CDC 3C051 Pre-end Of Course (EOC) Preparation Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Afronova84
A
Afronova84
Community Contributor
Quizzes Created: 1 | Total Attempts: 216
| Attempts: 216 | Questions: 102
Please wait...
Question 1 / 102
0 %
0/100
Score 0/100
1. Actively sampling the status of an external device by a client program is known as

Explanation

Polling refers to the process of actively sampling or checking the status of an external device by a client program. This involves regularly querying the device to determine if it has any new information or requires any action. It is commonly used in computer systems to monitor hardware devices, such as keyboards or printers, and to gather data from them. By polling, the client program can stay updated with the device's status and respond accordingly.

Submit
Please wait...
About This Quiz
Computer Systems Quizzes & Trivia

This CDC 3C051 Pre-End of Course Preparation Exam assesses knowledge on BIOS functions, hardware components like CMOS, and system interrupts. It's designed for professionals aiming to enhance their... see moretechnical skills in managing and understanding computer hardware operations. see less

2. Operating system (OS) nstructions and OS programs are processed into which memory space?

Explanation

The correct answer is "Conventional". In a computer system, the conventional memory space refers to the main memory or RAM (Random Access Memory) where the operating system instructions and programs are processed. It is called "conventional" because it is the standard or default memory space used by the operating system. Other memory spaces like upper, high, and extended are used to extend the available memory beyond the limitations of the conventional memory. However, in this case, the operating system instructions and programs are processed in the conventional memory space.

Submit
3. A Class III Electrostatic Discharge (ESD) item is senstive to what level of voltage?

Explanation

A Class III Electrostatic Discharge (ESD) item is sensitive to voltage levels between 4,000 and 15,000 volts. This means that if the voltage exceeds 4,000 volts, it can potentially damage or disrupt the functioning of the ESD item. However, if the voltage goes beyond 15,000 volts, it may cause even more severe damage. Therefore, the correct answer is that a Class III ESD item is sensitive to voltage levels between 4,000 and 15,000 volts.

Submit
4. Static electricity remains intact until it is

Explanation

Static electricity is a buildup of electric charge on the surface of an object. It remains intact until it is discharged, meaning that the excess charge is released or transferred to another object. Discharging can occur through various means, such as through contact with a conductive material or through a spark. Once the static electricity is discharged, the object becomes neutral and no longer carries an electric charge.

Submit
5. What is the first job the basic output system (BIOS) does at start-up?

Explanation

At start-up, the first job of the basic output system (BIOS) is to run the power-on self-test (POST). The POST is a series of diagnostic tests that the BIOS performs to check if the hardware components of the computer are functioning properly. It checks the processor, memory, storage devices, and other hardware components for any errors or issues. Once the POST is completed successfully, the BIOS proceeds to load instructions to random access memory (RAM) and start the booting process.

Submit
6. A Class I Electrostatic Discharge (ESD) item is senstive to what level of voltage?

Explanation

A Class I Electrostatic Discharge (ESD) item is sensitive to a voltage level that is less than 1000 volts. This means that any voltage above 1000 volts has the potential to damage or disrupt the functionality of the ESD item. Therefore, it is important to handle and protect Class I ESD items with caution to prevent any voltage discharge that could harm the item.

Submit
7. A Class II Electrostatic Discharge (ESD) item is senstive to what level of voltage?

Explanation

A Class II Electrostatic Discharge (ESD) item is sensitive to a voltage level between 1,000 and 3,999 volts.

Submit
8. As a minimum, conduct a back-up routine ____________ each day the User computerized-management of communications security material (UCM2) is used, whether or not transactions are recorded that day.

Explanation

A back-up routine should be conducted at least once every day that the User computerized-management of communications security material (UCM2) is used, regardless of whether any transactions are recorded that day. This ensures that any changes or updates made to the security material are properly backed up and can be restored if needed. Conducting the back-up routine only once a day is sufficient to maintain the integrity of the security material and minimize the risk of data loss.

Submit
9. At a minimum, how often do you change the combination to a cipher lock?

Explanation

The combination to a cipher lock should be changed frequently to ensure security. Changing it on a monthly basis reduces the risk of unauthorized access and helps maintain the integrity of the lock. By changing the combination regularly, the chances of someone guessing or figuring out the code are minimized. This practice also aligns with security protocols followed in many organizations to protect sensitive information and assets.

Submit
10. What is the preferred method for listing material on the AFCOMSEC Form 16?

Explanation

The preferred method for listing material on the AFCOMSEC Form 16 is alphabetically by short title. This means that the items are organized in alphabetical order based on their short titles. This method allows for easy and efficient retrieval of the materials when needed.

Submit
11. AFCOMSEC Form 16 inventories are retained for the current inventory plus how many previous months of inventory?

Explanation

AFCOMSEC Form 16 inventories are retained for the current inventory plus the previous 6 months of inventory. This means that the form is used to keep track of the current month's inventory as well as the inventory from the past 6 months. It is important to retain these inventories for a certain period of time for record-keeping and auditing purposes.

Submit
12. If it is physically impossible to conduct an inventory of a user because of distance, the COMSEC manager

Explanation

In situations where it is physically impossible to conduct an inventory of a user due to distance, the COMSEC manager would ask the user to verify his or her holdings by letter or message. This method allows the COMSEC manager to obtain the necessary information regarding the user's inventory without the need for physical presence or direct communication. By requesting the user to verify their holdings through written correspondence, the COMSEC manager can ensure that accurate inventory records are maintained despite the distance constraint.

Submit
13. What is the term used when referring to specific (COMSEC) material other than equipment?

Explanation

The term used when referring to specific (COMSEC) material other than equipment is "aids". This term is used to describe any additional resources or tools that assist in the use and protection of COMSEC material. It can include things like manuals, guides, or software programs that aid in the encryption and decryption process.

Submit
14. What term suggests movement of material from one place to another by someone with an active interest in that material?

Explanation

Transport is the correct answer because it refers to the movement of material from one place to another. It implies that someone with an active interest, such as a carrier or a transporter, is involved in the process of moving the material. Transfer suggests movement but does not necessarily imply an active interest, while shipment refers specifically to the act of sending goods.

Submit
15. In which folder of the COMSEC account 6-part folder are destructions certficates filed?

Explanation

The destruction certificates are filed in the 6-part folder of the COMSEC account.

Submit
16. Who is the final authority for a person going into two-person control (TPC) positions?

Explanation

The final authority for a person going into two-person control (TPC) positions is the commander of the unit holding TPC material. This individual has the ultimate responsibility for ensuring the proper handling and control of sensitive materials, and therefore has the authority to grant access to TPC positions. They have the knowledge and understanding of the specific requirements and protocols associated with TPC, and can make informed decisions regarding who is qualified and trustworthy enough to hold such positions.

Submit
17. What interrupt request (IRQ) line number is normally used for the floppy controller?

Explanation

The correct answer is 6 because IRQ 6 is typically used for the floppy controller. Interrupt Request (IRQ) lines are used by hardware devices to request the attention of the CPU. Each device is assigned a specific IRQ line number, and IRQ 6 is commonly used for the floppy disk controller. This allows the controller to send interrupt signals to the CPU when necessary, such as when a disk operation is completed or when an error occurs.

Submit
18. A Class II Electrostatic Discharge (ESD) item is senstive to what level of voltage?

Explanation

A Class II Electrostatic Discharge (ESD) item is sensitive to voltage levels between 1,000 and 3,999 volts. This means that any voltage below 1,000 volts or above 3,999 volts will not cause damage or interference to the item.

Submit
19. Static electricity remains intact until it is

Explanation

Static electricity is the accumulation of electric charge on an object. It remains intact until it is discharged, which means the excess charge is released and the object returns to a neutral state. Discharging can occur through various methods such as contact with another object, grounding, or the flow of electric current. Once the static electricity is discharged, the object no longer holds the excess charge and is no longer static.

Submit
20. How often is the COMSEC security manager required to inspect COMSEC Responsible Officers (CROs) and COMSEC users?

Explanation

The COMSEC security manager is required to inspect COMSEC Responsible Officers (CROs) and COMSEC users semi-annually. This means that the inspections should be conducted twice a year. This frequency ensures that the security measures and protocols are being followed by the CROs and users to maintain the confidentiality and integrity of the communication security systems. Regular inspections help to identify any potential vulnerabilities or non-compliance issues and take corrective actions in a timely manner.

Submit
21. The individual who is requiredto use and safeguard COMSEC aids while performing official duties is the

Explanation

The individual who is required to use and safeguard COMSEC aids while performing official duties is the user. This means that they are responsible for properly utilizing and protecting communication security equipment and materials in their role. They are expected to follow protocols and guidelines to ensure the confidentiality and integrity of sensitive information.

Submit
22. Disposition records and/or destrction reports are not required for material that has been issued to

Explanation

Disposition records and/or destruction reports are not required for material that has been issued to transient aircrews. Transient aircrews refer to personnel who are temporarily stationed at a particular base or location for a short period of time. Since they are not permanent members of the base or organization, there is no need to maintain records or reports for the material issued to them.

Submit
23. What is the maximum number of different actions that can be accomplished on a single SF 153?

Explanation

not-available-via-ai

Submit
24. Which AF form do COMSEC managers use when conducting an inspection of a sub COMSEC account?

Explanation

COMSEC managers use AF form 4160 when conducting an inspection of a sub COMSEC account.

Submit
25. What is known as a state-of-the-art ground-to-ground communications infrastructure?

Explanation

The correct answer is Theater deployable communications (TDC). TDC refers to a state-of-the-art ground-to-ground communications infrastructure that can be easily deployed in a theater of operations. It provides reliable and secure communications capabilities for military forces, allowing them to communicate effectively and coordinate their operations. TDC systems are designed to be flexible, scalable, and interoperable, enabling seamless communication between different units and platforms. This infrastructure plays a crucial role in modern military operations, ensuring that commanders have the necessary communication tools to make informed decisions and execute missions successfully.

Submit
26. Which original component was very susceptible to damage from electrostatic discharge?

Explanation

The CMOS is a type of semiconductor that is used to store the BIOS settings in a computer. It is very susceptible to damage from electrostatic discharge because it is a delicate component that can easily be affected by high voltage static electricity. If the CMOS is damaged by electrostatic discharge, it can lead to malfunctioning or failure of the computer's BIOS, which is responsible for controlling the basic functions of the computer.

Submit
27. What is defined as an asynchronous signal from a computer hardware device indicating th need for attention from a central processing unit (CPU) or a synchronous event in a software application program indicating a need for a change in execution?

Explanation

An interrupt is a signal from a computer hardware device or a synchronous event in a software application program that indicates the need for attention from the CPU or a change in execution. It is a mechanism that allows hardware devices or software programs to communicate with the CPU and request immediate attention or a change in the current execution flow. Interrupts are used to handle time-sensitive tasks, prioritize tasks, and ensure efficient utilization of system resources.

Submit
28. What is defined as an asynchronous signal from a computer hardware device indicating th need for attention from a central processing unit (CPU) or a synchronous event in a software application program indicating a need for a change in execution?

Explanation

An interrupt is a signal from a hardware device or a synchronous event in a software program that indicates the need for attention from the CPU or a change in execution. It is a mechanism used by the hardware or software to interrupt the normal flow of execution and divert the CPU's attention to handle the interrupt request. Interrupts are commonly used in computer systems to handle various events such as input/output operations, hardware errors, and timekeeping. They allow for efficient multitasking and responsiveness in computer systems.

Submit
29. Which type of RAM holds data without needing to be refreshed as long as power is supplied to them?

Explanation

SRAM is the correct answer because it is a type of RAM that can hold data without the need for constant refreshing as long as power is supplied to it. Unlike DRAM, SDRAM, and DDR SDRAM, which require periodic refreshing to maintain the stored data, SRAM uses flip-flop circuits to store each bit of data, allowing it to retain information as long as power is provided. This makes SRAM faster and more reliable than other types of RAM, but it is also more expensive and has a lower storage capacity.

Submit
30. A Class III Electrostatic Discharge (ESD) item is senstive to what level of voltage?

Explanation

A Class III Electrostatic Discharge (ESD) item is sensitive to a voltage level between 4,000 and 15,000 volts. This means that if the voltage exceeds 15,000 volts, the item may be damaged or affected by the electrostatic discharge. However, if the voltage is below 4,000 volts, the item is not as sensitive and may not be affected by the discharge. Therefore, the correct answer is "Between 4,000 but less than 15,000 volts."

Submit
31. Who oversees and manages the operational use and control of COMSEC material?

Explanation

The controlling authority is responsible for overseeing and managing the operational use and control of COMSEC material. They have the authority to ensure that proper procedures are followed and that the material is used and controlled in a secure manner. This includes monitoring and enforcing compliance with COMSEC policies and regulations, as well as implementing necessary safeguards to protect sensitive information. The controlling authority plays a crucial role in maintaining the confidentiality and integrity of COMSEC material.

Submit
32. What is the preferred method for listing material on the AFCOMSEC Form 16?

Explanation

The preferred method for listing material on the AFCOMSEC Form 16 is alphabetically by short title. This means that the materials should be organized and listed in alphabetical order based on their short titles. This method allows for easy and efficient retrieval of the materials as they can be quickly located by their short titles.

Submit
33. Where does the next unused voucher number come from that is used on transfer reports?

Explanation

The next unused voucher number that is used on transfer reports comes from AFCOMSEC Form 14.

Submit
34. Who is ultimately responsible for all emergency action plans (EAPs) on base?

Explanation

The COMSEC manager is ultimately responsible for all emergency action plans (EAPs) on base. This is because the COMSEC manager is in charge of managing and safeguarding communication security measures, including emergency protocols. They are responsible for ensuring that the EAPs are properly developed, implemented, and maintained to protect sensitive information and respond effectively to emergencies. The other options, such as CRO (Combat Rescue Officer), Unit commander, and MAJCOM (Major Command), may have certain responsibilities in emergency situations, but the COMSEC manager holds the overall responsibility for EAPs.

Submit
35. What phase is concerned with exercises to ensure you are familiar with the deployment process and with your equipment?

Explanation

The phase concerned with exercises to ensure familiarity with the deployment process and equipment is called predeployment. This phase occurs before the actual deployment and involves practicing and training to ensure that all personnel are prepared and knowledgeable about the deployment process and the equipment they will be using. This phase helps to minimize any potential issues or challenges that may arise during the deployment and ensures that everyone is fully prepared for the mission.

Submit
36. What is known as a suite of modules and accessory kits serving as the backbone of deployed communications networks?

Explanation

The term "Integrated communications access package (ICAP)" refers to a suite of modules and accessory kits that form the foundation of deployed communications networks. This package includes various components and tools that are essential for establishing and maintaining effective communication within a network. ICAP serves as a comprehensive solution for ensuring seamless connectivity and efficient communication in various operational environments.

Submit
37. The high memory area is how much of the extended memory area?

Explanation

The high memory area refers to the portion of the extended memory area that is located above the conventional memory area. In this case, the correct answer states that the high memory area is the first 64 KB of the extended memory area. This means that the high memory area starts immediately after the conventional memory area and extends up to 64 KB.

Submit
38. A Class I Electrostatic Discharge (ESD) item is senstive to what level of voltage?

Explanation

A Class I Electrostatic Discharge (ESD) item is sensitive to a voltage level that is less than 1000 volts.

Submit
39. What is normally the next step in the boot up process after initial power is supplied?

Explanation

After initial power is supplied, the keyboard lights should flash. This is a common indicator that the computer is receiving power and is starting to boot up. It is a basic hardware check that occurs before the operating system loads into memory and the user interface appears. The flashing keyboard lights serve as a visual cue that the computer is in the process of starting up.

Submit
40. Who is responsible for the production and management of cryptographic material within the US government?

Explanation

The Director of the National Security Agency (DIRNSA) is responsible for the production and management of cryptographic material within the US government. The National Security Agency (NSA) is a government agency that is responsible for signals intelligence and information assurance. As the director of this agency, they oversee the development and implementation of cryptographic systems and protocols to ensure the security of sensitive information and communications.

Submit
41. COMSEC material that is inventoried by short title, edition, accunting control number, and quantity falls under which category?

Explanation

COMSEC material that is inventoried by short title, edition, accounting control number, and quantity falls under the category ALC-1.

Submit
42. What is the term used when referring to specific (COMSEC) material other than equipment?

Explanation

The term used when referring to specific (COMSEC) material other than equipment is "Aids." This term encompasses any additional tools or resources that support the use and protection of COMSEC material, such as key lists, codebooks, or cryptographic algorithms. It is important to differentiate between equipment and aids, as aids are not physical devices but rather informational or instructional materials that assist in the proper handling and safeguarding of COMSEC material.

Submit
43. Who establishes the semi-annual inventory date for each COMSEC account number?

Explanation

CPSG, which stands for Communications Security Policy Group, establishes the semi-annual inventory date for each COMSEC account number.

Submit
44. What interrupt request (IRQ) line number is normally used for the floppy controller?

Explanation

The correct answer is 6. The floppy controller typically uses IRQ line number 6 for interrupt requests. This line is used to signal the CPU that the controller requires attention or data transfer.

Submit
45. Which form is considered a daily physical security inventory of your environment?

Explanation

SF 701 is considered a daily physical security inventory of your environment. This form is used to record the results of a daily inspection of security containers and vaults to ensure that they are properly secured and all security measures are in place. It helps to maintain the physical security of the environment by ensuring that all necessary precautions are taken to protect sensitive information and assets.

Submit
46. In which phase does the CRO check material issued against the list on the SF 153?

Explanation

In the distribution phase, the CRO checks the material issued against the list on the SF 153. This phase involves the actual delivery of the material to the intended recipients. The CRO ensures that the correct items are being distributed and matches them against the list provided on the SF 153 to ensure accuracy and accountability.

Submit
47. What is normally the next step in the boot up process after initial power is supplied?

Explanation

After initial power is supplied, the next step in the boot up process is usually for the keyboard lights to flash. This is a common indication that the computer is receiving power and initializing its hardware components. It is a preliminary step before the operating system loads into memory and the user interface appears.

Submit
48. In which troubleshooting step would you identify likely causes and eliminate unlikely causes?

Explanation

In the troubleshooting process, the step where you identify likely causes and eliminate unlikely causes is the "Resolve the problem" step. This step involves analyzing the information gathered during the previous steps, such as defining and isolating the problem, to determine the most probable causes of the issue. By systematically eliminating unlikely causes, you can narrow down the possibilities and focus on finding the solution to the problem.

Submit
49. If it is physically impossible to conduct an inventory of a user because of distance, the COMSEC manager

Explanation

If it is physically impossible to conduct an inventory of a user because of distance, the COMSEC manager asks the user to verify his or her holdings by letter or message. This is the most practical solution in a situation where a physical inventory is not feasible due to distance constraints. By requesting the user to verify their holdings through a letter or message, the COMSEC manager can still ensure that the inventory is conducted accurately and securely, even if they cannot physically be present.

Submit
50. What is the maximum number of different actions that can be accomplished on a single SF 153?

Explanation

The maximum number of different actions that can be accomplished on a single SF 153 is 1. This means that there is only one possible action that can be taken on the SF 153 form.

Submit
51. The first 640 KB of memory is what division of memory?

Explanation

The first 640 KB of memory is referred to as "conventional" memory. This division of memory is the lower portion of the memory space and is accessible by most software applications. It is limited to 640 KB due to historical reasons and the design of early PC architectures. The conventional memory is used to store the operating system, device drivers, and other essential software components.

Submit
52. What is an interdependent group of systems used to automate planning, ordering, generating, distributing, filling, using, and destroying electronic key and manging other types of COMSEC materials?

Explanation

An electronic key management system is a group of interconnected systems that automate various processes related to the handling of electronic keys and other types of COMSEC materials. This includes planning, ordering, generating, distributing, filling, using, and destroying these materials. The system ensures efficient and secure management of cryptographic keys, which are essential for secure communication and data protection. By automating these processes, an electronic key management system helps organizations maintain the confidentiality and integrity of their communications.

Submit
53. Disposition records and/or destrction reports are not required for material that has been issued to

Explanation

Disposition records and/or destruction reports are not required for material that has been issued to transient aircrews. This means that when material is issued to transient aircrews, there is no need to keep track of its disposition or report its destruction. The reason for this is likely because transient aircrews are not permanently stationed at a base or location, so it would be impractical to require such records for material issued to them.

Submit
54. Actively sampling the status of an external device by a client program is known as

Explanation

Polling refers to the act of actively sampling the status of an external device by a client program. It involves regularly checking the device to see if any new data or events have occurred. This method allows the client program to efficiently gather information from the device without having to constantly wait for it to send updates. By polling, the client program can determine when the device is ready to send data or when a specific event has occurred, enabling it to respond accordingly.

Submit
55. COMSEC material that is inventoried by quantity only falls under which category?

Explanation

COMSEC material that is inventoried by quantity only falls under ALC-2 category.

Submit
56. AFCOMSEC Form 16 inventories are retained for the current inventory plus how many previous months of inventory?

Explanation

The AFCOMSEC Form 16 inventories are retained for the current inventory plus 6 previous months of inventory. This means that the organization keeps records of the current month's inventory as well as the inventory from the past 6 months. This allows them to track and monitor changes in inventory over time, helping them to identify any discrepancies or issues that may arise.

Submit
57. You have just changed the combination to the safe in your office.  Which form will you use to record the date that you changed the conmbination?

Explanation

The SF 700 form is used to record the date that the combination to a safe is changed.

Submit
58. The individual who is requiredto use and safeguard COMSEC aids while performing official duties is the

Explanation

The individual who is required to use and safeguard COMSEC aids while performing official duties is referred to as the "user." This implies that this person is responsible for properly handling and protecting communication security equipment and materials during their work. They are expected to follow the necessary protocols and procedures to ensure the confidentiality and integrity of sensitive information.

Submit
59. What is known as a state-of-the-art ground-to-ground communications infrastructure?

Explanation

The correct answer is Theater deployable communications (TDC). This term refers to a ground-to-ground communications infrastructure that is advanced and modern, incorporating the latest technology and capabilities. TDC is designed to be easily transportable and deployable in theater, providing reliable and efficient communication between different military units or organizations. It is specifically tailored for use in combat or operational environments, where quick and seamless communication is crucial for mission success.

Submit
60. In which troubleshooting step would you determine which conditions are present?

Explanation

In the troubleshooting process, the first step is to define the problem. This involves gathering information and identifying the symptoms or issues that are occurring. By defining the problem, you can better understand what conditions are present and what factors may be contributing to the problem. This step sets the foundation for the rest of the troubleshooting process, as it helps to narrow down the possible causes and determine the appropriate course of action.

Submit
61. What is the logistics system for distributing, controlling, and protecting COMSEC material?

Explanation

The correct answer is the Communications security material control system (CMCS). This system is responsible for distributing, controlling, and protecting COMSEC material. It ensures that the material is securely managed and only accessible to authorized personnel. The CMCS tracks the movement of the material, maintains inventory records, and enforces security protocols to prevent unauthorized access or loss of sensitive information.

Submit
62. In which phase does the COMSEC manager determine which materials the CRO needs?

Explanation

In the preparation phase, the COMSEC manager assesses the requirements of the CRO (Communications Security Responsible Officer) and determines the specific materials needed to ensure the security of communications. This phase involves planning and organizing the necessary resources, such as encryption devices, keys, and protocols, to protect sensitive information. By determining the materials required in advance, the COMSEC manager can effectively prepare for the secure transmission and storage of classified data.

Submit
63. At a minimum, how often do you change the combination to a cipher lock?

Explanation

The combination to a cipher lock should be changed regularly to ensure security. Changing the combination monthly ensures that even if someone manages to learn the current combination, they will have limited time to exploit it before it is changed again. This frequent change reduces the risk of unauthorized access and increases the overall security of the lock.

Submit
64. In which phase does the CRO check material issued against the list on the SF 153?

Explanation

In the distribution phase, the CRO checks the material issued against the list on the SF 153. This phase involves the actual delivery and transfer of materials to the intended recipients. During this phase, the CRO ensures that the correct materials are being distributed according to the list provided on the SF 153, verifying that there are no discrepancies or errors in the distribution process.

Submit
65. Which AF form do COMSEC managers use when conducting an inspection of a sub COMSEC account?

Explanation

COMSEC managers use AF Form 4160 when conducting an inspection of a sub COMSEC account.

Submit
66. What is known as a suite of modules and accessory kits serving as the backbone of deployed communications networks?

Explanation

The correct answer is Integrated communications access package (ICAP). ICAP refers to a suite of modules and accessory kits that serve as the backbone of deployed communications networks. This package provides integrated access to various communication systems and helps in establishing and maintaining connectivity in a theater of operations. It includes equipment and components that enable communication between different units and facilitate efficient and effective communication in military operations.

Submit
67. In which troubleshooting step would you determine which conditions are present?

Explanation

In the troubleshooting process, the step of defining the problem involves identifying and understanding the specific issue or concern that needs to be addressed. This step is crucial because it helps to establish a clear understanding of what needs to be resolved. By defining the problem, one can then proceed to gather more information and determine which conditions or factors are contributing to the issue. This step sets the foundation for effectively troubleshooting and finding a solution.

Submit
68. In which folder of the COMSEC account 6-part folder are destructions certficates filed?

Explanation

In the COMSEC account 6-part folder, destruction certificates are filed in folder number 6.

Submit
69. COMSEC material that is electronically generated keys that are continuously accountable to the COR by means of EKMS elements falls under which category?

Explanation

COMSEC material that is electronically generated keys that are continuously accountable to the COR by means of EKMS elements falls under the category ALC-6.

Submit
70. What term suggests movement of material from one place to another by someone with an active interest in that material?

Explanation

Transport is the correct answer because it refers to the movement of material from one place to another. It implies that someone with an active interest in the material is involved in the process of moving it. Transport can involve various modes such as trucks, trains, ships, or planes, and it is typically done to fulfill a specific purpose or need.

Submit
71. In which troubleshooting step would you confirm a dilemma exists?

Explanation

In the troubleshooting process, isolating the problem is the step where you determine if a dilemma actually exists. This step involves identifying and narrowing down the specific issue or cause of the problem. By isolating the problem, you can gather more information, conduct tests, and eliminate any potential false assumptions or unrelated factors. It helps in confirming that there is indeed an issue that needs to be resolved.

Submit
72. Who is responsible for the production and management of cryptographic material within the US government?

Explanation

The Director of the National Security Agency (DIRNSA) is responsible for the production and management of cryptographic material within the US government. The National Security Agency (NSA) is a government agency that specializes in signals intelligence and information security. As the director of this agency, it is their duty to oversee the production and management of cryptographic material, which plays a crucial role in protecting sensitive information and ensuring secure communication within the US government.

Submit
73. COMSEC material that is not required to be accounted for on the daily or shift inventory but is accounted for by accounting control number to the COR when transferred or when it is in excess falls under which category?

Explanation

COMSEC material that is not required to be accounted for on the daily or shift inventory but is accounted for by accounting control number to the COR when transferred or when it is in excess falls under the ALC-4 category.

Submit
74. In which troubleshooting step would you confirm a dilemma exists?

Explanation

In the troubleshooting process, the step of isolating the problem involves identifying and narrowing down the specific issue or dilemma that needs to be addressed. This step helps to confirm that there is indeed a problem that needs to be resolved. By isolating the problem, one can focus on understanding its root cause and finding the appropriate solution. Once the problem is isolated, the next steps involve resolving the problem and confirming the resolution.

Submit
75. COMSEC material that is inventoried by quantity only falls under which category?

Explanation

COMSEC material that is inventoried by quantity only falls under the ALC-2 category. This means that the material is tracked and accounted for based on the number of items, rather than their specific characteristics or attributes. ALC-2 is specifically designated for inventory management purposes, ensuring that the quantity of COMSEC material is accurately recorded and maintained.

Submit
76. As a minimum, conduct a back-up routine ____________ each day the User computerized-management of communications security material (UCM2) is used, whether or not transactions are recorded that day.

Explanation

The correct answer is "once." This means that a back-up routine should be conducted at least once every day that the User computerized-management of communications security material (UCM2) is used, regardless of whether any transactions are recorded that day. This ensures that the security material is regularly backed up and protected in case of any system failures or data loss incidents.

Submit
77. Which form is considered a daily physical security inventory of your environment?

Explanation

SF 701 is considered a daily physical security inventory of your environment. This form is used to document and verify the presence of classified material in secure areas. It helps ensure that all classified material is properly accounted for and that there are no unauthorized access or removal of classified material. By conducting daily physical security inventories using SF 701, organizations can maintain a high level of security and prevent any potential security breaches.

Submit
78. Which form must you annontate each time you open, close, or check a security container?

Explanation

Each time you open, close, or check a security container, you must annotate it on an SF 702 form. This form is specifically used for recording the activity related to security containers. It helps to track and document the access and maintenance of these containers, ensuring proper security protocols are followed.

Submit
79. In which troubleshooting step would you identify likely causes and eliminate unlikely causes?

Explanation

In the troubleshooting process, the step of resolving the problem involves identifying likely causes and eliminating unlikely causes. This step is crucial as it helps in narrowing down the possible reasons for the problem and focusing on the most probable ones. By eliminating unlikely causes, it saves time and effort by avoiding unnecessary troubleshooting steps. Once the likely causes are identified, further investigation and actions can be taken to resolve the problem effectively.

Submit
80. COMSEC material that is inventoried by short title, edition, accunting control number, and quantity falls under which category?

Explanation

COMSEC material that is inventoried by short title, edition, accounting control number, and quantity falls under the category of ALC-1.

Submit
81. You have just changed the combination to the safe in your office.  Which form will you use to record the date that you changed the conmbination?

Explanation

The SF 700 form is used to record the date that the combination to a safe has been changed.

Submit
82. Who is ultimately responsible for all emergency action plans (EAPs) on base?

Explanation

The COMSEC manager is ultimately responsible for all emergency action plans (EAPs) on base. This individual is responsible for managing and safeguarding communication security, which includes emergency protocols and plans. They are knowledgeable about the specific requirements and procedures for handling emergencies and ensuring that the EAPs are properly implemented and followed. The COMSEC manager plays a crucial role in coordinating and overseeing emergency response efforts to protect the base and its personnel.

Submit
83. Who is the final authority for a person going into two-person control (TPC) positions?

Explanation

The final authority for a person going into two-person control (TPC) positions is the commander of the unit holding TPC material. This means that the commander is responsible for authorizing individuals to access and handle TPC material, ensuring that proper protocols and security measures are followed. The commander's role is crucial in maintaining the integrity and security of TPC material within the unit.

Submit
84. Where does the next unused voucher number come from that is used on transfer reports?

Explanation

The next unused voucher number used on transfer reports comes from AFCOMSEC Form 14.

Submit
85. COMSEC material that is not required to be accounted for on the daily or shift inventory but is accounted for by accounting control number to the COR when transferred or when it is in excess falls under which category?

Explanation

COMSEC material that is not required to be accounted for on the daily or shift inventory but is accounted for by accounting control number to the COR when transferred or when it is in excess falls under the ALC-4 category.

Submit
86. Who establishes the semi-annual inventory date for each COMSEC account number?

Explanation

CPSG, which stands for Communications Security Policy Group, establishes the semi-annual inventory date for each COMSEC account number.

Submit
87. ______________ identifies responsibilities for supporting critical Air Force communication and information networks, primarily through network control centers (NCC).

Explanation

AFI 33-115, Volume 1 is the correct answer because it specifically identifies the responsibilities for supporting critical Air Force communication and information networks, primarily through network control centers (NCC). This document provides the necessary guidelines and instructions for the management and operation of these networks, ensuring their reliability and effectiveness. The other options listed are not directly related to the responsibilities of supporting communication and information networks.

Submit
88. ______________________ provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks and the training and licensing of Air Force network users.

Explanation

AFI 33-115, Volume 2 provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks and the training and licensing of Air Force network users.

Submit
89. What is the logistics system for distributing, controlling, and protecting COMSEC material?

Explanation

The correct answer is the Communications security material control system (CMCS). This system is responsible for distributing, controlling, and protecting COMSEC (communications security) material. It ensures that only authorized individuals have access to the material and tracks its movement and usage. CMCS plays a crucial role in maintaining the confidentiality and integrity of sensitive information in communication systems.

Submit
90. Which type of RAM holds data without needing to be refreshed as long as power is supplied to them?

Explanation

SRAM is the correct answer because it is a type of RAM that can hold data without needing to be refreshed as long as power is supplied to it. Unlike DRAM, SDRAM, and DDR SDRAM which require constant refreshing, SRAM uses a flip-flop circuitry to store data, which makes it faster and more reliable. SRAM is commonly used in cache memories and other applications where speed and stability are crucial.

Submit
91. How often is the COMSEC security manager required to inspect COMSEC Responsible Officers (CROs) and COMSEC users?

Explanation

The COMSEC security manager is required to inspect COMSEC Responsible Officers (CROs) and COMSEC users semi-annually. This means that the inspections should be conducted twice a year. This frequency allows for regular assessments of the CROs and users to ensure that they are following proper security protocols and procedures. It also allows for timely identification and resolution of any potential security breaches or vulnerabilities. By conducting inspections semi-annually, the COMSEC security manager can maintain an ongoing assessment of the security posture and compliance within the organization.

Submit
92. __________________ establishes policy on how command, control, communications and computer (C4) systems are acquired, operated, and maintained.

Explanation

not-available-via-ai

Submit
93. The first 640 KB of memory is what division of memory?

Explanation

The first 640 KB of memory is referred to as conventional memory. This division of memory is the portion that is accessible to DOS-based applications in the x86 architecture. It includes the base memory and is used to run the operating system and most applications. The remaining memory beyond the 640 KB limit is divided into other memory divisions such as upper memory, high memory, and extended memory.

Submit
94. The high memory area is how much of the extended memory area?

Explanation

The high memory area refers to the portion of the extended memory area that is located at the top end of the address space. It starts at the address 1 MB and goes up to a certain limit. In this case, the correct answer is the first 64 KB, which means that the high memory area extends from the address 1 MB to 1 MB + 64 KB.

Submit
95. ____________________ establishes e-mail manager and user duties and responsibilities.  It provides rules, standards, and guidance relating to the use of electronic messaging by the Air Force.

Explanation

AFI 33-119 establishes e-mail manager and user duties and responsibilities, as well as providing rules, standards, and guidance relating to the use of electronic messaging by the Air Force.

Submit
96. What term indicates shipping or transporting for the purpose of consigning the responsibility of the material to another party?

Explanation

Transfer is the term that indicates shipping or transporting for the purpose of consigning the responsibility of the material to another party. When materials are transferred, the ownership and accountability for them are handed over to another party. This can involve physically moving the materials from one location to another or simply transferring the legal rights and responsibilities associated with them. The other options, carrier, transport, and shipment, do not specifically imply the transfer of responsibility to another party.

Submit
97. Operating system (OS) nstructions and OS programs are processed into which memory space?

Explanation

Operating system instructions and OS programs are processed into the conventional memory space. Conventional memory refers to the lower memory addresses that are accessible by the processor without the need for any special memory management techniques. It is the first segment of memory that the processor accesses when executing instructions. Therefore, the correct answer is "Conventional".

Submit
98. What is an interdependent group of systems used to automate planning, ordering, generating, distributing, filling, using, and destroying electronic key and manging other types of COMSEC materials?

Explanation

An electronic key management system is a group of interdependent systems that automate various processes related to the management of electronic keys and other types of COMSEC (communications security) materials. This includes planning, ordering, generating, distributing, filling, using, and destroying these materials. It is a comprehensive solution that ensures the secure and efficient management of cryptographic keys and other sensitive materials used in communication systems.

Submit
99. Who oversees and manages the operational use and control of COMSEC material?

Explanation

The controlling authority is responsible for overseeing and managing the operational use and control of COMSEC material. They have the authority to set policies and procedures, allocate resources, and ensure compliance with COMSEC regulations. They have the ultimate responsibility for the security and protection of COMSEC material and are accountable for its proper use and control.

Submit
100. Which form must you annontate each time you open, close, or check a security container?

Explanation

Each time you open, close, or check a security container, you must annotate it on SF 702.

Submit
101. COMSEC material that is electronically generated keys that are continuously accountable to the COR by means of EKMS elements falls under which category?

Explanation

COMSEC material that is electronically generated keys that are continuously accountable to the COR by means of EKMS elements falls under the ALC-6 category.

Submit
102. ______________________ provides identification and authentication computer security requirements for operational information systems.

Explanation

AFMAN 33-223 provides identification and authentication computer security requirements for operational information systems.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jan 29, 2010
    Quiz Created by
    Afronova84
Cancel
  • All
    All (102)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Actively sampling the status of an external device by a client program...
Operating system (OS) nstructions and OS programs are processed...
A Class III Electrostatic Discharge (ESD) item is senstive to...
Static electricity remains intact until it is
What is the first job the basic output system (BIOS) does at start-up?
A Class I Electrostatic Discharge (ESD) item is senstive to what level...
A Class II Electrostatic Discharge (ESD) item is senstive to what...
As a minimum, conduct a back-up routine ____________ each day the User...
At a minimum, how often do you change the combination to a cipher...
What is the preferred method for listing material on the AFCOMSEC Form...
AFCOMSEC Form 16 inventories are retained for the current inventory...
If it is physically impossible to conduct an inventory of a user...
What is the term used when referring to specific (COMSEC) material...
What term suggests movement of material from one place to another by...
In which folder of the COMSEC account 6-part folder are destructions...
Who is the final authority for a person going into two-person control...
What interrupt request (IRQ) line number is normally used for the...
A Class II Electrostatic Discharge (ESD) item is senstive to what...
Static electricity remains intact until it is
How often is the COMSEC security manager required to inspect COMSEC...
The individual who is requiredto use and safeguard COMSEC aids while...
Disposition records and/or destrction reports are not required for...
What is the maximum number of different actions that can be...
Which AF form do COMSEC managers use when conducting an inspection of...
What is known as a state-of-the-art ground-to-ground communications...
Which original component was very susceptible to damage from...
What is defined as an asynchronous signal from a computer hardware...
What is defined as an asynchronous signal from a computer hardware...
Which type of RAM holds data without needing to be refreshed as long...
A Class III Electrostatic Discharge (ESD) item is senstive to...
Who oversees and manages the operational use and control of COMSEC...
What is the preferred method for listing material on the AFCOMSEC Form...
Where does the next unused voucher number come from that is used on...
Who is ultimately responsible for all emergency action plans (EAPs) on...
What phase is concerned with exercises to ensure you are familiar with...
What is known as a suite of modules and accessory kits serving as the...
The high memory area is how much of the extended memory area?
A Class I Electrostatic Discharge (ESD) item is senstive to what level...
What is normally the next step in the boot up process after initial...
Who is responsible for the production and management of cryptographic...
COMSEC material that is inventoried by short title, edition, accunting...
What is the term used when referring to specific (COMSEC) material...
Who establishes the semi-annual inventory date for each COMSEC account...
What interrupt request (IRQ) line number is normally used for the...
Which form is considered a daily physical security inventory of your...
In which phase does the CRO check material issued against the list on...
What is normally the next step in the boot up process after initial...
In which troubleshooting step would you identify likely causes and...
If it is physically impossible to conduct an inventory of a user...
What is the maximum number of different actions that can be...
The first 640 KB of memory is what division of memory?
What is an interdependent group of systems used to automate planning,...
Disposition records and/or destrction reports are not required for...
Actively sampling the status of an external device by a client program...
COMSEC material that is inventoried by quantity only falls under which...
AFCOMSEC Form 16 inventories are retained for the current inventory...
You have just changed the combination to the safe in your...
The individual who is requiredto use and safeguard COMSEC aids while...
What is known as a state-of-the-art ground-to-ground communications...
In which troubleshooting step would you determine which conditions are...
What is the logistics system for distributing, controlling, and...
In which phase does the COMSEC manager determine which materials the...
At a minimum, how often do you change the combination to a cipher...
In which phase does the CRO check material issued against the list on...
Which AF form do COMSEC managers use when conducting an inspection of...
What is known as a suite of modules and accessory kits serving as the...
In which troubleshooting step would you determine which conditions are...
In which folder of the COMSEC account 6-part folder are destructions...
COMSEC material that is electronically generated keys that are...
What term suggests movement of material from one place to another by...
In which troubleshooting step would you confirm a dilemma exists?
Who is responsible for the production and management of cryptographic...
COMSEC material that is not required to be accounted for on the daily...
In which troubleshooting step would you confirm a dilemma exists?
COMSEC material that is inventoried by quantity only falls under which...
As a minimum, conduct a back-up routine ____________ each day the User...
Which form is considered a daily physical security inventory of your...
Which form must you annontate each time you open, close, or check a...
In which troubleshooting step would you identify likely causes and...
COMSEC material that is inventoried by short title, edition, accunting...
You have just changed the combination to the safe in your...
Who is ultimately responsible for all emergency action plans (EAPs) on...
Who is the final authority for a person going into two-person control...
Where does the next unused voucher number come from that is used on...
COMSEC material that is not required to be accounted for on the daily...
Who establishes the semi-annual inventory date for each COMSEC account...
______________ identifies responsibilities for supporting critical Air...
______________________ provides the policy and procedures for...
What is the logistics system for distributing, controlling, and...
Which type of RAM holds data without needing to be refreshed as long...
How often is the COMSEC security manager required to inspect COMSEC...
__________________ establishes policy on how command, control,...
The first 640 KB of memory is what division of memory?
The high memory area is how much of the extended memory area?
____________________ establishes e-mail manager and user duties and...
What term indicates shipping or transporting for the purpose of...
Operating system (OS) nstructions and OS programs are processed...
What is an interdependent group of systems used to automate planning,...
Who oversees and manages the operational use and control of COMSEC...
Which form must you annontate each time you open, close, or check a...
COMSEC material that is electronically generated keys that are...
______________________ provides identification and authentication...
Alert!

Advertisement