CDC 3D151 Client Systems Journeyman Volume 3. Communications Systems Security And Management

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Atwellicus
A
Atwellicus
Community Contributor
Quizzes Created: 2 | Total Attempts: 383
| Attempts: 101
SettingsSettings
Please wait...
  • 1/86 Questions

    What condition occurs when a signal is induced into one circuit from another?

    • Noise
    • Jabber
    • Crosstalk
    • Intelligence
Please wait...
About This Quiz

This quiz assesses knowledge in communications systems security and management, focusing on cabling standards, signal issues like crosstalk, and data rate capabilities. It is designed for learners aiming to enhance their understanding in client systems, particularly within military contexts.

CDC 3D151 Client Systems Journeyman Volume 3. Communications Systems Security And Management - Quiz

Quiz Preview

  • 2. 

    What area is described as the complete building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

    • Controlled Access Area (CAA)

    • Restricted Access Area (RAA)

    • Limited-Control Area (LCA)

    • Uncontrolled Access Area (UAA)

    Correct Answer
    A. Controlled Access Area (CAA)
    Explanation
    403. 1-7

    Rate this question:

  • 3. 

    What cabling is the most commonly used?

    • Unshielded twisted pair (UTP)

    • Screened twisted pair (ScTP)

    • Shielded twisted pair (STP)

    • Foiled twisted pair (FTP)

    Correct Answer
    A. Unshielded twisted pair (UTP)
    Explanation
    401. 1-2

    Rate this question:

  • 4. 

    What category (Cat) of cable can support data rates up to 100Mbps?

    • Cat 3

    • Cat 5

    • Cat 6

    • Cat 5E

    Correct Answer
    A. Cat 5
    Explanation
    401. 1-2

    Rate this question:

  • 5. 

    Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?

    • Near-end crosstalk (NEXT)

    • Powersum near-end crosstalk (PSNEXT)

    • Powersum alien near-end crosstalk (PSANEXT)

    • Powersum insertion loss to alien crosstalk ratio far-end (PSAACRF)

    Correct Answer
    A. Near-end crosstalk (NEXT)
    Explanation
    401. 1-3

    Rate this question:

  • 6. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling?

    • Entrance facility

    • Equipment room

    • Commercial demark

    • Telecommunications room

    Correct Answer
    A. Entrance facility
    Explanation
    402. 1-4

    Rate this question:

  • 7. 

    What cabling system subsystem provides any or all of the functions of a telecommunications room?

    • Entrance facility

    • Equipment room

    • Systems room

    • Work area

    Correct Answer
    A. Equipment room
    Explanation
    402. 1-4

    Rate this question:

  • 8. 

    Which ANSI/TIA/EIA standard defines labeling cables and patch panels?

    • 606-A

    • 666-A

    • 568-A

    • 568-B

    Correct Answer
    A. 606-A
    Explanation
    402. 1-6

    Rate this question:

  • 9. 

    What is the TEMPEST program in the Air Force called?

    • Communications Security

    • Transmission Security

    • Emission Security

    • Computer Security

    Correct Answer
    A. Emission Security
    Explanation
    403. 1-7

    Rate this question:

  • 10. 

    What infrastructure is a set of hardware, software, policies and procedures used to create, manage, store, distribute and revoke digital certificates?

    • Private Key

    • Public Key

    • Secure Key

    • Authentication Key

    Correct Answer
    A. Public Key
    Explanation
    404. 2-2

    Rate this question:

  • 11. 

    The Communications Security (COMSEC) program is designed to

    • Relocate classified material to strengthen security

    • Conduct assessments to evaluate compromise of national security

    • Deflect unauthorized interception and analysis of compromising emanations

    • Detect and correct procedural weaknesses that could expose critical information

    Correct Answer
    A. Detect and correct procedural weaknesses that could expose critical information
    Explanation
    405. 2-4

    Rate this question:

  • 12. 

    When a security container is opened, it is inventoried at the

    • Beginning of the week

    • Beginning of the duty day

    • End of the week or month

    • End of the shift or duty day

    Correct Answer
    A. End of the shift or duty day
    Explanation
    405. 2-6

    Rate this question:

  • 13. 

    What is the newest generation of secure voice telephone?

    • Secure Telephone Unit (STU)

    • Cryptographic Telephone (CT)

    • Secure Terminal Equipment (STE)

    • Pretty Good Privacy Phone (PGPfone)

    Correct Answer
    A. Secure Terminal Equipment (STE)
    Explanation
    406. 2-10

    Rate this question:

  • 14. 

    The KIV-7 cryptographic device provides protection up to what classification level?

    • Secret

    • Top Secret

    • Confidential

    • For Official Use Only (FOUO)

    Correct Answer
    A. Top Secret
    Explanation
    406. 2-12

    Rate this question:

  • 15. 

    The Tactical Local Area Network Encryptor (TACLANE)-Micro is a packet encryption device for Internet Protocol (IP)

    • Version 4 only

    • Version 5 only

    • Version 4 and version 5

    • Version 4 and version 6

    Correct Answer
    A. Version 4 and version 6
    Explanation
    406. 2-14

    Rate this question:

  • 16. 

    Which common crypto fill device is capable of downloading cryptographic keys to over 70 end item Communication Security (COMSEC) equipment and communications systems?

    • KOI-18 General Purpose Tape Reader

    • KYK-13 Electronic Transfer Device

    • AN/PYQ-10 Simple Key Loader

    • AN/CYZ-10 Data Transfer Device

    Correct Answer
    A. AN/PYQ-10 Simple Key Loader
    Explanation
    407. 2-17

    Rate this question:

  • 17. 

    In Remedy, tickets can be assigned to whom?

    • A resolution group only

    • A specific technician only

    • A resolution group or specific technician

    • Remedy automatically assigns tickets

    Correct Answer
    A. A resolution group or specific technician
    Explanation
    408. 3-1

    Rate this question:

  • 18. 

    Which is not a function that maintainers perform with the Integrate Maintenance Data System (IMDS)?

    • Automate equipment history, scheduling, and other processes

    • Function as a common interactive interface for other systems

    • Roll base-level logistics data up to the Air Force level

    • Provide status and inventory data

    Correct Answer
    A. Roll base-level logistics data up to the Air Force level
    Explanation
    409. 3-2

    Rate this question:

  • 19. 

    Which feature is an automated Telecommunications Management System (TMS) advantage?

    • Design

    • Site specific

    • Software compatibility

    • Data network restrictions

    Correct Answer
    A. Design
    Explanation
    412. 3-6

    Rate this question:

  • 20. 

    Why are users required to change their passwords upon logging onto the network for the first time?

    • To ensure users don't create vulnerability by leaving the default password in place

    • To ensure users understand how to create a password

    • To ensure the integrity of each users' unique password

    • To ensure users remember their unique password

    Correct Answer
    A. To ensure users don't create vulnerability by leaving the default password in place
    Explanation
    413. 3-10

    Rate this question:

  • 21. 

    Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?

    • Minimum requirements for telecommunications cabling

    • Life span of a telecommunications cabling system

    • Connecting hardware performance specifications

    • Color of the cable

    Correct Answer
    A. Color of the cable
    Explanation
    401. 1-2

    Rate this question:

  • 22. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling can be used for connections between floors?

    • Intra cabling

    • Backbone cabling

    • Vertical cabling

    • Horizontal cabling

    Correct Answer
    A. Backbone cabling
    Explanation
    402. 1-4

    Rate this question:

  • 23. 

    Which subsystem of the ANSI/TIA/EIA-569-B structured cabling extends from the telecommunications room to the work area telecommunications information outlets?

    • Intra cabling

    • Backbone cabling

    • Vertical cabling

    • Horizontal cabling

    Correct Answer
    A. Horizontal cabling
    Explanation
    402. 1-4

    Rate this question:

  • 24. 

    TEMPEST is 

    • An unclassified term and a US Government code word that identifies an unclassified set of standards

    • An unclassified term and a US Government code word that identifies a classified set of standards

    • A classified term and a US Govnerment code word that identifies an unclassified set of standards

    • A classified term and a US Government code word that identifies a classified set of standards

    Correct Answer
    A. An unclassified term and a US Government code word that identifies a classified set of standards
    Explanation
    403. 1-7

    Rate this question:

  • 25. 

    What is the purpose of the TEMPEST program?

    • Eliminate all instances of radiation of electrical impulses

    • Reduce the chances of radiation of electrical impulses

    • Improve the signal of radiation of electrical impulses

    • Increase the range of radiation of electrical impulses

    Correct Answer
    A. Reduce the chances of radiation of electrical impulses
    Explanation
    403. 1-7

    Rate this question:

  • 26. 

    A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the 

    • Total surface

    • Visible area

    • Observable area

    • Concealed area

    Correct Answer
    A. Total surface
    Explanation
    403. 1-8

    Rate this question:

  • 27. 

    What is the difference between data encryption and voice encryption?

    • Data is faster

    • Voice is faster

    • In data, the encryption is handled by separate device

    • In voice, the encryption is handled by a separate device

    Correct Answer
    A. In data, the encryption is handled by separate device
    Explanation
    404. 2-2

    Rate this question:

  • 28. 

    Which cryptology system has a disadvantage of using more processing power and time?

    • Symmetric

    • Asymmetric

    • Diametric

    • None of the above, they're all the same

    Correct Answer
    A. Asymmetric
    Explanation
    404. 2-2

    Rate this question:

  • 29. 

    Which authorities are trusted entities that issue certificates?

    • Hash

    • Repository

    • Certification

    • Authentication

    Correct Answer
    A. Certification
    Explanation
    404. 2-2

    Rate this question:

  • 30. 

    Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

    • One

    • Two

    • Three

    • Four

    Correct Answer
    A. Three
    Explanation
    404. 2-3

    Rate this question:

  • 31. 

    Which encryption is not a telecommunications encryption type?

    • Narrowband

    • Network

    • Bulk

    • Open

    Correct Answer
    A. Open
    Explanation
    404. 2-3

    Rate this question:

  • 32. 

    Which Communications Security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

    • Cyptosecurity

    • Physical security

    • Emission security

    • Transmission security

    Correct Answer
    A. Physical security
    Explanation
    405. 2-5

    Rate this question:

  • 33. 

    Top secret keying material must be handled, stored, transported and destroyed under

    • Courier control

    • Communications Security (COMSEC) manager control

    • Two-person integrity (TPI) control

    • COMSEC Responsible Officer (CRO) control

    Correct Answer
    A. Two-person integrity (TPI) control
    Explanation
    405. 2-5 & 2-6

    Rate this question:

  • 34. 

    Which form is used as a register log to record visitors into restricted areas?

    • AF Form 1019

    • AF Form 1109

    • AF Form 1119

    • AF Form 1190

    Correct Answer
    A. AF Form 1109
    Explanation
    405. 2-8

    Rate this question:

  • 35. 

    Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

    • Secure Telephone Unit (STU)

    • Cryptographic Telephone (CT)

    • Secure Terminal Equipment (STE)

    • Pretty Good Privacy Phone (PGPfone)

    Correct Answer
    A. Secure Terminal Equipment (STE)
    Explanation
    406. 2-10

    Rate this question:

  • 36. 

    The Secure Telephone Equipment (STE) consists of what two parts?

    • Host terminal and removable security core

    • Security core and removable host terminal

    • Host terminal and removable secret core

    • Secret core and removable host terminal

    Correct Answer
    A. Host terminal and removable security core
    Explanation
    406. 2-10

    Rate this question:

  • 37. 

    The Secure Telephone Equipment (STE) cannot communicate securely with the 

    • STU-III

    • Satellite telephone

    • Cellular telephone

    • Land mobile radio

    Correct Answer
    A. Land mobile radio
    Explanation
    406. 2-11

    Rate this question:

  • 38. 

    Which port on the office version Secure Telephone Equipment (STE) can be used to connect to a fax machine?

    • Universal Serial Bus (USB)

    • EIA 530

    • RS-232

    • Firewire

    Correct Answer
    A. RS-232
    Explanation
    406. 2-11

    Rate this question:

  • 39. 

    What provides the Secure Telephone Equipment (STE) with its security services?

    • Fortezza card

    • Crypto ignition key

    • Common access card

    • Traffic Encryption Key

    Correct Answer
    A. Fortezza card
    Explanation
    406. 2-11

    Rate this question:

  • 40. 

    TACLANE-Classic and TACLANE-E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for which type of network?

    • Serial networks

    • Tactical networks

    • Point to point connections

    • Internet Protocol networks

    Correct Answer
    A. Internet Protocol networks
    Explanation
    406. 2-13

    Rate this question:

  • 41. 

    What is the maximum throughput in megabits per second (Mbps) for the TACLANE-E100

    • 165 for full-duplex and 100 for half-duplex

    • 165 for full duplex and 44.736 for half-duplex

    • 44.736 for Asynchronous Transfer Mode and 100 for half-duplex

    • 100 for full-duplex and 44.736 for Asynchronous Transfer Mode

    Correct Answer
    A. 165 for full-duplex and 100 for half-duplex
    Explanation
    406. 2-13.

    Rate this question:

  • 42. 

    The Tactical Local Area Network Encryptor (TACLANE)-Micro may be equipped to handle all of the following types of networks except?

    • Asynchronous Transfer Mode (ATM)

    • Gigabit Ethernet

    • Fast Ethernet

    • Wireless

    Correct Answer
    A. Wireless
    Explanation
    406. 2-14

    Rate this question:

  • 43. 

    Who may close tickets in Remedy?

    • Customer

    • Technician

    • Shift lead

    • Help Desk

    Correct Answer
    A. Help Desk
    Explanation
    408. 3-2

    Rate this question:

  • 44. 

    Integrate Maintenance Data System (IMDS) is an Air Force enterprise-level automated maintenance management information system for

    • Weapons systems and support equipment

    • Weapons systems and operations equipment

    • Communication systems and support equipment

    • Communication systems and operations equipment

    Correct Answer
    A. Weapons systems and support equipment
    Explanation
    409. 3-2

    Rate this question:

  • 45. 

    The Asset Inventory Management (AIM) is part of what?

    • Air Force Equipment Management System (AFEMS)

    • Telecommunications Management System (TMS)

    • Integrated Maintenance Data System (IMDS)

    • Automated Information System (AIS)

    Correct Answer
    A. Air Force Equipment Management System (AFEMS)
    Explanation
    410. 3-3

    Rate this question:

  • 46. 

    The Asset Inventory Management (AIM) system includes what type of database and is located where?

    • Access database at Randolph AFB

    • Access database at Wright-Patterson AFB

    • Oracle database at Wright-Patterson AFB

    • Oracle database at Randolph AFB

    Correct Answer
    A. Oracle database at Wright-Patterson AFB
    Explanation
    410. 3-3

    Rate this question:

  • 47. 

    Which voicemail system was one of the earliest digital voicemail systems running on a private branch exchange (PBX)?

    • Nortel mail

    • Meridian mail

    • Avaya mail

    • Call pilot

    Correct Answer
    A. Meridian mail
    Explanation
    411. 3-5

    Rate this question:

  • 48. 

    Which application has not been used for automating central office records?

    • Configuration Accounting Information Retrieval System (CAIRS)

    • Telephone Plant Automated Records System (Telpars)

    • Integrated Maintenance Data System (IMDS)

    • Microsoft Access

    Correct Answer
    A. Integrated Maintenance Data System (IMDS)
    Explanation
    412. 3-6

    Rate this question:

  • 49. 

    Which Telecommunications Management System (TMS) network management functional area contains line, circuit, cable, and customer information?

    • Fault management

    • Security management

    • Performance management

    • Configuration management

    Correct Answer
    A. Configuration management
    Explanation
    412. 3-7

    Rate this question:

Quiz Review Timeline (Updated): Jul 15, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 15, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 15, 2017
    Quiz Created by
    Atwellicus
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.