3D152-01-1509 Ed 2 Vol 1

100 Questions | Total Attempts: 147

SettingsSettingsSettings
Please wait...
3D152 Quizzes & Trivia

.


Questions and Answers
  • 1. 
    (001) Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
    • A. 

      Radio Frequency Transmission Systems (3D1X3).

    • B. 

      Cyber Transport Systems (3D1X2).

    • C. 

      Spectrum Operations (3D1X4).

    • D. 

      Client Systems (3D1X1).

  • 2. 
    (002) Which of the following is not a communications security program duty and responsibility for Cyber Transport Systems?
    • A. 

      Transmission security.

    • B. 

      Technical security.

    • C. 

      Emission security.

    • D. 

      Physical security.

  • 3. 
    (003) What is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field?
    • A. 

      Core duty.

    • B. 

      Core value.

    • C. 

      Core competency.

    • D. 

      Core responsibility.

  • 4. 
    (003) Which of the following is a core competency of Cyber Transport Systems?
    • A. 

      Fixed cable systems.

    • B. 

      Voice network systems.

    • C. 

      Application software systems.

    • D. 

      Client-server database systems.

  • 5. 
    (004) Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?
    • A. 

      1118

    • B. 

      457

    • C. 

      55

    • D. 

      3

  • 6. 
    (005) Which hazard is not one of the four major types of hazards?
    • A. 

      Biological.

    • B. 

      Chemical.

    • C. 

      Physical.

    • D. 

      Nuclear.

  • 7. 
    (005) Which hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?
    • A. 

      Biological

    • B. 

      Chemical.

    • C. 

      Physical.

    • D. 

      Stress.

  • 8. 
    (005) To prevent manual handling hazards, utilize team lifting when lifting items that weigh more than how many pounds?
    • A. 

      25

    • B. 

      50

    • C. 

      75

    • D. 

      100

  • 9. 
    (005) When working on electrical circuits, the role of safety observer is normally performed by the
    • A. 

      Trainer.

    • B. 

      Certifier.

    • C. 

      Technician.

    • D. 

      Supervisor.

  • 10. 
    (005) When working on electrical circuits, you may only wear metal framed eyeglasses if
    • A. 

      The circuit is energized

    • B. 

      You have a valid prescription.

    • C. 

      They are certified for high voltage.

    • D. 

      They are secured with a nonmetallic cord.

  • 11. 
    (006) To whom does the risk management (RM) process apply?
    • A. 

      All personnel.

    • B. 

      Only safety personnel.

    • C. 

      Only civilian personnel.

    • D. 

      Only medical personnel.

  • 12. 
    (006) What simple, systematic process allows commanders to maximize combat capability, while limiting risk?
    • A. 

      Risk control.

    • B. 

      Safety control.

    • C. 

      Risk management.

    • D. 

      Safety management.

  • 13. 
    (007) Which of the following is a principle of risk management (RM)?
    • A. 

      Accept unnecessary risk.

    • B. 

      Apply the RM process continuously.

    • C. 

      Train and adhere to safety guidelines.

    • D. 

      Make risk decisions at the lowest level.

  • 14. 
    (007) How many steps are in the risk management (RM) process?
    • A. 

      Four.

    • B. 

      Five.

    • C. 

      Six.

    • D. 

      Seven.

  • 15. 
    (008) An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having what category of vulnerability?
    • A. 

      I

    • B. 

      II

    • C. 

      III

    • D. 

      IV

  • 16. 
    (008) How many Integrated Network and Operation Security Centers (INOSC) does the Air Force have?
    • A. 

      One.

    • B. 

      Two.

    • C. 

      Three.

    • D. 

      Four.

  • 17. 
    (008) The Integrated Network Operations and Security Centers (INOSC) has several responsibilities except
    • A. 

      Maintain sole administrative privileges on the firewall.

    • B. 

      Standardize, configure, back up, and otherwise maintain the firewall.

    • C. 

      Maintain a single naming/configuration standard for boundary devices.

    • D. 

      Install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).

  • 18. 
    (009) Which term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP)?
    • A. 

      IP telephony.

    • B. 

      Network telephony.

    • C. 

      Voice protection system.

    • D. 

      Voice over Internet Protocol (VoIP).

  • 19. 
    (009) You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except
    • A. 

      Enabling access control lists (ACL) on firewalls, routers, and switches.

    • B. 

      Deploying protection from dynamic host configuration protocol (DHCP) spoofing.

    • C. 

      Consolidating your voice with your data using virtual local area networks (VLAN).

    • D. 

      Enabling port security access to only allow the required devices needed by the client.

  • 20. 
    (009) At which open systems interconnect (OSI) layer does a packet filter gateway operate at?
    • A. 

      2

    • B. 

      3

    • C. 

      4

    • D. 

      5

  • 21. 
    (009) At which open systems interconnect (OSI) layer does a circuit layer gateway operate?
    • A. 

      3

    • B. 

      4

    • C. 

      5

    • D. 

      6

  • 22. 
    (009) At which open systems interconnect (OSI) layer does an application-level firewall operate?
    • A. 

      4

    • B. 

      5

    • C. 

      6

    • D. 

      7

  • 23. 
    (010) The disadvantage of a host-based intrusion detection system (HIDS) is that it
    • A. 

      Can analyze any encrypted data if it is decrypted before reaching the target host.

    • B. 

      Consumes resources on the host it resides on and slows that device down.

    • C. 

      Monitors log files for inadvisable settings or passwords.

    • D. 

      Monitors traffic on the host on which it is installed.

  • 24. 
    (010) One advantage of a network-based intrusion detection system (NIDS) is that it
    • A. 

      Can decrypt data.

    • B. 

      Uses very few network resources.

    • C. 

      Monitors logs for policy violations.

    • D. 

      Can analyze encrypted network traffic.

  • 25. 
    (010) Which intrusion detection system (IDS) uses software sensors?
    • A. 

      Active.

    • B. 

      Passive.

    • C. 

      Host-based.

    • D. 

      Network-based.