(030) What is the standard conductor used for data networking?
(038) Which section of a bit error rate test (BERT) set measures the...
(239) The three cornerstones of voice network system security are...
(240) What should security policies encompass to help mitigate the...
(215) What is most commonly used in data systems to express signaling...
(206) Internet protocol version 6 (IPv6) addresses are represented by
(006) To whom does the risk management (RM) process apply?
(006) What simple, systematic process allows commanders to maximize...
(210) Which topology has the stations connected in the form of a...
(249) In an Intrusion Detection System (IDS), what is the main purpose...
(020) What does an integral system of air terminals, roof conductors,...
(021) Which of these activities would generate the most electrostatic...
(022) Which power line fault category is symptomatic of a total loss...
(022) Which power line fault category is symptomatic of an...
(240) What are attempts to gain access to a switch system by posing as...
(209) Virtual Private Networks (VPNs) allow the AF to extend network...
(210) Which topology combines two or more different physical...
(211) The time it takes a switch to figure out where to forward a data...
(211) What allows transportation of all active Virtual LANs (VLAN)...
(212) What identifier differentiates one wireless local area network...
(012) What is the first line of defense in securing laptops?
(215) Individual pulses within a digital signal are
(033) When using a polishing cloth, remove a little bit of the...
(038) What type of error is the result of two successive logic one...
(040) What active test is selected on a protocol analyzer to determine...
(201) Which of the following is an example of a video compression...
(217) In what type of digital signal does the signal level move to one...
(204) Which Application layer protocol is used to synchronize the...
(003) What is defined as an integrated bundle of expert knowledge and...
(005) Which hazard is caused by heavy workloads, lack of control over...
(005) To prevent manual handling hazards, utilize team lifting when...
(005) When working on electrical circuits, the role of safety observer...
(005) When working on electrical circuits, you may only wear metal...
(208) Which router port is used for initial configuration?
(007) Which of the following is a principle of risk management (RM)?
(010) The disadvantage of a host-based intrusion detection system...
(013) The definition of integrity as applied to identification,...
(251) Which interior intrusion detection system (IIDS) sensor uses...
(252) What type alarm occurs if the sensor post cover in vertical...
(022) Which power line fault category is typically referred to as...
(022) Which type of uninterruptible power supply (UPS) is...
(001) Which 3D career field deploys, sustains, troubleshoots, and...
(028) Which type of cable does not radiate energy and is not affected...
(029) What is used to identify the polarity of a wire pair in a cable?
(034) When using an ohmmeter to take a resistance reading, what...
(036) What happens to the observed signal if you advance the...
(203) In binary-synchronous protocol, which characters establishes and...
(005) Which hazard is not one of the four major types of hazards?
(229) Which agency is the preferred transport provider for Internet...
(210) Which topology defines the way in which devices communicate and...
(211) Which device subdivides a network into smaller logical pieces,...
(213) A Management Information Base (MIB) is a collection of...
(015) Why must the use of TEMPEST-certified equipment be validated by...
(034) When a multimeter has three input terminal jacks, which jack is...
(235) Combined distribution frames encompass the functions of a main...
(040) Which component of a protocol analyzer discards frames based on...
(040) What active test on a protocol analyzer is selected to see the...
(204) Which network layer protocol matches a known Internet protocol...
(218) Which statement best describes a binary with eight-zero...
(003) Which of the following is a core competency of Cyber Transport...
(205) Which network Class has the most addresses for hosts?
(207) Which device has multiport connectivity that directs data...
(211) How many broadcast domains forms a Virtual LAN (VLAN)?
(213) Simple Network Management Protocol (SNMP) is a tool used by...
(214) Which physical security action can you take to ensure network...
(250) The basic configuration of the entry control facility includes a
(019) What is required in electronic settings to prevent equipment and...
(021) Which electronic discharge sensitive (ESD) class has a...
(222) The signal components that occur as bands above and below a...
(024) What function do facility batteries provide during normal...
(030) Pin 1 on a typical Electronics Industry...
(202) In the Open System Interconnect (OSI) model, a layer will...
(217) How many voltage levels does a binary signal have?
(004) Which AF form is used to report hazardous conditions that place...
(208) When configuring a router, you control access to privileged EXEC...
(008) An enclave that does not have a firewall and intrusion detection...
(010) One advantage of a network-based intrusion detection system...
(018) What kind of bond is normally applied to signal reference bonds?
(019) Which type of shielding utilizes braid, foil, metal wrap,...
(024) Which is not a consideration for selecting facility batteries?
(029) The thin plastic colored tape that spirals around a specific...
(031) What is the maximum operating temperature of fiber optic cable?
(033) What do you use to remove excess fiber after the connector has...
(037) What area of a digital storage oscilloscope takes digitized...
(203) Which data communication protocol is based on bits and the...
(220) Which communications control signal uses a two-frequency dialing...
(204) Which Transport layer protocol provides reliable data delivery...
(242) The primary reason you should measure the voltage across faulty...
(229) What web application is used to order telecommunications...
(008) How many Integrated Network and Operation Security Centers...
(009) You should implement all of the following security features to...
(230) If the circuit files are lost or destroyed, what document are...
(249) In an Intrusion Detection System (IDS), what must a line of...
(012) What type of certificate authenticates the identity of the user?
(014) What Air Force Systems Security Instruction (AFSSI) series...
(016) What equipment should be designated as BLACK when designating...
(017) What is the grounding resistance goal for military...
(018) Bonds in the earth electrode subsystem normally are direct...
(031) What has made very high data rate transmission possible on a...
(236) Who determines if Preventative Maintenance Inspections (PMI) are...
(204) Which Network layer protocol provides messaging that can help...
(002) Which of the following is not a communications security program...
(007) How many steps are in the risk management (RM) process?
(244) Which Digital Multiplex System (DMS)–100 database facility...
(009) Which term is used to describe the technology for transmitting...
(212) Which Institute of Electrical Electronics Engineers (IEEE)...
(212) Which wireless design phase accounts for the amount of users on...
(011) What security posture permits everything that is not...
(015) Which method of containing radiated emanations requires both...
(016) Equipment is comprised as machines that process information in...
(023) How many phases of generator power are usually required for...
(032) What are the three sections of a fiber optic cable?
(240) What provides enterprise wide visibility into telecom resource...
(216) Which option is a characteristic of synchronous data operation?
(247) What does the GVG–110 video switcher serial interface...
(231) What report must be sent if the circuit does not meet all...
(232) Trend analysis is a program that ensures circuits meet...
(214) In general, you should deny direct dial-in access to a network...
(015) What plays a major role in a conductor's ability to minimizing...
(037) What type of sampling does a digital storage oscilloscope...
(237) When a telephone network is circuit switched, each call
(040) What protocol analyzer test window provides information...
(207) Which routing protocol do internet backbones use?
(221) In common associated signaling (CAS), what is the seventh bit in...
(008) The Integrated Network Operations and Security Centers (INOSC)...
(009) At which open systems interconnect (OSI) layer does an...
(010) Host-based intrusion detection systems (HIDS) are
(222) What is the process, or result of the process, of modifying...
(033) How long do most fiber-optic epoxies take to set?
(037) Which digital storage oscilloscope button controls all waveforms...
(039) When using an optical time-domain reflectometer (OTDR), what...
(205) How many subnet bits are required to support 90 subnets on a...
(206) Teredo has four tunneling components. Which one is not one of...
(022) Which type of uninterruptible power supply (UPS) offers the...
(025) Which publication series covers standard Air Force installation...
(027) Support intervals for cables requiring surface installation will...
(028) The advantage of using coaxial cable over paired cable is that...
(040) What protocol analyzer test window reports errors that occur at...
46. (219) How many bits are in the extended superframe format (ESF)...
(225) What are the two major types of frame structures?
(226) Which wave-division multiplexing technology uses uncooled lasers...
(242) What Digital Multiplex System (DMS)–100 system contains...
(227) What do Global Positioning System (GPS) satellites use to...
(227) Which stratum level is a Global Positioning System (GPS) timing...
(211) Which of the following will minimize EtherChannel configuration...
(252) What type of signal is sent to the fence protection system (FPS)...
(017) Which facility ground subsystem uses surge arrestors?
(030) What cable type connects devices that operate at similar layers...
(238) In Integrated Services Digital Network (ISDN), the "B" channel...
(240) Where are voice protection system servers installed?
(240) Which is not a characteristic and capability of a voice...
(243) Where do incoming (unswitched) circuits transmitted to the ENET...
(231) Within how many normal duty hours of completion action on the...
(252) What is the maximum detection distance in meters of an Infrared...
(222) To prevent frequency modulation (FM) radio stations from...
(026) How are connectorized cables labeled?
(027) Which section of a horizontal cable duct is used for signal and...
(032) Which type of cable is the easiest to splice?
(227) To create a better timing environment in communications...
(232) If a circuit fails its management threshold, what test might be...
(010) Network-based intrusion detection systems (NIDS) are
(015) A facility with an inspectable space of more than 20 meters, but...
(016) Which type of separation ensures that every signal conductor...
(252) What is the secondary mode of detection for the microwave fence...
(240) The vulnerabilities of voice and data converged networks were...
(240) Which is not a component of the voice protection system...
(220) The signaling equipment has three types of communications...
(223) Which form of modulation is insensitive to signal variations?
(242) What is the maximum number of ports that a Meridian System...
(225) The method of multiplexing the T1 multiplexer uses is
(037) Sampled data points are stored in the memory of a digital...
(038) What determines the size of a test pattern segment transmitted...
(216) A digital signal that contains synchronizing bits within the...
(223) The form of pulse modulation in which a discrete pulse is varied...
(211) Which of the following is not a distinct layer of a hierarchical...
(010) Which intrusion detection system (IDS) uses software sensors?
(015) Which AF System Security Instruction (AFSSI) provides the...
(035) The purpose of the miniature ON/OFF switches on a breakout box...
(241) How many serial data interface ports does the Meridian Option...
(221) Which common channel signaling (CCS) mode does the transfer of...
(229) What document is the authority for the operations and...
(230) Which DD form do you use for an official narrative log that is...
(245) What names are given to the shifted R–Y and B–Y...
(246) Which digital broadcast system was adopted by the United States...
(251) Which interior intrusion detection system is designed to detect...
82. (035) The purpose of a breakout box is to
(240) During the initial research for voice system security, who...
(009) At which open systems interconnect (OSI) layer does a packet...
(010) Which intrusion detection system (IDS) monitors packets for...
(017) Which facility ground subsystem is also called the "signal...
(234) When you must restore user service by rerouting, what is the...
(040) What protocol analyzer test window automatically runs in the...
(224) Which form of multiplexing is very susceptible to signal...
(035) What do the jumper cables and side switch pins on a breakout box...
(201) At what Open System Interconnection (OSI) layer are virtual...
(242) What link is used to connect the Digital Multiplex System...
(228) Which agency has responsibility for a circuit end-to-end?
(230) Which DD form is used as the primary source of information when...
(251) What does the AN/GSS–39(V) system use to monitor the...
(242) Which elements make up the control component of the SuperNode...