This quiz assesses knowledge in deploying, sustaining, and troubleshooting communication systems in the Air Force, focusing on radio frequency and cyber transport systems. It evaluates core competencies and adherence to safety standards, essential for professionals in military communications.
Sag
Spike
Noise
Blackout
Rate this question:
The circuit is energized
You have a valid prescription
They are certified for high voltage
They are secured with a nonmetallic cord
Rate this question:
Risk control
Safety control
Risk management
Safety management
Rate this question:
Set a login ID and password combination for access
Install biometrics and encryption certificates
Place a lock on computer
Store in locked case
Rate this question:
Working at a bench
Walking across carpet
Walking across a vinyl floor
Picking up a common plastic bag
Rate this question:
Sag
Spike
Noise
Blackout
Rate this question:
RJ–11
RJ–15
RJ–45
RJ–49
Rate this question:
Packet internetwork groper (PING)
Traffic generator
Route generator
Trace route
Rate this question:
SEQ
SYN
STX
EST
Rate this question:
Character oriented
Bit-oriented
Network
Routing
Rate this question:
Simple Network Management Protocol (SNMP)
Dynamic Host Configuration Protocol (DHCP)
Network Time Protocol (NTP)
Packet Internet Groper (PING)
Rate this question:
Bus
Ring
Star
Hybrid
Rate this question:
Bus
Ring
Star
Hybrid
Rate this question:
Circumvention, and confidentiality
Circumvention, and disclosure
Confidentiality, and integrity
Disclosure, and integrity
Rate this question:
Facilitate the detection of intruders
Keep wildlife out of the perimeter detection zone
Provide security forces personnel a safe place to work
To present a physical and psychological deterrent to unauthorized entry
Rate this question:
Radio Frequency Transmission Systems (3D1X3)
Cyber Transport Systems (3D1X2)
Spectrum Operations (3D1X4)
Client Systems (3D1X1)
Rate this question:
Core duty.
Core value.
Core competency.
Core responsibility.
Rate this question:
Biological
Chemical
Physical
Stress
Rate this question:
Trainer
Certifier
Technician
Supervisor
Rate this question:
Accept unnecessary risk
Apply the RM process continuously
Train and adhere to safety guidelines
Make risk decisions at the lowest level
Rate this question:
Can analyze any encrypted data if it is decrypted before reaching the target host
Consumes resources on the host it resides on and slows that device down
Monitors log files for inadvisable settings or passwords
Monitors traffic on the host on which it is installed
Rate this question:
Cable
Circuit
Facility
Equipment
Rate this question:
Protection from noise
Protection from lightning
Protection from blackouts
Protection from brownouts
Rate this question:
Sag
Spike
Noise
Blackout
Rate this question:
Unshielded
Shielded
Twisted pair
Multipair
Rate this question:
The use of light-emitting diodes
The broad bandwidth of the cable
The low signal to noise ratio of the cable
The multiplexing technique used in fiber optics
Rate this question:
Motion Picture Experts Group-4 (MPEG-4)
Joint Photographic Experts Group (JPEG)
File Transfer Protocol (FTP)
G.711
Rate this question:
IP
Address Resolution Protocol (ARP)
Reverse Address Resolution Protocol (RARP)
Internet Control Message Protocol (ICMP)
Rate this question:
Department of Defense network
Air Force network
Local area network
A public network
Rate this question:
Lag
Hop
Latency
Time zone
Rate this question:
VLAN trunks
VLAN frames
VLAN links
VLAN ports
Rate this question:
Hostname
Network name
Service Set Identifier (SSID)
Virtual LAN Identifier (VLAN ID)
Rate this question:
Alphabetically
Hierarchically
Numerically
Objectively
Rate this question:
Baud rate
Interface speed
Bits per second
Baud per second
Rate this question:
Commercial providers
National Security Agency (NSA)
Air Force Space Command (AFSPC)
Defense Information Systems Agency (DISA)
Rate this question:
Data networks only
Voice networks only
Both voice and data networks
Neither voice nor data networks
Rate this question:
Toll fraud
War dialing
Masquerades
Denial of service
Rate this question:
None
Tamper
Intruder
Equipment fault
Rate this question:
Fixed cable systems
Voice network systems.
Application software systems
Client-server database systems
Rate this question:
Biological
Chemical
Physical
Nuclear
Rate this question:
Passive standby
Line interactive
Double conversion
Ferro resonant standby
Rate this question:
Emitter
Receiver
Transmitter
Synchronizer
Rate this question:
Internet Protocol (IP)
User Datagram Protocol (UDP)
Transmission Control Protocol (TCP)
Internet Control Message Protocol (ICMP)
Rate this question:
8 groups of dotted decimal numbers
8 groups of hexadecimal numbers
4 dotted decimal numbers
128 decimal numbers
Rate this question:
Auxiliary
Console
Ethernet
Telnet
Rate this question:
Physical
Logical
Hybrid
Star
Rate this question:
Switch
Firewall
Gateway
Repeater
Rate this question:
1
2
3
4
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.