CDC 3D151 Client Systems Journeyman Volume 2. Voice Systems Fundamentals

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which communications security (COMSEC) application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources? Cyptosecurity. Physical security. Emission security. Transmission security.

Physical security

Which two parts does the RED/BLACK concept have? Physical separation and electromagnetic separation. Electromagnetic separation and electrical separation. Physical separation and electrical separation. Physical separation and emission separation.

Physical separation and electrical separation

When using a Secure Terminal Equipment (STE), what is encrypted? The analog signal. The digital signal. The multiplexed signal. The sender's private key.

The digital signal

Which is not a reason why extreme caution should be used when deleting an e-mail account? The user's e-mail will be deleted from the Exchange server. Restoring deleted e-mail requires proper justification. The wrong account could be deleted. Restoring deleted e-mail is difficult.

The wrong account could be deleted

Who is usually responsible for their air time charges and must budget accordingly? Unit. Installation spectrum manager (ISM). Communications and Information Systems officer (CSO). Base Personal Wireless Communications Systems (PWCS) manager.

Unit

Who appoints the unit personal wireless communications system (PWCS) manager? Unit commander. Wing commander. Major command (MAJCOM) commander. Communications and Information Systems officer.

Unit commander

How many objects can be manipulated at a time in directory and resource administrator (DRA)? 1. 2. 3. 4.

1

What are the two different types of current used for power? 100 v (volts) and 210 v. 105 v and 215 v. 110 v and 220 v. 115 v and 225 v.

110 v and 220 v

The Secure Terminal Equipment (STE) Integrated Subscriber Digital Network (ISDN) setting supports what speeds in kilobits per second (Kbps)? 128. 192. 256. 512.

128

How many channels do the intra-squad radios operate on? 11. 12. 13. 14.

14

What is the maximum throughput in megabits per second (Mbps) for the Tactical Local Area Network Encryption (TACLANE)-E100? 165 for full-duplex and 100 for half-duplex. 165 for full-duplex and 44.736 for half-duplex. 44.736 for asynchronous transfer mode and 100 for half-duplex. 100 for full-duplex and 44.736 for asynchronous transfer mode.

165 for full-duplex and 100 for half-duplex

What Air Force instruction (AFI) governs personal wireless communications system (PWCS) management? 17-100. 21-116. 17-210. 33-118.

17-210

Permanent markings can be completed by how many different methods? 1. 2. 3. 4.

2

Triple data encryption standard (DES) is based on three compound operations of encryption/decryption and can incorporate the use of how many individual keys? 1. 2. 3. 4.

3

How many bits for its key does data encryption standard (DES) use? 64. 128. 192. 256.

64

Which form is used as a register log to record visitors into restricted areas? AF Form 1109, Visitor Register Log. AF Form 1119, Monthly Monetary Records. AF Form 1019, Armament Recording Program Mission Data. AF Form 1122, Personal Property and Personal Effects Inventory.

AF Form 1109, Visitor Register Log

What combination of Air Force instructions (AFI), Air Force Systems Security instructions (AFSSI), and Air Force manuals (AFMAN) do you use for guidance when determining a technical solution for personal wireless communications systems (PWCS)? AFI 17-210; AFI 11-101; AFSSI 7702; AFMAN 33-118. AFI 17-210; AFI 33-118; AFSSI 7702; AFMAN 33-219. AFI 17-210; AFI 33-219; AFSSI 7702; AFMAN 33-201. AFI 17-210; AFI 17-220; AFSSI 7702; AFMAN 17-1302-O.

AFI 17-210; AFI 17-220; AFSSI 7702; AFMAN 17-1302-O

In Remedy, to whom are the tickets assigned to fix problems? A resolution group only. A specific technician only. Remedy automatically assigns tickets. A resolution group or specific technician.

A resolution group or specific technician

The Asset Inventory Management System (AIMS) is an online database program that is a part of the Air Force Equipment Management System (AFEMS). Telecommunications Management System (TMS). Integrated Maintenance Data System (IMDS). Automated Information System (AIS).

Air Force Equipment Management System (AFEMS)

What publication governs the format of Alias names for e-mail accounts? Air Force Systems Security Instruction (AFSSI) 8502, Organizational Computer Security. Air Force Instruction (AFI) 17-130, Cybersecurity Program Management. AFI 33-201, Communications Security (COMSEC). AFSSI 7700, Emission Security.

Air Force Instruction (AFI) 17-130, Cybersecurity Program Management

What components are used in both encryption and decryption? Algorithm and key. Certificate and key. Telephone and receiver. Algorithm and certificate.

Algorithm and key

Which of these is a task completed by the unit personal wireless communications system (PWCS) manager? Briefs users on the proper use of PWCS equipment. Implements unit-level customer education program. Turns in excess equipment over to the base PWCS manager. All of the above.

All of the above

Which of these statements pertains to configuration management? Identify and document the functional and physical characteristics of a CI. Record and report change processing and implementation status. Control changes to the functional and physical characteristics of a CI. All of the above.

All of the above

What component of Voice over Internet Protocol (VoIP) is an endpoint on the network that provides real time, bi-directional communications between H.323 terminals and other switch circuit networks (SCN)? Gateway. Gatekeeper. Terminal adapter. Multipoint control unit (MCU).

Gateway

What is the only authorized Air Force inventory control software used to account for personal wireless communications system (PWCS) assets? Asset Inventory Management System (AIMS). Tracking and Reporting System. Integrated Maintenance Data System. Core Automated Maintenance System.

Asset Inventory Management System (AIMS)

What system serves as the focal point for suggested upgrades for personal wireless communications systems (PWCS) assets? Asset Inventory Management System (AIMS). Integrated Maintenance Data System. Work Order Management System. Remedy.

Asset Inventory Management System (AIMS)

Which cryptology system has a disadvantage of using more processing power and time? Symmetric. Asymmetric. Diametric. None of the above, they are all the same.

Asymmetric

Which Inmarsat terminals have a land mobile terminal, typically has a one-meter flat array antenna, and weights 30 to 40 pounds? B. M. Aero I. Mini-M.

B

What component in the video teleconferencing (VTC) system converts analog signals to digital signals? Camera. Coder-decoder (CODEC). Network termination (NT) 1. Central processing unit (CPU).

Coder-decoder (CODEC)

Who coordinates the management of personal wireless communications system (PWCS) assets for the installation commander? Base communications and information systems officer (CSO). Iridium Secure Module (ISM). Base PWCS manager. Unit PWCS manager.

Base communications and information systems officer (CSO)

What are the two main options for storing electricity in an uninterruptible power supply (UPS)? Storage batteries or a power wheel. Storage batteries or a flywheel. Batteries or a power wheel. Batteries or a flywheel.

Batteries or a flywheel

What needs to be higher to improve the audio quality? Bite rate. Bit rate. Samp rate. Sample rate.

Bit rate

What are the two major types of encryption algorithms in use today that operate by encrypting or decrypting one chunk of data at a time? Stream algorithms and block ciphers. Secure algorithms and block ciphers. Block algorithms and stream ciphers. Block algorithms and secure ciphers.

Block algorithms and stream ciphers

Which encryption handles multiplexed lines that come from combining multiple single data and voice lines into one? Bulk. Network. Wideband. Narrowband.

Bulk

What protocol does the Integrated Services Digital Network (ISDN) use to transmit video teleconferencing (VTC) data? H.320. H.323. H.325. H.330.

H.320

Each cell in a service area has what tower and transceiver assembly that transmits to and receives from the cell phones in that area? Eastern. Western. Central. Northern.

Central

The Tactical Local Area Network Encryption (TACLANE)-Micro can acquire an Internet Protocol (IP) address by Dynamic Host Configuration Protocol (DHCP) on which side? Static IP only. Plaintext only. Ciphertext only. Ciphertext or plaintext.

Ciphertext or plaintext

Asset Inventory Management System (AIMS) is used to track and manage what Air Force assets? Weapons. Support. Telephone. Communications.

Communications

Which one of these requires the use of the latest technical order (TO) information listed? Configuration. Configuration item. Configuration control. Configuration identification.

Configuration item

What area is described as a complete building or facility area under direct physical control where unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance? Controlled access area (CAA). Restricted access area (RAA). Limited control area (LCA). Uncontrolled access area (UAA).

Controlled access area (CAA)

What is the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program in the Air Force called? Communications security. Transmission security. Emission security. Computer security.

Emission security

In the RED/BLACK concept, what type of traffic do BLACK lines carry? Encrypted classified or unclassified. Encrypted classified only. Unencrypted classified. Unclassified only.

Encrypted classified or unclassified

Which method is not a means for secure telecommunications? Defense Courier Service. Protected distribution system. Communications security equipment. Intrusion Detection Optical Communications System.

Defense Courier Service

What automatically happens to an e-mail account when the user's domain account is deleted? Changed. Deleted. Updated. Reviewed.

Deleted

What mode of operation do cell phones use? Half-Duplex. Simplex. Duplex. Hybrid.

Duplex

Which personal wireless communications system (PWCS) device's original intent was for use by family, friends, and associates to communicate among themselves within a small area? Pager. Land mobile radio (LMR). Family radio service (FRS). Personal digital assistant (PDA).

Family radio service (FRS)

Which uninterruptible power supply (UPS) system is generally used for larger loads and currents? Storage batteries. Power wheel. Flywheel. Batteries.

Flywheel

What is a system of error control for data transmission, where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors without the need to ask the sender for additional data? Quality of service (QoS). Real time protocol (RTP). Forward error correction (FEC). Real time control protocol (RTCP).

Forward error correction (FEC)

Which fuel is not used for reciprocating generators? Diesel. Gasoline. Fossil fuel. Liquid petroleum.

Fossil fuel

What is the control system that generates a signal with a fixed relation to the phase of a reference signal and responds to both the frequency and the phase of the input signals? Forward error correction (FEC). Remote control protocol (RCP). Quality of service (QoS). Phase-locked loop (PLL).

Phase-locked loop (PLL)

Tactical Local Area Network Encryption (TACLANE)-Classic and TACLANE-E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for serial networks. tactical networks. point-to-point connections. Internet Protocol networks.

Internet Protocol networks

Which commercial satellite communication system offers true pole-to-pole global coverage? European Telecommunications Satellite Organization. International Telecommunications Satellite Organization. International Mobile Satellite Organization. Iridium.

Iridium

In secure socket layer (SSL), before an encrypted transaction takes place, what does the Web server give to the browser? Its public key. Its private key. Its public certificate. Its private certificate.

Its public key

The Secure Terminal Equipment (STE) cannot communicate securely with what device? Secure telephone unit (STU)-III. Satellite telephone. Cellular telephone. Land mobile radio.

Land mobile radio

Which personal wireless communications system (PWCS) device can be used for command and control? Pager. Land mobile radio (LMR). Family radio service (FRS). Intelligence, surveillance, and reconnaissance (ISR).

Land mobile radio (LMR)

What percent packet loss should a network expect in order to implement Voice over Internet Protocol (VoIP)? Less than 1. Greater than 1. Less than .5. Greater than .5.

Less than 1

How many milliseconds should the one-way delay be from endpoint to endpoint in order to implement Voice over Internet Protocol (VoIP)? Less than 50. Less than 150. Greater than 50. Greater than 150.

Less than 150

Protected distribution systems (PDS) require which scheduled inspections? Communications security. Line route or visual. Separation. Electrical.

Line route or visual

What exchange tab is used to add, delete, or modify user accounts that have special permissions to the account? Intercluster Lookup Service (ILS) settings. Mailbox rights. Mailbox security. Custom attributes.

Mailbox rights

What exchange tab is used to add, delete, or modify user accounts that can receive as or send as for the account? Intercluster Lookup Service (ILS) settings. Mailbox rights. Mailbox security. Custom attributes.

Mailbox security

Which does not fit the "Peaceful Purposes" clause of using the International Mobile Satellite Organization (Inmarsat) system? Military use, involving armed conflict. Armed forces use, relating to the protection of the wounded. United Nations (UN) peacekeeping use, acting under the auspices of the UN Security Council. Armed forces use, protecting itself against armed attack within the limitations of UN charter.

Military use, involving armed conflict

Which encryption handles software encryption? Narrowband. Wideband. Network. Bulk.

Network

What component in the video teleconferencing (VTC) system converts incoming four wire transmissions into two wire transmissions? Camera. Computer. Coder-decoder (CODEC). Network termination (NT) 1.

Network termination (NT) 1

What type of areas is International Mobile Satellite Organization (Inmarsat) coverage separated? Geographical. Continental. Regional. Ocean.

Ocean

Which encryption is not a telecommunications encryption type? Narrowband. Network. Bulk. Open.

Open

The Asset Inventory Management System (AIMS) system includes what type of database and is located where? Access database at Randolph Air Force Base (AFB). Access database at Wright-Patterson AFB. Oracle database at Wright-Patterson AFB. Oracle database at Randolph AFB.

Oracle database at Wright-Patterson AFB

What are the voice messages encoded into when making a phone call using Voice over Internet Protocol (VoIP)? Addresses. Codes. Labels. Packets.

Packets

Who becomes responsible for life-cycle maintenance once the installation of cyberspace equipment is complete? Production work center or communication squadron. Production work center or contractor. Communications squadron. Production work center.

Production work center or contractor

Protected distribution systems (PDS) events such as alarms, technical inspections, and other pertinent information are recorded in which log? Emission security (EMSEC). Transient Electromagnetic Pulse Emanation Standard (TEMPEST). Inspection. Protected Distribution Systems (PDS).

Protected Distribution Systems (PDS)

Which port on the office version Secure Terminal Equipment (STE) can be used to connect to a fax machine? Universal Serial Bus (USB). EIA 530. RS-232. Firewire.

RS-232

Which set of electrical standards does the KIV-7 not support? RS-422. EIA-644. EIA-530. RS-232.

RS-422

What is the purpose of the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program? Eliminate all instances of radiation of electrical impulses. Reduce the chances of radiation of electrical impulses. Improve the signal of radiation of electrical impulses. Increase the range of radiation of electrical impulses.

Reduce the chances of radiation of electrical impulses

What tool must you use in order to create a new ticket? Remedy Remedy new Remedy user Remedy ticket

Remedy user

Which is not a function of the Integrated Maintenance Data System (IMDS)? Automate equipment history, scheduling, and other processes. Function as a common interactive interface for other systems. Roll base-level logistics data up to the Air Force level. Provide status and inventory data.

Roll base-level logistics data up to the Air Force level

Which form is used with a transfer report to accompany a communications security (COMSEC) package? Standard Form (SF) 135, Records Transmittal and Receipt. SF 153, COMSEC Material Report SF 701, Activity Security Checklist. SF 702, Security Container Checklist.

SF 153, COMSEC Material Report

What ratio is used to measure the desired signal strength relative to the background noise? Percentage of modulation. Signal-to-noise. Selectivity. Distortion.

Signal-to-noise

Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)? Secure telephone unit (STU). Cryptographic telephone (CT). Secure Terminal Equipment (STE). Pretty Good Privacy Phone (PGPfone).

Secure Terminal Equipment (STE)

The Tactical Local Area Network Encryption (TACLANE)-Micro can be used to overlay what type of networks on top of existing public and private network infrastructures? Non-Secure Internet Protocol Router Networks. Secret Internet Protocol Router Networks. Other public or private networks. Secure Virtual Networks.

Secure Virtual Networks

Depending on the problem type, what are the two types of forms used in Remedy? Software or hardware. Software and equipment. Application or hardware. Application and equipment.

Software or hardware

What is the advantage of symmetric cryptology? Speed. Storage. Security. Standards.

Speed

The Integrated Maintenance Data System (IMDS) interface with the Enterprise System- Supply (ES-S) replaces what system throughout the maintenance complex? Reliability and Maintainability System (REMIS). Telephone Management System. Standard Base Supply System (SBSS). Remedy.

Standard Base Supply System (SBSS)

What are the two basic types of computer cryptology? Symmetric-public key system and asymmetric-secret key system. Symmetric-secret key system and asymmetric-secret key system. Symmetric-secret key system and asymmetric-public key system. Symmetric-public key system and asymmetric-public key system.

Symmetric-secret key system and asymmetric-public key system

What are the two standards for termination of Category 5 (CAT 5) and Category 6 (CAT 6)? T-586 and T-586A. T-586A and T-586B. T-568 and T-568A. T-568A and T-568B.

T-568A and T-568B

Which of these is not part of the personal wireless communications system (PWCS) manager's duties? Maintaining the Asset Inventory Management System (AIMS) database. Technical reviews. Technical solutions. Maintenance.

Technical reviews

Which is not a consideration when selecting storage batteries for the central office? The office power requirements. The amount of floor space available. Future subscriber growth and reserve time required. The number of alternating current converters in the office.

The number of alternating current converters in the office

What channel access method assigns each call a certain portion of time on a designated frequency? Time division multiple access (TDMA). Personal communications services (PCS). Frequency division multiple access (FDMA). Global System for Mobile Communications (GSM).

Time division multiple access (TDMA)

Up to what level of classification does the Iridium Secure Module (ISM) provide secure voice communications? Secret. Top Secret. Confidential. For Official Use Only.

Top Secret

How many channels are used when a Voice over Internet Protocol (VoIP) session is established between a private branch exchange (PBX) and another Internet Protocol (IP) host? One, they share the same channel. Two, one for each direction. Three, two to transmit/receive and one to signal. Four, two to transmit and two to receive.

Two, one for each direction

In the RED/BLACK concept, what type of traffic do RED lines carry? Encrypted classified. Encrypted unclassified. Unencrypted classified. Unencrypted unclassified.

Unencrypted classified

Cell sites are generally thought of as being a square. octagon. hexagon. pentagon.

hexagon

Which encryption handles data that can come from equipment such as computers? Wideband. Narrowband. Network. Bulk.

Wideband

The Secure Terminal Equipment (STE) consists of a host terminal and removable security core. security core and removable host terminal. host terminal and removable secret core. secret core and removable host terminal.

host terminal and removable security core

In electrical power equipment, the generator can be two types, reciprocating or turbine batteries. a turbine engine. an engine. batteries.

a turbine engine

Communications security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure authenticity. compliance. integrity. validity.

authenticity

How fast you sample the audio to get your digital signal is called bit rate. bite rate. samp rate. sample rate.

bit rate

The approval or disapproval of all approved changes in the configuration is known as configuration. configuration item. configuration control. configuration identification.

configuration control

A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the total surface. visible area. concealed area. observable area.

total surface

In response to disaster relief operations, the Department of Defense (DOD) Policy on Procurement of mobile satellite services (MSS) was amended in 2006 to allow the DOD to use additional MSS providers for unclassified purposes outside the continental United States (CONUS). unclassified purposes within the CONUS. classified purposes outside the CONUS. classified purposes within the CONUS.

unclassified purposes within the CONUS

The Tactical Local Area Network Encryption (TACLANE)-Micro is a packet encryption device for Internet Protocol (IP) version 4 and version 6. version 4 and version 5. version 5 only. version 4 only.

version 4 and version 6

The Tactical Local Area Network Encryption (TACLANE)-Micro may be equipped to handle all types of networks except asynchronous transfer mode (ATM). gigabit Ethernet. fast Ethernet. wireless.

wireless


Ensembles d'études connexes

Biology: Chapter 9 - Sexual Reproduction and Meiosis

View Set

Marketing Chapter 5 Warm-Up and Quiz

View Set

Biology Final Semester 2 - Multiple Choice

View Set

Right to privacy/substantive due process con law

View Set

Chapter 7: Communication + Family Roles + Types

View Set

1. Renaissance and Reformation France & England

View Set