This quiz, titled '3D152 URE Volume 1', assesses knowledge in deploying, sustaining, and troubleshooting military communication systems. It focuses on core competencies in radio frequency systems and cyber transport, essential for Air Force personnel.
Risk control
Safety control
Risk management
Safety management
Rate this question:
Can analyze any encrypted data if it is decrypted before reaching the target host
Consume resources on the host it resides on and slows that device down
Monitors log files for inadvisable settings or passwords
Monitors traffic on the host on which it is installed
Rate this question:
Working at a bench.
Walking across carpet.
Walking across a vinyl floor.
Picking up a common plastic bag.
Rate this question:
Sag.
Spike.
Noise.
Blackout.
Rate this question:
Sag.
Spike.
Noise.
Blackout.
Rate this question:
Packet internetwork groper (PING).
Traffic generator.
Route generator.
Trace route.
Rate this question:
Core duty.
Core value.
Core competency.
Core responsibility.
Rate this question:
Sag.
Spike.
Noise.
Blackout.
Rate this question:
Unshielded.
Shielded.
Twisted Pair.
Multipair.
Rate this question:
RJ-11
RJ-15
RJ-45
RJ-49
Rate this question:
Emitter.
Receiver.
Transmitter.
Synchronizer.
Rate this question:
Radio Frequency Transmission Systems (3D1X3)
Cyber Transport Systems (3D1X2)
Spectrum Operations (3D1X4)
Client Systems (3D1X1)
Rate this question:
Trainer
Certifier
Technician
Supervisor
Rate this question:
Protection from noise.
Protection from lightning.
Protection from blackouts.
Protection from brownout.
Rate this question:
Biological
Chemical
Physical
Stress
Rate this question:
The circuit is energized.
You have a valid prescription.
They are certified for high voltage.
They are secured with a nonmetallic cord.
Rate this question:
Set a login ID and password combination for access.
Install biometrics and encryption certificates.
Place a lock on computer.
Store in locked case.
Rate this question:
Having information ready when needed.
Not being able to deny who performed network actions.
The protection of the network from those not authorized access.
The assurance that no one has changed or destroyed information without permission.
Rate this question:
Cable.
Circuit.
Facility.
Equipment.
Rate this question:
Passive standby.
Line interactive.
Double conversion.
Ferro resonant standby.
Rate this question:
Tip and Ring.
Tip and Color.
Rate and Color.
Pair and Position.
Rate this question:
The use of light-emitting diodes.
The broad bandwidth of the cable.
The low signal to noise ratio of the cable.
The multiplexing technique used in fiber optics.
Rate this question:
Cyclic redundancy check.
Bipolar violation.
Bit slip.
Frame.
Rate this question:
Fixed cable systems
Voice network systems
Application software systems
Client-server database systems
Rate this question:
Masking.
Distortion.
Deflection.
Overloading.
Rate this question:
Trace route.
Route generator.
Traffic generator.
Packet internetwork groper (PING).
Rate this question:
1118
457
55
3
Rate this question:
Accept unnecessary risk.
Apply the RM process continuously.
Train and adhere to safety guidelines.
Make risk decisions at the lowest level.
Rate this question:
Bonding.
Shielding.
Annealing.
Grounding.
Rate this question:
Blue.
Orange.
White/blue.
White/orange.
Rate this question:
Microprocessor.
Acquisition.
Memory.
Input.
Rate this question:
Class I.
Class II.
Class III.
Class IV.
Rate this question:
Properly seat the test lead into the current input terminal jack.
Disconnect the power from the circuit being tested.
Place the meter in the frequency mode.
Set the range for maximum reading.
Rate this question:
Filter.
Buffer.
Counter.
Central processing unit.
Rate this question:
Biological
Chemical
Physical
Nuclear
Rate this question:
Four
Five
Six
Seven
Rate this question:
Can decrypt data.
Uses very few network resources.
Monitors logs for policy violations.
Can analyze encrypted network traffic.
Rate this question:
Core, cladding, and shield.
Core, cladding, and jacket.
Core, Conductor, and shield.
Core, Conductor, and jacket.
Rate this question:
Round.
Elliptical.
Flat and level.
Flat with a 45-degree angle.
Rate this question:
25
50
75
100
Rate this question:
Maintain sole administrative privileges on the firewall.
Standardize, configure, back up, and otherwise maintain the firewall.
Maintain a single naming/configuration standard for boundary devices.
Install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).
Rate this question:
Enabling access control lists (ACL) on firewalls, routers, and switches
Deploying protection from dynamic host configuration protocol (DHCP) spoofing
Consolidating your voice with your data using virtual local area network (VLAN)
Enabling port security access to only allow the required devices needed by the client
Rate this question:
4
5
6
7
Rate this question:
Digital.
Biometric.
Encryption.
E-mail signing.
Rate this question:
2000.
3000.
7000.
8500.
Rate this question:
Common.
Voltage.
Amperage.
Frequency.
Rate this question:
Equipment processing unencrypted classified information.
Equipment processing encrypted classified information.
Equipment processing clear-text classified information.
Equipment processing plain-text classified information.
Rate this question:
100 ohms or less.
50 ohms or less.
20 ohms or less.
10 ohms or less.
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.