CDC 3D151 Client Systems Journeyman Volume 3. Communications Systems Security And Management

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Atwellicus
A
Atwellicus
Community Contributor
Quizzes Created: 2 | Total Attempts: 381
Questions: 86 | Attempts: 100

SettingsSettingsSettings
CDC 3D151 Client Systems Journeyman Volume 3. Communications Systems Security And Management - Quiz


Questions and Answers
  • 1. 

    What condition occurs when a signal is induced into one circuit from another?

    • A.

      Noise

    • B.

      Jabber

    • C.

      Crosstalk

    • D.

      Intelligence

    Correct Answer
    C. Crosstalk
    Explanation
    401. 1-1

    Rate this question:

  • 2. 

    What cabling is the most commonly used?

    • A.

      Unshielded twisted pair (UTP)

    • B.

      Screened twisted pair (ScTP)

    • C.

      Shielded twisted pair (STP)

    • D.

      Foiled twisted pair (FTP)

    Correct Answer
    A. Unshielded twisted pair (UTP)
    Explanation
    401. 1-2

    Rate this question:

  • 3. 

    What category (Cat) of cable can support data rates up to 100Mbps?

    • A.

      Cat 3

    • B.

      Cat 5

    • C.

      Cat 6

    • D.

      Cat 5E

    Correct Answer
    B. Cat 5
    Explanation
    401. 1-2

    Rate this question:

  • 4. 

    Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?

    • A.

      Connector and pin assignment

    • B.

      Subsystems of structured cabling

    • C.

      Installation methods and practices

    • D.

      Recommended wireless topology and distances

    Correct Answer
    D. Recommended wireless topology and distances
    Explanation
    401. 1-2

    Rate this question:

  • 5. 

    Which principle is not addressed in the ANSI/TIA/EIA-568-B standard?

    • A.

      Minimum requirements for telecommunications cabling

    • B.

      Life span of a telecommunications cabling system

    • C.

      Connecting hardware performance specifications

    • D.

      Color of the cable

    Correct Answer
    D. Color of the cable
    Explanation
    401. 1-2

    Rate this question:

  • 6. 

    Which TIA/EIA parameter test is a measure of the decrease of signal strength as it travels down the media?

    • A.

      Absorption loss

    • B.

      Insertion loss

    • C.

      Penetration loss

    • D.

      Return loss

    Correct Answer
    B. Insertion loss
    Explanation
    401. 1-3

    Rate this question:

  • 7. 

    Which TIA/EIA parameter test is a measure of the unwanted signal coupling from a transmitter at the near-end into a neighboring (non-energized) pair measured at the near-end?

    • A.

      Near-end crosstalk (NEXT)

    • B.

      Powersum near-end crosstalk (PSNEXT)

    • C.

      Powersum alien near-end crosstalk (PSANEXT)

    • D.

      Powersum insertion loss to alien crosstalk ratio far-end (PSAACRF)

    Correct Answer
    A. Near-end crosstalk (NEXT)
    Explanation
    401. 1-3

    Rate this question:

  • 8. 

    Which TIA/EIA parameter test is a measure of the degree of impedance mismatch between two impedances?

    • A.

      Absorption loss

    • B.

      Insertion loss

    • C.

      Penetration loss

    • D.

      Return loss

    Correct Answer
    D. Return loss
    Explanation
    401. 1-3

    Rate this question:

  • 9. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling system provides the point at which outdoor cabling interfaces with the intrabuilding backbone cabling?

    • A.

      Entrance facility

    • B.

      Equipment room

    • C.

      Commercial demark

    • D.

      Telecommunications room

    Correct Answer
    A. Entrance facility
    Explanation
    402. 1-4

    Rate this question:

  • 10. 

    What cabling system subsystem provides any or all of the functions of a telecommunications room?

    • A.

      Entrance facility

    • B.

      Equipment room

    • C.

      Systems room

    • D.

      Work area

    Correct Answer
    B. Equipment room
    Explanation
    402. 1-4

    Rate this question:

  • 11. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling can be used for connections between floors?

    • A.

      Intra cabling

    • B.

      Backbone cabling

    • C.

      Vertical cabling

    • D.

      Horizontal cabling

    Correct Answer
    B. Backbone cabling
    Explanation
    402. 1-4

    Rate this question:

  • 12. 

    Which subsystem of the ANSI/TIA/EIA-569-B structured cabling can be used to interconnect buildings?

    • A.

      Inter cabling

    • B.

      Backbone cabling

    • C.

      Vertical cabling

    • D.

      Horizontal cabling

    Correct Answer
    B. Backbone cabling
    Explanation
    402. 1-4

    Rate this question:

  • 13. 

    Which subsystem of the ANSI/TIA/EIA-569-B structured cabling extends from the telecommunications room to the work area telecommunications information outlets?

    • A.

      Intra cabling

    • B.

      Backbone cabling

    • C.

      Vertical cabling

    • D.

      Horizontal cabling

    Correct Answer
    D. Horizontal cabling
    Explanation
    402. 1-4

    Rate this question:

  • 14. 

    Which subsystem of the ANSI/TIA/EIA-568-B structured cabling recognizes multimode cable?

    • A.

      Intra cabling

    • B.

      Backbone cabling

    • C.

      Vertical cabling

    • D.

      Horizontal cabling

    Correct Answer
    D. Horizontal cabling
    Explanation
    402. 1-5

    Rate this question:

  • 15. 

    The work area of the ANSI/TIA/EIA-568-B structured cabling system consists of all except which components? 

    • A.

      Patch cables

    • B.

      Adapters

    • C.

      Patch panels

    • D.

      Station equipment

    Correct Answer
    C. Patch panels
    Explanation
    402. 1-5

    Rate this question:

  • 16. 

    Which ANSI/TIA/EIA standard defines labeling cables and patch panels?

    • A.

      606-A

    • B.

      666-A

    • C.

      568-A

    • D.

      568-B

    Correct Answer
    A. 606-A
    Explanation
    402. 1-6

    Rate this question:

  • 17. 

    What Air Force Systems Security Instruction (AFSSI) directs implementation of protected distribution systems?

    • A.

      33-202

    • B.

      7700

    • C.

      7703

    • D.

      7007

    Correct Answer
    C. 7703
    Explanation
    403. 1-7

    Rate this question:

  • 18. 

    Which method is not a means for secure telecommunications?

    • A.

      Using Defense Courier Service

    • B.

      Using protected distribution system

    • C.

      Using communications security equipment

    • D.

      Using intrusion detection optical communications system

    Correct Answer
    A. Using Defense Courier Service
    Explanation
    403. 1-7

    Rate this question:

  • 19. 

    In the RED/BLACK concept, what type of traffic do RED lines carry?

    • A.

      Encrypted classified

    • B.

      Encrypted unclassified

    • C.

      Unencrypted classified

    • D.

      Unencrypted unclassified

    Correct Answer
    C. Unencrypted classified
    Explanation
    403. 1-7

    Rate this question:

  • 20. 

    The RED/BLACK concept has which two parts?

    • A.

      Physical separation and electromagnetic separation

    • B.

      Electromagnetic separation and electrical separation

    • C.

      Physical separation and electrical separation

    • D.

      Physical separation and emission separation

    Correct Answer
    C. pHysical separation and electrical separation
    Explanation
    403. 1-7

    Rate this question:

  • 21. 

    TEMPEST is 

    • A.

      An unclassified term and a US Government code word that identifies an unclassified set of standards

    • B.

      An unclassified term and a US Government code word that identifies a classified set of standards

    • C.

      A classified term and a US Govnerment code word that identifies an unclassified set of standards

    • D.

      A classified term and a US Government code word that identifies a classified set of standards

    Correct Answer
    B. An unclassified term and a US Government code word that identifies a classified set of standards
    Explanation
    403. 1-7

    Rate this question:

  • 22. 

    What is the purpose of the TEMPEST program?

    • A.

      Eliminate all instances of radiation of electrical impulses

    • B.

      Reduce the chances of radiation of electrical impulses

    • C.

      Improve the signal of radiation of electrical impulses

    • D.

      Increase the range of radiation of electrical impulses

    Correct Answer
    B. Reduce the chances of radiation of electrical impulses
    Explanation
    403. 1-7

    Rate this question:

  • 23. 

    What is the TEMPEST program in the Air Force called?

    • A.

      Communications Security

    • B.

      Transmission Security

    • C.

      Emission Security

    • D.

      Computer Security

    Correct Answer
    C. Emission Security
    Explanation
    403. 1-7

    Rate this question:

  • 24. 

    What area is described as the complete building or facility area under direct physical control within which unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?

    • A.

      Controlled Access Area (CAA)

    • B.

      Restricted Access Area (RAA)

    • C.

      Limited-Control Area (LCA)

    • D.

      Uncontrolled Access Area (UAA)

    Correct Answer
    A. Controlled Access Area (CAA)
    Explanation
    403. 1-7

    Rate this question:

  • 25. 

    Protected distribution systems (PDS) require wich scheduled instpections?

    • A.

      Communications security inspections

    • B.

      Separation inspections

    • C.

      Line route inspections

    • D.

      Electrical inspections

    Correct Answer
    C. Line route inspections
    Explanation
    403. 1-8

    Rate this question:

  • 26. 

    Protected distribution systems (PDS) events such as alarms and inspections are recorded where?

    • A.

      Emission security (EMSEC) log

    • B.

      TEMPEST log

    • C.

      Protected distribution system (PDS) log

    • D.

      Inspection log

    Correct Answer
    C. Protected distribution system (PDS) log
    Explanation
    403. 1-8

    Rate this question:

  • 27. 

    A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the 

    • A.

      Total surface

    • B.

      Visible area

    • C.

      Observable area

    • D.

      Concealed area

    Correct Answer
    A. Total surface
    Explanation
    403. 1-8

    Rate this question:

  • 28. 

    When using a Secure Terminal Equipment (STE), what is encrypted?

    • A.

      The analog signal

    • B.

      The digital signal

    • C.

      The multiplexed signal

    • D.

      The sender's private key

    Correct Answer
    B. The digital signal
    Explanation
    404. 2-1

    Rate this question:

  • 29. 

    What is the difference between data encryption and voice encryption?

    • A.

      Data is faster

    • B.

      Voice is faster

    • C.

      In data, the encryption is handled by separate device

    • D.

      In voice, the encryption is handled by a separate device

    Correct Answer
    C. In data, the encryption is handled by separate device
    Explanation
    404. 2-2

    Rate this question:

  • 30. 

    What components are used in both encryption and decryption?

    • A.

      Algorithm and key

    • B.

      Algorithm and certificate

    • C.

      Certificate and key

    • D.

      Telephone and receiver

    Correct Answer
    A. Algorithm and key
    Explanation
    404. 2-2

    Rate this question:

  • 31. 

    What are the two basic types of computer cryptoplogy?

    • A.

      Symmetric-public key system and asymmetric-secret key system

    • B.

      Symmetric-secret key system and asymmetric-secret key system

    • C.

      Symmetric-secret key system and asymmetric-public key system

    • D.

      Symmetric-public key system and asymmetric-public key system

    Correct Answer
    C. Symmetric-secret key system and asymmetric-public key system
    Explanation
    404. 2-2

    Rate this question:

  • 32. 

    Which cryptology system has a disadvantage of using more processing power and time?

    • A.

      Symmetric

    • B.

      Asymmetric

    • C.

      Diametric

    • D.

      None of the above, they're all the same

    Correct Answer
    B. Asymmetric
    Explanation
    404. 2-2

    Rate this question:

  • 33. 

    Which authorities are trusted entities that issue certificates?

    • A.

      Hash

    • B.

      Repository

    • C.

      Certification

    • D.

      Authentication

    Correct Answer
    C. Certification
    Explanation
    404. 2-2

    Rate this question:

  • 34. 

    What infrastructure is a set of hardware, software, policies and procedures used to create, manage, store, distribute and revoke digital certificates?

    • A.

      Private Key

    • B.

      Public Key

    • C.

      Secure Key

    • D.

      Authentication Key

    Correct Answer
    B. Public Key
    Explanation
    404. 2-2

    Rate this question:

  • 35. 

    In Secure Socket Layter (SSL), before an encrypted transaction takes place, what does the web server give to the browser?

    • A.

      Its public key

    • B.

      Its private key

    • C.

      Its public certificate

    • D.

      Its private certificate

    Correct Answer
    A. Its public key
    Explanation
    404. 2-3

    Rate this question:

  • 36. 

    What are the two major types of encryption algorithms in use today that operate by encypting or decrypting one chunk of data at a time?

    • A.

      Stream algorithms and block ciphers

    • B.

      Secure algorithms and block ciphers

    • C.

      Block algorithms and stream ciphers

    • D.

      Block algorithms and secure ciphers

    Correct Answer
    C. Block algorithms and stream cipHers
    Explanation
    404. 2-3

    Rate this question:

  • 37. 

    Data Encryption Standard (DES) uses how many bits for its key?

    • A.

      64

    • B.

      128

    • C.

      192

    • D.

      256

    Correct Answer
    A. 64
    Explanation
    404. 2-3

    Rate this question:

  • 38. 

    Triple Data Encryption Standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys?

    • A.

      One

    • B.

      Two

    • C.

      Three

    • D.

      Four

    Correct Answer
    C. Three
    Explanation
    404. 2-3

    Rate this question:

  • 39. 

    Which encryption is not a telecommunications encryption type?

    • A.

      Narrowband

    • B.

      Network

    • C.

      Bulk

    • D.

      Open

    Correct Answer
    D. Open
    Explanation
    404. 2-3

    Rate this question:

  • 40. 

    Communications Security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure

    • A.

      Authenticity

    • B.

      Compliance

    • C.

      Integrity

    • D.

      Validity

    Correct Answer
    A. Authenticity
    Explanation
    405. 2-4

    Rate this question:

  • 41. 

    The Communications Security (COMSEC) program is designed to

    • A.

      Relocate classified material to strengthen security

    • B.

      Conduct assessments to evaluate compromise of national security

    • C.

      Deflect unauthorized interception and analysis of compromising emanations

    • D.

      Detect and correct procedural weaknesses that could expose critical information

    Correct Answer
    D. Detect and correct procedural weaknesses that could expose critical information
    Explanation
    405. 2-4

    Rate this question:

  • 42. 

    What reference would you use for guidance on Air Force messaging?

    • A.

      AFI 33-119

    • B.

      AFI 33-129

    • C.

      AFI 33-219

    • D.

      AFI 33-329

    Correct Answer
    A. AFI 33-119
    Explanation
    405. 2-4

    Rate this question:

  • 43. 

    Which Communications Security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?

    • A.

      Cyptosecurity

    • B.

      Physical security

    • C.

      Emission security

    • D.

      Transmission security

    Correct Answer
    B. pHysical security
    Explanation
    405. 2-5

    Rate this question:

  • 44. 

    Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy Communications Security (COMSEC) material?

    • A.

      AFI 33-201, Volume 1

    • B.

      AFI 33-202, Volume 1

    • C.

      AFI 31-201, Volume 1

    • D.

      AFI 31-202, Volume 1

    Correct Answer
    A. AFI 33-201, Volume 1
    Explanation
    405. 2-5

    Rate this question:

  • 45. 

    Top secret keying material must be handled, stored, transported and destroyed under

    • A.

      Courier control

    • B.

      Communications Security (COMSEC) manager control

    • C.

      Two-person integrity (TPI) control

    • D.

      COMSEC Responsible Officer (CRO) control

    Correct Answer
    C. Two-person integrity (TPI) control
    Explanation
    405. 2-5 & 2-6

    Rate this question:

  • 46. 

    Which form is used with a transfer report to accompany a Communications Security (COMSEC) package?

    • A.

      Standard Form (SF) 135

    • B.

      SF 153

    • C.

      SF 351

    • D.

      SF 531

    Correct Answer
    B. SF 153
    Explanation
    405. 2-6

    Rate this question:

  • 47. 

    When a security container is opened, it is inventoried at the

    • A.

      Beginning of the week

    • B.

      Beginning of the duty day

    • C.

      End of the week or month

    • D.

      End of the shift or duty day

    Correct Answer
    D. End of the shift or duty day
    Explanation
    405. 2-6

    Rate this question:

  • 48. 

    Which form is used as a register log to record visitors into restricted areas?

    • A.

      AF Form 1019

    • B.

      AF Form 1109

    • C.

      AF Form 1119

    • D.

      AF Form 1190

    Correct Answer
    B. AF Form 1109
    Explanation
    405. 2-8

    Rate this question:

  • 49. 

    What is the newest generation of secure voice telephone?

    • A.

      Secure Telephone Unit (STU)

    • B.

      Cryptographic Telephone (CT)

    • C.

      Secure Terminal Equipment (STE)

    • D.

      Pretty Good Privacy Phone (PGPfone)

    Correct Answer
    C. Secure Terminal Equipment (STE)
    Explanation
    406. 2-10

    Rate this question:

  • 50. 

    Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?

    • A.

      Secure Telephone Unit (STU)

    • B.

      Cryptographic Telephone (CT)

    • C.

      Secure Terminal Equipment (STE)

    • D.

      Pretty Good Privacy Phone (PGPfone)

    Correct Answer
    C. Secure Terminal Equipment (STE)
    Explanation
    406. 2-10

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 15, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 15, 2017
    Quiz Created by
    Atwellicus
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.