What are minor software updates or improvements called?
What type of remote network provides a private tunnel through public...
What entails how we communicate and manage data?
What devices are mostly small, lightweight, and designed for mobile...
This practice uses tapes, electronic vaulting, or mirrored disks and...
What is an essential tool for any Client Systems Technician to find...
What part of client systems includes the the physical aspect of...
What program translates commands between a device and the programs...
What is one of the best habits a Client Systems Technician can form in...
What is installed on a computer to act as the interface between the...
What is the unique identification number a network interface card...
When troubleshooting after a system failure, this step is a last...
What piece of equiptment is a the core of most Wi-Fi networks?
What component in the vido teleconferencing (VTC) system converts...
What protocol provides an almost unlimited number of Internet Protocol...
Which of these is a disadvantage of client-server networks?
What item below is not found in the Active Directory structure?
Any hardware added to a computer that expands its capabilities is...
Why are users required to change their passwords upon logging onto the...
Use which tool to list all installed device drivers and their status,...
What provides the Secure Telephone Equipment (STE) with its security...
With a software license agreement, who has the full rights to the...
What is the simplest and most efficient way to duplicate a...
What does Wi-Fi use to carry network signals to the network access...
One of the main purposes of the Integrated Services Digital...
Who centrally manages the Air Force server updates that keep you...
What type of printer software configuration option requries a new port...
The specifications that should be met, if not exceeded, to ensure a...
In Remedy, tickets can be assigned to whom?
How may byte sectors is a hard disk divided into?
What form of remote network access is often the only choice for rural...
Which item is not a good practice in helping with future...
Which type of percipitation attenuates radio frequency (RF) energy...
Which media has a storage capacity of a gigabyte (GB) - terabyte (TB),...
The term used to refer to the process of launching the OS is the
When a security container is opened, it is inventoried at the
Printer hardware configuration via the web is done through
Which hardware requirement is defined as the model and the clock speed...
The first sector at the beginning of a hard drive is called the master
Which file system is the best choice for data storage if the server is...
What limits a dirct wave to normally less than 20 miles?
What are the two types of accounts supported by Windows operation...
What condition occurs when a signal is induced into one circuit from...
What describes how a computer finds a specific byte it is looking for...
What is the newest generation of secure voice telephone?
Which is not a valid form of identity management?
The primary reason you measure the voltage across terminal...
Producing radio frequency (RF) energy and radiating useful signals...
Which personal wireless communications system device can be used for...
What percentage of all network problems occur at the data link and...
What are the two major way to implement a client server network?
If the security feature is enabled on a wireless network, access...
What drives faster processing speed and increases the power of may...
Which secure voice telephone can be used on the Integrated Services...
Which type of memory is used to duplicate frequently used information...
The Tactical Local Area Network Encryptor (TACLANE)–Micro may be...
What should be done before anything else, once the operating system...
Which voicemail system was one of the earliest digital voicemail...
What piece of test equiptment can help verify connectivity and...
Who is usually responsible for their air time charges and must budget...
Cell sites are generally thought of as beign a
Which is not a transmission medium for a wireless local area network?
Which term describes that data is whole or complete?
The most common hardware diagnostic tool is the
Which model of Digital Multiplex System (DMS)-100 family switches is...
For best communications, the transmitting antenna
When the gain of an anisotropic radiator is compared to the isotropic...
User accounts are uniquely identified by the
Which personal wireless communications system (PWCS) device's...
What channel access method assigns each call a certain portion of time...
What is a method of putting many users on a single cable pair?
What cabling is the most commonly used?
Which category (Cat) of cable can support data rates up to 100Mbps?
What conventional land mobile radio (LMR) devise serves as the hub of...
Top secret keying material must be handled, stored, transported and...
Which models of end offices in the Digital Multiplex System (DMS)...
The process of mixing or combining two frequencies in a nonlinear...
The Asset Inventory Management (AIM) system includes what type of...
Which information is not required when configuring Transmission...
The transfer of eight bits of data simultaneously through eight...
Which port on the office version Secure Telephone Equipment (STE) can...
What technology involves the capture and storage of a distinctive,...
Reading and storing a document on a hard disk or some other storage...
What is the long-haul transmission componet of Theather Deployable...
The loudness of a sound is closely related to what part of the sine...
Who may close tickets in Remedy?
What field provides the basis of radio frequency (RF) communication by...
Which method is not a means for secure telecommunications?
What is the TEMPEST program in the Air Force called?
The Communications Security (COMSEC) program is designed to
In trunked land mobile radio (LMR) systems, different user groups are...
In a network environment, what may be responsible for all or some of...
Which TIA/EIA parameter test is a measure of the unwanted signal...
Which type of memory stores configuration information, and is used by...
The KIV–7 cryptographic device provides protection up to what...
How many channels are used when a voice over Internet Protocol (VoIP)...
A spooled print job be several times larger than the printed document...
Noise may be introduced into speech signal by thermal agitation...
What standard antenna is used for antenna gain comparison?
A formatted disk partition that is used for a particular file...
What is the purpose of the TEMPEST program?
What ratio is used to measure the desired signal strength relative to...
Which is not a use for local user accounts?
What area is described as the complete building or facility area under...
This operating system tool allows the viewing of the number of sent...
What type of memory is nonvolatile, considered permanent, and is also...
This type of memory is blank and instructions can be placed on...
A line route inspection of a protected distribution system (PDS)...
What equiptment is included in a customer access node (CAN) to provide...
Which cryptology system has a disadvantage of using more processing...
What is the maximum number of ports that a Meridian System...
TEMPEST is
Groups in active directory are directory
Which alarm category in the network management system indicates a...
What reference would you use for guidance on Air Force messaging?
Members of this group have full control of the server or individual...
What stores print jobs in a print queue until a printer becomes...
What is the transmission rate, in megabits per second (Mbps), of Mode...
Which form is used as a register log to record visitors into restriced...
Protected distribution systems (PDS) events such as alarms an...
What major equipment in a theater deployable communications (TDC)...
What's the difference between the basic acces module (BAM) and the...
Which of these is not a prominent characteristic of an operating...
The process of condensation occurs when air particles are
What is the shortest wavelength an antenna can be made resonant?
Triple Data Encryption Standard (DES) is based on three compund...
What tool can launch individual troubleshooting/configuration programs...
Each 125us time period in the digital signal (DS)-30 signaling format...
Integrated Services Digital Network (ISDN) can combine voice and data...
What type areas is International Mobile Satellite Organization...
Protected distribution system (PDS) require which scheduled...
Which principle is not addressed in the ANSI/TIA/EIA-569-B...
What access control uses segregation of duties and security screening...
The Public Key Infrastructure component that would be necessary if the...
What device receives information from the internet and translates it...
What is the control system that generates a signal with a fixed...
Which logical troubleshooting step would include classifying the...
Which encryption is not a telecommunication encryption type?
Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?
Which patch will prevent exploitation and remove or mitigate a...
The KG–175D is what type of Tactical Local Area Network...
In network troubleshooting, any event that has a negative effect on...
The Asset Inventory Management (AIM) is part of what?
Which type of network is oftem call the GigE network?
What is an electronic credit card-like device the established you...
What Meridan application provides local area network (LAN)...
What data integrity method is used in high-end personal computers and...
Which is not a basic function of antivirus programs?
TACLANE–Classic and TACLANE–E100 are high-speed encryption...
The total resistive properties of a circuit when resistance,...
What software activates the actual transmission and receipt of data...
Which backup type does not clear archive flags once the backup job is...
Which is a very simple example of an error detecting code?
How many milliseconds should the one-way delay be from endpoint to...
A static internet protocol address on a network printer during...
What must customers do to connect telephones and computer...
In hertz (Hz), what range of sound can the human ear detect?
What characteristics enables a receiver to reproduce a desired signal...
Only after what, are tickets allowed to be placed in the "Closed"...
What function enables the higher layer protocol data units to fit into...
What is used to organize different types of accounts into manageable...
What is the Integrated Services Digital Network (ISDN) R interface?
Which is not a use for local accounts?
Which of the following is not one of the three types of interfaces?
What program sets up the divisions of memory that hold the operating...
The Secure Telephone Equipment (STE) cannot communicate securely with...
When using a Secure Terminal Equipment (STE), what is encrypted?
What cabling system subsystem provides any or all of the functions of...
What communication mode(s) of operation allows two or more stations to...
What component of a frequency modulated (FM) reciever removes the...
Which Digital Multiplex System (DMS) component uses 16-bit Motorola...
What enhanced features of the trunking land mobile radio (LMR) allows...
Which form is used with a transfer report to accompany a...
What is the design architecture of theater deployable communications...
In Secure Socket Layer (SSL), before encrypted transaction takes...
The Tactical Local Area Network Encryptor (TACLANE)–Micro can...
Which is not a way in which round trip delay can be determined?
In respose to disaster relief ofperations, the Department of Defense...
Which Communications Security (COMSEC) application provides us with...
How many bits long are the addresses that computer instructions work...
In addition to fiber-optic and copper cables, what do we use to...
What componets are used in both encrypton and decryption?
How many channels of data does each digital signal (DS)-30 speech link...
In the pulse code modulation (PCM) process, changing the quantized...
What publication governs the format of Alias names for email accounts?
What are the two major established Integrated Services Digital Network...
What Integrated Communication Access Package (ICAP) node module...
In hertz (Hz), what is the actual voice freuency band?
What type modulation produces a constant amplitude transmission?
What transmission line is very common in both fixed an tatical...
How many channels of data does each digital signal (DS)-30 links are...
By default, the first domain controller in active direcotry services...
In the RED/BLACK concept, what type of traffic do RED lines carry?
The RED/BLACK conept has which two parts?
Which International Mobile Satellite Organization (Inmarsat) system...
The Network Layer of the Open System Interconnection (OSI) model...
What type of shelf contains the DC552A channel service unit (CSU)?
What is another name for a stuffing or S-bit in relationship to a...
What component is installed to provide a dataset protection against...
How much power does a NAND drive requrie?