(201) In Remedy, to whom are the tickets assigned to fix problems?
(208) Which form is used as a register log to record visitors into...
(201) Asset Inventory Management System (AIMS) is used to track and...
(216) Which does not fit the "Peaceful Purposes" clause of using the...
(202) What is the purpose of the Transient Electromagnetic Pulse...
(202) What area is described as a complete building or facility area...
(203) What are the two different types of current used for power?
(203) Which fuel is not used for reciprocating generators?
(204) Which of these statements pertains to configuration management?
(210) What Air Force instruction (AFI) governs personal wireless...
(205) What automatically happens to an e-mail account when the user's...
(210) Which of these is a task completed by the unit personal wireless...
(207) What is the advantage of symmetric cryptology?
(214) What are the voice messages encoded into when making a phone...
(208) Communications security (COMSEC) is defined as the measures and...
(209) Which secure voice telephone can be used on the Integrated...
(201) The Asset Inventory Management System (AIMS) system includes...
(215) Which commercial satellite communication system offers true...
(217) What ratio is used to measure the desired signal strength...
(202) In the RED/BLACK concept, what type of traffic do BLACK lines...
(202) Protected distribution systems (PDS) require which scheduled...
(209) The Tactical Local Area Network Encryption (TACLANE)–Micro...
(204) The approval or disapproval of all approved changes in the...
(206) (205) How many objects can be manipulated at a time in directory...
(207) What components are used in both encryption and decryption?
(210) What is the only authorized Air Force inventory control software...
(210) What combination of Air Force instructions (AFI), Air Force...
(212) What mode of operation do cell phones use?
(207) Which cryptology system has a disadvantage of using more...
(212) What channel access method assigns each call a certain portion...
(212) Each cell in a service area has what tower and transceiver...
(212) Cell sites are generally thought of as being a
(213) What component in the video teleconferencing (VTC) system...
(201) What tool must you use in order to create a new ticket?
(214) How many channels are used when a Voice over Internet Protocol...
(214) What component of Voice over Internet Protocol (VoIP) is an...
(201) Which is not a function of the Integrated Maintenance Data...
(201) The Asset Inventory Management System (AIMS) is an online...
(214) What is a system of error control for data transmission, where...
(215) In response to disaster relief operations, the Department of...
(209) The Secure Terminal Equipment (STE) cannot communicate securely...
(209) Which port on the office version Secure Terminal Equipment (STE)...
(209) What is the maximum throughput in megabits per second (Mbps) for...
(202) What is the Transient Electromagnetic Pulse Emanation Standard...
(209) The Tactical Local Area Network Encryption (TACLANE)–Micro...
(203) Which uninterruptible power supply (UPS) system is generally...
(203) Which is not a consideration when selecting storage batteries...
(204) Who becomes responsible for life-cycle maintenance once the...
(209) The Tactical Local Area Network Encryption (TACLANE)–Micro...
(204) What are the two standards for termination of Category 5 (CAT 5)...
(207) When using a Secure Terminal Equipment (STE), what is encrypted?
(210) What system serves as the focal point for suggested upgrades for...
(212) What needs to be higher to improve the audio quality?
(207) In secure socket layer (SSL), before an encrypted transaction...
(212) Who is usually responsible for their air time charges and must...
(201) The Integrated Maintenance Data System (IMDS) interface with the...
(207) Which encryption is not a telecommunications encryption type?
(202) Which method is not a means for secure telecommunications?
(216) What type of areas is International Mobile Satellite...
(216) Which Inmarsat terminals have a land mobile terminal, typically...
(202) Which two parts does the RED/BLACK concept have?
(202) Protected distribution systems (PDS) events such as alarms,...
(202) A line route inspection of a protected distribution system (PDS)...
(204) Permanent markings can be completed by how many different...
(205) Which is not a reason why extreme caution should be used when...
(207) What are the two basic types of computer cryptology?
(201) Depending on the problem type, what are the two types of forms...
(211) Which personal wireless communications system (PWCS) device's...
(212) How fast you sample the audio to get your digital signal is...
(214) How many milliseconds should the one-way delay be from endpoint...
(207) Triple data encryption standard (DES) is based on three compound...
(208) Which communications security (COMSEC) application provides us...
(214) What is the control system that generates a signal with a fixed...
(215) Up to what level of classification does the Iridium Secure...
(203) What are the two main options for storing electricity in an...
(203) In electrical power equipment, the generator can be two types,...
(210) Who coordinates the management of personal wireless...
(210) Who appoints the unit personal wireless communications system...
(205) What publication governs the format of Alias names for e-mail...
(210) Which of these is not part of the personal wireless...
(211) Which personal wireless communications system (PWCS) device can...
(207) What are the two major types of encryption algorithms in use...
(207) Which encryption handles multiplexed lines that come from...
(211) How many channels do the intra-squad radios operate on?
(214) What percent packet loss should a network expect in order to...
(208) Which form is used with a transfer report to accompany a...
(202) In the RED/BLACK concept, what type of traffic do RED lines...
(209) Which set of electrical standards does the KIV–7 not...
(209) Tactical Local Area Network Encryption (TACLANE)–Classic...
(204) Which one of these requires the use of the latest technical...
(209) The Tactical Local Area Network Encryption (TACLANE)–Micro...
(207) How many bits for its key does data encryption standard (DES)...
(207) Which encryption handles software encryption?
(205) What exchange tab is used to add, delete, or modify user...
(205) What exchange tab is used to add, delete, or modify user...
(207) Which encryption handles data that can come from equipment such...
(209) The Secure Terminal Equipment (STE) Integrated Subscriber...
(213) What protocol does the Integrated Services Digital Network...
(213) What component in the video teleconferencing (VTC) system...
(209) The Secure Terminal Equipment (STE) consists of a