Trivia: 3D152 CDC Vol 1 And 2 Ure's! Quiz

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jonathan Davis
J
Jonathan Davis
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,287
| Attempts: 1,287 | Questions: 200
Please wait...
Question 1 / 200
0 %
0/100
Score 0/100
1. (030) What is the standard conductor used for data networking?

Explanation

RJ-45 is the correct answer because it is the standard conductor used for data networking. RJ-11 is used for telephone connections, RJ-15 is not a standard connector, and RJ-49 does not exist. RJ-45 connectors are commonly used for Ethernet connections and are compatible with most networking devices.

Submit
Please wait...
About This Quiz
Trivia: 3D152 CDC Vol 1 And 2 Ures! Quiz - Quiz

This quiz assesses knowledge in military communications, focusing on deployment, troubleshooting, and security of transmission systems. It evaluates core competencies in Cyber Transport Systems and safety protocols within... see morethe Air Force, essential for professionals in this field. see less

2. (038) Which section of a bit error rate test (BERT) set measures the received test pattern?

Explanation

The receiver section of a bit error rate test (BERT) set measures the received test pattern. This section is responsible for receiving the transmitted test pattern and comparing it with the expected pattern to determine the number of bit errors. By measuring the received test pattern, the receiver section can provide valuable information about the quality and accuracy of the transmission.

Submit
3. (239) The three cornerstones of voice network system security are availability,

Explanation

The three cornerstones of voice network system security are confidentiality and integrity. Confidentiality ensures that information is protected from unauthorized access, while integrity ensures that the information remains accurate and unaltered. These two aspects are crucial for maintaining the security of voice network systems, as they prevent unauthorized disclosure of sensitive information and ensure the reliability and trustworthiness of the data being transmitted.

Submit
4. (240) What should security policies encompass to help mitigate the threat of convergence?

Explanation

Security policies should encompass both voice and data networks to help mitigate the threat of convergence. Convergence refers to the integration of different types of communication networks, such as voice and data, into a single network infrastructure. By including both voice and data networks in security policies, organizations can ensure that appropriate measures are in place to protect against potential threats and vulnerabilities that may arise from the convergence of these networks. This holistic approach to security helps to safeguard sensitive information, prevent unauthorized access, and maintain the integrity and availability of both voice and data communications.

Submit
5. (215) What is most commonly used in data systems to express signaling speed?

Explanation

In data systems, the most commonly used term to express signaling speed is "bits per second." This refers to the number of bits that can be transmitted or processed in one second. Baud rate, on the other hand, refers to the number of signal changes per second, which may not necessarily correspond to the number of bits. Interface speed is a more general term that can refer to the overall speed of data transmission, including factors other than just the number of bits. Baud per second is not a commonly used term in data systems.

Submit
6. (206) Internet protocol version 6 (IPv6) addresses are represented by

Explanation

IPv6 addresses are represented by 8 groups of hexadecimal numbers. Each group consists of four hexadecimal digits, separated by colons. This representation allows for a much larger address space compared to IPv4, which uses dotted decimal notation. The use of hexadecimal numbers allows for a more efficient representation of the address, as it requires fewer characters.

Submit
7. (006) To whom does the risk management (RM) process apply?

Explanation

The risk management (RM) process applies to all personnel. This means that it is not limited to a specific group or department within an organization. Risk management is a systematic approach to identifying, assessing, and mitigating risks in order to protect the organization, its employees, and its assets. By applying the RM process to all personnel, the organization ensures that everyone is involved in identifying and managing risks, promoting a culture of safety and accountability throughout the entire organization.

Submit
8. (006) What simple, systematic process allows commanders to maximize combat capability, while limiting risk?

Explanation

Risk management is a simple, systematic process that allows commanders to maximize combat capability while limiting risk. It involves identifying, assessing, and prioritizing risks, and then implementing measures to mitigate or eliminate those risks. By effectively managing risks, commanders can make informed decisions that optimize their combat capabilities while minimizing potential hazards and threats. Safety control and safety management are related concepts but focus more on ensuring the physical well-being and welfare of personnel, whereas risk management encompasses a broader approach to overall mission success.

Submit
9. (210) Which topology has the stations connected in the form of a circle?

Explanation

In a ring topology, the stations are connected in the form of a circle. Each station is connected to two neighboring stations, forming a continuous loop. This type of topology allows data to flow in only one direction, eliminating the need for a central hub or server. It is commonly used in networks where each station has an equal role and there is a need for high reliability, as the failure of one station does not affect the entire network.

Submit
10. (249) In an Intrusion Detection System (IDS), what is the main purpose of a boundary fence?

Explanation

The main purpose of a boundary fence in an Intrusion Detection System (IDS) is to present a physical and psychological deterrent to unauthorized entry. This means that the fence acts as a barrier, preventing unauthorized individuals from easily accessing the protected area. It serves as a physical obstacle that makes it more difficult for intruders to enter, while also sending a message that the area is secure and monitored. This can discourage potential intruders from attempting to breach the perimeter, as they perceive the risk of detection and apprehension to be higher.

Submit
11. (020) What does an integral system of air terminals, roof conductors, and down conductors, securely interconnected to the shortest practicable path to earth provide for a facility?

Explanation

An integral system of air terminals, roof conductors, and down conductors, securely interconnected to the shortest practicable path to earth provides protection from lightning. Lightning is a natural phenomenon that can cause significant damage to buildings and structures. By having a well-designed system of air terminals, roof conductors, and down conductors, the facility is able to safely redirect the electrical energy from a lightning strike to the ground, minimizing the risk of damage or fire caused by the lightning.

Submit
12. (021) Which of these activities would generate the most electrostatic current?

Explanation

Walking across carpet generates the most electrostatic current because when we walk on carpet, our shoes rub against the carpet fibers, causing the transfer of electrons. This friction creates a build-up of static electricity, leading to the generation of electrostatic current.

Submit
13. (022) Which power line fault category is symptomatic of a total loss of utility power?

Explanation

A blackout is a power line fault category that is symptomatic of a total loss of utility power. During a blackout, there is a complete and sudden loss of electricity supply, resulting in a complete power outage. This can be caused by various factors such as equipment failure, severe weather conditions, or grid overload. During a blackout, all electrical devices and systems connected to the utility power source will cease to function until the power is restored.

Submit
14. (022) Which power line fault category is symptomatic of an instantaneous or dramatic increase in voltage?

Explanation

A spike is a sudden and dramatic increase in voltage. It is a power line fault category that can cause damage to electrical equipment and appliances. Spikes can occur due to lightning strikes, power surges, or other electrical disturbances. They can lead to the malfunction or failure of electronic devices, and can also pose a safety risk. Therefore, a spike is the correct answer for a power line fault category that is symptomatic of an instantaneous or dramatic increase in voltage.

Submit
15. (240) What are attempts to gain access to a switch system by posing as an authorized user?

Explanation

Masquerades refer to attempts made by unauthorized individuals to gain access to a switch system by pretending to be an authorized user. This can involve using stolen credentials or impersonating someone else to deceive the system and gain unauthorized access. Toll fraud refers to unauthorized use of telecommunications services for personal gain, while war dialing involves scanning phone numbers to find vulnerable systems. Denial of service refers to attacks that aim to make a network or system unavailable to its intended users.

Submit
16. (209) Virtual Private Networks (VPNs) allow the AF to extend network resources across a/an

Explanation

VPNs allow the AF to extend network resources across a public network. This means that the AF can securely access and use their network resources, such as files and applications, over the internet. By using encryption and tunneling protocols, VPNs ensure that data transmitted between the AF's network and the public network remains private and secure. This allows AF personnel to work remotely or connect to resources located outside of their physical network, increasing flexibility and productivity.

Submit
17. (210) Which topology combines two or more different physical topologies in a single network?

Explanation

A hybrid topology combines two or more different physical topologies into a single network. This allows for greater flexibility and scalability in the network design. For example, a network may use a combination of bus and star topologies, where different segments of the network are connected using a bus topology, while individual devices within each segment are connected using a star topology. This combination allows for efficient communication between devices and provides redundancy in case of a failure in one segment of the network.

Submit
18. (211) The time it takes a switch to figure out where to forward a data unit is called its

Explanation

The time it takes for a switch to determine the destination of a data unit and forward it is referred to as latency. This term is used to describe the delay or time delay in network communication. It represents the time it takes for a switch to process and make decisions on where to send the data unit. Options a, b, and d are not accurate in describing this concept.

Submit
19. (211) What allows transportation of all active Virtual LANs (VLAN) between switches using a single physical link?

Explanation

VLAN trunks allow the transportation of all active Virtual LANs (VLAN) between switches using a single physical link. A VLAN trunk is a network link that can carry traffic for multiple VLANs simultaneously. It is configured to allow traffic from multiple VLANs to pass through it, effectively extending the VLANs across multiple switches. By using VLAN trunks, switches can communicate with each other and exchange VLAN information, allowing for the transportation of VLAN traffic over a single physical link.

Submit
20. (212) What identifier differentiates one wireless local area network (WLAN) from another?

Explanation

The Service Set Identifier (SSID) is a unique identifier that differentiates one wireless local area network (WLAN) from another. It is essentially the network name that is broadcasted by the wireless access point (WAP) to allow devices to connect to the correct network. The SSID can be customized by the network administrator and is used by devices to identify and connect to a specific WLAN. The hostname is a unique name given to a device, not a network. The Virtual LAN Identifier (VLAN ID) is used to separate and manage network traffic within a LAN, not to differentiate WLANs.

Submit
21. (012) What is the first line of defense in securing laptops?

Explanation

The first line of defense in securing laptops is setting a login ID and password combination for access. This helps to ensure that only authorized individuals can access the laptop and its data. Biometrics and encryption certificates (option b) provide additional layers of security, but setting a login ID and password is the initial step in securing the device. Placing a lock on the computer (option c) and storing it in a locked case (option d) are physical measures that can prevent unauthorized physical access, but they do not protect against remote access or data breaches.

Submit
22. (215) Individual pulses within a digital signal are

Explanation

Individual pulses within a digital signal are represented by bits. A bit is the smallest unit of information in computing and digital communications. It can have a value of either 0 or 1, representing the two possible states of a digital signal. Therefore, each individual pulse within a digital signal corresponds to a single bit. Bytes, codes, and blocks are larger units of data that consist of multiple bits.

Submit
23. (033) When using a polishing cloth, remove a little bit of the protruding fiber at a time, until the fiber is perfectly

Explanation

When using a polishing cloth, it is important to remove a little bit of the protruding fiber at a time. This is done to ensure that the fiber becomes flat and level. Removing the fiber gradually allows for a more precise and even polishing surface, which is necessary for achieving the desired result. Therefore, the correct answer is c. flat and level.

Submit
24. (038) What type of error is the result of two successive logic one pulses of the same polarity that violates alternate mark inversion coding rules?

Explanation

A bipolar violation is the result of two successive logic one pulses of the same polarity that violates alternate mark inversion coding rules. In alternate mark inversion coding, each logic one is represented by alternating polarities. When two successive logic ones of the same polarity occur, it is considered a violation of this coding rule and is known as a bipolar violation.

Submit
25. (040) What active test is selected on a protocol analyzer to determine if a network node is connected or responding?

Explanation

The correct answer is "a. Packet internetwork groper (PING)". PING is a commonly used active test on a protocol analyzer to determine if a network node is connected or responding. It sends a small packet of data to the target node and waits for a response. If a response is received, it indicates that the node is connected and responding. If no response is received, it suggests that the node may be disconnected or not responding. PING is a simple and effective way to test network connectivity and diagnose network issues.

Submit
26. (201) Which of the following is an example of a video compression standard?

Explanation

MPEG-4 is a video compression standard developed by the Motion Picture Experts Group (MPEG). It is commonly used for streaming video over the internet and is known for its ability to compress video files while maintaining high quality. Joint Photographic Experts Group (JPEG) is a compression standard for still images, not videos. File Transfer Protocol (FTP) is a standard for transferring files, not compressing videos. G.711 is a standard for audio compression, not video compression. Therefore, the correct answer is a. Motion Picture Experts Group-4 (MPEG-4).

Submit
27. (217) In what type of digital signal does the signal level move to one of the discrete signal levels, but returns to the zero level after a predetermined time?

Explanation

In a return-to-zero digital signal, the signal level moves to one of the discrete signal levels (either high or low), but it always returns to the zero level after a predetermined time. This means that there is a clear distinction between the signal levels and a regular transition back to zero, which helps in accurately interpreting the signal. This is in contrast to non-return-to-zero (NRZ) signals, where the signal level can remain at one of the discrete levels for an extended period of time without returning to zero.

Submit
28. (204) Which Application layer protocol is used to synchronize the clocks of computers on a network?

Explanation

The Network Time Protocol (NTP) is used to synchronize the clocks of computers on a network. NTP is designed to synchronize timekeeping among a set of distributed time servers and clients. It allows computers to maintain accurate and synchronized time, which is important for various network operations and applications. SNMP is used for network management, DHCP is used for assigning IP addresses, and PING is used for testing network connectivity.

Submit
29. (003) What is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field?

Explanation

Core competency is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field. It refers to the unique capabilities and strengths that individuals possess, allowing them to perform their job effectively and differentiate themselves from others in the same field. Core competencies are essential for success in a specific role or profession and are developed through education, training, and experience. They contribute to an individual's overall effectiveness and are crucial for achieving organizational goals and objectives.

Submit
30. (005) Which hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?

Explanation

The given correct answer is d. Stress. This is because heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers are all factors that can contribute to high levels of stress in the workplace. Stress can have negative effects on both physical and mental health, and can lead to various health problems such as anxiety, depression, and cardiovascular issues.

Submit
31. (005) To prevent manual handling hazards, utilize team lifting when lifting items that weigh more than how many pounds?

Explanation

To prevent manual handling hazards, team lifting should be utilized when lifting items that weigh more than 25 pounds. This is because lifting heavy objects on your own can put excessive strain on your body and increase the risk of injuries such as back strains or muscle sprains. By using team lifting, the weight is distributed among multiple individuals, reducing the strain on each person and minimizing the risk of injury.

Submit
32. (005) When working on electrical circuits, the role of safety observer is normally performed by the

Explanation

The safety observer plays a crucial role in ensuring the safety of the individuals working on electrical circuits. They are responsible for monitoring the work being done, identifying potential hazards, and taking immediate action in case of an emergency. The supervisor, being in a position of authority and having knowledge of safety protocols, is best suited to perform this role effectively. They can provide guidance, enforce safety measures, and make informed decisions to prevent accidents and ensure the well-being of everyone involved.

Submit
33. (005) When working on electrical circuits, you may only wear metal framed eyeglasses if

Explanation

When working on electrical circuits, it is important to ensure that any metal-framed eyeglasses are secured with a nonmetallic cord. This is because if the circuit is energized and there is a potential for electrical shocks or sparks, the metal frames could conduct electricity and pose a safety hazard. By securing the glasses with a nonmetallic cord, the risk of electrical conduction is minimized, providing a safer working environment.

Submit
34. (208) Which router port is used for initial configuration?

Explanation

The console port is used for the initial configuration of a router. This port allows direct access to the router's command-line interface (CLI) through a console cable. It is typically used for initial setup, troubleshooting, or password recovery. The console port provides a physical connection to the router, allowing configuration changes to be made directly. Other ports like auxiliary, Ethernet, and Telnet may be used for different purposes, but the console port is specifically designed for initial configuration.

Submit
35. (007) Which of the following is a principle of risk management (RM)?

Explanation

The correct answer is b. Apply the RM process continuously. This principle of risk management emphasizes the importance of consistently applying the risk management process throughout a project or organization. By continuously assessing and managing risks, potential issues can be identified and addressed in a timely manner, reducing the likelihood of negative impacts on the project or organization. This principle promotes a proactive approach to risk management, ensuring that risks are constantly monitored and mitigated.

Submit
36. (010) The disadvantage of a host-based intrusion detection system (HIDS) is that it

Explanation

A host-based intrusion detection system (HIDS) is a security measure that is installed on a specific host or device to monitor and detect any unauthorized activities or intrusions. One disadvantage of using a HIDS is that it consumes resources on the host it resides on, which can slow down the device's performance. This is because the HIDS continuously analyzes and monitors the host's activities, which requires processing power and memory. As a result, the device may experience decreased speed and performance while the HIDS is running.

Submit
37. (013) The definition of integrity as applied to identification, authentication, and encryption is

Explanation

The correct answer is d. the assurance that no one has changed or destroyed information without permission. This definition of integrity refers to the trustworthiness and reliability of data. It ensures that information remains intact and unaltered, guaranteeing its accuracy and consistency. By maintaining data integrity, organizations can prevent unauthorized modifications or deletions, thus preserving the authenticity and reliability of their data.

Submit
38. (251) Which interior intrusion detection system (IIDS) sensor uses heat radiation to detect intruders?

Explanation

Passive infrared sensors detect intruders by sensing the heat radiation emitted by their bodies. These sensors are designed to detect changes in infrared energy within their field of view, and when an intruder crosses the sensor's path, it detects the difference in temperature and triggers an alarm. This makes passive infrared sensors an effective choice for interior intrusion detection systems as they can accurately detect human presence based on heat radiation.

Submit
39. (252) What type alarm occurs if the sensor post cover in vertical taut-wire sensor (VTWS) is removed?

Explanation

If the sensor post cover in a vertical taut-wire sensor (VTWS) is removed, it would trigger a tamper alarm. This alarm is designed to alert the system that the sensor has been tampered with or its integrity has been compromised.

Submit
40. (022) Which power line fault category is typically referred to as electro-magnetic interference and radio frequency interference?

Explanation

Electro-magnetic interference (EMI) and radio frequency interference (RFI) are both types of electrical disturbances that can affect power lines. EMI refers to interference caused by electromagnetic radiation from external sources, while RFI refers to interference caused by radio frequency signals. These disturbances can disrupt the normal flow of electricity and cause problems in electronic devices. The term "noise" is commonly used to describe these types of electrical disturbances, making it the correct answer for this question.

Submit
41. (022) Which type of uninterruptible power supply (UPS) is traditionally referred to as "offline"?

Explanation

Passive standby is traditionally referred to as an "offline" uninterruptible power supply (UPS). This type of UPS allows the connected equipment to be powered directly from the main power source, bypassing the UPS until a power failure occurs. When a power failure occurs, the UPS switches to battery power to provide uninterrupted power supply to the connected equipment. This type of UPS is typically less expensive and simpler in design compared to other types of UPSs.

Submit
42. (001) Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?

Explanation

The correct answer is Radio Frequency Transmission Systems (3D1X3). This career field involves deploying, sustaining, troubleshooting, and repairing various types of wireless, line-of-sight, beyond line-of-sight, wideband, and ground-based satellite and encryption transmission devices. This field focuses on the transmission of radio frequency signals and ensuring their proper functioning.

Submit
43. (028) Which type of cable does not radiate energy and is not affected by nearby magnetic fields?

Explanation

Shielded cables are designed to minimize the effects of electromagnetic interference (EMI) and radio frequency interference (RFI). They have a conductive layer or shield around the inner conductor(s) that helps to block external electromagnetic fields from entering or exiting the cable. This shielding prevents the cable from radiating energy and also protects it from being affected by nearby magnetic fields. Therefore, shielded cables are the type of cable that does not radiate energy and is not affected by nearby magnetic fields.

Submit
44. (029) What is used to identify the polarity of a wire pair in a cable?

Explanation

The correct answer is "a. Tip and Ring." In telecommunications, the terms "tip" and "ring" are used to identify the polarity of a wire pair in a cable. The tip is the positive side, and the ring is the negative side. This terminology is commonly used in telephone systems and audio equipment.

Submit
45. (034) When using an ohmmeter to take a resistance reading, what preliminary precaution should you take?

Explanation

When using an ohmmeter to take a resistance reading, it is important to disconnect the power from the circuit being tested as a preliminary precaution. This is because leaving the power connected can lead to inaccurate readings and potential damage to the meter or the circuit. By disconnecting the power, you ensure that there is no current flowing through the circuit, allowing for a more accurate resistance measurement.

Submit
46. (036) What happens to the observed signal if you advance the oscilloscope synchronizing control too far?

Explanation

Advancing the oscilloscope synchronizing control too far can result in distortion of the observed signal. This occurs because the synchronizing control is responsible for aligning the horizontal sweep of the oscilloscope with the input signal. When advanced too far, the sweep may not properly synchronize with the signal, causing distortion in the waveform displayed on the screen.

Submit
47. (203) In binary-synchronous protocol, which characters establishes and maintains character synchronization prior to the message block and during transmission?

Explanation

In binary-synchronous protocol, the SYN character is used to establish and maintain character synchronization prior to the message block and during transmission. This character is sent by the sender to indicate the start of a transmission and is acknowledged by the receiver to confirm synchronization. It helps ensure that both ends of the communication are in sync and ready to transmit and receive data accurately.

Submit
48. (005) Which hazard is not one of the four major types of hazards?

Explanation

The correct answer is Nuclear. Nuclear hazards are not included in the four major types of hazards, which are biological, chemical, and physical hazards. Nuclear hazards refer to the risks associated with nuclear power plants, radioactive materials, and nuclear weapons. While nuclear hazards are significant and pose serious threats, they are not typically categorized as one of the four major types of hazards.

Submit
49. (229) Which agency is the preferred transport provider for Internet and commercial satellite connections used for voice, video and/or data services on DOD networks?

Explanation

The Defense Information Systems Agency (DISA) is the preferred transport provider for Internet and commercial satellite connections used for voice, video, and/or data services on DOD networks. DISA is responsible for providing secure and reliable communications and IT services to the Department of Defense. They manage and operate the DOD's global information infrastructure, including the transport networks that support various communication services. Therefore, DISA is the correct answer as the preferred transport provider for these services.

Submit
50. (210) Which topology defines the way in which devices communicate and data is transmitted throughout the network?

Explanation

Logical topology defines the way in which devices communicate and data is transmitted throughout the network. It focuses on the logical connections between devices rather than the physical layout of the network. This includes the paths that data takes from one device to another and the protocols used for communication. Unlike physical topology, which describes the physical arrangement of devices and cables, logical topology is concerned with the flow of data and the logical relationships between devices. Therefore, the correct answer is b. Logical.

Submit
51. (211) Which device subdivides a network into smaller logical pieces, or segments?

Explanation

A switch is a device that subdivides a network into smaller logical pieces or segments. It operates at the data link layer of the OSI model and uses MAC addresses to forward data packets to the appropriate destination. By creating separate collision domains, a switch improves network performance and allows for simultaneous communication between multiple devices. Unlike a firewall or gateway, which are used for security and routing purposes respectively, a switch is specifically designed for network segmentation. A repeater, on the other hand, amplifies and regenerates signals to extend the reach of a network.

Submit
52. (213) A Management Information Base (MIB) is a collection of information that is organized

Explanation

A Management Information Base (MIB) is a collection of information that is organized hierarchically. This means that the information is structured in a way that allows for easy navigation and retrieval. The hierarchical organization helps to categorize the information into different levels or tiers, with each level containing more specific details. This structure is beneficial for managing and accessing the information effectively, as it allows for efficient searching and referencing of data.

Submit
53. (015) Why must the use of TEMPEST-certified equipment be validated by an AF Certified TEMPEST technical authority (CTTA) prior to testing an inspectable space?

Explanation

The use of TEMPEST-certified equipment must be validated by an AF Certified TEMPEST technical authority (CTTA) prior to testing an inspectable space because it is expensive. This suggests that there are costs associated with the validation process, which may include the expertise and resources required for the certification. The expense involved in the validation process highlights the importance of ensuring that the equipment meets the necessary standards for protecting against electromagnetic radiation and potential security risks.

Submit
54. (034) When a multimeter has three input terminal jacks, which jack is always used?

Explanation

When a multimeter has three input terminal jacks, the jack that is always used is the "Common" jack. This jack is used as a reference point for measuring voltage, amperage, and frequency. It is typically connected to the ground or negative terminal of the circuit being tested. The other two jacks, voltage and amperage, are used depending on the type of measurement being taken. The frequency jack is not always present on a multimeter and is used specifically for measuring the frequency of an AC signal.

Submit
55. (235) Combined distribution frames encompass the functions of a main distribution frame and

Explanation

Combined distribution frames encompass the functions of a main distribution frame and an intermediate distribution frame. A main distribution frame is used to interconnect the incoming and outgoing lines, while an intermediate distribution frame is used to connect the main distribution frame to the individual lines or equipment. Therefore, a combined distribution frame would include both of these functions, allowing for the interconnection of incoming and outgoing lines as well as the connection to individual lines or equipment.

Submit
56. (040) Which component of a protocol analyzer discards frames based on its definition or activates a trigger based on the trigger definition?

Explanation

The component of a protocol analyzer that discards frames based on its definition or activates a trigger based on the trigger definition is the filter. Filters are used to selectively capture and analyze specific network traffic based on defined criteria such as source or destination address, protocol type, or specific data patterns. By applying filters, the protocol analyzer can focus on capturing and analyzing only the relevant frames, reducing the amount of unnecessary data and improving efficiency.

Submit
57. (040) What active test on a protocol analyzer is selected to see the path that the packets are traveling and the time it takes the packets to compete the trip?

Explanation

The correct answer is "a. Trace route." Trace route is a network diagnostic tool that allows users to see the path that packets are traveling and the time it takes for the packets to complete the trip. It works by sending out a series of packets with gradually increasing time-to-live (TTL) values, and each router along the path sends back an ICMP time exceeded message, allowing the user to trace the route. This helps in identifying any network issues or delays in packet transmission.

Submit
58. (204) Which network layer protocol matches a known Internet protocol (IP) address for a destination device to a Media Access Control (MAC) address?

Explanation

The correct answer is b. Address Resolution Protocol (ARP). ARP is a network layer protocol that matches an IP address to a MAC address. When a device wants to send data to a destination device with a known IP address, it uses ARP to determine the MAC address associated with that IP address. This allows the device to correctly address the data at the data link layer and send it to the intended recipient.

Submit
59. (218) Which statement best describes a binary with eight-zero substitution (B8ZS) signal?

Explanation

B8ZS is a line coding technique used in telecommunications to ensure a balance between ones and zeros in a data signal. It intentionally inserts bipolar violations, which are signal transitions that violate the normal coding rules, to break up long strings of zeros. This helps in maintaining synchronization and preventing errors in the transmission. Therefore, option d is the correct statement that describes the B8ZS signal.

Submit
60. (003) Which of the following is a core competency of Cyber Transport Systems?

Explanation

The core competency of Cyber Transport Systems is voice network systems. This means that Cyber Transport Systems specializes in designing, implementing, and managing voice communication networks. They have expertise in technologies and protocols related to voice communication, such as VoIP (Voice over Internet Protocol) and PBX (Private Branch Exchange) systems. This competency allows Cyber Transport Systems to provide efficient and reliable voice communication solutions to their clients.

Submit
61. (205) Which network Class has the most addresses for hosts?

Explanation

Class A networks have the most addresses for hosts. In Class A, the first octet is reserved for the network ID, leaving the remaining three octets for host addresses. This allows for a large number of hosts, with a total of 16,777,214 addresses available. Class B and Class C networks have progressively fewer addresses for hosts, with Class C having the fewest. Class D is reserved for multicast addresses and is not used for host addressing.

Submit
62. (207) Which device has multiport connectivity that directs data between nodes on a network?

Explanation

A router is a device that has multiport connectivity and is designed to direct data between nodes on a network. It uses routing tables and protocols to determine the best path for data transmission. Unlike a bridge, which connects two similar types of networks, a router can connect different types of networks, such as Ethernet and Wi-Fi. A gateway is a device that connects two different networks, such as a local network and the internet. A repeater is a device that amplifies or regenerates a signal to extend its reach.

Submit
63. (211) How many broadcast domains forms a Virtual LAN (VLAN)?

Explanation

A Virtual LAN (VLAN) is a logical grouping of devices on a network, regardless of their physical location. It allows for the segmentation of a network into multiple broadcast domains. Each VLAN forms its own broadcast domain, isolating traffic from other VLANs. Therefore, a single VLAN forms one broadcast domain.

Submit
64. (213) Simple Network Management Protocol (SNMP) is a tool used by network administrators to manage network performance, investigate and solve network problems and help plan for

Explanation

SNMP is a tool used by network administrators to manage network performance, investigate and solve network problems, and help plan for future growth. It allows administrators to monitor and gather information about network devices, such as routers and switches, in order to optimize their performance and identify areas where additional resources may be needed. By using SNMP, administrators can proactively plan for the expansion and scalability of their network infrastructure, ensuring that it can support future growth and meet the demands of the organization.

Submit
65. (214) Which physical security action can you take to ensure network equipment supports the widest range of security services?

Explanation

Configuring the equipment with the maximum amount of memory possible can ensure that network equipment supports the widest range of security services. This is because more memory allows for the installation and running of multiple security services simultaneously, providing a higher level of protection for the network. With increased memory, the equipment can handle more complex security tasks and store larger amounts of data, enhancing its overall security capabilities.

Submit
66. (250) The basic configuration of the entry control facility includes a

Explanation

The basic configuration of the entry control facility includes a gatehouse, personnel entry gate, inspection equipment, and vehicle entrapment area. This configuration is necessary for effective control and monitoring of access to a facility. The gatehouse serves as a control center where security personnel can monitor and manage the entry and exit of individuals and vehicles. The personnel entry gate is where individuals enter and exit the facility, and it is typically equipped with access control measures such as ID checks or biometric scanners. Inspection equipment is used to screen individuals and their belongings for prohibited items or threats. The vehicle entrapment area is designed to safely detain and inspect vehicles before granting them access to the facility.

Submit
67. (019) What is required in electronic settings to prevent equipment and signals from propagating interference and to protect equipment and signals from the effects of interference propagated by other devices?

Explanation

Shielding is required in electronic settings to prevent equipment and signals from propagating interference and to protect them from the effects of interference propagated by other devices. Shielding involves the use of conductive materials or coatings to create a barrier that blocks or absorbs electromagnetic interference (EMI) and radio frequency interference (RFI). This helps to maintain the integrity and reliability of electronic equipment and signals by reducing the impact of external interference sources.

Submit
68. (021) Which electronic discharge sensitive (ESD) class has a sensitivity range from 0 – 999 volts?

Explanation

Class I electronic discharge sensitive (ESD) devices have a sensitivity range from 0 – 999 volts. This means that they are able to detect and respond to electrostatic discharges within this voltage range. The other classes, II, III, and IV, likely have different sensitivity ranges or are designed for different purposes.

Submit
69. (222) The signal components that occur as bands above and below a carrier are called

Explanation

The signal components that occur as bands above and below a carrier are called "sidebands." Sidebands are created when a carrier signal is modulated by a modulating signal, resulting in the shifting of frequencies above and below the carrier frequency. These sidebands carry the information being transmitted and are essential for the process of modulation and demodulation in communication systems.

Submit
70. (024) What function do facility batteries provide during normal operating conditions (commercial alternate current [AC] power available)?

Explanation

Facility batteries act as a DC filter for the commercial AC power during normal operating conditions. This means that they help remove any fluctuations or disturbances in the AC power supply, ensuring that a stable and clean DC power is provided to the system. This helps in protecting the equipment and ensuring its proper functioning.

Submit
71. (030) Pin 1 on a typical Electronics Industry Association/Telecommunications Industry Association (EIA/TIA) 568B connector is what color?

Explanation

Pin 1 on a typical EIA/TIA 568B connector is white/orange in color. The EIA/TIA 568B standard is used for wiring Ethernet cables, and it specifies the color coding for each pin. In this standard, pin 1 is assigned the color white/orange. This color coding is important for ensuring proper connectivity and compatibility between different devices and networks.

Submit
72. (202) In the Open System Interconnect (OSI) model, a layer will communicate with three other OSI layers. Which one is not one of those layers?

Explanation

In the Open System Interconnect (OSI) model, a layer communicates with the layer above it, the layer below it, and its peer layer. The lowest layer in the OSI model is the Physical layer, which is responsible for transmitting raw bit streams over a physical medium. Therefore, the correct answer is c. Lowest layer, as it is not one of the layers that a layer in the OSI model communicates with.

Submit
73. (217) How many voltage levels does a binary signal have?

Explanation

A binary signal has two voltage levels, typically represented as 0 and 1. These two levels are used to represent the two states of a binary system, such as on and off, true and false, or high and low. The binary system is the foundation of digital communication and computing, where information is encoded and processed using these two voltage levels.

Submit
74. (004) Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?

Explanation

AF Form 457 is used to report hazardous conditions that place Air Force personnel or property at risk. This form is specifically designed for reporting safety concerns and is used to document and track hazards in order to ensure appropriate corrective actions are taken. It allows individuals to report any unsafe conditions they observe, such as faulty equipment, unsafe work practices, or potential hazards, so that they can be addressed promptly and effectively. By using AF Form 457, the Air Force can maintain a safe working environment and prevent accidents or injuries.

Submit
75. (208) When configuring a router, you control access to privileged EXEC mode by configuring which password?

Explanation

When configuring a router, access to privileged EXEC mode is controlled by configuring the "Enable" password. This password is used to authenticate users who want to access privileged commands and configurations on the router. By setting an "Enable" password, the router ensures that only authorized users can make changes to the router's settings and configurations.

Submit
76. (008) An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having what category of vulnerability?

Explanation

An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having a Category I vulnerability. This means that the enclave has a critical vulnerability, as it lacks basic security measures such as a firewall and IDS. Without these protections in place, the enclave is highly susceptible to unauthorized access and potential attacks.

Submit
77. (010) One advantage of a network-based intrusion detection system (NIDS) is that it

Explanation

A network-based intrusion detection system (NIDS) is designed to monitor network traffic and detect any suspicious or malicious activity. One advantage of a NIDS is that it uses very few network resources. This means that it does not significantly impact the performance or bandwidth of the network it is monitoring. By using minimal resources, the NIDS can effectively monitor the network without causing any disruptions or slowdowns. This makes it a practical and efficient solution for detecting and preventing network intrusions.

Submit
78. (018) What kind of bond is normally applied to signal reference bonds?

Explanation

Signal reference bonds are typically applied using mechanical bonding. Mechanical bonding involves physically connecting the conductive materials together using methods such as screws, bolts, or clamps. This type of bond ensures a secure and reliable connection between the signal reference points, allowing for accurate and consistent signal transmission. Unlike brazing or welding, which involve melting and fusing materials together, mechanical bonding does not require the use of heat or additional materials. Therefore, the correct answer is d. Mechanical.

Submit
79. (019) Which type of shielding utilizes braid, foil, metal wrap, conduit or twisted wire around a conductor?

Explanation

This type of shielding, which utilizes braid, foil, metal wrap, conduit or twisted wire around a conductor, is commonly used in cables. Cables are designed to transmit electrical signals or power and often consist of multiple conductors enclosed in a protective sheath. The shielding helps to protect the signal or power from external interference and minimize electromagnetic emissions.

Submit
80. (024) Which is not a consideration for selecting facility batteries?

Explanation

The number of AC converters required for the facility is not a consideration for selecting facility batteries. The selection of facility batteries is based on factors such as the facility power requirements, the facility power reserve times, and the amount of current and future floor space available. The number of AC converters required is related to the electrical infrastructure of the facility, not specifically to the selection of batteries.

Submit
81. (029) The thin plastic colored tape that spirals around a specific number of pairs that replicate in color is a

Explanation

The thin plastic colored tape that spirals around a specific number of pairs that replicate in color is called a binder. A binder is a device used to hold together multiple items or documents. In this context, the colored tape is used to bind or hold together a specific number of pairs, replicating the color pattern.

Submit
82. (031) What is the maximum operating temperature of fiber optic cable?

Explanation

Fiber optic cables are designed to withstand high temperatures, but their maximum operating temperature is typically around 1,000°C. At temperatures above this limit, the cable's performance may be compromised, and it may suffer from degradation or even melt. Therefore, option b, 1,000°C, is the correct answer.

Submit
83. (033) What do you use to remove excess fiber after the connector has cooled and epoxy has dried on a fiber cable?

Explanation

A scribe is used to remove excess fiber after the connector has cooled and epoxy has dried on a fiber cable. A scribe is a sharp tool that is used to score or scratch the excess fiber, allowing it to be easily broken off. This process ensures that the fiber is clean and smooth, allowing for optimal performance and connectivity.

Submit
84. (037) What area of a digital storage oscilloscope takes digitized samples and performs numerous manipulations on the data including measuring rise and fall times, periods, time intervals, and math computations?

Explanation

The microprocessor of a digital storage oscilloscope is responsible for taking digitized samples from the acquisition system and performing various manipulations on the data. This includes measuring rise and fall times, periods, time intervals, and performing math computations. The microprocessor acts as the brain of the oscilloscope, processing the captured data and providing the necessary calculations and analysis.

Submit
85. (203) Which data communication protocol is based on bits and the position of the bits?

Explanation

Bit-oriented is the correct answer because this data communication protocol is based on bits and the position of the bits. In bit-oriented protocols, data is transmitted and received one bit at a time, and the position of the bits is important for proper interpretation of the data. These protocols are commonly used in serial communication systems where data is transmitted sequentially.

Submit
86. (220) Which communications control signal uses a two-frequency dialing combination?

Explanation

Tone is the correct answer because it is the communications control signal that uses a two-frequency dialing combination. This means that when dialing a number, two distinct tones are generated to represent each digit, allowing for more efficient and accurate communication. Pulse, digit, and address do not involve a two-frequency dialing combination, making them incorrect options.

Submit
87. (204) Which Transport layer protocol provides reliable data delivery services?

Explanation

The correct answer is c. Transmission Control Protocol (TCP). TCP is a reliable transport layer protocol that ensures the delivery of data by establishing a connection between the sender and receiver. It provides features like error detection, flow control, and congestion control to ensure the reliable delivery of data packets. TCP guarantees that the data will be delivered in the same order it was sent and that no data will be lost or corrupted during transmission.

Submit
88. (242) The primary reason you should measure the voltage across faulty terminal protectors before removing and replacing them is to

Explanation

Measuring the voltage across faulty terminal protectors before removing and replacing them is important to ensure dangerous voltages are not present on the line. This is crucial for the safety of the technician and to prevent any potential harm or damage that could be caused by high voltage. By measuring the voltage, the technician can determine if it is safe to proceed with the replacement without risking electric shock or other hazards.

Submit
89. (229) What web application is used to order telecommunications products and services from the Defense Information Systems Agency (DISA)?

Explanation

DISA Direct Order Entry (DDOE) is the web application used to order telecommunications products and services from the Defense Information Systems Agency (DISA). This application allows users to easily submit orders for various telecommunications needs, streamlining the ordering process and ensuring efficient communication between DISA and its customers. It is the most suitable option among the given choices for this purpose.

Submit
90. (008) How many Integrated Network and Operation Security Centers (INOSC) does the Air Force have?

Explanation

The Air Force has two Integrated Network and Operation Security Centers (INOSC).

Submit
91. (009) You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except

Explanation

not-available-via-ai

Submit
92. (230) If the circuit files are lost or destroyed, what document are Technical Control Facilities required to obtain?

Explanation

Technical Control Facilities are required to obtain the latest telecommunications service order (TSO) that reflects the current end-to-end circuit configuration if the circuit files are lost or destroyed. This document will provide them with the necessary information about the circuit's configuration and help them recreate it. The original TSO and circuit test data may not be sufficient as they may not reflect the current configuration, while the latest TSO and circuit test data will provide the most up-to-date information.

Submit
93. (249) In an Intrusion Detection System (IDS), what must a line of detection detect?

Explanation

The correct answer is a. Walking, running, rolling, crawling or jumping through the line of detection. In an Intrusion Detection System (IDS), the line of detection is meant to detect any movement or activity that occurs within its range. This includes various forms of movement such as walking, running, rolling, crawling, or jumping. The IDS is designed to identify and alert any potential intrusions or unauthorized access attempts by detecting these movements.

Submit
94. (012) What type of certificate authenticates the identity of the user?

Explanation

A digital certificate is a type of certificate that authenticates the identity of the user. It is used to verify that the user is who they claim to be in digital transactions. Digital certificates use cryptographic keys to ensure the integrity and security of the information being transmitted. This type of certificate is commonly used in online banking, e-commerce, and other secure online transactions to establish trust between the user and the website or service.

Submit
95. (014) What Air Force Systems Security Instruction (AFSSI) series covers emission security (EMSEC)?

Explanation

The correct answer is c. 7000. The Air Force Systems Security Instruction (AFSSI) series 7000 covers emission security (EMSEC). This series provides guidance and procedures for protecting against compromising emanations from electronic systems. EMSEC involves measures to prevent unauthorized interception and analysis of electromagnetic radiation emitted by electronic equipment, which could potentially reveal sensitive information or compromise the security of military systems. The AFSSI series 7000 specifically focuses on EMSEC and provides instructions for implementing protective measures to mitigate these risks.

Submit
96. (016) What equipment should be designated as BLACK when designating equipment that supports physical and electrical concepts?

Explanation

The equipment that supports physical and electrical concepts should be designated as BLACK when it is processing encrypted classified information. This means that the equipment is capable of handling and processing information that has been encrypted to protect its confidentiality and integrity.

Submit
97. (017) What is the grounding resistance goal for military communications electronics (C-E) facilities?

Explanation

The grounding resistance goal for military communications electronics (C-E) facilities is 10 ohms or less. This is because a low grounding resistance helps to ensure effective grounding and minimize the risk of electrical hazards such as electric shock and equipment damage. A lower grounding resistance allows for better dissipation of electrical currents and helps to maintain a stable electrical reference point for the equipment.

Submit
98. (018) Bonds in the earth electrode subsystem normally are direct permanent bonds and do not exceed a resistance of

Explanation

Bonds in the earth electrode subsystem need to have a low resistance in order to effectively conduct electrical current to the earth. A resistance of 1 milliohm is considered to be a very low resistance and ensures a good connection between the earth electrode subsystem and the earth. This low resistance helps to prevent the buildup of excessive voltage and ensures the safety and effectiveness of the grounding system.

Submit
99. (031) What has made very high data rate transmission possible on a fiber optics cable?

Explanation

The use of light-emitting diodes (LEDs) has made very high data rate transmission possible on a fiber optics cable. LEDs are used as a light source in fiber optics, and they emit light signals that carry data through the cable. LEDs have a fast response time and can operate at high frequencies, allowing for the transmission of large amounts of data at high speeds. Therefore, the use of LEDs enables the high data rate transmission on a fiber optics cable.

Submit
100. (236) Who determines if Preventative Maintenance Inspections (PMI) are accomplished when commercial manuals or publications are not available?

Explanation

The flight commander determines if Preventative Maintenance Inspections (PMI) are accomplished when commercial manuals or publications are not available. This is because the flight commander is responsible for overseeing the maintenance and operations of the flight, and has the authority to make decisions regarding maintenance procedures in the absence of specific guidance from manuals or publications.

Submit
101. (204) Which Network layer protocol provides messaging that can help with troubleshooting?

Explanation

The correct answer is d. Internet Control Message Protocol (ICMP). ICMP is a network layer protocol that provides messaging services for troubleshooting and diagnostic purposes. It is used to send error messages and operational information, such as network congestion or unreachable hosts, between network devices. ICMP messages are typically generated in response to errors or abnormal conditions in IP packet processing, making it a valuable tool for network troubleshooting and problem resolution.

Submit
102. (002) Which of the following is not a communications security program duty and responsibility for Cyber Transport Systems?

Explanation

The correct answer is b. Technical security. Technical security refers to the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. While it is an important aspect of overall cybersecurity, it is not specifically a duty and responsibility of communications security programs for Cyber Transport Systems. Communications security programs primarily focus on ensuring the confidentiality, integrity, and availability of information during transmission, as well as protecting against unauthorized disclosure or interception. This includes duties and responsibilities related to transmission security, emission security, and physical security.

Submit
103. (007) How many steps are in the risk management (RM) process?

Explanation

The correct answer is b. Five. The risk management process typically consists of five steps. These steps include identifying risks, assessing and analyzing risks, developing risk response strategies, implementing risk response strategies, and monitoring and controlling risks. Each step is crucial in effectively managing and mitigating risks within an organization or project.

Submit
104. (244) Which Digital Multiplex System (DMS)–100 database facility is responsible for creating and maintaining tables of data in a controlled manner?

Explanation

Table control is the correct answer because it is responsible for creating and maintaining tables of data in a controlled manner. This facility ensures that the data is organized and structured correctly, allowing for efficient storage and retrieval of information. It helps in maintaining data integrity and consistency within the Digital Multiplex System (DMS)-100 database. The table control feature allows for the creation, modification, and deletion of tables, as well as defining relationships and constraints between them.

Submit
105. (009) Which term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP)?

Explanation

IP telephony is the correct term used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP). This technology allows voice calls to be made over the internet rather than traditional telephone lines. It utilizes IP networks to transmit voice data packets, enabling cost-effective and efficient communication. Network telephony refers to the broader concept of telephony services provided over a network, while voice protection system is unrelated to the given technology. Voice over Internet Protocol (VoIP) is another commonly used term that refers to the same technology as IP telephony.

Submit
106. (212) Which Institute of Electrical Electronics Engineers (IEEE) specification is least susceptible to interference caused by household appliances and medical devices?

Explanation

IEEE 802.11a operates in the 5 GHz frequency band, which is less crowded compared to the 2.4 GHz band used by IEEE 802.11b and IEEE 802.11g. Household appliances and medical devices typically operate in the 2.4 GHz band, causing interference with IEEE 802.11b and IEEE 802.11g signals. Therefore, IEEE 802.11a is the least susceptible to interference from these devices.

Submit
107. (212) Which wireless design phase accounts for the amount of users on the network, the training required for the users and the security and integrity requirements of the network data?

Explanation

The wireless design phase that accounts for the amount of users on the network, the training required for the users, and the security and integrity requirements of the network data is the planning phase. During the planning phase, considerations such as user capacity, user training needs, and security measures are taken into account to ensure that the wireless network is designed to meet these requirements. This phase involves analyzing and determining the specific needs and goals of the network before moving on to the implementation and deployment phases.

Submit
108. (011) What security posture permits everything that is not specifically denied?

Explanation

The correct answer is "d. Open." An open security posture permits everything that is not specifically denied. This means that by default, all actions and access are allowed unless explicitly restricted. It is the opposite of a default deny posture, where everything is denied unless specifically allowed.

Submit
109. (015) Which method of containing radiated emanations requires both facility and equipment testing?

Explanation

Zoning is the method of containing radiated emanations that requires both facility and equipment testing. Zoning involves dividing a facility into different zones based on the level of sensitivity to radiated emanations. Each zone is then tested to ensure that the equipment and facilities within it meet the required standards for containing radiated emanations. This method ensures that sensitive information is protected from being intercepted or compromised by unauthorized individuals or entities.

Submit
110. (016) Equipment is comprised as machines that process information in electronic or electrical form. What equipment should be designated as RED?

Explanation

The equipment that should be designated as RED is the one processing clear-text classified information. This means that the equipment is handling information that is not encrypted and is considered confidential and classified.

Submit
111. (023) How many phases of generator power are usually required for industrial and commercial applications?

Explanation

Industrial and commercial applications typically require three phases of generator power. This is because three-phase power offers several advantages over single-phase power, including higher power capacity, more efficient transmission, and better balance of loads. Three-phase power is commonly used in industries such as manufacturing, construction, and data centers, where large amounts of power are needed to operate machinery, equipment, and systems.

Submit
112. (032) What are the three sections of a fiber optic cable?

Explanation

The three sections of a fiber optic cable are the core, cladding, and jacket. The core is the innermost part of the cable where the light travels through. The cladding is the layer that surrounds the core and helps to keep the light inside the core by reflecting it back into the core. The jacket is the outermost layer of the cable that provides protection and insulation.

Submit
113. (240) What provides enterprise wide visibility into telecom resource utilization, phone network usage and incidents of toll fraud?

Explanation

The Enterprise Telephony Management system provides enterprise-wide visibility into telecom resource utilization, phone network usage, and incidents of toll fraud. This system allows organizations to monitor and manage their telephony infrastructure, including tracking usage patterns, identifying potential fraud or misuse, and optimizing resource allocation. It provides comprehensive insights and control over the entire telephony network, helping organizations make informed decisions and ensure efficient and secure communication.

Submit
114. (216) Which option is a characteristic of synchronous data operation?

Explanation

Synchronous data operation refers to a method of data transmission where the sender and receiver are synchronized with each other. In this method, all data bits are of the same length in time. This means that each data bit is transmitted or received within the same fixed time interval. This characteristic ensures that the sender and receiver are in sync and can accurately interpret the data being transmitted. It allows for reliable and efficient data transmission, especially in scenarios where timing is critical.

Submit
115. (247) What does the GVG–110 video switcher serial interface allow?

Explanation

The GVG-110 video switcher serial interface allows for remote control of all switcher functions by a personal computer.

Submit
116. (231) What report must be sent if the circuit does not meet all required parameters and the Telecommunications Service Order (TSO) issuing authority advises that the circuit is accepted for service?

Explanation

If the circuit does not meet all required parameters but is still accepted for service, a report must be sent to document this situation. This report is called an "exception" report. It serves to highlight the fact that the circuit does not meet all the required parameters, despite being accepted for service.

Submit
117. (232) Trend analysis is a program that ensures circuits meet management thresholds on what basis?

Explanation

Trend analysis is a program that monitors and analyzes data over a specific period of time to identify patterns and trends. By conducting trend analysis on a monthly basis, circuits can be evaluated and compared to management thresholds to ensure they are meeting the desired criteria. This regular monthly evaluation allows for timely adjustments and interventions if needed, ensuring that circuits are consistently meeting management thresholds.

Submit
118. (214) In general, you should deny direct dial-in access to a network device by disabling which port?

Explanation

The correct answer is b. Auxiliary.
Disabling the auxiliary port is generally recommended to deny direct dial-in access to a network device. The auxiliary port is typically used for out-of-band management, such as connecting a modem for remote administration. By disabling this port, unauthorized individuals cannot gain direct access to the network device through dial-in connections, enhancing the overall security of the network.

Submit
119. (015) What plays a major role in a conductor's ability to minimizing compromising emanations?

Explanation

The correct answer is a. Distance and angle. Distance refers to the physical separation between the conductor and the source of emanations, while angle refers to the direction or orientation of the conductor in relation to the source. By increasing the distance and changing the angle, a conductor can minimize the compromising emanations, which are unintentional signals or radiation that can potentially be intercepted or exploited by unauthorized individuals.

Submit
120. (037) What type of sampling does a digital storage oscilloscope normally use on single-shot or seldom-occurring signals?

Explanation

A digital storage oscilloscope (DSO) typically uses real-time sampling on single-shot or seldom-occurring signals. Real-time sampling means that the DSO captures and digitizes the signal in a continuous manner, allowing for accurate representation of the waveform. This is in contrast to other types of sampling, such as sequential or repetitive, which may not capture the entire waveform or may miss important details. Real-time sampling ensures that the DSO can accurately capture and display the signal, making it the preferred method for single-shot or seldom-occurring signals.

Submit
121. (237) When a telephone network is circuit switched, each call

Explanation

In a circuit-switched telephone network, each call has a dedicated circuit created by the switch. This means that a direct and continuous communication path is established between the caller and the receiver for the duration of the call. This dedicated circuit ensures that the call is not shared with other calls and guarantees a consistent and reliable connection. Unlike packet-switched networks where data is divided into packets and transmitted separately, circuit-switched networks reserve resources and bandwidth specifically for each call.

Submit
122. (040) What protocol analyzer test window provides information concerning the network utilization and frame error that are related to a specific protocol?

Explanation

The protocol statistics test window in a protocol analyzer provides information about the network utilization and frame errors that are specific to a particular protocol. This window allows users to analyze the performance and behavior of the protocol being tested, including any errors or issues that may be occurring. It helps in identifying and troubleshooting problems related to the specific protocol being monitored.

Submit
123. (207) Which routing protocol do internet backbones use?

Explanation

Internet backbones use the Border Gateway Protocol (BGP) as their routing protocol. BGP is specifically designed for large-scale networks and is used to exchange routing information between different autonomous systems (AS). It allows internet service providers (ISPs) to determine the most efficient paths for data to travel across the internet, ensuring reliable and efficient routing. OSPF, RIP, and EIGRP are also routing protocols, but they are typically used within smaller networks and are not commonly used in internet backbones.

Submit
124. (221) In common associated signaling (CAS), what is the seventh bit in frames 6 and 12 used for?

Explanation

In common associated signaling (CAS), the seventh bit in frames 6 and 12 is used for bit robbing. Bit robbing refers to the process of stealing one bit from each frame to carry signaling information. This allows for additional signaling without the need for extra bits or frames. Bit robbing is commonly used in telephony systems to transmit signaling information alongside voice data.

Submit
125. (008) The Integrated Network Operations and Security Centers (INOSC) has several responsibilities except

Explanation

The Integrated Network Operations and Security Centers (INOSC) is responsible for several tasks, including maintaining sole administrative privileges on the firewall, standardizing, configuring, backing up, and otherwise maintaining the firewall, and maintaining a single naming/configuration standard for boundary devices. However, they are not responsible for installing patches or performing any upgrades provided by the Air Force Enterprise Network (AFEN). This responsibility likely falls under a different department or team within the organization.

Submit
126. (009) At which open systems interconnect (OSI) layer does an application-level firewall operate?

Explanation

An application-level firewall operates at the seventh layer of the OSI model, which is the application layer. This layer is responsible for providing services directly to the end-user applications. An application-level firewall can monitor and control the traffic based on specific application protocols and can filter and block certain types of traffic based on the application being used. This allows for more granular control and security measures at the application level.

Submit
127. (010) Host-based intrusion detection systems (HIDS) are

Explanation

Host-based intrusion detection systems (HIDS) are capable of both passive and active functions. Passive HIDS monitor and analyze system logs, network traffic, and other data sources to detect potential security breaches. They do not take direct action but provide alerts and reports to system administrators. Active HIDS, on the other hand, not only monitor but also respond to security threats by taking actions such as blocking suspicious network traffic, terminating processes, or isolating compromised systems. Therefore, HIDS can perform both passive monitoring and active response to enhance the security of the host system.

Submit
128. (222) What is the process, or result of the process, of modifying (varying) one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal?

Explanation

Modulation is the process of modifying one or more characteristics of a carrier signal in accordance with an instantaneous characteristic of an information signal. This allows the information signal to be transmitted over a communication channel. Multiplexing refers to the combining of multiple signals into one signal for transmission. Quantization is the process of converting a continuous analog signal into a discrete digital signal. Synthesizing refers to the creation or generation of a signal or sound.

Submit
129. (033) How long do most fiber-optic epoxies take to set?

Explanation

Most fiber-optic epoxies take 12-24 hours to set.

Submit
130. (037) Which digital storage oscilloscope button controls all waveforms displayed in the STORE mode?

Explanation

The CURSORS control button on a digital storage oscilloscope is used to control all waveforms displayed in the STORE mode. This button allows the user to select and manipulate cursors on the screen, which can be used to measure various parameters of the waveform such as voltage, time, frequency, and phase. By adjusting the cursors, the user can accurately analyze and measure different aspects of the waveform being displayed. Therefore, the CURSORS control button is responsible for controlling all waveforms displayed in the STORE mode.

Submit
131. (039) When using an optical time-domain reflectometer (OTDR), what action might a manufacturer require to prevent false readings?

Explanation

To prevent false readings when using an optical time-domain reflectometer (OTDR), a manufacturer might require the user to connect a launch cable between the test set and the cable being tested. This is because the launch cable helps to eliminate any reflections or anomalies that may occur at the beginning of the cable under test. By using a launch cable, the OTDR can accurately measure the characteristics of the cable without any interference or false readings caused by the initial connection point.

Submit
132. (205) How many subnet bits are required to support 90 subnets on a Class B network?

Explanation

To support 90 subnets on a Class B network, seven subnet bits are required. In a Class B network, the default subnet mask is 255.255.0.0, which provides 16 bits for the network portion. By adding seven subnet bits, we increase the number of available subnets to 2^7 = 128. Since we only need 90 subnets, seven subnet bits will be sufficient. Therefore, the correct answer is c. Seven.

Submit
133. (206) Teredo has four tunneling components. Which one is not one of them?

Explanation

Teredo is an IPv6 transition technology that enables IPv6 connectivity for devices behind IPv4 NAT devices. It consists of four tunneling components: host-specific relay, client, server, and Teredo relay. The Teredo agent is not one of the components.

Submit
134. (022) Which type of uninterruptible power supply (UPS) offers the highest level of protection?

Explanation

Double conversion UPS offers the highest level of protection. In a double conversion UPS, the incoming AC power is converted to DC power and then reconverted back to AC power, ensuring a constant and clean power supply to connected devices. This process eliminates any fluctuations or disturbances in the power source, providing a high level of protection against power surges, voltage spikes, frequency variations, and other power quality issues. This type of UPS is commonly used for critical applications where uninterrupted and reliable power is essential.

Submit
135. (025) Which publication series covers standard Air Force installation practices?

Explanation

The correct answer is c. TO 31-10 series. The TO 31-10 series covers standard Air Force installation practices.

Submit
136. (027) Support intervals for cables requiring surface installation will not exceed how many feet?

Explanation

Support intervals for cables requiring surface installation will not exceed 5 feet. This means that the distance between each support point for the cables, such as poles or brackets, will not be more than 5 feet. This is important for ensuring the stability and proper installation of the cables, as excessive spacing between support points can lead to sagging or damage to the cables. By limiting the support intervals to 5 feet, the cables can be properly supported and maintained.

Submit
137. (028) The advantage of using coaxial cable over paired cable is that coaxial cable

Explanation

Coaxial cable has the advantage over paired cable in that it does not radiate energy. This means that it is less susceptible to electromagnetic interference and can provide better signal quality. Coaxial cable has a central conductor surrounded by a layer of insulation, a metallic shield, and an outer insulating layer. This design helps to contain the electromagnetic energy within the cable, preventing it from being radiated and interfering with other devices. Paired cable, on the other hand, consists of two conductors twisted together, which can result in some energy being radiated.

Submit
138. (040) What protocol analyzer test window reports errors that occur at the physical layer such as bad frame check sequence (FCS), short frames, and jabbers?

Explanation

The correct answer is a. Media access control (MAC) node statistics. Protocol analyzers are used to monitor and analyze network traffic. The MAC node statistics window in a protocol analyzer provides information about errors that occur at the physical layer, such as bad frame check sequence (FCS), short frames, and jabbers. This window displays statistics related to the MAC layer, which is responsible for controlling access to the network medium. By analyzing these statistics, network administrators can identify and troubleshoot issues related to the physical layer of the network.

Submit
139. 46. (219) How many bits are in the extended superframe format (ESF) framing sequence?

Explanation

The extended superframe format (ESF) framing sequence consists of 24 bits.

Submit
140. (225) What are the two major types of frame structures?

Explanation

The correct answer is c. CCITT and low speed. CCITT (Comité Consultatif International Téléphonique et Télégraphique) is a standardization organization that developed protocols for data communication. Low speed refers to slower data transmission rates. Therefore, the two major types of frame structures are CCITT, which represents the standardization organization, and low speed, which represents slower data transmission rates.

Submit
141. (226) Which wave-division multiplexing technology uses uncooled lasers to reduce cost?

Explanation

Coarse wave division multiplexing (CWDM) is a wave-division multiplexing technology that uses uncooled lasers to reduce cost. Unlike dense wave division multiplexing (DWDM) which requires expensive cooled lasers, CWDM utilizes uncooled lasers that do not require additional cooling mechanisms. This makes CWDM a more cost-effective solution for multiplexing multiple signals onto a single fiber optic cable. Therefore, option b is the correct answer.

Submit
142. (242) What Digital Multiplex System (DMS)–100 system contains subsystems for test routing, fault detection, fault analysis and error reporting?

Explanation

The correct answer is d. Maintenance and administration position. The DMS-100 system contains subsystems for test routing, fault detection, fault analysis, and error reporting, which are all functions typically performed by the maintenance and administration position. This position is responsible for monitoring and managing the system, identifying and resolving issues, and ensuring the system is running smoothly. The maintenance and administration position would have access to tools and resources for performing these tasks, such as test routing capabilities, fault detection tools, and error reporting systems.

Submit
143. (227) What do Global Positioning System (GPS) satellites use to provide very precise time to GPS receivers?

Explanation

GPS satellites use atomic clocks to provide very precise time to GPS receivers. Atomic clocks are extremely accurate timekeeping devices that use the vibrations of atoms to measure time. The use of atomic clocks ensures that the time provided by GPS satellites is highly accurate and reliable, allowing GPS receivers to accurately calculate their position based on the time signals received from multiple satellites.

Submit
144. (227) Which stratum level is a Global Positioning System (GPS) timing source?

Explanation

The correct answer is a. 1. A Global Positioning System (GPS) timing source is considered to be at stratum level 1. Stratum level 1 represents a highly accurate and reliable time source, such as an atomic clock or a GPS receiver directly connected to a computer. This level is typically used as a reference for other network devices and is considered the most accurate and reliable source of time synchronization.

Submit
145. (211) Which of the following will minimize EtherChannel configuration problems?

Explanation

Configuring all interfaces to operate at the same speed and duplex mode will minimize EtherChannel configuration problems. This ensures that all interfaces in the EtherChannel have consistent settings, preventing any potential conflicts or mismatches that could cause issues. By having uniform speed and duplex settings, the interfaces can effectively communicate and work together as part of the EtherChannel, improving overall stability and performance.

Submit
146. (252) What type of signal is sent to the fence protection system (FPS) signal processor when an alarm is detected?

Explanation

When an alarm is detected in the fence protection system (FPS), an analog signal is sent to the signal processor. This means that the signal is continuous and can have any value within a certain range. Analog signals are commonly used in FPS systems because they can accurately represent the varying levels of electrical current or voltage that are generated when an alarm is triggered. This allows the signal processor to analyze and interpret the alarm signal effectively, helping to detect and respond to potential threats.

Submit
147. (017) Which facility ground subsystem uses surge arrestors?

Explanation

The facility ground subsystem that uses surge arrestors is the lightning protection system. Surge arrestors are devices that protect electrical systems from voltage spikes caused by lightning strikes. These devices divert the excess voltage to the ground, preventing damage to the electrical equipment. Therefore, option d, lightning protection, is the correct answer.

Submit
148. (030) What cable type connects devices that operate at similar layers of the open system interconnection (OSI) model?

Explanation

Crossover cables are used to connect devices that operate at similar layers of the OSI model. These cables are specifically designed to allow the exchange of data between two devices of the same type, such as two computers or two switches. The wiring arrangement in a crossover cable enables the transmit and receive pairs to be crossed over, allowing the devices to communicate effectively. This is in contrast to straight-through cables, which are used to connect devices that operate at different layers of the OSI model. Rollover cables are used for connecting a computer to a router or switch for configuration purposes, while coaxial cables are used for transmitting television signals.

Submit
149. (238) In Integrated Services Digital Network (ISDN), the "B" channel carries

Explanation

In Integrated Services Digital Network (ISDN), the "B" channel carries user traffic. This means that it is responsible for carrying the actual data that is being transmitted between the user's devices, such as voice or video signals. The "B" channel is one of the two channels in ISDN, with the other being the "D" channel which is responsible for call setup and management. Therefore, the correct answer is a. user traffic.

Submit
150. (240) Where are voice protection system servers installed?

Explanation

The voice protection system servers are installed in the Integrated Network and Security Center. This is where the servers are located to provide protection for voice communications within the Air Force.

Submit
151. (240) Which is not a characteristic and capability of a voice protection system?

Explanation

The correct answer is c. Centralizing yet distributing management. A voice protection system typically focuses on securing communications, enabling real-time notifications, and detecting and blocking modem connections. Centralizing yet distributing management is not a characteristic or capability of a voice protection system.

Submit
152. (243) Where do incoming (unswitched) circuits transmitted to the ENET enter the NT9X35A cross-point card?

Explanation

Incoming (unswitched) circuits transmitted to the NT9X35A cross-point card enter through the Vertical bus (V-bus).

Submit
153. (231) Within how many normal duty hours of completion action on the Telecommunications Service Order (TSO) must the circuit control office (CCO) submit an in-effect report?

Explanation

Within 72 normal duty hours of completion action on the Telecommunications Service Order (TSO), the circuit control office (CCO) must submit an in-effect report.

Submit
154. (252) What is the maximum detection distance in meters of an Infrared Pulsed Intrusion Detection System (IPIDS)?

Explanation

An Infrared Pulsed Intrusion Detection System (IPIDS) is a security system that uses infrared technology to detect intrusions. The maximum detection distance refers to the furthest distance at which the system can detect an intrusion. In this case, the correct answer is b. 80, indicating that the IPIDS can detect intrusions up to a maximum distance of 80 meters.

Submit
155. (222) To prevent frequency modulation (FM) radio stations from interfering with each other, the Federal Communications Commission (FCC) has set limits that allow each station to cause its oscillator frequency to deviate no more than

Explanation

To prevent interference between FM radio stations, the FCC has set limits on the amount of frequency deviation allowed for each station. This means that each station can cause its oscillator frequency to deviate no more than 75 kHz. This restriction ensures that the signals from different stations do not overlap or interfere with each other, allowing for clear and distinct reception of each station's broadcast.

Submit
156. (026) How are connectorized cables labeled?

Explanation

Connectorized cables are labeled by placing the first label within 12 inches of the connector and marking it as "TO", and the second label is placed within two (2) inches of the first label and marked "FROM". This labeling system helps identify the direction of the cable and ensures proper connectivity.

Submit
157. (027) Which section of a horizontal cable duct is used for signal and control cables?

Explanation

The upper section of a horizontal cable duct is used for signal and control cables. This section is typically designated for these types of cables to ensure proper organization and separation from other types of cables. Placing signal and control cables in the upper section also helps to minimize interference and maintain the integrity of the signals being transmitted.

Submit
158. (032) Which type of cable is the easiest to splice?

Explanation

Multimode step index fiber is the easiest to splice because it has a larger core diameter and a uniform refractive index profile, making it easier to align and join the fiber ends together. In contrast, multimode graded-index fiber has a varying refractive index profile, which can make the splicing process more challenging. Single mode fiber has a much smaller core diameter, requiring more precise alignment for splicing. Coaxial cable, on the other hand, is not typically spliced but rather terminated using connectors.

Submit
159. (227) To create a better timing environment in communications networks, external timing distribution occurs through

Explanation

External timing distribution occurs through station clocks. Station clocks are synchronized clocks that are used to distribute accurate timing signals to various devices in a communications network. These clocks ensure that all devices in the network are operating on the same time reference, which is crucial for maintaining reliable and efficient communication. By using station clocks, the timing environment in the network can be improved, leading to better synchronization and coordination among the devices.

Submit
160. (232) If a circuit fails its management threshold, what test might be performed?

Explanation

If a circuit fails its management threshold, the appropriate test to be performed would be quality control. Quality control involves the process of inspecting and testing the circuit to ensure that it meets the required standards and specifications. By conducting quality control tests, any issues or faults in the circuit can be identified and addressed, ensuring that it functions properly and meets the desired performance criteria.

Submit
161. (010) Network-based intrusion detection systems (NIDS) are

Explanation

Network-based intrusion detection systems (NIDS) are classified as passive only because they monitor network traffic passively without actively interfering or modifying it. NIDS analyze network packets and compare them against a database of known attack signatures or abnormal behaviors to detect potential intrusions. They do not actively block or prevent attacks but instead provide alerts or notifications to system administrators for further investigation and response.

Submit
162. (015) A facility with an inspectable space of more than 20 meters, but less than 100 meters would be considered to be in facility zone

Explanation

A facility with an inspectable space of more than 20 meters, but less than 100 meters would be considered to be in facility zone B. This indicates that the facility falls within a specific range of inspectable space, which is between 20 and 100 meters.

Submit
163. (016) Which type of separation ensures that every signal conductor from a RED device routes to another RED device, or becomes encrypted before connecting to a BLACK device?

Explanation

Electrical separation ensures that every signal conductor from a RED device routes to another RED device or becomes encrypted before connecting to a BLACK device. This type of separation is achieved by using techniques such as isolation transformers, opto-isolators, or galvanic isolation to prevent direct electrical connections between the RED and BLACK devices. By implementing electrical separation, the integrity and security of the signals are maintained, preventing unauthorized access or interference.

Submit
164. (252) What is the secondary mode of detection for the microwave fence sensor?

Explanation

The secondary mode of detection for the microwave fence sensor is multipath reflection. This means that the sensor detects any reflections or echoes of the microwave signal that bounce off objects or obstacles in its path. These reflections can occur due to the signal bouncing off buildings, trees, or other structures, and the sensor is able to analyze these reflections to detect any disturbances or intrusions in the monitored area.

Submit
165. (240) The vulnerabilities of voice and data converged networks were highlighted in a report released by the

Explanation

The correct answer is a. President's National Security Telecommunications Advisory Committee. This committee is responsible for advising the President on matters related to national security and telecommunications. The report released by this committee highlights the vulnerabilities of voice and data converged networks, indicating that there are potential risks and weaknesses in these networks that need to be addressed for national security purposes.

Submit
166. (240) Which is not a component of the voice protection system architecture?

Explanation

The voice protection system architecture consists of various components that work together to ensure the security and integrity of voice communications. These components include servers, software, and appliances. A firewall, however, is not typically considered a direct component of the voice protection system architecture. Firewalls are generally used to protect networks from unauthorized access and do not directly focus on voice communication security. Therefore, the correct answer is b. Firewall.

Submit
167. (220) The signaling equipment has three types of communications signals that functions to

Explanation

The signaling equipment in a communication system has three types of communication signals that are responsible for controlling and processing calls. These signals are used to establish, maintain, and terminate connections between different devices or networks. They carry information about the call setup, call progress, and call termination. Therefore, option c is the correct answer as it accurately describes the function of the signaling equipment.

Submit
168. (223) Which form of modulation is insensitive to signal variations?

Explanation

Binary-phase shift keying (BPSK) is a form of modulation that is insensitive to signal variations. In BPSK, the phase of the carrier signal is shifted by 180 degrees to represent binary data. This means that the amplitude and frequency of the carrier signal can vary without affecting the demodulation process. As long as the phase is accurately detected, the original binary data can be recovered, making BPSK robust against signal variations. Delta modulation, frequency shift keying, and pulse-amplitude modulation are all sensitive to signal variations and may result in errors during demodulation.

Submit
169. (242) What is the maximum number of ports that a Meridian System Logic–100 (MSL–100) supports?

Explanation

The Meridian System Logic-100 (MSL-100) supports a maximum of 30,000 ports.

Submit
170. (225) The method of multiplexing the T1 multiplexer uses is

Explanation

The T1 multiplexer uses time division as its method of multiplexing. Time division multiplexing involves dividing the available time slots in a communication channel into smaller intervals and assigning each interval to different signals. In the case of T1 multiplexing, multiple voice or data signals are combined into a single T1 line by allocating specific time slots to each signal. This allows for efficient transmission of multiple signals over a single line by utilizing the available time slots in a sequential manner.

Submit
171. (037) Sampled data points are stored in the memory of a digital storage oscilloscope as

Explanation

The correct answer is b. waveform points. In a digital storage oscilloscope, sampled data points are stored in memory as waveform points. These points represent the amplitude of the signal at specific time intervals. By storing the waveform points, the oscilloscope can display and analyze the signal in a graphical form, allowing users to observe the shape, frequency, and other characteristics of the signal.

Submit
172. (038) What determines the size of a test pattern segment transmitted from a bit error rate test (BERT)?

Explanation

The size of a test pattern segment transmitted from a bit error rate test (BERT) is determined by the number of bits that can represent the total number of bits in the test pattern. This means that the size of the segment is dependent on the number of bits needed to represent all the bits in the pattern.

Submit
173. (216) A digital signal that contains synchronizing bits within the signal stream describes

Explanation

A digital signal that contains synchronizing bits within the signal stream describes asynchronous operation. Synchronizing bits are used to maintain the timing and synchronization of data transmission in asynchronous communication. Asynchronous operation refers to a mode of operation where data is transmitted in an intermittent and independent manner, without requiring a constant clock signal. Therefore, the presence of synchronizing bits indicates that the signal is being transmitted asynchronously.

Submit
174. (223) The form of pulse modulation in which a discrete pulse is varied within a range of positions is known as

Explanation

Pulse-position modulation (PPM) is a form of pulse modulation where the position of a discrete pulse is varied within a range of positions. In PPM, the timing of the pulse represents the information being transmitted. This modulation technique is commonly used in digital communication systems where precise timing is crucial for accurate data transmission. Pulse-amplitude modulation (PAM) varies the amplitude of the pulse, pulse-duration modulation (PDM) varies the duration of the pulse, and pulse-code modulation (PCM) is a digital modulation technique that represents analog signals by encoding them into binary code words.

Submit
175. (211) Which of the following is not a distinct layer of a hierarchical network design?

Explanation

The correct answer is c. Transport. In a hierarchical network design, the core layer, access layer, and distribution layer are all distinct layers that serve different purposes. The core layer is responsible for high-speed data forwarding and connectivity between different parts of the network. The access layer provides connectivity for end devices and users to the network. The distribution layer acts as an intermediary between the core and access layers, providing services such as routing, filtering, and policy enforcement. However, the transport layer is not a distinct layer in a hierarchical network design. It is a layer in the OSI model that is responsible for end-to-end communication and ensures reliable data transfer between network hosts.

Submit
176. (010) Which intrusion detection system (IDS) uses software sensors?

Explanation

Host-based intrusion detection systems (IDS) use software sensors to monitor and analyze activities on a specific host or endpoint. These sensors are installed directly on the host and are capable of monitoring events such as file changes, system calls, network connections, and user activities. By analyzing these events, host-based IDS can detect and alert on suspicious or malicious activities occurring on the host itself. This makes host-based IDS particularly effective in detecting insider threats and attacks targeting specific hosts or endpoints.

Submit
177. (015) Which AF System Security Instruction (AFSSI) provides the overall implementation of DOD's TEMPEST program?

Explanation

AFSSI 7700 provides the overall implementation of DOD's TEMPEST program.

Submit
178. (035) The purpose of the miniature ON/OFF switches on a breakout box is to

Explanation

The purpose of the miniature ON/OFF switches on a breakout box is to allow the interruption of the individual interface conductors for isolated testing. This means that the switches can be used to temporarily disconnect specific interface signals, allowing for testing and troubleshooting of those signals without affecting the rest of the system. This can be useful in diagnosing and isolating issues within the interface conductors.

Submit
179. (241) How many serial data interface ports does the Meridian Option 11C Small System Controller have?

Explanation

The Meridian Option 11C Small System Controller has 3 serial data interface ports.

Submit
180. (221) Which common channel signaling (CCS) mode does the transfer of messages relating to signaling between two points occur directly over links interconnecting the signaling points?

Explanation

In the associated common channel signaling (CCS) mode, the transfer of messages relating to signaling occurs directly over links interconnecting the signaling points. This means that the signaling messages are sent and received between the specific points without any intermediate signaling points. This mode allows for a more direct and efficient communication between the signaling points, ensuring that the messages are delivered accurately and quickly.

Submit
181. (229) What document is the authority for the operations and maintenance agencies to procure specific devices and ancillary equipment necessary for the installation or operation of the circuit? a. Request for service.

Explanation

The correct answer is c. Telecommunications service order. This document serves as the authority for operations and maintenance agencies to procure specific devices and ancillary equipment needed for the installation or operation of the circuit. It outlines the details of the requested services, including the type of equipment needed and any additional requirements.

Submit
182. (230) Which DD form do you use for an official narrative log that is often used to brief unit commanders?

Explanation

The correct answer is d. 1753. The DD Form 1753 is used for an official narrative log that is often used to brief unit commanders. This form is specifically designed for recording important information and events in a chronological order, providing a comprehensive overview of activities and decisions made within the unit. It serves as a valuable tool for effective communication and decision-making within the unit command structure.

Submit
183. (245) What names are given to the shifted R–Y and B–Y signals, respectively?

Explanation

The shifted R-Y and B-Y signals are referred to as I (in-phase) and Q (quadrature) signals.

Submit
184. (246) Which digital broadcast system was adopted by the United States as the standard?

Explanation

The United States adopted the Advanced Television Systems Committee (ATSC) as the standard digital broadcast system. This system was developed to replace the previous analog television system and is used for over-the-air terrestrial television broadcasting. It provides higher quality audio and video, as well as additional features such as high-definition television (HDTV) and interactive capabilities.

Submit
185. (251) Which interior intrusion detection system is designed to detect intruders attempting to enter a shelter, storage igloo or building?

Explanation

The AN/GSS-39 is the correct answer because it is specifically designed to detect intruders attempting to enter a shelter, storage igloo, or building. The other options (AN/GSS-42, AN/GSS-41, AN/GSS-29) do not have this specific capability and are not designed for this purpose.

Submit
186. 82. (035) The purpose of a breakout box is to

Explanation

A breakout box is a device used in telecommunications and networking to allow monitoring and access to multiple conductors. It provides a convenient way to connect and disconnect multiple wires without having to directly tap into the cables. This allows technicians to easily troubleshoot and test the connections without disrupting the network. The breakout box typically has multiple ports or terminals where the conductors can be connected, and it may also have indicators or test points to monitor the signals passing through the conductors.

Submit
187. (240) During the initial research for voice system security, who recognized that the most common security threats could be addressed by voice protection system?

Explanation

The Air Force Information Warfare Battle Lab recognized that the most common security threats could be addressed by a voice protection system.

Submit
188. (009) At which open systems interconnect (OSI) layer does a packet filter gateway operate at?

Explanation

A packet filter gateway operates at the third layer of the OSI model, which is the network layer. This layer is responsible for routing and forwarding packets across different networks. A packet filter gateway examines the headers of incoming packets and makes decisions on whether to allow or block them based on predetermined rules. By operating at this layer, the packet filter gateway can filter and control network traffic based on IP addresses, ports, protocols, and other criteria.

Submit
189. (010) Which intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures?

Explanation

A network-based intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures. This means that it analyzes the network traffic and looks for any abnormal behavior or patterns that may indicate a potential intrusion or attack. It also compares the packets against a database of known virus signatures to identify any malicious activity. Network-based IDS is different from host-based IDS, which monitors the activities on individual hosts or devices.

Submit
190. (017) Which facility ground subsystem is also called the "signal ground" and controls electrical noise and static in a facility?

Explanation

The facility ground subsystem that is also called the "signal ground" is the signal reference. This subsystem is responsible for controlling electrical noise and static in a facility. It provides a stable reference point for signals and helps to maintain signal integrity by reducing interference and noise.

Submit
191. (234) When you must restore user service by rerouting, what is the second type of circuit you preempt?

Explanation

When you must restore user service by rerouting, the second type of circuit you preempt is nonactive on-call circuits. This means that if there are any circuits that are currently not in use but have been designated as on-call circuits, they will be preempted in order to restore user service.

Submit
192. (040) What protocol analyzer test window automatically runs in the background when the protocol analyzer application is activated?

Explanation

When the protocol analyzer application is activated, the test window that automatically runs in the background is the Node discovery. This feature allows the protocol analyzer to identify and locate all the nodes or devices connected to the network. It helps in providing information about the network topology and the devices present in the network.

Submit
193. (224) Which form of multiplexing is very susceptible to signal deterioration?

Explanation

Frequency-division multiplexing (FDM) is a technique that divides the available bandwidth into multiple frequency channels, each allocated to a different signal. However, FDM is susceptible to signal deterioration because it relies on the separation of signals by their frequencies. If the signals overlap or interfere with each other, it can result in signal deterioration and loss of information. This is in contrast to other forms of multiplexing such as time-division multiplexing (TDM) or wave-division multiplexing (WDM), which have different mechanisms for combining and separating signals and are less susceptible to signal deterioration.

Submit
194. (035) What do the jumper cables and side switch pins on a breakout box allow?

Explanation

The jumper cables and side switch pins on a breakout box allow for cross-patching of individual interface conductors. This means that they allow for the rearrangement or reconfiguration of the connections between different interface conductors, enabling flexibility in the setup and configuration of the interfaces.

Submit
195. (201) At what Open System Interconnection (OSI) layer are virtual circuits established, maintained and terminated?

Explanation

Virtual circuits are established, maintained, and terminated at the Transport layer of the OSI model. The Transport layer is responsible for end-to-end communication and ensures reliable and orderly delivery of data between network devices. It establishes a virtual circuit by setting up a connection between the sender and receiver, maintains it by monitoring the flow of data and handling any errors or congestion, and terminates the circuit when the communication is complete. The Network layer (option a) handles routing and logical addressing, the Physical layer (option b) deals with the physical transmission of data, and the Data link layer (option c) manages the reliable transmission of data over a physical link.

Submit
196. (242) What link is used to connect the Digital Multiplex System (DMS)-core to the DMS-bus?

Explanation

The link used to connect the Digital Multiplex System (DMS)-core to the DMS-bus is DS-512.

Submit
197. (228) Which agency has responsibility for a circuit end-to-end?

Explanation

The Circuit Control Office (CCO) is responsible for managing a circuit end-to-end. They oversee the entire circuit, ensuring its proper functioning and addressing any issues that may arise. The Defense Information Systems Agency (DISA) is a separate agency responsible for providing information technology and communications support to the U.S. Department of Defense. The Network Control Center (NCC) and Node Side Coordinator (NSC) are not specifically mentioned as having responsibility for a circuit end-to-end.

Submit
198. (230) Which DD form is used as the primary source of information when preparing DOD Information Network (DODIN) status reports?

Explanation

The correct answer is b. 1443. The DD Form 1443 is used as the primary source of information when preparing DOD Information Network (DODIN) status reports. This form provides a standardized format for reporting and documenting the status of the DODIN, including information on outages, disruptions, and other significant events. It is an important tool for tracking and managing the status of the DODIN and ensuring effective communication and coordination within the Department of Defense.

Submit
199. (251) What does the AN/GSS–39(V) system use to monitor the integrity of all sensor wiring to the control panel?

Explanation

The AN/GSS-39(V) system uses end-of-line modules to monitor the integrity of all sensor wiring to the control panel. These modules are typically installed at the end of each sensor loop and provide a way to detect any breaks or faults in the wiring. By constantly monitoring the circuit, the end-of-line module can alert the system if there is any tampering or damage to the wiring, ensuring the system's overall integrity and functionality.

Submit
200. (242) Which elements make up the control component of the SuperNode central control?

Explanation

The control component of the SuperNode central control is made up of the computing mode (CM) and the system load module (SLM). These two elements work together to manage and control the operations of the SuperNode system. The computing mode determines the mode of operation for the system, while the system load module monitors and manages the system's load to ensure optimal performance. Together, CM and SLM form the control component of the SuperNode central control.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 20, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 01, 2020
    Quiz Created by
    Jonathan Davis
Cancel
  • All
    All (200)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(030) What is the standard conductor used for data networking?
(038) Which section of a bit error rate test (BERT) set measures the...
(239) The three cornerstones of voice network system security are...
(240) What should security policies encompass to help mitigate the...
(215) What is most commonly used in data systems to express signaling...
(206) Internet protocol version 6 (IPv6) addresses are represented by
(006) To whom does the risk management (RM) process apply?
(006) What simple, systematic process allows commanders to maximize...
(210) Which topology has the stations connected in the form of a...
(249) In an Intrusion Detection System (IDS), what is the main purpose...
(020) What does an integral system of air terminals, roof conductors,...
(021) Which of these activities would generate the most electrostatic...
(022) Which power line fault category is symptomatic of a total loss...
(022) Which power line fault category is symptomatic of an...
(240) What are attempts to gain access to a switch system by posing as...
(209) Virtual Private Networks (VPNs) allow the AF to extend network...
(210) Which topology combines two or more different physical...
(211) The time it takes a switch to figure out where to forward a data...
(211) What allows transportation of all active Virtual LANs (VLAN)...
(212) What identifier differentiates one wireless local area network...
(012) What is the first line of defense in securing laptops?
(215) Individual pulses within a digital signal are
(033) When using a polishing cloth, remove a little bit of the...
(038) What type of error is the result of two successive logic one...
(040) What active test is selected on a protocol analyzer to determine...
(201) Which of the following is an example of a video compression...
(217) In what type of digital signal does the signal level move to one...
(204) Which Application layer protocol is used to synchronize the...
(003) What is defined as an integrated bundle of expert knowledge and...
(005) Which hazard is caused by heavy workloads, lack of control over...
(005) To prevent manual handling hazards, utilize team lifting when...
(005) When working on electrical circuits, the role of safety observer...
(005) When working on electrical circuits, you may only wear metal...
(208) Which router port is used for initial configuration?
(007) Which of the following is a principle of risk management (RM)?
(010) The disadvantage of a host-based intrusion detection system...
(013) The definition of integrity as applied to identification,...
(251) Which interior intrusion detection system (IIDS) sensor uses...
(252) What type alarm occurs if the sensor post cover in vertical...
(022) Which power line fault category is typically referred to as...
(022) Which type of uninterruptible power supply (UPS) is...
(001) Which 3D career field deploys, sustains, troubleshoots, and...
(028) Which type of cable does not radiate energy and is not affected...
(029) What is used to identify the polarity of a wire pair in a cable?
(034) When using an ohmmeter to take a resistance reading, what...
(036) What happens to the observed signal if you advance the...
(203) In binary-synchronous protocol, which characters establishes and...
(005) Which hazard is not one of the four major types of hazards?
(229) Which agency is the preferred transport provider for Internet...
(210) Which topology defines the way in which devices communicate and...
(211) Which device subdivides a network into smaller logical pieces,...
(213) A Management Information Base (MIB) is a collection of...
(015) Why must the use of TEMPEST-certified equipment be validated by...
(034) When a multimeter has three input terminal jacks, which jack is...
(235) Combined distribution frames encompass the functions of a main...
(040) Which component of a protocol analyzer discards frames based on...
(040) What active test on a protocol analyzer is selected to see the...
(204) Which network layer protocol matches a known Internet protocol...
(218) Which statement best describes a binary with eight-zero...
(003) Which of the following is a core competency of Cyber Transport...
(205) Which network Class has the most addresses for hosts?
(207) Which device has multiport connectivity that directs data...
(211) How many broadcast domains forms a Virtual LAN (VLAN)?
(213) Simple Network Management Protocol (SNMP) is a tool used by...
(214) Which physical security action can you take to ensure network...
(250) The basic configuration of the entry control facility includes a
(019) What is required in electronic settings to prevent equipment and...
(021) Which electronic discharge sensitive (ESD) class has a...
(222) The signal components that occur as bands above and below a...
(024) What function do facility batteries provide during normal...
(030) Pin 1 on a typical Electronics Industry...
(202) In the Open System Interconnect (OSI) model, a layer will...
(217) How many voltage levels does a binary signal have?
(004) Which AF form is used to report hazardous conditions that place...
(208) When configuring a router, you control access to privileged EXEC...
(008) An enclave that does not have a firewall and intrusion detection...
(010) One advantage of a network-based intrusion detection system...
(018) What kind of bond is normally applied to signal reference bonds?
(019) Which type of shielding utilizes braid, foil, metal wrap,...
(024) Which is not a consideration for selecting facility batteries?
(029) The thin plastic colored tape that spirals around a specific...
(031) What is the maximum operating temperature of fiber optic cable?
(033) What do you use to remove excess fiber after the connector has...
(037) What area of a digital storage oscilloscope takes digitized...
(203) Which data communication protocol is based on bits and the...
(220) Which communications control signal uses a two-frequency dialing...
(204) Which Transport layer protocol provides reliable data delivery...
(242) The primary reason you should measure the voltage across faulty...
(229) What web application is used to order telecommunications...
(008) How many Integrated Network and Operation Security Centers...
(009) You should implement all of the following security features to...
(230) If the circuit files are lost or destroyed, what document are...
(249) In an Intrusion Detection System (IDS), what must a line of...
(012) What type of certificate authenticates the identity of the user?
(014) What Air Force Systems Security Instruction (AFSSI) series...
(016) What equipment should be designated as BLACK when designating...
(017) What is the grounding resistance goal for military...
(018) Bonds in the earth electrode subsystem normally are direct...
(031) What has made very high data rate transmission possible on a...
(236) Who determines if Preventative Maintenance Inspections (PMI) are...
(204) Which Network layer protocol provides messaging that can help...
(002) Which of the following is not a communications security program...
(007) How many steps are in the risk management (RM) process?
(244) Which Digital Multiplex System (DMS)–100 database facility...
(009) Which term is used to describe the technology for transmitting...
(212) Which Institute of Electrical Electronics Engineers (IEEE)...
(212) Which wireless design phase accounts for the amount of users on...
(011) What security posture permits everything that is not...
(015) Which method of containing radiated emanations requires both...
(016) Equipment is comprised as machines that process information in...
(023) How many phases of generator power are usually required for...
(032) What are the three sections of a fiber optic cable?
(240) What provides enterprise wide visibility into telecom resource...
(216) Which option is a characteristic of synchronous data operation?
(247) What does the GVG–110 video switcher serial interface...
(231) What report must be sent if the circuit does not meet all...
(232) Trend analysis is a program that ensures circuits meet...
(214) In general, you should deny direct dial-in access to a network...
(015) What plays a major role in a conductor's ability to minimizing...
(037) What type of sampling does a digital storage oscilloscope...
(237) When a telephone network is circuit switched, each call
(040) What protocol analyzer test window provides information...
(207) Which routing protocol do internet backbones use?
(221) In common associated signaling (CAS), what is the seventh bit in...
(008) The Integrated Network Operations and Security Centers (INOSC)...
(009) At which open systems interconnect (OSI) layer does an...
(010) Host-based intrusion detection systems (HIDS) are
(222) What is the process, or result of the process, of modifying...
(033) How long do most fiber-optic epoxies take to set?
(037) Which digital storage oscilloscope button controls all waveforms...
(039) When using an optical time-domain reflectometer (OTDR), what...
(205) How many subnet bits are required to support 90 subnets on a...
(206) Teredo has four tunneling components. Which one is not one of...
(022) Which type of uninterruptible power supply (UPS) offers the...
(025) Which publication series covers standard Air Force installation...
(027) Support intervals for cables requiring surface installation will...
(028) The advantage of using coaxial cable over paired cable is that...
(040) What protocol analyzer test window reports errors that occur at...
46. (219) How many bits are in the extended superframe format (ESF)...
(225) What are the two major types of frame structures?
(226) Which wave-division multiplexing technology uses uncooled lasers...
(242) What Digital Multiplex System (DMS)–100 system contains...
(227) What do Global Positioning System (GPS) satellites use to...
(227) Which stratum level is a Global Positioning System (GPS) timing...
(211) Which of the following will minimize EtherChannel configuration...
(252) What type of signal is sent to the fence protection system (FPS)...
(017) Which facility ground subsystem uses surge arrestors?
(030) What cable type connects devices that operate at similar layers...
(238) In Integrated Services Digital Network (ISDN), the "B" channel...
(240) Where are voice protection system servers installed?
(240) Which is not a characteristic and capability of a voice...
(243) Where do incoming (unswitched) circuits transmitted to the ENET...
(231) Within how many normal duty hours of completion action on the...
(252) What is the maximum detection distance in meters of an Infrared...
(222) To prevent frequency modulation (FM) radio stations from...
(026) How are connectorized cables labeled?
(027) Which section of a horizontal cable duct is used for signal and...
(032) Which type of cable is the easiest to splice?
(227) To create a better timing environment in communications...
(232) If a circuit fails its management threshold, what test might be...
(010) Network-based intrusion detection systems (NIDS) are
(015) A facility with an inspectable space of more than 20 meters, but...
(016) Which type of separation ensures that every signal conductor...
(252) What is the secondary mode of detection for the microwave fence...
(240) The vulnerabilities of voice and data converged networks were...
(240) Which is not a component of the voice protection system...
(220) The signaling equipment has three types of communications...
(223) Which form of modulation is insensitive to signal variations?
(242) What is the maximum number of ports that a Meridian System...
(225) The method of multiplexing the T1 multiplexer uses is
(037) Sampled data points are stored in the memory of a digital...
(038) What determines the size of a test pattern segment transmitted...
(216) A digital signal that contains synchronizing bits within the...
(223) The form of pulse modulation in which a discrete pulse is varied...
(211) Which of the following is not a distinct layer of a hierarchical...
(010) Which intrusion detection system (IDS) uses software sensors?
(015) Which AF System Security Instruction (AFSSI) provides the...
(035) The purpose of the miniature ON/OFF switches on a breakout box...
(241) How many serial data interface ports does the Meridian Option...
(221) Which common channel signaling (CCS) mode does the transfer of...
(229) What document is the authority for the operations and...
(230) Which DD form do you use for an official narrative log that is...
(245) What names are given to the shifted R–Y and B–Y...
(246) Which digital broadcast system was adopted by the United States...
(251) Which interior intrusion detection system is designed to detect...
82. (035) The purpose of a breakout box is to
(240) During the initial research for voice system security, who...
(009) At which open systems interconnect (OSI) layer does a packet...
(010) Which intrusion detection system (IDS) monitors packets for...
(017) Which facility ground subsystem is also called the "signal...
(234) When you must restore user service by rerouting, what is the...
(040) What protocol analyzer test window automatically runs in the...
(224) Which form of multiplexing is very susceptible to signal...
(035) What do the jumper cables and side switch pins on a breakout box...
(201) At what Open System Interconnection (OSI) layer are virtual...
(242) What link is used to connect the Digital Multiplex System...
(228) Which agency has responsibility for a circuit end-to-end?
(230) Which DD form is used as the primary source of information when...
(251) What does the AN/GSS–39(V) system use to monitor the...
(242) Which elements make up the control component of the SuperNode...
Alert!

Advertisement