3D053 V1 & 2 2018

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Mcknightc3h6n6o6
M
Mcknightc3h6n6o6
Community Contributor
Quizzes Created: 1 | Total Attempts: 157
| Attempts: 157 | Questions: 175
Please wait...
Question 1 / 175
0 %
0/100
Score 0/100
1. 44. (017) Users who perform troubleshooting, configuration changes, or system reviews are given which type of access?

Explanation

Users who perform troubleshooting, configuration changes, or system reviews are given administrative access. This type of access allows them to have full control and authority over the system, including the ability to make changes, modify settings, and troubleshoot issues. Administrative access is typically granted to individuals who have the knowledge and expertise to handle these tasks and ensure the proper functioning of the system.

Submit
Please wait...
About This Quiz
3D053 V1 & 2 2018 - Quiz

This 3D053 V1 & 2 2018 quiz assesses knowledge in cyber surety roles, focusing on duties such as intrusion detection and firewall protection, client systems management, and risk... see moremanagement processes. It is crucial for personnel in cyber operations and security. see less

2. 51. (221) What provides the special protection of Top Secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening?

Explanation

Two-person integrity (TPI) provides the special protection of Top Secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening. TPI ensures that two authorized individuals are required to be present at all times when handling or accessing TS COMSEC material. This measure reduces the risk of unauthorized access, theft, or tampering with the material, thus enhancing the security and integrity of the communications.

Submit
3. 76. (235) Who is responsible for building, issuing, and recovering comm kits?

Explanation

The Combat Crew Communications (CCC) technician is responsible for building, issuing, and recovering communication kits. This role is specifically assigned to handle the communication equipment used by the combat crew during their operations. The CCC technician ensures that the kits are properly assembled, distributed to the crew members, and collected back after the mission. They play a crucial role in maintaining effective communication within the crew and ensuring the security and functionality of the communication equipment.

Submit
4. 46. (018) Weaknesses or holes in a security system are considered

Explanation

Weaknesses or holes in a security system are considered vulnerabilities because they expose the system to potential threats and can be exploited by attackers. Vulnerabilities can include software bugs, misconfigurations, or design flaws that can be leveraged to compromise the security of a system. By identifying and addressing vulnerabilities, organizations can strengthen their security posture and reduce the risk of breaches or exploits.

Submit
5. 47. (018) Which of the following options is not involved when securing a UNIX system?

Explanation

The option "Ensuring remote access" is not involved when securing a UNIX system. Securing a UNIX system typically involves shutting down ports to prevent unauthorized access, using strong passwords to protect user accounts, and disabling unused/unneeded services to reduce potential vulnerabilities. However, ensuring remote access is not directly related to securing the system, as it focuses on enabling and managing remote connections rather than implementing security measures.

Submit
6. 19. (209) Which of the following requirements would make a person ineligible for the cryptographic access program (CAP)?

Explanation

A person holding an interim security clearance would be ineligible for the cryptographic access program (CAP). This is because the CAP requires individuals to have a final security clearance, not just an interim clearance. Therefore, option a is the correct answer.

Submit
7. 55. (020) When classified information is inadvertently sent through unclassified e-mail it is considered

Explanation

When classified information is accidentally sent through unclassified email, it is considered a classified message incident. This means that sensitive information has been transmitted through an unauthorized channel, potentially compromising its confidentiality and security. It is important to handle classified information with utmost care and follow proper protocols to avoid such incidents.

Submit
8. 23. (210) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?

Explanation

An interim security clearance is not valid for personnel on a communications security (COMSEC) access list because it is a temporary clearance that is granted on a provisional basis while a full investigation is being conducted. This type of clearance does not provide the same level of trust and confidence as a final security clearance, which is a more thorough and comprehensive investigation. Therefore, personnel on a COMSEC access list must have a final security clearance or a clearance equal to or higher than the level of COMSEC being accessed to ensure the protection of sensitive information.

Submit
9. 58. (023) What determines the number of alternate information assurance officers (IAO) in an organization?

Explanation

The number of alternate information assurance officers (IAO) in an organization is determined by the mission need. This means that the organization will assess its specific requirements and determine how many alternate IAOs are needed to fulfill those needs. The number of information systems, personnel assigned, and the type of organization may be factors that influence the mission need, but they are not the direct determinants of the number of alternate IAOs.

Submit
10. 26. (211) At a minimum, how often must you review the communications security (COMSEC) access list?

Explanation

The correct answer is c. Once a month. The communications security (COMSEC) access list contains the names of individuals who are authorized to access and handle sensitive information. Reviewing the access list once a month ensures that only authorized personnel have access to the information, reducing the risk of unauthorized disclosure or compromise. Regular review is necessary to keep the access list up to date and to promptly remove any individuals who no longer require access.

Submit
11. 2. (001) Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video network, and cryptographic client devices in fixed and deployed environments?

Explanation

The correct answer is a. Client Systems (3D1X1). This career field is responsible for deploying, sustaining, troubleshooting, and repairing standard voice, data, video network, and cryptographic client devices in both fixed and deployed environments. This includes tasks such as setting up computer systems, installing software, and ensuring network connectivity.

Submit
12. 5. (002) Human error causes approximately what percentage of all accidents?

Explanation

Human error is responsible for the majority of accidents, accounting for approximately 95% of all incidents. This means that the vast majority of accidents can be attributed to mistakes or failures on the part of individuals, rather than external factors or mechanical failures. This highlights the importance of human factors and the need for effective training, procedures, and systems to minimize the risk of errors and prevent accidents from occurring.

Submit
13. 7. (004) Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?

Explanation

Fiber optic is the correct answer because it is the only option that describes a bound media with a core surrounded by cladding and a second layer surrounded by glass or plastic. CAT-6, coaxial, and twisted pair do not have this specific structure.

Submit
14. 29. (213) When an error or anomaly is detected upon receipt/inspection of communications security (COMSEC) material, who sends a message to DIRNSA/I31132?

Explanation

The correct answer is c. Communications security account manager (CAM). The CAM is responsible for managing the COMSEC accounts and ensuring the proper handling and safeguarding of COMSEC materials. When an error or anomaly is detected upon receipt or inspection of COMSEC material, the CAM would send a message to DIRNSA/I31132 to report the issue and seek guidance on how to resolve it. The unit commander, security manager, and communication security responsible officer (CRO) may also be involved in the process, but the CAM is specifically responsible for communicating with DIRNSA/I31132 in this situation.

Submit
15. 8. (004) Which of the following is not an example of unbound media?

Explanation

Fiber optic is not an example of unbound media because it uses physical cables to transmit data signals. Unbound media refers to wireless communication methods that do not require physical cables, such as terrestrial, radio frequency, and satellite microwave.

Submit
16. 74. (028) Which term identifies any equipment or area in which classified information is processed?

Explanation

The term "RED" identifies any equipment or area in which classified information is processed. This term is commonly used in the context of security clearances and access levels. It is likely that "RED" refers to a high level of security clearance and strict protocols for handling classified information.

Submit
17. 9. (005) In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?

Explanation

In a bus topology, a device wanting to communicate with another device on the network sends a broadcast message onto the wire that all other devices see. However, only the intended recipient actually accepts and processes the message. This is because in a bus topology, all devices are connected to a single communication line, and the message travels along the line for all devices to see. However, each device has its own unique address, and only the device with the matching address accepts and processes the message.

Submit
18. 10. (006) When viewed in binary form, each octet within an Internet Protocol (IP) address has how many positions?

Explanation

Each octet within an Internet Protocol (IP) address has 8 positions when viewed in binary form. In binary representation, each position can have a value of either 0 or 1, allowing for a total of 8 possible positions or bits in each octet.

Submit
19. 83. (030) In which information assurance control must an organization ensure individual information system user actions can be traced to the user?

Explanation

In order to trace individual information system user actions back to the user, an organization must implement controls related to audit and accountability. This control ensures that all user activities are logged and monitored, allowing for the identification of specific users responsible for certain actions. By implementing effective audit and accountability measures, organizations can enhance their ability to detect and investigate security incidents, as well as hold individuals accountable for their actions within the information system.

Submit
20. 54. (223) When you are performing courier duties and transporting bulky communication security (COMSEC) material through the airlines, when is it acceptable to leave the COMSEC material unattended?

Explanation

It is never acceptable to leave COMSEC material unattended when performing courier duties and transporting it through airlines. This is because COMSEC material is highly sensitive and classified, and leaving it unattended poses a significant security risk. It must be constantly monitored and protected to prevent unauthorized access or theft. Therefore, under no circumstances should COMSEC material be left unattended.

Submit
21. 14. (006) The sequence of leading bits in an internet protocol (IP) that are used to identify the network portion of an IP address is called a

Explanation

The sequence of leading bits in an IP address that identifies the network portion is called a routing prefix. This prefix is used in routing tables to determine the appropriate network for forwarding packets. It helps in efficiently routing traffic to the correct destination by identifying the network segment of the IP address. The routing prefix is an essential component in the IP addressing scheme and plays a crucial role in the functioning of IP networks.

Submit
22. 16. (007) Which transmission control protocol (TCP) port is used by hypertext transfer protocol (HTTP) by default?

Explanation

The correct answer is b. 80. The hypertext transfer protocol (HTTP) uses TCP port 80 by default. TCP port 80 is the standard port for serving HTTP traffic on the internet. When a client sends an HTTP request to a server, it will typically connect to port 80 on the server's IP address. This allows the server to receive and process the HTTP request and send back the corresponding HTTP response.

Submit
23. 17. (007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a transmission control protocol/internet protocol (TCP/IP) based network?

Explanation

The Dynamic Host Configuration Protocol (DHCP) is an IETF standard designed to reduce the administration burden and complexity of configuring hosts on a TCP/IP based network. DHCP allows network administrators to centrally manage and automate the process of assigning IP addresses, subnet masks, default gateways, and other network configuration parameters to hosts on a network. This eliminates the need for manual configuration of each individual host and simplifies the network administration process.

Submit
24. 19. (008) Which port range constitutes well-known ports?

Explanation

The well-known ports are the port numbers ranging from 0 to 1023. These ports are assigned by the Internet Assigned Numbers Authority (IANA) and are commonly used for specific protocols and services such as HTTP (port 80), FTP (port 21), and SSH (port 22). These ports are considered "well-known" because they are widely recognized and used by many applications and operating systems.

Submit
25. 86. (031) What is the minimum rank the AF Information Network (AFIN) connection approval can be delegated to?

Explanation

The minimum rank that the AF Information Network (AFIN) connection approval can be delegated to is a Colonel (O-6). This means that a Colonel has the authority to approve AFIN connections without needing higher-level authorization.

Submit
26. 90. (033) Which of the following is not a phase in the information technology (IT) Lean reengineering process?

Explanation

The question is asking for a phase that is not part of the information technology (IT) Lean reengineering process. The correct answer is d. Define need review. This phase is not typically included in the IT Lean reengineering process, which typically includes phases such as design, define need, and build and test. The define need review phase may be a separate step in other processes, but it is not specifically mentioned as part of the IT Lean reengineering process.

Submit
27. 21. (008) Which port is used for hypertext transfer protocol (HTTP)?

Explanation

Port 80 is used for hypertext transfer protocol (HTTP). HTTP is the protocol used for transmitting and receiving information on the World Wide Web. When a user enters a website address in their browser, the browser sends an HTTP request to the server hosting the website on port 80. The server then responds with the requested web page, which is displayed in the user's browser. Port 80 is the default port for HTTP, although it can be changed if necessary.

Submit
28. 23. (008) Which type of scan is also known as a half open scan?

Explanation

A half open scan, also known as a SYN scan, is a type of scan that sends a SYN packet to a target port. This scan is considered "half open" because it does not complete the full TCP handshake. Instead, it waits for a response from the target. If the target responds with a SYN-ACK packet, it means the port is open. If the target responds with a RST packet, it means the port is closed. This type of scan is commonly used for reconnaissance and vulnerability assessment purposes.

Submit
29. 30. (011) What is the newest WiFi networking standard that is widely available?

Explanation

The newest WiFi networking standard that is widely available is 802.11n. This standard offers faster speeds and better range compared to previous standards such as 802.11a, 802.11b, and 802.11g. It also supports multiple-input multiple-output (MIMO) technology, which allows for improved performance in crowded environments with multiple devices connected to the network. 802.11n is backward compatible with older WiFi standards, making it compatible with a wide range of devices.

Submit
30. 6. (202) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?

Explanation

The National Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users. This indicates that the NSA has specific requirements and standards for the training and certification of individuals using the LMD/KP platform. The other options, such as the Federal Aviation Administration (FAA), Cryptologic Systems Division (CPSD), and Major command (MAJCOM), are not mentioned as having this requirement.

Submit
31. 8. (203) Who assists the communications security account manager (CAM) in his or her day-to-day duties?

Explanation

The communications security account manager (CAM) is responsible for managing the communications security program. The CAM ensures that all communications systems and equipment are properly secured and that all personnel are trained in communications security procedures. The CAM is assisted in their day-to-day duties by a communications security accountant, who helps with financial management and budgeting for the program. The communications security accountant helps the CAM track expenses and ensure that funds are allocated appropriately for the program's needs.

Submit
32. 37. (014) The definition of integrity as it's applied to identification, authentication, and encryption is

Explanation

The correct answer is d. the assurance that no one has changed or destroyed information without permission. This answer accurately describes the concept of integrity in the context of identification, authentication, and encryption. Integrity ensures that information remains unchanged and unaltered, providing assurance that unauthorized modifications or destruction have not occurred.

Submit
33. 11. (205) Who performs the semiannual inspections and audits on the base communications security (COMSEC) account?

Explanation

The correct answer is b. Communications security account manager (CAM). The CAM is responsible for performing semiannual inspections and audits on the base communications security (COMSEC) account. They ensure that proper procedures are followed, equipment is properly maintained, and any discrepancies or vulnerabilities are addressed. The CAM plays a crucial role in maintaining the security of the COMSEC account and ensuring that it is in compliance with regulations and guidelines.

Submit
34. 38. (014) Logon and password management screens must be encrypted with at least what type of secure socket layer?

Explanation

Logon and password management screens must be encrypted to ensure the security of user credentials. Encryption with a 128-bit secure socket layer provides a strong level of security, making it difficult for unauthorized individuals to intercept and decipher the transmitted data. A higher bit encryption, such as 256-bit, would offer even stronger security, but 128-bit encryption is commonly used and considered sufficient for most applications. Therefore, the correct answer is c. 128-bit.

Submit
35. 39. (014) Which common access card (CAC) certificate would be used to sign an enlisted performance report (EPR)?

Explanation

The correct answer is "d. Identification" because when signing an enlisted performance report (EPR) with a common access card (CAC) certificate, the identification certificate is used. This certificate is used to verify the identity of the individual signing the document. The other options, such as digital, biometric, and encryption certificates, do not specifically pertain to the purpose of signing an EPR.

Submit
36. 40. (014) What does the common access card (CAC) certificate used to sign e-mail provide?

Explanation

The common access card (CAC) certificate used to sign e-mail provides non-repudiation. Non-repudiation means that the sender of the e-mail cannot deny sending it, as the CAC certificate ensures that the message is digitally signed and authenticated. This provides evidence of the sender's identity and prevents them from later claiming that they did not send the email.

Submit
37. 41. (014) The contract manager must use what agency to validate a contractor employee's need to obtain a government public key infrastructure (PKI) certificate?

Explanation

The correct answer is d. Local Registration Authority/Trusted Agent (LRA/TA). The contract manager must use the LRA/TA to validate a contractor employee's need to obtain a government public key infrastructure (PKI) certificate. The LRA/TA is responsible for verifying the identity and need of individuals requesting PKI certificates within a specific organization or agency. They ensure that only authorized individuals have access to PKI certificates, which are used for secure communication and authentication purposes.

Submit
38. 71. (233) Who provides formal classroom training to instruct aircrews on how to establish and maintain communications?

Explanation

Combat Crew Communications (CCC) technicians provide formal classroom training to instruct aircrews on how to establish and maintain communications. They are responsible for ensuring that aircrews are trained on the proper use of communication equipment and protocols to ensure effective communication during missions. This includes training on radio procedures, encryption devices, and other communication systems. The CCC technician plays a crucial role in ensuring that aircrews are prepared and knowledgeable in communication procedures to support mission success.

Submit
39. 43. (219) Who requests disposition instructions for communications security (COMSEC) material?

Explanation

The correct answer is c. Communications security account manager (CAM). The CAM is responsible for managing and overseeing the distribution and disposition of COMSEC material. They are the point of contact for requesting instructions on how to properly handle and dispose of COMSEC material. The unit commander may have some authority over the material, but the CAM is specifically designated to handle these responsibilities. The COMSEC material user and the CAP administrator may have some involvement in the process, but they are not the primary individuals responsible for requesting disposition instructions.

Submit
40. 44. (219) Who may destroy communications security (COMSEC) material?

Explanation

The correct answer is a. Communications security account manager (CAM) or any responsible person on the COMSEC access list. This means that the CAM, who is responsible for managing the communications security, has the authority to destroy the COMSEC material. Additionally, any person who is listed on the COMSEC access list and is deemed responsible can also destroy the material. This ensures that only authorized individuals with the necessary knowledge and expertise can handle and dispose of the sensitive COMSEC material.

Submit
41. 42. (015) Which of the following represents a strong password?

Explanation

The password "GwL18!np*Z&fB3q" represents a strong password because it includes a combination of uppercase and lowercase letters, numbers, and special characters. This combination makes it more difficult for hackers to guess or crack the password. Additionally, the password is of sufficient length, which adds to its strength.

Submit
42. 48. (220) Sign the communication security (COMSEC) material destruction record

Explanation

The correct answer is a. immediately after the material is destroyed. This means that the communication security (COMSEC) material destruction record should be signed right after the material has been destroyed. This ensures that the record accurately reflects the destruction process and prevents any potential discrepancies or errors in the documentation. By signing immediately after destruction, it also helps maintain accountability and security of the destroyed material.

Submit
43. 50. (221) Two-person integrity (TPI) is the storage and handling system that prohibits access by any single person to what classification of communications security (COMSEC) material?

Explanation

Two-person integrity (TPI) is a storage and handling system that ensures that access to classified communications security (COMSEC) material is prohibited for any single person. This means that only when two authorized individuals are present, access to the material is allowed. The classification of COMSEC material that TPI applies to is Top Secret (TS), as stated in the answer.

Submit
44. 78. (235) What comm kit type do you build for emergency war orders (EWO)?

Explanation

The correct answer is d. 4. The question is asking about the communication kit type that is built for emergency war orders (EWO). The answer choice d. 4 implies that the communication kit type 4 is the one that is built for EWO. However, without further information or context, it is difficult to provide a specific explanation for why this answer is correct.

Submit
45. 48. (018) Which UNIX command allows remote logins?

Explanation

The correct answer is b. telnet. Telnet is a UNIX command that allows remote logins. It is used to establish a remote connection to another computer over a network. With telnet, users can log in to a remote system and access its resources and services as if they were physically present at the remote location. Telnet is commonly used for remote administration, troubleshooting, and accessing remote servers. Other options such as rsh, finger, and FTP do not specifically allow remote logins like telnet does.

Submit
46. 79. (235) Comm kits are normally contained in

Explanation

Comm kits, or communication kits, are typically stored in 3-ring binders. This is because 3-ring binders provide a secure and organized way to store various communication materials such as documents, forms, and notes. The rings in the binder allow for easy insertion and removal of pages, making it convenient to update and maintain the contents of the kit. Additionally, the binder format allows for easy flipping through the pages, making it efficient for accessing the necessary communication materials when needed.

Submit
47. 49. (018) When vulnerabilities are discovered within the Windows operating system and other products, Microsoft releases

Explanation

When vulnerabilities are discovered within the Windows operating system and other products, Microsoft releases bulletins. Bulletins are official documents or notifications that provide information about the vulnerabilities, their impact, and any available patches or updates to fix them. These bulletins are important for users to stay informed about potential security risks and take necessary actions to protect their systems.

Submit
48. 51. (019) A program that contains or installs a malicious program is called a

Explanation

A Trojan horse is a program that appears to be harmless or useful, but actually contains or installs a malicious program. Unlike a boot sector virus, worm program, or macro virus, a Trojan horse does not replicate itself or infect other files or systems. Instead, it tricks users into executing it, often by disguising itself as a legitimate program or by exploiting vulnerabilities in software. Once executed, the Trojan horse can perform a variety of malicious activities, such as stealing sensitive information, damaging files, or allowing unauthorized access to the system.

Submit
49. 52. (019) The two fundamental concepts of network security are

Explanation

The two fundamental concepts of network security are authentication and authorization. Authentication refers to the process of verifying the identity of a user or device trying to access a network, ensuring that they are who they claim to be. Authorization, on the other hand, involves granting or denying access to specific resources or actions based on the authenticated user's privileges and permissions. These two concepts work together to ensure that only authorized individuals or devices can access the network and its resources, enhancing security and protecting against unauthorized access or data breaches.

Submit
50. 84. (236) What type of change notice is not scheduled and is only published as required to provide amendments for safety and flight information?

Explanation

An urgent change notice is not scheduled and is only published as required to provide amendments for safety and flight information. This type of change notice is issued when there is an immediate need to communicate important information that could affect the safety of flights. It is typically used for time-sensitive updates that cannot wait for the next scheduled change notice.

Submit
51. 57. (022) Continuity of operations plans (COOP) are not used in which of the following situations?

Explanation

Continuity of operations plans (COOP) are designed to ensure that essential functions can continue during and after a disruption or emergency. They are typically used in situations such as accidents, man-made disasters, and health-related incidents where there is a need to maintain critical operations. However, COOP plans are not specifically used for addressing operating system failures, as these can typically be resolved through technical support and system backups.

Submit
52. 1. (001) Which of the following is a duty performed by a cyber surety journeyman?

Explanation

A cyber surety journeyman is responsible for performing detection activities, including real-time intrusion detection and firewall protection. This means that they are tasked with monitoring computer systems and networks for any unauthorized access or malicious activities. They are also responsible for ensuring that firewall protection is in place to prevent unauthorized access and protect sensitive information. This duty is crucial in maintaining the security and integrity of computer systems and networks, and preventing cyber threats and attacks.

Submit
53. 59. (024) What is the minimum grade requirement for an information assurance assessment and assistance program (IAAP) team chief?

Explanation

The minimum grade requirement for an information assurance assessment and assistance program (IAAP) team chief is a SNCO (Senior Non-commissioned Officer). This means that the individual must hold a rank of E-7 or above in the military or an equivalent position in a civilian organization. This level of rank and experience is necessary to effectively lead and manage the IAAP team and ensure the successful execution of their duties.

Submit
54. 63. (025) Where are thermal transfer and dye sublimation cartridges sent for sanitization?

Explanation

not-available-via-ai

Submit
55. 73. (027) An installation commander can authorize keeping which classification types on the flight line for in-transit storage?

Explanation

An installation commander can authorize keeping confidential and secret classification types on the flight line for in-transit storage. This means that any materials or documents that are classified as confidential or secret can be stored on the flight line with the commander's approval. Other classification types, such as top secret, may have stricter regulations and may not be authorized for storage on the flight line.

Submit
56. 79. (029) An emission security (EMSEC) manager documents an EMSEC assessment on

Explanation

The correct answer is a. AF Form 4170. The AF Form 4170 is used by the emission security (EMSEC) manager to document an EMSEC assessment. This form is specifically designed for this purpose and includes all the necessary fields and sections to record the assessment findings and recommendations. The other options, AF Form 6170, Standard Form 700, and Standard Form 701, are not specifically designed for EMSEC assessments and do not have the appropriate sections to document this type of assessment.

Submit
57. 52. (222) How many people must unwrap the inner wrapper of a top secret (TS) crypto package?

Explanation

In order to unwrap the inner wrapper of a top secret (TS) crypto package, two people must be involved. This suggests that there is a security protocol in place where two individuals are required to ensure accountability and minimize the risk of unauthorized access to the package. It also implies that the contents of the package are highly sensitive and require dual verification for handling and unwrapping.

Submit
58. 12. (006) Which class of internet protocol (IP) addresses is only used for experimental purposes?

Explanation

Class E IP addresses are reserved for experimental purposes and are not used for normal network operations. These addresses range from 240.0.0.0 to 255.255.255.255 and are not assigned to any specific organization or location. They are meant for research, development, and testing purposes, and should not be used in production networks.

Submit
59. 56. (224) Which method is not used to complete a bulk encrypted transaction (BET)?

Explanation

The Defense Courier Service (DCS) is not used to complete a bulk encrypted transaction (BET). The other options listed - X.400, floppy disk, and direct communications - are all methods that can be used to complete a BET. However, the DCS is a physical courier service that is typically used for transporting classified or sensitive materials, rather than completing encrypted transactions electronically.

Submit
60. 15. (007) Which protocol does the Internet support as the "language" computers use to find and connect with each other?

Explanation

The internet supports the Transmission Control Protocol/Internet Protocol (TCP/IP) as the "language" computers use to find and connect with each other. TCP/IP is a set of protocols that allows for reliable and secure communication between devices on the internet. It provides a standardized method for breaking data into packets, routing them across networks, and reassembling them at the destination. TCP/IP is the foundation of the internet and is used for various applications such as web browsing, email, file transfer, and more.

Submit
61. 18. (008) A logical connection point for the transmission of information packets is known as

Explanation

A logical connection point for the transmission of information packets is known as a port. A port is a specific endpoint of communication in an operating system or network. It allows different applications or devices to send and receive data. Ports are identified by numbers and are used to establish connections between devices or services.

Submit
62. 59. (226) The simple key loader (SKL) is the replacement for which device?

Explanation

The simple key loader (SKL) is the replacement for the data transfer device (DTD). The SKL is a portable electronic device that is used to load cryptographic keys into various communication systems and encryption devices. It is designed to securely transfer keying material between different secure communication devices, eliminating the need for manual keying and reducing the risk of human error. The DTD, on the other hand, was an older device used for similar purposes but has been replaced by the more advanced and efficient SKL.

Submit
63. 20. (008) Which port is used for telnet?

Explanation

Telnet is a protocol used for remote login and command execution on a remote computer. It operates on port 23 by default. Therefore, the correct answer is c. 23.

Submit
64. 22. (008) In which type of port scan does the scanner connect to the same port on more than one machine?

Explanation

A sweep scan is a type of port scan where the scanner connects to the same port on multiple machines. This allows the scanner to quickly scan a range of IP addresses and identify any open ports. This type of scan is commonly used by attackers to identify potential vulnerable systems for further exploitation.

Submit
65. 28. (010) Administrators must be in the habit of doing what to make it possible for replacement administrators to accomplish the same tasks as their predecessors?

Explanation

To ensure that replacement administrators can accomplish the same tasks as their predecessors, it is important for administrators to keep complete and accurate documentation for all configuration changes. This documentation serves as a reference for the new administrators, providing them with the necessary information about the network's configurations and settings. By having access to this documentation, the replacement administrators can easily understand and replicate the previous configurations, minimizing disruptions and ensuring continuity throughout the network.

Submit
66. 29. (011) Which is the slowest yet least expensive WiFi standard?

Explanation

The slowest yet least expensive WiFi standard is 802.11b. This standard operates on the 2.4 GHz frequency band and has a maximum data transfer rate of 11 Mbps. While it is slower compared to other WiFi standards, it is still widely used in older devices due to its affordability.

Submit
67. 32. (012) Defense-in-depth is the Department of Defense (DOD) approach for establishing

Explanation

Defense-in-depth is a strategy used by the Department of Defense (DOD) to establish an adequate information assurance (IA) posture in a shared-risk environment. This approach involves implementing multiple layers of security controls to protect critical information and systems. By using a layered approach, the DOD can ensure that even if one layer of defense is breached, there are additional layers in place to prevent further unauthorized access or damage. This helps to mitigate the risks associated with a shared-risk environment, where multiple users or entities have access to the same resources.

Submit
68. 34. (013) Which of the following is not a result of initial information assurance (IA) awareness training for all network users?

Explanation

The correct answer is c. Users have met investigative requirements. This is not a result of initial information assurance (IA) awareness training for all network users. IA awareness training focuses on educating users about their role in IA and training them on network security. It does not involve meeting investigative requirements, which are typically related to conducting investigations or gathering evidence.

Submit
69. 34. (215) The rank requirement for an inquiry officer includes all of these except

Explanation

The rank requirement for an inquiry officer includes a Captain, Master Sergeant, and GS-9. However, a Technical Sergeant is not included in the rank requirement.

Submit
70. 35. (215) Who completes an initial report for each communications security (COMSEC) incident?

Explanation

The initial report for each communications security (COMSEC) incident is completed by the Communications Security Account Manager (CAM). The CAM is responsible for managing and overseeing the COMSEC program, including reporting and responding to any incidents. They are knowledgeable about the procedures and protocols related to COMSEC and are the appropriate person to document and report on any incidents that occur.

Submit
71. 38. (217) When you create a communication security physical inventory (CPI), you will need to include all of the following information except

Explanation

When creating a communication security physical inventory (CPI), you will need to include the edition, quantity, and short title of the items. However, the accounting legend code (ALC) is not necessary to include in the CPI.

Submit
72. 39. (217) When you are sealing a package containing communications security (COMSEC) material where do you place your initials?

Explanation

When sealing a package containing communications security (COMSEC) material, it is important to place your initials across the seal. This ensures that any tampering or unauthorized access to the package can be easily detected, as the seal will be broken if someone attempts to open it. Placing the initials across the seal also serves as a clear indication that the package has been securely sealed by the authorized person.

Submit
73. 73. (234) Combat Crew Communications (CCC) Level 2 certification ensures personnel are qualified to support

Explanation

The correct answer is d. nuclear missions. The Combat Crew Communications (CCC) Level 2 certification ensures that personnel are qualified to support nuclear missions. This certification indicates that individuals have the necessary skills and knowledge to effectively communicate and coordinate during nuclear operations. It is important for personnel involved in nuclear missions to have specialized training and certification to ensure the safety and success of these critical operations.

Submit
74. 47. (220) What form serves as the destruction certificate for communication security (COMSEC) material?

Explanation

The correct answer is a. Standard Form (SF) 153. The SF 153 form serves as the destruction certificate for communication security (COMSEC) material. This form is used to document the destruction of COMSEC material and to ensure accountability and proper disposal of sensitive information. It is a standard form that is widely recognized and used across various organizations and agencies.

Submit
75. 83. (236) Flight Information Handbooks (FIH) are issued every

Explanation

Flight Information Handbooks (FIH) are issued every 32 weeks. This means that a new edition of the FIH is released every 32 weeks to provide updated information on flight procedures, regulations, and other relevant information for pilots and aviation personnel. This regular issuance ensures that pilots have access to the most current and accurate information to ensure safe and efficient flight operations.

Submit
76. 85. (236) Which squadron commander must be notified before outdated Flight Information Publications (FLIP) information is issued?

Explanation

The squadron commander that must be notified before outdated Flight Information Publications (FLIP) information is issued is the Operations support. This is because Operations support is responsible for coordinating and managing the operational aspects of the squadron, including ensuring that all flight information is up to date and accurate. They would need to be notified of any outdated FLIP information so that they can take appropriate action to update and distribute the correct information to the squadron.

Submit
77. 24. (210) How often should communications security (COMSEC) access lists be reviewed for accuracy?

Explanation

COMSEC access lists should be reviewed for accuracy on a monthly basis. This frequency allows for regular monitoring and updating of the lists to ensure that only authorized individuals have access to sensitive communications. Reviewing the lists monthly helps to identify any unauthorized access or potential security breaches in a timely manner, allowing for prompt action to be taken to mitigate any risks.

Submit
78. 27. (212) What is the term used to identify the highest level of security lapse in handling communications security (COMSEC)?

Explanation

The term used to identify the highest level of security lapse in handling communications security (COMSEC) is COMSEC insecurity. This term refers to a situation where there is a significant breach or vulnerability in the security measures put in place to protect communication systems and information. It indicates a serious failure in maintaining the confidentiality, integrity, and availability of sensitive data and can have severe consequences for national security and the protection of classified information.

Submit
79. 65. (025) How often must a degausser be recertified during its first 2 years of operation?

Explanation

A degausser is a device used to demagnetize electronic media, such as hard drives and tapes, to ensure data security. During the first 2 years of operation, it is recommended to recertify the degausser every 6 months. This regular recertification helps to ensure that the degausser is functioning properly and effectively erasing the data from the media. By recertifying every 6 months, any potential issues or malfunctions can be identified and addressed promptly, maintaining the security and reliability of the degausser.

Submit
80. 78. (029) Who is the installation's focal point for emission security (EMSEC) matters?

Explanation

The Wing Information Assurance Office (WIAO) is responsible for handling emission security (EMSEC) matters at the installation. EMSEC involves protecting sensitive information from being intercepted or compromised through electronic emissions. The WIAO is tasked with implementing measures to prevent unauthorized access to information and ensuring that proper security protocols are in place to safeguard against potential threats. As the focal point for EMSEC, the WIAO plays a crucial role in maintaining the security and integrity of the installation's communications and information systems.

Submit
81. 13. (006) Which internet protocol (IP) address is used for limited broadcasts?

Explanation

The IP address 255.255.255.255 is used for limited broadcasts. Limited broadcasts are used to send a message to all devices on the local network. This type of broadcast is restricted to the local network and is not forwarded by routers. The IP address 255.255.255.255 is reserved for this purpose and is used to send a message to all devices on the network.

Submit
82. 32. (215) Report communications security (COMSEC) deviations and incidents immediately to all of these personnel except

Explanation

The correct answer is a. security manager. The security manager is responsible for overseeing overall security measures and protocols within an organization, including communications security (COMSEC). Therefore, it is important to report COMSEC deviations and incidents to the security manager. However, the other options, such as the commander, CAM, and CRO, are directly involved in COMSEC and should be informed immediately about any deviations or incidents.

Submit
83. 25. (009) How is an Internet protocol version 6 (IPv6) address written?

Explanation

An Internet protocol version 6 (IPv6) address is written with eight groups of four hexadecimal numbers, separated by colons. This format is used to represent the 128-bit address space of IPv6, allowing for a larger number of unique addresses compared to IPv4. The use of hexadecimal numbers and colons makes the address easier to read and understand. The correct answer is a.

Submit
84. 26. (009) Which type of transition technology is used to set up secure point-to-point communication?

Explanation

Tunneling is the type of transition technology used to set up secure point-to-point communication. Tunneling encapsulates one network protocol within another, allowing data to be transmitted securely over an insecure network. It creates a "tunnel" through which data can pass, protecting it from unauthorized access or tampering. This method is commonly used in virtual private networks (VPNs) to establish secure connections between remote networks or devices. Dual layer, dual stack, and peer-to-peer are not specifically related to secure point-to-point communication.

Submit
85. 31. (011) Which wireless standard was originally intended to create a wireless security platform that would perform as securely as a traditional wired network by providing data encryption?

Explanation

Wired equivalency privacy (WEP) was originally intended to create a wireless security platform that would perform as securely as a traditional wired network by providing data encryption. WEP was the first wireless security protocol used to secure wireless networks, but it is now considered to be weak and easily compromised.

Submit
86. 4. (201) Who assists the communications security account manager (CAM) with day-to-day administration and maintenance of accounting records for communications security (COMSEC) material?

Explanation

The COMSEC accountant assists the communications security account manager (CAM) with the day-to-day administration and maintenance of accounting records for communications security (COMSEC) material. This individual is responsible for managing the financial aspects of COMSEC operations, including budgeting, financial reporting, and ensuring compliance with accounting procedures and regulations. They work closely with the CAM to ensure that all financial transactions related to COMSEC material are properly recorded and accounted for. The other options, such as the LCMS administrator, CRO, and controlling authorities, may have different roles and responsibilities but do not specifically pertain to the accounting functions of COMSEC material.

Submit
87. 9. (204) Wing information assurance (IA) assessments are generally conducted every

Explanation

Wing information assurance (IA) assessments are conducted periodically to ensure the security and effectiveness of the wing's information systems. Conducting assessments every two years strikes a balance between maintaining a regular evaluation of the IA measures in place and minimizing disruptions to daily operations. This interval allows for the identification of potential vulnerabilities and the implementation of necessary security measures while also allowing sufficient time for the wing to address any issues that may arise.

Submit
88. 65. (229) On the back of the KOK–22A, which interface allows you to connect the serial input/output (I/O) port of the key processor (KP) to the serial I/O port of the controlling computer?

Explanation

The correct answer is c. RS-232 connector. The RS-232 connector is a standard interface that allows for serial communication between devices. In this case, it allows for the connection between the serial I/O port of the key processor (KP) and the serial I/O port of the controlling computer. The RS-232 connector is commonly used for connecting devices such as modems, printers, and computer terminals.

Submit
89. 41. (218) Changes that must be made to material in communication security (COMSEC) publications are called

Explanation

Amendments refer to the changes that need to be made to material in communication security (COMSEC) publications. This term is commonly used to describe alterations or revisions made to existing documents or publications. Amendments are typically made to ensure that the information remains accurate, up-to-date, and relevant. Therefore, option b. amendments is the correct answer.

Submit
90. 42. (218) How many people are required to complete page replacements in unclassified communication security (COMSEC) publications?

Explanation

In unclassified communication security (COMSEC) publications, only one person is required to complete page replacements. This suggests that the task is not complex or time-consuming, and can be easily handled by a single individual. The absence of a need for collaboration or multiple people implies that the process is straightforward and does not require extensive coordination or input from others.

Submit
91. 72. (233) What squadron are Combat Crew Communications (CCC) units assigned to?

Explanation

Combat Crew Communications (CCC) units are assigned to Operations support. This means that they are responsible for providing communication support to combat crews during missions. They work closely with the operations team to ensure smooth and effective communication between crew members, enhancing their ability to carry out their missions successfully.

Submit
92. 74. (234) Once entered into Combat Crew Communications (CCC) Level 1 certification training, how long does an active duty technician have to complete certification?

Explanation

Active duty technicians have 6 months to complete their Combat Crew Communications (CCC) Level 1 certification training. This means that they have half a year to finish the required training and meet the certification requirements.

Submit
93. 13. (206) Qualified personnel perform preventative maintenance and security inspections on safes and vaults every

Explanation

Qualified personnel perform preventative maintenance and security inspections on safes every five years and on vaults every two years. This ensures that both safes and vaults are regularly checked for any issues or vulnerabilities that could compromise their security. By having a shorter interval for vault inspections, any potential risks or weaknesses can be identified and addressed more frequently, reducing the chances of a security breach. The longer interval for safe inspections recognizes that safes are generally more secure and have fewer vulnerabilities compared to vaults.

Submit
94. 43. (016) Which category of information must be stored on removable media?

Explanation

Classified information must be stored on removable media because it needs to be protected and controlled. Removable media allows for easier transport and storage of classified information, while also providing the ability to physically secure and restrict access to the media. Storing classified information on removable media helps to prevent unauthorized access and potential compromise of sensitive information.

Submit
95. 55. (224) How many times do you wrap communications security (COMSEC) material prior to transportation?

Explanation

When transporting communications security (COMSEC) material, it is necessary to wrap it twice. This double wrapping provides an extra layer of protection and ensures that the material is secure during transportation. Wrapping the material twice helps to prevent any unauthorized access or tampering with the sensitive information.

Submit
96. 60. (227) What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?

Explanation

The local management device (LMD) is designed to support and process Secret classification of communication security (COMSEC) material. This means that the LMD is specifically intended to handle and manage sensitive information that is classified as Secret, ensuring its secure transmission and storage.

Submit
97. 64. (229) The front of the KOK–22A device fill connector allows interface with which type of file devices?

Explanation

The front of the KOK-22A device fill connector allows interface with DS-101 and DS-102 type of fill devices. This means that the KOK-22A device can be connected to and communicate with both DS-101 and DS-102 devices for file transfer or data exchange.

Submit
98. 75. (234) Which code helps the Air Force identify special experience and training?

Explanation

Special experience identifiers (SEI) is the code that helps the Air Force identify special experience and training. This code is used to distinguish individuals who have acquired specific skills or knowledge through additional training or experience. The SEI allows the Air Force to recognize and utilize the expertise of its personnel in specific areas, enhancing operational effectiveness and efficiency. The other options mentioned, such as Air Force specialty code (AFSC), Air Force career experience level code, and commercial vendor certification identifier, are not specifically related to identifying special experience and training.

Submit
99. 45. (017) Which device provides the initial entry point into a network?

Explanation

A network access server (NAS) is a device that provides the initial entry point into a network. It is responsible for authenticating and authorizing users, as well as providing them with access to the network. A router is a device that forwards data packets between networks, a firewall is a security device that monitors and controls incoming and outgoing network traffic, and a proxy server is a server that acts as an intermediary between clients and servers. None of these devices specifically serve as the initial entry point into a network like a NAS does.

Submit
100. 81. (236) Flight Information Publications (FLIP) are divided into how many geographical regions?

Explanation

Flight Information Publications (FLIP) are divided into 8 geographical regions. This division allows for efficient and organized dissemination of flight information to pilots and other aviation personnel. Each region corresponds to a specific area of the world and contains relevant information such as charts, maps, and procedures for that particular region. This regional division helps to ensure that pilots have access to accurate and up-to-date information that is specific to their intended flight route and destination.

Submit
101. 82. (236) Which documents are designed to provide aircrews with information on radio navigation, departure, airway structure, approach and landing information?

Explanation

Enroute and terminal documents are designed to provide aircrews with information on radio navigation, departure, airway structure, approach, and landing information. These documents contain important information such as charts, procedures, and communication frequencies that pilots need to navigate and land safely during their flight. Enroute documents provide information on radio navigation and airway structure for the entire flight, while terminal documents focus on departure, approach, and landing information specific to the arrival airport.

Submit
102. 50. (019) A companion file virus is one that

Explanation

A companion file virus is a type of virus that renames the original file and writes itself with the original file's name. This means that the virus disguises itself as the original file, making it difficult for users to detect and remove. By renaming the file and replacing it with the virus, the companion file virus can spread and infect other files without being easily detected. This method allows the virus to remain hidden and continue its malicious activities without raising suspicion.

Submit
103. 20. (209) Those not eligible to be enrolled in the cryptographic access program (CAP) are personnel

Explanation

The correct answer is c. with access to only Confidential cryptographic media. This means that individuals who only have access to Confidential cryptographic media are not eligible to be enrolled in the cryptographic access program (CAP). The CAP is likely a program that grants individuals access to higher levels of cryptographic materials or information. Therefore, those who only have access to Confidential cryptographic media do not meet the eligibility criteria for the CAP.

Submit
104. 70. (027) Who has the authority to impose restrictions upon and prohibit the use of government owned removable information systems storage media for classified systems or networks?

Explanation

Authorizing officials have the authority to impose restrictions upon and prohibit the use of government-owned removable information systems storage media for classified systems or networks. This means that these officials are responsible for determining who can access and use the storage media, as well as setting any limitations or restrictions on its use. They have the power to enforce security measures and ensure that classified information is protected.

Submit
105. 31. (214) What type of communications security (COMSEC) incident is any loss of control, theft, capture, recovery by salvage, tampering, unauthorized viewing, access, or photographing that has the potential to jeopardize COMSEC material?

Explanation

A physical communications security (COMSEC) incident refers to any situation where there is a loss of control, theft, capture, recovery by salvage, tampering, unauthorized viewing, access, or photographing of COMSEC material. This type of incident has the potential to jeopardize the security of the COMSEC material.

Submit
106. 71. (027) Which standard form (SF) is used to record the opening and closing of security containers?

Explanation

SF 702 is the correct answer because it is the standard form used to record the opening and closing of security containers.

Submit
107. 72. (027) Personnel removing top secret material from storage must use

Explanation

Personnel removing top secret material from storage must use an Air Force (AF) Form 144. This form is specifically designed for the purpose of documenting the removal of top secret material. It helps to ensure accountability and proper tracking of the material, as well as to maintain security protocols. The other options listed (SF 704, SF 705, and SF 706) are not specifically designed for this purpose and do not fulfill the requirements for removing top secret material.

Submit
108. 81. (030) How many steps are in the risk management framework process?

Explanation

The risk management framework process consists of six steps. These steps include: 1) Establishing the context, which involves defining the risk management scope and objectives; 2) Identifying risks, which involves identifying potential risks that could affect the achievement of objectives; 3) Analyzing risks, which involves assessing the likelihood and impact of identified risks; 4) Evaluating risks, which involves determining the significance of risks and prioritizing them for treatment; 5) Treating risks, which involves developing and implementing risk treatment plans; and 6) Monitoring and reviewing, which involves regularly monitoring and reviewing the effectiveness of risk treatments and the overall risk management process.

Submit
109. 58. (226) Which statement is not accurate regarding firefly credentials?

Explanation

Firefly credentials are temporary credentials that are used for key exchange in cryptographic systems. They have an expiration date, meaning they are only valid for a certain period of time. However, they do not have a set cryptoperiod. Cryptoperiod refers to the length of time that a cryptographic key remains secure before it needs to be changed. Since firefly credentials are temporary and used for key exchange, they do not have a fixed cryptoperiod.

Submit
110. 1. (201) What is a collection of interoperable systems developed for the services and government agencies to automate handling and management of communications security (COMSEC) material?

Explanation

An electronic key management system (EKMS) is a collection of interoperable systems developed for services and government agencies to automate the handling and management of communications security (COMSEC) material. This system is designed to securely generate, distribute, and manage cryptographic keys used for secure communication. It ensures that authorized users have access to the correct keys, while also providing accountability and auditing capabilities. The EKMS streamlines the process of managing COMSEC material, improving efficiency and security in handling sensitive information.

Submit
111. 27. (010) Networked resources must be consistently monitored and controlled to ensure access to the network while

Explanation

Networked resources must be consistently monitored and controlled to ensure access to the network while minimizing risks posed by various cyberspace threats. This means that by monitoring and controlling the network, organizations can identify and mitigate potential threats and vulnerabilities, reducing the risk of cyber attacks and unauthorized access to the network. This is crucial in maintaining the security and integrity of the network and protecting sensitive information from being compromised.

Submit
112. 36. (215) A communications security account manager (CAM) submits an amplifying report every how many days until the final report is submitted?

Explanation

The correct answer is c. 30. This means that the communications security account manager (CAM) submits an amplifying report every 30 days until the final report is submitted. This suggests that the CAM has a regular reporting schedule and that it takes 30 days to gather the necessary information and complete the report.

Submit
113. 66. (230) What is the classification of magnetic media used to transport encrypted key?

Explanation

The classification of magnetic media used to transport encrypted key is "Secret". This means that the information stored on the magnetic media is sensitive and should only be accessed by individuals with the appropriate security clearance.

Submit
114. 37. (216) When removing material from a communication security physical inventory (CPI), always annotate it by

Explanation

When removing material from a communication security physical inventory (CPI), it is important to document the action for record-keeping purposes. Writing a memorandum for record (MFR) serves as a formal written record of the removal, providing details such as the date, time, and reason for the removal. This helps maintain accountability and transparency in the inventory management process. Using red or green ink, or correction fluid, may not provide the necessary level of detail or formality required for proper documentation.

Submit
115. 40. (217) How often must a communications security account manager (CAM) review the communications security (COMSEC) physical inventory?

Explanation

A communications security account manager (CAM) is responsible for managing and maintaining the communications security (COMSEC) physical inventory. Reviewing the inventory once a month ensures that the CAM can regularly assess the status of the inventory, identify any discrepancies or issues, and take appropriate actions to maintain the security of the communication systems. This frequent review helps to prevent any potential security breaches or unauthorized access to sensitive information.

Submit
116. 18. (208) Which form do you use to record the arrival or departure of all personnel not named on the facility authorized access list?

Explanation

The correct answer is c. AF Form 1109. AF Form 1109 is used to record the arrival or departure of all personnel who are not listed on the facility authorized access list. This form helps to maintain a record of individuals who are accessing the facility, ensuring security and accountability. SF 701 and SF 702 are used for different purposes and AFTO Form 36 is not relevant to recording personnel arrivals or departures.

Submit
117. 22. (209) Who is responsible for overseeing the cryptographic access program (CAP) and providing written local procedures to the CAP administrator?

Explanation

The Communications Security Account Manager (CAM) is responsible for overseeing the Cryptographic Access Program (CAP) and providing written local procedures to the CAP administrator. The CAM is responsible for managing and maintaining the cryptographic key material, ensuring proper distribution and destruction, and overseeing the implementation of cryptographic security measures. They work closely with the CAP administrator to ensure compliance with regulations and guidelines regarding cryptographic access. The security manager, unit commander, and Communications Security Responsible Officer (CRO) may have other responsibilities related to security but are not specifically responsible for overseeing the CAP or providing written local procedures.

Submit
118. 25. (210) At the base level, who initials the communications security (COMSEC) access list?

Explanation

The correct answer is a. Communications security account manager (CAM). At the base level, the Communications security account manager (CAM) is responsible for initialing the communications security (COMSEC) access list. This individual is in charge of managing and overseeing the distribution and control of COMSEC materials within the organization. They ensure that only authorized personnel have access to sensitive information and equipment, and they play a crucial role in maintaining the security and integrity of communication systems. The CAM works closely with other security personnel and follows established protocols and procedures to protect classified information.

Submit
119. 80. (029) Once it is filled out an AF Form 4170, Emission Security Assessments/Emission Security Countermeasures, is considered

Explanation

The AF Form 4170, Emission Security Assessments/Emission Security Countermeasures, is considered confidential once it is filled out. This means that the information contained in the form is sensitive and should only be accessed and shared on a need-to-know basis. The classification level of "confidential" indicates that unauthorized disclosure of the information could cause damage to national security.

Submit
120. 80. (236) Which is not a flight phase that Flight Information Publications (FLIP) are aligned with?

Explanation

Flight Information Publications (FLIP) are aligned with the enroute, planning, and terminal flight phases. These publications provide essential information for pilots during these phases of flight, such as charts, navigation aids, and communication procedures. However, the approach phase is not included in FLIP as it focuses on the final portion of the flight when the aircraft is preparing to land at a specific airport. This phase typically has its own set of specialized approach charts and procedures that are not covered by FLIP.

Submit
121. 53. (020) An incident in which an unauthorized person gained user-level privileges on an Air Force computer, information system, or network device is considered category

Explanation

An incident in which an unauthorized person gains user-level privileges on an Air Force computer, information system, or network device is considered a category II incident. This means that the incident involves the unauthorized access or use of information systems or data, but does not result in any damage or compromise to the system or data. It is a serious incident that requires investigation and appropriate actions to prevent future occurrences.

Submit
122. 62. (025) When sanitizing sealed disks with a degausser, what percentage of the overwritten information should be randomly reread to confirm only the overwritten characters are recovered?

Explanation

When sanitizing sealed disks with a degausser, it is important to confirm that only the overwritten characters are recovered. To do this, a certain percentage of the overwritten information should be randomly reread. The correct answer is 1, which means that only 1% of the overwritten information should be randomly reread to confirm this. This ensures that the sanitization process is effective and that no sensitive data can be recovered from the disk.

Submit
123. 3. (002) How many steps are in the risk management (RM) process?

Explanation

The correct answer is b. 5. The risk management (RM) process consists of five steps. These steps include identifying risks, assessing risks, developing risk mitigation strategies, implementing risk mitigation strategies, and monitoring and reviewing the effectiveness of the strategies. Each step is crucial in effectively managing and minimizing risks within an organization or project.

Submit
124. 4. (002) What is the third step in the risk management (RM) process?

Explanation

The third step in the risk management process is to develop controls and make decisions. This step involves identifying potential risks and developing strategies to mitigate or eliminate them. It also includes making decisions on which controls to implement and how to allocate resources effectively. Supervising and evaluating the effectiveness of these controls comes later in the process.

Submit
125. 64. (025) How many times should you wipe each active surface of the media being degaussed when using a degaussing wand?

Explanation

When using a degaussing wand to degauss the media, it is recommended to wipe each active surface three times. This ensures that the magnetic information on the media is completely erased and cannot be recovered. Wiping the surface multiple times helps to ensure that all areas of the media are thoroughly degaussed, leaving no traces of data behind.

Submit
126. 68. (026) When overwriting hard drives, you must examine no less than what percentage of all overwritten hard drives to verify the overwriting process?

Explanation

To verify the overwriting process when overwriting hard drives, it is necessary to examine no less than 20% of all overwritten hard drives. This means that out of all the hard drives that have been overwritten, at least 20% of them should be checked to ensure that the overwriting process was successful and no data remains on the drives. This is an important step in data security and ensures that sensitive information cannot be recovered from the hard drives.

Submit
127. 69. (027) Which standard form (SF) label is used as a data descriptor label?

Explanation

The correct answer is SF 711 because SF 711 is used as a data descriptor label in standard form.

Submit
128. 76. (028) Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100 meters is considered to be in equipment zone

Explanation

Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100 meters is considered to be in the equipment zone. This means that the equipment is within the range where it can potentially emit electromagnetic radiation that can be intercepted and exploited by an attacker. It is important to be aware of this zone and take necessary precautions to protect sensitive information and prevent unauthorized access to the equipment.

Submit
129. 77. (029) What type of equipment is used for acquisition, storage and manipulation of voice and data?

Explanation

The correct answer is "d. Information technology equipment." This type of equipment is used for acquisition, storage, and manipulation of voice and data. It includes devices such as computers, servers, routers, and switches that are used to process and transmit information electronically. System equipment refers to the overall system used in an organization, cryptographic equipment is used for encrypting and decrypting data, and communications equipment is used for transmitting and receiving data. Therefore, the most appropriate answer is information technology equipment.

Submit
130. 82. (030) What type of impact occurs when the loss of confidentiality, integrity, and availability (CIA) could be expected to have a serious adverse effect on organizational operations, organizational assets, or people?

Explanation

When the loss of confidentiality, integrity, and availability (CIA) could have a serious adverse effect on organizational operations, assets, or people, it is considered a moderate impact. This means that the impact is significant, but not to the extreme level where it would cause irreparable damage or complete disruption. It suggests that there would be noticeable negative consequences, but they can still be managed and mitigated to some extent.

Submit
131. 11. (006) How many bits are within an internet protocol version 4 (IPv4) address?

Explanation

An internet protocol version 4 (IPv4) address is made up of 32 bits. This means that there are 32 binary digits that make up an IPv4 address. Each bit can be either a 0 or a 1, allowing for a total of 2^32 (or approximately 4.3 billion) unique addresses within the IPv4 address space.

Submit
132. 57. (225) What local communications security management software (LCMS) desktop function provides a user with the ability to securely pass information and/or transfer Electronic Key Management System (EKMS) messages/keys directly to other EKMS accounts?

Explanation

The correct answer is d. Direct Comms. Direct Comms is a local communications security management software (LCMS) desktop function that allows users to securely pass information and transfer Electronic Key Management System (EKMS) messages/keys directly to other EKMS accounts. This function ensures that the information and keys are transmitted securely and only accessible to authorized users.

Submit
133. 84. (030) How many steps are in the system development life cycle?

Explanation

The system development life cycle (SDLC) is a process used to develop and maintain information systems. It typically consists of five steps: requirements gathering and analysis, system design, implementation, testing, and maintenance. Each step is crucial in ensuring that the system is developed and maintained effectively. Therefore, the correct answer is b. 5.

Submit
134. 2. (201) What allows one electronic key management system (EKMS) element to pass required information to another EKMS element enabling both elements to generate the same key session?

Explanation

Firefly credentials allow one electronic key management system (EKMS) element to pass required information to another EKMS element enabling both elements to generate the same key session. This means that the Firefly credentials provide the necessary authorization and authentication for the EKMS elements to securely exchange information and generate the same key session.

Submit
135. 33. (012) What is assigned to all Department of Defense (DOD) information systems that is directly associated with the importance of the information contained relative to achieving DOD goals and objectives?

Explanation

The correct answer is d. Mission assurance category. The mission assurance category is assigned to all Department of Defense (DOD) information systems based on the importance of the information contained in them relative to achieving DOD goals and objectives. This category helps in determining the level of protection and security measures that need to be implemented for the information system. It ensures that the appropriate level of security controls are in place to protect the information and support the mission of the DOD.

Submit
136. 10. (204) When a unit receives an unsatisfactory rating on a communications security (COMSEC) inspection, the wing will reassess the unit within how many days?

Explanation

When a unit receives an unsatisfactory rating on a communications security (COMSEC) inspection, the wing will reassess the unit within 90 days.

Submit
137. 15. (207) For accountability purposes, store short-term keyed devices in an approved container and account for the devices on a

Explanation

The correct answer is a. communications security physical inventory (CPI). This is because short-term keyed devices need to be stored in an approved container for security purposes. The accountability of these devices is maintained by conducting a communications security physical inventory (CPI), which involves keeping track of the devices and ensuring they are properly stored and accounted for. The other options, b. Electronic Key Management System (EKMS), c. Standard Form (SF) 700, Security Container Information, and d. SF 702, Security Container Checklist, do not specifically address the need for accountability and storage of short-term keyed devices.

Submit
138. 77. (235) Of the four types of comm kits you can build, which one includes the coverage period of the mission plus 3 days?

Explanation

The correct answer is c. 3. The question is asking which type of communication kit includes the coverage period of the mission plus 3 days. The answer is c. 3 because it is the only option that mentions the coverage period of the mission plus 3 days. The other options do not specify the time frame of the coverage period.

Submit
139. 17. (208) Which form do you use to document when a safe or vault is put into use?

Explanation

not-available-via-ai

Submit
140. 28. (212) What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?

Explanation

not-available-via-ai

Submit
141. 67. (026) How many years are the records of destruction of a hard drive maintained?

Explanation

The records of destruction of a hard drive are maintained for a period of 5 years. This means that any documentation related to the destruction of a hard drive, such as proof of destruction or certificates, will be kept on record for a duration of 5 years. This is important for maintaining a record of the destruction process and ensuring compliance with data protection regulations.

Submit
142. 61. (227) The local management device (LMD) supports or utilizes all of the following except

Explanation

The local management device (LMD) supports or utilizes the Santa Cruz Operation (SCO) UNIX Open Server operating system, dial-up communications, and encrypted keying material (KEYMAT). However, it does not support or utilize unencrypted keying material (KEYMAT).

Submit
143. 67. (231) Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic keys as well as transfer physical and electronic keys to other COMSEC accounts?

Explanation

The correct answer is d. Local communications security management software (LCMS). LCMS is used in conjunction with the key processor (KP) to generate electronic keys and transfer physical and electronic keys to other COMSEC accounts. This software helps manage and secure communication systems by providing key management functionalities.

Submit
144. 45. (219) Which is not an authorized method for routinely destroying paper communications security (COMSEC) aids?

Explanation

Disintegrating is not an authorized method for routinely destroying paper communications security (COMSEC) aids. The other options, pulverizing, burning, and pulping, are all acceptable methods for destroying paper COMSEC aids.

Submit
145. 49. (220) What is the classification of the Standard Form (SF) 153 when the disposition record card (DRC) is attached?

Explanation

The classification of the Standard Form (SF) 153 when the disposition record card (DRC) is attached is confidential. This means that the information on the SF 153 is considered sensitive and should only be accessed by individuals with the appropriate security clearance.

Submit
146. 6. (003) Which type of network typically provides wireless broadband data services?

Explanation

A wireless wide area network (WWAN) typically provides wireless broadband data services. This type of network covers a wide geographic area and allows users to access the internet or other network resources wirelessly. WWANs are commonly used by mobile network operators to provide internet connectivity to mobile devices such as smartphones, tablets, and laptops. They utilize cellular technology and infrastructure to provide high-speed data services to a large number of users over a wide area.

Submit
147. 30. (214) What type of incident includes the unauthorized disclosure of communications security (COMSEC) information or material?

Explanation

The correct answer is b. Personnel. Personnel incidents involve the unauthorized disclosure of communications security (COMSEC) information or material. This type of incident occurs when individuals who have access to COMSEC information or material disclose it without proper authorization. It is important to have strict protocols in place to prevent unauthorized disclosure and to educate personnel on the importance of safeguarding COMSEC information.

Submit
148. 33. (215) Within how many hours from the time a communications security (COMSEC) incident is discovered must a commander appoint an inquiry officer?

Explanation

Within 72 hours from the time a communications security (COMSEC) incident is discovered, a commander must appoint an inquiry officer. This means that the commander has a maximum of 72 hours to select and assign someone to investigate the incident and gather information. The purpose of appointing an inquiry officer is to determine the cause and extent of the incident, assess any damage or compromise of COMSEC material, and recommend corrective actions to prevent future incidents. This timeframe ensures that the investigation process is initiated promptly to address any potential security breaches.

Submit
149. 12. (205) How often does the communications security account manager (CAM) perform an assessment on the communications security responsible officer (CRO) communication security (COMSEC) account?

Explanation

The communications security account manager (CAM) performs an assessment on the communications security responsible officer (CRO) communication security (COMSEC) account semiannually. This means that the assessment is conducted twice a year.

Submit
150. 46. (219) Which is not an authorized method to destroy key tapes?

Explanation

Shredding is not an authorized method to destroy key tapes. This means that using a shredder to cut the tapes into small pieces is not an approved way to dispose of them. The other options, disintegrating, pulverizing, and burning, are all authorized methods for destroying key tapes.

Submit
151. 36. (013) Who initiates a local files check prior to allowing volunteers access to the AF network?

Explanation

The correct answer is b. Unit security manager. The unit security manager is responsible for ensuring that volunteers have the necessary security clearances and meet all the requirements before granting them access to the AF network. They initiate a local files check to verify the volunteer's background and ensure they are eligible for network access. The unit commander may have input in the decision, but the unit security manager is the one who initiates the check. The ISSO and WISSO may also have involvement in the process, but they do not initiate the local files check.

Submit
152. 35. (013) Who is the approval authority for foreign nationals to access unclassified systems?

Explanation

The approval authority for foreign nationals to access unclassified systems is the AF Network Operations (AFNETOPS) commander. This individual is responsible for overseeing and managing the operations of the Air Force Network, including granting access to foreign nationals. The Wing commander and Wing information assurance officer (WIAO) may have some involvement in the approval process, but the ultimate authority lies with the AFNETOPS commander. The AF Network Operations Center (AFNOC) commander may also play a role in the approval process, but they are not specifically mentioned as the approval authority in this question.

Submit
153. 61. (025) Which form is used to annotate that storage media from an information system has been cleared?

Explanation

The form SF 711 is used to annotate that storage media from an information system has been cleared. This form is specifically designed for this purpose and provides a record of the clearance process. It is important to properly document the clearing of storage media to ensure that sensitive information is not accessible to unauthorized individuals.

Submit
154. 53. (222) How many people are required to transport Top Secret (TS) keying material (KEYMAT) sealed in National Security Agency (NSA) protective packaging?

Explanation

One person is required to transport Top Secret (TS) keying material (KEYMAT) sealed in National Security Agency (NSA) protective packaging. This suggests that the packaging is designed to be easily handled and transported by a single individual, indicating that it does not require multiple people for transportation.

Submit
155. 3. (201) Who appoints a communications security responsible officer (CRO) to support a unit's communications security (COMSEC) mission?

Explanation

The supported unit commander appoints a communications security responsible officer (CRO) to support the unit's communications security (COMSEC) mission. This individual is responsible for ensuring that proper COMSEC procedures and protocols are followed within the unit. The supported unit commander has the authority to select and designate someone for this role, as they are directly responsible for the unit's operations and security. The communications security account manager (CAM), communications unit commander, and wing commander may have other roles and responsibilities, but it is the supported unit commander who appoints the CRO.

Submit
156. 63. (228) How often must local communications management software (LCMS) audit data be reviewed?

Explanation

Local communications management software (LCMS) audit data should be reviewed on a monthly basis. This allows for regular monitoring and assessment of the data to ensure its accuracy and compliance with established standards. Monthly reviews also provide a timely opportunity to identify any potential issues or discrepancies and take appropriate corrective actions. This frequency strikes a balance between conducting audits frequently enough to maintain data integrity and not overwhelming the system with excessive reviews.

Submit
157. 14. (206) Which form is used to document the highest level classification of a security container?

Explanation

The SF 700 form is used to document the highest level classification of a security container. This form is specifically designed for the purpose of recording and tracking the classification level of containers used to store classified information. It helps ensure that the appropriate security measures are implemented and maintained for the protection of sensitive information. The other options listed, SF 702, AF IMT 1109, and AFTO Form 36, are not specifically used for documenting the highest level classification of a security container.

Submit
158. 5. (201) Who is responsible for identifying cryptonet members?

Explanation

Controlling authorities are responsible for identifying cryptonet members. They have the authority and responsibility to manage and control access to the cryptonet, ensuring that only authorized individuals are granted access. The controlling authorities play a crucial role in maintaining the security and integrity of the cryptonet by verifying the identities of individuals and granting them appropriate access privileges. They are responsible for enforcing security protocols and ensuring that only authorized personnel have access to sensitive information.

Submit
159. 16. (208) Which form do you use to document and annotate opening, closing, and checking of any GSA-approved security container?

Explanation

The correct form to document and annotate opening, closing, and checking of any GSA-approved security container is SF 702.

Submit
160. 88. (032) Integrated Network Operations Security Centers (I-NOSC) use security and network monitoring tools to do all of the following except

Explanation

I-NOSCs use security and network monitoring tools to restore systems, monitor network health, and identify system vulnerabilities. However, they do not typically review the contents of fixed disks. This task is usually performed by forensic analysts or investigators when there is a need to examine the data stored on a fixed disk for legal or investigative purposes.

Submit
161. 21. (209) Who appoints a cryptographic access program (CAP) administrator?

Explanation

The unit commander appoints a cryptographic access program (CAP) administrator. This individual is responsible for managing and overseeing the CAP within their unit. They ensure that proper security measures are in place and that authorized personnel have access to encrypted information. The unit commander is in the best position to select a CAP administrator who understands the specific needs and requirements of their unit.

Submit
162. 87. (031) Who is the connection approval authority for mission assurance category I (MAC I) systems?

Explanation

The AF Network Operations (AFNETOPS) commander is the connection approval authority for mission assurance category I (MAC I) systems. This means that they have the authority to approve or deny connections to these systems, ensuring that they meet the necessary security and operational requirements. The AFNETOPS commander is responsible for overseeing the network operations and ensuring the integrity and availability of the Air Force's network.

Submit
163. 75. (028) A facility with an inspectable space of more than 20 meters, but less than 100 meters is considered to be in facility zone

Explanation

A facility with an inspectable space of more than 20 meters, but less than 100 meters is considered to be in facility zone. The correct answer is b. B.

Submit
164. 24. (008) Which organization is responsible for developing Air Force ports, protocols and services (PPS) policies and procedures?

Explanation

The Air Force Network Integration Center (AFNIC) is responsible for developing Air Force ports, protocols, and services (PPS) policies and procedures. This organization is specifically dedicated to integrating and managing the Air Force's network infrastructure, ensuring that it operates efficiently and securely. AFNIC plays a crucial role in establishing and enforcing the standards and guidelines for the use of ports, protocols, and services within the Air Force network, ensuring interoperability and compliance with security protocols.

Submit
165. 62. (228) Which type of National Security Agency (NSA)-approved encryption device does the local management device (LMD) use to communicate over a communications link?

Explanation

The local management device (LMD) uses a Type I National Security Agency (NSA)-approved encryption device to communicate over a communications link. Type I encryption devices are the highest level of encryption devices approved by the NSA and are used to protect classified information.

Submit
166. 54. (020) An incident in which an Air Force computer, information system, or network was denied use due to an overwhelming volume of unauthorized network traffic is category

Explanation

This incident falls under category IV, which refers to denial of service attacks. In this case, the Air Force computer, information system, or network was denied use because it was overwhelmed by a large amount of unauthorized network traffic. Denial of service attacks aim to disrupt or disable a network, system, or service by flooding it with traffic, making it unavailable to legitimate users.

Submit
167. 60. (024) Which agency conducts assessments of wing information assurance (IA) programs using an AF Form 4170 every two years or sooner?

Explanation

Major commands (MAJCOM) conduct assessments of wing information assurance (IA) programs using an AF Form 4170 every two years or sooner. This means that the responsibility for conducting these assessments lies with the higher-level command rather than the individual wings or squadrons. The Headquarters Air Force Network Integration Center (HQ AFNIC) may play a role in providing support and guidance for these assessments, but they are not the agency responsible for conducting them.

Submit
168. 7. (202) Who must sign all communications security manager (CAM) waivers?

Explanation

The correct answer is a. Unit commander. The unit commander is responsible for signing all communications security manager (CAM) waivers. This ensures that the commander is aware of and approves any exceptions or deviations from standard communications security procedures within the unit. The unit commander is ultimately responsible for the security and effectiveness of the unit's communications systems, so they must be involved in the decision-making process for any waivers.

Submit
169. 69. (232) Which communications security (COMSEC) management software uses menus and submenus for necessary tasks?

Explanation

LCMS is the correct answer because it is a type of communications security (COMSEC) management software that uses menus and submenus for necessary tasks. This software is specifically designed for managing and maintaining the security of local communication systems. It provides a user-friendly interface with various options and functionalities organized in menus and submenus, making it easier for users to navigate and perform the required tasks related to COMSEC management.

Submit
170. 70. (232) Which communications security (COMSEC) management software does not allow an account to perform a semiannual inventory?

Explanation

The correct answer is b. Common user application software (CUAS). This software does not allow an account to perform a semiannual inventory.

Submit
171. 56. (021) Who tracks Air Force information condition (INFOCON) status to ensure directed actions are accomplished in a timely manner?

Explanation

The Air Force network operating center network control division is responsible for tracking the Air Force information condition (INFOCON) status to ensure that directed actions are completed on time. This division is specifically tasked with monitoring and managing the Air Force network, making them the most appropriate group to oversee the INFOCON status and ensure that necessary actions are taken promptly. Major commands, direct reporting units, and field operating agencies may have their own responsibilities within the Air Force, but they are not specifically responsible for tracking the INFOCON status.

Submit
172. 66. (026) When destroying DVD storage devices, what is the maximum particle size allowable on the normal edge dimensions?

Explanation

The maximum particle size allowable on the normal edge dimensions when destroying DVD storage devices is 10 square millimeters.

Submit
173. 68. (231) Which communication security (COMSEC) management software allows a user to view the exact location of any COMSEC item held by the local account or a local element?

Explanation

The correct answer is b. Common user application software (CUAS). CUAS is a communication security (COMSEC) management software that allows users to view the exact location of any COMSEC item held by the local account or a local element. This software provides users with the ability to track and manage COMSEC items, ensuring their secure storage and distribution.

Submit
174. 85. (031) In which phase of the Department of Defense information assurance certification and accreditation process (DIACAP) do you initiate and plan for certification and accreditation (C&A)?

Explanation

In the Department of Defense information assurance certification and accreditation process (DIACAP), the initiation and planning for certification and accreditation (C&A) is done in Phase I. This phase involves identifying the system, defining the system boundaries, and determining the security requirements and objectives. It also includes developing a plan for the C&A process, establishing roles and responsibilities, and obtaining the necessary resources and support. This initial phase sets the foundation for the rest of the DIACAP process.

Submit
175. 89. (032) Automated security incident measurement (ASIM) transcripts are controlled and are only released with approval of the

Explanation

ASIM transcripts are controlled and sensitive documents that contain information about security incidents. They are only released with approval from the Air Force network operations center (AFNOC) because AFNOC is responsible for managing and overseeing the Air Force's network operations and security. Releasing the transcripts without AFNOC's approval could compromise the security of the network and potentially hinder ongoing investigations into security incidents. Therefore, AFNOC has the authority to determine when and how ASIM transcripts are released.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 21, 2018
    Quiz Created by
    Mcknightc3h6n6o6
Cancel
  • All
    All (175)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
44. (017) Users who perform troubleshooting, configuration changes, or...
51. (221) What provides the special protection of Top Secret (TS)...
76. (235) Who is responsible for building, issuing, and recovering...
46. (018) Weaknesses or holes in a security system are considered
47. (018) Which of the following options is not involved when securing...
19. (209) Which of the following requirements would make a person...
55. (020) When classified information is inadvertently sent through...
23. (210) Which type of security clearance is not valid for personnel...
58. (023) What determines the number of alternate information...
26. (211) At a minimum, how often must you review the communications...
2. (001) Which career field deploys, sustains, troubleshoots, and...
5. (002) Human error causes approximately what percentage of all...
7. (004) Which bound media has a core surrounded by cladding and a...
29. (213) When an error or anomaly is detected upon receipt/inspection...
8. (004) Which of the following is not an example of unbound media?
74. (028) Which term identifies any equipment or area in which...
9. (005) In which topology does a device wanting to communicate with...
10. (006) When viewed in binary form, each octet within an Internet...
83. (030) In which information assurance control must an organization...
54. (223) When you are performing courier duties and transporting...
14. (006) The sequence of leading bits in an internet protocol (IP)...
16. (007) Which transmission control protocol (TCP) port is used by...
17. (007) Which protocol is an Internet Engineering Task Force (IETF)...
19. (008) Which port range constitutes well-known ports?
86. (031) What is the minimum rank the AF Information Network (AFIN)...
90. (033) Which of the following is not a phase in the information...
21. (008) Which port is used for hypertext transfer protocol (HTTP)?
23. (008) Which type of scan is also known as a half open scan?
30. (011) What is the newest WiFi networking standard that is widely...
6. (202) Who requires that the communications security account manager...
8. (203) Who assists the communications security account manager (CAM)...
37. (014) The definition of integrity as it's applied to...
11. (205) Who performs the semiannual inspections and audits on the...
38. (014) Logon and password management screens must be encrypted with...
39. (014) Which common access card (CAC) certificate would be used to...
40. (014) What does the common access card (CAC) certificate used to...
41. (014) The contract manager must use what agency to validate a...
71. (233) Who provides formal classroom training to instruct aircrews...
43. (219) Who requests disposition instructions for communications...
44. (219) Who may destroy communications security (COMSEC) material?
42. (015) Which of the following represents a strong password?
48. (220) Sign the communication security (COMSEC) material...
50. (221) Two-person integrity (TPI) is the storage and handling...
78. (235) What comm kit type do you build for emergency war orders...
48. (018) Which UNIX command allows remote logins?
79. (235) Comm kits are normally contained in
49. (018) When vulnerabilities are discovered within the Windows...
51. (019) A program that contains or installs a malicious program is...
52. (019) The two fundamental concepts of network security are
84. (236) What type of change notice is not scheduled and is only...
57. (022) Continuity of operations plans (COOP) are not used in which...
1. (001) Which of the following is a duty performed by a cyber surety...
59. (024) What is the minimum grade requirement for an information...
63. (025) Where are thermal transfer and dye sublimation cartridges...
73. (027) An installation commander can authorize keeping which...
79. (029) An emission security (EMSEC) manager documents an EMSEC...
52. (222) How many people must unwrap the inner wrapper of a top...
12. (006) Which class of internet protocol (IP) addresses is only used...
56. (224) Which method is not used to complete a bulk encrypted...
15. (007) Which protocol does the Internet support as the "language"...
18. (008) A logical connection point for the transmission of...
59. (226) The simple key loader (SKL) is the replacement for which...
20. (008) Which port is used for telnet?
22. (008) In which type of port scan does the scanner connect to the...
28. (010) Administrators must be in the habit of doing what to make it...
29. (011) Which is the slowest yet least expensive WiFi standard?
32. (012) Defense-in-depth is the Department of Defense (DOD) approach...
34. (013) Which of the following is not a result of initial...
34. (215) The rank requirement for an inquiry officer includes all of...
35. (215) Who completes an initial report for each communications...
38. (217) When you create a communication security physical inventory...
39. (217) When you are sealing a package containing communications...
73. (234) Combat Crew Communications (CCC) Level 2 certification...
47. (220) What form serves as the destruction certificate for...
83. (236) Flight Information Handbooks (FIH) are issued every
85. (236) Which squadron commander must be notified before outdated...
24. (210) How often should communications security (COMSEC) access...
27. (212) What is the term used to identify the highest level of...
65. (025) How often must a degausser be recertified during its first 2...
78. (029) Who is the installation's focal point for emission security...
13. (006) Which internet protocol (IP) address is used for limited...
32. (215) Report communications security (COMSEC) deviations and...
25. (009) How is an Internet protocol version 6 (IPv6) address...
26. (009) Which type of transition technology is used to set up secure...
31. (011) Which wireless standard was originally intended to create a...
4. (201) Who assists the communications security account manager (CAM)...
9. (204) Wing information assurance (IA) assessments are generally...
65. (229) On the back of the KOK–22A, which interface allows you...
41. (218) Changes that must be made to material in communication...
42. (218) How many people are required to complete page replacements...
72. (233) What squadron are Combat Crew Communications (CCC) units...
74. (234) Once entered into Combat Crew Communications (CCC) Level 1...
13. (206) Qualified personnel perform preventative maintenance and...
43. (016) Which category of information must be stored on removable...
55. (224) How many times do you wrap communications security (COMSEC)...
60. (227) What classification of communication security (COMSEC)...
64. (229) The front of the KOK–22A device fill connector allows...
75. (234) Which code helps the Air Force identify special experience...
45. (017) Which device provides the initial entry point into a...
81. (236) Flight Information Publications (FLIP) are divided into how...
82. (236) Which documents are designed to provide aircrews with...
50. (019) A companion file virus is one that
20. (209) Those not eligible to be enrolled in the cryptographic...
70. (027) Who has the authority to impose restrictions upon and...
31. (214) What type of communications security (COMSEC) incident is...
71. (027) Which standard form (SF) is used to record the opening and...
72. (027) Personnel removing top secret material from storage must use
81. (030) How many steps are in the risk management framework process?
58. (226) Which statement is not accurate regarding firefly...
1. (201) What is a collection of interoperable systems developed for...
27. (010) Networked resources must be consistently monitored and...
36. (215) A communications security account manager (CAM) submits an...
66. (230) What is the classification of magnetic media used to...
37. (216) When removing material from a communication security...
40. (217) How often must a communications security account manager...
18. (208) Which form do you use to record the arrival or departure of...
22. (209) Who is responsible for overseeing the cryptographic access...
25. (210) At the base level, who initials the communications security...
80. (029) Once it is filled out an AF Form 4170, Emission Security...
80. (236) Which is not a flight phase that Flight Information...
53. (020) An incident in which an unauthorized person gained...
62. (025) When sanitizing sealed disks with a degausser, what...
3. (002) How many steps are in the risk management (RM) process?
4. (002) What is the third step in the risk management (RM) process?
64. (025) How many times should you wipe each active surface of the...
68. (026) When overwriting hard drives, you must examine no less than...
69. (027) Which standard form (SF) label is used as a data descriptor...
76. (028) Equipment with an equipment radiation TEMPEST zone (ERTZ) of...
77. (029) What type of equipment is used for acquisition, storage and...
82. (030) What type of impact occurs when the loss of confidentiality,...
11. (006) How many bits are within an internet protocol version 4...
57. (225) What local communications security management software...
84. (030) How many steps are in the system development life cycle?
2. (201) What allows one electronic key management system (EKMS)...
33. (012) What is assigned to all Department of Defense (DOD)...
10. (204) When a unit receives an unsatisfactory rating on a...
15. (207) For accountability purposes, store short-term keyed devices...
77. (235) Of the four types of comm kits you can build, which one...
17. (208) Which form do you use to document when a safe or vault is...
28. (212) What term is used to describe a communication security...
67. (026) How many years are the records of destruction of a hard...
61. (227) The local management device (LMD) supports or utilizes all...
67. (231) Which communication security (COMSEC) management software is...
45. (219) Which is not an authorized method for routinely destroying...
49. (220) What is the classification of the Standard Form (SF) 153...
6. (003) Which type of network typically provides wireless broadband...
30. (214) What type of incident includes the unauthorized disclosure...
33. (215) Within how many hours from the time a communications...
12. (205) How often does the communications security account manager...
46. (219) Which is not an authorized method to destroy key tapes?
36. (013) Who initiates a local files check prior to allowing...
35. (013) Who is the approval authority for foreign nationals to...
61. (025) Which form is used to annotate that storage media from an...
53. (222) How many people are required to transport Top Secret (TS)...
3. (201) Who appoints a communications security responsible officer...
63. (228) How often must local communications management software...
14. (206) Which form is used to document the highest level...
5. (201) Who is responsible for identifying cryptonet members?
16. (208) Which form do you use to document and annotate opening,...
88. (032) Integrated Network Operations Security Centers (I-NOSC) use...
21. (209) Who appoints a cryptographic access program (CAP)...
87. (031) Who is the connection approval authority for mission...
75. (028) A facility with an inspectable space of more than 20 meters,...
24. (008) Which organization is responsible for developing Air Force...
62. (228) Which type of National Security Agency (NSA)-approved...
54. (020) An incident in which an Air Force computer, information...
60. (024) Which agency conducts assessments of wing information...
7. (202) Who must sign all communications security manager (CAM)...
69. (232) Which communications security (COMSEC) management software...
70. (232) Which communications security (COMSEC) management software...
56. (021) Who tracks Air Force information condition (INFOCON) status...
66. (026) When destroying DVD storage devices, what is the maximum...
68. (231) Which communication security (COMSEC) management software...
85. (031) In which phase of the Department of Defense information...
89. (032) Automated security incident measurement (ASIM) transcripts...
Alert!

Advertisement