3D151 Set 2 Vol 2 Edit Code 02

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Joel Pitre
J
Joel Pitre
Community Contributor
Quizzes Created: 2 | Total Attempts: 520
| Attempts: 114 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. (201) In Remedy, to whom are the tickets assigned to fix problems?

Explanation

In Remedy, tickets to fix problems can be assigned either to a resolution group or to a specific technician. This means that the responsibility for resolving issues can be shared among a group of individuals or assigned to a particular technician.

Submit
Please wait...
About This Quiz
3D151 Set 2 Vol 2 Edit Code 02 - Quiz

.

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. (208) Which form is used as a register log to record visitors into restricted areas?

Explanation

The correct answer is AF Form 1109, Visitor Register Log. This form is used to record visitors into restricted areas. It serves as a register log to keep track of who enters and exits these areas for security purposes.

Submit
3. (201) Asset Inventory Management System (AIMS) is used to track and manage what Air Force assets?

Explanation

The correct answer is Communications. The Asset Inventory Management System (AIMS) is used by the Air Force to track and manage their assets. In this context, "assets" refer to the various equipment and resources that the Air Force possesses. Out of the given options, "Communications" is the most appropriate answer as it represents a crucial aspect of the Air Force's operations. AIMS would be used to track and manage communication assets such as radios, satellites, and other communication equipment.

Submit
4. (216) Which does not fit the "Peaceful Purposes" clause of using the International Mobile Satellite Organization (Inmarsat) system?

Explanation

The "Peaceful Purposes" clause of using the International Mobile Satellite Organization (Inmarsat) system implies that the system should be used for non-violent and non-aggressive purposes. Military use involving armed conflict goes against this clause as it involves the use of force and aggression. The other options mentioned, such as armed forces use for protecting the wounded, UN peacekeeping use, and armed forces use for self-defense within the limitations of the UN charter, can all be considered as non-aggressive and non-violent uses in line with the "Peaceful Purposes" clause.

Submit
5. (202) What is the purpose of the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program?

Explanation

The purpose of the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program is to reduce the chances of radiation of electrical impulses. This program aims to prevent the unintentional leaking of electromagnetic signals that could be intercepted and used to gather sensitive information. By implementing TEMPEST standards, organizations can ensure that their electronic equipment and systems are properly shielded and protected from electromagnetic emissions, thus reducing the risk of information leakage and unauthorized access to sensitive data.

Submit
6. (202) What area is described as a complete building or facility area under direct physical control where unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

Explanation

A controlled access area (CAA) is an area that is under direct physical control, meaning that unauthorized individuals are not allowed unrestricted access. In a CAA, unauthorized persons are either escorted by authorized individuals or are continuously monitored through physical or electronic surveillance. This ensures that only authorized individuals have access to the area, increasing security and preventing unauthorized access.

Submit
7. (203) What are the two different types of current used for power?

Explanation

The correct answer is 110 v and 220 v. These two values represent the standard voltages used for power in most countries. 110 v is commonly used in North America, while 220 v is used in many other parts of the world. The difference in voltage is due to variations in electrical systems and regulations. It is important to note that the voltage used can vary in different regions and specific applications, but 110 v and 220 v are the most commonly used values for power supply.

Submit
8. (203) Which fuel is not used for reciprocating generators?

Explanation

The correct answer is fossil fuel. Fossil fuel is a general term that includes coal, oil, and natural gas. Reciprocating generators typically use diesel or gasoline as fuel sources, while liquid petroleum can also be used. However, fossil fuel is not a specific type of fuel and encompasses all of these options. Therefore, it is not used exclusively for reciprocating generators.

Submit
9. (204) Which of these statements pertains to configuration management?

Explanation

The correct answer is "All of the above." This is because all three statements pertain to configuration management. The first statement involves identifying and documenting the characteristics of a Configuration Item (CI), which is a fundamental aspect of configuration management. The second statement involves recording and reporting change processing and implementation status, which is essential for tracking and managing changes to CIs. The third statement involves controlling changes to the functional and physical characteristics of a CI, which is a core responsibility of configuration management. Therefore, all three statements are relevant to configuration management.

Submit
10. (210) What Air Force instruction (AFI) governs personal wireless communications system (PWCS) management?

Explanation

not-available-via-ai

Submit
11. (205) What automatically happens to an e-mail account when the user's domain account is deleted?

Explanation

When a user's domain account is deleted, their email account is also deleted. This means that all the emails, contacts, and other data associated with that account will no longer be accessible. Deleting the domain account effectively removes the user's access to the email account and removes it from the system.

Submit
12. (210) Which of these is a task completed by the unit personal wireless communications system (PWCS) manager?

Explanation

The unit personal wireless communications system (PWCS) manager is responsible for several tasks. They brief users on the proper use of PWCS equipment, ensuring that everyone understands how to use the system effectively. They also implement a unit-level customer education program, which involves educating users on the features and benefits of PWCS. Additionally, the PWCS manager turns in excess equipment over to the base PWCS manager, ensuring that any unnecessary equipment is properly handled. Therefore, the correct answer is "All of the above."

Submit
13. (207) What is the advantage of symmetric cryptology?

Explanation

Symmetric cryptology offers the advantage of speed. This means that the encryption and decryption processes using symmetric algorithms are faster compared to other types of cryptology. This is because symmetric cryptology uses a single key for both encryption and decryption, eliminating the need for complex mathematical operations. As a result, it is commonly used in scenarios where speed is crucial, such as secure communication systems and real-time data encryption.

Submit
14. (214) What are the voice messages encoded into when making a phone call using Voice over Internet Protocol (VoIP)?

Explanation

When making a phone call using Voice over Internet Protocol (VoIP), the voice messages are encoded into packets. VoIP technology breaks down the voice data into small packets, which are then transmitted over the internet or an IP network. These packets contain the encoded voice data along with necessary information such as source and destination addresses. This packet-based transmission allows for efficient and reliable voice communication over IP networks.

Submit
15. (208) Communications security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure

Explanation

Communications security (COMSEC) refers to the protective measures and controls implemented to prevent unauthorized individuals from accessing information and to guarantee the genuineness of the information. It focuses on ensuring that the communication is authentic and has not been tampered with or altered by unauthorized parties. Compliance refers to adhering to rules and regulations, integrity refers to the accuracy and consistency of data, and validity refers to the correctness and legitimacy of information. However, in the context of COMSEC, the primary concern is to establish the authenticity of the communication.

Submit
16. (209) Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

Explanation

The correct answer is Secure Terminal Equipment (STE). STE is a secure voice telephone that can be used on the Integrated Services Digital Network (ISDN). It provides encryption and authentication features to ensure secure communication. STU and CT are also secure voice telephones, but they are not specifically designed for ISDN. PGPfone is a software-based encryption tool and not a secure voice telephone.

Submit
17. (201) The Asset Inventory Management System (AIMS) system includes what type of database and is located where?

Explanation

The correct answer is Oracle database at Wright-Patterson AFB. This means that the Asset Inventory Management System (AIMS) system includes an Oracle database and is located at Wright-Patterson Air Force Base (AFB).

Submit
18. (215) Which commercial satellite communication system offers true pole-to-pole global coverage?

Explanation

Iridium is the correct answer because it is the only commercial satellite communication system that offers true pole-to-pole global coverage. The European Telecommunications Satellite Organization and the International Telecommunications Satellite Organization do not provide this level of coverage. The International Mobile Satellite Organization also does not offer pole-to-pole global coverage. Therefore, Iridium is the only option that fits the criteria.

Submit
19. (217) What ratio is used to measure the desired signal strength relative to the background noise?

Explanation

The ratio used to measure the desired signal strength relative to the background noise is called signal-to-noise ratio. It quantifies the level of the desired signal compared to the level of unwanted background noise. A higher signal-to-noise ratio indicates a stronger and clearer signal, while a lower ratio indicates a weaker and more distorted signal.

Submit
20. (202) In the RED/BLACK concept, what type of traffic do BLACK lines carry?

Explanation

The correct answer is "Encrypted classified or unclassified." In the RED/BLACK concept, BLACK lines carry traffic that can be either encrypted or unencrypted, and can include both classified and unclassified information. This means that the BLACK lines can handle a wide range of secure communications, regardless of the classification level.

Submit
21. (202) Protected distribution systems (PDS) require which scheduled inspections?

Explanation

Protected distribution systems (PDS) are designed to secure and protect sensitive communications and information. These systems require scheduled inspections to ensure their integrity and effectiveness. Line route or visual inspections involve physically examining the PDS infrastructure, such as cables, conduits, and pathways, to detect any signs of tampering, damage, or unauthorized access. This type of inspection helps identify potential vulnerabilities and allows for prompt corrective actions to maintain the security of the system. Therefore, line route or visual inspections are essential for the proper functioning and security of protected distribution systems.

Submit
22. (209) The Tactical Local Area Network Encryption (TACLANE)–Micro may be equipped to handle all types of networks except

Explanation

The TACLANE-Micro is capable of handling various types of networks, such as asynchronous transfer mode (ATM), gigabit Ethernet, and fast Ethernet. However, it is not equipped to handle wireless networks.

Submit
23. (204) The approval or disapproval of all approved changes in the configuration is known as

Explanation

Configuration control refers to the process of reviewing and approving all approved changes in the configuration. It ensures that any changes made to the configuration are properly evaluated, documented, and authorized. This helps in maintaining the integrity and consistency of the configuration and ensures that all changes are made in a controlled and regulated manner. Configuration control is an essential part of configuration management and helps in effectively managing and controlling changes to the configuration.

Submit
24. (206) (205) How many objects can be manipulated at a time in directory and resource administrator (DRA)?

Explanation

In Directory and Resource Administrator (DRA), only one object can be manipulated at a time. This means that any changes or modifications made to an object must be done individually and cannot be applied to multiple objects simultaneously. This ensures that each object is treated and managed separately, allowing for better control and accuracy in the administration process.

Submit
25. (207) What components are used in both encryption and decryption?

Explanation

In both encryption and decryption processes, two components are used: algorithm and key. The algorithm is a set of rules and instructions that determine how the encryption or decryption is performed, while the key is a specific value or parameter that is used in conjunction with the algorithm to encrypt or decrypt the data. The algorithm defines the mathematical operations and transformations applied to the data, while the key provides the necessary information to control and modify the algorithm's behavior. Thus, both algorithm and key are essential components in ensuring secure and effective encryption and decryption processes.

Submit
26. (210) What is the only authorized Air Force inventory control software used to account for personal wireless communications system (PWCS) assets?

Explanation

The correct answer is Asset Inventory Management System (AIMS). AIMS is the only authorized Air Force inventory control software used to account for personal wireless communications system (PWCS) assets. This system helps in tracking and managing the inventory of PWCS assets, ensuring that they are properly accounted for and maintained. It provides a centralized platform for inventory control, making it easier for the Air Force to keep track of their PWCS assets and ensure their availability when needed.

Submit
27. (210) What combination of Air Force instructions (AFI), Air Force Systems Security instructions (AFSSI), and Air Force manuals (AFMAN) do you use for guidance when determining a technical solution for personal wireless communications systems (PWCS)?

Explanation

The correct combination of Air Force instructions, Air Force Systems Security instructions, and Air Force manuals to use for guidance when determining a technical solution for personal wireless communications systems (PWCS) is AFI 17–210, AFI 17–220, AFSSI 7702, and AFMAN 17–1302–O.

Submit
28. (212) What mode of operation do cell phones use?

Explanation

Cell phones use duplex mode of operation, which means they can transmit and receive signals simultaneously. This allows for two-way communication, where both parties can talk and listen at the same time. Half-duplex mode only allows for one-way communication at a time, while simplex mode only allows for transmission or reception but not both simultaneously. Hybrid mode refers to a combination of different modes, but it is not the specific mode used by cell phones.

Submit
29. (207) Which cryptology system has a disadvantage of using more processing power and time?

Explanation

Asymmetric cryptology system has a disadvantage of using more processing power and time compared to symmetric cryptology system. This is because asymmetric encryption involves the use of a pair of keys, one for encryption and another for decryption, which requires more computational resources and time to perform the encryption and decryption processes. On the other hand, symmetric encryption uses a single key for both encryption and decryption, making it faster and more efficient in terms of processing power and time. Diametric is not a relevant term in the context of cryptology systems.

Submit
30. (212) What channel access method assigns each call a certain portion of time on a designated frequency?

Explanation

Time division multiple access (TDMA) is a channel access method that assigns each call a certain portion of time on a designated frequency. This means that multiple calls can share the same frequency by taking turns using it in different time slots. TDMA is commonly used in cellular networks to increase the efficiency of spectrum utilization and allow for simultaneous communication.

Submit
31. (212) Each cell in a service area has what tower and transceiver assembly that transmits to and receives from the cell phones in that area?

Explanation

The correct answer is Central. In a service area, each cell has a central tower and transceiver assembly. This tower and assembly are responsible for transmitting signals to and receiving signals from the cell phones in that specific area.

Submit
32. (212) Cell sites are generally thought of as being a

Explanation

Cell sites are generally thought of as being in the shape of a hexagon. This is because a hexagon provides the best coverage and signal strength for the cell site. The hexagonal shape allows for equal distribution of signals in all directions and minimizes interference between neighboring cell sites. Additionally, the hexagon shape allows for efficient use of resources and maximizes the coverage area of the cell site. Therefore, a hexagon is the most commonly used shape for cell sites.

Submit
33. (213) What component in the video teleconferencing (VTC) system converts analog signals to digital signals?

Explanation

The correct answer is Coder-decoder (CODEC). In a video teleconferencing (VTC) system, the CODEC is responsible for converting analog signals, such as video and audio, into digital signals that can be transmitted over the network. The CODEC also decodes the digital signals received from the network back into analog signals for display and playback.

Submit
34. (201) What tool must you use in order to create a new ticket?

Explanation

To create a new ticket, you must use the Remedy user tool. This tool is specifically designed for users to access and utilize the Remedy system for tasks such as creating new tickets. The other options listed, Remedy, Remedy new, and Remedy ticket, do not specify the user tool and may not provide the necessary functionality to create a new ticket.

Submit
35. (214) How many channels are used when a Voice over Internet Protocol (VoIP) session is established between a private branch exchange (PBX) and another Internet Protocol (IP) host?

Explanation

When a Voice over Internet Protocol (VoIP) session is established between a private branch exchange (PBX) and another Internet Protocol (IP) host, two channels are used. One channel is used for transmitting the voice data from the PBX to the IP host, and another channel is used for transmitting the voice data from the IP host to the PBX. Each direction requires its own channel for the transmission of the voice data.

Submit
36. (214) What component of Voice over Internet Protocol (VoIP) is an endpoint on the network that provides real time, bi-directional communications between H.323 terminals and other switch circuit networks (SCN)?

Explanation

A gateway is a component of Voice over Internet Protocol (VoIP) that serves as an endpoint on the network. It enables real-time, bi-directional communication between H.323 terminals and other switch circuit networks (SCN). Gateways are responsible for converting voice and data signals between different protocols and formats, facilitating seamless communication between different networks. In the context of the given question, a gateway would be the component that allows H.323 terminals to communicate with SCN.

Submit
37. (201) Which is not a function of the Integrated Maintenance Data System (IMDS)?

Explanation

The Integrated Maintenance Data System (IMDS) performs various functions such as automating equipment history, scheduling, and other processes. It also functions as a common interactive interface for other systems, providing status and inventory data. However, it does not roll base-level logistics data up to the Air Force level. This means that the IMDS does not aggregate or collect logistics data from lower levels and transmit it to the Air Force level for analysis or decision-making purposes.

Submit
38. (201) The Asset Inventory Management System (AIMS) is an online database program that is a part of the

Explanation

The correct answer is Air Force Equipment Management System (AFEMS). This is because the question asks for the online database program that is a part of a specific system, and AFEMS is the only system mentioned in the options. Therefore, it can be inferred that AIMS is a part of AFEMS.

Submit
39. (214) What is a system of error control for data transmission, where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors without the need to ask the sender for additional data?

Explanation

Forward error correction (FEC) is a system of error control for data transmission where the sender adds redundant data to its messages. This redundancy allows the receiver to detect and correct errors without needing to request additional data from the sender. By including extra information in the transmission, FEC can compensate for errors that may occur during transmission, ensuring the integrity and accuracy of the data received. This technique is particularly useful in scenarios where retransmission of data is not feasible or efficient, such as in real-time applications or situations with limited bandwidth.

Submit
40. (215) In response to disaster relief operations, the Department of Defense (DOD) Policy on Procurement of mobile satellite services (MSS) was amended in 2006 to allow the DOD to use additional MSS providers for

Explanation

The correct answer is "unclassified purposes within the CONUS." This means that the Department of Defense (DOD) amended its policy to allow the use of additional mobile satellite services (MSS) providers for unclassified purposes within the continental United States (CONUS). This amendment allows the DOD to utilize these services for non-sensitive operations and communications within the country.

Submit
41. (209) The Secure Terminal Equipment (STE) cannot communicate securely with what device?

Explanation

The Secure Terminal Equipment (STE) is specifically designed for secure communication. It is capable of securely communicating with devices such as the Secure Telephone Unit (STU)-III and satellite telephones. However, it cannot communicate securely with a land mobile radio, as land mobile radios do not have the necessary encryption and security features to ensure secure communication.

Submit
42. (209) Which port on the office version Secure Terminal Equipment (STE) can be used to connect to a fax machine?

Explanation

The correct answer is RS-232. RS-232 is a standard communication protocol that is commonly used for serial communication between devices. It is often used to connect devices such as modems, printers, and fax machines to computers. In the context of the question, RS-232 can be used to connect a fax machine to the office version Secure Terminal Equipment (STE).

Submit
43. (209) What is the maximum throughput in megabits per second (Mbps) for the Tactical Local Area Network Encryption (TACLANE)–E100?

Explanation

The maximum throughput in megabits per second (Mbps) for the Tactical Local Area Network Encryption (TACLANE)–E100 is 165 for full-duplex and 100 for half-duplex. This means that in full-duplex mode, the TACLANE-E100 can transmit and receive data simultaneously at a maximum rate of 165 Mbps, while in half-duplex mode, it can only transmit or receive data at a maximum rate of 100 Mbps.

Submit
44. (202) What is the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program in the Air Force called?

Explanation

The Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program in the Air Force is called Emission security. This program focuses on preventing unauthorized access to classified information by analyzing and mitigating the unintentional electromagnetic radiation emitted by electronic equipment. By implementing measures to reduce these emissions, the Air Force ensures that sensitive information is protected from potential eavesdropping or interception.

Submit
45. (209) The Tactical Local Area Network Encryption (TACLANE)–Micro is a packet encryption device for Internet Protocol (IP)

Explanation

The correct answer is "version 4 and version 6." This means that the Tactical Local Area Network Encryption (TACLANE)-Micro is capable of encrypting packets for both Internet Protocol (IP) version 4 and version 6. IP version 4 is the most widely used version of IP, while version 6 is the newer and more advanced version that is gradually being adopted. By supporting both versions, the TACLANE-Micro can provide secure encryption for a wide range of network communications.

Submit
46. (203) Which uninterruptible power supply (UPS) system is generally used for larger loads and currents?

Explanation

Flywheel UPS systems are generally used for larger loads and currents. Unlike storage batteries, which store electrical energy chemically and can provide power for a limited period of time, flywheels store kinetic energy in a rotating mass and can provide continuous power for a longer duration. Flywheel UPS systems are known for their high energy density, fast response time, and longer lifespan compared to battery-based UPS systems. They are often preferred for applications that require uninterrupted power supply for critical equipment or processes.

Submit
47. (203) Which is not a consideration when selecting storage batteries for the central office?

Explanation

When selecting storage batteries for the central office, the number of alternating current converters in the office is not a consideration. Storage batteries are chosen based on factors such as the office power requirements, the amount of floor space available, and future subscriber growth and reserve time required. The number of alternating current converters in the office is unrelated to the selection of storage batteries.

Submit
48. (204) Who becomes responsible for life-cycle maintenance once the installation of cyberspace equipment is complete?

Explanation

Once the installation of cyberspace equipment is complete, the responsibility for life-cycle maintenance falls on the production work center or contractor. This means that either the production work center or the contractor will be in charge of maintaining and managing the equipment throughout its life cycle, ensuring its proper functioning and addressing any issues or repairs that may arise.

Submit
49. (209) The Tactical Local Area Network Encryption (TACLANE)–Micro can acquire an Internet Protocol (IP) address by Dynamic Host Configuration Protocol (DHCP) on which side?

Explanation

The Tactical Local Area Network Encryption (TACLANE) - Micro can acquire an Internet Protocol (IP) address by Dynamic Host Configuration Protocol (DHCP) on either the ciphertext or plaintext side. This means that it can obtain an IP address regardless of whether the data is encrypted (ciphertext) or not (plaintext).

Submit
50. (204) What are the two standards for termination of Category 5 (CAT 5) and Category 6 (CAT 6)?

Explanation

The correct answer is T-568A and T-568B. These are the two standards for termination of Category 5 (CAT 5) and Category 6 (CAT 6) cables. These standards define the pin assignments for the eight wires in the Ethernet cable, ensuring that the cables are properly connected and can transmit data effectively. T-568A and T-568B are both widely used in networking and telecommunications industries.

Submit
51. (207) When using a Secure Terminal Equipment (STE), what is encrypted?

Explanation

When using a Secure Terminal Equipment (STE), the digital signal is encrypted. STE is designed to provide secure communication by encrypting the digital data being transmitted. This encryption ensures that the information remains confidential and protected from unauthorized access or interception. Encrypting the digital signal adds an additional layer of security to prevent any potential breaches or data compromises during transmission.

Submit
52. (210) What system serves as the focal point for suggested upgrades for personal wireless communications systems (PWCS) assets?

Explanation

The Asset Inventory Management System (AIMS) serves as the focal point for suggested upgrades for personal wireless communications systems (PWCS) assets. This system is designed to manage and track assets, including their location, condition, and maintenance history. By utilizing AIMS, organizations can easily identify which assets need upgrades or replacements, ensuring that the PWCS assets are up to date and functioning optimally.

Submit
53. (212) What needs to be higher to improve the audio quality?

Explanation

Bit rate refers to the number of bits that are processed per unit of time in a digital audio file. A higher bit rate means that more bits are processed, resulting in a higher audio quality. Therefore, to improve the audio quality, the bit rate needs to be higher.

Submit
54. (207) In secure socket layer (SSL), before an encrypted transaction takes place, what does the Web server give to the browser?

Explanation

In secure socket layer (SSL), the web server gives its public key to the browser before an encrypted transaction takes place. This is because SSL uses public key cryptography, where the server's public key is used to encrypt the data, ensuring secure communication between the server and the browser. The browser then uses the server's public key to encrypt the session key, which is used for symmetric encryption during the transaction.

Submit
55. (212) Who is usually responsible for their air time charges and must budget accordingly?

Explanation

The unit is usually responsible for their air time charges and must budget accordingly. This means that the specific military unit, such as a battalion or squadron, is responsible for paying for the air time charges incurred by their personnel. They need to allocate funds in their budget to cover these expenses. The other options, such as the Installation Spectrum Manager (ISM), Communications and Information Systems officer (CSO), and Base Personal Wireless Communications Systems (PWCS) manager, are not responsible for these charges.

Submit
56. (201) The Integrated Maintenance Data System (IMDS) interface with the Enterprise System-Supply (ES-S) replaces what system throughout the maintenance complex?

Explanation

The correct answer is Standard Base Supply System (SBSS). The question is asking about the system that the Integrated Maintenance Data System (IMDS) interface with the Enterprise System-Supply (ES-S) replaces throughout the maintenance complex. The answer is SBSS, as the IMDS interface with ES-S replaces the SBSS system.

Submit
57. (207) Which encryption is not a telecommunications encryption type?

Explanation

Open encryption is not a telecommunications encryption type because it refers to encryption methods that are publicly available and accessible to anyone. It does not involve any specific protocols or algorithms used in telecommunications encryption. Narrowband, network, and bulk encryption, on the other hand, are all types of encryption that are commonly used in telecommunications to secure data transmission over networks.

Submit
58. (202) Which method is not a means for secure telecommunications?

Explanation

The Defense Courier Service is not a means for secure telecommunications. It is a system used for the physical transportation of classified and sensitive materials, rather than for secure communication. The other options, such as the protected distribution system, communications security equipment, and intrusion detection optical communications system, are all methods that provide secure telecommunications by encrypting, protecting, or detecting unauthorized access to communication channels.

Submit
59. (216) What type of areas is International Mobile Satellite Organization (Inmarsat) coverage separated?

Explanation

The correct answer is "Ocean." The International Mobile Satellite Organization (Inmarsat) provides coverage for areas separated by oceans. This means that their satellite communication services are specifically designed to cover maritime regions and provide connectivity for ships and other vessels at sea. Inmarsat's network ensures reliable communication and data transfer in remote oceanic areas where traditional terrestrial networks may not be available or reliable.

Submit
60. (216) Which Inmarsat terminals have a land mobile terminal, typically has a one-meter flat array antenna, and weights 30 to 40 pounds?

Explanation

The correct answer is B. Mini-M. The Mini-M is an Inmarsat terminal that is designed for land mobile use. It typically has a one-meter flat array antenna and weighs between 30 to 40 pounds.

Submit
61. (202) Which two parts does the RED/BLACK concept have?

Explanation

The RED/BLACK concept involves two parts: physical separation and electrical separation. Physical separation refers to the physical isolation of networks or systems, ensuring that they are physically separated and cannot directly communicate with each other. Electrical separation, on the other hand, involves the use of security measures such as firewalls and access controls to prevent unauthorized communication between networks or systems. This combination of physical and electrical separation helps to enhance the security and integrity of sensitive information and systems.

Submit
62. (202) Protected distribution systems (PDS) events such as alarms, technical inspections, and other pertinent information are recorded in which log?

Explanation

The correct answer is Protected Distribution Systems (PDS). This is because PDS events such as alarms, technical inspections, and other pertinent information are recorded in the log of Protected Distribution Systems.

Submit
63. (202) A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the

Explanation

A line route inspection of a protected distribution system (PDS) requires a close visual inspection of the total surface. This means that every part of the surface, whether it is visible or concealed, needs to be thoroughly examined. The inspection should cover all areas that can be seen and those that cannot be easily observed, ensuring that the entire surface is inspected for any potential issues or damages.

Submit
64. (204) Permanent markings can be completed by how many different methods?

Explanation

Permanent markings can be completed by two different methods.

Submit
65. (205) Which is not a reason why extreme caution should be used when deleting an e-mail account?

Explanation

Extreme caution should be used when deleting an e-mail account because the wrong account could be deleted. This means that if someone is not careful, they may accidentally delete the wrong e-mail account, resulting in the loss of important emails and data. This highlights the importance of being cautious and double-checking before deleting any e-mail account to avoid any irreversible mistakes.

Submit
66. (207) What are the two basic types of computer cryptology?

Explanation

The correct answer is "Symmetric-secret key system and asymmetric-public key system." Cryptology refers to the study and practice of techniques used to secure communication and data. In symmetric-key systems, the same key is used for both encryption and decryption. This means that both the sender and receiver need to have the same key. On the other hand, in asymmetric-key systems, a pair of keys is used - a public key for encryption and a private key for decryption. The public key can be freely distributed, while the private key remains secret. Therefore, the correct answer is symmetric-secret key system and asymmetric-public key system.

Submit
67. (201) Depending on the problem type, what are the two types of forms used in Remedy?

Explanation

The correct answer is "Software or hardware." In Remedy, there are two types of forms used depending on the problem type. These forms can be either related to software or hardware. This suggests that Remedy is a system or platform that deals with both software and hardware issues, allowing users to submit and track problem tickets related to these two categories.

Submit
68. (211) Which personal wireless communications system (PWCS) device's original intent was for use by family, friends, and associates to communicate among themselves within a small area?

Explanation

The correct answer is Family radio service (FRS). FRS devices were originally intended for use by family, friends, and associates to communicate within a small area. FRS operates on a set of frequencies designated by the Federal Communications Commission (FCC) for personal and family use. These devices are commonly used for outdoor activities, such as camping or hiking, where a short-range communication is needed. FRS devices are simple to use and do not require a license to operate.

Submit
69. (212) How fast you sample the audio to get your digital signal is called

Explanation

The question is asking about the term used to describe the speed at which audio is sampled to obtain a digital signal. The correct answer is "bit rate." Bit rate refers to the number of bits (binary digits) that are processed per unit of time, indicating the speed at which data is transmitted or processed. It is different from sample rate, which refers to the number of samples taken per second to represent the audio signal.

Submit
70. (214) How many milliseconds should the one-way delay be from endpoint to endpoint in order to implement Voice over Internet Protocol (VoIP)?

Explanation

In order to implement Voice over Internet Protocol (VoIP), the one-way delay from endpoint to endpoint should be less than 150 milliseconds. This is because any delay greater than this threshold can result in noticeable latency and affect the quality of the voice call. Therefore, to ensure smooth and real-time communication, the delay should be kept below 150 milliseconds.

Submit
71. (207) Triple data encryption standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

Explanation

Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption, namely, encryption, decryption, and encryption. Each operation requires an individual key. Therefore, Triple DES incorporates the use of three individual keys.

Submit
72. (208) Which communications security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

Explanation

Physical security is the correct answer because it refers to measures taken to protect physical assets, such as buildings, equipment, and personnel, from unauthorized access, damage, theft, or sabotage. In the context of communications security (COMSEC), physical security ensures the protection of priority resources of the US Air Force from hostile acts. This includes implementing access controls, surveillance systems, alarm systems, and other physical barriers to deter, detect, and defeat any threats or attacks.

Submit
73. (214) What is the control system that generates a signal with a fixed relation to the phase of a reference signal and responds to both the frequency and the phase of the input signals?

Explanation

A Phase-locked loop (PLL) is a control system that generates a signal with a fixed relation to the phase of a reference signal. It not only responds to the frequency but also the phase of the input signals. This means that the PLL can lock onto and track the phase of the reference signal, making it useful in applications such as synchronization, frequency synthesis, and demodulation. Therefore, the correct answer is Phase-locked loop (PLL).

Submit
74. (215) Up to what level of classification does the Iridium Secure Module (ISM) provide secure voice communications?

Explanation

The Iridium Secure Module (ISM) provides secure voice communications up to the level of Top Secret classification. This means that the module is capable of encrypting voice communications at the highest level of security, ensuring that only authorized individuals with the appropriate clearance can access and understand the information being transmitted.

Submit
75. (203) What are the two main options for storing electricity in an uninterruptible power supply (UPS)?

Explanation

The two main options for storing electricity in an uninterruptible power supply (UPS) are batteries or a flywheel. Batteries are commonly used in UPS systems as they can store large amounts of energy and provide power for an extended period of time. Flywheels, on the other hand, store energy in a rotating mass and can quickly release that energy when needed. Both options are effective in providing backup power during power outages or fluctuations.

Submit
76. (203) In electrical power equipment, the generator can be two types, reciprocating or

Explanation

The correct answer is a turbine engine. In electrical power equipment, the generator can be powered by either a reciprocating engine or a turbine engine. However, the question specifically asks for the type of generator in relation to the power equipment, and since batteries are not typically considered as a type of generator in this context, the correct answer is a turbine engine.

Submit
77. (210) Who coordinates the management of personal wireless communications system (PWCS) assets for the installation commander?

Explanation

The correct answer is the Base communications and information systems officer (CSO). The CSO is responsible for coordinating the management of personal wireless communications system (PWCS) assets for the installation commander. They oversee the implementation and maintenance of the PWCS and ensure that it meets the needs of the installation. This includes coordinating with unit PWCS managers and ensuring compliance with regulations and policies.

Submit
78. (210) Who appoints the unit personal wireless communications system (PWCS) manager?

Explanation

The unit commander appoints the unit personal wireless communications system (PWCS) manager. This individual is responsible for managing the PWCS within the unit, ensuring its proper operation and maintenance. The unit commander has the authority to select and assign personnel to various roles within the unit, including the PWCS manager. This ensures that the manager is someone who is familiar with the unit's operations and can effectively oversee the PWCS. The unit commander is in the best position to make this appointment as they have a direct understanding of the unit's needs and requirements.

Submit
79. (205) What publication governs the format of Alias names for e-mail accounts?

Explanation

The correct answer is Air Force Instruction (AFI) 17–130, Cybersecurity Program Management. This publication governs the format of Alias names for e-mail accounts in the Air Force.

Submit
80. (210) Which of these is not part of the personal wireless communications system (PWCS) manager's duties?

Explanation

The personal wireless communications system (PWCS) manager is responsible for various duties related to managing the system. This includes maintaining the Asset Inventory Management System (AIMS) database, which keeps track of the assets involved in the PWCS. The manager is also responsible for technical solutions, which involve finding and implementing technical solutions for any issues that arise. Maintenance is another duty of the manager, which involves ensuring the proper functioning and upkeep of the PWCS. However, technical reviews are not part of the manager's duties. Technical reviews typically involve evaluating and assessing technical aspects of a system, which would typically be done by a separate team or individual with expertise in that area.

Submit
81. (211) Which personal wireless communications system (PWCS) device can be used for command and control?

Explanation

Land mobile radio (LMR) is a personal wireless communications system (PWCS) device that can be used for command and control. LMR refers to a two-way radio system that is commonly used by public safety organizations, such as police, fire, and emergency medical services, as well as by businesses and government agencies. LMR devices provide reliable and secure communication capabilities, allowing users to transmit and receive voice messages for effective command and control purposes. Pager, Family radio service (FRS), and Intelligence, surveillance, and reconnaissance (ISR) are not specifically designed for command and control functions.

Submit
82. (207) What are the two major types of encryption algorithms in use today that operate by encrypting or decrypting one chunk of data at a time?

Explanation

Block algorithms and stream ciphers are the two major types of encryption algorithms that operate by encrypting or decrypting one chunk of data at a time. Block algorithms divide the input data into fixed-sized blocks and process each block independently, while stream ciphers encrypt or decrypt data one bit or one byte at a time. These algorithms are widely used in modern cryptography for securing data transmission and storage.

Submit
83. (207) Which encryption handles multiplexed lines that come from combining multiple single data and voice lines into one?

Explanation

Bulk encryption is the correct answer because it is designed to handle multiplexed lines that combine multiple single data and voice lines into one. Bulk encryption is typically used in scenarios where large amounts of data need to be encrypted and transmitted efficiently over a network. It allows for the encryption and decryption of multiple data streams simultaneously, making it suitable for handling multiplexed lines. Network encryption, on the other hand, focuses on securing communication between different networks, while wideband and narrowband refer to the frequency ranges used for communication and are not specifically related to handling multiplexed lines.

Submit
84. (211) How many channels do the intra-squad radios operate on?

Explanation

not-available-via-ai

Submit
85. (214) What percent packet loss should a network expect in order to implement Voice over Internet Protocol (VoIP)?

Explanation

Voice over Internet Protocol (VoIP) is a technology that allows voice communication over the internet. In order to ensure clear and uninterrupted communication, a network should aim for a packet loss rate of less than 1%. Packet loss refers to the percentage of data packets that are lost or do not reach their destination. A high packet loss rate can result in poor call quality, delays, and dropped calls. Therefore, a network implementing VoIP should strive to keep the packet loss rate as low as possible, ideally less than 1%.

Submit
86. (208) Which form is used with a transfer report to accompany a communications security (COMSEC) package?

Explanation

The correct answer is SF 153, COMSEC Material Report. This form is used to accompany a communications security (COMSEC) package. It is specifically designed for reporting and tracking COMSEC material, ensuring proper accountability and security measures are followed during the transfer process. The SF 153 provides essential information about the package, such as the type and quantity of COMSEC material being transferred, as well as the names and signatures of the individuals involved in the transfer. This form helps maintain a chain of custody and ensures the secure handling of sensitive COMSEC material.

Submit
87. (202) In the RED/BLACK concept, what type of traffic do RED lines carry?

Explanation

In the RED/BLACK concept, RED lines carry unencrypted classified traffic. This means that the information being transmitted over these lines is classified but not encrypted, making it potentially vulnerable to interception or unauthorized access. The RED lines are used to transmit sensitive information that requires a higher level of security and protection.

Submit
88. (209) Which set of electrical standards does the KIV–7 not support?

Explanation

The KIV-7 does not support the RS-422 electrical standard.

Submit
89. (209) Tactical Local Area Network Encryption (TACLANE)–Classic and TACLANE–E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for

Explanation

TACLANE devices are high-speed encryption devices that offer security services for different types of networks. The given answer states that TACLANE devices provide confidentiality, data integrity, and authentication for Internet Protocol (IP) networks. This means that TACLANE devices are specifically designed to secure the transmission of data over IP networks, ensuring that the information remains confidential, the integrity of the data is maintained, and the parties involved in the communication are authenticated.

Submit
90. (204) Which one of these requires the use of the latest technical order (TO) information listed?

Explanation

Configuration item refers to an individual component or element of a system that needs to be managed and controlled. In order to effectively manage and control a configuration item, it is necessary to have the latest technical order (TO) information listed. This information includes updates, revisions, and changes to the configuration item, which are crucial for ensuring its proper functioning and compatibility with other system components. Therefore, the use of the latest TO information is required for managing and maintaining a configuration item effectively.

Submit
91. (209) The Tactical Local Area Network Encryption (TACLANE)–Micro can be used to overlay what type of networks on top of existing public and private network infrastructures?

Explanation

The TACLANE-Micro can be used to overlay Secure Virtual Networks (SVNs) on top of existing public and private network infrastructures. SVNs provide a secure and encrypted communication channel, allowing users to securely transmit data over insecure networks. This ensures the confidentiality and integrity of the transmitted information, protecting it from unauthorized access or interception.

Submit
92. (207) How many bits for its key does data encryption standard (DES) use?

Explanation

The correct answer is 64. The Data Encryption Standard (DES) uses a 64-bit key for encryption. This means that the key used to encrypt and decrypt the data is 64 bits in length. DES is a symmetric encryption algorithm, which means that the same key is used for both encryption and decryption. The use of a 64-bit key provides a relatively high level of security, but it has become less secure over time due to advances in computing power and cryptanalysis techniques.

Submit
93. (207) Which encryption handles software encryption?

Explanation

The correct answer is "Network" because network encryption refers to the process of encrypting data while it is being transmitted over a network. This type of encryption is typically implemented in software and is used to secure data as it travels between devices or across the internet. Narrowband, wideband, and bulk do not specifically refer to encryption methods used in software encryption.

Submit
94. (205) What exchange tab is used to add, delete, or modify user accounts that can receive as or send as for the account?

Explanation

Mailbox security is the correct answer because it is the exchange tab used to add, delete, or modify user accounts that can receive as or send as for the account. This tab allows administrators to manage the permissions and access rights for user accounts, including the ability to delegate mailbox access and control who can send or receive emails on behalf of another user. By configuring the mailbox security settings, administrators can ensure that only authorized users have the necessary permissions to access and manage specific mailboxes.

Submit
95. (205) What exchange tab is used to add, delete, or modify user accounts that have special permissions to the account?

Explanation

The correct answer is Mailbox rights. In Exchange, mailbox rights are used to add, delete, or modify user accounts that have special permissions to the account. These permissions include the ability to access and manage the mailbox, as well as perform specific actions such as sending emails on behalf of the mailbox owner or managing mailbox folders. The Exchange administrator can grant or revoke these rights to ensure proper access control and security for the mailbox.

Submit
96. (207) Which encryption handles data that can come from equipment such as computers?

Explanation

Wideband encryption is the correct answer because it is designed to handle data that can come from equipment such as computers. Wideband encryption refers to a type of encryption that can handle a wide range of data frequencies, making it suitable for encrypting data from various sources, including computers and other equipment. This type of encryption is commonly used to protect sensitive information and ensure secure communication between different devices and systems. Narrowband encryption, network encryption, and bulk encryption are not specifically tailored to handle data from computers and equipment, making them incorrect choices.

Submit
97. (209) The Secure Terminal Equipment (STE) Integrated Subscriber Digital Network (ISDN) setting supports what speeds in kilobits per second (Kbps)?

Explanation

The Secure Terminal Equipment (STE) Integrated Subscriber Digital Network (ISDN) setting supports a speed of 128 kilobits per second (Kbps).

Submit
98. (213) What protocol does the Integrated Services Digital Network (ISDN) use to transmit video teleconferencing (VTC) data?

Explanation

ISDN uses the H.320 protocol to transmit video teleconferencing (VTC) data. H.320 is a standard protocol developed by the International Telecommunication Union (ITU) for transmitting audio, video, and data over digital lines. It specifies the protocols and procedures for videoconferencing systems, ensuring compatibility and interoperability between different vendors' equipment. H.320 supports real-time video communication and provides error correction and compression techniques to optimize the transmission of VTC data over ISDN networks.

Submit
99. (213) What component in the video teleconferencing (VTC) system converts incoming four wire transmissions into two wire transmissions?

Explanation

The correct answer is Network termination (NT) 1. The network termination (NT) 1 component in a video teleconferencing (VTC) system is responsible for converting incoming four wire transmissions into two wire transmissions. This conversion is necessary for proper communication and compatibility between different devices and systems in the VTC network. The NT1 component plays a crucial role in ensuring seamless transmission of audio signals during video conferences.

Submit
100. (209) The Secure Terminal Equipment (STE) consists of a

Explanation

The Secure Terminal Equipment (STE) is composed of a host terminal and a removable security core. This means that the STE includes a main terminal that is permanently attached and a security core that can be detached or replaced as needed. The host terminal is responsible for the main functions of the STE, while the security core provides the necessary security measures to protect sensitive information. This configuration allows for flexibility in upgrading or replacing the security core without affecting the main terminal.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 15, 2019
    Quiz Created by
    Joel Pitre
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(201) In Remedy, to whom are the tickets assigned to fix problems?
(208) Which form is used as a register log to record visitors into...
(201) Asset Inventory Management System (AIMS) is used to track and...
(216) Which does not fit the "Peaceful Purposes" clause of using the...
(202) What is the purpose of the Transient Electromagnetic Pulse...
(202) What area is described as a complete building or facility area...
(203) What are the two different types of current used for power?
(203) Which fuel is not used for reciprocating generators?
(204) Which of these statements pertains to configuration management?
(210) What Air Force instruction (AFI) governs personal wireless...
(205) What automatically happens to an e-mail account when the user's...
(210) Which of these is a task completed by the unit personal wireless...
(207) What is the advantage of symmetric cryptology?
(214) What are the voice messages encoded into when making a phone...
(208) Communications security (COMSEC) is defined as the measures and...
(209) Which secure voice telephone can be used on the Integrated...
(201) The Asset Inventory Management System (AIMS) system includes...
(215) Which commercial satellite communication system offers true...
(217) What ratio is used to measure the desired signal strength...
(202) In the RED/BLACK concept, what type of traffic do BLACK lines...
(202) Protected distribution systems (PDS) require which scheduled...
(209) The Tactical Local Area Network Encryption (TACLANE)–Micro...
(204) The approval or disapproval of all approved changes in the...
(206) (205) How many objects can be manipulated at a time in directory...
(207) What components are used in both encryption and decryption?
(210) What is the only authorized Air Force inventory control software...
(210) What combination of Air Force instructions (AFI), Air Force...
(212) What mode of operation do cell phones use?
(207) Which cryptology system has a disadvantage of using more...
(212) What channel access method assigns each call a certain portion...
(212) Each cell in a service area has what tower and transceiver...
(212) Cell sites are generally thought of as being a
(213) What component in the video teleconferencing (VTC) system...
(201) What tool must you use in order to create a new ticket?
(214) How many channels are used when a Voice over Internet Protocol...
(214) What component of Voice over Internet Protocol (VoIP) is an...
(201) Which is not a function of the Integrated Maintenance Data...
(201) The Asset Inventory Management System (AIMS) is an online...
(214) What is a system of error control for data transmission, where...
(215) In response to disaster relief operations, the Department of...
(209) The Secure Terminal Equipment (STE) cannot communicate securely...
(209) Which port on the office version Secure Terminal Equipment (STE)...
(209) What is the maximum throughput in megabits per second (Mbps) for...
(202) What is the Transient Electromagnetic Pulse Emanation Standard...
(209) The Tactical Local Area Network Encryption (TACLANE)–Micro...
(203) Which uninterruptible power supply (UPS) system is generally...
(203) Which is not a consideration when selecting storage batteries...
(204) Who becomes responsible for life-cycle maintenance once the...
(209) The Tactical Local Area Network Encryption (TACLANE)–Micro...
(204) What are the two standards for termination of Category 5 (CAT 5)...
(207) When using a Secure Terminal Equipment (STE), what is encrypted?
(210) What system serves as the focal point for suggested upgrades for...
(212) What needs to be higher to improve the audio quality?
(207) In secure socket layer (SSL), before an encrypted transaction...
(212) Who is usually responsible for their air time charges and must...
(201) The Integrated Maintenance Data System (IMDS) interface with the...
(207) Which encryption is not a telecommunications encryption type?
(202) Which method is not a means for secure telecommunications?
(216) What type of areas is International Mobile Satellite...
(216) Which Inmarsat terminals have a land mobile terminal, typically...
(202) Which two parts does the RED/BLACK concept have?
(202) Protected distribution systems (PDS) events such as alarms,...
(202) A line route inspection of a protected distribution system (PDS)...
(204) Permanent markings can be completed by how many different...
(205) Which is not a reason why extreme caution should be used when...
(207) What are the two basic types of computer cryptology?
(201) Depending on the problem type, what are the two types of forms...
(211) Which personal wireless communications system (PWCS) device's...
(212) How fast you sample the audio to get your digital signal is...
(214) How many milliseconds should the one-way delay be from endpoint...
(207) Triple data encryption standard (DES) is based on three compound...
(208) Which communications security (COMSEC) application provides us...
(214) What is the control system that generates a signal with a fixed...
(215) Up to what level of classification does the Iridium Secure...
(203) What are the two main options for storing electricity in an...
(203) In electrical power equipment, the generator can be two types,...
(210) Who coordinates the management of personal wireless...
(210) Who appoints the unit personal wireless communications system...
(205) What publication governs the format of Alias names for e-mail...
(210) Which of these is not part of the personal wireless...
(211) Which personal wireless communications system (PWCS) device can...
(207) What are the two major types of encryption algorithms in use...
(207) Which encryption handles multiplexed lines that come from...
(211) How many channels do the intra-squad radios operate on?
(214) What percent packet loss should a network expect in order to...
(208) Which form is used with a transfer report to accompany a...
(202) In the RED/BLACK concept, what type of traffic do RED lines...
(209) Which set of electrical standards does the KIV–7 not...
(209) Tactical Local Area Network Encryption (TACLANE)–Classic...
(204) Which one of these requires the use of the latest technical...
(209) The Tactical Local Area Network Encryption (TACLANE)–Micro...
(207) How many bits for its key does data encryption standard (DES)...
(207) Which encryption handles software encryption?
(205) What exchange tab is used to add, delete, or modify user...
(205) What exchange tab is used to add, delete, or modify user...
(207) Which encryption handles data that can come from equipment such...
(209) The Secure Terminal Equipment (STE) Integrated Subscriber...
(213) What protocol does the Integrated Services Digital Network...
(213) What component in the video teleconferencing (VTC) system...
(209) The Secure Terminal Equipment (STE) consists of a
Alert!

Advertisement