To whom does the risk management (RM) process apply?
Which power line fault category is typically referred to as...
Which Application layer protocol is used to synchronize the clocks of...
The three cornerstones of voice network systems are availability,
When working on electrical circuits, you may only wear metal framed...
What simple, systematic process allows commanders to maximize combat...
What is the first line of defense in securing laptops
In Binary-synchronous protocol, which characters establish and...
Which data communication protocol is based on bits and the position of...
Which of these activities would generate the most electrostatic...
Which power line fault category is symptomatic of a total loss of...
What is the standard conductor used for data networking?
Which topology has the stations connected in the form of a circle?
What active test is selected on a protocol analyzer to determine if a...
In an Intrusion Detection System (IDS), what is the main purpose of a...
Which topology combines two or more different physical topologies in a...
What is most commonly used in data systems to express...
What are attempts to gain access to a switch by posing as an...
The time it takes a switch to figure out where to forward a data unit...
What allows transportation of all active Virtual LANs (VLANs)between...
What identifier differentiates one Wireless Local Area Network (WLAN)...
Which 3D career field deploys, sustains, troubleshoots, and repairs...
What is defined as an integrated bundle of expert knowledge and...
Which hazard is caused by heavy workloads, lack of control over the...
When working on electrical circuits, the role of safety observer is...
Which of the following is a principle of risk management (RM)?
Virtual Private Networks (VPNs) allow the AF to extend network...
The disadvantage of a host-based intrusion detection system (HIDS) is...
Which of the following is an example of a video compression standard?
What should security policies encompass to help mitigate the threat of...
Which type of shielding utilizes braid, foil, metal wrap, conduit or...
What does an integral system of air terminals, roof conductors, and...
Which power line fault category is symptomatic of an instantaneous or...
Which agency is the preferred transport provider for Internet and...
Which type of cable does not radiate energy and is not affected by...
What has made very high data rate transmission possible on a fiber...
A Management Interface Base (MIB) is a collection of information that...
Which network layer protocol matches a known Internet Protocol (IP)...
What type alarm occurs if the sensor post cover in vertical taut-wire...
Internet Protocol version 6 (IPv6) address are represented by?
Which device subdivides a network into smaller logical pieces, or...
How many voltage levels does a binary signal have?
Which router port is used for initial configuration?
Which of the following is a core competency of Cyber Transport...
Which hazard is not one of the four major types of hazards?
In an Intrusion Detection System (IDS), what must a line of detection...
The primary reason you should measure the voltage across faulty...
Which type of uninterruptible power supply (UPS) is traditionally...
Which topology defines the way in which devices communicate and data...
Which section of a bit error rate test (BERT) set measures the...
Which Transport layer protocol provides reliable data delivery...
The basic configuration of the entry control facility includes a
Combined distribution frames encompass the functions of a main...
Individual pulses within a digital signal are
Which routing protocol do internet backbones use?
In what type of digital signal does the signal level move to one of...
Which AF form is used to report hazardous conditions that place Air...
How many steps are in the risk management (RM) process?
An enclave that does not have a firewall and intrusion detection...
You should implement all of the following security features to help...
In the Open System Interconnect (OSI) model, a layer will communicate...
Which interior intrusion detection system (IIDS) sensor uses heat...
The definition of integrity as applied to identification,...
Why must the use of TEMPEST-certified equipment be validated by an AF...
What is required in electronic settings to prevent equipment and...
Which electronic discharge sensitive (ESD) class has a sensitivity...
What is used to identify the polarity of a wire pair in a cable?
Pin 1 on a typical Electronics Industry Association/Telecommunications...
If the circuit files are lost or destroyed, what document are...
When using a polishing cloth, remove a little bit of the protruding...
When a multimeter has three input terminal jacks, which jack is always...
When using an ohmmeter to take a resistance reading, what preliminary...
What happens to the observed signal if you advance the oscilloscope...
Which physical security action can you take to ensure network...
The signal components that occur as bands above and below a carrier...
Which wireless design phase accounts for the amount of users on the...
To prevent manual handling hazards, utilize team lifting when lifting...
At which open systems interconnect (OSI) layer does an...
One advantage of a network-based intrusion detection system (NIDS) is...
Trend analysis is a program that ensures circuits meet management...
What Air Force Systems Security Instruction (AFSSI) series covers...
What is the maximum operating temperature of fiber optic cable?
Simple Network Management Protocol (SNMP) is a tool used by network...
What area of a digital storage oscilloscope takes digitized samples...
What active test on a protocol analyzer is selected to see the path...
Which Network layer protocol provides messaging that can help with...
Which device has multiport connectivity that directs data between...
Which statement best describes a binary with eight-zero substitution...
When configuring a router, you control access to privileged EXEC mode...
Which stratum level is a Global Positioning System (GPS) timing...
The Integrated Network Operations and Security Centers (INOSC) has...
What security posture permits everything that is not specifically...
What type of certificate authenticates the identity of the user
What is the grounding resistance goal for military communications...
Which is not a consideration for selecting facility batteries?
What type of error is the result of two successive logic one pulses of...
Which component of a protocol analyzer discards frames based on its...
In general, you should deny direct dial-in access to a network by...
What web application is used to order telecommunications products and...
Which network Class has the most address for hosts?
How many subnet bits are required to support 90 subnets on a Class B...
Which Institute of Electrical Electronics Engineers (IEEE) wireless...
What do Global Positioning System (GPS) satellites use to provide very...
How many Integrated Network and Operation Security Centers (INOSC)...
Bonds in the earth electrode subsystem normally are direct permanent...
What kind of bond is normally applied to signal reference bonds?
What function do facility batteries provide during normal operating...
How are connectorized cables labeled?
Which section of a horizontal cable duct is used for signal and...
The thin plastic colored tape that spirals around a specific number of...
What do you use to remove excess fiber after the connector has cooled...
What type of sampling does a digital storage oscilloscope normally use...
Which interior intrusion detection system is designed to detect...
Which is not a component of the voice protection system architecture?
To prevent frequency modulation (FM) radio stations from interfering...
What are the two major types of frame structures?
Who determines if Preventative Maintenance Inspections (PMI)are...
Which of the following will minimize EtherChannel configuration...
What type of signal is sent to the fence protection system (FPS)...
Which of the following is not a communications security program duty...
Which term is used to describe the technology for transmitting voice...
In common associated signaling (CAS), what is the seventh bit in...
What plays a major role in a conductor’s ability to minimizing...
What equipment should be designated as BLACK when designating...
Which type of uninterruptible power supply (UPS) offers the highest...
Which option is a characteristic of synchronous data operation?
What is the process, or result of process, of modifying (varying) one...
What cable type connects devices that operate at similar layers of the...
What provides enterprise wide visibility into telecom resource...
Which Digital Multiplex System (DMS)-100 database facility is...
How many broadcast domains form a Virtual LAN (VLAN)?
Which communications control signal uses a two-frequency dialing...
If a circuit fails its management threshold, what test might be...
What are the three sections of a fiber optic cable?
Toredo has four tunneling components. Which one is not one...
What document is the authority for the operations and maintenance...
Which wave-division multiplexing technology uses uncooled lasers to...
Within how many normal duty hours of completion action on the...
What report must be sent if the circuit does not meet all required...
Host-based intrusion detection systems (HIDS) are
Which method of containing radiated emanations requires both facility...
Equipment is comprised as machines that process information in...
How many phases of generator power are usually required for industrial...
Support intervals for cables requiring surface installation will not...
The advantage of using coaxial cable over paired cable is that coaxial...
When a telephone network is circuit switched, each call
Where are voice protection system servers installed?
In Integrated Services Digital Network (ISDN), the "B"...
What is the maximum number of ports that a Meridian System Logic-100...
What link is used to connect the Digital Multiplex System (DMS)-core...
How many bits are in the extended superframe format (ESF) framing...
What Digital multiplexing System (DMS-100 system contains subsystems...
What protocol analyzer test window provides information concerning the...
The method of multiplexing the T1 multiplexer uses is
To create a better timing environment in communications networks,...
What names are given to the shifted R-Y and B-Y signals, respectively?
Network-based intrusion detection systems (NIDS) are
Which AF System Security Instruction (AFSSI) provides the overall...
Which facility ground subsystem is also called the “signal ground”...
Which digital broadcast system was adopted by the United States as the...
Which common channel signaling (CCS) mode does the transfer of...
How long do most fiber-optic epoxies take to set?
Sampled data points are stored in the memory of a digital storage...
Which digital storage oscilloscope button controls all waveforms...
What determines the size of a test pattern segment transmitted from a...
When using an optical time-domain reflectometer (OTDR), what action...
Where do incoming (unswitched) circuits transmitted to the ENET enter...
When you must restore user service by rerouting, what is the second...
Which is not a characteristic and capability of a voice protection...
What does the GVG-110 video switcher serial interface allow?
What protocol analyzer test window reports errors that occur at the...
Which form of multiplexing is very susceptible to signal...
A digital signal that contains synchronizing bits within the signal...
Who is responsible for all circuits within their facility up to the...
Which DD form do you use for an official narrative log that is often...
The vulnerabilities of voice and data converged networks were...
The signaling equipment has three types of communications signals that...
Which test results do you record on the reverse/back side of the DD...
Which facility ground subsystem uses surge arrestors?
Which type of cable is the easiest to splice?
The form of pulse modulation in which a discrete pulse is varied...
Which of the following is not a distinct layer of a...
What is the maximum detection distance in meters of an Infrared Pulsed...
Which basic circuit in the video distribution amplifier consists of...
Which intrusion detection system (IDS) uses software sensors
Which elements make up the control component of the SuperNode central...
The purpose of a breakout box is to
What protocol analyzer test window automatically runs in the...
What is the secondary mode of detection for the microwave fence...
Which type of pulse modulation is least affected by noise?
Which agency has responsibility for a circuit end-to-end?
What is the maximum length of the vertical taut-wire sensor (VTWS)?
Which publication lists the methods used to identify systems, links,...
Which publication series covers standard Air Force installation...
During the initial research for voice system security, who recognized...
Digital coding techniques such as binary with eight-zero substitution...
How many serial data interface ports does the Meridian Option 11C...
Which type of separation ensures that every signal conductor from a...
What do the jumper cables and side switch pins on a breakout box...
What is the standard operating mode for the acquisition mode on a...