Langley CST - 3D151 Vol 3

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Jordan
J
Jordan
Community Contributor
Quizzes Created: 6 | Total Attempts: 2,102
| Attempts: 401 | Questions: 86
Please wait...
Question 1 / 86
0 %
0/100
Score 0/100
1. What cabling is the most commonly used?

Explanation

Unshielded twisted pair (UTP) is the most commonly used cabling. UTP consists of pairs of wires twisted together, which helps to reduce electromagnetic interference. It is widely used in Ethernet networks and telephone systems due to its affordability, flexibility, and ease of installation. UTP is suitable for most applications and provides reliable data transmission for short to medium distances. Shielded twisted pair (STP), screened twisted pair (ScTP), and foiled twisted pair (FTP) are also types of cabling, but they are less commonly used compared to UTP.

Submit
Please wait...
About This Quiz
Communication Quizzes & Trivia

The Langley CST - 3D151 VOL 3 quiz assesses knowledge on network cabling and signal management. It covers topics like crosstalk, types of cables, and ANSI\/TIA\/EIA standards, focusing on skills critical for telecommunications and IT professionals.

Personalize your quiz and earn a certificate with your name on it!
2. Which category (Cat) of cable can support data rates up to 100 Mbps?

Explanation

Cat 5 cable can support data rates up to 100 Mbps. Cat 3 cables are capable of supporting data rates up to 10 Mbps, while Cat 6 and Cat 5E cables can support data rates up to 1 Gbps. Therefore, Cat 5 is the correct answer as it is the only category of cable listed that can support data rates up to 100 Mbps.

Submit
3. Which principle is not addressed in the ANSI/TIA/EIA-568-B Standard?

Explanation

The ANSI/TIA/EIA-568-B Standard addresses minimum requirements for telecommunications cabling, life span of a telecommunications cabling system, and connecting hardware performance specifications. However, it does not specifically address the color of the cable.

Submit
4. What cabling system subsystem provides any or all of the functions of a telecommunications room?

Explanation

The equipment room is a subsystem of the cabling system that provides any or all of the functions of a telecommunications room. It is a dedicated space where the network equipment, servers, and other hardware are housed. This room typically contains racks, cabinets, and shelves to organize and store the equipment. It also provides power, cooling, and security measures to ensure the proper functioning and protection of the network infrastructure.

Submit
5. Which method is not a means for secure telecommunications?

Explanation

The Defense Courier Service is a secure means of transporting classified and sensitive materials, but it is not a method for secure telecommunications. Telecommunications refers to the transmission of information over long distances, typically using electronic systems. The Defense Courier Service, on the other hand, is a physical method of transporting documents and materials. Therefore, it does not fall under the category of secure telecommunications methods.

Submit
6. In the RED/BLACK concept, what type of traffic do RED lines carry?

Explanation

The correct answer is "Unencrypted classified." In the RED/BLACK concept, RED lines carry unencrypted classified traffic. This means that the information being transmitted through the RED lines is classified but not encrypted, making it potentially vulnerable to interception or unauthorized access.

Submit
7. TEMPEST IS:

Explanation

not-available-via-ai

Submit
8. What is the purpose of the TEMPEST program?

Explanation

The purpose of the TEMPEST program is to reduce the chances of radiation of electrical impulses. This means that the program aims to minimize the electromagnetic emissions from electronic devices, such as computers and telecommunication equipment, in order to prevent the interception of sensitive information. By reducing the chances of radiation, the program helps to enhance the security and confidentiality of electronic communications.

Submit
9. What is the TEMPEST program in the Air Force called?

Explanation

The correct answer is Emission Security. The TEMPEST program in the Air Force is called Emission Security. Emission Security refers to the protection of classified information from unauthorized access by analyzing and controlling compromising emanations from communication and information systems. This includes preventing the interception of electromagnetic signals that may contain sensitive information.

Submit
10. Protected distribution systems (PDS) events such as alarms and inspections are recorded where?

Explanation

In a Protected Distribution System (PDS), events such as alarms and inspections are recorded in the PDS log. This log specifically tracks activities and incidents related to the PDS, ensuring the security and integrity of the system. By maintaining a detailed record of events, organizations can monitor and analyze any potential breaches or vulnerabilities in the PDS, allowing them to take appropriate measures to mitigate risks and maintain the confidentiality of sensitive information.

Submit
11. Which cryptology system has a disadvantage of using more processing power and time?

Explanation

Asymmetric cryptology system has a disadvantage of using more processing power and time compared to symmetric cryptology system. This is because asymmetric encryption involves the use of two different keys - a public key for encryption and a private key for decryption. The encryption process is slower as it requires complex mathematical calculations, whereas symmetric encryption uses a single key for both encryption and decryption, making it faster and more efficient in terms of processing power and time.

Submit
12. Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

Explanation

Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption, namely, the encryption, decryption, and encryption process. These operations are performed sequentially using three different keys. Therefore, Triple DES incorporates the use of three individual keys, making the correct answer "Three".

Submit
13. Which port on the office version Secure Telephone Equipment (STE) can be used to connect to a fax machine?

Explanation

RS-232 is a standard communication interface that is commonly used for connecting devices such as modems, printers, and fax machines to a computer. It provides a serial connection, allowing data to be transmitted and received between devices. Therefore, RS-232 is the port on the office version Secure Telephone Equipment (STE) that can be used to connect to a fax machine.

Submit
14. What provides the Secure Telephone Equipment (STE) with its security services?

Explanation

The Fortezza card provides the Secure Telephone Equipment (STE) with its security services. The Fortezza card is a cryptographic device that is used to secure communications in the STE. It stores encryption keys and performs cryptographic operations to ensure the confidentiality, integrity, and authentication of the telephone conversations. By using the Fortezza card, the STE is able to provide secure communication services to protect sensitive information from unauthorized access or interception.

Submit
15. Which common crypto fill device is capable of downloading cryptographic keys to over 70 end item Communications Security (COMSEC) equipment and communications systems?

Explanation

The AN/PYQ-10 Simple Key Loader is capable of downloading cryptographic keys to over 70 end item Communications Security (COMSEC) equipment and communications systems. This device is specifically designed for key loading and management, making it an essential tool for securely transferring cryptographic keys. The other options, such as the KOI-18 General Purpose Tape Reader, KYK-13 Electronic Transfer Device, and AN/CYZ-10 Data Transfer Device, do not have the same capabilities as the AN/PYQ-10 Simple Key Loader in terms of downloading cryptographic keys to multiple COMSEC equipment and systems.

Submit
16. In Remedy, tickets can be assigned to whom?

Explanation

In Remedy, tickets can be assigned to either a resolution group or a specific technician. This means that when a ticket is created, it can be assigned to a group of individuals responsible for resolving similar types of issues, or it can be assigned to a particular technician who is best suited to handle that specific ticket. This flexibility allows for efficient ticket management and ensures that tickets are assigned to the appropriate individuals or groups based on their expertise and workload.

Submit
17. Only after what, are tickets allowed to be placed in the "Closed" status in Remedy?

Explanation

Tickets are allowed to be placed in the "Closed" status in Remedy only after step-by-step fix actions have been annotated. This means that the actions taken to fix the problem have been documented and recorded. This ensures that there is a clear record of the steps taken to resolve the issue, which can be useful for future reference or audits. It also provides transparency and accountability in the ticketing system, as it shows that the necessary actions have been taken to address the problem before closing the ticket.

Submit
18. Why are users required to change their passwords upon logging onto the network for the first time?

Explanation

Users are required to change their passwords upon logging onto the network for the first time to ensure they don't create vulnerability by leaving the default password in place. Default passwords are often well-known and easily accessible, making the accounts more susceptible to unauthorized access. By forcing users to change their passwords, the network administrators can ensure that each user has a unique and secure password, reducing the risk of potential security breaches.

Submit
19. Which principle is not addressed in the ANSI/TIA/EIA-568-B Standard?

Explanation

The ANSI/TIA/EIA-568-B Standard covers various aspects of structured cabling, including connector and pin assignment, subsystems, and installation methods. However, it does not address recommended wireless topology and distances. This indicates that the standard does not provide guidelines or recommendations specifically for wireless network design and implementation.

Submit
20. Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?

Explanation

Near-end crosstalk (NEXT) is a TIA/EIA parameter test that measures the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair, which is also measured at the near-end. This test helps to determine the level of interference or crosstalk that occurs between adjacent pairs in a communication cable. By measuring NEXT, one can assess the quality and performance of the cable and identify any potential issues with signal integrity.

Submit
21. What area is described as the completed building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

Explanation

A Controlled Access Area (CAA) is described as the completed building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance. This means that only authorized individuals are allowed access to this area, and unauthorized persons are either accompanied by authorized individuals or closely monitored through physical or electronic means.

Submit
22. Protected distribution systems (PDS) require which schedule inspection?

Explanation

Line route inspections are required for protected distribution systems (PDS). These inspections ensure that the distribution lines are properly installed and maintained, and that there are no potential vulnerabilities or weaknesses in the system. By regularly inspecting the line routes, any issues or damages can be identified and addressed promptly, ensuring the security and reliability of the PDS. Communications security inspections, separation inspections, and electrical inspections may also be necessary for overall system security, but line route inspections specifically focus on the distribution lines themselves.

Submit
23. What is the difference between data encryption and voice encryption?

Explanation

The correct answer is that in data encryption, the encryption process is handled by a separate device. This means that there is a dedicated device or software that specifically encrypts the data before it is transmitted or stored. On the other hand, the given options do not provide any information about the speed of data or voice encryption, so they are not relevant to the difference between the two.

Submit
24. Which authorities are trusted entities that issue certificates?

Explanation

Certification authorities are trusted entities that issue certificates. These authorities verify the identity of individuals, organizations, or devices and then issue digital certificates to confirm their authenticity. These certificates are used in various security protocols, such as SSL/TLS, to ensure secure communication by encrypting data and verifying the identity of the parties involved. Therefore, certification is the correct answer as it refers to the process of issuing certificates by trusted authorities.

Submit
25. What infrastructure is a set of hardware, software, policies and procedures used to create, manage, store, distribute and revoke digital certificates?

Explanation

Public Key infrastructure (PKI) is a set of hardware, software, policies, and procedures used to create, manage, store, distribute, and revoke digital certificates. These certificates are used for authentication and encryption purposes in various systems and applications. The public key is a part of the PKI that is used for encryption and verifying digital signatures. It is widely used in secure communication protocols like SSL/TLS to establish secure connections over the internet. Therefore, the public key is the correct answer as it accurately describes the infrastructure used for managing digital certificates.

Submit
26. What are the two major types of encryption algorithms in the use today that operate by encrypting or decrypting one chunk of data at a time?

Explanation

Block algorithms and stream ciphers are the two major types of encryption algorithms that operate by encrypting or decrypting one chunk of data at a time. Block algorithms divide the data into fixed-size blocks and encrypt each block individually, while stream ciphers encrypt the data bit by bit or byte by byte. Both types of algorithms are widely used in modern encryption systems to ensure data confidentiality and security.

Submit
27. Data Encryption Standard (DES) uses how many bits for its key?

Explanation

Data Encryption Standard (DES) uses a 64-bit key. This means that the key used in DES is made up of 64 binary digits (or bits). The use of a 64-bit key provides a total of 2^64 possible key combinations, making it difficult to crack the encryption. However, it is important to note that DES is now considered to be insecure due to advances in computing power and the availability of more secure encryption algorithms.

Submit
28. What is the newest generation of secure voice telephone?

Explanation

The newest generation of secure voice telephone is called Secure Terminal Equipment (STE). This is a type of telephone that incorporates advanced cryptographic technology to ensure secure communication. It is designed to protect sensitive information and prevent unauthorized access or interception of conversations. The STE is widely used in government and military organizations where secure communication is crucial.

Submit
29. Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

Explanation

The correct answer is Secure Terminal Equipment (STE). STE is a secure voice telephone that can be used on the Integrated Services Digital Network (ISDN). It provides encryption and decryption of voice signals, ensuring secure communication over the network. STU, CT, and PGPfone are not specifically designed for ISDN and may not offer the same level of security and compatibility.

Submit
30. The Secure Telephone Equipment (STE) consists of what two parts?

Explanation

The Secure Telephone Equipment (STE) consists of two parts: a host terminal and a removable security core. The host terminal is the main device used for making and receiving calls, while the removable security core provides the necessary encryption and security features. Together, these two components ensure secure communication and protect sensitive information.

Submit
31. The KIV-7 cryptographic device provides protection up to what classification level? 

Explanation

The KIV-7 cryptographic device provides protection up to the Top Secret classification level. This means that it is designed to secure highly sensitive information that could cause exceptionally grave damage to national security if disclosed. The device ensures that only authorized individuals can access and transmit this level of classified information, providing a high level of security and confidentiality.

Submit
32. TACLANE-Classic and TACLANE-E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for which type of network?

Explanation

TACLANE-Classic and TACLANE-E100 are high-speed encryption devices that are specifically designed to provide security services for Internet Protocol (IP) networks. These devices ensure confidentiality, data integrity, and authentication for data transmitted over IP networks, making them suitable for securing sensitive information in such networks. They are not designed for serial networks, tactical networks, or point-to-point connections, which have different requirements and may use different encryption devices.

Submit
33. What publication governs the format of Alias names for email accounts?

Explanation

Air Force Instruction (AFI) 33-119 governs the format of Alias names for email accounts. This publication provides the guidelines and regulations for creating and managing email aliases in the Air Force. It outlines the specific rules and requirements for naming conventions, ensuring consistency and uniformity across email accounts within the Air Force.

Submit
34. What condition occurs when a signal is induced into one circuit from another?

Explanation

Crosstalk is the condition that occurs when a signal is induced into one circuit from another. It refers to the unwanted transfer of signals between adjacent conductors, which can result in interference and distortion of the original signals. This can happen in various scenarios, such as when multiple cables or wires are placed close to each other, causing electromagnetic coupling and signal leakage. Crosstalk can negatively impact the performance and reliability of electronic systems, making it important to minimize and control its effects.

Submit
35. Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling?

Explanation

The entrance facility is the subsystem of the ANSI/TIA/EIA-568-B structured cabling system that provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling. This is the location where the external cabling enters the building and is connected to the internal backbone cabling. It typically houses the demarcation point between the service provider's network and the customer's network, and may include equipment such as patch panels, termination blocks, and surge protectors. The entrance facility ensures a seamless transition between the outdoor and indoor cabling systems.

Submit
36. Which subsystem of the ANSI/TIA/EIA-568-B stuctured cabling can be used for connecting between floors?

Explanation

Backbone cabling is the correct answer because it is the subsystem of the ANSI/TIA/EIA-568-B structured cabling that is used for connecting between floors. Backbone cabling refers to the cabling infrastructure that connects the entrance facilities, equipment rooms, and telecommunication rooms within a building. It provides the main pathways for data transmission between different floors or areas of a building. Horizontal cabling, on the other hand, is used for connecting end devices within a single floor or area. Vertical cabling is not a recognized subsystem in the ANSI/TIA/EIA-568-B standard.

Submit
37. Which subsytem of the ANSI/TIA/EIA-568-B structured cabling can be used to interconnect buildings?

Explanation

Backbone cabling is the correct answer because it refers to the subsystem of the ANSI/TIA/EIA-568-B structured cabling that is used to interconnect buildings. Backbone cabling is responsible for connecting equipment rooms, telecommunications rooms, and entrance facilities, allowing for the transmission of data and communication signals between different parts of a building or between multiple buildings in a campus or network. This type of cabling typically uses high-capacity cables, such as fiber optic or copper cables, to support the high-speed and large-volume data transfer required for inter-building connectivity.

Submit
38. A line route inspection of a  protected distribution system (PDS) consists of a close visual inspection that must include the:

Explanation

In order to conduct a thorough line route inspection of a protected distribution system (PDS), it is necessary to visually inspect the total surface of the system. This means examining every part of the system, including both the visible and observable areas. It is important to inspect all areas, including concealed areas, to ensure that there are no hidden issues or potential problems that could compromise the system's integrity. By inspecting the total surface, technicians can identify any potential faults or vulnerabilities and take appropriate measures to address them.

Submit
39. What using a Secure Terminal Equipment (STE), what is encrypted?

Explanation

When using a Secure Terminal Equipment (STE), the digital signal is encrypted. The STE is designed to provide secure communication by encrypting the digital signals transmitted over the network. This encryption ensures that the data being transmitted cannot be intercepted or accessed by unauthorized individuals. By encrypting the digital signal, the STE helps to protect the confidentiality and integrity of the information being transmitted.

Submit
40. Which encryption is not a telecommunications encryption type?

Explanation

The encryption types mentioned in the question are all related to telecommunications. However, "Open" is not a specific encryption type used in telecommunications. It is likely referring to an open network or an unencrypted network, which does not provide any encryption for data transmission.

Submit
41. What reference would you use for guidance on Air Force messaging?

Explanation

AFI 33-119 is the correct answer because it is the Air Force Instruction that provides guidance on Air Force messaging. This instruction outlines the policies and procedures for creating, sending, and managing messages within the Air Force. It covers topics such as message formats, classification markings, and message handling procedures. By referring to AFI 33-119, Air Force personnel can ensure that their messaging practices align with the established standards and protocols.

Submit
42. When a security container is opened, it is inventoried at the:

Explanation

The correct answer is "end of the shift or duty day." When a security container is opened, it is important to inventory its contents at the end of the shift or duty day. This is done to ensure that all items are accounted for and that there has been no unauthorized access or tampering with the container. By conducting the inventory at the end of the shift or duty day, any discrepancies or missing items can be identified and addressed promptly. This helps maintain the security and integrity of the container and its contents.

Submit
43. The Secure Telephone Equipment (STE) cannot communicate securely with the:

Explanation

The Secure Telephone Equipment (STE) is designed to provide secure communication. It uses encryption algorithms and other security measures to ensure the confidentiality of the communication. However, land mobile radio systems do not have the necessary encryption capabilities to communicate securely with the STE. Therefore, the STE cannot establish a secure connection with a land mobile radio system.

Submit
44. The KG-175D is what type of Tactical Local Area Network Encryptor (TACLANE)

Explanation

The correct answer is TACLANE-Micro. The KG-175D is a type of Tactical Local Area Network Encryptor (TACLANE) specifically known as TACLANE-Micro.

Submit
45. Who may close tickets in Remedy?

Explanation

The Help Desk may close tickets in Remedy. As the primary point of contact for users, the Help Desk is responsible for managing and resolving technical issues. They have the knowledge and authority to assess the status of a ticket and determine if it can be closed. Technicians may also have the ability to close tickets, but the Help Desk is typically the first line of support and has the overall responsibility for ticket management. The customer and shift lead are not typically involved in the ticket closing process.

Submit
46. Whar are the two types of accounts supported by Windows operation systems?

Explanation

Windows operating systems support two types of accounts: domain accounts and local accounts. Domain accounts are used in a network environment where multiple computers are connected and managed by a central server called a domain controller. These accounts provide centralized management and control over user access and permissions across the network. Local accounts, on the other hand, are specific to individual computers and are used for local user access and management. They are not part of a network domain and do not provide the same level of centralized control as domain accounts.

Submit
47. Which subsystem of the ANSI/TIA/EIA-568-B structured cabling extends from the telecommunications room to the work area telecommunications information outlets?

Explanation

Horizontal cabling is the correct answer because it refers to the subsystem of the structured cabling system that extends from the telecommunications room to the work area telecommunications information outlets. This cabling is responsible for connecting the telecommunications room to the individual workstations or devices within a building or office space. It includes the cables, connectors, and other components necessary for the transmission of data and voice signals.

Submit
48. Which subsystem of the ANSI/TIA/EIA-568-B structured cabling recognizes multimode cable?

Explanation

Horizontal cabling is the correct answer because it refers to the subsystem of the ANSI/TIA/EIA-568-B structured cabling that recognizes multimode cable. Horizontal cabling connects the work area outlets to the telecommunications room or equipment room, and it is responsible for carrying the data signals to and from the active equipment. This subsystem includes the cables, connectors, and patch panels that are used for this purpose. Therefore, it is the subsystem that recognizes and supports the use of multimode cable.

Submit
49. Which ANSI/TIA/EIA standard defines labeling cables and patch panels?

Explanation

ANSI/TIA/EIA 606-A is the standard that defines labeling cables and patch panels. This standard provides guidelines for the identification and labeling of telecommunications infrastructure, including cables and patch panels. It ensures that proper labeling is used to identify and manage the connections and components in a network infrastructure, making it easier to troubleshoot and maintain the system.

Submit
50. What Air Force Systems Security Instruction (AFSSI) directs implementation of protected distribution systems?

Explanation

Air Force Systems Security Instruction (AFSSI) 7703 directs the implementation of protected distribution systems.

Submit
51. What components are used in both encryption and decryption?

Explanation

Encryption and decryption both involve the use of an algorithm and a key. The algorithm determines the specific process used to transform the data, while the key is a unique value that is used to control the encryption or decryption process. The algorithm and key work together to ensure that the data is securely transformed and can only be accessed by authorized parties who possess the correct key. The other options, such as certificate and telephone, are not components typically used in encryption and decryption processes.

Submit
52. What are the two basic types of computer cryptology?

Explanation

The correct answer is "Symmetric-secret key system and asymmetric-public key system". Cryptology refers to the study and practice of techniques for secure communication. In a symmetric-secret key system, the same key is used for both encryption and decryption. This means that both the sender and receiver need to have the same secret key. In an asymmetric-public key system, there are two different keys: a public key for encryption and a private key for decryption. The public key can be freely shared, while the private key is kept secret. This allows for secure communication without the need for both parties to share a secret key.

Submit
53. Communications Security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure:

Explanation

COMSEC refers to the measures and controls implemented to prevent unauthorized individuals from accessing information. In this context, authenticity refers to the assurance that the information received or transmitted is genuine and has not been tampered with or altered in any way. It ensures that the information comes from a trusted source and can be relied upon for accuracy. By maintaining authenticity, COMSEC measures help to protect the integrity and validity of the information being communicated.

Submit
54. The Communications Security (COMSEC) program is designed to:

Explanation

The correct answer is "detect and correct procedural weaknesses that could expose critical information". The Communications Security (COMSEC) program aims to identify and address any vulnerabilities or weaknesses in procedures that could potentially lead to the exposure of sensitive information. By detecting and correcting these procedural weaknesses, the program helps to ensure the protection of critical information from unauthorized access or interception.

Submit
55. Top secret keying material must be handled, stored, transported and destroyed under:

Explanation

Two-person integrity (TPI) control is necessary for handling, storing, transporting, and destroying top secret keying material. This means that at least two authorized individuals must be present at all times during these activities to ensure accountability and prevent unauthorized access or tampering. TPI control adds an extra layer of security and reduces the risk of compromise or loss of sensitive information.

Submit
56. Which form is used as a register log to record visitors into restricted areas?

Explanation

AF Form 1109 is used as a register log to record visitors into restricted areas.

Submit
57. The Tactical Local Area Network Encryptor (TACLANE)-Micro can acquire an Internet Protocol (IP) address via Dynamic Host Configuration Protocol (DHCP) on which side?

Explanation

The TACLANE-Micro can acquire an IP address via DHCP on either the ciphertext or plaintext side. This means that it can obtain an IP address regardless of whether the data being transmitted is encrypted (ciphertext) or unencrypted (plaintext).

Submit
58. The Asset Inventory Management System (AIM) is part of what?

Explanation

The Asset Inventory Management System (AIM) is a part of the Air Force Equipment Management System (AFEMS). AFEMS is a comprehensive system that allows the Air Force to effectively manage and track its equipment inventory. AIM specifically focuses on managing and tracking assets within the inventory, ensuring accurate and up-to-date information on their location, condition, and usage. By being a part of AFEMS, AIM is integrated into a larger system that provides a holistic approach to equipment management for the Air Force.

Submit
59. Which voicemail system was one of the earliest digital voicemail systems running on a private branch exchange (PBX)?

Explanation

Meridian mail was one of the earliest digital voicemail systems running on a private branch exchange (PBX). It was developed by Nortel, a telecommunications equipment manufacturer. Meridian mail allowed users to store and retrieve voicemail messages digitally, providing a more efficient and advanced alternative to traditional analog voicemail systems. It was widely used in businesses and organizations that utilized PBX systems for their communication needs.

Submit
60. Which application has not been used for automating central office records?

Explanation

The Integrated Maintenance Data System (IMDS) has not been used for automating central office records. This indicates that the other three applications mentioned - Configuration Accounting Information Retrieval System (CAIRS), Telephone Plant Automated Records System (Telpars), and Microsoft Access - have been utilized for automating central office records.

Submit
61. Which Telecommunications Management System (TMS) network management functional area contains line, circuit, cable, and customer information?

Explanation

Configuration management is the correct answer because it is the functional area within a Telecommunications Management System (TMS) that contains line, circuit, cable, and customer information. Configuration management involves the management and control of network elements, their attributes, and their relationships, which includes the information about lines, circuits, cables, and customers. This functional area is responsible for maintaining accurate and up-to-date information about the network configuration.

Submit
62. Which network management funcational area monitors and audits the Telecommunications Management System (TMS) operating level?

Explanation

Performance management is the network management functional area that monitors and audits the Telecommunications Management System (TMS) operating level. This involves monitoring the performance of the network, identifying any issues or bottlenecks, and ensuring that the network is operating at its optimal level. Performance management also includes analyzing data and generating reports to assess the overall performance of the network and make any necessary improvements.

Submit
63. In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the web server give to the browser?

Explanation

In Secure Socket Layer (SSL), before an encrypted transaction takes place, the web server gives its public key to the browser. The public key is used to encrypt the data sent from the browser, ensuring that only the web server with the corresponding private key can decrypt and read the information. This allows for secure communication between the browser and the web server, protecting sensitive data from unauthorized access.

Submit
64. Which Communications Security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

Explanation

Physical security refers to the measures taken to protect physical assets, such as buildings, equipment, and personnel, from unauthorized access, damage, or theft. In the context of Communications Security (COMSEC), physical security plays a crucial role in safeguarding priority resources of the US Air Force. It involves implementing measures like access control, surveillance, and secure storage to deter, detect, and defeat hostile acts. By ensuring the physical protection of resources, physical security helps to prevent unauthorized individuals from gaining access to sensitive information or disrupting critical communication systems.

Submit
65. Which form is used with a transfer report to accompany a Communications Security (COMSEC) package?

Explanation

The correct answer is SF 153. SF 153 is the form that is used with a transfer report to accompany a Communications Security (COMSEC) package. This form is specifically designed for documenting the transfer of COMSEC material between different locations. It provides a standardized format for recording important information such as the date and time of the transfer, the names and signatures of the individuals involved, and any additional remarks or instructions. By using SF 153, organizations can ensure proper accountability and control over their COMSEC assets during transit.

Submit
66. The Tactical Local Area Network Encryptor (TACLANE)-Micro may be equipped to handle all of the following types of networks except?

Explanation

The TACLANE-Micro is capable of handling networks such as Asynchronous Transfer Mode (ATM), Gigabit Ethernet, and Fast Ethernet. However, it is not equipped to handle wireless networks.

Submit
67. Which common crypto fill device uses the Windows CE operating system?

Explanation

The AN/PYQ-10 Simple Key Loader is a common crypto fill device that uses the Windows CE operating system. This device is used to load cryptographic keys into various communication systems and equipment. The Windows CE operating system provides a secure and reliable platform for managing and transferring sensitive cryptographic information.

Submit
68. The Asset Inventory Management (AIM) system includes what type of database and is located where?

Explanation

The Asset Inventory Management (AIM) system includes an Oracle database at Wright-Patterson AFB. This means that the AIM system utilizes an Oracle database for managing its asset inventory, and this database is located at Wright-Patterson AFB.

Submit
69. Which way to send a network message using the Call Pilot voice mail system is only available with the Audio Message Interchange Specifications (AMIS) protocol?

Explanation

Direct addressing is the only way to send a network message using the Call Pilot voice mail system that is available with the Audio Message Interchange Specifications (AMIS) protocol. This means that the message can be sent directly to a specific mailbox or user without any intermediate steps or processes. It allows for more efficient and targeted communication within the network.

Submit
70. Which feature is an automated Telecommunications Management System (TMS) advantage?

Explanation

The design is an automated Telecommunications Management System (TMS) advantage because it refers to the overall structure and layout of the system. A well-designed TMS can provide a user-friendly interface, intuitive navigation, and efficient workflows, making it easier for users to manage and control telecommunications activities. A good design can also enhance the system's scalability, flexibility, and performance, allowing it to adapt to changing business needs and handle large volumes of data effectively.

Submit
71. Which TIA/EIA parameter test is a measure of the degree of impedance mismatch between two impedances?

Explanation

Return loss is a measure of the degree of impedance mismatch between two impedances. It quantifies the amount of power that is reflected back to the source due to the impedance mismatch. A high return loss indicates a low level of reflection and a good impedance match, while a low return loss indicates a high level of reflection and a poor impedance match.

Submit
72. The RED/BLACK concept has which two parts?

Explanation

The RED/BLACK concept involves two parts: physical separation and electrical separation. Physical separation refers to the physical isolation of networks or systems to prevent unauthorized access or data leakage. Electrical separation refers to the use of different power sources or isolation techniques to prevent electrical interference between connected systems. These two parts work together to ensure the security and integrity of sensitive information and prevent any potential vulnerabilities or compromises.

Submit
73. Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy Communications Security (COMSEC) material?

Explanation

AFI 33-201, Volume 1 would provide guidance on how to properly store, control, safeguard, transfer, and destroy Communications Security (COMSEC) material.

Submit
74. The KIV-7 does not support which set of electrical standards?

Explanation

The KIV-7 does not support the RS-422 electrical standards. RS-422 is a standard for serial communication that specifies the electrical characteristics of balanced voltage digital interface circuits. The KIV-7, however, does not have the capability to support this particular standard.

Submit
75. What is the maximum throughput in megabits per second (Mbps) for the TACLANE-E100?

Explanation

The TACLANE-E100 has a maximum throughput of 165 Mbps for full-duplex communication, meaning it can send and receive data simultaneously at this speed. For half-duplex communication, where data can only be sent or received at one time, the maximum throughput is 100 Mbps.

Submit
76. Which common crypto fill device is a hand-held personal computer compatible device and is a Cryptographic Controlled Item (CCI)?

Explanation

The AN/CYZ-10 Data Transfer Device is a common crypto fill device that is hand-held and compatible with personal computers. It is also classified as a Cryptographic Controlled Item (CCI).

Submit
77. Integrated Maintenance Data Systems (IMDS) is an Air Force enterprise-level automated maintenance management information system for:

Explanation

The correct answer is "weapons systems and support equipment". Integrated Maintenance Data Systems (IMDS) is an Air Force automated maintenance management information system that is specifically designed for managing and maintaining weapons systems and support equipment. It helps in tracking maintenance activities, scheduling repairs, and ensuring the readiness of these critical assets.

Submit
78. Which is not a function that maintainers perform with the Integrated Maintenance Data System (IMDS)?

Explanation

The Integrated Maintenance Data System (IMDS) is a system used by maintainers to perform various functions. These functions include automating equipment history, scheduling, and other processes; functioning as a common interactive interface for other systems; and providing status and inventory data. However, rolling base-level logistics data up to the Air Force level is not a function performed by maintainers with IMDS.

Submit
79. Which feature is an automated Telecommunications Management System (TMS) advantage?

Explanation

Network management functions are an automated Telecommunications Management System (TMS) advantage because they allow for efficient monitoring and control of a network. These functions enable administrators to track network performance, identify and resolve issues, allocate resources effectively, and ensure optimal network operation. By automating these tasks, TMS can save time and effort for network administrators, improve network reliability, and enhance overall network performance.

Submit
80. The work area of the ANSI/TIA/EIA-568-B structured cabling system consists of all except which components?

Explanation

The work area of the ANSI/TIA/EIA-568-B structured cabling system consists of components such as patch cables, adapters, and station equipment. Patch panels, on the other hand, are not part of the work area. Patch panels are typically located in the telecommunications room or equipment room, where they serve as a central point for connecting and managing the various cables in the structured cabling system.

Submit
81. The Tactical Local Area Connection Encryptor (TACLANE)-Micro can be used to overlay what type of networks on top of existing public and private network infrastructures?

Explanation

The TACLANE-Micro can be used to overlay Secure Virtual Networks on top of existing public and private network infrastructures. This means that it provides a secure and encrypted network layer on top of the existing networks, ensuring the confidentiality and integrity of the data transmitted over these networks. This allows organizations to securely transmit sensitive information over public or private networks without compromising security.

Submit
82. Which common crypto fill device is battery powered and has no internal memory storage?

Explanation

The correct answer is AN/PYQ-10 Simple Key Loader. It is a common crypto fill device that is battery powered and has no internal memory storage. The KOI-18 General Purpose Tape Reader is not battery powered and the KYK-13 Electronic Transfer Device and AN/CYZ-10 Data Transfer Device have internal memory storage.

Submit
83. The Air Force has adopted Telecommunications Management System (TMS) as the standard application to maintain and generate:

Explanation

The Air Force has adopted Telecommunications Management System (TMS) as the standard application to maintain and generate central office records. This means that TMS is used to keep track of and create records related to the central office, which is the main hub for telecommunication services in an organization. It is likely that TMS is used to store information such as equipment inventory, service orders, and network configurations specific to the central office.

Submit
84. Which is not a use for local user accounts?

Explanation

Local user accounts are used to control access and permissions on a specific computer or device. They are not typically used to control a user's permissions on the local network. Network permissions are usually managed through network user accounts or group policies. Local user accounts are more focused on controlling access to resources and settings on the individual machine itself, such as limiting access to printers or programs.

Submit
85. Which TIA/EIA parameter test is a measure of the decrease of signal strength as it travels down the media?

Explanation

Insertion loss is a measure of the decrease in signal strength as it travels down the media. It represents the amount of signal that is lost or attenuated when passing through a component or connection. This loss can occur due to impedance mismatches, reflections, or absorption within the media. By measuring insertion loss, one can assess the efficiency and quality of the transmission system and identify any potential issues that may affect signal integrity.

Submit
86. The Tactical Local Area Network Encryptor (TACLANE)-Micro is a packet encryption device for Internet Protocol (IP):

Explanation

The TACLANE-Micro is a packet encryption device specifically designed for Internet Protocol (IP) version 4. This means that it is not compatible with IP version 5 or version 6. It is important to note that the device can only encrypt packets for IP version 4, indicating that it does not support encryption for any other IP versions.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 02, 2017
    Quiz Created by
    Jordan
Cancel
  • All
    All (86)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What cabling is the most commonly used?
Which category (Cat) of cable can support data rates up to 100 Mbps?
Which principle is not addressed in the ANSI/TIA/EIA-568-B Standard?
What cabling system subsystem provides any or all of the functions of...
Which method is not a means for secure telecommunications?
In the RED/BLACK concept, what type of traffic do RED lines carry?
TEMPEST IS:
What is the purpose of the TEMPEST program?
What is the TEMPEST program in the Air Force called?
Protected distribution systems (PDS) events such as alarms and...
Which cryptology system has a disadvantage of using more processing...
Triple Data Encryption Standard (DES) is based on three compound...
Which port on the office version Secure Telephone Equipment (STE) can...
What provides the Secure Telephone Equipment (STE) with its security...
Which common crypto fill device is capable of downloading...
In Remedy, tickets can be assigned to whom?
Only after what, are tickets allowed to be placed in the...
Why are users required to change their passwords upon logging onto the...
Which principle is not addressed in the ANSI/TIA/EIA-568-B Standard?
Which TIA/EIA parameter test is a measure of the unwanted signal...
What area is described as the completed building or facility area...
Protected distribution systems (PDS) require which schedule...
What is the difference between data encryption and voice encryption?
Which authorities are trusted entities that issue certificates?
What infrastructure is a set of hardware, software, policies and...
What are the two major types of encryption algorithms in the use today...
Data Encryption Standard (DES) uses how many bits for its key?
What is the newest generation of secure voice telephone?
Which secure voice telephone can be used on the Integrated Services...
The Secure Telephone Equipment (STE) consists of what two parts?
The KIV-7 cryptographic device provides protection up to what...
TACLANE-Classic and TACLANE-E100 are high-speed encryption devices...
What publication governs the format of Alias names for email accounts?
What condition occurs when a signal is induced into one circuit from...
Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system...
Which subsystem of the ANSI/TIA/EIA-568-B stuctured cabling can be...
Which subsytem of the ANSI/TIA/EIA-568-B structured cabling can be...
A line route inspection of a  protected distribution system (PDS)...
What using a Secure Terminal Equipment (STE), what is encrypted?
Which encryption is not a telecommunications encryption type?
What reference would you use for guidance on Air Force messaging?
When a security container is opened, it is inventoried at the:
The Secure Telephone Equipment (STE) cannot communicate securely with...
The KG-175D is what type of Tactical Local Area Network Encryptor...
Who may close tickets in Remedy?
Whar are the two types of accounts supported by Windows operation...
Which subsystem of the ANSI/TIA/EIA-568-B structured cabling extends...
Which subsystem of the ANSI/TIA/EIA-568-B structured cabling...
Which ANSI/TIA/EIA standard defines labeling cables and patch panels?
What Air Force Systems Security Instruction (AFSSI) directs...
What components are used in both encryption and decryption?
What are the two basic types of computer cryptology?
Communications Security (COMSEC) is defined as the measures and...
The Communications Security (COMSEC) program is designed to:
Top secret keying material must be handled, stored, transported and...
Which form is used as a register log to record visitors into...
The Tactical Local Area Network Encryptor (TACLANE)-Micro can acquire...
The Asset Inventory Management System (AIM) is part of what?
Which voicemail system was one of the earliest digital voicemail...
Which application has not been used for automating central office...
Which Telecommunications Management System (TMS) network management...
Which network management funcational area monitors and audits the...
In Secure Socket Layer (SSL), before an encrypted transaction takes...
Which Communications Security (COMSEC) application provides us with...
Which form is used with a transfer report to accompany a...
The Tactical Local Area Network Encryptor (TACLANE)-Micro may be...
Which common crypto fill device uses the Windows CE operating system?
The Asset Inventory Management (AIM) system includes what type of...
Which way to send a network message using the Call Pilot voice mail...
Which feature is an automated Telecommunications Management System...
Which TIA/EIA parameter test is a measure of the degree of impedance...
The RED/BLACK concept has which two parts?
Where would you find guidance on how to properly store, control,...
The KIV-7 does not support which set of electrical standards?
What is the maximum throughput in megabits per second (Mbps) for the...
Which common crypto fill device is a hand-held personal computer...
Integrated Maintenance Data Systems (IMDS) is an Air Force...
Which is not a function that maintainers perform with the Integrated...
Which feature is an automated Telecommunications Management System...
The work area of the ANSI/TIA/EIA-568-B structured cabling system...
The Tactical Local Area Connection Encryptor (TACLANE)-Micro can be...
Which common crypto fill device is battery powered and has no internal...
The Air Force has adopted Telecommunications Management System (TMS)...
Which is not a use for local user accounts?
Which TIA/EIA parameter test is a measure of the decrease of signal...
The Tactical Local Area Network Encryptor (TACLANE)-Micro is a packet...
Alert!

Advertisement