3D152 Ure Volume 2

124 Questions | Total Attempts: 564

SettingsSettingsSettings
Please wait...
3D152 Quizzes & Trivia

.


Questions and Answers
  • 1. 
    (201) At what Open System Interconnection (OSI) layer are virtual circuits established, maintained and terminated?
    • A. 

      Network.

    • B. 

      Physical.

    • C. 

      Data Link.

    • D. 

      Transport.

  • 2. 
    (201) Which of the following is an example of a video compression standard?
    • A. 

      Motion Picture Experts Group-4 (MPEG-4).

    • B. 

      Joint Photographic Expert Group (JPEG).

    • C. 

      File Transfer Protocol (FTP).

    • D. 

      G.711.

  • 3. 
    (202) In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?
    • A. 

      Layer above.

    • B. 

      Layer below.

    • C. 

      Lowest layer.

    • D. 

      Peer layer.

  • 4. 
    (203) What data communication protocol uses characters or "handshaking" to control the link and represent information?
    • A. 

      Asynchronous protocol.

    • B. 

      Binary synchronous protocol.

    • C. 

      Synchronous Data Link Control (SDLC).

    • D. 

      High-Level Data Link Control (HDLC).

  • 5. 
    (203) In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?
    • A. 

      SEQ.

    • B. 

      SYN.

    • C. 

      STX.

    • D. 

      EST.

  • 6. 
    (203) Which data communication protocol is based on bits and the position of the bits?
    • A. 

      Character-oriented.

    • B. 

      Bit-oriented.

    • C. 

      Network.

    • D. 

      Routing.

  • 7. 
    (203) Which data communication protocol is a transmission code that supports a variety of link types and topologies?
    • A. 

      Asynchronous protocol.

    • B. 

      Binary synchronous protocol

    • C. 

      Synchronous Data Link Control (SDLC).

    • D. 

      High-Level Data Link Control (HDLC).

  • 8. 
    (204) Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?
    • A. 

      IP.

    • B. 

      Address Resolution Protocol (ARP).

    • C. 

      Reverse Address Resolution Protocol (RARP).

    • D. 

      Internet Control Message Protocol (ICMP).

  • 9. 
    (204) Which Network layer protocol provides messaging that can help with troubleshooting?
    • A. 

      Internet Protocol (IP).

    • B. 

      Address Resolution Protocol (ARP).

    • C. 

      Reserve Address Resolution Protocol (RARP).

    • D. 

      Internet Control Message Protocol (ICMP).

  • 10. 
    (204) Which Transport layer protocol provides reliable data delivery services?
    • A. 

      Internet Protocol (IP).

    • B. 

      User Datagram Protocol (UDP).

    • C. 

      Transmission Control Protocol (TCP).

    • D. 

      Internet Control Message Protocol (ICMP).

  • 11. 
    (204) Which Application layer protocol is used to synchronize the clocks of computers on a network?
    • A. 

      Simple Network Management Protocol (SNMP).

    • B. 

      Dynamic Host Configuration Protocol (DHCP).

    • C. 

      Network Time Protocol (NTP).

    • D. 

      Packet Internet Groper (PING).

  • 12. 
    (205) Which network Class has the most addresses for hosts?
    • A. 

      A.

    • B. 

      B.

    • C. 

      C.

    • D. 

      D.

  • 13. 
    (205) How many subnet bits are required to support 90 subnets on a Class B network?
    • A. 

      Three.

    • B. 

      Five.

    • C. 

      Seven.

    • D. 

      Nine.

  • 14. 
    (206) Internet protocol version 6 (IPv6) addresses are represented by
    • A. 

      8 groups of dotted decimal numbers.

    • B. 

      8 groups of hexadecimal numbers.

    • C. 

      4 dotted decimal numbers.

    • D. 

      128 decimal numbers.

  • 15. 
    (206) Teredo has four tunneling components. Which one is not one of them?
    • A. 

      Host-specific relay.

    • B. 

      Client.

    • C. 

      Server.

    • D. 

      Agent.

  • 16. 
    (207) Which device has multiport connectivity that directs data between nodes on a network?
    • A. 

      Bridge.

    • B. 

      Router.

    • C. 

      Gateway.

    • D. 

      Repeater.

  • 17. 
    (207) Which routing protocol do internet backbones use?
    • A. 

      Border Gateway Protocol (BGP).

    • B. 

      Open Shortest Path First (OSPF).

    • C. 

      Routing Information Protocol (RIP).

    • D. 

      Enhanced Interior Gateway Routing Protocol (EIGRP).

  • 18. 
    (208) Which router port is used for initial configuration?
    • A. 

      Auxiliary.

    • B. 

      Console.

    • C. 

      Ethernet.

    • D. 

      Telnet.

  • 19. 
    (208) When configuring a router, you control access to privileged EXEC mode by configuring which password?
    • A. 

      Line console.

    • B. 

      Line vty.

    • C. 

      Enable.

    • D. 

      Secret.

  • 20. 
    (208) On a router's serial interface connection, what provides the timing signal for the communication link?
    • A. 

      Data communication equipment.

    • B. 

      Data terminal equipment.

    • C. 

      Internal oscillator.

    • D. 

      Atomic clock.

  • 21. 
    (209) Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an
    • A. 

      Department of Defense Network.

    • B. 

      Air Force Network.

    • C. 

      Local Area Network.

    • D. 

      A Public Network.

  • 22. 
    (210) Which topology defines the way in which devices communicate and data is transmitted throughout the network?
    • A. 

      Physical.

    • B. 

      Logical.

    • C. 

      Hybrid.

    • D. 

      Star.

  • 23. 
    (210) Which topology has the stations connected in the form of a circle?
    • A. 

      Bus.

    • B. 

      Ring.

    • C. 

      Star.

    • D. 

      Hybrid.

  • 24. 
    (210) Which topology combines two or more different physical topologies in a single network?
    • A. 

      Bus.

    • B. 

      Ring.

    • C. 

      Star.

    • D. 

      Hybrid.

  • 25. 
    (211) Which device subdivides a network into smaller logical pieces, or segments?
    • A. 

      Switch.

    • B. 

      Firewall.

    • C. 

      Gateway.

    • D. 

      Repeater.

  • 26. 
    (211) The time it takes a switch to figure out where to forward a data unit is called its
    • A. 

      Lag.

    • B. 

      Hop.

    • C. 

      Latency.

    • D. 

      Time zone.

  • 27. 
    (211) Which of the following is not a distinct layer of a hierarchical network design?
    • A. 

      Core.

    • B. 

      Access.

    • C. 

      Transport.

    • D. 

      Distribution.

  • 28. 
    (214) Which physical security action can you take to ensure network equipment supports the widest range of security services?
    • A. 

      Configure the equipment with the maximum amount of memory possible.

    • B. 

      Configure the equipment to use a line console password.

    • C. 

      Power cycle the equipment at the end of the duty day.

    • D. 

      Configure the equipment using setup mode.

  • 29. 
    How many broadcast domains forms a Virtual LAN (VLAN)?
    • A. 

      1.

    • B. 

      2.

    • C. 

      3.

    • D. 

      4.

  • 30. 
    (211) What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?
    • A. 

      VLAN trunks.

    • B. 

      VLAN frames.

    • C. 

      VLAN links.

    • D. 

      VLAN ports.

  • 31. 
    (211) Which of the following will minimize EtherChannel configuration problems?
    • A. 

      Disable all the interfaces after creating the EtherChannel.

    • B. 

      Configure all interfaces to operate at the same speed and duplex mode.

    • C. 

      Configure all interfaces for the same parameters as the last port configured.

    • D. 

      Assign all interfaces in the EtherChannel to a different Virtual LAN (VLAN).

  • 32. 
    (212) Which institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?
    • A. 

      802.11a.

    • B. 

      802.11b.

    • C. 

      802.11g.

    • D. 

      802.11r.

  • 33. 
    (212) Which wireless design phase accounts for the amount of users on the network, the training required for the users and security and integrity requirements of the network data?
    • A. 

      Planning.

    • B. 

      Securing.

    • C. 

      Deployment.

    • D. 

      Management.

  • 34. 
    (212) What identifier differentiates one wireless local area network (WLAN) from anther?
    • A. 

      Host name.

    • B. 

      Network name.

    • C. 

      Service Set Identifier (SSID).

    • D. 

      Virtual LAN Identifier (VLAN ID).

  • 35. 
    (213) A Management Information Base (MIB) is a collection of information that is organized
    • A. 

      Alphabetically.

    • B. 

      Hierarchically.

    • C. 

      Numerically.

    • D. 

      Objectively.

  • 36. 
    (213) Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for
    • A. 

      Future growth.

    • B. 

      Network security.

    • C. 

      Remote monitoring.

    • D. 

      Network contingencies.

  • 37. 
    (214) In general, you should deny direct dial-in access to a network device by disabling which port?
    • A. 

      Console.

    • B. 

      Auxiliary.

    • C. 

      Interface.

    • D. 

      Virtual terminal.

  • 38. 
    (215) Individual pulses within a digital signal are
    • A. 

      Bits.

    • B. 

      Bytes.

    • C. 

      Codes.

    • D. 

      Blocks.

  • 39. 
    (215) What is most commonly used in data systems to express signaling speed? 
    • A. 

      Baud rate.

    • B. 

      Interface speed.

    • C. 

      Bits per second.

    • D. 

      Baud per second.

  • 40. 
    (216) Which option is a characteristic of synchronous data operation?
    • A. 

      Timing pulses are transmitted within the signal stream.

    • B. 

      Start and stop pulses control data transmission.

    • C. 

      System timing is not critical importance.

    • D. 

      All data bits are the same length in time.

  • 41. 
    (216) A digital signal that contains synchronizing bits within the signal stream describes
    • A. 

      Synchronous operation.

    • B. 

      Asynchronous operation.

    • C. 

      Synchronous and/or isochronous operation.

    • D. 

      Asynchronous and/or synchronous operation.

  • 42. 
    (217) How many voltage levels does a binary signal have?
    • A. 

      1.

    • B. 

      2.

    • C. 

      3.

    • D. 

      4.

  • 43. 
    (217) In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?
    • A. 

      Non-return-to-zero (NRZ) level.

    • B. 

      NRZ mark.

    • C. 

      NRZ space.

    • D. 

      Return-to-zero

  • 44. 
    (218) Digital coding techniques such as binary with eight-zero substitution (B8ZS) are becoming more popular because they are designed to
    • A. 

      Provide error-free signaling.

    • B. 

      Operate at higher data rates.

    • C. 

      Eliminate bipolar violations.

    • D. 

      Maintain ones density standards.

  • 45. 
    (218) Which statement best describes a binary with eight-zero substitution (B8ZS) signal?
    • A. 

      The information is transmitted in three different voltage levels.

    • B. 

      A logic one is transmitted as positive voltage if the previous logic one was negative.

    • C. 

      The level always returns to zero for 50 percent of the bit cycle after every transition.

    • D. 

      Bipolar violations are intentionally inserted into a data signal to break up long strings of zeros.

  • 46. 
    (219) How many bits are in the extended superframe format (ESF) framing sequence?
    • A. 

      8.

    • B. 

      12.

    • C. 

      24.

    • D. 

      48.

  • 47. 
    (220) The signaling equipment has three types of communications signals that functions to
    • A. 

      Process switch addressing.

    • B. 

      Control digit translations.

    • C. 

      Control and process calls.

    • D. 

      Provide a clear signal.

  • 48. 
    (220) Which communications control signal uses a two-frequency dialing combination?
    • A. 

      Pulse.

    • B. 

      Tone.

    • C. 

      Digit.

    • D. 

      Address.

  • 49. 
    (221) In common associated signaling (CAS), what is the seventh bit in frame 6 and 12 used for?
    • A. 

      Bit robbing.

    • B. 

      Bit stuffing.

    • C. 

      Frame correction.

    • D. 

      Frame enhancement.

  • 50. 
    (221) How is supervisory signaling information transferred in common channel signaling (CCS)?
    • A. 

      Bit robbing.

    • B. 

      Bit stuffing.

    • C. 

      Frame correction.

    • D. 

      Separate network channel.

  • 51. 
    (221) Which common channel signaling (CCS) mode does the transfer of message relating to signaling between two points occur directly over links interconnecting the signaling points?
    • A. 

      Associated.

    • B. 

      Nonassociated.

    • C. 

      Quasi-associated.

    • D. 

      Multi-associated.

  • 52. 
    (222) What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?
    • A. 

      Modulation.

    • B. 

      Multiplexing.

    • C. 

      Quantization.

    • D. 

      Synthesizing.

  • 53. 
    (222) The signal components that occur as bands above and below a carrier are called
    • A. 

      Sidebands.

    • B. 

      Sine waves.

    • C. 

      Frequency translators.

    • D. 

      Modulating frequencies.

  • 54. 
    (222) To prevent frequency modulation (FM) radio stations from interfering with each other, the Federal Communications Commission (FCC) has set limits that allow each station to cause its oscillator frequency to deviate no more than
    • A. 

      20 kHz.

    • B. 

      50 kHz.

    • C. 

      75 kHz.

    • D. 

      88 kHz.

  • 55. 
    (223) Which form of modulation is insensitive to signal variations?
    • A. 

      Delta modulation.

    • B. 

      Frequency shift keying.

    • C. 

      Binary-phase shift keying.

    • D. 

      Pulse-amplitude modulation.

  • 56. 
    (223) The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as
    • A. 

      Pulse-amplitude.

    • B. 

      Pulse-duration.

    • C. 

      Pulse- position.

    • D. 

      Pulse-code.

  • 57. 
    (223) Which type of pulse modulation is least affected by noise?
    • A. 

      Pulse-amplitude.

    • B. 

      Pulse-duration.

    • C. 

      Pulse-position.

    • D. 

      Pulse-code.

  • 58. 
    (224) Which form of multiplexing is very susceptible to signal deterioration?
    • A. 

      Frequency-division.

    • B. 

      Wave-division.

    • C. 

      Time-division.

    • D. 

      Phase-division.

  • 59. 
    (225) What are the two major type of frame structures?
    • A. 

      Low speed and high speed.

    • B. 

      High speed and EBCDIC.

    • C. 

      CCITT and low speed.

    • D. 

      EBCDIC and CCITT.

  • 60. 
    (225) The method of multiplexing the T1 multiplexer uses is
    • A. 

      Frequency division.

    • B. 

      Binary division.

    • C. 

      Pulse division.

    • D. 

      Time division.

  • 61. 
    (226) Which wave-division multiplexing technology uses uncooled lasers to reduce cost?
    • A. 

      Wave-division multiplexing.

    • B. 

      Coarse wave division multiplexing.

    • C. 

      Dense wave division multiplexing.

    • D. 

      Long wave division multiplexing.

  • 62. 
    (227) To create a better timing environment in communication networks, external timing distribution occurs through
    • A. 

      Station clocks.

    • B. 

      Internal timing.

    • C. 

      Crystal oscillators.

    • D. 

      Distribution frames.

  • 63. 
    (227) What do Global Positioning System (GPS) satellites use to provide very precise time to GPS receivers?
    • A. 

      Crystal Oscillator.

    • B. 

      Internal timing.

    • C. 

      Atomic Clock.

    • D. 

      Station Clock.

  • 64. 
    (227) Which stratum level is a Global Positioning System (GPS) timing source?
    • A. 

      1.

    • B. 

      2.

    • C. 

      3.

    • D. 

      4.

  • 65. 
    (228) Which agency has responsibility for a circuit end-to-end?
    • A. 

      Defense Information System Agency (DISA).

    • B. 

      Network Control Center (NCC).

    • C. 

      Node Side Coordinator (NSC).

    • D. 

      Circuit Control Office (CCO).

  • 66. 
    (228) Who is responsible for all circuits within their facility up to the designated demarcation point and provides troubleshooting assistance at the direction of the Global NetOps Support Center (GNSC)?
    • A. 

      Communications focal point.

    • B. 

      Network Control Center.

    • C. 

      Node Side Coordinator.

    • D. 

      Circuit actions officer.

  • 67. 
    (229) Which agency is the preferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?
    • A. 

      Commercial providers.

    • B. 

      National Security Agency (NSA).

    • C. 

      Air Force Space Command (AFPC).

    • D. 

      Defense information System Agency (DISA).

  • 68. 
    (229) What web application is used to order telecommunications products and services from the Defense Information System Agency (DISA)?
    • A. 

      DISA Direct Order Entry (DDOE).

    • B. 

      Facility Circuit Information Tracking (FaCIT).

    • C. 

      Cyberspace Infrastructure Planning System (CIPS).

    • D. 

      Telecommunication Certifications Office Support System (TCOSS).

  • 69. 
    (229) What document is the authority for the operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit?
    • A. 

      Request for service.

    • B. 

      Service acquisition message.

    • C. 

      Telecommunications service order.

    • D. 

      Telecommunications service request.

  • 70. 
    (230) Which DD form do you use for an official narrative log that is often used to brief unit commander?
    • A. 

      1441.

    • B. 

      1443.

    • C. 

      1698.

    • D. 

      1753.

  • 71. 
    Which DD form is used as the primary source of information when preparing DOD Information Network (DODIN) status reports?
    • A. 

      1441.

    • B. 

      1443.

    • C. 

      1445.

    • D. 

      1753.

  • 72. 
    (230) Which test results do you record on the reverse/back side of the DD form 1697-Analog?
    • A. 

      Idle channel noise and test tone levels.

    • B. 

      Terminal impedance and impulse noise.

    • C. 

      Frequency response and envelop delay.

    • D. 

      Net loss variation and single tone interference.

  • 73. 
    (230) If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?
    • A. 

      The latest telecommunication service order (TSO) that reflects the current end-to-end circuit configuration.

    • B. 

      The original TSO and the original circuit test data.

    • C. 

      The latest TSO and the latest circuit test data.

    • D. 

      The original TSO that established the circuit.

  • 74. 
    (231) Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?
    • A. 

      72.

    • B. 

      48.

    • C. 

      24.

    • D. 

      12.

  • 75. 
    (231) What report must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?
    • A. 

      In-effect.

    • B. 

      Exception.

    • C. 

      Acceptance.

    • D. 

      Delayed service.

  • 76. 
    (232) Trend analysis is a program that ensures circuits meet management thresholds on what basis?
    • A. 

      Daily.

    • B. 

      Weekly.

    • C. 

      Monthly.

    • D. 

      Annual.

  • 77. 
    (232) If a circuit fails its management threshold, what test might be performed?
    • A. 

      Quality control.

    • B. 

      Operational acceptance.

    • C. 

      Test and acceptance.

    • D. 

      Operations and maintenance.

  • 78. 
    (223) Which publication lists the methods used to identify systems, links, trunks and circuits?
    • A. 

      Defense Information System Agency Circular (DISAC) 310-70-1.

    • B. 

      DISAC 310-65-1.

    • C. 

      DISAC 310-55-1.

    • D. 

      DISAC 300-175-9.

  • 79. 
    (234) Which office or system confirms a restoration priority?
    • A. 

      Circuit control office.

    • B. 

      Systems control facility.

    • C. 

      Defense Communications System (DCS).

    • D. 

      National Communications System (NCS).

  • 80. 
    (235) Combined distribution frames encompass the functions of a main distribution frame and
    • A. 

      An intermediate distribution frame.

    • B. 

      A black distribution frame.

    • C. 

      A read distribution frame.

    • D. 

      A mid distribution frame.

  • 81. 
    (234) When you restore user service by rerouting, what is the second type of circuit you preempt?
    • A. 

      Spare channels.

    • B. 

      Active on-call circuits.

    • C. 

      Nonactive on-call circuits.

    • D. 

      Circuits with 00 RP codes.

  • 82. 
    (236) Who determines if Preventative Maintenance Inspection (PMI) are accomplished when commercial manuals or publications are not available?
    • A. 

      Flight commander.

    • B. 

      Manufacturer.

    • C. 

      Technician.

    • D. 

      NCOIC.

  • 83. 
    (239) The three cornerstones of voice network system security are availability,
    • A. 

      Circumvention, and confidentiality.

    • B. 

      Circumvention, and disclosure.

    • C. 

      Confidentiality, and integrity.

    • D. 

      Disclosure, and integrity.

  • 84. 
    (237) When a telephone network is circuit switched, each call
    • A. 

      Is broadcast over multiple paths between switches.

    • B. 

      Is packetized and transmitted in circuitous bursts.

    • C. 

      Has a dedicated circuit created by the switch.

    • D. 

      Has a dedicated trunk created by the switch.

  • 85. 
    (238) In Integrated Services Digital Network (ISDN), the "B" channel carries
    • A. 

      User traffic.

    • B. 

      Call setup traffic.

    • C. 

      Handshaking data.

    • D. 

      Management data.

  • 86. 
    The vulnerabilities of voice and data converged networks were highlighted in a report released by the
    • A. 

      President's National Security Telecommunications Advisory Committee.

    • B. 

      Air Force Network Integration Center.

    • C. 

      Air Force Information Warfare Battle lab.

    • D. 

      Cryptographic Systems Group.

  • 87. 
    (240) What should security policies encompass to help mitigate the threat of convergence?
    • A. 

      Data networks only.

    • B. 

      Voice networks only.

    • C. 

      Both voice and data networks.

    • D. 

      Neither voice and data networks.

  • 88. 
    (240) What provides enterprise wide visibility into telecom resource utilization, phone network usage and incidents of toll fraud?
    • A. 

      Public Switched Telephone Network System.

    • B. 

      Enterprise Telephony Management System.

    • C. 

      Voice over Internet Protocol System.

    • D. 

      Time Division Multiplexing System.

  • 89. 
    (240) During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection system?
    • A. 

      The President's National Security Telecommunications Advisory Committee.

    • B. 

      The Air Force Information Warfare Battle Lab.

    • C. 

      The Air Force Network Integration Center.

    • D. 

      The Cryptographic Systems Group.

  • 90. 
    (240) Which is not a component of the voice protection system architecture?
    • A. 

      Server.

    • B. 

      Firewall.

    • C. 

      Software.

    • D. 

      Appliance.

  • 91. 
    (240) Where are voice protection system servers installed?
    • A. 

      Local bases.

    • B. 

      MAJCOM headquarters.

    • C. 

      Air Force Network Operations Center.

    • D. 

      Integrated Network and Security Center.

  • 92. 
    (240) Which is not a characteristic and capability of a voice protection system?
    • A. 

      Securing communications.

    • B. 

      Enabling of real-time notifications.

    • C. 

      Centralizing yet distribution management.

    • D. 

      Detecting and blocking all inbound and outbound modem connections.

  • 93. 
    (240) What are attempts to gain access to a switch system by posing as an authorized user?
    • A. 

      Toll fraud.

    • B. 

      War dialing.

    • C. 

      Masquerades.

    • D. 

      Denial of service.

  • 94. 
    (241) How many serial data interface ports does the Meridian Option 11C Small System Controller have?
    • A. 

      32.

    • B. 

      12.

    • C. 

      3.

    • D. 

      1.

  • 95. 
    (242) What is the maximum number of ports that a Meridian System Logic - 100 (MSL-100) supports?
    • A. 

      10,000.

    • B. 

      30,000.

    • C. 

      100,000.

    • D. 

      300,000.

  • 96. 
    (242) Which elements make up the control component of the SuperNode central control?
    • A. 

      Computing mode (CM) and message switches (MS).

    • B. 

      CM and system load module (SLM).

    • C. 

      Central processing unit (CPU) and control monitor unit (CMU).

    • D. 

      CPU, digital signal (DS), and peripheral module (PM).

  • 97. 
    (242) What link is used to connect the Digital Multiplex System (DMS)-core to the DMS-bus?
    • A. 

      DS-1.

    • B. 

      DS-30.

    • C. 

      DS-30A.

    • D. 

      DS-512.

  • 98. 
    (242) What Digital Multiplex System (DMS)-100 system contains subsystems for test routing fault detection, fault analysis and error reporting?
    • A. 

      Visual display unit.

    • B. 

      Digital trunk controller.

    • C. 

      Line concentrating modules.

    • D. 

      Maintenance and administration position.

  • 99. 
    (242) The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to
    • A. 

      Verify the circuit is not in use.

    • B. 

      Prevent interruptions to critical circuits.

    • C. 

      Ensure dangerous voltages are not present on the line.

    • D. 

      Avoid activating alarm circuits on the voice network system.

  • 100. 
    (243) Where do incoming (unswitched) circuits transmitted to the ENET enter the NT9X35A cross-point card?
    • A. 

      Vertical bus (V-bus).

    • B. 

      Horizontal bus (H-bus).

    • C. 

      Clock rate/messaging card.

    • D. 

      Enhanced network (ENET) processor.

  • 101. 
    (244) Which Digital Multiplex System (DMS)-100 database facility is responsible for creating and maintaining tables of data in a controlled manner?
    • A. 

      Journal file.

    • B. 

      Table control.

    • C. 

      Dump/restore.

    • D. 

      Pending order file.

  • 102. 
    (224) Which Digital Multiplex System (DMS)-100 database facility provides facilities for storing data modifications orders (DMO) and for retrieving them at a specified time for execution?
    • A. 

      Journal file.

    • B. 

      Table control.

    • C. 

      Dump/restore.

    • D. 

      Pending order file.

  • 103. 
    (244) Which Digital Multiplex System (DMS)-100 database facility provides facilities to preserving data modifications orders (DMO) on tape or disk so that data tables can be restored if the system fails?
    • A. 

      Journal file.

    • B. 

      Table control.

    • C. 

      Dump/restore.

    • D. 

      Pending over file.

  • 104. 
    (246) Which digital broadcast system was adopted by the United States as the standard?
    • A. 

      Digital Video Broadcast-Terrestrial system.

    • B. 

      Advanced Television Systems Committee.

    • C. 

      Digital Video Broadcast-Satellite system.

    • D. 

      Digital Video Broadcast-Committee.

  • 105. 
    (245) What names are given to the shifted R-Y and B-Y signals, respectively?
    • A. 

      I (45' in-phase) and Q (90' in-phase).

    • B. 

      I (90' in-phase) and Q (45' in-phase).

    • C. 

      I (out-of-phase) and Q (quadrature).

    • D. 

      I (in-phase) and Q (quadrature).

  • 106. 
    (249) In an Intrusion Detection System (IDS), what is the main purpose of a boundary fence?
    • A. 

      Facilitate the detection of intruders.

    • B. 

      Keep wildlife out of the perimeter detection zone.

    • C. 

      Provide security forces personnel a safe place to work.

    • D. 

      To present a physical and psychological deterrent to unauthorized entry.

  • 107. 
    (247) The GVG-110 video switcher effects key fills with
    • A. 

      Linear signal and chroma signal from the effect keyer.

    • B. 

      Key bus video or an internally-generated color matte signal.

    • C. 

      Key bus keying signal or an internally-generated color matte signal.

    • D. 

      Luminance signal and chroma key signal from the effects keyer.

  • 108. 
    (247) The total number of effects storage registers in the GVG-110 video switcher is
    • A. 

      8.

    • B. 

      10.

    • C. 

      12.

    • D. 

      16.

  • 109. 
    (247) What does the GVG-110 video switcher serial interface allow?
    • A. 

      Remote microprocessor control.

    • B. 

      Remote Control of switcher transitions.

    • C. 

      Serial interface programming with the switcher effects memory.

    • D. 

      Remote control of all switcher functions by a personal computer.

  • 110. 
    (248) Which basic circuit in the video distribution amplifier consists of two transistors that form the upper leg of a totem pole circuit?
    • A. 

      Equalizer and peaking amp.

    • B. 

      Fixed gain and level shift.

    • C. 

      Variable gain amp.

    • D. 

      Output driver.

  • 111. 
    • A. 

      Walking, running, rolling, crawling or jumping through the line of detection.

    • B. 

      Walking, running, rolling, crawling or jumping outside the line of detection.

    • C. 

      Potential for intruder to bypass the system.

    • D. 

      Possibility of equipment failures.

  • 112. 
    (250) The basic configuration of the entry control facility includes a
    • A. 

      Gatehouse, personnel entry gate, inspection equipment and vehicle entrapment area.

    • B. 

      Security forces entry gate, inspection equipment, backup generator and gatehouse.

    • C. 

      Location for security personnel to perform shift change and receive their weapon.

    • D. 

      Gatehouse, vehicle parking area and personnel entry gate.

  • 113. 
    (251) Which interior intrusion detection system is designed to detect intruders attempting to enter a shelter, storage igloo or building?
    • A. 

      AN/GSS-42.

    • B. 

      AN/GSS-41.

    • C. 

      AN/GSS-29.

    • D. 

      AN/GSS-39.

  • 114. 
    (251) What does the AN/GSS-39(V) system use to monitor the integrity of all sensor wiring to the control panel?
    • A. 

      Zone indicator plate.

    • B. 

      Video display unit.

    • C. 

      End-of-line module.

    • D. 

      Tamper interface module.

  • 115. 
    (251) Which interior intrusion detection system (IIDS) sensor uses heat radiation to detect intruders?
    • A. 

      Ultrasonic.

    • B. 

      Microwave.

    • C. 

      Passive infrared.

    • D. 

      Dual-phenomenology.

  • 116. 
    (251) How many selectable frequencies are obtainable with a SD80DC microwave sensor?
    • A. 

      5.

    • B. 

      8.

    • C. 

      10.

    • D. 

      12.

  • 117. 
    (252) What type of signal is sent to the fence protection system (FPS) signal processor when an alarm is detected?
    • A. 

      Alternating current (AC).

    • B. 

      Direct current (DC).

    • C. 

      Digital.

    • D. 

      Analog.

  • 118. 
    (252) How many sensors does a taut-wire system in the  Y taut-wire sensor (YTWS) configuration contain?
    • A. 

      5.

    • B. 

      6.

    • C. 

      10.

    • D. 

      12.

  • 119. 
    (252) How many vertical taut-wire sensor (VTWS) sectors can be serviced per field distribution box (FDB)?
    • A. 

      1.

    • B. 

      2.

    • C. 

      4.

    • D. 

      8.

  • 120. 
    (252) What is the maximum length of the vertical taut-wire sensor (VTWS)?
    • A. 

      150 feet.

    • B. 

      200 feet.

    • C. 

      328 feet.

    • D. 

      425 feet.

  • 121. 
    (252) What is the maximum length of the Y taut-wire sensor (YTWS)?
    • A. 

      150 feet.

    • B. 

      200 feet.

    • C. 

      328 feet.

    • D. 

      425 feet.

  • 122. 
    (252) What type alarm occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is removed?
    • A. 

      None.

    • B. 

      Tamper.

    • C. 

      Intruder.

    • D. 

      Equipment fault.

  • 123. 
    (252) What is the maximum detection distance in meters of an Infrared Pulsed Intrusion Detection System (IPIDS)?
    • A. 

      60.

    • B. 

      80.

    • C. 

      100.

    • D. 

      150.

  • 124. 
    (252) What is the secondary mode of detection for the microwave fence sensor?
    • A. 

      Beam break.

    • B. 

      Signal fade margin.

    • C. 

      Multipath reflection.

    • D. 

      Multipath amplification.