're all the same

    Correct Answer
    B. Asymmetric
  • 33. 

    Which authorities are trusted entities that issue certificates?

    • A.

      Hash

    • B.

      Repository

    • C.

      Certification

    • D.

      Authentication

    Correct Answer
    C. Certification
  • 34. 

    What infrastructure is a set of hardware, software, policies and procedures used to create, manage, store, distribute and revoke digital certificates?

    • A.

      Private Key

    • B.

      Public Key

    • C.

      Secure Key

    • D.

      Authentication Key

    Correct Answer
    B. Public Key
  • 35. 

    In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the web server give to the browser?

    • A.

      Its public key

    • B.

      Its private key

    • C.

      Its public certificate

    • D.

      Its private certificate

    Correct Answer
    A. Its public key
  • 36. 

    What are the two major types of encryption algorithms in the use today that operate by encrypting or decrypting one chunk of data at a time?

    • A.

      Stream algorithms and block ciphers

    • B.

      Secure algorithms and block ciphers

    • C.

      Block algorithms and stream ciphers

    • D.

      Block algorithms and secure ciphers

    Correct Answer
    C. Block algorithms and stream ciphers
  • 37. 

    Data Encryption Standard (DES) uses how many bits for its key?

    • A.

      64

    • B.

      128

    • C.

      192

    • D.

      256

    Correct Answer
    A. 64
  • 38. 

    Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

    • A.

      One

    • B.

      Two

    • C.

      Three

    • D.

      Four

    Correct Answer
    C. Three
  • 39. 

    Which encryption is not a telecommunications encryption type?

    • A.

      Narrowband

    • B.

      Network

    • C.

      Bulk

    • D.

      Open

    Correct Answer
    D. Open
  • 40. 

    Communications Security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure:

    • A.

      Authenticity

    • B.

      Compliance

    • C.

      Integrity

    • D.

      Validity

    Correct Answer
    A. Authenticity
  • 41. 

    The Communications Security (COMSEC) program is designed to:

    • A.

      Relocate classified material to strengthen security

    • B.

      Conduct assessments to evaluate compromise of national security

    • C.

      Deflect unauthorized interception and analysis of compromising emanations

    • D.

      Detect and correct procedural weaknesses that could expose critical information

    Correct Answer
    D. Detect and correct procedural weaknesses that could expose critical information
  • 42. 

    What reference would you use for guidance on Air Force messaging?

    • A.

      AFI 33-119

    • B.

      AFI 33-129

    • C.

      AFI 33-219

    • D.

      AFI 33-329

    Correct Answer
    A. AFI 33-119
  • 43. 

    Which Communications Security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

    • A.

      Cryptosecurity

    • B.

      Physical security

    • C.

      Emission security

    • D.

      Transmission security

    Correct Answer
    B. Physical security
  • 44. 

    Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy Communications Security (COMSEC) material?

    • A.

      AFI 33-201, Volume 1

    • B.

      AFI 33-202, Volume 1

    • C.

      AFI 31-201, Volume 1

    • D.

      AFI 31-202, Volume 1

    Correct Answer
    A. AFI 33-201, Volume 1
  • 45. 

    Top secret keying material must be handled, stored, transported and destroyed under:

    • A.

      Courier control

    • B.

      Communications Security (COMSEC) manager control

    • C.

      Two-person integrity (TPI) control

    • D.

      COMSEC Responsible Officer (CRO) control

    Correct Answer
    C. Two-person integrity (TPI) control
  • 46. 

    Which form is used with a transfer report to accompany a Communications Security (COMSEC) package?

    • A.

      Standard Form (SF) 135

    • B.

      SF 153

    • C.

      SF 351

    • D.

      SF 531

    Correct Answer
    B. SF 153
  • 47. 

    When a security container is opened, it is inventoried at the:

    • A.

      Beginning of the week

    • B.

      Beginning of the duty day

    • C.

      End of the week or month

    • D.

      End of the shift or duty day

    Correct Answer
    D. End of the shift or duty day
  • 48. 

    Which form is used as a register log to record visitors into restricted areas?

    • A.

      AF Form 1019

    • B.

      AF Form 1109

    • C.

      AF Form 1119

    • D.

      AF Form 1190

    Correct Answer
    B. AF Form 1109
  • 49. 

    What is the newest generation of secure voice telephone?

    • A.

      Secure Telephone Unit (STU)

    • B.

      Cryptographic Telephone (CT)

    • C.

      Secure Terminal Equipment (STE)

    • D.

      Pretty Good Privacy Phone (PGPfone)

    Correct Answer
    C. Secure Terminal Equipment (STE)
  • 50. 

    Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

    • A.

      Secure Telephone Unit (STU)

    • B.

      Cryptographic Telephone (CT)

    • C.

      Secure Terminal Equipment (STE)

    • D.

      Pretty Good Privacy Phone (PGPfone)

    Correct Answer
    C. Secure Terminal Equipment (STE)

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Feb 21, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 06, 2012
    Quiz Created by
    Miccur33
Back to Top Back to top
Advertisement