3CX5X Vol. 2 (Operations Security) Quiz

77 Questions | Total Attempts: 292

SettingsSettingsSettings
Please wait...
US Army Quizzes & Trivia

3CX5X VOLUME 2. SECURITY AND DEPLOYABLE COMMUNICATIONS SYSTEMS QUIZ.


Questions and Answers
  • 1. 
    Which of the following security programs is defined as a process of identifying critical information and subsequiently analyzing friendly actions attendant to military operations and other activities?
    • A. 

      OPSEC

    • B. 

      EMSEC

    • C. 

      COMSEC

    • D. 

      COMPUSEC

  • 2. 
    When was the first Air Force OPSEC program introduced?
    • A. 

      1955

    • B. 

      1956

    • C. 

      1966

    • D. 

      1967

  • 3. 
    In which of the following OPSEC steps that you would inform the AFOSI of potential adversaries and their associated capabilities, limitations and intentions to collect, analyze, and use critical information?
    • A. 

      Risk assessment

    • B. 

      Threat assessment

    • C. 

      Apply OPSEC measures

    • D. 

      Vulnerability analysis

  • 4. 
    Which of the following OPSEC steps would program managers and coordinators recommend actions to senior decision-makers and commanders?
    • A. 

      Risk Assessment

    • B. 

      Threat assessment

    • C. 

      Apply OPSEC measures

    • D. 

      Vulnerability analysis

  • 5. 
    Which of the following OPSEC steps would dynamic situations require you to reaccomplish preventative actions?
    • A. 

      Risk assessment

    • B. 

      Threat assessment

    • C. 

      Apply OPSEC measures

    • D. 

      Vulnerability analysis

  • 6. 
    Specific facts about friendly activities, intentions, capabilities or limitations vitally needed by adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment best describe
    • A. 

      Vulnerabilities.

    • B. 

      Critical information.

    • C. 

      Operational indicators.

    • D. 

      Operational information.

  • 7. 
    In which OPSEC indicator would an abrupt changes or cancellations of schedules fall under?
    • A. 

      Operational.

    • B. 

      Administrative.

    • C. 

      Communications

    • D. 

      Logistic and maintenance support.

  • 8. 
    Deviating from normal procedures would fall under which OPSEC indicator?
    • A. 

      Operational

    • B. 

      Administrative

    • C. 

      Communications

    • D. 

      Logistic and maintenance support

  • 9. 
    Data aggregation is defined as the
    • A. 

      Associated data that has no value.

    • B. 

      Assortment of intelligence data on an adversary.

    • C. 

      Collection of loosely associated data and/or information.

    • D. 

      Information that clearly reveals the enemy's operational procedures

  • 10. 
    What are among the most problematic OPSEC vunerabilities in the Air Force today?
    • A. 

      Copiers and fax machines

    • B. 

      Telephones and cell phones

    • C. 

      Radio and broadband internet

    • D. 

      Networks and computer systems

  • 11. 
    The reason information is collected best describes which mandatory item of a privacy act statement?
    • A. 

      Purpose

    • B. 

      Authority

    • C. 

      Disclosure

    • D. 

      Routine use

  • 12. 
    What form is used as a cover sheet to protect Privacy Act material?
    • A. 

      AF Form 2327

    • B. 

      AF Form 3217

    • C. 

      AF Form 3227

    • D. 

      Af Form 3327

  • 13. 
    Guidance for posting information on AF web sites is outlined in
    • A. 

      AFI 33-119.

    • B. 

      AFI 33-129.

    • C. 

      AFI 33-219.

    • D. 

      AFI 33-329.

  • 14. 
    Official guidance on individual security clearances and permitting access to classified information can be found in
    • A. 

      AFI 31-301

    • B. 

      AFI 31-401

    • C. 

      AFI 31-501

    • D. 

      AFI 31-601

  • 15. 
    Disclosure of information that would result in the loss, misuse, unauthorized access, or modification that might adversely affect nation security would best be described as
    • A. 

      Secret.

    • B. 

      Confidential.

    • C. 

      For offical use only.

    • D. 

      Sensitive but unclassified

  • 16. 
    Which document provides guidance on the Information Security Program Management?
    • A. 

      AFI 31-301

    • B. 

      AFI 31-401

    • C. 

      AFI 31-501

    • D. 

      AFI 31-601

  • 17. 
    What specific restrictions can a designated approving authority (DAA) impose on classified systems or networks?
    • A. 

      Cerify and accredit local systems and networks

    • B. 

      Controls measures to collect accreditation metric data

    • C. 

      Prohibit the use of goverment owned removable storage media

    • D. 

      Create new guidance on system certication to Wing Information Assurance

  • 18. 
    Before obtaining access to classified material, which document must be signed as a prerequisite?
    • A. 

      SF 213

    • B. 

      SF 231

    • C. 

      SF 312

    • D. 

      SF 321

  • 19. 
    What form is annotated at the end-of-day secuirty check to ensure classified material is stored appropriately?
    • A. 

      SF 700

    • B. 

      SF 701

    • C. 

      SF 702

    • D. 

      SF 703

  • 20. 
    What is the COMSEC program designed to do?
    • A. 

      Relocate classified material to strengthen security

    • B. 

      Conduct assessments to evaluate compromise of national security

    • C. 

      Deflect unauthorized interception and analysis of compromising emanations

    • D. 

      Detect and correct procedural weaknesses that could expose critical information

  • 21. 
    Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy COMSEC material?
    • A. 

      AFI 31-201, Vol 1

    • B. 

      AFI 31-202, Vol 1

    • C. 

      AFI 31-301, Vol 1

    • D. 

      AFI 31-302, Vol 1

  • 22. 
    Which form is used with a transfer report to accompany a COMSEC package?
    • A. 

      SF 135

    • B. 

      SF 153

    • C. 

      SF 351

    • D. 

      SF 531

  • 23. 
    Which form is used as a visitor register log to record visitors into restricted areas?
    • A. 

      AF Form 1019

    • B. 

      AF Form 1109

    • C. 

      AF Form 1119

    • D. 

      AF Form 1190

  • 24. 
    An investigated or evaluated incident that has been determined as jeopardizing the security of COMSEC material is best described as a COMSEC
    • A. 

      Insecurity.

    • B. 

      Deviation.

    • C. 

      Incident.

    • D. 

      Report.

  • 25. 
    An uninvestigated or unevaluated occurence that potentially jeopardizes the security of COMSEC material or the secure transmission of government information is best described as a COMSEC
    • A. 

      Insecurity.

    • B. 

      Deviation.

    • C. 

      Incident.

    • D. 

      Report.

Back to Top Back to top