CDC 3D151 Vol 2 Ure

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Dakota.lindberg
D
Dakota.lindberg
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,006
| Attempts: 799
SettingsSettings
Please wait...
  • 1/100 Questions

    Depending on the problem type, what are the two types of forms used in Remedy?

    • Software or hardware
    • Software and equipment
    • Application or hardware
    • Application and equipment
Please wait...
CDC 3D151 Vol 2 Ure - Quiz

Quiz Preview

  • 2. 

    In Remedy, to whom are the tickets assigned to fix problems?

    • A resolution group only

    • A specific technician only

    • Remedy automatically assigns tickets

    • A resolution group or specific technician

    Correct Answer
    A. A resolution group or specific technician
    Explanation
    In Remedy, tickets can be assigned to either a resolution group or a specific technician to fix problems. This allows for flexibility in assigning tickets based on the expertise and availability of technicians.

    Rate this question:

  • 3. 

    Which of these statements pertain to configuration management?

    • Identify and document the functional and physical characteristics of a CI

    • Record and report change processing and implementation status

    • Control changes to the functional and physical characteristics of a CI

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    All of the statements mentioned pertain to configuration management. Configuration management involves identifying and documenting the functional and physical characteristics of a Configuration Item (CI), recording and reporting change processing and implementation status, and controlling changes to the functional and physical characteristics of a CI. Therefore, all of the given statements are relevant to configuration management.

    Rate this question:

  • 4. 

    What automatically happens to an e-mail account when the users domain account is deleted?

    • Changed

    • Deleted

    • Updated

    • Reviewed

    Correct Answer
    A. Deleted
    Explanation
    When a user's domain account is deleted, their email account is also deleted. This is because the email account is tied to the user's domain account, and deleting the domain account automatically removes access to the email account as well.

    Rate this question:

  • 5. 

    Which form is used as a register log to record visitors into restriced areas?

    • AF Form 1109, Visitor Register Log

    • AF Form 1119, Monthly Monetary Records

    • AF Form 1019, Armament Recording Program Mission Data

    • AF Form 1122, Personal Property and Personal Effects Inventory

    Correct Answer
    A. AF Form 1109, Visitor Register Log
    Explanation
    The AF Form 1109, Visitor Register Log, is used as a register log to record visitors into restricted areas.

    Rate this question:

  • 6. 

    Asset Inventory Management System (AIMS) is used to track and manage Air Force assets?

    • Weapons

    • Support

    • Telephone

    • Communications

    Correct Answer
    A. Communications
    Explanation
    AIMS is used to track and manage Air Force assets, and one of the key assets that need to be tracked and managed in the Air Force is the communications equipment. This includes radios, satellites, and other communication devices that are crucial for effective communication within the Air Force. Therefore, the correct answer is Communications.

    Rate this question:

  • 7. 

    What area is described as the complete building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

    • Controlled Access Area (CAA)

    • Restricted Access Area (RAA)

    • Limited-Control Area (LCA)

    • Uncontrolled Access Area (UAA)

    Correct Answer
    A. Controlled Access Area (CAA)
    Explanation
    A Controlled Access Area (CAA) is described as the complete building or facility area under direct physical control. In this area, unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance. This means that only authorized individuals are allowed entry into the CAA, ensuring that the area is secure and protected from unauthorized access.

    Rate this question:

  • 8. 

    What are the two different types of current used for power?

    • 100 v (volts) and 210 v

    • 105 v and 215 v

    • 110 v and 220 v

    • 115 v and 225 v

    Correct Answer
    A. 110 v and 220 v
    Explanation
    The correct answer is 110 v and 220 v because these are the standard voltages used for power in most countries. The voltage of 110 v is commonly used in North America, while 220 v is used in many other parts of the world. These voltages are suitable for powering various electrical devices and appliances.

    Rate this question:

  • 9. 

    How many objects can be manipulated at a time in directory and resource administrator (DRA)?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 1
    Explanation
    In directory and resource administrator (DRA), only one object can be manipulated at a time. This means that users can only perform actions on one object at a time, such as modifying its properties or permissions. This limitation ensures that changes made to objects are accurate and avoids any potential conflicts or errors that may arise from manipulating multiple objects simultaneously.

    Rate this question:

  • 10. 

    Which of these is a task completed by the unit personal wireless communications system (PWCS) manager?

    • Briefs users on the proper use of PWCS equipment

    • Implements unit-level customer education program

    • Turns in excess equipment over to the base PWCS manager

    • All of the above

    Correct Answer
    A. All of the above
    Explanation
    The correct answer is "All of the above." The unit personal wireless communications system (PWCS) manager is responsible for completing all of the tasks mentioned. They brief users on the proper use of PWCS equipment, implement a unit-level customer education program, and turn in excess equipment over to the base PWCS manager.

    Rate this question:

  • 11. 

    What tool must you use in order to create a new ticket?

    • Remedy

    • Remedy new

    • Remedy user

    • Remedy ticket

    Correct Answer
    A. Remedy user
    Explanation
    To create a new ticket, the tool that must be used is "Remedy user". This tool is specifically designed for users to create and manage tickets in the Remedy system. It allows users to input all the necessary details and information for the ticket, such as the issue, priority, and contact information. By using the "Remedy user" tool, users can efficiently create new tickets and ensure that all the required information is captured accurately.

    Rate this question:

  • 12. 

    The Integrated Maintenance Data System (IMDS) interface with the Enterprise System-Supply (ES-S) replaces what system throughout the maintenance complex?

    • Reliability and Maintainability System (REMIS)

    • Telephone Management System

    • Standard Base Supply System (SBSS)

    • Remedy

    Correct Answer
    A. Standard Base Supply System (SBSS)
    Explanation
    The correct answer is Standard Base Supply System (SBSS). The question asks what system the Integrated Maintenance Data System (IMDS) interface with the Enterprise System-Supply (ES-S) replaces throughout the maintenance complex. The IMDS interface with ES-S replaces the Standard Base Supply System (SBSS) throughout the maintenance complex.

    Rate this question:

  • 13. 

    In the RED/BLACK concept, what type of traffic do BLACK lines carry?

    • Encrypted classified or unclassified

    • Encrypted classified only

    • Unencrypted classified

    • Unclassified only

    Correct Answer
    A. Encrypted classified or unclassified
    Explanation
    The correct answer is "Encrypted classified or unclassified." In the RED/BLACK concept, BLACK lines carry traffic that can be either encrypted or unencrypted, and it can be classified or unclassified. This means that any type of traffic, regardless of its encryption status or classification level, can be carried by the BLACK lines.

    Rate this question:

  • 14. 

    What is the purpose of the Transient Pulse Emanation Standard (TEMPEST) program?

    • Elimante all instances of radiation of electrical impulses

    • Reduce the chances of radiation of electrical impulses

    • Improve the signal of radiation of electrical impulses

    • Increase the range of radiation of electrical impulses

    Correct Answer
    A. Reduce the chances of radiation of electrical impulses
    Explanation
    The purpose of the Transient Pulse Emanation Standard (TEMPEST) program is to reduce the chances of radiation of electrical impulses. TEMPEST aims to prevent the unintentional electromagnetic emanations that can be captured and exploited by adversaries to gather sensitive information. By implementing measures to minimize these emissions, the program helps to enhance the security and confidentiality of electronic communications and equipment.

    Rate this question:

  • 15. 

    The Tactical Local Area Network Encryption (TACLANE)-Micro is packet encryption device for Internet Protocol (IP)

    • version 4 and version 6

    • version 4 and version 5

    • version 5 only

    • version 4 only

    Correct Answer
    A. version 4 and version 6
    Explanation
    The correct answer is version 4 and version 6. The TACLANE-Micro is a packet encryption device that is capable of encrypting Internet Protocol (IP) packets. It supports both version 4 and version 6 of the IP protocol, allowing for secure communication over both IPv4 and IPv6 networks.

    Rate this question:

  • 16. 

    What is the only authorized Air Force inventory control software used to account for personal wireless communications system (PWCS) assets?

    • Asset Inventory Management System (AIMS)

    • Tracking and Reporting System

    • Integrated Maintenance Data System

    • Core Automated Maintenance System

    Correct Answer
    A. Asset Inventory Management System (AIMS)
    Explanation
    The only authorized Air Force inventory control software used to account for personal wireless communications system (PWCS) assets is the Asset Inventory Management System (AIMS).

    Rate this question:

  • 17. 

    Each cell in a service area has a central tower and transceiver assembly that transmits to and receives from the cell phones in that area?

    • Eastern

    • Western

    • Central

    • Northern

    Correct Answer
    A. Central
    Explanation
    The correct answer is "Central" because the question is asking about the location of the central tower and transceiver assembly in a service area. The central tower is responsible for transmitting and receiving signals to and from cell phones in that area.

    Rate this question:

  • 18. 

    The Asset Inventory Management System (AIMS) includes what type of database and is located where?

    • Access database at Randolph Air Force Base (AFB)

    • Access database at Wright-Patterson AFB

    • Oracle database at Wright-Patterson AFB

    • Oracle database at Randolph AFB

    Correct Answer
    A. Oracle database at Wright-Patterson AFB
    Explanation
    The Asset Inventory Management System (AIMS) is located at Wright-Patterson AFB and uses an Oracle database.

    Rate this question:

  • 19. 

    Protected distribution systems (PDS) require which scheduled inspections?

    • Communications security

    • Line route or visual

    • Seperation

    • Electrical

    Correct Answer
    A. Line route or visual
    Explanation
    Protected distribution systems (PDS) require scheduled inspections to ensure the integrity and security of the communication lines. These inspections can be done either by following the line route or through visual inspections. By regularly inspecting the line route or visually examining the system, any potential issues or vulnerabilities can be identified and addressed promptly, ensuring the continued protection and functionality of the PDS.

    Rate this question:

  • 20. 

    What exchange tab is used to add, delete, or modify user accounts that have special permissions to the account?

    • Intercluster Lookup Service (ILS) settings

    • Mailbox rights

    • Mailbox security

    • Custom attributes

    Correct Answer
    A. Mailbox rights
    Explanation
    The correct answer is "Mailbox rights." This tab is used to add, delete, or modify user accounts that have special permissions to the account. These special permissions include rights such as full access, send as, and receive as permissions for a mailbox. By managing mailbox rights, administrators can control who has access to a mailbox and what actions they can perform on it.

    Rate this question:

  • 21. 

    Which personal wireless communications system (PWCS) devices original intent was for use by family, friends, and associates to communicate among themselves within a small area?

    • Pager

    • Land Mobile Radio (LMR)

    • Family Radio Service (FRS)

    • Intelligence, surveillance, and reconaissance (ISR)

    Correct Answer
    A. Family Radio Service (FRS)
    Explanation
    The Family Radio Service (FRS) is a personal wireless communications system (PWCS) device that was originally intended for use by family, friends, and associates to communicate among themselves within a small area. It is a low-power radio service that allows for short-range communication, typically within a range of 1-2 miles. FRS devices are commonly used for activities such as camping, hiking, and other outdoor adventures where individuals need to stay in touch with each other.

    Rate this question:

  • 22. 

    What component in the video teleconferencing (VTC) system converts analog signals to digital signals?

    • Camera

    • Computer-decoder (CODEC)

    • Network termination (NT) 1

    • Central Processing Unit (CPU)

    Correct Answer
    A. Computer-decoder (CODEC)
    Explanation
    The computer-decoder (CODEC) component in the video teleconferencing (VTC) system is responsible for converting analog signals to digital signals. CODEC stands for "coder-decoder" and it is used to compress and decompress audio and video data. In the context of a VTC system, the CODEC converts the analog audio and video signals captured by the camera into digital format so that they can be transmitted over the network and displayed on the receiving end.

    Rate this question:

  • 23. 

    Which is not a function of the Integrated Maintenance Data System (IMDS)?

    • Automate equipment history, scheduling, and other processes

    • Function as a common interactive interface for other systems

    • Roll base-level logistics data up to the Air Force level

    • Provide status and invetory data

    Correct Answer
    A. Roll base-level logistics data up to the Air Force level
    Explanation
    The Integrated Maintenance Data System (IMDS) is a system that is used to automate equipment history, scheduling, and other processes. It also functions as a common interactive interface for other systems and provides status and inventory data. However, it does not roll base-level logistics data up to the Air Force level. This means that it does not aggregate or consolidate logistics data from lower levels to the Air Force level.

    Rate this question:

  • 24. 

    The Asset Inventory Management System (AIMS) is an online database program that is a part of the

    • Air Force Equipment Management System (AFEMS)

    • Telecommunications Management System (TMS)

    • Integrated Maintenance Data System (IMDS)

    • Automated Information System (AIS)

    Correct Answer
    A. Air Force Equipment Management System (AFEMS)
    Explanation
    The correct answer is AFEMS because the question is asking for the online database program that is a part of the Air Force Equipment Management System (AFEMS).

    Rate this question:

  • 25. 

    Which method is not a means for secure telecommunications?

    • Defense Courier Service

    • Protected distribution system

    • Communications security equipment

    • Intrusion Detection Optical Communications System

    Correct Answer
    A. Defense Courier Service
    Explanation
    The Defense Courier Service is not a means for secure telecommunications because it is a physical delivery service for classified and sensitive materials, rather than a method for transmitting information electronically. The other options, such as the protected distribution system, communications security equipment, and intrusion detection optical communications system, are all methods that provide secure telecommunications by encrypting, protecting, or detecting unauthorized access to data during transmission.

    Rate this question:

  • 26. 

    What is the Transient Pulse Emanation Standard (TEMPEST) program in the Air Force called?

    • Communication security

    • Tramsmission security

    • Emission security

    • Computer security

    Correct Answer
    A. Emission security
    Explanation
    The correct answer is "Emission security." The Transient Pulse Emanation Standard (TEMPEST) program in the Air Force is called emission security. Emission security focuses on preventing the unintentional release of electromagnetic signals from electronic equipment that could be intercepted and used to gather sensitive information. This program aims to protect against electromagnetic eavesdropping and ensure that classified information remains secure.

    Rate this question:

  • 27. 

    What is the advantage of symmetric cryptology?

    • Speed

    • Storage

    • Security

    • Standards

    Correct Answer
    A. Speed
    Explanation
    Symmetric cryptology offers the advantage of speed. In symmetric encryption, the same key is used for both encryption and decryption, which allows for faster processing compared to asymmetric encryption. This is because symmetric encryption algorithms are generally simpler and require less computational power. As a result, data can be encrypted and decrypted quickly, making symmetric cryptology a preferred choice for applications that require high-speed processing, such as secure communication systems or data storage.

    Rate this question:

  • 28. 

    Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 3
    Explanation
    Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption, namely, encrypt-decrypt-encrypt. This process involves encrypting the plaintext, decrypting the resulting ciphertext, and encrypting the decrypted result again. To perform these operations, Triple DES uses three individual keys. Therefore, the correct answer is 3.

    Rate this question:

  • 29. 

    A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the

    • total surface

    • visible area

    • concealed area

    • observable area

    Correct Answer
    A. total surface
    Explanation
    The correct answer is "total surface". In a line route inspection of a protected distribution system (PDS), a close visual inspection is conducted to assess the condition of the system. This inspection must cover the entire surface of the system, including both visible and concealed areas. The visible area refers to the parts of the system that are easily seen or accessible, while the concealed area refers to the parts that are hidden or not easily visible. Therefore, the inspection must encompass the total surface of the PDS to ensure a thorough assessment.

    Rate this question:

  • 30. 

    Which fuel is not used for reciprocating generators?

    • Diesel

    • Gasoline

    • Fossil fuel

    • Liquid petroleum

    Correct Answer
    A. Fossil fuel
    Explanation
    Reciprocating generators are typically powered by diesel or gasoline engines, as they are more efficient and reliable for continuous use. Fossil fuel is a broader category that includes both diesel and gasoline, so it is not a specific fuel that is not used for reciprocating generators. Liquid petroleum is also a type of fossil fuel, so it is not the correct answer either. Therefore, the correct answer is fossil fuel.

    Rate this question:

  • 31. 

    What are the two standards for termination of Category 5 (CAT 5) and Category 6 (CAT 6)?

    • T-586 and T-586A

    • T-586A and T-586B

    • T-568 and T-568A

    • T-568A and T-568B

    Correct Answer
    A. T-568A and T-568B
    Explanation
    The correct answer is T-568A and T-568B. These are the two standards for termination of Category 5 (CAT 5) and Category 6 (CAT 6) cables. These standards define the pin assignments for the individual wires within the cable, ensuring that the cables are terminated consistently and correctly. T-568A and T-568B are both widely used standards in the industry and are compatible with each other.

    Rate this question:

  • 32. 

    Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

    • Secure telephone unit (STU)

    • Cryptographic telephone (CT)

    • Secure terminal equipment (STE)

    • Pretty good privacy phone (PGPfone)

    Correct Answer
    A. Secure terminal equipment (STE)
    Explanation
    Secure terminal equipment (STE) is the correct answer because it is specifically designed to provide secure voice communication over the Integrated Services Digital Network (ISDN). It incorporates encryption and decryption capabilities to protect the confidentiality of the conversation. STUs, CTs, and PGPfones are not specifically designed for ISDN and may not have the necessary encryption capabilities to ensure secure communication over this network.

    Rate this question:

  • 33. 

    Which is not a consideration when selecting storage batteries for the central office?

    • The office power requirements

    • The amount of floor space available

    • Future subscriber growth and reserve time required

    • The number of alternating current converters in the office

    Correct Answer
    A. The number of alternating current converters in the office
    Explanation
    When selecting storage batteries for the central office, the number of alternating current converters in the office is not a consideration. The other options listed are all important factors to consider. The office power requirements are important to ensure that the batteries can meet the power needs of the office. The amount of floor space available is important to determine if there is enough space to accommodate the batteries. Future subscriber growth and reserve time required are important to ensure that the batteries can handle the anticipated increase in demand and provide sufficient backup power.

    Rate this question:

  • 34. 

    In electrical power equipment, the generator can be two types, reciprocating or

    • turbine batteries

    • a turbine engine

    • an engine

    • batteries

    Correct Answer
    A. a turbine engine
    Explanation
    The correct answer is a turbine engine. In electrical power equipment, the generator can be powered by either a reciprocating engine or a turbine engine. A turbine engine is a type of internal combustion engine that uses a continuous flow of air to generate power. It is commonly used in power plants and other large-scale electrical generation systems due to its efficiency and reliability.

    Rate this question:

  • 35. 

    Which cryptology system has a disadvantage of using more processing power and time?

    • Symmetric

    • Asymmetric

    • Diametric

    • None of the above, they are all the same

    Correct Answer
    A. Asymmetric
    Explanation
    Asymmetric cryptology system has a disadvantage of using more processing power and time compared to symmetric cryptology system. This is because asymmetric cryptology involves the use of two different keys, one for encryption and one for decryption, which requires more computational resources and time. In contrast, symmetric cryptology uses the same key for both encryption and decryption, making it more efficient in terms of processing power and time. Diametric is not a recognized cryptology system, and the statement "None of the above, they are all the same" is incorrect as symmetric and asymmetric cryptology systems have distinct differences.

    Rate this question:

  • 36. 

    Which uniterruptible power supply (UPS) system is generally used for larger loads and currents?

    • Storage batteries

    • Power wheels

    • Flywheel

    • Batteries

    Correct Answer
    A. Flywheel
    Explanation
    Flywheel UPS systems are generally used for larger loads and currents. Unlike storage batteries, which require regular maintenance and replacement, flywheel UPS systems use a spinning flywheel to store kinetic energy that can be converted into electrical energy during power outages. This makes them more efficient and reliable for larger loads and currents. Power wheels and batteries are not typically used for larger loads and currents in UPS systems.

    Rate this question:

  • 37. 

    In secure socket layer (SSL), before an encrypted transaction takes place, what does the Web server give to the browser

    • Its public key

    • Its private key

    • Its public certificate

    • Its private certificate

    Correct Answer
    A. Its public key
    Explanation
    Before an encrypted transaction takes place in SSL, the web server gives the browser its public key. The public key is used to encrypt the data sent from the browser to the server, ensuring that only the server can decrypt and read the data. This helps to establish a secure and encrypted communication channel between the browser and the server, protecting the confidentiality and integrity of the transmitted data.

    Rate this question:

  • 38. 

    Which encryption standard is not a telecommunications encryption type?

    • Narrowband

    • Network

    • Bulk

    • Open

    Correct Answer
    A. Open
    Explanation
    The other options (Narrowband, Network, and Bulk) are all related to telecommunications, whereas "Open" does not refer to a specific encryption standard used in telecommunications.

    Rate this question:

  • 39. 

    Which encryption handles multiplexed lines that come from combining multiple single data and voice lines into one?

    • Bulk

    • Network

    • Wideband

    • Narrowband

    Correct Answer
    A. Bulk
    Explanation
    Bulk encryption is the encryption method that handles multiplexed lines that come from combining multiple single data and voice lines into one. This type of encryption is used to secure large amounts of data and is often used in telecommunications and network security to protect multiple lines of communication at once. It ensures that all the data and voice lines are encrypted together, providing a higher level of security for the combined lines.

    Rate this question:

  • 40. 

    How fast you sample the audio to get your digital signal is called

    • bit rate

    • bite rate

    • samp rate

    • sample rate

    Correct Answer
    A. bit rate
    Explanation
    The correct answer is bit rate. The bit rate refers to the number of bits that are processed per unit of time in a digital audio signal. It determines the quality and fidelity of the audio signal. The higher the bit rate, the more accurately the original analog audio signal can be reproduced in digital form.

    Rate this question:

  • 41. 

    Cell sites are generally thought of as being a

    • square

    • octagon

    • hexagon

    • pentagon

    Correct Answer
    A. hexagon
    Explanation
    Cell sites are structures that house antennas and other equipment used for wireless communication. They are typically designed to provide coverage over a specific area. The shape of a cell site can vary, but hexagons are commonly used because they allow for efficient coverage distribution. The hexagonal shape allows for equal distance between each cell site and minimizes interference between adjacent cells. This shape also allows for better signal propagation and helps to optimize network performance. Therefore, the correct answer is hexagon.

    Rate this question:

  • 42. 

    What are the voice messages encoded into when making a phone call using Voice over Internet Protocol (VoIP)?

    • Addresses

    • Codes

    • Lables

    • Packets

    Correct Answer
    A. Packets
    Explanation
    When making a phone call using Voice over Internet Protocol (VoIP), the voice messages are encoded into packets. VoIP breaks down the voice data into small packets and sends them over the internet to the recipient. These packets contain the encoded voice data along with other information such as source and destination addresses. At the receiving end, the packets are reassembled and decoded to recreate the voice message. This packetization process allows for efficient transmission of voice data over the internet.

    Rate this question:

  • 43. 

    Which does not fit the "Peaceful Purposes" clause of using the International Mobile Satellite Organization (Inmarsat) system?

    • Military use, involing armed conflict

    • Armed forces use, relating to the protection of the wounded

    • United Nations (UN) peacekeeping use, acting under the auspices of the UN Secretary Council

    • Armed forces use, protecting itself against armed attack within the limitaitons of the UN charter

    Correct Answer
    A. Military use, involing armed conflict
    Explanation
    The "Peaceful Purposes" clause of using the International Mobile Satellite Organization (Inmarsat) system implies that the system should be used for non-military purposes and activities that promote peace. Military use involving armed conflict goes against the peaceful purposes clause as it involves the use of force and violence, which is contradictory to the concept of peace. Therefore, military use involving armed conflict does not fit the "Peaceful Purposes" clause of using the Inmarsat system.

    Rate this question:

  • 44. 

    In the RED/BLACK concept, what type of traffic do RED lines carry?

    • Encrypted classified

    • Encrypted unclassified

    • Unencrypted classified

    • Unecrypted unclassified

    Correct Answer
    A. Unencrypted classified
    Explanation
    The correct answer is unencrypted classified. In the RED/BLACK concept, RED lines carry unencrypted classified traffic. This means that the information being transmitted over the RED lines is classified but is not encrypted.

    Rate this question:

  • 45. 

    The approval or disaproval of all approved changes in the configuration is known as

    • configuration

    • configuration item

    • configuration control

    • configuration identification

    Correct Answer
    A. configuration control
    Explanation
    Configuration control refers to the process of reviewing, evaluating, and approving or disapproving all approved changes in the configuration. It ensures that any modifications made to the configuration are properly assessed and authorized before implementation. This helps to maintain the integrity and consistency of the configuration and ensures that any changes are properly managed and controlled.

    Rate this question:

  • 46. 

    Permanent markings can be completed by how many different methods?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 2
    Explanation
    Permanent markings can be completed by two different methods.

    Rate this question:

  • 47. 

    Which is not a reason why extreme caution should be used when deleting an e-mail account?

    • The users e-mail will be deleted from the exchange server

    • Restoring deleted e-mail requires proper justification

    • The wrong account could be deleted

    • Restoring e-mail is difficult

    Correct Answer
    A. The wrong account could be deleted
    Explanation
    Extreme caution should be used when deleting an e-mail account because there is a possibility of deleting the wrong account. This can lead to the loss of important emails and data associated with that account. Therefore, it is important to double-check and verify the account before proceeding with the deletion process.

    Rate this question:

  • 48. 

    What channel access method assigns each call a certain portion of time on a designated frequency?

    • Time division multiple access (TDMA)

    • Personal communications services (PCS)

    • Frequency division multiple access (FDMA)

    • Global System for Mobile Communications (GSM)

    Correct Answer
    A. Time division multiple access (TDMA)
    Explanation
    TDMA is a channel access method that assigns each call a certain portion of time on a designated frequency. This means that multiple calls can share the same frequency by taking turns transmitting in different time slots. This allows for efficient use of the available frequency spectrum and enables multiple users to access the channel simultaneously without interference.

    Rate this question:

  • 49. 

    Which two parts does the RED/BLACK concept have?

    • Physical seperation and electromagnetic seperation

    • Electromagnetic seperation and electrical seperation

    • Physical seperation and electrical seperation

    • Physical seperation and emission seperation

    Correct Answer
    A. Physical seperation and electrical seperation
    Explanation
    The RED/BLACK concept involves two parts: physical separation and electrical separation. Physical separation refers to physically isolating networks or components to prevent unauthorized access or interference. Electrical separation involves using different power sources or isolating electrical circuits to prevent the spread of electrical disturbances.

    Rate this question:

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 27, 2019
    Quiz Created by
    Dakota.lindberg
Back to Top Back to top
Advertisement