3CX5X Vol2 Ure's

79 Questions | Attempts: 156
Please wait...
Question 1 / 80
🏆 Rank #--
Score 0/100

1. What are among the most problematicv OPSEC vulnerabilities in the Air Force today?

Submit
Please wait...
About This Quiz
3CX5X Vol2 Ure

3CX5X URE's for Volume 1. Please comment if they are wrong. Current as of 20 Aug 2009.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Which condition permits non-essential networks to be taken offline and substituted with alternate methods of communication

Submit

3. An accreditation decision which permits an information system to operate until specific identified steps can be completed is known as

Submit

4. How does the Air Force organie, train, equip, and sustain the best air and space force by

Submit

5. Which of the following security programs is defined as a process of identifying critical information and subsequentially analayzing friendly actions attendant to military operations and other activities

Submit

6. Final reports of a COMSEC incident are due

Submit

7. What computer software i designed to collect personal information such as passwords and financial details without the users consent

Submit

8. Data aggregation is defined as

Submit

9. Which security program applies descipline measures and controls to protect data computer system data against unauthorized, disclosure, modification, or destruction

Submit

10. Which condition exists when there is no apparant terrorist activity against computer networks

Submit

11. Which resources designated priority is provided when the level of security requires a reasonable degree of deterrence against hostile acts

Submit

12. What best describes an unintended signals or noise appearing external to a piece of communications equipment

Submit

13. An accreditation decision which allows a system to operate in an environment for which it was originally intended is known as

Submit

14. Which of the following OPSEC steps wouth dynamic situations require you to reaccomplish preventative actions

Submit

15. Special briefings, meeting, or religious services would fall under which OPSEC indicator

Submit

16. What specific restrication can a designated approving authority (DAA) impose on classified systems or networks

Submit

17. An uninvestigated or unevaluated occurence that potentially jeopardizes the security of COMSEC material or the scure transmission of government information is best described as a COMSEC

Submit

18. Which resources designated priority is provided when the level of security requires the greatest possible deterrence against hostile acts

Submit

19. Which form would you use to properly label removable storage media containing "secret" information

Submit

20. Which of the following is defined as the legal authority excercised over subordinates by virtue of rank or assignment

Submit

21. Which best describes the definition of a unit type code (UTC)

Submit

22. One of the disadvantages of line-of-sight primary mode of radio transmissions is that relay stations are required

Submit

23. What is the COMSEC program designed to do

Submit

24. What are the three types of COMSEC incidents

Submit

25. When a risk of a network system attack has been identified, which condition requires all unclassified dial-up connections be disconnected

Submit

26. In what year was the present OPSEC program we use today established

Submit

27. Specific facts about friendly activitiers, intentions, capabilities or limitations vitally needed by adversaries for them to plan and act effectively to guarantee failure or unacceptable consequences for friendly mission accomplishment best describe

Submit

28. Deviating from normal procedures would fall under which OPSEC indicator

Submit

29. Which condition requires the mandate of increased monitoring of all network system activities when an increased risk of attack is present

Submit

30. At which NETOPS level is responsibility for the worldwide management and operational oversight of the defense information infrastructure globablly managed

Submit

31. Radio waves travel through free space at the speed of light and can be

Submit

32. Waves that travel through the air in a straight line (line-of-sight) from one transmitting antenna to a receiving antenna are known as

Submit

33. Deployment execution and unit personnel preparation are responsibilies most often delegated to the

Submit

34. Who has the mission to provide fast reaction to immediate requests from land forces for close air support

Submit

35. When was the first Air Force OPSEC program introduced?

Submit

36. The reason information is collected best describes which mandatory item of Provacy Act Statement

Submit

37. Disclosure of information that would result is the loss, misue, unauthorized access, or modification that might adversely affect national security would best be described as

Submit

38. An unclassified term referring to technical investogations for compromising emanations from an electrically operated data processing equipment is known as

Submit

39. TDC is composed of which three major components

Submit

40. Which wave transmission is very effective for long-distance communications in the high-frequency range (3-30 MHz)

Submit

41. What form is annotated at the end-of-day security check to ensure classified material is stored appropriately

Submit

42. Personnel conducting end-of-day security checks will make sure classified material is stored appropriately at the close of each working day and record them on

Submit

43. Which of the following do commanders use to report the ability of a standard UTC to perform its mission capability (MISCAP) statement worldwide and to identify its apability through the next AEF bucket

Submit

44. Which of the following is used to collect and store the data of material requirements and logistics details for UTCs

Submit

45. In which of the following OPSEC steps would program managers and coordinators recommend actions to the senior decision-makers and commanders?

Submit

46. What form is used as a cover sheet to protect Privacy Act material

Submit

47. Which form would you use to properly label removable storage media containing "top secret" information

Submit

48. Which characteristics should proposed theater deployable commications (TDC) equipment strive to have

Submit

49. Which airborne platform collects real-time positioning and tracking data on the location of friendly and enem,y aircraft and naval vessles in the AOR

Submit

50. Which resources designated priority is provided when the level of security requires a signifcant degree of deterrence against hostile acts

Submit

51. In which of the following OPSEC steps would you inform AFOSI of potential adversaries and their associated capabilities, limitations and intentions to collect, analyze, and use critical information

Submit

52. Which is a suite of modules and accesory kits that serve as the backbone for deployed communications networks

Submit

53. Which organization assigns COMSEC incident report case numbers

Submit

54. Which AOC area support team provides staff support to the Chief of AOC systems

Submit

55. An investigated or evaluated incident that has been determined as jeopardizing tyhe security of COMSEC material is best described as a COMSEC

Submit

56. Which form would you use to properly label removable storage media containing "unclassified" information

Submit

57. Which of the following is the Air Force computer system used for UTC package management

Submit

58. Which of the following is a DoD directed integrated joing command and control (C2) system used for conventional and theater-level nuclear operation planning and execution

Submit

59. Which is the primary system used for analyzing dynamic intelligence, surveillance, and reconaissance data of rapid post-mission

Submit

60. Which form is used as a visitor register log to record visitors into restricted areas

Submit

61. Which database is used for the purpose of coordinating the movement of joint forces into their operational locations

Submit

62. Which area support team makes sure servers, workstations, peripherals, communications devices, and software programs are on-line and available to network users?

Submit

63. In which OPSEC indicator would an abrupt change or cancellation of schedules fall under?

Submit

64. Official guidance on individual security clearances and permitting access to classified information can be found in

Submit

65. Which of the following provides the guidance necessary to manage the increasingly complex network environent and customers high quality service

Submit

66. What DoD agencies refine tactics, techniques, procedures, and measuring concepts for infusion into current and next generation operational systems

Submit

67. Which are used as the primary transmissions of direct radio waves

Submit

68. Before obtaining access to classifed material, which document must be signed as a prerequisite

Submit

69. Which frequency band is used for EHF band designation?

Submit

70. Which document provides guidance on the Information Security Program Management

Submit

71. What reference would you use for guidance on Air Force messaging

Submit

72. The Air Force Information Assurance (IA) Awareness Program is detailed in

Submit

73. Which of the following has the primary function of coordinating and directing immediate requests of tactical close air support to land forces

Submit

74. Which frequency band is used for SHF band designation?

Submit

75. The top secret control officer (TSCO) uses which form for the purpose of a "top secret" covers sheer and access disclosure of record

Submit

76. Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy COMSEC material

Submit

77. Which are used as the main propogation modes of transmissions for direct and ground reflected waves

Submit

78. Which frequency band is used for UHF band designation?

Submit

79. Name two forces relating to spectrum concepts

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (79)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What are among the most problematicv OPSEC vulnerabilities in the Air...
Which condition permits non-essential networks to be taken offline and...
An accreditation decision which permits an information system to...
How does the Air Force organie, train, equip, and sustain the best air...
Which of the following security programs is defined as a process of...
Final reports of a COMSEC incident are due
What computer software i designed to collect personal information such...
Data aggregation is defined as
Which security program applies descipline measures and controls to...
Which condition exists when there is no apparant terrorist activity...
Which resources designated priority is provided when the level of...
What best describes an unintended signals or noise appearing external...
An accreditation decision which allows a system to operate in an...
Which of the following OPSEC steps wouth dynamic situations require...
Special briefings, meeting, or religious services would fall under...
What specific restrication can a designated approving authority (DAA)...
An uninvestigated or unevaluated occurence that potentially...
Which resources designated priority is provided when the level of...
Which form would you use to properly label removable storage media...
Which of the following is defined as the legal authority excercised...
Which best describes the definition of a unit type code (UTC)
One of the disadvantages of line-of-sight primary mode of radio...
What is the COMSEC program designed to do
What are the three types of COMSEC incidents
When a risk of a network system attack has been identified, which...
In what year was the present OPSEC program we use today established
Specific facts about friendly activitiers, intentions, capabilities or...
Deviating from normal procedures would fall under which OPSEC...
Which condition requires the mandate of increased monitoring of all...
At which NETOPS level is responsibility for the worldwide management...
Radio waves travel through free space at the speed of light and can be
Waves that travel through the air in a straight line (line-of-sight)...
Deployment execution and unit personnel preparation are...
Who has the mission to provide fast reaction to immediate requests...
When was the first Air Force OPSEC program introduced?
The reason information is collected best describes which mandatory...
Disclosure of information that would result is the loss, misue,...
An unclassified term referring to technical investogations for...
TDC is composed of which three major components
Which wave transmission is very effective for long-distance...
What form is annotated at the end-of-day security check to ensure...
Personnel conducting end-of-day security checks will make sure...
Which of the following do commanders use to report the ability of a...
Which of the following is used to collect and store the data of...
In which of the following OPSEC steps would program managers and...
What form is used as a cover sheet to protect Privacy Act material
Which form would you use to properly label removable storage media...
Which characteristics should proposed theater deployable commications...
Which airborne platform collects real-time positioning and tracking...
Which resources designated priority is provided when the level of...
In which of the following OPSEC steps would you inform AFOSI of...
Which is a suite of modules and accesory kits that serve as the...
Which organization assigns COMSEC incident report case numbers
Which AOC area support team provides staff support to the Chief of AOC...
An investigated or evaluated incident that has been determined as...
Which form would you use to properly label removable storage media...
Which of the following is the Air Force computer system used for UTC...
Which of the following is a DoD directed integrated joing command and...
Which is the primary system used for analyzing dynamic intelligence,...
Which form is used as a visitor register log to record visitors into...
Which database is used for the purpose of coordinating the movement of...
Which area support team makes sure servers, workstations, peripherals,...
In which OPSEC indicator would an abrupt change or cancellation of...
Official guidance on individual security clearances and permitting...
Which of the following provides the guidance necessary to manage the...
What DoD agencies refine tactics, techniques, procedures, and...
Which are used as the primary transmissions of direct radio waves
Before obtaining access to classifed material, which document must be...
Which frequency band is used for EHF band designation?
Which document provides guidance on the Information Security Program...
What reference would you use for guidance on Air Force messaging
The Air Force Information Assurance (IA) Awareness Program is detailed...
Which of the following has the primary function of coordinating and...
Which frequency band is used for SHF band designation?
The top secret control officer (TSCO) uses which form for the purpose...
Where would you find guidance on how to properly store, control,...
Which are used as the main propogation modes of transmissions for...
Which frequency band is used for UHF band designation?
Name two forces relating to spectrum concepts
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!