1.
(001) Which 3D career field deploys, sustains, troubleshoots, and repairs wireless, line-of-sight,
beyond line-of-sight, wideband and ground-based satellite and encryption transmission devices?
Correct Answer
A. Radio Frequency Transmission Systems (3D1X3).
Explanation
The correct answer is Radio Frequency Transmission Systems (3D1X3). This career field involves deploying, sustaining, troubleshooting, and repairing various types of wireless, line-of-sight, beyond line-of-sight, wideband, and ground-based satellite and encryption transmission devices. This field focuses on the transmission of radio frequency signals and ensuring their proper functioning.
2.
(002) Which of the following is not a communications security program duty and responsibility for
Cyber Transport Systems?
Correct Answer
B. B. Technical security.
Explanation
The correct answer is b. Technical security. Technical security refers to the protection of computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. While it is an important aspect of overall cybersecurity, it is not specifically a duty and responsibility of communications security programs for Cyber Transport Systems. Communications security programs primarily focus on ensuring the confidentiality, integrity, and availability of information during transmission, as well as protecting against unauthorized disclosure or interception. This includes duties and responsibilities related to transmission security, emission security, and physical security.
3.
(003) What is defined as an integrated bundle of expert knowledge and organizational skills
inherent to a particular career field?
Correct Answer
C. C. Core competency.
Explanation
Core competency is defined as an integrated bundle of expert knowledge and organizational skills inherent to a particular career field. It refers to the unique capabilities and strengths that individuals possess, allowing them to perform their job effectively and differentiate themselves from others in the same field. Core competencies are essential for success in a specific role or profession and are developed through education, training, and experience. They contribute to an individual's overall effectiveness and are crucial for achieving organizational goals and objectives.
4.
(003) Which of the following is a core competency of Cyber Transport Systems?
Correct Answer
B. B. Voice network systems.
Explanation
The core competency of Cyber Transport Systems is voice network systems. This means that Cyber Transport Systems specializes in designing, implementing, and managing voice communication networks. They have expertise in technologies and protocols related to voice communication, such as VoIP (Voice over Internet Protocol) and PBX (Private Branch Exchange) systems. This competency allows Cyber Transport Systems to provide efficient and reliable voice communication solutions to their clients.
5.
(004) Which AF form is used to report hazardous conditions that place Air Force personnel or
property at risk?
Correct Answer
B. B. 457.
Explanation
AF Form 457 is used to report hazardous conditions that place Air Force personnel or property at risk. This form is specifically designed for reporting safety concerns and is used to document and track hazards in order to ensure appropriate corrective actions are taken. It allows individuals to report any unsafe conditions they observe, such as faulty equipment, unsafe work practices, or potential hazards, so that they can be addressed promptly and effectively. By using AF Form 457, the Air Force can maintain a safe working environment and prevent accidents or injuries.
6.
(005) Which hazard is not one of the four major types of hazards?
Correct Answer
D. Nuclear.
Explanation
The correct answer is Nuclear. Nuclear hazards are not included in the four major types of hazards, which are biological, chemical, and physical hazards. Nuclear hazards refer to the risks associated with nuclear power plants, radioactive materials, and nuclear weapons. While nuclear hazards are significant and pose serious threats, they are not typically categorized as one of the four major types of hazards.
7.
(005) Which hazard is caused by heavy workloads, lack of control over the pace of work, shift
work, noise, working by yourself, and conflict with coworkers and employers?
Correct Answer
D. D. Stress.
Explanation
The given correct answer is d. Stress. This is because heavy workloads, lack of control over the pace of work, shift work, noise, working by yourself, and conflict with coworkers and employers are all factors that can contribute to high levels of stress in the workplace. Stress can have negative effects on both physical and mental health, and can lead to various health problems such as anxiety, depression, and cardiovascular issues.
8.
(005) To prevent manual handling hazards, utilize team lifting when lifting items that weigh more
than how many pounds?
Correct Answer
A. A. 25.
Explanation
To prevent manual handling hazards, team lifting should be utilized when lifting items that weigh more than 25 pounds. This is because lifting heavy objects on your own can put excessive strain on your body and increase the risk of injuries such as back strains or muscle sprains. By using team lifting, the weight is distributed among multiple individuals, reducing the strain on each person and minimizing the risk of injury.
9.
(005) When working on electrical circuits, the role of safety observer is normally performed by the
Correct Answer
D. D. supervisor.
Explanation
The safety observer plays a crucial role in ensuring the safety of the individuals working on electrical circuits. They are responsible for monitoring the work being done, identifying potential hazards, and taking immediate action in case of an emergency. The supervisor, being in a position of authority and having knowledge of safety protocols, is best suited to perform this role effectively. They can provide guidance, enforce safety measures, and make informed decisions to prevent accidents and ensure the well-being of everyone involved.
10.
(005) When working on electrical circuits, you may only wear metal framed eyeglasses if
Correct Answer
D. D. they are secured with a nonmetallic cord.
Explanation
When working on electrical circuits, it is important to ensure that any metal-framed eyeglasses are secured with a nonmetallic cord. This is because if the circuit is energized and there is a potential for electrical shocks or sparks, the metal frames could conduct electricity and pose a safety hazard. By securing the glasses with a nonmetallic cord, the risk of electrical conduction is minimized, providing a safer working environment.
11.
(006) To whom does the risk management (RM) process apply?
Correct Answer
A. A. All personnel.
Explanation
The risk management (RM) process applies to all personnel. This means that it is not limited to a specific group or department within an organization. Risk management is a systematic approach to identifying, assessing, and mitigating risks in order to protect the organization, its employees, and its assets. By applying the RM process to all personnel, the organization ensures that everyone is involved in identifying and managing risks, promoting a culture of safety and accountability throughout the entire organization.
12.
(006) What simple, systematic process allows commanders to maximize combat capability, while
limiting risk?
Correct Answer
C. C. Risk management.
Explanation
Risk management is a simple, systematic process that allows commanders to maximize combat capability while limiting risk. It involves identifying, assessing, and prioritizing risks, and then implementing measures to mitigate or eliminate those risks. By effectively managing risks, commanders can make informed decisions that optimize their combat capabilities while minimizing potential hazards and threats. Safety control and safety management are related concepts but focus more on ensuring the physical well-being and welfare of personnel, whereas risk management encompasses a broader approach to overall mission success.
13.
(007) Which of the following is a principle of risk management (RM)?
Correct Answer
B. B. Apply the RM process continuously.
Explanation
The correct answer is b. Apply the RM process continuously. This principle of risk management emphasizes the importance of consistently applying the risk management process throughout a project or organization. By continuously assessing and managing risks, potential issues can be identified and addressed in a timely manner, reducing the likelihood of negative impacts on the project or organization. This principle promotes a proactive approach to risk management, ensuring that risks are constantly monitored and mitigated.
14.
(007) How many steps are in the risk management (RM) process?
Correct Answer
B. B. Five.
Explanation
The correct answer is b. Five. The risk management process typically consists of five steps. These steps include identifying risks, assessing and analyzing risks, developing risk response strategies, implementing risk response strategies, and monitoring and controlling risks. Each step is crucial in effectively managing and mitigating risks within an organization or project.
15.
(008) An enclave that does not have a firewall and intrusion detection system (IDS) is classified
as having what category of vulnerability?
Correct Answer
A. A. I.
Explanation
An enclave that does not have a firewall and intrusion detection system (IDS) is classified as having a Category I vulnerability. This means that the enclave has a critical vulnerability, as it lacks basic security measures such as a firewall and IDS. Without these protections in place, the enclave is highly susceptible to unauthorized access and potential attacks.
16.
(008) How many Integrated Network and Operation Security Centers (INOSC) does the Air Force
have?
Correct Answer
B. B. Two.
Explanation
The Air Force has two Integrated Network and Operation Security Centers (INOSC).
17.
(008) The Integrated Network Operations and Security Centers (INOSC) has several
responsibilities except
Correct Answer
D. D. install patches or perform any upgrades provided by the Air Force Enterprise Network
(AFEN).
Explanation
The Integrated Network Operations and Security Centers (INOSC) is responsible for several tasks, including maintaining sole administrative privileges on the firewall, standardizing, configuring, backing up, and otherwise maintaining the firewall, and maintaining a single naming/configuration standard for boundary devices. However, they are not responsible for installing patches or performing any upgrades provided by the Air Force Enterprise Network (AFEN). This responsibility likely falls under a different department or team within the organization.
18.
(009) Which term is used to describe the technology for transmitting voice communications over
a data network using open-standard-based internet protocol (IP)?
Correct Answer
A. A. IP telepHony.
Explanation
IP telephony is the correct term used to describe the technology for transmitting voice communications over a data network using open-standard-based internet protocol (IP). This technology allows voice calls to be made over the internet rather than traditional telephone lines. It utilizes IP networks to transmit voice data packets, enabling cost-effective and efficient communication. Network telephony refers to the broader concept of telephony services provided over a network, while voice protection system is unrelated to the given technology. Voice over Internet Protocol (VoIP) is another commonly used term that refers to the same technology as IP telephony.
19.
(009) You should implement all of the following security features to help defend internet protocol
(IP) telephony systems from attackers except
Correct Answer
C. C. consolidating your voice with your data using virtual local area networks (VLAN).
20.
(009) At which open systems interconnect (OSI) layer does a packet filter gateway operate at?
Correct Answer
B. B. 3.
Explanation
A packet filter gateway operates at the third layer of the OSI model, which is the network layer. This layer is responsible for routing and forwarding packets across different networks. A packet filter gateway examines the headers of incoming packets and makes decisions on whether to allow or block them based on predetermined rules. By operating at this layer, the packet filter gateway can filter and control network traffic based on IP addresses, ports, protocols, and other criteria.
21.
(009) At which open systems interconnect (OSI) layer does a circuit layer gateway operate?
Correct Answer
B. B. 4.
Explanation
A circuit layer gateway operates at the fourth OSI layer, also known as the transport layer. This layer is responsible for ensuring reliable transmission of data between end systems, including error detection and correction, flow control, and congestion avoidance. The circuit layer gateway specifically manages the establishment, maintenance, and termination of virtual circuits for communication between different networks. It provides a connection-oriented service and can perform functions such as segmentation and reassembly of data packets.
22.
(009) At which open systems interconnect (OSI) layer does an application-level firewall operate?
Correct Answer
D. D. 7.
Explanation
An application-level firewall operates at the seventh layer of the OSI model, which is the application layer. This layer is responsible for providing services directly to the end-user applications. An application-level firewall can monitor and control the traffic based on specific application protocols and can filter and block certain types of traffic based on the application being used. This allows for more granular control and security measures at the application level.
23.
(010) The disadvantage of a host-based intrusion detection system (HIDS) is that it
Correct Answer
B. B. consumes resources on the host it resides on and slows that device down.
Explanation
A host-based intrusion detection system (HIDS) is a security measure that is installed on a specific host or device to monitor and detect any unauthorized activities or intrusions. One disadvantage of using a HIDS is that it consumes resources on the host it resides on, which can slow down the device's performance. This is because the HIDS continuously analyzes and monitors the host's activities, which requires processing power and memory. As a result, the device may experience decreased speed and performance while the HIDS is running.
24.
(010) One advantage of a network-based intrusion detection system (NIDS) is that it
Correct Answer
B. B. uses very few network resources.
Explanation
A network-based intrusion detection system (NIDS) is designed to monitor network traffic and detect any suspicious or malicious activity. One advantage of a NIDS is that it uses very few network resources. This means that it does not significantly impact the performance or bandwidth of the network it is monitoring. By using minimal resources, the NIDS can effectively monitor the network without causing any disruptions or slowdowns. This makes it a practical and efficient solution for detecting and preventing network intrusions.
25.
(010) Which intrusion detection system (IDS) uses software sensors?
Correct Answer
C. C. Host-based.
Explanation
Host-based intrusion detection systems (IDS) use software sensors to monitor and analyze activities on a specific host or endpoint. These sensors are installed directly on the host and are capable of monitoring events such as file changes, system calls, network connections, and user activities. By analyzing these events, host-based IDS can detect and alert on suspicious or malicious activities occurring on the host itself. This makes host-based IDS particularly effective in detecting insider threats and attacks targeting specific hosts or endpoints.
26.
(010) Which intrusion detection system (IDS) monitors packets for protocol anomalies and known
virus signatures?
Correct Answer
D. D. Network-based.
Explanation
A network-based intrusion detection system (IDS) monitors packets for protocol anomalies and known virus signatures. This means that it analyzes the network traffic and looks for any abnormal behavior or patterns that may indicate a potential intrusion or attack. It also compares the packets against a database of known virus signatures to identify any malicious activity. Network-based IDS is different from host-based IDS, which monitors the activities on individual hosts or devices.
27.
(010) Host-based intrusion detection systems (HIDS) are
Correct Answer
C. C. passive and active.
Explanation
Host-based intrusion detection systems (HIDS) are capable of both passive and active functions. Passive HIDS monitor and analyze system logs, network traffic, and other data sources to detect potential security breaches. They do not take direct action but provide alerts and reports to system administrators. Active HIDS, on the other hand, not only monitor but also respond to security threats by taking actions such as blocking suspicious network traffic, terminating processes, or isolating compromised systems. Therefore, HIDS can perform both passive monitoring and active response to enhance the security of the host system.
28.
(010) Network-based intrusion detection systems (NIDS) are
Correct Answer
B. B. passive only.
Explanation
Network-based intrusion detection systems (NIDS) are classified as passive only because they monitor network traffic passively without actively interfering or modifying it. NIDS analyze network packets and compare them against a database of known attack signatures or abnormal behaviors to detect potential intrusions. They do not actively block or prevent attacks but instead provide alerts or notifications to system administrators for further investigation and response.
29.
(011) What security posture permits everything that is not specifically denied?
Correct Answer
D. D. Open.
Explanation
The correct answer is "d. Open." An open security posture permits everything that is not specifically denied. This means that by default, all actions and access are allowed unless explicitly restricted. It is the opposite of a default deny posture, where everything is denied unless specifically allowed.
30.
(012) What type of certificate authenticates the identity of the user?
Correct Answer
A. A. Digital.
Explanation
A digital certificate is a type of certificate that authenticates the identity of the user. It is used to verify that the user is who they claim to be in digital transactions. Digital certificates use cryptographic keys to ensure the integrity and security of the information being transmitted. This type of certificate is commonly used in online banking, e-commerce, and other secure online transactions to establish trust between the user and the website or service.
31.
(012) What is the first line of defense in securing laptops?
Correct Answer
A. A. Set a login ID and password combination for access.
Explanation
The first line of defense in securing laptops is setting a login ID and password combination for access. This helps to ensure that only authorized individuals can access the laptop and its data. Biometrics and encryption certificates (option b) provide additional layers of security, but setting a login ID and password is the initial step in securing the device. Placing a lock on the computer (option c) and storing it in a locked case (option d) are physical measures that can prevent unauthorized physical access, but they do not protect against remote access or data breaches.
32.
(013) The definition of integrity as applied to identification, authentication, and encryption is
Correct Answer
D. D. the assurance that no one has changed or destroyed information without permission.
Explanation
The correct answer is d. the assurance that no one has changed or destroyed information without permission. This definition of integrity refers to the trustworthiness and reliability of data. It ensures that information remains intact and unaltered, guaranteeing its accuracy and consistency. By maintaining data integrity, organizations can prevent unauthorized modifications or deletions, thus preserving the authenticity and reliability of their data.
33.
(014) What Air Force Systems Security Instruction (AFSSI) series covers emission security
(EMSEC)?
Correct Answer
C. C. 7000.
Explanation
The correct answer is c. 7000. The Air Force Systems Security Instruction (AFSSI) series 7000 covers emission security (EMSEC). This series provides guidance and procedures for protecting against compromising emanations from electronic systems. EMSEC involves measures to prevent unauthorized interception and analysis of electromagnetic radiation emitted by electronic equipment, which could potentially reveal sensitive information or compromise the security of military systems. The AFSSI series 7000 specifically focuses on EMSEC and provides instructions for implementing protective measures to mitigate these risks.
34.
(015) Which AF System Security Instruction (AFSSI) provides the overall implementation of
DOD’s TEMPEST program?
Correct Answer
A. A. 7700.
Explanation
AFSSI 7700 provides the overall implementation of DOD's TEMPEST program.
35.
(015) Which method of containing radiated emanations requires both facility and equipment
testing?
Correct Answer
A. A. Zoning.
Explanation
Zoning is the method of containing radiated emanations that requires both facility and equipment testing. Zoning involves dividing a facility into different zones based on the level of sensitivity to radiated emanations. Each zone is then tested to ensure that the equipment and facilities within it meet the required standards for containing radiated emanations. This method ensures that sensitive information is protected from being intercepted or compromised by unauthorized individuals or entities.
36.
(015) A facility with an inspectable space of more than 20 meters, but less than 100 meters would
be considered to be in facility zone
Correct Answer
B. B. B.
Explanation
A facility with an inspectable space of more than 20 meters, but less than 100 meters would be considered to be in facility zone B. This indicates that the facility falls within a specific range of inspectable space, which is between 20 and 100 meters.
37.
(015) Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100 meters would
be considered to be in equipment zone
Correct Answer
C. C. C.
Explanation
Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100 meters would be considered to be in equipment zone C. This means that the equipment is located within a designated area where electromagnetic radiation from the equipment can potentially be intercepted and exploited by unauthorized individuals. The ERTZ helps determine the level of security measures needed to protect the equipment and prevent unauthorized access to sensitive information.
38.
(015) Why must the use of TEMPEST-certified equipment be validated by an AF Certified
TEMPEST technical authority (CTTA) prior to testing an inspectable space?
Correct Answer
D. D. It is expensive.
Explanation
The use of TEMPEST-certified equipment must be validated by an AF Certified TEMPEST technical authority (CTTA) prior to testing an inspectable space because it is expensive. This suggests that there are costs associated with the validation process, which may include the expertise and resources required for the certification. The expense involved in the validation process highlights the importance of ensuring that the equipment meets the necessary standards for protecting against electromagnetic radiation and potential security risks.
39.
(015) What plays a major role in a conductor’s ability to minimizing compromising emanations?
Correct Answer
A. A. Distance and angle.
Explanation
The correct answer is a. Distance and angle. Distance refers to the physical separation between the conductor and the source of emanations, while angle refers to the direction or orientation of the conductor in relation to the source. By increasing the distance and changing the angle, a conductor can minimize the compromising emanations, which are unintentional signals or radiation that can potentially be intercepted or exploited by unauthorized individuals.
40.
(016) Equipment is comprised as machines that process information in electronic or electrical
form.
What equipment should be designated as RED?
Correct Answer
D. D. Equipment processing clear-text classified information.
Explanation
The equipment that should be designated as RED is the one processing clear-text classified information. This means that the equipment is handling information that is not encrypted and is considered confidential and classified.
41.
(016) What equipment should be designated as BLACK when designating equipment that
supports physical and electrical concepts?
Correct Answer
B. B. Equipment processing encrypted classified information.
Explanation
The equipment that supports physical and electrical concepts should be designated as BLACK when it is processing encrypted classified information. This means that the equipment is capable of handling and processing information that has been encrypted to protect its confidentiality and integrity.
42.
(016) Which type of separation ensures that every signal conductor from a RED device routes to
another RED device, or becomes encrypted before connecting to a BLACK device?
Correct Answer
B. B. Electrical.
Explanation
Electrical separation ensures that every signal conductor from a RED device routes to another RED device or becomes encrypted before connecting to a BLACK device. This type of separation is achieved by using techniques such as isolation transformers, opto-isolators, or galvanic isolation to prevent direct electrical connections between the RED and BLACK devices. By implementing electrical separation, the integrity and security of the signals are maintained, preventing unauthorized access or interference.
43.
(017) What is the grounding resistance goal for military communications electronics (C-E)
facilities?
Correct Answer
D. D. 10 ohms or less.
Explanation
The grounding resistance goal for military communications electronics (C-E) facilities is 10 ohms or less. This is because a low grounding resistance helps to ensure effective grounding and minimize the risk of electrical hazards such as electric shock and equipment damage. A lower grounding resistance allows for better dissipation of electrical currents and helps to maintain a stable electrical reference point for the equipment.
44.
(017) Which facility ground subsystem uses surge arrestors?
Correct Answer
D. D. Lightning protection.
Explanation
The facility ground subsystem that uses surge arrestors is the lightning protection system. Surge arrestors are devices that protect electrical systems from voltage spikes caused by lightning strikes. These devices divert the excess voltage to the ground, preventing damage to the electrical equipment. Therefore, option d, lightning protection, is the correct answer.
45.
(017) Which facility ground subsystem is also called the safety ground?
Correct Answer
B. B. Fault protection.
Explanation
The facility ground subsystem that is also called the safety ground is the fault protection. Fault protection is responsible for detecting and mitigating faults in electrical systems to ensure the safety of equipment and personnel. It is designed to quickly interrupt the flow of current in the event of a fault, preventing damage and reducing the risk of electrical shock or fire. The fault protection system is an essential component of any electrical installation, providing a reliable and low-impedance path for fault currents to flow, effectively grounding the system and protecting against electrical hazards.
46.
(017) Which facility ground subsystem is also called the “signal ground” and controls electrical
noise and static in a facility?
Correct Answer
C. C. Signal reference.
Explanation
The facility ground subsystem that is also called the "signal ground" is the signal reference. This subsystem is responsible for controlling electrical noise and static in a facility. It provides a stable reference point for signals and helps to maintain signal integrity by reducing interference and noise.
47.
(018) Bonds in the earth electrode subsystem normally are direct permanent bonds and do not
exceed a resistance of
Correct Answer
A. A. 1 milliohm.
Explanation
Bonds in the earth electrode subsystem need to have a low resistance in order to effectively conduct electrical current to the earth. A resistance of 1 milliohm is considered to be a very low resistance and ensures a good connection between the earth electrode subsystem and the earth. This low resistance helps to prevent the buildup of excessive voltage and ensures the safety and effectiveness of the grounding system.
48.
(018) What kind of bond is normally applied to signal reference bonds?
Correct Answer
D. D. Mechanical.
Explanation
Signal reference bonds are typically applied using mechanical bonding. Mechanical bonding involves physically connecting the conductive materials together using methods such as screws, bolts, or clamps. This type of bond ensures a secure and reliable connection between the signal reference points, allowing for accurate and consistent signal transmission. Unlike brazing or welding, which involve melting and fusing materials together, mechanical bonding does not require the use of heat or additional materials. Therefore, the correct answer is d. Mechanical.
49.
(019) What is required in electronic settings to prevent equipment and signals from propagating
interference and to protect equipment and signals from the effects of interference propagated by
other devices?
Correct Answer
B. B. Shielding.
Explanation
Shielding is required in electronic settings to prevent equipment and signals from propagating interference and to protect them from the effects of interference propagated by other devices. Shielding involves the use of conductive materials or coatings to create a barrier that blocks or absorbs electromagnetic interference (EMI) and radio frequency interference (RFI). This helps to maintain the integrity and reliability of electronic equipment and signals by reducing the impact of external interference sources.
50.
(019) Which type of shielding utilizes braid, foil, metal wrap, conduit or twisted wire around a
conductor?
Correct Answer
A. A. Cable.
Explanation
This type of shielding, which utilizes braid, foil, metal wrap, conduit or twisted wire around a conductor, is commonly used in cables. Cables are designed to transmit electrical signals or power and often consist of multiple conductors enclosed in a protective sheath. The shielding helps to protect the signal or power from external interference and minimize electromagnetic emissions.