This quiz assesses knowledge in deploying, sustaining, and troubleshooting communication systems in the Air Force, focusing on radio frequency and cyber transport systems. It evaluates core competencies and adherence to safety standards, essential for professionals in military communications.
Transmission security
Technical security.
Emission security.
Physical security.
Rate this question:
Core duty.
Core value.
Core competency.
Core responsibility.
Rate this question:
Fixed cable systems
Voice network systems.
Application software systems
Client-server database systems
Rate this question:
1118
457
55
3
Rate this question:
Biological
Chemical
Physical
Nuclear
Rate this question:
Biological
Chemical
Physical
Stress
Rate this question:
25
50
75
100
Rate this question:
Trainer
Certifier
Technician
Supervisor
Rate this question:
The circuit is energized
You have a valid prescription
They are certified for high voltage
They are secured with a nonmetallic cord
Rate this question:
All personnel
Only safety personnel
Only civilian personnel
Only medical personnel
Rate this question:
Risk control
Safety control
Risk management
Safety management
Rate this question:
Accept unnecessary risk
Apply the RM process continuously
Train and adhere to safety guidelines
Make risk decisions at the lowest level
Rate this question:
Four
Five
Six
Seven
Rate this question:
I
II
III
IV
Rate this question:
One
Two
Three
Four
Rate this question:
Maintain sole administrative privileges on the firewall
Standardize, configure, back up, and otherwise maintain the firewall
Maintain a single naming/configuration standard for boundary devices
Install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN).
Rate this question:
IP telephony
Network telephony
Voice protection system
Voice over Internet Protocol (VoIP)
Rate this question:
Enabling access control lists (ACL) on firewalls, routers, and switches
Deploying protection from dynamic host configuration protocol (DHCP) spoofing
Consolidating your voice with your data using virtual local area networks (VLAN)
Enabling port security access to only allow the required devices needed by the client
Rate this question:
2
3
4
5
Rate this question:
3
4
5
6
Rate this question:
4
5
6
7
Rate this question:
Can analyze any encrypted data if it is decrypted before reaching the target host
Consumes resources on the host it resides on and slows that device down
Monitors log files for inadvisable settings or passwords
Monitors traffic on the host on which it is installed
Rate this question:
Can decrypt data
Uses very few network resources
Monitors logs for policy violations
Can analyze encrypted network traffic
Rate this question:
Active
Passive
Host-based
Network-based
Rate this question:
Active
Passive
Host-based
Network-based
Rate this question:
Active only
Passive only
Passive and active
Neither passive nor active
Rate this question:
Active only
Passive only
Passive and active
Neither passive nor active
Rate this question:
Default deny
Default allow
Close
Open
Rate this question:
Digital
Biometric
Encryption
E-mail signing
Rate this question:
Set a login ID and password combination for access
Install biometrics and encryption certificates
Place a lock on computer
Store in locked case
Rate this question:
Having information ready when needed
Not being able to deny who performed network actions
The protection of the network from those not authorized access
The assurance that no one has changed or destroyed information without permission
Rate this question:
2000
3000
7000
8500
Rate this question:
7700
7701
7702
7703
Rate this question:
Zoning
Shielding
Suppression
Profile matching
Rate this question:
A
B
C
D
Rate this question:
A
B
C
D
Rate this question:
It requires Department of Defense (DOD) approval
It requires certification
It is time consuming
It is expensive
Rate this question:
Distance and angle
Distance and separation
Induction and grounding
Induction and impedance
Rate this question:
Equipment processing clear-text confidential information
Equipment processing clear-text unclassified information
Equipment processing encrypted classified information
Equipment processing clear-text classified information
Rate this question:
Equipment processing unencrypted classified information
Equipment processing encrypted classified information
Equipment processing clear-text classified information
Equipment processing plaintext classified information
Rate this question:
Physical
Electrical
Equipment
Mechanical
Rate this question:
100 ohms or less
50 ohms or less
20 ohms or less
10 ohms or less
Rate this question:
Earth electrode
Fault protection
Signal reference
Lightning protection
Rate this question:
Earth electrode
Fault protection
Signal reference
Lightning protection
Rate this question:
Earth electrode
Fault protection
Signal reference
Lightning protection
Rate this question:
1 milliohm
2 milliohms
5 milliohms
10 milliohms
Rate this question:
None
Brazing
Welding
Mechanical
Bonding
Shielding
Annealing
Grounding
Rate this question:
Quiz Review Timeline (Updated): Mar 20, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.