Noise
Jabber
Crosstalk
Intelligence
Rate this question:
Unshielded twisted pair (UTP)
Screened twisted pair (ScTP)
Shielded twisted pair (STP)
Foiled twisted pair (FTP)
Rate this question:
Cat 3
Cat 5
Cat 6
Cat 5E
Rate this question:
Connector and pin assignment
Subsystems of structured cabling
Installation methods and practices
Recommended wireless topology and distances
Rate this question:
Minimum requirements for telecommunications cabling
Life span of a telecommunications cabling system
Connecting hardware performance specifications
Color of the cable
Rate this question:
Absorption loss
Insertion loss
Penetration loss
Return loss
Rate this question:
Near-end crosstalk (NEXT)
Powersum near-end crosstalk (PSNEXT)
Powersum alien near-end crosstalk (PSANEXT)
Powersum insertion loss to alien crosstalk ratio far-end (PSAACRF)
Rate this question:
Absorption loss
Insertion loss
Penetration loss
Return loss
Rate this question:
Entrance facility
Equipment room
Commercial demark
Telecommunications room
Rate this question:
Entrance facility
Equipment room
Systems room
Work area
Rate this question:
Intra cabling
Backbone cabling
Vertical cabling
Horizontal cabling
Rate this question:
Inter cabling
Backbone cabling
Vertical cabling
Horizontal cabling
Rate this question:
Intra cabling
Backbone cabling
Vertical cabling
Horizontal cabling
Rate this question:
Intra cabling
Backbone cabling
Vertical cabling
Horizontal cabling
Rate this question:
Patch cables
Adapters
Patch panels
Station equipment
Rate this question:
606-A
666-A
568-A
568-B
Rate this question:
33-202
7700
7703
7007
Rate this question:
Using Defense Courier Service
Using protected distribution system
Using communications security equipment
Using intrusion detection optical communications system
Rate this question:
Encrypted classified
Encrypted unclassified
Unencrypted classified
Unencrypted unclassified
Rate this question:
Physical separation and electromagnetic separation
Electromagnetic separation and electrical separation
Physical separation and electrical separation
Physical separation and emission separation
Rate this question:
An unclassified term and a US Government code word that identifies an unclassified set of standards
An unclassified term and a US Government code word that identifies a classified set of standards
A classified term and a US Govnerment code word that identifies an unclassified set of standards
A classified term and a US Government code word that identifies a classified set of standards
Rate this question:
Eliminate all instances of radiation of electrical impulses
Reduce the chances of radiation of electrical impulses
Improve the signal of radiation of electrical impulses
Increase the range of radiation of electrical impulses
Rate this question:
Communications Security
Transmission Security
Emission Security
Computer Security
Rate this question:
Controlled Access Area (CAA)
Restricted Access Area (RAA)
Limited-Control Area (LCA)
Uncontrolled Access Area (UAA)
Rate this question:
Communications security inspections
Separation inspections
Line route inspections
Electrical inspections
Rate this question:
Emission security (EMSEC) log
TEMPEST log
Protected distribution system (PDS) log
Inspection log
Rate this question:
Total surface
Visible area
Observable area
Concealed area
Rate this question:
The analog signal
The digital signal
The multiplexed signal
The sender's private key
Rate this question:
Data is faster
Voice is faster
In data, the encryption is handled by separate device
In voice, the encryption is handled by a separate device
Rate this question:
Algorithm and key
Algorithm and certificate
Certificate and key
Telephone and receiver
Rate this question:
Symmetric-public key system and asymmetric-secret key system
Symmetric-secret key system and asymmetric-secret key system
Symmetric-secret key system and asymmetric-public key system
Symmetric-public key system and asymmetric-public key system
Rate this question:
Symmetric
Asymmetric
Diametric
None of the above, they're all the same
Rate this question:
Hash
Repository
Certification
Authentication
Rate this question:
Private Key
Public Key
Secure Key
Authentication Key
Rate this question:
Its public key
Its private key
Its public certificate
Its private certificate
Rate this question:
Stream algorithms and block ciphers
Secure algorithms and block ciphers
Block algorithms and stream ciphers
Block algorithms and secure ciphers
Rate this question:
64
128
192
256
Rate this question:
One
Two
Three
Four
Rate this question:
Narrowband
Network
Bulk
Open
Rate this question:
Authenticity
Compliance
Integrity
Validity
Rate this question:
Relocate classified material to strengthen security
Conduct assessments to evaluate compromise of national security
Deflect unauthorized interception and analysis of compromising emanations
Detect and correct procedural weaknesses that could expose critical information
Rate this question:
AFI 33-119
AFI 33-129
AFI 33-219
AFI 33-329
Rate this question:
Cyptosecurity
Physical security
Emission security
Transmission security
Rate this question:
AFI 33-201, Volume 1
AFI 33-202, Volume 1
AFI 31-201, Volume 1
AFI 31-202, Volume 1
Rate this question:
Courier control
Communications Security (COMSEC) manager control
Two-person integrity (TPI) control
COMSEC Responsible Officer (CRO) control
Rate this question:
Standard Form (SF) 135
SF 153
SF 351
SF 531
Rate this question:
Beginning of the week
Beginning of the duty day
End of the week or month
End of the shift or duty day
Rate this question:
AF Form 1019
AF Form 1109
AF Form 1119
AF Form 1190
Rate this question:
Secure Telephone Unit (STU)
Cryptographic Telephone (CT)
Secure Terminal Equipment (STE)
Pretty Good Privacy Phone (PGPfone)
Rate this question:
Secure Telephone Unit (STU)
Cryptographic Telephone (CT)
Secure Terminal Equipment (STE)
Pretty Good Privacy Phone (PGPfone)
Rate this question:
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.