Maintenance Job Essay

Submitted By thekidz9876
Words: 1273
Pages: 6

MAINT JOB,
COMSEC
&
ISDN/STE/NT-1
DEVICE
TSIMC
7-15
STUDY GUIDE

1.

The maintenance Job allows users to perform various maintenance functions.
It provides screens for viewing and setting preferences, displaying system notes (live and Stored), and watching the activities of specific ports.
a)
b)

2.

True
False

How does Maintenance Notes are created? a)
b)
c)
d)

An event that may require attention
The user put a note in the system
The MET create a note when a change had been made
The system has power down

3.

Personnel are informed of the presence of notes in the system via the SALM LED indicator on the ___________.
a)
b)
c)
d)

4.

Preference Screen
MANT Screen
Controller Board
Configure Screen

How do you go back to the main MANT screen you are at another MANT job screen? a)
b)
c)
d)
e)
f)
g)

Mant>quit
Mant>exit
Mant>save
A&B
B&C
None of above
All of above

5.

In order to configure the reporting of
HDX maintenance notes, type the
“preference” at the mant> prompt.
a)
b)

6.

To set system maintenance notes to be stored in a file, use the:
a)
b)
c)
d)

7.

True
False

Note_file[=<string>]
Note_format={brief/full/long}
Create /tmp/note.log
Control-c

To view system notes as they are being generated, type “mant” at the rsh/tmp> prompt. a)
b)

True
False

8.

The ________ is used to monitor the current activities of a chosen circuit or circuits. For example, the _______can show idle, dialing, talking, ect. for the circuits displayed on the screen.
a)
b)
c)
d)

9.

More command
System Notes
Watch Screen
MANT Screen

How many items do you need for a cryptographic material to work;
a)
b)
c)
d)

Two
Four
One
Three

10.

Any material that scrambles or unscramble voice messages or data signals is the definition of: a)
b)
c)
d)

Cryptographic Equipment
Crypto Fill Devices
Physical Security
Crypto Security

11.
________________________
is defined
Communication
Security

12.

as the

protective measures taken to deny unauthorized persons information derived from telecommunications of the U.S. Government.
Physical Security is the result from all physical measures necessary to safeguard classified equipment, material, and documents from access by unauthorized persons.
a)
b)

True
False

13.

The component of all Communications
Security, which results from all measures, designed to protect transmissions from interception and exploitation by means other than crypto analysis is the definition of: a)
b)
c)
d)

14.

Communication Security
Transmission Security
Crypto Security
Physical Security

The component of communications security, which results from the provisions of technically sound crypto-systems and their proper use is the definition of:
a)
b)
c)
d)

Communication Security
Crypto Security
Transmission Security
Physical Security

15.

Emissions Security are the measures taken to deny unauthorized persons information of value which might be derived from intercept and analysis, compromising emanations from cryptographic equipment and telecommunications systems.
a)
b)

16.

What are the two item needed for the cryptographic material to work?
a)
b)
c)
d)

17.

True
False

Cluster, Slot
Timing Cable, MSU 0
Fill Device, Encryption/Decryption Device
Encryption/Decryption Device, AN/CYZ-10

Crypto Fill Devices are cryptographic equipment that provide the variable or fill for the encryption/decryption device.
a)
b)

True
False

18.

What are three types of Crypto Fill
Devices (choose Three)
a)
b)
c)
d)
e)
f)

CYZ-10
KOI-18
Fill Device Cable
AN/PYQ-10
KOV-14
KSV-21

19. CYZ-10
_______

is simply a fill storage device that is used to fill the OMNI secure terminal and other compatible crypto equipment. 20. The
_______________
Fill
Device Cable it allows the variables to be down loaded from it to another piece of equipment.

21. KOI-18
______ is

a device that reads a paper tape, which assigned variables on it.
Once the tape has been read by the
______, the variables can be down
KOI-18
loaded into the CYZ-10.
22. The KOI-18 is a…