Z3d152 Volume 1 UREs (Random)

100 Questions | Total Attempts: 61

SettingsSettingsSettings
Please wait...
Fundamental Quizzes & Trivia

Volume 1. Cyber Transport Systems Fundamentals


Questions and Answers
  • 1. 
    Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight, beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
    • A. 

      Radio Frequency Transmission Systems (3D1X3)

    • B. 

      Cyber Transport Systems (3D1X2)

    • C. 

      Spectrum Operations (3D1X4)

    • D. 

      Client Systems (3D1X1)

  • 2. 
    Which of the following is not a communications security program duty and responsibility for Cyber Transport Systems?
    • A. 

      Transmission security

    • B. 

      Technical security

    • C. 

      Emission security

    • D. 

      Physical security

  • 3. 
    What is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field?
    • A. 

      Core duty

    • B. 

      Core value

    • C. 

      Core competency

    • D. 

      Core responsibility

  • 4. 
    Which of the following is a core competency of Core Transport Systems?
    • A. 

      Fixed cable systems

    • B. 

      Voice network systems

    • C. 

      Application software systems

    • D. 

      Client-server database systems

  • 5. 
    Which AF form is used to report hazardous conditions that place Air Force personnel or property at risk?
    • A. 

      1118

    • B. 

      457

    • C. 

      55

    • D. 

      3

  • 6. 
    Which hazard is not one of the four major types of hazards?
    • A. 

      Biological

    • B. 

      Chemical

    • C. 

      Physical

    • D. 

      Nuclear

  • 7. 
    Which hazard is caused by heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers?
    • A. 

      Biological

    • B. 

      Chemical

    • C. 

      Physical

    • D. 

      Stress

  • 8. 
    To prevent manual handling hazards, utilize team lifting when lifting items that weigh more than how many pounds?
    • A. 

      25

    • B. 

      50

    • C. 

      75

    • D. 

      100

  • 9. 
    When working on electrical circuits, the role of the safety observer is normally performed by the
    • A. 

      Trainer

    • B. 

      Certifier

    • C. 

      Technician

    • D. 

      Supervisor

  • 10. 
    When working on electrical circuits, you may only wear metal framed eyeglasses if
    • A. 

      The circuit is energized

    • B. 

      You have a valid prescription

    • C. 

      They are certified for high voltage

    • D. 

      They are secured with a nonmetallic cord

  • 11. 
    To whom does the risk management (RM) process apply?
    • A. 

      All personnel

    • B. 

      Only safety personnel

    • C. 

      Only civilian personnel

    • D. 

      Only medical personnel

  • 12. 
    What simple, systematic process allows commanders to maximize combat capability, while limiting risk?
    • A. 

      Risk control

    • B. 

      Safety control

    • C. 

      Risk management

    • D. 

      Safety management

  • 13. 
    Which of the following is a principle of risk management (RM)?
    • A. 

      Accept unnecessary risk

    • B. 

      Apply the RM process continuously

    • C. 

      Train and adhere to safety guidelines

    • D. 

      Make risk decisions at the lowest level

  • 14. 
    How many steps are in the risk management (RM) process?
    • A. 

      Four

    • B. 

      Five

    • C. 

      Six

    • D. 

      Seven

  • 15. 
    An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having what category of vulnerability?
    • A. 

      I

    • B. 

      II

    • C. 

      III

    • D. 

      IV

  • 16. 
    How many Integrated Network and Operation Security Centers (INOSC) does the Air Force have?
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Four

  • 17. 
    The Integrated Network Operations and Security Centers (INOSC) has several responsibilities except
    • A. 

      Maintain sole administrative privileges on the firewall

    • B. 

      Standardize, configure, back up, and otherwise maintain the firewall

    • C. 

      Maintain a single naming/configuration standard for boundary devices

    • D. 

      Install patches or perform any upgrades provided by the Air Force Enterprise Network (AFEN)

  • 18. 
    Which term is used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP)?
    • A. 

      IP telephony

    • B. 

      Network telephony

    • C. 

      Voice protection system

    • D. 

      Voice over Internet Protocol (VoIP)

  • 19. 
    You should implement all of the following security features to help defend internet protocol (IP) telephony systems from attackers except
    • A. 

      Enabling access control lists (ACL) on firewalls, routers, and switches

    • B. 

      Deploying protection from dynamic host configuration (DHCP) spoofing

    • C. 

      Consolidating your voice with your data using virtual local area networks (VLAN)

    • D. 

      Enabling port security access to only the required devices needed by the client

  • 20. 
    At which open systems interconnect (OSI) layer does a packet filter gateway operate at?
    • A. 

      2

    • B. 

      3

    • C. 

      4

    • D. 

      5

  • 21. 
    At which open systems interconnect (OSI) layer does a circuit layer gateway operate?
    • A. 

      3

    • B. 

      4

    • C. 

      5

    • D. 

      6

  • 22. 
    At which open systems interconnect (OSI) layer does an application-level firewall operate?
    • A. 

      4

    • B. 

      5

    • C. 

      6

    • D. 

      7

  • 23. 
    The disadvantage of a host-based intrusion detection system (HIDS) is that it
    • A. 

      Can analyze any encrypted data if it is decrypted before reaching the target host

    • B. 

      Consumes resources on the host it resides on and slows that device down

    • C. 

      Monitors log files for inadvisable settings or passwords

    • D. 

      Monitors traffic on the host on which it is installed

  • 24. 
    One advantage of a network-based intrusion detection system (NIDS) is that it
    • A. 

      Can decrypt data

    • B. 

      Uses very few network resources

    • C. 

      Monitors logs for policy violations

    • D. 

      Can analyzed encrypted network traffic

  • 25. 
    Which intrusion detection system (IDS) uses software sensors?
    • A. 

      Active

    • B. 

      Passive

    • C. 

      Host-based

    • D. 

      Network-based

Back to Top Back to top