Scheduled maintenance: Wednesday, February 8 from 10PM to 11PM PST
hello quizlet
Home
Subjects
Expert solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Volume 2 CDC
Flashcards
Learn
Test
Match
Flashcards
Learn
Test
Match
Terms in this set (100)
What tool must you use in order to create a new ticket?
Remedy user
Depending on the problem type, what are the two types of forms used in Remedy?
Software or hardware
In Remedy, to whom are the tickets assigned to fix problems?
A resolution group or specific technician
The Integrated Maintenance Data System (IMDS) interface with the Enterprise System Supply (ES-S) replaces what system throughout the maintenance complex?
Standard Base Supply System (SBSS)
Which is not a function of the Integrated Maintenance Data System (IMDS)?
Roll base-level logistics data up to the AF level
The Asset Inventory Management System (AIMS) is an online database program that is a part of the
AF Equipment Management System (AFEMS)
AIMS is used to track and manage what AF assets?
Communications
The AIMS includes what type of database and is located where?
Oracle database at Wright-Patterson AFB
Which method is not a means for secure telecommunications?
Defense Courier Service
In the RED/BLACK concept, what type of traffic do RED lines carry?
Unencrypted classified
In the RED/BLACK concept, what type of traffic do BLACK lines carry?
Encrypted classified or unclassified
Which two parts does the RED/BLACK concept have?
Physical and electrical separation
What is the purpose of the Transient Electromagnetic Pulse Emanation Standard (TEMPEST) program?
Reduce the chances of radiation of electrical impulses
What is the TEMPEST program in the AF called?
Emission security
What area is described as complete building or facility area under direct physical control where unauthorized persons are denied unrestricted access and are either escorted by authorized persons or are under continuous physical or electronic surveillance?
Controlled access area (CAA)
Protected distribution systems (PDS) require which schedule inspections?
Line route or visual
PDS events such as alarms, technical inspections, and other pertinent information are recorded in which log?
Protected Distribution System (PDS)
A line route inspection of a protected distribution system (PDS) consists of a close visual inspection that must include the
total surface
What are the two different types of current used for power?
110v and 220v
What are the two main options for storing electricity in an uninterruptible power supply (UPS)?
Batteries or a flywheel
Which UPS system is generally used for larger loads and currents?
Flywheel
Which is not a consideration when selecting storage batteries for the central office?
The number of alternating current converters in the office
In electrical power equipment, the generator can be two types, reciprocating or
turbine engine
Which fuel is not used for reciprocating generators?
Fossil fuel
Who becomes responsible for life-cycle maintenance once the installation of cyberspace equipment is complete?
Production work center or contractor
The approval or disapproval of all approved changes in the configuration is known as
configuration control
Which of these requires the use of the latest technical order (TO) information listed?
Configuration item
Which of these statements pertains to configuration management?
All of the above
What are the two standards for termination of CAT 5 and CAT 6?
T-568A and T-568B
Permanent markings can be completed by how many different methods?
2
What publication governs the format of Alias names for e-mail accounts?
AFI 17-130, Cybersecurity Program Management
What exchange tab is used to add, delete, or modify user accounts that can receive as or send as for the account?
Mailbox security
What exchange tab us used to add, delete, or modify user accounts that have special permissions to the account?
Mailbox rights
Which is not a reason why extreme caution should be used when deleting an e-mail account?
The wrong account could be deleted
What automatically happens to an e-mail account when the user's domain account is deleted?
Deleted
How many objects can be manipulated at a time in directory and resource administrator (DRA)?
1
When using a Secure Terminal Equipment (STE), what is encrypted?
The digital signal
What components are used in both encryption and decryption?
Algorithm and key
What are the two basic types of computer cryptology?
Symmetric-secret key system and asymmetric-public key system
What is the advantage of symmetric cryptology?
Speed
Which cryptology system has a disadvantage of using more processing power and time?
Asymmetric
In SSL, before an encrypted transaction takes place, what does the Web server give to the browser?
Its public key
What are the two major types of encryption algorithms in use today that operate by encrypting or decrypting one chunk of data at a time?
Block algorithms and stream ciphers
How many bits for its key does data encryption standard (DES) use?
64
Triple DES is based on three command operations of encryption/ decryption and can incorporate the use of how many individual keys?
3
Which encryption is not a telecommunications encryption type?
Open
Which encryption handles data that can come from equipment such as computers?
Wideband
Which encryption handles multiplexed lines that come from combining multiple single data and voice lines into one?
Bulk
Which encryption handles software encryption?
Bulk
COMSEC is defined as the measures and controls taken to deny unauthorized persons information and to ensure
authenticity
Which COMSEC application provides us with guidance to deter, detect, and defeat hostile acts against US Air Force priority resources?
Physical security
Which form is used with transfer report to accompany a communications security package?
SF 153, COMSEC Material Report
Which form is used as a register log to record visitors into restricted areas?
AF Form 1109, Visitor Register Log
Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?
Secure Terminal Equipment (STE)
The STE consists of a
host terminal and removable security core
The STE cannot communicate securely with what device?
Land mobile radio
Which port on the office version STE can be used to connect to a fax machine?
RS-232
The STE ISDN setting supports what speeds in Kbps?
128
Which set of electrical standards does the KIV-7 not support?
RS-422
TACLANE-Classic and TACLANE-E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for
IP networks
What is the maximum throughput in Mbps for the TACLANE-E100?
165 for full duplex and 100 for half duplex
The TACLANE-Micro is a packet encryptions device for IP
version 4 and version 6
The TACLANE-Micro may be equipped to handle all types of networks except
wireless
The TACLANE-Micro can acquire an IP address by DHCP on which side?
Ciphertext or plaintext
The TACLANE-Micro can be used to overlay what type of networks on top of existing public and private network infrastructures?
Secure Virtual Networks
What AFI governs PWCS management?
17-210
Who coordinates the management of PWCS assets for the installation commander?
Base communications and information systems officer (CSO)
Who appoints the unit PWCS manager?
Unit commander
Which of these is a task completed by unit PWCS manager?
All of the above
Which of these is not part of the PWCS manager's duties?
Technical reviews
What is the only authorized AF inventory control software used to account for PWCS assets?
AIMS
What system serves as the focal point for suggested upgrades for PWCS assets?
AIMS
What combination of AFI, AFSSI, and AFMAN do you use for guidance when determining a technical solution for PWCS?
AFI 17-210; AFI 17-220; AFSSI 7702; AFMAN 17-1302-O
Which PWCS device can be used for command and control?
Land mobile radio (LMR)
Which PWCS device's original intent was for use by family, friends, and associates to communicate among themselves within a small area?
Family radio service (FRS)
How many channels do the intra-squad radios operate on?
14
What mode of operation do cell phones use?
Duplex
How fast you sample the audio to get your digital signal is called
bit rate
What needs to be higher to improve the audio quality?
Bit rate
What channel access method assigns each call a certain portion of time on a designated frequency?
Time division multiple access (TDMA)
Each cell in a service area has what tower and transceiver assembly that transmits to and receives from the cell phones in that area?
Central
Who is usually responsible for their air time charges and must budget accordingly?
Unit
Cell sites are generally thought of as being a
hexagon
What protocol does the ISDN use to transmit video teleconferencing (VTC) data?
H.320
What component in the VTC system converts incoming four wire transmissions into two wire transmissions?
Network termination (NT) 1
What component in the VTC system converts analog signals to digital signals?
Coder-decoder (CODEC)
What are the voice messages encoded into when making a phone call using VoIP?
Packets
How many channels are used when a VoIP session is established between a private branch exchange (PBX) and another IP host?
Two, once for each direction
What component of VoIP is an endpoint on the network that provides real time bi-directional communications between H3.323 terminals and other switch circuit networks (SCN)?
Gateway
What percent packet loss should a network expect in order to implement VoIP?
Less than 1
How many milliseconds should the one-way delay be from endpoint to endpoint in order to implement VoIP?
Less than 150
What is a system error control for data transmission, where the sender adds redundant data to its messages, allowing the receiver to detect and correct errors without the need to ask the sender for additional data?
Forward error correction (FEC)
What is the control system that generates a signal with a fixed relation to the phase of a reference signal and responds to both he frequency and the phase of the input signals?
Phase-locked loop (PLL)
In response to disaster relief operations, the DOD policy on Procurement of mobile satellite services (MSS) was amended in 2006 to allow the DOD to use additional MSS providers for
unclassified purposes within the CONUS
Which commercial satellite communication system offers true pole-to-pole global coverage?
Iridium
Up to what level of classification does the Iridium Secure Module (ISM) provide secure voice communications?
Top Secret
Which does not fit the "Peaceful Purposes" clause of using the International Mobile Satellite Organization (Inmarsat) system?
Military use, involving armed conflict
What type of areas is Inmarsat coverage separated?
Ocean
Which Inmarsat terminals have a land mobile terminal , typically has a one-meter flat array antenna, and weights 30 to 40 pounds?
B
What ratio is used to measure the desired signal strength relative to the background noise?
Signal-to-noise
Sets found in the same folder
Volume 1 - Unit Review Exercises
100 terms
Volume 2
100 terms
Verified questions
other
God led the family of ___ also known as "Israel" into Egypt.
other
To protect an elm tree in your backyard, you need to attach gypsy moth caterpillar tape around the trunk. The tree has a 1.1-ft diameter. What length of tape is needed?
other
Which of the following statement(s) are always true about alcohol: A. The higher BAC rises, the harder it can be for people to control their actions B. The higher BAC rises, the greater the chance of feeling tired, depressed, or nauseous C. Alcohol has no affect on some people D. Both A and B
other
On most rules and tapes used in the shop, the shortest line represents
Other Quizlet sets
# 7 Annuities
10 terms
Principles of Real Estate 1
123 terms
NU250 W1 Content Review - Heart Failure and Dysrhy…
121 terms
Inklusion Lektion 3
47 terms