Langley CST - 3D151 Vol 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jordan
J
Jordan
Community Contributor
Quizzes Created: 6 | Total Attempts: 2,101
| Attempts: 401
SettingsSettings
Please wait...
  • 1/86 Questions

    What cabling is the most commonly used?

    • Unshielded twisted pair (UTP)
    • Screened twisted pair (ScTP)
    • Shielded twisted pair (STP)
    • Foiled twisted pair (FTP)
Please wait...
About This Quiz

The Langley CST - 3D151 VOL 3 quiz assesses knowledge on network cabling and signal management. It covers topics like crosstalk, types of cables, and ANSI\/TIA\/EIA standards, focusing on skills critical for telecommunications and IT professionals.

Communication Quizzes & Trivia

Quiz Preview

  • 2. 

    Which category (Cat) of cable can support data rates up to 100 Mbps?

    • Cat 3

    • Cat 5

    • Cat 6

    • Cat 5E

    Correct Answer
    A. Cat 5
    Explanation
    Cat 5 cable can support data rates up to 100 Mbps. Cat 3 cables are capable of supporting data rates up to 10 Mbps, while Cat 6 and Cat 5E cables can support data rates up to 1 Gbps. Therefore, Cat 5 is the correct answer as it is the only category of cable listed that can support data rates up to 100 Mbps.

    Rate this question:

  • 3. 

    Which principle is not addressed in the ANSI/TIA/EIA-568-B Standard?

    • Minimum requirements for telecommunications cabling

    • Life span of a telecommunications cabling system

    • Connecting hardware performance specifications

    • Color of the cable

    Correct Answer
    A. Color of the cable
    Explanation
    The ANSI/TIA/EIA-568-B Standard addresses minimum requirements for telecommunications cabling, life span of a telecommunications cabling system, and connecting hardware performance specifications. However, it does not specifically address the color of the cable.

    Rate this question:

  • 4. 

    What cabling system subsystem provides any or all of the functions of a telecommunications room?

    • Entrance facility

    • Equipment room

    • Systems room

    • Work area

    Correct Answer
    A. Equipment room
    Explanation
    The equipment room is a subsystem of the cabling system that provides any or all of the functions of a telecommunications room. It is a dedicated space where the network equipment, servers, and other hardware are housed. This room typically contains racks, cabinets, and shelves to organize and store the equipment. It also provides power, cooling, and security measures to ensure the proper functioning and protection of the network infrastructure.

    Rate this question:

  • 5. 

    Which method is not a means for secure telecommunications?

    • Using Defense Courier Service

    • Using protected distribution system

    • Using communications security equipment

    • Using intrusion detection optical communication system

    Correct Answer
    A. Using Defense Courier Service
    Explanation
    The Defense Courier Service is a secure means of transporting classified and sensitive materials, but it is not a method for secure telecommunications. Telecommunications refers to the transmission of information over long distances, typically using electronic systems. The Defense Courier Service, on the other hand, is a physical method of transporting documents and materials. Therefore, it does not fall under the category of secure telecommunications methods.

    Rate this question:

  • 6. 

    In the RED/BLACK concept, what type of traffic do RED lines carry?

    • Encrypted classified

    • Encrypted unclassified

    • Unencrypted classified

    • Unencrypted unclassified

    Correct Answer
    A. Unencrypted classified
    Explanation
    The correct answer is "Unencrypted classified." In the RED/BLACK concept, RED lines carry unencrypted classified traffic. This means that the information being transmitted through the RED lines is classified but not encrypted, making it potentially vulnerable to interception or unauthorized access.

    Rate this question:

  • 7. 

    TEMPEST IS:

    • An unclassified term and a US GOVT code word that identifies an unclassified set of standards

    • An unclassified term and a US GOVT code word that identifies a classified set of standards

    • A classified term and a US GOVT code word that identifies an unclassified set of standards

    • A classified term and a US GOVT code word that identifies a classified set of standards

    Correct Answer
    A. An unclassified term and a US GOVT code word that identifies a classified set of standards
  • 8. 

    What is the purpose of the TEMPEST program?

    • Eliminate all instances of radiation of electrical impulses

    • Reduce the chances of radiation of electrical impulses

    • Improve the signal of radiation of electrical impulses

    • Increase the range of radiation of electrical impulses

    Correct Answer
    A. Reduce the chances of radiation of electrical impulses
    Explanation
    The purpose of the TEMPEST program is to reduce the chances of radiation of electrical impulses. This means that the program aims to minimize the electromagnetic emissions from electronic devices, such as computers and telecommunication equipment, in order to prevent the interception of sensitive information. By reducing the chances of radiation, the program helps to enhance the security and confidentiality of electronic communications.

    Rate this question:

  • 9. 

    What is the TEMPEST program in the Air Force called?

    • Communications Security

    • Transmission Security

    • Emission Security

    • Computer Security

    Correct Answer
    A. Emission Security
    Explanation
    The correct answer is Emission Security. The TEMPEST program in the Air Force is called Emission Security. Emission Security refers to the protection of classified information from unauthorized access by analyzing and controlling compromising emanations from communication and information systems. This includes preventing the interception of electromagnetic signals that may contain sensitive information.

    Rate this question:

  • 10. 

    Protected distribution systems (PDS) events such as alarms and inspections are recorded where?

    • Emission security (EMSEC) log

    • TEMPEST log

    • Protected distribution system (PDS) log

    • Inspection log

    Correct Answer
    A. Protected distribution system (PDS) log
    Explanation
    In a Protected Distribution System (PDS), events such as alarms and inspections are recorded in the PDS log. This log specifically tracks activities and incidents related to the PDS, ensuring the security and integrity of the system. By maintaining a detailed record of events, organizations can monitor and analyze any potential breaches or vulnerabilities in the PDS, allowing them to take appropriate measures to mitigate risks and maintain the confidentiality of sensitive information.

    Rate this question:

  • 11. 

    Which cryptology system has a disadvantage of using more processing power and time?

    • Symmetric

    • Asymmetric

    • Diametric

    • None of the above, they're all the same

    Correct Answer
    A. Asymmetric
    Explanation
    Asymmetric cryptology system has a disadvantage of using more processing power and time compared to symmetric cryptology system. This is because asymmetric encryption involves the use of two different keys - a public key for encryption and a private key for decryption. The encryption process is slower as it requires complex mathematical calculations, whereas symmetric encryption uses a single key for both encryption and decryption, making it faster and more efficient in terms of processing power and time.

    Rate this question:

  • 12. 

    Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

    • One

    • Two

    • Three

    • Four

    Correct Answer
    A. Three
    Explanation
    Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption, namely, the encryption, decryption, and encryption process. These operations are performed sequentially using three different keys. Therefore, Triple DES incorporates the use of three individual keys, making the correct answer "Three".

    Rate this question:

  • 13. 

    Which port on the office version Secure Telephone Equipment (STE) can be used to connect to a fax machine?

    • Universal Serial Bus (USB)

    • EIA 530

    • RS-232

    • Firewire

    Correct Answer
    A. RS-232
    Explanation
    RS-232 is a standard communication interface that is commonly used for connecting devices such as modems, printers, and fax machines to a computer. It provides a serial connection, allowing data to be transmitted and received between devices. Therefore, RS-232 is the port on the office version Secure Telephone Equipment (STE) that can be used to connect to a fax machine.

    Rate this question:

  • 14. 

    What provides the Secure Telephone Equipment (STE) with its security services?

    • Fortezza card

    • Crypto ignition key

    • Common Access Card

    • Traffic Encryption Key

    Correct Answer
    A. Fortezza card
    Explanation
    The Fortezza card provides the Secure Telephone Equipment (STE) with its security services. The Fortezza card is a cryptographic device that is used to secure communications in the STE. It stores encryption keys and performs cryptographic operations to ensure the confidentiality, integrity, and authentication of the telephone conversations. By using the Fortezza card, the STE is able to provide secure communication services to protect sensitive information from unauthorized access or interception.

    Rate this question:

  • 15. 

    Which common crypto fill device is capable of downloading cryptographic keys to over 70 end item Communications Security (COMSEC) equipment and communications systems?

    • KOI-18 General Purpose Tape Reader

    • KYK-13 Electronic Transfer Device

    • AN/PYQ-10 Simple Key Loader

    • AN/CYZ-10 Data Transfer Device

    Correct Answer
    A. AN/PYQ-10 Simple Key Loader
    Explanation
    The AN/PYQ-10 Simple Key Loader is capable of downloading cryptographic keys to over 70 end item Communications Security (COMSEC) equipment and communications systems. This device is specifically designed for key loading and management, making it an essential tool for securely transferring cryptographic keys. The other options, such as the KOI-18 General Purpose Tape Reader, KYK-13 Electronic Transfer Device, and AN/CYZ-10 Data Transfer Device, do not have the same capabilities as the AN/PYQ-10 Simple Key Loader in terms of downloading cryptographic keys to multiple COMSEC equipment and systems.

    Rate this question:

  • 16. 

    In Remedy, tickets can be assigned to whom?

    • A resolution group only

    • A specific technician only

    • A resolution group or specific technician

    • Remedy automatically assigns tickets

    Correct Answer
    A. A resolution group or specific technician
    Explanation
    In Remedy, tickets can be assigned to either a resolution group or a specific technician. This means that when a ticket is created, it can be assigned to a group of individuals responsible for resolving similar types of issues, or it can be assigned to a particular technician who is best suited to handle that specific ticket. This flexibility allows for efficient ticket management and ensures that tickets are assigned to the appropriate individuals or groups based on their expertise and workload.

    Rate this question:

  • 17. 

    Only after what, are tickets allowed to be placed in the "Closed" status in Remedy?

    • Confirmation has been received from the customer

    • Step-by-step fix actions have been annotated

    • 24 hours after repairing the problem

    • Verification by the Help Desk

    Correct Answer
    A. Step-by-step fix actions have been annotated
    Explanation
    Tickets are allowed to be placed in the "Closed" status in Remedy only after step-by-step fix actions have been annotated. This means that the actions taken to fix the problem have been documented and recorded. This ensures that there is a clear record of the steps taken to resolve the issue, which can be useful for future reference or audits. It also provides transparency and accountability in the ticketing system, as it shows that the necessary actions have been taken to address the problem before closing the ticket.

    Rate this question:

  • 18. 

    Why are users required to change their passwords upon logging onto the network for the first time?

    • To ensure users don't create vulnerability by leaving the default password in place.

    • To ensure users understand how to create a password

    • To ensure the intergrity of each user's unique password

    • To ensure users remember their unique password

    Correct Answer
    A. To ensure users don't create vulnerability by leaving the default password in place.
    Explanation
    Users are required to change their passwords upon logging onto the network for the first time to ensure they don't create vulnerability by leaving the default password in place. Default passwords are often well-known and easily accessible, making the accounts more susceptible to unauthorized access. By forcing users to change their passwords, the network administrators can ensure that each user has a unique and secure password, reducing the risk of potential security breaches.

    Rate this question:

  • 19. 

    Which principle is not addressed in the ANSI/TIA/EIA-568-B Standard?

    • Connector and pin assignment

    • Subsystems of structured cabling

    • Installation methods and practices

    • Recommended wireless topology and distances

    Correct Answer
    A. Recommended wireless topology and distances
    Explanation
    The ANSI/TIA/EIA-568-B Standard covers various aspects of structured cabling, including connector and pin assignment, subsystems, and installation methods. However, it does not address recommended wireless topology and distances. This indicates that the standard does not provide guidelines or recommendations specifically for wireless network design and implementation.

    Rate this question:

  • 20. 

    Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?

    • Near-end crosstalk (NEXT)

    • Powersum near-end crosstalk (PSNEXT)

    • Powersum alien near-end crosstalk (PSANEXT)

    • Powersum insertion loss to alien crosstalk ratio far-end PSAACRF)

    Correct Answer
    A. Near-end crosstalk (NEXT)
    Explanation
    Near-end crosstalk (NEXT) is a TIA/EIA parameter test that measures the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair, which is also measured at the near-end. This test helps to determine the level of interference or crosstalk that occurs between adjacent pairs in a communication cable. By measuring NEXT, one can assess the quality and performance of the cable and identify any potential issues with signal integrity.

    Rate this question:

  • 21. 

    What area is described as the completed building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

    • Controlled Access Area (CAA)

    • Restricted Access Area (RAA)

    • Limited-Control Area (LCA)

    • Uncontrolled Access Area (UAA)

    Correct Answer
    A. Controlled Access Area (CAA)
    Explanation
    A Controlled Access Area (CAA) is described as the completed building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance. This means that only authorized individuals are allowed access to this area, and unauthorized persons are either accompanied by authorized individuals or closely monitored through physical or electronic means.

    Rate this question:

  • 22. 

    Protected distribution systems (PDS) require which schedule inspection?

    • Communications security inspections

    • Separation inspections

    • Line route inspections

    • Electrical inspections

    Correct Answer
    A. Line route inspections
    Explanation
    Line route inspections are required for protected distribution systems (PDS). These inspections ensure that the distribution lines are properly installed and maintained, and that there are no potential vulnerabilities or weaknesses in the system. By regularly inspecting the line routes, any issues or damages can be identified and addressed promptly, ensuring the security and reliability of the PDS. Communications security inspections, separation inspections, and electrical inspections may also be necessary for overall system security, but line route inspections specifically focus on the distribution lines themselves.

    Rate this question:

  • 23. 

    What is the difference between data encryption and voice encryption?

    • Data is faster

    • Voice is faster

    • In data, the encryption is handled by a separate device

    • In voice, the encryption is handled by a separate device

    Correct Answer
    A. In data, the encryption is handled by a separate device
    Explanation
    The correct answer is that in data encryption, the encryption process is handled by a separate device. This means that there is a dedicated device or software that specifically encrypts the data before it is transmitted or stored. On the other hand, the given options do not provide any information about the speed of data or voice encryption, so they are not relevant to the difference between the two.

    Rate this question:

  • 24. 

    Which authorities are trusted entities that issue certificates?

    • Hash

    • Repository

    • Certification

    • Authentication

    Correct Answer
    A. Certification
    Explanation
    Certification authorities are trusted entities that issue certificates. These authorities verify the identity of individuals, organizations, or devices and then issue digital certificates to confirm their authenticity. These certificates are used in various security protocols, such as SSL/TLS, to ensure secure communication by encrypting data and verifying the identity of the parties involved. Therefore, certification is the correct answer as it refers to the process of issuing certificates by trusted authorities.

    Rate this question:

  • 25. 

    What infrastructure is a set of hardware, software, policies and procedures used to create, manage, store, distribute and revoke digital certificates?

    • Private Key

    • Public Key

    • Secure Key

    • Authentication Key

    Correct Answer
    A. Public Key
    Explanation
    Public Key infrastructure (PKI) is a set of hardware, software, policies, and procedures used to create, manage, store, distribute, and revoke digital certificates. These certificates are used for authentication and encryption purposes in various systems and applications. The public key is a part of the PKI that is used for encryption and verifying digital signatures. It is widely used in secure communication protocols like SSL/TLS to establish secure connections over the internet. Therefore, the public key is the correct answer as it accurately describes the infrastructure used for managing digital certificates.

    Rate this question:

  • 26. 

    What are the two major types of encryption algorithms in the use today that operate by encrypting or decrypting one chunk of data at a time?

    • Stream algorithms and block ciphers

    • Secure algorithms and block ciphers

    • Block algorithms and stream ciphers

    • Block algorithms and secure ciphers

    Correct Answer
    A. Block algorithms and stream ciphers
    Explanation
    Block algorithms and stream ciphers are the two major types of encryption algorithms that operate by encrypting or decrypting one chunk of data at a time. Block algorithms divide the data into fixed-size blocks and encrypt each block individually, while stream ciphers encrypt the data bit by bit or byte by byte. Both types of algorithms are widely used in modern encryption systems to ensure data confidentiality and security.

    Rate this question:

  • 27. 

    Data Encryption Standard (DES) uses how many bits for its key?

    • 64

    • 128

    • 192

    • 256

    Correct Answer
    A. 64
    Explanation
    Data Encryption Standard (DES) uses a 64-bit key. This means that the key used in DES is made up of 64 binary digits (or bits). The use of a 64-bit key provides a total of 2^64 possible key combinations, making it difficult to crack the encryption. However, it is important to note that DES is now considered to be insecure due to advances in computing power and the availability of more secure encryption algorithms.

    Rate this question:

  • 28. 

    What is the newest generation of secure voice telephone?

    • Secure Telephone Unit (STU)

    • Cryptographic Telephone (CT)

    • Secure Terminal Equipment (STE)

    • Pretty Good Privacy Phone (PGPfone)

    Correct Answer
    A. Secure Terminal Equipment (STE)
    Explanation
    The newest generation of secure voice telephone is called Secure Terminal Equipment (STE). This is a type of telephone that incorporates advanced cryptographic technology to ensure secure communication. It is designed to protect sensitive information and prevent unauthorized access or interception of conversations. The STE is widely used in government and military organizations where secure communication is crucial.

    Rate this question:

  • 29. 

    Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

    • Secure Telephone Unit (STU)

    • Cryptographic Telephone (CT)

    • Secure Terminal Equipment (STE)

    • Pretty Good Privacy Phone (PGPfone)

    Correct Answer
    A. Secure Terminal Equipment (STE)
    Explanation
    The correct answer is Secure Terminal Equipment (STE). STE is a secure voice telephone that can be used on the Integrated Services Digital Network (ISDN). It provides encryption and decryption of voice signals, ensuring secure communication over the network. STU, CT, and PGPfone are not specifically designed for ISDN and may not offer the same level of security and compatibility.

    Rate this question:

  • 30. 

    The Secure Telephone Equipment (STE) consists of what two parts?

    • Host terminal and removable security core

    • Security core and removable host terminal

    • Host terminal and removable secret core

    • Secret core and removable host terminal

    Correct Answer
    A. Host terminal and removable security core
    Explanation
    The Secure Telephone Equipment (STE) consists of two parts: a host terminal and a removable security core. The host terminal is the main device used for making and receiving calls, while the removable security core provides the necessary encryption and security features. Together, these two components ensure secure communication and protect sensitive information.

    Rate this question:

  • 31. 

    The KIV-7 cryptographic device provides protection up to what classification level? 

    • Secret

    • Top Secret

    • Confidential

    • For Official Use Only (FOUO)

    Correct Answer
    A. Top Secret
    Explanation
    The KIV-7 cryptographic device provides protection up to the Top Secret classification level. This means that it is designed to secure highly sensitive information that could cause exceptionally grave damage to national security if disclosed. The device ensures that only authorized individuals can access and transmit this level of classified information, providing a high level of security and confidentiality.

    Rate this question:

  • 32. 

    TACLANE-Classic and TACLANE-E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for which type of network?

    • Serial networks

    • Tactical networks

    • Point to point connections

    • Internet Protocol networks

    Correct Answer
    A. Internet Protocol networks
    Explanation
    TACLANE-Classic and TACLANE-E100 are high-speed encryption devices that are specifically designed to provide security services for Internet Protocol (IP) networks. These devices ensure confidentiality, data integrity, and authentication for data transmitted over IP networks, making them suitable for securing sensitive information in such networks. They are not designed for serial networks, tactical networks, or point-to-point connections, which have different requirements and may use different encryption devices.

    Rate this question:

  • 33. 

    What publication governs the format of Alias names for email accounts?

    • Air Force Instruction (AFI) 33-119

    • Air Force System Security Instruction (AFSSI) 8502

    • AFI 33-201

    • AFSSI 7700

    Correct Answer
    A. Air Force Instruction (AFI) 33-119
    Explanation
    Air Force Instruction (AFI) 33-119 governs the format of Alias names for email accounts. This publication provides the guidelines and regulations for creating and managing email aliases in the Air Force. It outlines the specific rules and requirements for naming conventions, ensuring consistency and uniformity across email accounts within the Air Force.

    Rate this question:

  • 34. 

    What condition occurs when a signal is induced into one circuit from another?

    • Noise

    • Jabber

    • Crosstalk

    • Intelligence

    Correct Answer
    A. Crosstalk
    Explanation
    Crosstalk is the condition that occurs when a signal is induced into one circuit from another. It refers to the unwanted transfer of signals between adjacent conductors, which can result in interference and distortion of the original signals. This can happen in various scenarios, such as when multiple cables or wires are placed close to each other, causing electromagnetic coupling and signal leakage. Crosstalk can negatively impact the performance and reliability of electronic systems, making it important to minimize and control its effects.

    Rate this question:

  • 35. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling?

    • Entrance facility

    • Equipment room

    • Commercial demark

    • Telecommunications room

    Correct Answer
    A. Entrance facility
    Explanation
    The entrance facility is the subsystem of the ANSI/TIA/EIA-568-B structured cabling system that provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling. This is the location where the external cabling enters the building and is connected to the internal backbone cabling. It typically houses the demarcation point between the service provider's network and the customer's network, and may include equipment such as patch panels, termination blocks, and surge protectors. The entrance facility ensures a seamless transition between the outdoor and indoor cabling systems.

    Rate this question:

  • 36. 

    Which subsystem of the ANSI/TIA/EIA-568-B stuctured cabling can be used for connecting between floors?

    • Intra cabling

    • Backbone cabling

    • Vertical cabling

    • Horizontal cabling

    Correct Answer
    A. Backbone cabling
    Explanation
    Backbone cabling is the correct answer because it is the subsystem of the ANSI/TIA/EIA-568-B structured cabling that is used for connecting between floors. Backbone cabling refers to the cabling infrastructure that connects the entrance facilities, equipment rooms, and telecommunication rooms within a building. It provides the main pathways for data transmission between different floors or areas of a building. Horizontal cabling, on the other hand, is used for connecting end devices within a single floor or area. Vertical cabling is not a recognized subsystem in the ANSI/TIA/EIA-568-B standard.

    Rate this question:

  • 37. 

    Which subsytem of the ANSI/TIA/EIA-568-B structured cabling can be used to interconnect buildings?

    • Inter-cabling

    • Backbone cabling

    • Veritcal cabling

    • Horizontal cabling

    Correct Answer
    A. Backbone cabling
    Explanation
    Backbone cabling is the correct answer because it refers to the subsystem of the ANSI/TIA/EIA-568-B structured cabling that is used to interconnect buildings. Backbone cabling is responsible for connecting equipment rooms, telecommunications rooms, and entrance facilities, allowing for the transmission of data and communication signals between different parts of a building or between multiple buildings in a campus or network. This type of cabling typically uses high-capacity cables, such as fiber optic or copper cables, to support the high-speed and large-volume data transfer required for inter-building connectivity.

    Rate this question:

  • 38. 

    A line route inspection of a  protected distribution system (PDS) consists of a close visual inspection that must include the:

    • Total surface

    • Visible area

    • Observable area

    • Concealed area

    Correct Answer
    A. Total surface
    Explanation
    In order to conduct a thorough line route inspection of a protected distribution system (PDS), it is necessary to visually inspect the total surface of the system. This means examining every part of the system, including both the visible and observable areas. It is important to inspect all areas, including concealed areas, to ensure that there are no hidden issues or potential problems that could compromise the system's integrity. By inspecting the total surface, technicians can identify any potential faults or vulnerabilities and take appropriate measures to address them.

    Rate this question:

  • 39. 

    What using a Secure Terminal Equipment (STE), what is encrypted?

    • The analog signal

    • The digital signal

    • The multiplexed signal

    • The sender's private key

    Correct Answer
    A. The digital signal
    Explanation
    When using a Secure Terminal Equipment (STE), the digital signal is encrypted. The STE is designed to provide secure communication by encrypting the digital signals transmitted over the network. This encryption ensures that the data being transmitted cannot be intercepted or accessed by unauthorized individuals. By encrypting the digital signal, the STE helps to protect the confidentiality and integrity of the information being transmitted.

    Rate this question:

  • 40. 

    Which encryption is not a telecommunications encryption type?

    • Narrowband

    • Network

    • Bulk

    • Open

    Correct Answer
    A. Open
    Explanation
    The encryption types mentioned in the question are all related to telecommunications. However, "Open" is not a specific encryption type used in telecommunications. It is likely referring to an open network or an unencrypted network, which does not provide any encryption for data transmission.

    Rate this question:

  • 41. 

    What reference would you use for guidance on Air Force messaging?

    • AFI 33-119

    • AFI 33-129

    • AFI 33-219

    • AFI 33-329

    Correct Answer
    A. AFI 33-119
    Explanation
    AFI 33-119 is the correct answer because it is the Air Force Instruction that provides guidance on Air Force messaging. This instruction outlines the policies and procedures for creating, sending, and managing messages within the Air Force. It covers topics such as message formats, classification markings, and message handling procedures. By referring to AFI 33-119, Air Force personnel can ensure that their messaging practices align with the established standards and protocols.

    Rate this question:

  • 42. 

    When a security container is opened, it is inventoried at the:

    • Beginning of the week

    • Beginning of the duty day

    • End of the week or month

    • End of the shift or duty day

    Correct Answer
    A. End of the shift or duty day
    Explanation
    The correct answer is "end of the shift or duty day." When a security container is opened, it is important to inventory its contents at the end of the shift or duty day. This is done to ensure that all items are accounted for and that there has been no unauthorized access or tampering with the container. By conducting the inventory at the end of the shift or duty day, any discrepancies or missing items can be identified and addressed promptly. This helps maintain the security and integrity of the container and its contents.

    Rate this question:

  • 43. 

    The Secure Telephone Equipment (STE) cannot communicate securely with the:

    • STU-III

    • Satellite telephone

    • Cellular telephone

    • Land mobile radio

    Correct Answer
    A. Land mobile radio
    Explanation
    The Secure Telephone Equipment (STE) is designed to provide secure communication. It uses encryption algorithms and other security measures to ensure the confidentiality of the communication. However, land mobile radio systems do not have the necessary encryption capabilities to communicate securely with the STE. Therefore, the STE cannot establish a secure connection with a land mobile radio system.

    Rate this question:

  • 44. 

    The KG-175D is what type of Tactical Local Area Network Encryptor (TACLANE)

    • TACLANE-Classic

    • TACLANE-E-100

    • TACLANE-Duro

    • TACLANE-Micro

    Correct Answer
    A. TACLANE-Micro
    Explanation
    The correct answer is TACLANE-Micro. The KG-175D is a type of Tactical Local Area Network Encryptor (TACLANE) specifically known as TACLANE-Micro.

    Rate this question:

  • 45. 

    Who may close tickets in Remedy?

    • Customer

    • Technician

    • Shift lead

    • Help Desk

    Correct Answer
    A. Help Desk
    Explanation
    The Help Desk may close tickets in Remedy. As the primary point of contact for users, the Help Desk is responsible for managing and resolving technical issues. They have the knowledge and authority to assess the status of a ticket and determine if it can be closed. Technicians may also have the ability to close tickets, but the Help Desk is typically the first line of support and has the overall responsibility for ticket management. The customer and shift lead are not typically involved in the ticket closing process.

    Rate this question:

  • 46. 

    Whar are the two types of accounts supported by Windows operation systems?

    • Network and domain

    • Network and local

    • Domain and local

    • User and email

    Correct Answer
    A. Domain and local
    Explanation
    Windows operating systems support two types of accounts: domain accounts and local accounts. Domain accounts are used in a network environment where multiple computers are connected and managed by a central server called a domain controller. These accounts provide centralized management and control over user access and permissions across the network. Local accounts, on the other hand, are specific to individual computers and are used for local user access and management. They are not part of a network domain and do not provide the same level of centralized control as domain accounts.

    Rate this question:

  • 47. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling extends from the telecommunications room to the work area telecommunications information outlets?

    • Intra-cabling

    • Backbone cabling

    • Vertical cabling

    • Horizontal cabling

    Correct Answer
    A. Horizontal cabling
    Explanation
    Horizontal cabling is the correct answer because it refers to the subsystem of the structured cabling system that extends from the telecommunications room to the work area telecommunications information outlets. This cabling is responsible for connecting the telecommunications room to the individual workstations or devices within a building or office space. It includes the cables, connectors, and other components necessary for the transmission of data and voice signals.

    Rate this question:

  • 48. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling recognizes multimode cable?

    • Intra-cabling

    • Backbone cabling

    • Vertical cabling

    • Horizontal cabling

    Correct Answer
    A. Horizontal cabling
    Explanation
    Horizontal cabling is the correct answer because it refers to the subsystem of the ANSI/TIA/EIA-568-B structured cabling that recognizes multimode cable. Horizontal cabling connects the work area outlets to the telecommunications room or equipment room, and it is responsible for carrying the data signals to and from the active equipment. This subsystem includes the cables, connectors, and patch panels that are used for this purpose. Therefore, it is the subsystem that recognizes and supports the use of multimode cable.

    Rate this question:

  • 49. 

    Which ANSI/TIA/EIA standard defines labeling cables and patch panels?

    • 606-A

    • 666-A

    • 568-A

    • 568-B

    Correct Answer
    A. 606-A
    Explanation
    ANSI/TIA/EIA 606-A is the standard that defines labeling cables and patch panels. This standard provides guidelines for the identification and labeling of telecommunications infrastructure, including cables and patch panels. It ensures that proper labeling is used to identify and manage the connections and components in a network infrastructure, making it easier to troubleshoot and maintain the system.

    Rate this question:

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 02, 2017
    Quiz Created by
    Jordan
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.