CDC 3D151 Client Systems Journeyman Volume 3. Communications Systems Security And Management

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Atwellicus
A
Atwellicus
Community Contributor
Quizzes Created: 2 | Total Attempts: 383
| Attempts: 101 | Questions: 86
Please wait...
Question 1 / 86
0 %
0/100
Score 0/100
1. What area is described as the complete building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

Explanation

403. 1-7

Submit
Please wait...
About This Quiz
CDC 3D151 Client Systems Journeyman Volume 3. Communications Systems Security And Management - Quiz

This quiz assesses knowledge in communications systems security and management, focusing on cabling standards, signal issues like crosstalk, and data rate capabilities. It is designed for learners aiming to enhance their understanding in client systems, particularly within military contexts.

2. What condition occurs when a signal is induced into one circuit from another?

Explanation

401. 1-1

Submit
3. The Communications Security (COMSEC) program is designed to

Explanation

405. 2-4

Submit
4. Why are users required to change their passwords upon logging onto the network for the first time?

Explanation

413. 3-10

Submit
5. In Remedy, tickets can be assigned to whom?

Explanation

408. 3-1

Submit
6. What cabling is the most commonly used?

Explanation

401. 1-2

Submit
7. What category (Cat) of cable can support data rates up to 100Mbps?

Explanation

401. 1-2

Submit
8. What is the TEMPEST program in the Air Force called?

Explanation

403. 1-7

Submit
9. Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?

Explanation

401. 1-3

Submit
10. Which is not a function that maintainers perform with the Integrate Maintenance Data System (IMDS)?

Explanation

409. 3-2

Submit
11. Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling?

Explanation

402. 1-4

Submit
12. What cabling system subsystem provides any or all of the functions of a telecommunications room?

Explanation

402. 1-4

Submit
13. The Tactical Local Area Network Encryptor (TACLANE)-Micro is a packet encryption device for Internet Protocol (IP)

Explanation

406. 2-14

Submit
14. Which ANSI/TIA/EIA standard defines labeling cables and patch panels?

Explanation

402. 1-6

Submit
15. The KIV-7 cryptographic device provides protection up to what classification level?

Explanation

406. 2-12

Submit
16. When a security container is opened, it is inventoried at the

Explanation

405. 2-6

Submit
17. What infrastructure is a set of hardware, software, policies and procedures used to create, manage, store, distribute and revoke digital certificates?

Explanation

404. 2-2

Submit
18. Which feature is an automated Telecommunications Management System (TMS) advantage?

Explanation

412. 3-6

Submit
19. What is the newest generation of secure voice telephone?

Explanation

406. 2-10

Submit
20. Which common crypto fill device is capable of downloading cryptographic keys to over 70 end item Communication Security (COMSEC) equipment and communications systems?

Explanation

407. 2-17

Submit
21. Which Communications Security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

Explanation

405. 2-5

Submit
22. TACLANE-Classic and TACLANE-E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for which type of network?

Explanation

406. 2-13

Submit
23. Which port on the office version Secure Telephone Equipment (STE) can be used to connect to a fax machine?

Explanation

406. 2-11

Submit
24. Who may close tickets in Remedy?

Explanation

408. 3-2

Submit
25. What is the purpose of the TEMPEST program?

Explanation

403. 1-7

Submit
26. Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?

Explanation

401. 1-2

Submit
27. What provides the Secure Telephone Equipment (STE) with its security services?

Explanation

406. 2-11

Submit
28. Integrate Maintenance Data System (IMDS) is an Air Force enterprise-level automated maintenance management information system for

Explanation

409. 3-2

Submit
29. What is the maximum throughput in megabits per second (Mbps) for the TACLANE-E100

Explanation

406. 2-13.

Submit
30. Which subsystem of the ANSI/TIA/EIA-568-B structured cabling can be used for connections between floors?

Explanation

402. 1-4

Submit
31. A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the 

Explanation

403. 1-8

Submit
32. Top secret keying material must be handled, stored, transported and destroyed under

Explanation

405. 2-5 & 2-6

Submit
33. The Asset Inventory Management (AIM) is part of what?

Explanation

410. 3-3

Submit
34. Which subsystem of the ANSI/TIA/EIA-569-B structured cabling extends from the telecommunications room to the work area telecommunications information outlets?

Explanation

402. 1-4

Submit
35. The Asset Inventory Management (AIM) system includes what type of database and is located where?

Explanation

410. 3-3

Submit
36. The Tactical Local Area Network Encryptor (TACLANE)-Micro may be equipped to handle all of the following types of networks except?

Explanation

406. 2-14

Submit
37. Which voicemail system was one of the earliest digital voicemail systems running on a private branch exchange (PBX)?

Explanation

411. 3-5

Submit
38. Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

Explanation

404. 2-3

Submit
39. Which application has not been used for automating central office records?

Explanation

412. 3-6

Submit
40. Which encryption is not a telecommunications encryption type?

Explanation

404. 2-3

Submit
41. What is the difference between data encryption and voice encryption?

Explanation

404. 2-2

Submit
42. Which cryptology system has a disadvantage of using more processing power and time?

Explanation

404. 2-2

Submit
43. Which authorities are trusted entities that issue certificates?

Explanation

404. 2-2

Submit
44. Which form is used as a register log to record visitors into restricted areas?

Explanation

405. 2-8

Submit
45. Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

Explanation

406. 2-10

Submit
46. Which Telecommunications Management System (TMS) network management functional area contains line, circuit, cable, and customer information?

Explanation

412. 3-7

Submit
47. The Secure Telephone Equipment (STE) consists of what two parts?

Explanation

406. 2-10

Submit
48. TEMPEST is 

Explanation

403. 1-7

Submit
49. The Secure Telephone Equipment (STE) cannot communicate securely with the 

Explanation

406. 2-11

Submit
50. Which network management functional area monitors and audits the Telecommunications Management System (TMS) operating level?

Explanation

412. 3-7

Submit
51. What are the two types of accounts supported by Windows operation systems?

Explanation

413. 3-9

Submit
52. Which is not a use for local user accounts?

Explanation

413. 3-9

Submit
53. What reference would you use for guidance on Air Force messaging?

Explanation

405. 2-4

Submit
54. Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?

Explanation

401. 1-2

Submit
55. Only after what, are tickets allowed to be placed in the "Closed" status in Remedy?

Explanation

408. 3-2

Submit
56. What publication governs the format of Alias names for email accounts?

Explanation

414. 3-12

Submit
57. Protected distribution systems (PDS) events such as alarms and inspections are recorded where?

Explanation

403. 1-8

Submit
58. The KG-175D is what type of Tactical Local Area Network Encryptor (TACLANE)?

Explanation

406. 2-14

Submit
59. Which subsystem of the ANSI/TIA/EIA-569-B structured cabling can be used to interconnect buildings?

Explanation

402. 1-4

Submit
60. The work area of the ANSI/TIA/EIA-568-B structured cabling system consists of all except which components? 

Explanation

402. 1-5

Submit
61. Data Encryption Standard (DES) uses how many bits for its key?

Explanation

404. 2-3

Submit
62. The Tactical Local Area Network Encryptor (TACLANE)-Micro can acquire an Internet Protocol (IP) address via Dynamic Host Configuration Protocol (DHCP) on which side?

Explanation

406. 2-14

Submit
63. Which method is not a means for secure telecommunications?

Explanation

403. 1-7

Submit
64. The Tactical Local Area Network Encryptor (TACLANE)-Micro can be used to overlay what type of networks on top of existing public and private network infrastructures?

Explanation

406. 2-14

Submit
65. Communications Security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure

Explanation

405. 2-4

Submit
66. The Air Force has adopted Telecommunications Management System (TMS) as the standard application to maintain and generate

Explanation

412. 3-6

Submit
67. What are the two basic types of computer cryptoplogy?

Explanation

404. 2-2

Submit
68. The RED/BLACK concept has which two parts?

Explanation

403. 1-7

Submit
69. Which feature is an automated Telecommunications Management System (TMS) advantage?

Explanation

412. 3-6

Submit
70. What are the two major types of encryption algorithms in use today that operate by encypting or decrypting one chunk of data at a time?

Explanation

404. 2-3

Submit
71. Protected distribution systems (PDS) require wich scheduled instpections?

Explanation

403. 1-8

Submit
72. Which TIA/EIA parameter test is a measure of the degree of impedance mismatch between two impedances?

Explanation

401. 1-3

Submit
73. Which form is used with a transfer report to accompany a Communications Security (COMSEC) package?

Explanation

405. 2-6

Submit
74. What Air Force Systems Security Instruction (AFSSI) directs implementation of protected distribution systems?

Explanation

403. 1-7

Submit
75. When using a Secure Terminal Equipment (STE), what is encrypted?

Explanation

404. 2-1

Submit
76. In the RED/BLACK concept, what type of traffic do RED lines carry?

Explanation

403. 1-7

Submit
77. Which common crypto fill device is battery powered and has no internal memory storage?

Explanation

407. 2-15

Submit
78. Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy Communications Security (COMSEC) material?

Explanation

405. 2-5

Submit
79. Which subsystem of the ANSI/TIA/EIA-568-B structured cabling recognizes multimode cable?

Explanation

402. 1-5

Submit
80. Which way to send a network message using the Call Pilot voice mail system is only available with the Audio Message Interchange Specification (AMIS) protocol?

Explanation

411. 3-5

Submit
81. The KIV-7 does not  support which set of electrical standards?

Explanation

206. 2-13

Submit
82. What components are used in both encryption and decryption?

Explanation

404. 2-2

Submit
83. In Secure Socket Layter (SSL), before an encrypted transaction takes place, what does the web server give to the browser?

Explanation

404. 2-3

Submit
84. Which common crypto fill device is a hand-held personal computer compatible device and is a Cryptographic Controlled Item (CCI)?

Explanation

407. 2-16

Submit
85. Which common crypto fill device uses the Windows CE operating system?

Explanation

407. 2-17

Submit
86. Which TIA/EIA parameter test is a measure of the decrease of signal strength as it travels down the media?

Explanation

401. 1-3

Submit
View My Results

Quiz Review Timeline (Updated): Jul 15, 2024 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 15, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 15, 2017
    Quiz Created by
    Atwellicus
Cancel
  • All
    All (86)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What area is described as the complete building or facility area under...
What condition occurs when a signal is induced into one circuit from...
The Communications Security (COMSEC) program is designed to
Why are users required to change their passwords upon logging onto the...
In Remedy, tickets can be assigned to whom?
What cabling is the most commonly used?
What category (Cat) of cable can support data rates up to 100Mbps?
What is the TEMPEST program in the Air Force called?
Which TIA/EIA parameter test is a measure of the unwanted signal...
Which is not a function that maintainers perform with the...
Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system...
What cabling system subsystem provides any or all of the functions of...
The Tactical Local Area Network Encryptor (TACLANE)-Micro is a packet...
Which ANSI/TIA/EIA standard defines labeling cables and patch panels?
The KIV-7 cryptographic device provides protection up to what...
When a security container is opened, it is inventoried at the
What infrastructure is a set of hardware, software, policies and...
Which feature is an automated Telecommunications Management System...
What is the newest generation of secure voice telephone?
Which common crypto fill device is capable of downloading...
Which Communications Security (COMSEC) application provides us with...
TACLANE-Classic and TACLANE-E100 are high-speed encryption devices...
Which port on the office version Secure Telephone Equipment (STE) can...
Who may close tickets in Remedy?
What is the purpose of the TEMPEST program?
Which principle is not addressed in the ANSI/TIA/EIA-568-B...
What provides the Secure Telephone Equipment (STE) with its security...
Integrate Maintenance Data System (IMDS) is an Air Force...
What is the maximum throughput in megabits per second (Mbps)...
Which subsystem of the ANSI/TIA/EIA-568-B structured cabling can be...
A line route inspection of a protected distribution system (PDS)...
Top secret keying material must be handled, stored, transported and...
The Asset Inventory Management (AIM) is part of what?
Which subsystem of the ANSI/TIA/EIA-569-B structured cabling extends...
The Asset Inventory Management (AIM) system includes what type of...
The Tactical Local Area Network Encryptor (TACLANE)-Micro may be...
Which voicemail system was one of the earliest digital voicemail...
Triple Data Encryption Standard (DES) is based on three compound...
Which application has not been used for automating central...
Which encryption is not a telecommunications encryption...
What is the difference between data encryption and voice encryption?
Which cryptology system has a disadvantage of using more...
Which authorities are trusted entities that issue certificates?
Which form is used as a register log to record visitors into...
Which secure voice telephone can be used on the Integrated Services...
Which Telecommunications Management System (TMS) network management...
The Secure Telephone Equipment (STE) consists of what two parts?
TEMPEST is 
The Secure Telephone Equipment (STE) cannot communicate...
Which network management functional area monitors and audits the...
What are the two types of accounts supported by Windows operation...
Which is not a use for local user accounts?
What reference would you use for guidance on Air Force messaging?
Which principle is not addressed in the ANSI/TIA/EIA-568-B...
Only after what, are tickets allowed to be placed in the...
What publication governs the format of Alias names for email accounts?
Protected distribution systems (PDS) events such as alarms and...
The KG-175D is what type of Tactical Local Area Network Encryptor...
Which subsystem of the ANSI/TIA/EIA-569-B structured cabling can be...
The work area of the ANSI/TIA/EIA-568-B structured cabling system...
Data Encryption Standard (DES) uses how many bits for its key?
The Tactical Local Area Network Encryptor (TACLANE)-Micro can acquire...
Which method is not a means for secure telecommunications?
The Tactical Local Area Network Encryptor (TACLANE)-Micro can be used...
Communications Security (COMSEC) is defined as the measures and...
The Air Force has adopted Telecommunications Management System (TMS)...
What are the two basic types of computer cryptoplogy?
The RED/BLACK concept has which two parts?
Which feature is an automated Telecommunications Management System...
What are the two major types of encryption algorithms in use...
Protected distribution systems (PDS) require wich scheduled...
Which TIA/EIA parameter test is a measure of the degree of impedance...
Which form is used with a transfer report to accompany a...
What Air Force Systems Security Instruction (AFSSI) directs...
When using a Secure Terminal Equipment (STE), what is encrypted?
In the RED/BLACK concept, what type of traffic do RED lines carry?
Which common crypto fill device is battery powered and has no internal...
Where would you find guidance on how to properly store, control,...
Which subsystem of the ANSI/TIA/EIA-568-B structured cabling...
Which way to send a network message using the Call Pilot voice mail...
The KIV-7 does not  support which set of electrical...
What components are used in both encryption and decryption?
In Secure Socket Layter (SSL), before an encrypted transaction takes...
Which common crypto fill device is a hand-held personal computer...
Which common crypto fill device uses the Windows CE operating system?
Which TIA/EIA parameter test is a measure of the decrease of signal...
Alert!

Advertisement