Z3d152 Vol 1 UREs

100 Questions | Total Attempts: 303

SettingsSettingsSettings
Please wait...
Z3d152 Vol 1 UREs

Volume 1. Cyber Transport Systems Fundamentals Z3D152 01 1509, Edit Code 02 AFSC 3D152


Questions and Answers
  • 1. 
    (001) Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
    • A. 

      A. Radio Frequency Transmission Systems (3D1X3).

    • B. 

      B. Cyber Transport Systems (3D1X2).

    • C. 

      C. Spectrum Operations (3D1X4).

    • D. 

      D. Client Systems (3D1X1).

  • 2. 
    (002) Which of the following is not a communications security program duty and responsibility for Cyber Transport Systems?
    • A. 

      A. Transmission security.

    • B. 

      B. Technical security.

    • C. 

      C. Emission security.

    • D. 

      D. Physical security.

  • 3. 
    (003) What is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field?
    • A. 

      A. Core duty.

    • B. 

      B. Core value.

    • C. 

      C. Core competency.

    • D. 

      D. Core responsibility.

  • 4. 
    (003) Which of the following is a core competency of Cyber Transport Systems?
    • A. 

      A. Fixed cable systems.

    • B. 

      B. Voice network systems.

    • C. 

      C. Application software systems.

    • D. 

      D. Client-server database systems.

  • 5. 
    (004) Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?
    • A. 

      A. 1118.

    • B. 

      B. 457.

    • C. 

      C. 55.

    • D. 

      D. 3.

  • 6. 
    (005) Which hazard is not one of the four major types of hazards?
    • A. 

      A. Biological.

    • B. 

      B. Chemical.

    • C. 

      C. Physical.

    • D. 

      D. Nuclear.

  • 7. 
    (005) Which hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?
    • A. 

      A. Biological.

    • B. 

      B. Chemical.

    • C. 

      C. Physical.

    • D. 

      D. Stress.

  • 8. 
    (005) To prevent manual handling hazards, utilize team lifting when lifting items that weigh more than how many pounds?
    • A. 

      A. 25.

    • B. 

      B. 50.

    • C. 

      C. 75.

    • D. 

      D. 100.

  • 9. 
    (005) When working on electrical circuits, the role of safety observer is normally performed by the
    • A. 

      A. trainer.

    • B. 

      B. certifier.

    • C. 

      C. technician.

    • D. 

      D. supervisor.

  • 10. 
    (005) When working on electrical circuits, you may only wear metal framed eyeglasses if
    • A. 

      A. the circuit is energized.

    • B. 

      B. you have a valid prescription.

    • C. 

      C. they are certified for high voltage.

    • D. 

      D. they are secured with a nonmetallic cord.

  • 11. 
    11. (006) To whom does the risk management (RM) process apply?
    • A. 

      A. All personnel.

    • B. 

      B. Only safety personnel.

    • C. 

      C. Only civilian personnel.

    • D. 

      D. Only medical personnel.

  • 12. 
    (006) What simple, systematic process allows commanders to maximize combat capability, while limiting risk?
    • A. 

      A. Risk control.

    • B. 

      B. Safety control.

    • C. 

      C. Risk management.

    • D. 

      D. Safety management.

  • 13. 
    (007) Which of the following is a principle of risk management (RM)?
    • A. 

      A. Accept unnecessary risk.

    • B. 

      B. Apply the RM process continuously.

    • C. 

      C. Train and adhere to safety guidelines.

    • D. 

      D. Make risk decisions at the lowest level.

  • 14. 
    (007) How many steps are in the risk management (RM) process?
    • A. 

      A. Four.

    • B. 

      B. Five.

    • C. 

      C. Six.

    • D. 

      D. Seven.

  • 15. 
    (008) An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having what category of vulnerability?
    • A. 

      A. I.

    • B. 

      B. II.

    • C. 

      C. III.

    • D. 

      D. IV.

  • 16. 
    (008) How many Integrated Network and Operation Security Centers (INOSC) does the Air Force have?
    • A. 

      A. One.

    • B. 

      B. Two.

    • C. 

      C. Three.

    • D. 

      D. Four.

  • 17. 
    (008) The Integrated Network Operations and Security Centers (INOSC) has several responsibilities except
    • A. 

      A. maintain sole administrative privileges on the firewall.

    • B. 

      B. standardize, configure, back up, and otherwise maintain the firewall.

    • C. 

      C. maintain a single naming/configuration standard for boundary devices.

    • D. 

      D. install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).

  • 18. 
    (009) Which term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP)?
    • A. 

      A. IP telephony.

    • B. 

      B. Network telephony.

    • C. 

      C. Voice protection system.

    • D. 

      D. Voice over Internet Protocol (VoIP).

  • 19. 
    (009) You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except
    • A. 

      A. enabling access control lists (ACL) on firewalls, routers, and switches.

    • B. 

      B. deploying protection from dynamic host configuration protocol (DHCP) spoofing.

    • C. 

      C. consolidating your voice with your data using virtual local area networks (VLAN).

    • D. 

      D. enabling port security access to only allow the required devices needed by the client.

  • 20. 
    (009) At which open systems interconnect (OSI) layer does a packet filter gateway operate at?
    • A. 

      A. 2.

    • B. 

      B. 3.

    • C. 

      C. 4.

    • D. 

      D. 5.

  • 21. 
    (009) At which open systems interconnect (OSI) layer does a circuit layer gateway operate?
    • A. 

      A. 3.

    • B. 

      B. 4.

    • C. 

      C. 5.

    • D. 

      D. 6.

  • 22. 
    (009) At which open systems interconnect (OSI) layer does an application-level firewall operate?
    • A. 

      A. 4.

    • B. 

      B. 5.

    • C. 

      C. 6.

    • D. 

      D. 7.

  • 23. 
    (010) The disadvantage of a host-based intrusion detection system (HIDS) is that it
    • A. 

      A. can analyze any encrypted data if it is decrypted before reaching the target host.

    • B. 

      B. consumes resources on the host it resides on and slows that device down.

    • C. 

      C. monitors log files for inadvisable settings or passwords.

    • D. 

      D. monitors traffic on the host on which it is installed.

  • 24. 
    (010) One advantage of a network-based intrusion detection system (NIDS) is that it
    • A. 

      A. can decrypt data.

    • B. 

      B. uses very few network resources.

    • C. 

      C. monitors logs for policy violations.

    • D. 

      D. can analyze encrypted network traffic.

  • 25. 
    (010) Which intrusion detection system (IDS) uses software sensors?
    • A. 

      A. Active.

    • B. 

      B. Passive.

    • C. 

      C. Host-based.

    • D. 

      D. Network-based.

Back to Top Back to top