3D152-01-1509 Ed 2 Vol 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Catherine Halcomb
Catherine Halcomb
Community Contributor
Quizzes Created: 1443 | Total Attempts: 6,713,877
| Attempts: 181 | Questions: 100
Please wait...
Question 1 / 100
0 %
0/100
Score 0/100
1. (040) What active test is selected on a protocol analyzer to determine if a network node is connected or responding?

Explanation

The correct answer is "Packet internetwork groper (PING)". PING is an active test that is commonly used to determine if a network node is connected or responding. It sends a small packet of data to the target node and waits for a response. If a response is received, it indicates that the node is connected and responsive. PING is a widely used tool for troubleshooting network connectivity issues and measuring network performance.

Submit
Please wait...
About This Quiz
3D152 Quizzes & Trivia

This quiz titled '3D152-01-1509 Ed 2 Vol 1' assesses knowledge in Cyber Transport Systems, focusing on skills like deployment and troubleshooting of transmission devices, understanding communications security, and... see morerecognizing Air Force forms and hazards. It's essential for learners in military communications roles. see less

2. (001) Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?

Explanation

The correct answer is Radio Frequency Transmission Systems (3D1X3). This career field involves deploying, sustaining, troubleshooting, and repairing various types of transmission devices, including wireless, line-of-sight, beyond line-of-sight, wideband, and ground-based satellite systems. This job requires expertise in working with encryption and ensuring secure communication.

Submit
3. (009) At which open systems interconnect (OSI) layer does an application-level firewall operate?

Explanation

An application-level firewall operates at the seventh layer of the OSI model, which is the application layer. This layer is responsible for providing services directly to the user applications. An application-level firewall can monitor and control the traffic based on specific application protocols, such as HTTP, FTP, or SMTP. It can inspect the content of the application data and make decisions on whether to allow or block certain traffic based on predefined rules or policies. By operating at the application layer, the firewall can provide more granular control and better security for specific applications.

Submit
4. (006) To whom does the risk management (RM) process apply?

Explanation

The risk management (RM) process applies to all personnel. This means that everyone within an organization, regardless of their role or department, is responsible for identifying, assessing, and mitigating risks. By involving all personnel in the RM process, organizations can ensure that risks are effectively managed and that everyone is aware of their role in maintaining a safe and secure environment.

Submit
5. (038) Which section of a bit error rate test (BERT) set measures the received test pattern?

Explanation

The receiver section of a bit error rate test (BERT) set measures the received test pattern. This section is responsible for receiving the transmitted test pattern and comparing it with the expected pattern to determine the number of bit errors that occurred during transmission. By analyzing the received test pattern, the receiver can accurately assess the quality and reliability of the communication link.

Submit
6. (012) What is the first line of defense in securing laptops?

Explanation

The first line of defense in securing laptops is setting a login ID and password combination for access. This helps to prevent unauthorized individuals from accessing the laptop and its contents. By requiring a unique login ID and password, it adds an extra layer of security and ensures that only authorized users can gain access to the laptop. Other options such as installing biometrics and encryption certificates, placing a lock on the computer, or storing it in a locked case may provide additional security measures, but setting a login ID and password is the initial and fundamental step in securing laptops.

Submit
7. (021) Which of these activities would generate the most electrostatic current?

Explanation

Walking across carpet generates the most electrostatic current because the friction between the carpet and the person's shoes causes the transfer of electrons. This buildup of static charge can result in a discharge when the person touches a conductive object, such as a doorknob, causing a small electric shock. The other activities mentioned do not involve as much friction or the same materials that facilitate the transfer of electrons, thus generating less electrostatic current.

Submit
8. (022) Which power line fault category is symptomatic of a total loss of utility power?

Explanation

A blackout refers to a complete loss of utility power, where there is a total absence of electricity supply. This fault category is characterized by a sudden and complete interruption of power, resulting in a complete loss of electrical energy to all connected devices. During a blackout, there is no voltage or current flowing through the power lines, leading to a complete blackout or darkness in the affected area. This is in contrast to other power line faults such as sag, spike, or noise, which may cause fluctuations or disturbances in the power supply but do not result in a complete loss of utility power.

Submit
9. (022) Which power line fault category is typically referred to as electro-magnetic interference and radio frequency interference?

Explanation

Electro-magnetic interference and radio frequency interference are typically categorized as noise in power lines. This refers to any unwanted electrical signals or disturbances that can affect the quality and reliability of the power supply. Noise can be caused by various factors such as electrical equipment, appliances, or external sources like radio waves. It can disrupt the normal operation of electronic devices and communication systems, leading to interference and signal degradation. Therefore, noise is the correct answer in this context.

Submit
10. (030) What is the standard conductor used for data networking?

Explanation

The correct answer is RJ-45. RJ-45 is the standard conductor used for data networking. It is a type of connector commonly used for Ethernet connections. RJ-45 connectors have 8 pins and are used to connect network cables to devices such as computers, routers, and switches. They are widely used in both residential and commercial settings for wired internet connections. RJ-11, RJ-15, and RJ-49 are not commonly used for data networking and are typically used for telephone connections.

Submit
11. (031) What has made very high data rate transmission possible on a fiber optics cable?

Explanation

The use of light-emitting diodes (LEDs) has made very high data rate transmission possible on a fiber optics cable. LEDs are used as the light source in fiber optic communication systems. They emit light signals that can carry a large amount of data over long distances. The high-speed data transmission is achieved by encoding the data onto the light signals and sending them through the fiber optic cable. LEDs are capable of emitting light at high frequencies, allowing for faster data rates.

Submit
12. (034) When using an ohmmeter to take a resistance reading, what preliminary precaution should you take?

Explanation

When using an ohmmeter to take a resistance reading, it is important to disconnect the power from the circuit being tested as a preliminary precaution. This is necessary to ensure the safety of the person conducting the measurement and to prevent any potential damage to the ohmmeter or the circuit. By disconnecting the power, the risk of electrical shock or short-circuiting the circuit is minimized, allowing for accurate and safe resistance readings to be obtained.

Submit
13. (005) When working on electrical circuits, you may only wear metal framed eyeglasses if

Explanation

Metal framed eyeglasses conduct electricity, which can be dangerous when working on electrical circuits. However, if the eyeglasses are secured with a nonmetallic cord, it prevents them from falling off and coming into contact with the circuit. This ensures that the person working on the circuit is protected from any potential electrical hazards.

Submit
14. (008) How many Integrated Network and Operation Security Centers (INOSC) does the Air Force have?

Explanation

The correct answer is Two. This means that the Air Force has two Integrated Network and Operation Security Centers (INOSC). These centers are responsible for ensuring the security and integrity of the Air Force's integrated network and operations. Having two INOSCs allows for redundancy and backup capabilities in case one center experiences any issues or disruptions.

Submit
15. (020) What does an integral system of air terminals, roof conductors, and down conductors, securely interconnected to the shortest practicable path to earth provide for a facility?

Explanation

An integral system of air terminals, roof conductors, and down conductors that are securely interconnected to the shortest practicable path to earth provides protection from lightning. This system is designed to divert the electrical current from a lightning strike away from the facility and safely into the ground, reducing the risk of damage to the structure and its occupants.

Submit
16. (013) The definition of integrity as applied to identification, authentication, and encryption is

Explanation

The correct answer is "the assurance that no one has changed or destroyed information without permission." This definition of integrity refers to the protection and trustworthiness of data. It ensures that information remains intact and unaltered, guaranteeing its reliability and authenticity. This is crucial for maintaining the security and integrity of a network, as it prevents unauthorized modifications or destruction of data.

Submit
17. (030) Pin 1 on a typical Electronics Industry Association/Telecommunications Industry Association (EIA/TIA) 568B connector is what color?

Explanation

Pin 1 on a typical EIA/TIA 568B connector is white/orange in color. This is because the EIA/TIA 568B wiring standard uses a specific color code scheme for identifying different pins in the connector. In this scheme, white/orange is assigned to pin 1.

Submit
18. (003) What is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field?

Explanation

Core competency is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field. It refers to the specialized capabilities and expertise that individuals or organizations possess, which sets them apart from others in the same field. Core competencies are essential for achieving success and competitive advantage in a specific industry or profession. They represent the unique strengths and abilities that enable individuals or organizations to deliver superior performance and meet the demands of their customers or clients.

Submit
19. (003) Which of the following is a core competency of Cyber Transport Systems?

Explanation

Voice network systems are a core competency of Cyber Transport Systems. This means that Cyber Transport Systems is skilled and proficient in designing, implementing, and managing voice network systems. These systems are essential for transmitting voice communications over networks, such as telephone systems or Voice over IP (VoIP) systems. By specializing in voice network systems, Cyber Transport Systems can provide reliable and efficient communication solutions to their clients.

Submit
20. (036) What happens to the observed signal if you advance the oscilloscope synchronizing control too far?

Explanation

If you advance the oscilloscope synchronizing control too far, it can lead to distortion in the observed signal. Distortion refers to any alteration or deformation of the original waveform, which can result in inaccurate measurements or misinterpretation of the signal. This distortion can occur due to incorrect synchronization between the oscilloscope and the input signal, causing the waveform to be distorted or stretched. Therefore, advancing the synchronizing control too far can introduce distortion into the observed signal.

Submit
21. (006) What simple, systematic process allows commanders to maximize combat capability, while limiting risk?

Explanation

Risk management is the correct answer because it is a simple, systematic process that allows commanders to maximize combat capability while limiting risk. This process involves identifying potential risks, assessing their likelihood and impact, and implementing measures to mitigate or eliminate them. By effectively managing risks, commanders can make informed decisions that balance the need for combat effectiveness with the need to protect personnel and resources. Safety control and safety management may be components of risk management, but they do not encompass the full scope of the process.

Submit
22. (022) Which power line fault category is symptomatic of an instantaneous or dramatic increase in voltage?

Explanation

A spike is a power line fault category that is symptomatic of an instantaneous or dramatic increase in voltage. A spike is a short duration voltage surge that can occur due to lightning strikes, switching operations, or other causes. It can cause damage to electronic devices and appliances connected to the power line. Unlike a sag, which is a decrease in voltage, a spike is characterized by a sudden and significant increase in voltage. Noise refers to unwanted electrical signals that can interfere with the normal operation of equipment, while a blackout is a complete loss of power.

Submit
23. (010) The disadvantage of a host-based intrusion detection system (HIDS) is that it

Explanation

A host-based intrusion detection system (HIDS) consumes resources on the host it resides on and slows that device down. This is a disadvantage because it can impact the performance and responsiveness of the host system. HIDS works by continuously monitoring the activities and processes on the host, analyzing them for any signs of intrusion or malicious behavior. However, this constant monitoring and analysis require processing power and memory resources, which can lead to a decrease in the overall performance of the host device.

Submit
24. (005) When working on electrical circuits, the role of safety observer is normally performed by the

Explanation

The supervisor is responsible for overseeing the safety of the work environment, including when working on electrical circuits. They ensure that proper safety protocols are followed, monitor the work being done, and intervene if any unsafe conditions or practices are observed. The supervisor has the authority to stop work if necessary to prevent accidents or injuries. Therefore, the supervisor is the most appropriate person to act as the safety observer when working on electrical circuits.

Submit
25. (007) Which of the following is a principle of risk management (RM)?

Explanation

The principle of risk management is to apply the RM process continuously. This means that risk management should be an ongoing and iterative process, rather than a one-time event. By continuously applying the RM process, organizations can identify and assess risks, implement appropriate controls, monitor the effectiveness of these controls, and make necessary adjustments. This helps to ensure that risks are effectively managed and mitigated over time, reducing the likelihood and impact of potential incidents or accidents.

Submit
26. (040) Which component of a protocol analyzer discards frames based on its definition or activates a trigger based on the trigger definition?

Explanation

A protocol analyzer is a tool used to capture and analyze network traffic. The component of a protocol analyzer that discards frames based on its definition or activates a trigger based on the trigger definition is called a filter. Filters allow the user to specify specific criteria or conditions that need to be met for a frame to be captured or discarded. By applying filters, the user can focus on capturing only the relevant network traffic and discard unnecessary frames, making the analysis process more efficient.

Submit
27. (009) You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except

Explanation

The other three options are valid security features for defending IP telephony systems from attackers. Enabling access control lists (ACL) on firewalls, routers, and switches helps control and restrict access to the system. Deploying protection from DHCP spoofing helps prevent attackers from impersonating legitimate devices on the network. Enabling port security access to only allow the required devices needed by the client helps prevent unauthorized devices from connecting to the system. However, consolidating voice with data using VLAN does not provide any specific security benefits and is not directly related to defending against attackers.

Submit
28. (029) What is used to identify the polarity of a wire pair in a cable?

Explanation

The correct answer is "Tip and Ring." In telecommunications, the terms "tip" and "ring" are used to identify the two conductors of a wire pair. The tip is the positive conductor, while the ring is the negative conductor. This terminology is commonly used in telephone systems to distinguish between the two wires in a cable.

Submit
29. (005) Which hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?

Explanation

Stress is the correct answer because heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers are all factors that can contribute to increased stress levels in the workplace. These factors can lead to feelings of overwhelm, anxiety, and pressure, which can have negative effects on an individual's mental and physical health. Stress is a common hazard in many work environments and can impact productivity, job satisfaction, and overall well-being.

Submit
30. (021) Which electronic discharge sensitive (ESD) class has a sensitivity range from 0 – 999 volts?

Explanation

Class I is the correct answer because it is the only ESD class that has a sensitivity range from 0 – 999 volts. Class II, III, and IV do not have this specific sensitivity range.

Submit
31. (022) Which type of uninterruptible power supply (UPS) is traditionally referred to as "offline"?

Explanation

Passive standby is traditionally referred to as "offline" type of uninterruptible power supply (UPS). In this type, the primary power source directly powers the connected equipment, and the UPS only activates when there is a power outage or disturbance. It provides basic power protection and is less expensive compared to other UPS types.

Submit
32. (033) When using a polishing cloth, remove a little bit of the protruding fiber at a time, until the fiber is perfectly

Explanation

When using a polishing cloth, it is important to remove a little bit of the protruding fiber at a time in order to achieve a flat and level surface. This ensures that the cloth is evenly distributing the polishing compound and prevents any inconsistencies in the polishing process. Removing the fiber gradually allows for a more controlled and precise polishing action, resulting in a smooth and level finish.

Submit
33. (019) Which type of shielding utilizes braid, foil, metal wrap, conduit or twisted wire around a conductor?

Explanation

The correct answer is Cable. Cable shielding utilizes braid, foil, metal wrap, conduit, or twisted wire around a conductor to protect it from electromagnetic interference (EMI) and radio frequency interference (RFI). This shielding helps to maintain signal integrity and prevent signal degradation or loss.

Submit
34. (027) Support intervals for cables requiring surface installation will not exceed how many feet?

Explanation

Support intervals for cables requiring surface installation will not exceed 5 feet. This means that the distance between each support for the cables should not be more than 5 feet. This is important to ensure that the cables are properly supported and do not sag or get damaged. By keeping the support intervals within 5 feet, the cables will have sufficient support and will be able to maintain their integrity and functionality.

Submit
35. (002) Which of the following is not a communications security program duty and responsibility for Cyber Transport Systems?

Explanation

The correct answer is Technical security. Technical security refers to the protection of computer systems and networks from unauthorized access, attacks, and vulnerabilities. While it is an important aspect of overall cybersecurity, it is not specifically a duty and responsibility for Cyber Transport Systems. Communications security programs for Cyber Transport Systems typically focus on ensuring the secure transmission of information, protecting against unauthorized disclosure, and maintaining the integrity of the communication systems.

Submit
36. (004) Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?

Explanation

AF Form 457 is used to report hazardous conditions that pose a risk to Air Force personnel or property. This form allows individuals to document and report any unsafe conditions they encounter, such as faulty equipment, hazardous materials, or potential safety hazards. By reporting these conditions, the Air Force can take appropriate measures to mitigate the risks and ensure the safety of its personnel and assets.

Submit
37. (034) When a multimeter has three input terminal jacks, which jack is always used?

Explanation

When a multimeter has three input terminal jacks, the jack that is always used is the "Common" jack. The common jack is used as the reference point for voltage and amperage measurements. It is typically connected to the ground or the negative terminal of the circuit under test. The other two jacks, voltage and amperage, are used depending on the type of measurement being taken. The voltage jack is used for measuring voltage, while the amperage jack is used for measuring current. The frequency jack is not always present on a multimeter and is used specifically for measuring frequency.

Submit
38. (035) The purpose of the miniature ON/OFF switches on a breakout box is to

Explanation

The purpose of the miniature ON/OFF switches on a breakout box is to allow the interruption of the individual interface conductors for isolated testing. This means that the switches can be used to temporarily disconnect specific interface signals, allowing them to be tested or isolated without affecting the rest of the system. This can be useful for troubleshooting or diagnosing issues in complex systems with multiple interface signals.

Submit
39. (024) What function do facility batteries provide during normal operating conditions (commercial alternate current [AC] power available)?

Explanation

During normal operating conditions with commercial AC power available, facility batteries act as a DC filter for the commercial AC power. This means that they remove any unwanted noise or fluctuations from the AC power supply, ensuring a clean and stable DC power output. This filtered DC power is then used to power the system and run the switch. The other options are incorrect as they do not accurately describe the function of facility batteries during normal operating conditions.

Submit
40. (037) Sampled data points are stored in the memory of a digital storage oscilloscope as

Explanation

In a digital storage oscilloscope, sampled data points are stored in the memory as waveform points. These points represent the amplitude of the signal at specific time intervals. By storing the waveform points, the oscilloscope can accurately reconstruct and display the waveform on the screen for analysis and measurement purposes. The waveform points allow for a detailed representation of the signal, capturing its shape and characteristics.

Submit
41. (019) What is required in electronic settings to prevent equipment and signals from propagating interference and to protect equipment and signals from the effects of interference propagated by other devices?

Explanation

Shielding is required in electronic settings to prevent equipment and signals from propagating interference and to protect equipment and signals from the effects of interference propagated by other devices. Shielding involves using conductive materials to create a barrier around sensitive electronic components or devices. This barrier helps to block or reduce the electromagnetic interference (EMI) or radio frequency interference (RFI) that can disrupt the proper functioning of electronic equipment. By shielding the equipment, unwanted signals or noise are kept out, and the equipment is protected from external interference sources.

Submit
42. (038) What type of error is the result of two successive logic one pulses of the same polarity that violates alternate mark inversion coding rules?

Explanation

A bipolar violation is the type of error that occurs when two successive logic one pulses of the same polarity violate alternate mark inversion coding rules. Alternate mark inversion is a coding scheme used in telecommunications to ensure that the signal remains balanced and that a long string of ones or zeros does not cause timing or synchronization issues. A bipolar violation indicates a violation of this coding scheme and can lead to errors in data transmission.

Submit
43. (008) An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having what category of vulnerability?

Explanation

An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having a category I vulnerability. This means that the enclave lacks basic security measures to protect against unauthorized access and potential attacks. Without a firewall, the enclave is more susceptible to network-based threats, while the absence of an IDS leaves it vulnerable to intrusion attempts and unauthorized activities within the network. Overall, category I vulnerability signifies a significant security risk that needs to be addressed promptly.

Submit
44. (040) What active test on a protocol analyzer is selected to see the path that the packets are traveling and the time it takes the packets to compete the trip?

Explanation

The correct answer is Trace route. Trace route is an active test on a protocol analyzer that allows users to see the path that packets are traveling and the time it takes for the packets to complete the trip. It helps in identifying the routers or hops that the packets go through, providing valuable information for troubleshooting network connectivity issues.

Submit
45. (028) Which type of cable does not radiate energy and is not affected by nearby magnetic fields?

Explanation

Shielded cables are designed with a protective layer of shielding material, such as a conductive metal foil or braided wire, which helps to prevent the transmission of electromagnetic interference (EMI) and also reduces the emission of electromagnetic radiation. This shielding effectively blocks out external magnetic fields and prevents them from interfering with the signals transmitted through the cable. As a result, shielded cables are not affected by nearby magnetic fields and do not radiate energy, making them ideal for applications where electromagnetic interference is a concern.

Submit
46. (029) The thin plastic colored tape that spirals around a specific number of pairs that replicate in color is a

Explanation

The correct answer is binder. A binder is a type of stationary item used to hold and organize loose papers or documents. The thin plastic colored tape described in the question is commonly found wrapped around the rings of a binder, indicating the color-coding system used to categorize and identify the contents inside. A marker is a writing tool used to make marks or highlight text, and it does not match the description given in the question. A bundle refers to a group of items tied or wrapped together, and a casing typically refers to an outer covering or protective case. Neither of these options align with the given description. Therefore, the most suitable answer is binder.

Submit
47. (037) What area of a digital storage oscilloscope takes digitized samples and performs numerous manipulations on the data including measuring rise and fall times, periods, time intervals, and math computations?

Explanation

The correct answer is Memory. In a digital storage oscilloscope, the memory is responsible for taking digitized samples and performing various manipulations on the data. This includes measuring rise and fall times, periods, time intervals, and math computations. The microprocessor, on the other hand, is responsible for controlling the overall operation of the oscilloscope but does not directly handle the data manipulation tasks.

Submit
48. (037) What type of sampling does a digital storage oscilloscope normally use on single-shot or seldom-occurring signals?

Explanation

A digital storage oscilloscope (DSO) normally uses real-time sampling on single-shot or seldom-occurring signals. Real-time sampling means that the DSO captures and digitizes the signal continuously, allowing for accurate representation of the signal's waveform and capturing any transient events that may occur. This is in contrast to sequential sampling, which captures only a portion of the signal at a time, repetitive sampling, which captures the same signal repeatedly, and random sampling, which captures samples at random intervals. Real-time sampling is essential for capturing and analyzing fast-changing signals in real-world applications.

Submit
49. (007) How many steps are in the risk management (RM) process?

Explanation

The correct answer is five because the question asks about the number of steps in the risk management process. The answer options provide different numbers, and the correct answer is the one that accurately represents the number of steps.

Submit
50. (039) When using an optical time-domain reflectometer (OTDR), what action might a manufacturer require to prevent false readings?

Explanation

When using an optical time-domain reflectometer (OTDR), connecting a launch cable between the test set and the cable being tested is necessary to prevent false readings. A launch cable helps to eliminate any inconsistencies or reflections that may occur at the connection point between the OTDR and the cable being tested. By using a launch cable, the OTDR can accurately measure the characteristics of the cable without any interference or false readings caused by reflections.

Submit
51. (017) What is the grounding resistance goal for military communications electronics (C-E) facilities?

Explanation

The grounding resistance goal for military communications electronics (C-E) facilities is 10 ohms or less. This means that the resistance between the ground and the facility should be 10 ohms or lower. This is important because a low grounding resistance helps to ensure that electrical equipment and systems within the facility are properly grounded, which can prevent electrical shocks, reduce the risk of equipment damage from electrical surges, and improve overall safety and performance of the facility.

Submit
52. (027) Which section of a horizontal cable duct is used for signal and control cables?

Explanation

The upper section of a horizontal cable duct is used for signal and control cables. This section is typically designated for the placement and organization of cables that carry signals and control various systems and devices. It is important to separate these cables from power cables and other types of cables to prevent interference and ensure proper functioning of the signal and control systems.

Submit
53. (015) Why must the use of TEMPEST-certified equipment be validated by an AF Certified TEMPEST technical authority (CTTA) prior to testing an inspectable space?

Explanation

The use of TEMPEST-certified equipment must be validated by an AF Certified TEMPEST technical authority prior to testing an inspectable space because it is expensive. This suggests that the process of validating the equipment involves significant costs. This could be due to the need for specialized expertise, equipment, or resources required to ensure that the equipment meets the necessary standards for TEMPEST certification. By validating the equipment beforehand, potential risks and expenses associated with using non-certified equipment can be avoided.

Submit
54. (009) At which open systems interconnect (OSI) layer does a circuit layer gateway operate?

Explanation

A circuit layer gateway operates at the fourth layer of the open systems interconnect (OSI) model, which is the transport layer. This layer is responsible for providing reliable and transparent transfer of data between end systems. The circuit layer gateway specifically handles the establishment, maintenance, and termination of virtual circuits, which are connections between two endpoints that provide a dedicated communication path. By operating at the transport layer, the circuit layer gateway can efficiently manage these virtual circuits and ensure reliable data transfer.

Submit
55. (031) What is the maximum operating temperature of fiber optic cable?

Explanation

Fiber optic cables are designed to withstand high temperatures, but they have a maximum operating temperature limit to prevent damage. The correct answer is 1,000°C, which means that the fiber optic cable can safely function in environments with temperatures up to 1,000°C without experiencing any adverse effects.

Submit
56. (005) Which hazard is not one of the four major types of hazards?

Explanation

The question asks for a hazard that is not one of the four major types of hazards. The options given are biological, chemical, physical, and nuclear. Biological, chemical, and physical hazards are commonly recognized as the three major types of hazards. Nuclear hazards, on the other hand, are not typically classified as a separate major type of hazard. Therefore, the correct answer is nuclear.

Submit
57. (005) To prevent manual handling hazards, utilize team lifting when lifting items that weigh more than how many pounds?

Explanation

To prevent manual handling hazards, team lifting should be utilized when lifting items that weigh more than 25 pounds. This is because lifting heavy objects on your own can put excessive strain on your body and increase the risk of injuries such as back strain or muscle sprains. By using team lifting, the weight is distributed among multiple individuals, reducing the strain on each person and minimizing the risk of accidents or injuries.

Submit
58. (025) Which publication series covers standard Air Force installation practices?

Explanation

The TO 31-10 series covers standard Air Force installation practices.

Submit
59. (040) What protocol analyzer test window provides information concerning the network utilization and frame error that are related to a specific protocol?

Explanation

The correct answer is "Protocol statistics." The protocol analyzer test window provides information about network utilization and frame errors specifically related to a specific protocol. This means that it analyzes and displays statistics related to the performance and behavior of that particular protocol, allowing users to monitor and troubleshoot any issues or errors occurring within that protocol.

Submit
60. (014) What Air Force Systems Security Instruction (AFSSI) series covers emission security (EMSEC)?

Explanation

The correct answer is 7700. This Air Force Systems Security Instruction (AFSSI) series specifically covers emission security (EMSEC).

Submit
61. (030) What cable type connects devices that operate at similar layers of the open system interconnection (OSI) model?

Explanation

Crossover cables are used to connect devices that operate at similar layers of the OSI model. They are specifically designed to connect two devices of the same type, such as two computers or two switches, without the need for a hub or a router. Crossover cables have the transmit and receive wires crossed over, allowing the devices to communicate directly with each other. This is in contrast to straight-through cables, which are used to connect devices that operate at different layers of the OSI model.

Submit
62. (010) One advantage of a network-based intrusion detection system (NIDS) is that it

Explanation

A network-based intrusion detection system (NIDS) is designed to monitor network traffic and detect any suspicious or malicious activity. One advantage of NIDS is that it uses very few network resources. This means that it does not consume a significant amount of bandwidth or processing power, allowing the network to operate efficiently. By using minimal resources, NIDS can effectively monitor and analyze network traffic without causing any significant impact on network performance.

Submit
63. (012) What type of certificate authenticates the identity of the user?

Explanation

A digital certificate is a type of certificate that authenticates the identity of the user. It is a digital file that contains information about the user and is issued by a trusted third party known as a Certificate Authority (CA). This certificate is used to verify the authenticity of the user's identity when accessing secure systems or conducting online transactions. It ensures that the user is who they claim to be, providing a secure and reliable means of authentication.

Submit
64. (017) Which facility ground subsystem is also called the "signal ground" and controls electrical noise and static in a facility?

Explanation

The facility ground subsystem that is also called the "signal ground" is the signal reference. This subsystem is responsible for controlling electrical noise and static in a facility. It ensures that signals are properly grounded and prevents interference or disruptions caused by electrical noise.

Submit
65. (022) Which type of uninterruptible power supply (UPS) offers the highest level of protection?

Explanation

Double conversion UPS offers the highest level of protection compared to the other options. In a double conversion UPS, the incoming AC power is converted to DC and then back to AC before supplying it to the connected devices. This ensures a consistent and clean power supply, free from any fluctuations or disturbances. It provides protection against power surges, voltage sags, frequency variations, and other power quality issues. The double conversion UPS also offers seamless and instant transfer to battery power in case of a power outage, ensuring uninterrupted operation of critical equipment.

Submit
66. (032) What are the three sections of a fiber optic cable?

Explanation

A fiber optic cable consists of three sections: the core, cladding, and jacket. The core is the innermost part of the cable and is where the light signals travel through. The cladding surrounds the core and helps to guide the light signals by reflecting them back into the core. The jacket is the outermost layer of the cable and provides protection and insulation for the inner components.

Submit
67. (038) What determines the size of a test pattern segment transmitted from a bit error rate test (BERT)?

Explanation

The size of a test pattern segment transmitted from a bit error rate test (BERT) is determined by the number of bits that can represent the total number of bits in the test pattern. This means that the size of the test pattern segment depends on the number of bits needed to represent all the bits in the test pattern.

Submit
68. (015) Which method of containing radiated emanations requires both facility and equipment testing?

Explanation

Zoning is the method of containing radiated emanations that requires both facility and equipment testing. Zoning involves dividing a facility into different zones based on the level of sensitivity to radiated emanations. Each zone is then tested to ensure that it meets the required standards for containing radiated emanations. This method requires both facility testing to determine the appropriate zoning boundaries and equipment testing to ensure that the equipment used within each zone does not emit excessive radiated emanations. Shielding, suppression, and profile matching are not methods that require both facility and equipment testing.

Submit
69. (009) At which open systems interconnect (OSI) layer does a packet filter gateway operate at?

Explanation

A packet filter gateway operates at the network layer (layer 3) of the OSI model. This layer is responsible for routing and forwarding data packets between different networks. A packet filter gateway examines the headers of incoming and outgoing packets and makes decisions based on predetermined rules, such as allowing or blocking certain types of traffic. By operating at the network layer, a packet filter gateway can effectively filter and control network traffic based on IP addresses, ports, and other criteria.

Submit
70. (023) How many phases of generator power are usually required for industrial and commercial applications?

Explanation

For industrial and commercial applications, three phases of generator power are usually required. This is because three-phase power provides a more balanced and efficient distribution of electrical power compared to single or double phases. Three-phase power allows for smoother operation of motors and equipment, reduces voltage drop over long distances, and enables the use of higher power loads. Therefore, three phases of generator power are preferred in industrial and commercial settings.

Submit
71. (024) Which is not a consideration for selecting facility batteries?

Explanation

The number of AC converters required for the facility is not a consideration for selecting facility batteries. The selection of facility batteries is based on factors such as the facility power requirements, the facility power reserve times, and the amount of current and future floor space available. The number of AC converters required is not directly related to the selection of batteries for the facility.

Submit
72. (035) What do the jumper cables and side switch pins on a breakout box allow?

Explanation

The jumper cables and side switch pins on a breakout box allow for cross-patching of individual interface conductors. This means that they enable the connection of specific interface conductors to different points, allowing for flexibility in routing signals and facilitating testing or troubleshooting of individual interface signals.

Submit
73. (018) Bonds in the earth electrode subsystem normally are direct permanent bonds and do not exceed a resistance of

Explanation

In the earth electrode subsystem, direct permanent bonds are typically used. These bonds ensure a low resistance connection between different components of the subsystem. The resistance of these bonds is usually kept below 1 milliohm to ensure efficient grounding and minimize the risk of electrical hazards.

Submit
74. (009) Which term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP)?

Explanation

IP telephony is the correct term used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP). This technology allows voice calls to be made over the internet or any IP-based network, eliminating the need for traditional telephone lines. IP telephony enables cost-effective and efficient communication by converting voice signals into digital data packets that can be transmitted over the network. It has become increasingly popular due to its flexibility, scalability, and ability to integrate with other communication systems.

Submit
75. (011) What security posture permits everything that is not specifically denied?

Explanation

The correct answer is not "Open." The correct answer is "Default allow." Default allow is a security posture that permits everything that is not specifically denied. This means that by default, all actions, access, or permissions are allowed unless explicitly restricted. It is the opposite of default deny, which denies everything unless explicitly allowed.

Submit
76. (033) What do you use to remove excess fiber after the connector has cooled and epoxy has dried on a fiber cable?

Explanation

A scribe is used to remove excess fiber after the connector has cooled and epoxy has dried on a fiber cable. A scribe is a tool with a sharp tip that is used to score or scratch the fiber, allowing it to be easily broken off. This is necessary to ensure a clean and smooth finish on the fiber connector, which is important for optimal performance of the fiber cable. Strippers are used to remove the outer jacket of the fiber cable, while alco wipes are used for cleaning and polishing cloth is used for polishing the connector surface.

Submit
77. (026) How are connectorized cables labeled?

Explanation

Connectorized cables are labeled by placing the first label within 12 inches of the connector and marking it as "TO". The second label is then placed within two (2) inches of the first label and marked as "FROM". This labeling system helps to easily identify the direction of the cable and ensures proper connectivity.

Submit
78. (010) Host-based intrusion detection systems (HIDS) are

Explanation

Host-based intrusion detection systems (HIDS) are both passive and active. Passive in the sense that they monitor and analyze system activities, looking for any signs of unauthorized access or malicious behavior. They do not actively disrupt or prevent attacks. On the other hand, HIDS can also be active by taking actions to respond to detected threats, such as sending alerts, blocking suspicious activities, or even terminating connections. This combination of passive monitoring and active response makes HIDS an effective tool for detecting and mitigating intrusions on a host system.

Submit
79. (010) Network-based intrusion detection systems (NIDS) are

Explanation

Network-based intrusion detection systems (NIDS) are passive only because they analyze network traffic passively without interfering with the normal operation of the network. NIDS monitor network packets and analyze them for potential security threats or malicious activity. They do not actively block or prevent attacks, but rather provide alerts or notifications to system administrators or security personnel. NIDS can identify suspicious patterns, anomalies, or known attack signatures in network traffic, allowing for timely response and mitigation of potential threats.

Submit
80. (008) The Integrated Network Operations and Security Centers (INOSC) has several responsibilities except

Explanation

The Integrated Network Operations and Security Centers (INOSC) is responsible for maintaining sole administrative privileges on the firewall, standardizing, configuring, backing up, and otherwise maintaining the firewall, and maintaining a single naming/configuration standard for boundary devices. However, they do not install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).

Submit
81. (017) Which facility ground subsystem uses surge arrestors?

Explanation

The facility ground subsystem that uses surge arrestors is the lightning protection system. Surge arrestors are devices designed to protect electrical systems from voltage spikes caused by lightning strikes. These devices divert the excess current from the lightning strike away from the sensitive equipment, preventing damage and ensuring the safety of the system. Therefore, the correct answer is lightning protection.

Submit
82. (028) The advantage of using coaxial cable over paired cable is that coaxial cable

Explanation

Coaxial cable does not radiate energy because it has a shielding layer that prevents electromagnetic interference. This shielding layer consists of a metal foil or braid that surrounds the inner conductor, effectively containing the electrical signals within the cable and preventing them from leaking out as electromagnetic radiation. This is advantageous because it reduces the risk of signal loss or interference, ensuring a more reliable and secure transmission of data.

Submit
83. (016) Equipment is comprised as machines that process information in electronic or electrical form. What equipment should be designated as RED?

Explanation

The equipment that should be designated as RED is the one processing clear-text classified information. This means that the equipment is handling information that is not encrypted and is considered to be confidential and classified.

Submit
84. (010) Which intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures?

Explanation

A network-based intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures. It operates at the network level and analyzes network traffic to detect any suspicious or malicious activity. This type of IDS is able to identify abnormal behavior or patterns in network traffic and can also match packets against a database of known virus signatures to identify potential threats. Unlike host-based IDS, which monitors activities on a specific host, network-based IDS is focused on monitoring traffic across the entire network.

Submit
85. (010) Which intrusion detection system (IDS) uses software sensors?

Explanation

Host-based intrusion detection systems (IDS) use software sensors to monitor and analyze activities on a specific host or device. These sensors are installed directly on the host and collect data about system logs, file integrity, user activity, and other relevant information. By analyzing this data, host-based IDS can detect and alert about any suspicious or malicious activities occurring on the host itself. Unlike network-based IDS, which monitor network traffic, host-based IDS focus on the individual host, making them effective in detecting attacks that may originate from within the host or target specific vulnerabilities on that host.

Submit
86. (016) What equipment should be designated as BLACK when designating equipment that supports physical and electrical concepts?

Explanation

The equipment that should be designated as BLACK when designating equipment that supports physical and electrical concepts is the one processing encrypted classified information. This is because encrypted classified information requires a higher level of security and protection compared to unencrypted or clear-text classified information.

Submit
87. (040) What protocol analyzer test window reports errors that occur at the physical layer such as bad frame check sequence (FCS), short frames, and jabbers?

Explanation

The correct answer is Media access control (MAC) node statistics. This is because MAC node statistics provide information about errors that occur at the physical layer, such as bad frame check sequence (FCS), short frames, and jabbers. These statistics help in identifying and troubleshooting issues related to the physical layer of the network.

Submit
88. (040) What protocol analyzer test window automatically runs in the background when the protocol analyzer application is activated?

Explanation

When the protocol analyzer application is activated, the protocol analyzer test window automatically runs in the background to perform node discovery. Node discovery is the process of identifying and mapping the network nodes or devices present in a network. By running in the background, the protocol analyzer can continuously monitor and discover new nodes that join the network, providing valuable information about the network's topology and helping in troubleshooting and network management.

Submit
89. (015) What plays a major role in a conductor's ability to minimizing compromising emanations?

Explanation

Distance and angle play a major role in a conductor's ability to minimize compromising emanations. By increasing the distance between conductors and reducing the angle at which they are placed, the electromagnetic fields produced by the conductors can be better controlled and mitigated. This helps to minimize the chances of electromagnetic interference and ensures that the conductors do not compromise the integrity of the signals being transmitted.

Submit
90. (016) Which type of separation ensures that every signal conductor from a RED device routes to another RED device, or becomes encrypted before connecting to a BLACK device?

Explanation

Electrical separation ensures that every signal conductor from a RED device routes to another RED device, or becomes encrypted before connecting to a BLACK device. This type of separation involves using electrical circuits and components to isolate and protect sensitive information from unauthorized access or interference. It ensures that signals are properly controlled and secured, preventing unauthorized access to classified or sensitive data.

Submit
91. (033) How long do most fiber-optic epoxies take to set?

Explanation

Fiber-optic epoxies typically take 12-24 hours to set. This is because the epoxy needs sufficient time to cure and harden, ensuring a strong bond between the fiber-optic components. Setting time can vary depending on factors such as temperature and humidity, but in most cases, 12-24 hours is the average time required for the epoxy to fully set and achieve its maximum strength.

Submit
92. (018) What kind of bond is normally applied to signal reference bonds?

Explanation

Signal reference bonds are typically applied using mechanical bonds. Mechanical bonds involve physically connecting two objects together using fasteners, clamps, or other mechanical means. This type of bond provides a secure and reliable connection, ensuring that the signal reference bond remains intact and stable. Brazing and welding involve the use of heat to join materials together, which may not be suitable for delicate signal reference bonds. Therefore, the correct answer is mechanical.

Submit
93. (032) Which type of cable is the easiest to splice?

Explanation

Multimode step index fiber is the easiest to splice because it has a larger core and a uniform refractive index profile. This allows for easier alignment and fusion of the fibers during the splicing process. In contrast, multimode graded-index fiber has a varying refractive index profile, which makes alignment more challenging. Single mode fiber has a smaller core, making it more difficult to splice accurately. Coaxial cable, on the other hand, is not typically spliced but rather connected using connectors.

Submit
94. (015) A facility with an inspectable space of more than 20 meters, but less than 100 meters would be considered to be in facility zone

Explanation

A facility with an inspectable space of more than 20 meters, but less than 100 meters would be considered to be in facility zone B.

Submit
95. (035) The purpose of a breakout box is to

Explanation

A breakout box is a device that allows for the monitoring and access of multiple conductors. It is typically used in testing and troubleshooting situations where there is a need to connect to multiple wires or cables simultaneously. By providing access to these conductors, the breakout box allows for easier monitoring and analysis of electrical signals, making it a useful tool in various industries such as telecommunications and electronics.

Submit
96. (037) Which digital storage oscilloscope button controls all waveforms displayed in the STORE mode?

Explanation

The CURSORS control button is responsible for controlling all waveforms displayed in the STORE mode on a digital storage oscilloscope. This button allows the user to navigate and manipulate the cursors on the screen, which can be used to measure various parameters of the waveform such as amplitude, frequency, and time intervals. By adjusting the cursors, the user can analyze and make precise measurements on the stored waveforms.

Submit
97. (015) Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100 meters would be considered to be in equipment zone

Explanation

Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100 meters would be considered to be in equipment zone C. This is because the ERTZ refers to the area around the equipment where electromagnetic radiation can potentially be intercepted and exploited. Therefore, equipment within this range would fall within the designated equipment zone C.

Submit
98. (017) Which facility ground subsystem is also called the safety ground?

Explanation

The facility ground subsystem that is also called the safety ground is fault protection. Fault protection refers to the measures taken to protect against electrical faults, such as short circuits or ground faults, which can pose safety hazards. The safety ground, or fault protection, ensures that any faulty electrical current is safely directed to the ground, preventing electrical shock or damage to equipment.

Submit
99. (037) What is the standard operating mode for the acquisition mode on a digital storage oscilloscope?

Explanation

The standard operating mode for the acquisition mode on a digital storage oscilloscope is the sample mode. In this mode, the oscilloscope samples the input waveform at regular intervals and stores the sampled values in its memory. This allows for accurate representation of the waveform, but it may miss transient events that occur between sample points. Real-time mode, on the other hand, captures the waveform continuously without missing any events, but it may introduce some noise and inaccuracies. Averaging mode and peak detect mode are different types of data processing techniques that can be applied to the acquired waveform data, but they are not the standard operating mode for acquisition.

Submit
100. (014) What Air Force Systems Security Instruction (AFSSI) series covers emission security (EMSEC)?

Explanation

The correct answer is 8500. The Air Force Systems Security Instruction (AFSSI) series 8500 covers emission security (EMSEC). This series provides guidance and instructions for protecting the electromagnetic emissions of Air Force systems and equipment to prevent unauthorized access or exploitation of sensitive information. It includes procedures for identifying, assessing, and mitigating potential vulnerabilities related to electromagnetic emissions.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Mar 16, 2016
    Quiz Created by
    Catherine Halcomb
Cancel
  • All
    All (100)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(040) What active test is selected on a protocol analyzer to determine...
(001) Which 3D career field deploys, sustains, troubleshoots, and...
(009) At which open systems interconnect (OSI) layer does an...
(006) To whom does the risk management (RM) process apply?
(038) Which section of a bit error rate test (BERT) set measures the...
(012) What is the first line of defense in securing laptops?
(021) Which of these activities would generate the most electrostatic...
(022) Which power line fault category is symptomatic of a total loss...
(022) Which power line fault category is typically referred to as...
(030) What is the standard conductor used for data networking?
(031) What has made very high data rate transmission possible on a...
(034) When using an ohmmeter to take a resistance reading, what...
(005) When working on electrical circuits, you may only wear metal...
(008) How many Integrated Network and Operation Security Centers...
(020) What does an integral system of air terminals, roof conductors,...
(013) The definition of integrity as applied to identification,...
(030) Pin 1 on a typical Electronics Industry...
(003) What is defined as an integrated bundle of expert knowledge and...
(003) Which of the following is a core competency of Cyber Transport...
(036) What happens to the observed signal if you advance the...
(006) What simple, systematic process allows commanders to maximize...
(022) Which power line fault category is symptomatic of an...
(010) The disadvantage of a host-based intrusion detection system...
(005) When working on electrical circuits, the role of safety observer...
(007) Which of the following is a principle of risk management (RM)?
(040) Which component of a protocol analyzer discards frames based on...
(009) You should implement all of the following security features to...
(029) What is used to identify the polarity of a wire pair in a cable?
(005) Which hazard is caused by heavy workloads, lack of control over...
(021) Which electronic discharge sensitive (ESD) class has a...
(022) Which type of uninterruptible power supply (UPS) is...
(033) When using a polishing cloth, remove a little bit of the...
(019) Which type of shielding utilizes braid, foil, metal wrap,...
(027) Support intervals for cables requiring surface installation will...
(002) Which of the following is not a communications security program...
(004) Which AF form is used to report hazardous conditions that place...
(034) When a multimeter has three input terminal jacks, which jack is...
(035) The purpose of the miniature ON/OFF switches on a breakout box...
(024) What function do facility batteries provide during normal...
(037) Sampled data points are stored in the memory of a digital...
(019) What is required in electronic settings to prevent equipment and...
(038) What type of error is the result of two successive logic one...
(008) An enclave that does not have a firewall and intrusion detection...
(040) What active test on a protocol analyzer is selected to see the...
(028) Which type of cable does not radiate energy and is not affected...
(029) The thin plastic colored tape that spirals around a specific...
(037) What area of a digital storage oscilloscope takes digitized...
(037) What type of sampling does a digital storage oscilloscope...
(007) How many steps are in the risk management (RM) process?
(039) When using an optical time-domain reflectometer (OTDR), what...
(017) What is the grounding resistance goal for military...
(027) Which section of a horizontal cable duct is used for signal and...
(015) Why must the use of TEMPEST-certified equipment be validated by...
(009) At which open systems interconnect (OSI) layer does a circuit...
(031) What is the maximum operating temperature of fiber optic cable?
(005) Which hazard is not one of the four major types of hazards?
(005) To prevent manual handling hazards, utilize team lifting when...
(025) Which publication series covers standard Air Force installation...
(040) What protocol analyzer test window provides information...
(014) What Air Force Systems Security Instruction (AFSSI) series...
(030) What cable type connects devices that operate at similar layers...
(010) One advantage of a network-based intrusion detection system...
(012) What type of certificate authenticates the identity of the user?
(017) Which facility ground subsystem is also called the "signal...
(022) Which type of uninterruptible power supply (UPS) offers the...
(032) What are the three sections of a fiber optic cable?
(038) What determines the size of a test pattern segment transmitted...
(015) Which method of containing radiated emanations requires both...
(009) At which open systems interconnect (OSI) layer does a packet...
(023) How many phases of generator power are usually required for...
(024) Which is not a consideration for selecting facility batteries?
(035) What do the jumper cables and side switch pins on a breakout box...
(018) Bonds in the earth electrode subsystem normally are direct...
(009) Which term is used to describe the technology for transmitting...
(011) What security posture permits everything that is not...
(033) What do you use to remove excess fiber after the connector has...
(026) How are connectorized cables labeled?
(010) Host-based intrusion detection systems (HIDS) are
(010) Network-based intrusion detection systems (NIDS) are
(008) The Integrated Network Operations and Security Centers (INOSC)...
(017) Which facility ground subsystem uses surge arrestors?
(028) The advantage of using coaxial cable over paired cable is that...
(016) Equipment is comprised as machines that process information in...
(010) Which intrusion detection system (IDS) monitors packets for...
(010) Which intrusion detection system (IDS) uses software sensors?
(016) What equipment should be designated as BLACK when designating...
(040) What protocol analyzer test window reports errors that occur at...
(040) What protocol analyzer test window automatically runs in the...
(015) What plays a major role in a conductor's ability to minimizing...
(016) Which type of separation ensures that every signal conductor...
(033) How long do most fiber-optic epoxies take to set?
(018) What kind of bond is normally applied to signal reference bonds?
(032) Which type of cable is the easiest to splice?
(015) A facility with an inspectable space of more than 20 meters, but...
(035) The purpose of a breakout box is to
(037) Which digital storage oscilloscope button controls all waveforms...
(015) Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20...
(017) Which facility ground subsystem is also called the safety...
(037) What is the standard operating mode for the acquisition mode on...
(014) What Air Force Systems Security Instruction (AFSSI) series...
Alert!

Advertisement