What requirement must an Apprentice complete to be awarded Journeyman...
What is the advantage of symmetric cryptology?
What is a system of error control for data transmission, where the...
In a cable Internet, as the distance increases, the speed of the...
What tool must you use in order to create a new ticket?
Which cryptology system has a disadvantage of using more processing...
Protected distribution systems (PDS) require which scheduled...
Which is not a function of the Integrated Maintenance Data System...
How many bits for its key does data encryption standard (DES) use?
How many channels do the intra-squad radios operate on?
The Asset Inventory Management System (AIMS) is an online database...
Which is not a transmission medium for a wireless local area network?
What stores print jobs in a print queue until a printer becomes...
Asset Inventory Management System (AIMS) is used to track and manage...
Which uninterruptible power supply (UPS) system is generally used for...
What should you usually check before you begin in-depth...
The Tactical Local Area Network Encryption (TACLANE)–Micro is a...
With a software license agreement, who has the full rights to the...
Any hardware added to a computer that expands its capabilities is...
In Remedy, to whom are the tickets assigned to fix problems?
Protected distribution systems (PDS) events such as alarms, technical...
What operating system (OS) task ensures each process and application...
What is an essential tool for any client systems technician (CST) to...
What needs to be higher to improve the audio quality?
A line route inspection of a protected distribution system (PDS)...
A non-wireless way to load software or interface hardware to a tablet...
A personal computer (PC) is such a great tool because it
What form of remote network access is often the only choice for rural...
Which hardware requirement is defined as the model and the clock speed...
Which commercial satellite communication system offers true...
The specifications that should be met, if not exceeded, to ensure a...
Each cell in a service area has what tower and transceiver assembly...
Who is usually responsible for their air time charges and must budget...
What command-line tool displays Transmission Control Protocol/Internet...
Cell sites are generally thought of as being a
What process in troubleshooting will help organize thoughts, prevent...
What tool can launch individual troubleshooting/configuration programs...
Which is not a consideration when selecting storage batteries for the...
The primary interface for the hard drive that is now the most commonly...
Which Institute of Electrical and Electronics Engineers (IEEE)...
What is one of the best habits a client systems technician (CST) can...
What component in the video teleconferencing (VTC) system converts...
Which alarm category in the network monitor system (NMS) indicates a...
Transferring eight bits of data simultaneously through eight separate...
What network troubleshooting tool can dramatically reduce the number...
What drives faster processing speeds and increases the power of many...
The most common hardware diagnostic tool is the
Which fuel is not used for reciprocating generators?
Which form is used as a register log to record visitors into...
Which does not fit the "Peaceful Purposes" clause of using the...
What type of areas is International Mobile Satellite Organization...
Which protocol provides an almost unlimited number of Internet...
What are the voice messages encoded into when making a phone call...
What are the two different types of current used for power?
What describes how computers find a specific byte it is looking for in...
Which Inmarsat terminals have a land mobile terminal, typically has a...
A formatted disk partition that is used for a particular file system...
Which of these is a task completed by the unit personal wireless...
The approval or disapproval of all approved changes in the...
Which functions do client systems technicians perform regarding...
Which item is not an optical storage media?
How many bits long are the addresses that computer instructions work...
What hardware quick test should only be used to localize problems?
Which file system is the best choice for data storage if the computer...
Which of these statements pertains to configuration management?
The Asset Inventory Management System (AIMS) system includes what type...
What is the only authorized Air Force inventory control software used...
What provides the logical network map?
Which method is not a means for secure telecommunications?
Which network troubleshooting step includes automatically polling...
In the RED/BLACK concept, what type of traffic do RED lines carry?
This type of random access memory (RAM) transfers sixteen times as...
In the RED/BLACK concept, what type of traffic do BLACK lines carry?
Actively sampling the status of an external device by a client program...
What does Wi-Fi (wireless fidelity) use to carry network signals to...
Which is not a reason why extreme caution should be used when deleting...
What automatically happens to an e-mail account when the user's domain...
What is installed on a computer to act as the interface between the...
What combination of Air Force instructions (AFI), Air Force Systems...
What term refers to the process of launching an operating system (OS)?
What technology involves the capture and storage of a distinctive,...
What is the purpose of the Transient Electromagnetic Pulse Emanation...
Which personal wireless communications system (PWCS) device's original...
Which term describes that data is whole or complete?
What is the Transient Electromagnetic Pulse Emanation Standard...
What is the unique identification number a network interface card...
How many principles govern all actions associated with risk...
Which encryption handles data that can come from equipment such as...
What does the Air Force Network Integration Center (AFNIC) recommend...
Which operating system (OS) tool will provide a listing of hardware...
Which patch will prevent exploitation and remove or mitigate a...
What components are used in both encryption and decryption?
What area is described as a complete building or facility area under...
What function enables the higher layer protocol data units (PDU) to...
Which port on the office version Secure Terminal Equipment (STE) can...
Which is not a way in which round trip delay can be determined?
What is the maximum throughput in megabits per second (Mbps) for the...
What software category includes programs that do real work for users?
What is the control system that generates a signal with a fixed...
Which of these is not an occurrence during a system cold boot?
How fast you sample the audio to get your digital signal is called
Which is not a type of computer user interface?
The Tactical Local Area Network Encryption (TACLANE)–Micro may...
The Tactical Local Area Network Encryption (TACLANE)–Micro can...
Which is not considered a utility application?
Up to what level of classification does the Iridium Secure Module...
What Transmission Control Protocol/Internet Protocol (TCP/IP) command...
The first sector at the beginning of a hard drive is called the master
What type of remote network provides a private tunnel through public...
On a hard drive, how many logical drives can a primary partition have?
What piece of test equipment can help verify connectivity and identify...
What protocol does the Integrated Services Digital Network (ISDN) use...
What component in the video teleconferencing (VTC) system converts...
Which logical troubleshooting step would include classifying the...
Which operating system (OS) tool allows the viewing of the number of...
Which settings are established through the startup software in the...
The Tactical Local Area Network Encryption (TACLANE)–Micro can...
What Air Force instruction (AFI) governs personal wireless...
Who becomes responsible for life-cycle maintenance once the...
What program sets up the divisions of memory that holds an operating...
How many channels are used when a Voice over Internet Protocol (VoIP)...
Who appoints the unit personal wireless communications system (PWCS)...
What ratio is used to measure the desired signal strength relative to...
What component of Voice over Internet Protocol (VoIP) is an endpoint...
Which of these is not part of the personal wireless communications...
This type of memory is blank and instructions can be placed on it...
Which type of memory is used to duplicate frequently accessed...
Which type of memory is located on just about every kind of circuit...
Which media has a storage capacity of gigabyte (GB)—terabyte...
Which two parts does the RED/BLACK concept have?
How many objects can be manipulated at a time in directory and...
What is defined as an asynchronous signal from a computer hardware...
Which logical structure component is a container used to organize...
What percentage of average network use indicates a busy network?
What are the two basic types of computer cryptology?
What is the maximum packet size for Internet Protocol (IP)?
The Secure Terminal Equipment (STE) Integrated Subscriber Digital...
Depending on the problem type, what are the two types of forms used in...
What exchange tab is used to add, delete, or modify user accounts that...
In response to disaster relief operations, the Department of Defense...
Which item is not a good practice in helping with future...
What type of software piracy is it when a product offered was...
What problem can reduce the throughput and range of a wireless access...
In electrical power equipment, the generator can be two types,...
What protocol is used to allow standard phone calls over the same data...
Which network impairment occurs when bits are missing in one or more...
What is the first step towards eliminating mishaps?
What type of memory is non-volatile, considered permanent, and is also...
The Secure Terminal Equipment (STE) cannot communicate securely with...
What is the minimum packet size for Internet Protocol (IP)?
Which of these is not defined by network protocols?
Which information is not required when configuring Transmission...
In secure socket layer (SSL), before an encrypted transaction takes...
What are the two major types of encryption algorithms in use today...
The Integrated Maintenance Data System (IMDS) interface with the...
What part do client systems technicians (CST) play in amassing,...
Which is a very simple example of an error detecting code?
What publication governs the format of Alias names for e-mail...
What are the two main options for storing electricity in an...
Which encryption is not a telecommunications encryption type?
What is the most commonly used Electronic Industries Association (EIA)...
What channel access method assigns each call a certain portion of time...
Over what percentage of all network problems occur at the Data Link...
What is the preferred method for clearing magnetic tapes and is the...
Which fault isolation technique may entail checking the cable...
Which management process prevents software fixes or updates from...
This must be done to any storage media before changing modes of...
Which secure voice telephone can be used on the Integrated Services...
What system serves as the focal point for suggested upgrades for...
This is an authorized method of cleaning and sanitizing many types of...
How many milliseconds should the one-way delay be from endpoint to...
What network troubleshooting tool will indicate if a noteworthy event...
Who coordinates the management of personal wireless communications...
Permanent markings can be completed by how many different methods?
What mode of operation do cell phones use?
Tactical Local Area Network Encryption (TACLANE)–Classic and...
Communications security (COMSEC) is defined as the measures and...
Which one of these requires the use of the latest technical order (TO)...
The Secure Terminal Equipment (STE) consists of a
What percent packet loss should a network expect in order to implement...
What are the two standards for termination of Category 5 (CAT 5) and...
Which personal wireless communications system (PWCS) device can be...
Which computer system requirements must be satisfied for software to...
When using a Secure Terminal Equipment (STE), what is encrypted?
What software activates the actual transmission and receipt of data...
Which set of electrical standards does the KIV–7 not support?
What exchange tab is used to add, delete, or modify user accounts that...
What systems entail how we communicate and manage data?
How does a router send information to the Internet on a wireless...
Which form is used with a transfer report to accompany a...
Which communications security (COMSEC) application provides us with...
How much power does a not and drive (NAND) require?
What device receives information from the Internet, translates it into...
Which encryption handles multiplexed lines that come from combining...
Which item is not a common problem inherent to computers?
Which encryption handles software encryption?
A hard disk is divided into how many byte sectors?
Triple data encryption standard (DES) is based on three compound...
How many connector interfaces does a network interface card (NIC)...
What is the most common set of system requirements defined by an...