(214) What standard antenna is used for antenna gain comparison?
(405) When a security container is opened, it is inventoried at the
(214) When the gain of an anisotropic radiator is compared to the...
(005) Printer hardware configuration via the web is done through
(014) What type of network is not constrained by wire?
(005) What type of printer software configuration option requires a...
(004) What are the types of memory?
(221) What conventional land mobile radio (LMR) device serves as the...
(009) Which of these is a disadvantage of client-server networks?
(011) What rights do you need in order to add a workstation to a...
(402) The work area of the ANSI/TIA/EIA–568–B structured...
(006) The specifications that should be met, if not exceeded, to...
(401) Which principle is not addressed in the...
(006) What are minor software updates or improvements called?
(015) What are the two ways to implement a client-server?
(018) What technology enables existing data networks to carry standard...
(222) In trunked land mobile radio (LMR) systems, different user...
(006) What is the simplest and most efficient way to duplicate a...
(007) How many byte sectors is a hard disk divided into?
(024) What are the two types of fiber optic cable?
(010) What does Wi-Fi use to carry network signals to the network...
(011) What item below is not found in the Active Directory structure?
(007) A formatted disk partition that is used for a particular file...
(019) Which is NOT a basic function of antivirus programs?
(012) What is the expansion card installed in a computer to connect or...
(201) The loudness of a sound is closely related to what part of the...
(402) Horizontal cabling is considered as one of the six subsystems of...
(011) User accounts are uniquely identified by the
(021) With a software license agreement, who has the full rights to...
(021) What is an essential tool for any Client Systems Technician to...
(016) A public key to encode data and a private key to decode data...
(405) This form is used to record visitors into restricted areas.
(022) The most common hardware diagnostic tool is the
(410) The Asset Inventory Management (AIM) system includes what type...
(012) What is installed on a computer to act as the interface between...
(411) Which voicemail system was one of the earliest digital voicemail...
(007) Which sector is called the master boot sector or the master boot...
(224) What type areas is International Mobile Satellite Organization...
(005) What must be created when using TCP/IP printing during software...
(215) What limits a direct wave to normally less than 20 miles?
(209) What component in the video teleconferencing (VTC) system...
(403) What area is described as the complete building or facility area...
(028) What determines how often a backup is run?
(403) Protected distribution systems (PDS) require which scheduled...
(001) What entails how we communicate and manage data?
(406) Which secure voice telephone can be used on the Integrated...
(218) Which personal wireless communications system (PWCS) device can...
(025) What piece of test equipment can help verify connectivity and...
(403) Protected distribution systems (PDS) events such as alarms and...
(026) What tool can launch individual troubleshooting/configuration...
(403) A line route inspection of a protected distribution system (PDS)...
(406) What provides the Secure Telephone Equipment (STE) with its...
(001) What are information systems?
(001) What part of client systems includes the physical aspect of...
(413) What are the two types of accounts supported by Windows...
(001) What devices are mostly small, lightweight, and designed for...
(404) Which authorities are trusted entities that issue certificates?
(203) Which models of end offices in the Digital Multiplex System...
(002) Any hardware added to a computer that expands its capabilities...
(404) It is a publicly known cryptographic algorithm that converts...
(203) Which model of Digital Multiplex System (DMS)–100 family...
(001) What aspect of client systems are you working on if you...
(405) What reference would you use for guidance on Air Force...
(026) Use which tool to list all installed device drivers and their...
(016) What is an electronic credit card-like device that establishes...
(402) Which subsystem of the ANSI/TIA/EIA–568-B structured...
(002) What program translates commands between a device and the...
(230) The primary reason you measure the voltage across terminal or...
(002) What interface entails wires, plugs, and sockets?
(408) In Remedy, tickets can be assigned to whom?
(018) What drives faster processing speeds and increases the power of...
(212) What component of a frequency modulated (FM) receiver removes...
(004) What describes how a computer finds a specific byte it is...
(018) Which is not a valid form of identity management?
(018) What protocol provides an almost unlimited number of Internet...
(414) What AFI governs the format of alias names?
(413) Why are users required to change their passwords upon logging...
(027) When troubleshooting after a system failure, this step is a last...
(028) This practice uses tapes, electronic vaulting, or mirrored disks...
(403) What Air Force Systems Security Instruction (AFSSI) directs...
(214) For best communications, the transmitting antenna
(405) Top secret keying material must be handled, stored, transported...
(401) What condition occurs when a signal is induced into one circuit...
(017) Computers can communicate with wireless routers at both 2.4GHz...
(202) In hertz (Hz), what is the actual voice frequency band?
(207) Integrated Services Digital Network (ISDN) can combine voice and...
(022) What is one of the best habits a Client Systems Technician can...
(210) How many channels are used when a voice over Internet Protocol...
(218) Which personal wireless communications system (PWCS) device's...
(002) What main component of a computer oversees everything that a PC...
(212) The process of mixing or combining two frequencies in a...
(002) What is the point of attachment to a computer system or unit?
(232) What is the long-haul transmission component of Theater...
(214) What field provides the basis of radio frequency (RF)...
(405) Which form is used as a register log to record visitors into...
(010) Who defines the terms that outlines how Wi-Fi works?
(406) What is the newest generation of secure voice telephone?
(006) Which of these is not a prominent characteristic of an operating...
(401) What are the 2 ways to reduce crosstalk?
(401) What cabling is the most commonly used?
(010) What type of remote network provides a private tunnel through...
(007) The first sector at the beginning of a hard drive is called the...
(201) The process of condensation occurs when air particles are
(401) Which principle is not addressed in the...
(019) Who centrally manages the Air Force server updates that keep...
(024) What command can be used to get current configuration...
(024) Which of these three options CANNOT be used with the...
(401) Which TIA/EIA parameter test is a measure of the unwanted signal...
(406) Where can TACLANEs be used to overlay Secure Virtual Networks?
(012) Who manages the assignment of MAC addresses and how do they...
(023) Which item is not a good practice in helping with future...
(012) What is the unique identification number a network interface...
(403) What is the TEMPEST program in the Air Force called?
(012) How many connector interfaces does a network interface card...
(208) One of the main purposes of the Integrated Services Digital...
(028) Which of these are NOT a different media options currently...
(028) The focus of all backups should be the data only and not...
(023) Which alarm category in the network management system indicates...
(023) What can occur when bytes of data are formed into segments,...
(008) By default, the first domain controller in active directory...
(406) Which port on the office version Secure Telephone Equipment...
(211) The ultra high frequency designation applies to frequencies from
(226) What is another name for a stuffing or S-bit in relationship to...
(006) What are the three main types of user interfaces?
(412) Which Telecommunications Management System (TMS) network...
(411) The earliest digital voicemail system is Meridian Mail.
(404) Which cryptology system has a disadvantage of using more...
(015) In a network environment, what may be responsible for all or...
(404) In Secure Socket Layer (SSL), before an encrypted transaction...
(002) The transfer of eight bits of data simultaneously through eight...
(212) What communication mode(s) of operation allows two or more...
(017) What device receives information from the internet and...
(212) Producing radio frequency (RF) energy and radiating useful...
(402) What cabling system subsystem provides any or all of the...
(003) The term used to refer to the process of launching the OS is the
(017) If this security feature is enabled on a wireless network,...
(402) Which subsystem of the ANSI/TIA/EIA–568–B structured...
(018) What technology involves the capture and storage of a...
(004) Which type of memory stores configuration information, and is...
(004) What type of memory is nonvolatile, considered permanent, and is...
(024) What is the standard connector/cable used on a network?
(004) Which type of memory is used to duplicate frequently used...
(028) Which media has a storage capacity of gigabyte (GB) –...
(404) Triple Data Encryption Standard (DES) is based on three compound...
(004) Which is a very simple example of an error detecting code?
(403) In the RED/BLACK concept, what type of traffic do RED lines...
(014) What transmission mediums are used by wireless networks?
(406) The Tactical Local Area Network Encryptor (TACLANE)–Micro...
(227) What Meridian application provides local area network (LAN)...
(006) Which hardware requirement is defined as the model and the clock...
(201) In hertz (Hz), what range of sound can the human ear detect?
(403) What is the purpose of the TEMPEST program?
(004) Normally, how many bits long are memory addresses that computers...
(026) A central place that contains links to multiple Windows...
(023) Within how many bytes of a transmission should a network...
(225) What is the transmission rate, in megabits per second (Mbps), of...
(210) What is the control system that generates a signal with a fixed...
(013) What stores print jobs in a print queue until a printer becomes...
(015) What are the two major ways to implement a client server...
(405) The Communications Security (COMSEC) program is designed to
(017) What piece of equipment is at the core of most Wi-Fi networks?
(203) What contains bays of the same functional equipment?
(005) A static internet protocol address on a network printer during...
(404) Which encryption is not a telecommunications encryption type?
(008) What physical structure manages user access to a network?
(019) Destructive programs designed to degrade or destroy network...
(006) What should be done before anything else, once the operating...
(401) What test is performed to determine the time needed for the...
(206) What is a method of putting many users on a single cable pair?
(008) What physical structure component is a collection of Internet...
(016) What is the term for anything that causes availability,...
(021) Which Air Force Instruction governs software use?
(207) What type of information is transmitted on a Integrated Services...
(406) What is the newest generation of secure voice and data equipment...
(026) What tool can assign hard drives as primary or secondary?
(026) System, Application, and Security logs can be found here.
(223) In response to disaster relief operations, the Department of...
(023) What function enables the higher layer protocol data units to...
(023) Which is not a way in which round trip delay can be determined?
(216) Which type of precipitation attenuates radio frequency (RF)...
(219) What channel access method assigns each call a certain portion...
(406) The KIV–7 cryptographic device provides protection up to...
(404) When using a Secure Terminal Equipment (STE), what is encrypted?
(410) What type of database is AIM and where does it reside?
(404) What components are used in both encryption and decryption?
(406) What is the maximum throughput in megabits per second (Mbps) for...
(219) Who is usually responsible for their air time charges and must...
(413) Which is not a use for local user accounts?
(017) How does a router send information to the internet on a wireless...
(408) Who may close tickets in Remedy?
(413) What are the two types of accounts supported by Windows OSs?
(026) This operating system tool allows the viewing of the number of...
(414) What publication governs the format of Alias names for email...
(232) What Integrated Communications Access Package (ICAP) node module...
(004) This type of memory is blank and instructions can be placed on...
(004) Which term describes that data is whole or complete?
(002) Which port eliminates the need to install expansion cards?
(007) What is a rigid platter that spins at a high rate of speed with...
(005) Reading and storing a document on a hard disk or some other...
(005) A spooled print job be several times larger than the printed...