This practice uses tapes, electronic vaulting, or mirrored disks and...
What entails how we communicate and manage data?
What devices are mostly small, lightweight, and designed for mobile...
When troubleshooting after a system failure, this step is a last...
What type of remote network provides a private tunnel through public...
What is an essential tool for any CST to find software approved for...
What part of client systems includes the physical aspect of computers,...
What are minor software updates or improvements called?
What is the unique identification number a NIC provides to a personal...
What protocol provides an almost unlimited number of IP addresses?
What is one of the best habits a CST can form in order to save time,...
In Remedy, tickets can be assigned to whom?
What component in the video teleconferencing (VTC) system converts...
What condition occurs when a signal is induced into one circuit from...
Which type of precipitation attenuates radio frequency (RF) energy...
What provides the Secure Telephone Equipment (STE) with its security...
What item below is not found in the Active Directory structure?
Any hardware added to a computer that expands its capabilities is...
Printer hardware configuration via the web is done through
What is installed on a computer to act as the interface between the...
Producing radio frequency (RF) energy and radiating useful signals...
What is the newest generation of secure voice telephone?
What piece of equipment is at the core of most Wi-Fi networks?
Who centrally manages the Air Force server updates that keep your...
What form of remote network access is often the only choice for rural...
With a software license agreement, who has the full rights to the...
Which item is not a good practice in helping with future...
What program translates commands between a device and the programs...
What type of printer software configuration option requires a new port...
The term used to refer to the process of launching the OS is the
Which of these is a disadvantage of client-server networks?
Which media has a storage capacity of gigabyte (GB) - terabyte (TB),...
What limits a direct wave to normally less than 20 miles?
What does Wi-Fi use to carry network signals to the network access...
What cabling is the most commonly used?
Why are users required to change their passwords upon logging onto the...
What describes how a computer finds a specific byte it is looking for...
The primary reason you measure the voltage across terminal or...
Use which tool to list all installed device drivers and their status,...
Which file system is the best choice for data storage if the server is...
When a security container is opened, it is inventoried at the
What are the two major ways to implement a client server network?
What major equipment in a TDC package provides mobile units with...
Which secure voice telephone can be used on the ISDN?
When the gain of an anisotropic radiator is compared to the isotropic...
What drives faster processing speeds and increases the power of many...
The specifications that should be met, if not exceeded, to ensure a...
What is the simplest and most efficient way to duplicate a...
Top secret keying material must be handled, stored, transported and...
Which models of end offices in the Digital Multiplex System (DMS)...
Which PWCS device can be used for command and control?
Which is not a valid form of identity management?
Who may close tickets in Remedy?
What are the two types of accounts supported by Windows operation...
One of the main purposes of the Integrated Services Digital Network...
Which hardware requirement is defined as the model and clock speed of...
How many byte sectors is a hard disk divided into?
What is long-haul transmission component of TDC?
Which port on the office version Secure Telephone Equipment (STE) can...
What channel access method assigns each call a certain portion of time...
Cell sites are generally thought of as being a
Reading and storing a document on a hard disk or some other storage...
What area is described as the complete building or facility area under...
Who is usually responsbile for their air time charges and must budget...
The Tactical Local Area Network Encryptor (TACLANE)–Micro may be...
What conventional LMR device serves as the hub of a net?
In trunked LMR systems, different user groups are known as
The Asset Inventory Management (AIM) system includes what type of...
Which category (Cat) of cable can support data rates up to 100Mbps?
Which alarm category in the network management system indicates a...
What percentage of all network problems occur at the data link and...
Which type of memory stores configuration information, and is used by...
What type of memory is nonvolatile, considered permanent, and is also...
Which type of memory is used to duplicate frequently used information...
Which term describes that data is whole or complete?
What tool can launch individual troubleshooting/configuration programs...
This OS tool allows the viewing of the number of sent packets, status,...
Which is not a transmission medium for a wireless local area network?
What standard antenna is used for antenna gain comparison?
If this security feature is enabled on a wireless network, access...
What ratio is used to measure the desired signal strength relative to...
The KIV-7 cryptographic device provides protection up to what...
The most common hardware diagnostic tool is the
Which voicemail system was one of the earliest digital voicemail...
What is the transmission rate, in megabits per second (Mbps), of Mode...
What should be done before anything else, once the operating system...
What piece of test equipment can help verify connectivity and identify...
Which TIA/EIA parameter test is a measure of the unwanted signal...
A spooled print job can be several times larger than the printed...
What stores print jobs in a print queue until a printer becomes...
Which model of Digital Multiplex System (DMS)-100 family switches is...
TEMPEST is
What is the TEMPEST program in the Air Force called?
Which PWCS device's original intent was for use by family,...
Which patch will prevent exploitation and remove or mitigate a...
How many channels are used when a voice over IP (VoIP) session is...
Members of this group have full control of the server or individual...
A formatted disk partition that is used for particular file system is...
The Communications Security (COMSEC) program is designed to
What reference would you use for guidance on Air Force messaging?
The process of mixing or combining two frequencies in a nonlinear...
What field provides the basis of radio frequency (RF) communications...
The Public Key Infrastructure component that would be necessary if the...
Protected distribution systems (PDS) events such as alarms and...
User accounts are uniquely identified by the
The transfer of eight bits of data simultaneously through eight...
What program sets up the divisions of memory that hold the operating...
This type of memory is blank and instructions can be placed on...
The first sector at the beginning of a hard drive is called the master
What equipment is included in a customer access node (CAN) to provide...
Which information is not required when configuring TCP/IP?
The process of condensation occurs when air particles are
Noise may be introduced into speech signals by thermal agitation and
What is the maximum number of ports that a Meridian System Logic...
What access control uses segregation of duties and security screening...
For best communications, the transmitting antenna
What is the purpose of the TEMPEST program?
What technology involves the capture and storage of distinctive,...
Which logical troubleshooting step would invlude classifying the...
What is a method of putting many users on a single cable pair?
Which type of network is often called the GigE network?
The loudness of a sound is closely related to what part of the sine...
What devices receives information from the internet and translates it...
What is the shortest wavelength an antenna can be made resonant?
A line route inspection of a protected disribution system (PDS)...
In network troubleshooting, any event that has a negative effect on...
What is used to organize different types of accounts into manageable...
In hertz (Hz), what range of sound can the human ear detect?
Which form is used as a register log to record visitors into...
Which method is not a means for secure telecommunications?
Protected distribution systems (PDS) require which scheduled...
The Asset Inventory Management (AIM) is part of what?
Which cryptology system has a disadvantage of using more processing...
In response to disaster relief operations, the DoD Policy on...
What type areas is International Mobile Satellite Organization...
What publication governs the format of Alias names for email accounts?
Groups in Active Directory are directory
Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?
Which of these is not a prominent characteristic of an operating...
What are the two major established Integrated Services Digital Network...
How many milliseconds should the one-way delay be from endpoint to...
The ultra high frequency designation applies to frequencies from
Which form is used with a transfer report to accompany a COMSEC...
In hertz (Hz), what is the actual voice frequency band?
What's the difference between the basic access module (BAM) and...
What must customers do to connect telephones and computer workstations...
Integrated Services Digital Network (ISDN) can combine voice and data...
Triple Data Encryption Standard (DES) is based on three compound...
Which is a very simple example of an error detecting code?
What is an electronic credit card-like device that establishes your...
Which Digital Multiplex System (DMS) component uses 16-bit Motorola...
The Secure Telephone Equipment (STE) cannot communicate securely with...
What is configured to provide or deny users access to service on a...
What function enables the higher layer protocol data units to fit into...
Which is not a way in which round trip delay can be determined?
Each 125μs time period in the digital signal (DS) 30 signaling...
How many bits long are the addresses that computer instructions work...
Which encryption is not a telecommunications encryption type?
What is the design architecture of theater deployable communications...
What data integrity method is used in high-end personal computers and...
What is the control system that generates a signal with a fixed...
What software activates the actual transmission and receipt of data...
What cabling system subsystem provides any or all of the functions of...
What characteristic enables a receiver to reproduce a desired signal...
How many channels of data does each digital signal (DS) 30 speech link...
Which is NOT a basic function of antivirus programs?
TACLANE–Classic and TACLANE–E100 are high-speed encryption...
The KG–175D is what type of Tactical Local Area Network...
Which is not a use for local user accounts?
What Meridian application provides LAN connectivity so you can share...
A static internet protocol address on a network printer during...
Which backup type does not clear archive flags once the backup job is...
Only after what, are tickets allowed to be placed in the "Closed"...
Which of the following is not one of the three types of interfaces?
What type of sheld contains the CD552A channel service unit (CSU)?
By default, the first domain controller in active directory service is...
What are frequencies from 30 to 300 megahertz (MHz) internationally...
How many connector interfaces does a NIC provide for network cables?
Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system...
What type modulation produces a constant amplitude transmission?
What Air Force Systems Security Instruction (AFSSI) directs...
The total resistive properties of a circuit when resistance,...
What transmission line is very common in both fixed and tactical...
What is the maximum throughput in megabits per second (Mbps) for the...
What enhanced features of the trunking LMR allows the system manager...
Which is not a function that maintainers perform with the Integrate...
In the pulse code modulation (PCM) process, changing the quantized...
Which Telecommunications Management System (TMS) network management...
Where is the optional supervisory lamp panel for the 291...
Upon arrival in a theater, what frequency band does a Lightweight...
When using a Secure Terminal Equipment (STE), what is encrypted?
The Tactical Local Area Network Encryptor (TACLANE)–Micro can...
Which International Mobile Satellite Organization (Inmarsat) system...
Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?
What is another name for stuffing or S-bit in relationship to a...
Which Communications Security (COMSEC) application provides us with...
The RED/BLACK concept has which two parts?
Integrate Maintenance Data System (IMDS) is an Air Force...
In Secure Socket Layer (SSL), before an encrypted transaction takes...
The ability to maintain a constant output carrier frequency refers to...