Z3d053 CDC UREs

179 Questions | Attempts: 415
Please wait...
Question 1 / 180
🏆 Rank #--
Score 0/100

1. 5. (002) Human error causes approximately what percentage of all accidents?

Submit
Please wait...
About This Quiz
CDC Quizzes & Trivia

.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. 8. (004) Which of the following is not an example of unbound media?

Submit

3. 24. (210) How often should communications security (COMSEC) access lists be reviewed for accuracy?

Submit

4. 48. (220) Sign the communication security (COMSEC) material destruction record

Submit

5. 7. (004) Which bound media has a core surrounded by cladding and a second layer surrounded by glass or plastic?

Submit

6. 9. (005) In which topology does a device wanting to communicate with another device on the network send a broadcast message onto the wire that all other devices see, but only the intended recipient actually accepts and processes?

Submit

7. 18. (008) A logical connection point for the transmission of information packets is known as

Submit

8. 26. (009) Which type of transition technology is used to set up secure point-to-point communication?

Submit

9. 39. (014) Which common access card (CAC) certificate would be used to sign an enlisted performance report (EPR)?

Submit

10. 41. (014) The contract manager must use what agency to validate a contractor employee’s need to obtain a government public key infrastructure (PKI) certificate?

Submit

11. 46. (018) Weaknesses or holes in a security system are considered

Submit

12. 58. (023) What determines the number of alternate information assurance officers (IAO) in an organization?

Submit

13. 19. (008) Which port range constitutes well-known ports?

Submit

14. 20. (008) Which port is used for telnet?

Submit

15. 21. (008) Which port is used for hypertext transfer protocol (HTTP)?

Submit

16. 23. (008) Which type of scan is also known as a half open scan?

Submit

17. 30. (011) What is the newest WiFi networking standard that is widely available?

Submit

18. 37. (014) The definition of integrity as it’s applied to identification, authentication, and encryption is

Submit

19. 47. (018) Which of the following options is not involved when securing a UNIX system?

Submit

20. 52. (019) The two fundamental concepts of network security are

Submit

21. 23. (210) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?

Submit

22. 44. (219) Who may destroy communications security (COMSEC) material?

Submit

23. 54. (223) When you are performing courier duties and transporting bulky communication security (COMSEC) material through the airlines, when is it acceptable to leave the COMSEC material unattended?

Submit

24. 55. (224) How many times do you wrap communications security (COMSEC) material prior to transportation?

Submit

25. 4. (002) What is the third step in the risk management (RM) process?

Submit

26. 14. (006) The sequence of leading bits in an internet protocol (IP) that are used to identify the network portion of an IP address is called a

Submit

27. 17. (007) Which protocol is an Internet Engineering Task Force (IETF) standard designed to reduce the administration burden and complexity of configuring hosts on a transmission control protocol/internet protocol (TCP/IP) based network?

Submit

28. 40. (014) What does the common access card (CAC) certificate used to sign e-mail provide?

Submit

29. 42. (015) Which of the following represents a strong password?

Submit

30. 51. (019) A program that contains or installs a malicious program is called a

Submit

31. 74. (028) Which term identifies any equipment or area in which classified information is processed?

Submit

32. 83. (030) In which information assurance control must an organization ensure individual information system user actions can be traced to the user?

Submit

33. 86. (031) What is the minimum rank the AF Information Network (AFIN) connection approval can be delegated to?

Submit

34. 90. (033) Which of the following is not a phase in the information technology (IT) Lean reengineering process?

Submit

35. 19. (209) Which of the following requirements would make a person ineligible for the cryptographic access program (CAP)?

Submit

36. 39. (217) When you are sealing a package containing communications security (COMSEC) material where do you place your initials?

Submit

37. 41. (218) Changes that must be made to material in communication security (COMSEC) publications are called

Submit

38. 52. (222) How many people must unwrap the inner wrapper of a top secret (TS) crypto package?

Submit

39. 79. (235) Comm kits are normally contained in

Submit

40. 2. (001) Which career field deploys, sustains, troubleshoots, and repairs standard voice, data, video network, and cryptographic client devices in fixed and deployed environments?

Submit

41. 16. (007) Which transmission control protocol (TCP) port is used by hypertext transfer protocol

Submit

42. 38. (014) Logon and password management screens must be encrypted with at least what type of secure socket layer?

Submit

43. 43. (016) Which category of information must be stored on removable media?

Submit

44. 44. (017) Users who perform troubleshooting, configuration changes, or system reviews are given which type of access?

Submit

45. 78. (029) Who is the installation’s focal point for emission security (EMSEC) matters?

Submit

46. 26. (211) At a minimum, how often must you review the communications security (COMSEC) access list?

Submit

47. 43. (219) Who requests disposition instructions for communications security (COMSEC) material?

Submit

48. 50. (221) Two-person integrity (TPI) is the storage and handling system that prohibits access by any single person to what classification of communications security (COMSEC) material?

Submit

49. 51. (221) What provides the special protection of Top Secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening?

Submit

50. 64. (229) The front of the KOK–22A device fill connector allows interface with which type of file devices?

Submit

51. 65. (229) On the back of the KOK–22A, which interface allows you to connect the serial input/output (I/O) port of the key processor (KP) to the serial I/O port of the controlling computer?

Submit

52. 1. (001) Which of the following is a duty performed by a cyber surety journeyman?

Submit

53. 12. (006) Which class of internet protocol (IP) addresses is only used for experimental purposes?

Submit

54. 13. (006) Which internet protocol (IP) address is used for limited broadcasts?

Submit

55. 15. (007) Which protocol does the Internet support as the “language” computers use to find and connect with each other?

Submit

56. 34. (013) Which of the following is not a result of initial information assurance (IA) awareness training for all network users?

Submit

57. 49. (018) When vulnerabilities are discovered within the Windows operating system and other products, Microsoft releases

Submit

58. 50. (019) A companion file virus is one that

Submit

59. 59. (024) What is the minimum grade requirement for an information assurance assessment and assistance program (IAAP) team chief?

Submit

60. 63. (025) Where are thermal transfer and dye sublimation cartridges sent for sanitization?

Submit

61. 64. (025) How many times should you wipe each active surface of the media being degaussed when using a degaussing wand?

Submit

62. 67. (026) How many years are the records of destruction of a hard drive maintained?

Submit

63. 4. (201) Who assists the communications security account manager (CAM) with day-to-day administration and maintenance of accounting records for communications security (COMSEC) material?

Submit

64. Match the following

Submit

65. 71. (233) Who provides formal classroom training to instruct aircrews on how to establish and maintain communications?

Submit

66. 72. (233) What squadron are Combat Crew Communications (CCC) units assigned to?

Submit

67. 73. (234) Combat Crew Communications (CCC) Level 2 certification ensures personnel are qualified to support

Submit

68. 75. (234) Which code helps the Air Force identify special experience and training?

Submit

69. 29. (011) Which is the slowest yet least expensive WiFi standard?

Submit

70. 32. (012) Defense-in-depth is the Department of Defense (DOD) approach for establishing

Submit

71. 55. (020) When classified information is inadvertently sent through unclassified e-mail it is considered

Submit

72. 65. (025) How often must a degausser be recertified during its first 2 years of operation?

Submit

73. 70. (027) Who has the authority to impose restrictions upon and prohibit the use of government owned removable information systems storage media for classified systems or networks?

Submit

74. 79. (029) An emission security (EMSEC) manager documents an EMSEC assessment on

Submit

75. 2. (201) What allows one electronic key management system (EKMS) element to pass required information to another EKMS element enabling both elements to generate the same key session?

Submit

76. 28. (212) What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?

Submit

77. 36. (215) A communications security account manager (CAM) submits an amplifying report every how many days until the final report is submitted?

Submit

78. 38. (217) When you create a communication security physical inventory (CPI), you will need to include all of the following information except

Submit

79. 57. (225) What local communications security management software (LCMS) desktop function provides a user with the ability to securely pass information and/or transfer Electronic Key Management System (EKMS) messages/keys directly to other EKMS accounts?

Submit

80. 6. (003) Which type of network typically provides wireless broadband data services?

Submit

81. 10. (006) When viewed in binary form, each octet within an Internet Protocol (IP) address has how many positions?

Submit

82. 22. (008) In which type of port scan does the scanner connect to the same port on more than one machine?

Submit

83. 31. (011) Which wireless standard was originally intended to create a wireless security platform that would perform as securely as a traditional wired network by providing data encryption?

Submit

84. 57. (022) Continuity of operations plans (COOP) are not used in which of the following situations?

Submit

85. 66. (026) When destroying DVD storage devices, what is the maximum particle size allowable on the normal edge dimensions?

Submit

86. 71. (027) Which standard form (SF) is used to record the opening and closing of security containers?

Submit

87. 73. (027) An installation commander can authorize keeping which classification types on the flight line for in-transit storage?

Submit

88. 29. (213) When an error or anomaly is detected upon receipt/inspection of communications security (COMSEC) material, who sends a message to DIRNSA/I31132?

Submit

89. 34. (215) The rank requirement for an inquiry officer includes all of these except

Submit

90. Which one do you like?

Submit

91. 58. (226) Which statement is not accurate regarding firefly credentials?

Submit

92. 76. (235) Who is responsible for building, issuing, and recovering comm kits?

Submit

93. 28. (010) Administrators must be in the habit of doing what to make it possible for replacement administrators to accomplish the same tasks as their predecessors?

Submit

94. 48. (018) Which UNIX command allows remote logins?

Submit

95. 1. (201) What is a collection of interoperable systems developed for the services and government agencies to automate handling and management of communications security (COMSEC) material?

Submit

96. 11. (205) Who performs the semiannual inspections and audits on the base communications security (COMSEC) account?

Submit

97. 35. (215) Who completes an initial report for each communications security (COMSEC) incident?

Submit

98. 37. (216) When removing material from a communication security physical inventory (CPI), always annotate it by

Submit

99. 84. (236) What type of change notice is not scheduled and is only published as required to provide amendments for safety and flight information?

Submit

100. 11. (006) How many bits are within an internet protocol version 4 (IPv4) address?

Submit

101. 33. (012) What is assigned to all Department of Defense (DOD) information systems that is directly associated with the importance of the information contained relative to achieving DOD goals and objectives?

Submit

102. 45. (017) Which device provides the initial entry point into a network?

Submit

103. Which one do you like?

Submit

104. 13. (206) Qualified personnel perform preventative maintenance and security inspections on safes and vaults every

Submit

105. 59. (226) The simple key loader (SKL) is the replacement for which device?

Submit

106. 81. (236) Flight Information Publications (FLIP) are divided into how many geographical regions?

Submit

107. 25. (009) How is an Internet protocol version 6 (IPv6) address written?

Submit

108. Which one do you like?

Submit

109. 72. (027) Personnel removing top secret material from storage must use

Submit

110. 82. (030) What type of impact occurs when the loss of confidentiality, integrity, and availability (CIA) could be expected to have a serious adverse effect on organizational operations, organizational assets, or people?

Submit

111. 88. (032) Integrated Network Operations Security Centers (I-NOSC) use security and network monitoring tools to do all of the following except

Submit

112. 6. (202) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?

Submit

113. 25. (210) At the base level, who initials the communications security (COMSEC) access list?

Submit

114. 33. (215) Within how many hours from the time a communications security (COMSEC) incident is discovered must a commander appoint an inquiry officer?

Submit

115. 40. (217) How often must a communications security account manager (CAM) review the communications security (COMSEC) physical inventory?

Submit

116. 42. (218) How many people are required to complete page replacements in unclassified communication security (COMSEC) publications?

Submit

117. 63. (228) How often must local communications management software (LCMS) audit data be reviewed?

Submit

118. 77. (235) Of the four types of comm kits you can build, which one includes the coverage period of the mission plus 3 days?

Submit

119. 69. (027) Which standard form (SF) label is used as a data descriptor label?

Submit

120. 8. (203) Who assists the communications security account manager (CAM) in his or her day-to-day duties?

Submit

121. 31. (214) What type of communications security (COMSEC) incident is any loss of control, theft, capture, recovery by salvage, tampering, unauthorized viewing, access, or photographing that has the potential to jeopardize COMSEC material?

Submit

122. 53. (222) How many people are required to transport Top Secret (TS) keying material (KEYMAT) sealed in National Security Agency (NSA) protective packaging?

Submit

123. 74. (234) Once entered into Combat Crew Communications (CCC) Level 1 certification training, how long does an active duty technician have to complete certification?

Submit

124. 82. (236) Which documents are designed to provide aircrews with information on radio navigation, departure, airway structure, approach and landing information?

Submit

125. 83. (236) Flight Information Handbooks (FIH) are issued every

Submit

126. 62. (025) When sanitizing sealed disks with a degausser, what percentage of the overwritten information should be randomly reread to confirm only the overwritten characters are recovered?

Submit

127. 77. (029) What type of equipment is used for acquisition, storage and manipulation of voice and data?

Submit

128. 22. (209) Who is responsible for overseeing the cryptographic access program (CAP) and providing written local procedures to the CAP administrator?

Submit

129. 56. (224) Which method is not used to complete a bulk encrypted transaction (BET)?

Submit

130. 3. (002) How many steps are in the risk management (RM) process?

Submit

131. 75. (028) A facility with an inspectable space of more than 20 meters, but less than 100 meters is considered to be in facility zone

Submit

132. 32. (215) Report communications security (COMSEC) deviations and incidents immediately to all of these personnel except

Submit

133. 46. (219) Which is not an authorized method to destroy key tapes?

Submit

134. 61. (227) The local management device (LMD) supports or utilizes all of the following except

Submit

135. 78. (235) What comm kit type do you build for emergency war orders (EWO)?

Submit

136. 85. (236) Which squadron commander must be notified before outdated Flight Information Publications (FLIP) information is issued?

Submit

137. 85. (031) In which phase of the Department of Defense information assurance certification and accreditation process (DIACAP) do you initiate and plan for certification and accreditation (C&A)?

Submit

138. 18. (208) Which form do you use to record the arrival or departure of all personnel not named on the facility authorized access list?

Submit

139. 20. (209) Those not eligible to be enrolled in the cryptographic access program (CAP) are personnel

Submit

140. 45. (219) Which is not an authorized method for routinely destroying paper communications security (COMSEC) aids?

Submit

141. 47. (220) What form serves as the destruction certificate for communication security (COMSEC) material?

Submit

142. 5. (201) Who is responsible for identifying cryptonet members?

Submit

143. 10. (204) When a unit receives an unsatisfactory rating on a communications security (COMSEC) inspection, the wing will reassess the unit within how many days?

Submit

144. 54. (020) An incident in which an Air Force computer, information system, or network was denied use due to an overwhelming volume of unauthorized network traffic is category

Submit

145. 7. (202) Who must sign all communications security manager (CAM) waivers?

Submit

146. 61. (025) Which form is used to annotate that storage media from an information system has been cleared?

Submit

147. 80. (029) Once it is filled out an AF Form 4170, Emission Security Assessments/Emission Security Countermeasures, is considered

Submit

148. 9. (204) Wing information assurance (IA) assessments are generally conducted every

Submit

149. 15. (207) For accountability purposes, store short-term keyed devices in an approved container and account for the devices on a

Submit

150. 60. (227) What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?

Submit

151. 66. (230) What is the classification of magnetic media used to transport encrypted key?

Submit

152. 60. (024) Which agency conducts assessments of wing information assurance (IA) programs using an AF Form 4170 every two years or sooner?

Submit

153. 12. (205) How often does the communications security account manager (CAM) perform an assessment on the communications security responsible officer (CRO) communication security (COMSEC) account?

Submit

154. 16. (208) Which form do you use to document and annotate opening, closing, and checking of any GSA-approved security container?

Submit

155. 30. (214) What type of incident includes the unauthorized disclosure of communications security (COMSEC) information or material?

Submit

156. 80. (236) Which is not a flight phase that Flight Information Publications (FLIP) are aligned with?

Submit

157. 27. (010) Networked resources must be consistently monitored and controlled to ensure access to the network while

Submit

158. 68. (026) When overwriting hard drives, you must examine no less than what percentage of all overwritten hard drives to verify the overwriting process?

Submit

159. 81. (030) How many steps are in the risk management framework process?

Submit

160. 87. (031) Who is the connection approval authority for mission assurance category I (MAC I) systems?

Submit

161. 27. (212) What is the term used to identify the highest level of security lapse in handling communications security (COMSEC)?

Submit

162. 49. (220) What is the classification of the Standard Form (SF) 153 when the disposition record card (DRC) is attached?

Submit

163. 67. (231) Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic keys as well as transfer physical and electronic keys to other COMSEC accounts?

Submit

164. 56. (021) Who tracks Air Force information condition (INFOCON) status to ensure directed actions are accomplished in a timely manner?

Submit

165. 84. (030) How many steps are in the system development life cycle?

Submit

166. 24. (008) Which organization is responsible for developing Air Force ports, protocols and services (PPS) policies and procedures?

Submit

167. 36. (013) Who initiates a local files check prior to allowing volunteers access to the AF network?

Submit

168. 69. (232) Which communications security (COMSEC) management software uses menus and submenus for necessary tasks?

Submit

169. 76. (028) Equipment with an equipment radiation TEMPEST zone (ERTZ) of 20 to 100 meters is considered to be in equipment zone considered to be in facility zone

Submit

170. 89. (032) Automated security incident measurement (ASIM) transcripts are controlled and are only released with approval of the

Submit

171. 17. (208) Which form do you use to document when a safe or vault is put into use?

Submit

172. 35. (013) Who is the approval authority for foreign nationals to access unclassified systems?

Submit

173. 68. (231) Which communication security (COMSEC) management software allows a user to view the exact location of any COMSEC item held by the local account or a local element?

Submit

174. 70. (232) Which communications security (COMSEC) management software does not allow an account to perform a semiannual inventory?

Submit

175. 53. (020) An incident in which an unauthorized person gained user-level privileges on an Air Force computer, information system, or network device is considered category

Submit

176. 3. (201) Who appoints a communications security responsible officer (CRO) to support a unit’s communications security (COMSEC) mission?

Submit

177. 62. (228) Which type of National Security Agency (NSA)-approved encryption device does the local management device (LMD) use to communicate over a communications link?

Submit

178. 21. (209) Who appoints a cryptographic access program (CAP) administrator?

Submit

179. 14. (206) Which form is used to document the highest level classification of a security container?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (179)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
5. (002) Human error causes approximately what percentage of all...
8. (004) Which of the following is not an example of unbound media?
24. (210) How often should communications security (COMSEC) access...
48. (220) Sign the communication security (COMSEC) material...
7. (004) Which bound media has a core surrounded by cladding and a...
9. (005) In which topology does a device wanting to communicate with...
18. (008) A logical connection point for the transmission of...
26. (009) Which type of transition technology is used to set up secure...
39. (014) Which common access card (CAC) certificate would be used to...
41. (014) The contract manager must use what agency to validate a...
46. (018) Weaknesses or holes in a security system are considered
58. (023) What determines the number of alternate information...
19. (008) Which port range constitutes well-known ports?
20. (008) Which port is used for telnet?
21. (008) Which port is used for hypertext transfer protocol (HTTP)?
23. (008) Which type of scan is also known as a half open scan?
30. (011) What is the newest WiFi networking standard that is widely...
37. (014) The definition of integrity as it’s applied to...
47. (018) Which of the following options is not involved when securing...
52. (019) The two fundamental concepts of network security are
23. (210) Which type of security clearance is not valid for personnel...
44. (219) Who may destroy communications security (COMSEC) material?
54. (223) When you are performing courier duties and transporting...
55. (224) How many times do you wrap communications security (COMSEC)...
4. (002) What is the third step in the risk management (RM) process?
14. (006) The sequence of leading bits in an internet protocol (IP)...
17. (007) Which protocol is an Internet Engineering Task Force (IETF)...
40. (014) What does the common access card (CAC) certificate used to...
42. (015) Which of the following represents a strong password?
51. (019) A program that contains or installs a malicious program is...
74. (028) Which term identifies any equipment or area in which...
83. (030) In which information assurance control must an organization...
86. (031) What is the minimum rank the AF Information Network (AFIN)...
90. (033) Which of the following is not a phase in the information...
19. (209) Which of the following requirements would make a person...
39. (217) When you are sealing a package containing communications...
41. (218) Changes that must be made to material in communication...
52. (222) How many people must unwrap the inner wrapper of a top...
79. (235) Comm kits are normally contained in
2. (001) Which career field deploys, sustains, troubleshoots, and...
16. (007) Which transmission control protocol (TCP) port is used by...
38. (014) Logon and password management screens must be encrypted with...
43. (016) Which category of information must be stored on removable...
44. (017) Users who perform troubleshooting, configuration changes, or...
78. (029) Who is the installation’s focal point for emission...
26. (211) At a minimum, how often must you review the communications...
43. (219) Who requests disposition instructions for communications...
50. (221) Two-person integrity (TPI) is the storage and handling...
51. (221) What provides the special protection of Top Secret (TS)...
64. (229) The front of the KOK–22A device fill connector allows...
65. (229) On the back of the KOK–22A, which interface allows you to...
1. (001) Which of the following is a duty performed by a cyber surety...
12. (006) Which class of internet protocol (IP) addresses is only used...
13. (006) Which internet protocol (IP) address is used for limited...
15. (007) Which protocol does the Internet support as the...
34. (013) Which of the following is not a result of initial...
49. (018) When vulnerabilities are discovered within the Windows...
50. (019) A companion file virus is one that
59. (024) What is the minimum grade requirement for an information...
63. (025) Where are thermal transfer and dye sublimation cartridges...
64. (025) How many times should you wipe each active surface of the...
67. (026) How many years are the records of destruction of a hard...
4. (201) Who assists the communications security account manager (CAM)...
Match the following
71. (233) Who provides formal classroom training to instruct aircrews...
72. (233) What squadron are Combat Crew Communications (CCC) units...
73. (234) Combat Crew Communications (CCC) Level 2 certification...
75. (234) Which code helps the Air Force identify special experience...
29. (011) Which is the slowest yet least expensive WiFi standard?
32. (012) Defense-in-depth is the Department of Defense (DOD) approach...
55. (020) When classified information is inadvertently sent through...
65. (025) How often must a degausser be recertified during its first 2...
70. (027) Who has the authority to impose restrictions upon and...
79. (029) An emission security (EMSEC) manager documents an EMSEC...
2. (201) What allows one electronic key management system (EKMS)...
28. (212) What term is used to describe a communication security...
36. (215) A communications security account manager (CAM) submits an...
38. (217) When you create a communication security physical inventory...
57. (225) What local communications security management software...
6. (003) Which type of network typically provides wireless broadband...
10. (006) When viewed in binary form, each octet within an Internet...
22. (008) In which type of port scan does the scanner connect to the...
31. (011) Which wireless standard was originally intended to create a...
57. (022) Continuity of operations plans (COOP) are not used in which...
66. (026) When destroying DVD storage devices, what is the maximum...
71. (027) Which standard form (SF) is used to record the opening and...
73. (027) An installation commander can authorize keeping which...
29. (213) When an error or anomaly is detected upon receipt/inspection...
34. (215) The rank requirement for an inquiry officer includes all of...
Which one do you like?
58. (226) Which statement is not accurate regarding firefly...
76. (235) Who is responsible for building, issuing, and recovering...
28. (010) Administrators must be in the habit of doing what to make it...
48. (018) Which UNIX command allows remote logins?
1. (201) What is a collection of interoperable systems developed for...
11. (205) Who performs the semiannual inspections and audits on the...
35. (215) Who completes an initial report for each communications...
37. (216) When removing material from a communication security...
84. (236) What type of change notice is not scheduled and is only...
11. (006) How many bits are within an internet protocol version 4...
33. (012) What is assigned to all Department of Defense (DOD)...
45. (017) Which device provides the initial entry point into a...
Which one do you like?
13. (206) Qualified personnel perform preventative maintenance and...
59. (226) The simple key loader (SKL) is the replacement for which...
81. (236) Flight Information Publications (FLIP) are divided into how...
25. (009) How is an Internet protocol version 6 (IPv6) address...
Which one do you like?
72. (027) Personnel removing top secret material from storage must use
82. (030) What type of impact occurs when the loss of confidentiality,...
88. (032) Integrated Network Operations Security Centers (I-NOSC) use...
6. (202) Who requires that the communications security account manager...
25. (210) At the base level, who initials the communications security...
33. (215) Within how many hours from the time a communications...
40. (217) How often must a communications security account manager...
42. (218) How many people are required to complete page replacements...
63. (228) How often must local communications management software...
77. (235) Of the four types of comm kits you can build, which one...
69. (027) Which standard form (SF) label is used as a data descriptor...
8. (203) Who assists the communications security account manager (CAM)...
31. (214) What type of communications security (COMSEC) incident is...
53. (222) How many people are required to transport Top Secret (TS)...
74. (234) Once entered into Combat Crew Communications (CCC) Level 1...
82. (236) Which documents are designed to provide aircrews with...
83. (236) Flight Information Handbooks (FIH) are issued every
62. (025) When sanitizing sealed disks with a degausser, what...
77. (029) What type of equipment is used for acquisition, storage and...
22. (209) Who is responsible for overseeing the cryptographic access...
56. (224) Which method is not used to complete a bulk encrypted...
3. (002) How many steps are in the risk management (RM) process?
75. (028) A facility with an inspectable space of more than 20 meters,...
32. (215) Report communications security (COMSEC) deviations and...
46. (219) Which is not an authorized method to destroy key tapes?
61. (227) The local management device (LMD) supports or utilizes all...
78. (235) What comm kit type do you build for emergency war orders...
85. (236) Which squadron commander must be notified before outdated...
85. (031) In which phase of the Department of Defense information...
18. (208) Which form do you use to record the arrival or departure of...
20. (209) Those not eligible to be enrolled in the cryptographic...
45. (219) Which is not an authorized method for routinely destroying...
47. (220) What form serves as the destruction certificate for...
5. (201) Who is responsible for identifying cryptonet members?
10. (204) When a unit receives an unsatisfactory rating on a...
54. (020) An incident in which an Air Force computer, information...
7. (202) Who must sign all communications security manager (CAM)...
61. (025) Which form is used to annotate that storage media from an...
80. (029) Once it is filled out an AF Form 4170, Emission Security...
9. (204) Wing information assurance (IA) assessments are generally...
15. (207) For accountability purposes, store short-term keyed devices...
60. (227) What classification of communication security (COMSEC)...
66. (230) What is the classification of magnetic media used to...
60. (024) Which agency conducts assessments of wing information...
12. (205) How often does the communications security account manager...
16. (208) Which form do you use to document and annotate opening,...
30. (214) What type of incident includes the unauthorized disclosure...
80. (236) Which is not a flight phase that Flight Information...
27. (010) Networked resources must be consistently monitored and...
68. (026) When overwriting hard drives, you must examine no less than...
81. (030) How many steps are in the risk management framework process?
87. (031) Who is the connection approval authority for mission...
27. (212) What is the term used to identify the highest level of...
49. (220) What is the classification of the Standard Form (SF) 153...
67. (231) Which communication security (COMSEC) management software is...
56. (021) Who tracks Air Force information condition (INFOCON) status...
84. (030) How many steps are in the system development life cycle?
24. (008) Which organization is responsible for developing Air Force...
36. (013) Who initiates a local files check prior to allowing...
69. (232) Which communications security (COMSEC) management software...
76. (028) Equipment with an equipment radiation TEMPEST zone (ERTZ) of...
89. (032) Automated security incident measurement (ASIM) transcripts...
17. (208) Which form do you use to document when a safe or vault is...
35. (013) Who is the approval authority for foreign nationals to...
68. (231) Which communication security (COMSEC) management software...
70. (232) Which communications security (COMSEC) management software...
53. (020) An incident in which an unauthorized person gained...
3. (201) Who appoints a communications security responsible officer...
62. (228) Which type of National Security Agency (NSA)-approved...
21. (209) Who appoints a cryptographic access program (CAP)...
14. (206) Which form is used to document the highest level...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!