Quizzes
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
Business
›
Management
Z3d053 Ure Vol2
85 Questions
|
By Airman | Updated: Jul 6, 2017
| Attempts: 167
Share
Quiz
Flashcard
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 86
🏆
Rank #--
▾
0 %
0/100
Score
0/100
1.
23. (210) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?
A final security clearance.
An interim security clearance.
A clearance equal to the COMSEC being accessed.
A clearance higher than the COMSEC being accessed.
Submit
Start Quiz
About This Quiz
.
2.
What first name or nickname would you like us to use?
You may optionally provide this to label your report, leaderboard, or certificate.
2.
31. (214) What type of communications security (COMSEC) incident is any loss of control, theft, capture, recovery by salvage, tampering, unauthorized viewing, access, or photographing that has the potential to jeopardize COMSEC material?
Aircraft.
Physical.
Personnel.
Cryptographic.
Submit
3.
48. (220) Sign the communication security (COMSEC) material destruction record
Immediately after the material is destroyed.
Immediately before the material is destroyed.
Within 12 hours after the material is destroyed.
Within 12 hours before the material is destroyed.
Submit
4.
78. (235) What comm kit type do you build for emergency war orders (EWO)?
1
2
3
4
Submit
5.
6. (202) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?
Federal Aviation Administration (FAA).
Cryptologic Systems Division (CPSD).
National Security Agency (NSA).
Major command (MAJCOM).
Submit
6.
11. (205) Who performs the semiannual inspections and audits on the base communications security (COMSEC) account?
Communications security responsible officer (CRO).
Communications security account manager (CAM).
COMSEC accountant.
Security manager.
Submit
7.
19. (209) Which of the following requirements would make a person ineligible for the cryptographic access program (CAP)?
Hold an interim security clearance.
Have a final security clearance.
Be a DOD cleared contractor.
Be a US citizen.
Submit
8.
24. (210) How often should communications security (COMSEC) access lists be reviewed for accuracy?
Weekly.
Monthly.
Quarterly.
Annually.
Submit
9.
26. (211) At a minimum, how often must you review the communications security (COMSEC) access list?
Every week.
Every two weeks.
Once a month.
Every six months.
Submit
10.
28. (212) What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?
COMSEC incident.
COMSEC deviation.
COMSEC insecurity.
Practice dangerous to security (PDS).
Submit
11.
37. (216) When removing material from a communication security physical inventory (CPI), always annotate it by
Using red ink.
Using green ink.
Using correction fluid.
Writing a memorandum for record (MFR).
Submit
12.
38. (217) When you create a communication security physical inventory (CPI), you will need to include all of the following information except
Accounting legend code (ALC).
Edition.
Quantity.
Short title.
Submit
13.
39. (217) When you are sealing a package containing communications security (COMSEC) material where do you place your initials?
Upper right-hand corner.
Lower right-hand corner.
Bottom of envelope.
Across the seal.
Submit
14.
41. (218) Changes that must be made to material in communication security (COMSEC) publications are called
Modifications.
Amendments.
Corrections.
Updates.
Submit
15.
44. (219) Who may destroy communications security (COMSEC) material?
Communications security account manager (CAM) or any responsible person on the COMSECaccess list.
Communications security responsible officer (CRO).
Alternate CAM only.
CAM only.
Submit
16.
71. (233) Who provides formal classroom training to instruct aircrews on how to establish and maintain communications?
Pilots.
Communications security manager (CAM).
Information system security officer (ISSO).
Combat Crew Communications (CCC) technician.
Submit
17.
10. (204) When a unit receives an unsatisfactory rating on a communications security (COMSEC) inspection, the wing will reassess the unit within how many days?
30
45
60
90
Submit
18.
18. (208) Which form do you use to record the arrival or departure of all personnel not named on the facility authorized access list?
Standard Form (SF) 701.
SF 702.
AF Form 1109.
AFTO Form 36.
Submit
19.
22. (209) Who is responsible for overseeing the cryptographic access program (CAP) and providing written local procedures to the CAP administrator?
Security manager.
Unit commander.
Communications security account manager (CAM).
Communications security responsible officer (CRO).
Submit
20.
30. (214) What type of incident includes the unauthorized disclosure of communications security (COMSEC) information or material?
Physical.
Personnel.
Cryptographic.
Practice dangerous to security.
Submit
21.
34. (215) The rank requirement for an inquiry officer includes all of these except
Captain.
Master Sergeant.
Technical Sergeant.
GS–9.
Submit
22.
35. (215) Who completes an initial report for each communications security (COMSEC) incident?
Communications security account manager (CAM).
Communications security responsible officer (CRO).
Information assurance officer (IAO).
Responsible party.
Submit
23.
64. (229) The front of the KOK–22A device fill connector allows interface with which type of file devices?
DS–101 only.
DS–102 only.
DS–101 and DS–102.
All types of fill devices.
Submit
24.
2. (201) What allows one electronic key management system (EKMS) element to pass required information to another EKMS element enabling both elements to generate the same key session?
Communications security (COMSEC) account.
Firefly credentials.
Cryptoperiod.
Cryptonet.
Submit
25.
4. (201) Who assists the communications security account manager (CAM) with day-to-day administration and maintenance of accounting records for communications security (COMSEC) material?
Local communication security management system (LCMS) administrator.
Communications security responsible officer (CRO).
COMSEC accountant.
Controlling authorities.
Submit
26.
12. (205) How often does the communications security account manager (CAM) perform an assessment on the communications security responsible officer (CRO) communication security (COMSEC) account?
Monthly.
Quarterly.
Semiannually.
Yearly.
Submit
27.
13. (206) Qualified personnel perform preventative maintenance and security inspections on safes and vaults every
Two years.
Five years.
Two years for safes and five years for vaults.
Five years for safes and two years for vaults.
Submit
28.
54. (223) When you are performing courier duties and transporting bulky communication security (COMSEC) material through the airlines, when is it acceptable to leave the COMSEC material unattended?
Under no circumstances.
When it is in a baggage claim area.
When it is loaded on a cargo dock.
When it is passed on to authorized airport personnel.
Submit
29.
76. (235) Who is responsible for building, issuing, and recovering comm kits?
Pilots.
Communications security manager (CAM).
Information system security officer (ISSO).
Combat Crew Communications (CCC) technician.
Submit
30.
16. (208) Which form do you use to document and annotate opening, closing, and checking of any GSA-approved security container?
SF 700.
SF 701.
SF 702.
AF IMT 1109.
Submit
31.
1. (201) What is a collection of interoperable systems developed for the services and government agencies to automate handling and management of communications security (COMSEC) material?
Electronic key management system (EKMS).
COMSEC account.
Firefly credentials.
Cryptonet.
Submit
32.
8. (203) Who assists the communications security account manager (CAM) in his or her day-to-day duties?
Communications security responsible officer (CRO).
Communications access program (CAP) assistant.
Communications security accountant.
Security manager.
Submit
33.
15. (207) For accountability purposes, store short-term keyed devices in an approved container and account for the devices on a
Communications security physical inventory (CPI).
Electronic Key Management System (EKMS).
Standard Form (SF) 700, Security Container Information.
SF 702, Security Container Checklist.
Submit
34.
47. (220) What form serves as the destruction certificate for communication security (COMSEC) material?
Standard Form (SF) 153.
Air Force (AF) Form 1109.
Air Force Communications Security (AFCOMSEC) Form 9.
AFCOMSEC Form 16.
Submit
35.
50. (221) Two-person integrity (TPI) is the storage and handling system that prohibits access by any single person to what classification of communications security (COMSEC) material?
Top Secret (TS).
Secret.
Confidential.
Unclassified.
Submit
36.
63. (228) How often must local communications management software (LCMS) audit data be reviewed?
Daily.
Weekly.
Monthly
Quarterly.
Submit
37.
65. (229) On the back of the KOK–22A, which interface allows you to connect the serial input/output (I/O) port of the key processor (KP) to the serial I/O port of the controlling computer?
Black fill I/O.
Ground (GND) terminal.
RS–232 connector.
Ethernet connector.
Submit
38.
20. (209) Those not eligible to be enrolled in the cryptographic access program (CAP) are personnel
Assigned to communications security (COMSEC) accounts.
Who operate certification authority workstations (CAW).
With access to only Confidential cryptographic media.
Who perform duties as cryptographic maintenance, engineering or installation technicians.
Submit
39.
79. (235) Comm kits are normally contained in
3-part folders.
6-part folders.
3-ring binders.
6-ring binders.
Submit
40.
84. (236) What type of change notice is not scheduled and is only published as required to provide amendments for safety and flight information?
Urgent.
Enroute.
Planning.
Terminal.
Submit
41.
7. (202) Who must sign all communications security manager (CAM) waivers?
Unit commander.
Security manager.
Wing commander.
Communications security responsible officer (CRO).
Submit
42.
9. (204) Wing information assurance (IA) assessments are generally conducted every
Six months.
Year.
Two years.
Three years.
Submit
43.
33. (215) Within how many hours from the time a communications security (COMSEC) incident is discovered must a commander appoint an inquiry officer?
24
36
48
72
Submit
44.
36. (215) A communications security account manager (CAM) submits an amplifying report every how many days until the final report is submitted?
7
14
30
45
Submit
45.
42. (218) How many people are required to complete page replacements in unclassified communication security (COMSEC) publications?
One.
Two.
Three.
Four.
Submit
46.
43. (219) Who requests disposition instructions for communications security (COMSEC) material?
Unit commander.
COMSEC material user.
Communications security account manager (CAM).
Cryptographic access program (CAP) administrator.
Submit
47.
55. (224) How many times do you wrap communications security (COMSEC) material prior to transportation?
One.
Two.
Three.
Four.
Submit
48.
58. (226) Which statement is not accurate regarding firefly credentials?
They have a set cryptoperiod.
They have an expiration date.
They are valid for one month from the creation date.
They must be generated to successfully exchange keying material (KEYMAT).
Submit
49.
17. (208) Which form do you use to document when a safe or vault is put into use?
SF 701.
SF 702.
AF Form 1109.
AFTO Form 36.
Submit
50.
25. (210) At the base level, who initials the communications security (COMSEC) access list?
Communications security account manager (CAM).
Communications security responsible officer (CRO).
Base commander.
Base security manager.
Submit
51.
27. (212) What is the term used to identify the highest level of security lapse in handling communications security (COMSEC)?
COMSEC incident.
COMSEC deviation.
COMSEC insecurity.
Practice dangerous to security (PDS).
Submit
52.
51. (221) What provides the special protection of Top Secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening?
Two-person control (TPC).
Two-person integrity (TPI).
Cryptographic access program (CAP).
Communications security management system (CMS).
Submit
53.
72. (233) What squadron are Combat Crew Communications (CCC) units assigned to?
Training.
Communications.
Mission support.
Operations support.
Submit
54.
73. (234) Combat Crew Communications (CCC) Level 2 certification ensures personnel are qualified to support
Conventional missions.
Simulated missions.
Directed missions.
Nuclear missions.
Submit
55.
83. (236) Flight Information Handbooks (FIH) are issued every
6 weeks.
18 weeks.
32 weeks.
48 weeks.
Submit
56.
14. (206) Which form is used to document the highest level classification of a security container?
SF 700.
SF 702.
AF IMT 1109.
AFTO Form 36.
Submit
57.
29. (213) When an error or anomaly is detected upon receipt/inspection of communications security (COMSEC) material, who sends a message to DIRNSA/I31132?
Unit commander.
Security manager.
Communications security account manager (CAM).
Communication security responsible officer (CRO).
Submit
58.
32. (215) Report communications security (COMSEC) deviations and incidents immediately to all of these personnel except
Security manager.
Commander.
Communications security account manager (CAM).
Communications security responsible officer (CRO).
Submit
59.
3. (201) Who appoints a communications security responsible officer (CRO) to support a unit’s communications security (COMSEC) mission?
Communications security account manager (CAM).
Communications unit commander.
Supported unit commander.
Wing commander.
Submit
60.
53. (222) How many people are required to transport Top Secret (TS) keying material (KEYMAT) sealed in National Security Agency (NSA) protective packaging?
One.
Two.
Three.
Four.
Submit
61.
57. (225) What local communications security management software (LCMS) desktop function provides a user with the ability to securely pass information and/or transfer Electronic Key Management System (EKMS) messages/keys directly to other EKMS accounts?
X.400.
X.500.
Message.
Direct Comms.
Submit
62.
81. (236) Flight Information Publications (FLIP) are divided into how many geographical regions?
4
8
10
12
Submit
63.
59. (226) The simple key loader (SKL) is the replacement for which device?
Data transfer device (DTD).
Data management device (DMD).
Secure terminal equipment (STE).
Secure telephone unit-third generation (STU-III).
Submit
64.
5. (201) Who is responsible for identifying cryptonet members?
Local communication security management system (LCMS) administrator.
Communications security responsible officer (CRO).
Communications security (COMSEC) accountant.
Controlling authorities.
Submit
65.
66. (230) What is the classification of magnetic media used to transport encrypted key?
Top Secret.
Secret.
Confidential.
Unclassified.
Submit
66.
75. (234) Which code helps the Air Force identify special experience and training?
Air Force specialty code (AFSC).
Special experience identifiers (SEI).
Air Force career experience level code.
Commercial vendor certification identifier.
Submit
67.
82. (236) Which documents are designed to provide aircrews with information on radio navigation, departure, airway structure, approach and landing information?
Ariel and flight.
Enroute and terminal.
Departure and arrival.
Geographical and communications.
Submit
68.
46. (219) Which is not an authorized method to destroy key tapes?
Disintegrating.
Pulverizing.
Shredding.
Burning.
Submit
69.
52. (222) How many people must unwrap the inner wrapper of a top secret (TS) crypto package?
One.
Two.
Three.
Four.
Submit
70.
56. (224) Which method is not used to complete a bulk encrypted transaction (BET)?
X.400.
Floppy disk.
Direct communications.
Defense Courier Service (DCS).
Submit
71.
74. (234) Once entered into Combat Crew Communications (CCC) Level 1 certification training, how long does an active duty technician have to complete certification?
30 days.
60 days.
6 months.
1 year.
Submit
72.
80. (236) Which is not a flight phase that Flight Information Publications (FLIP) are aligned with?
Enroute.
Planning.
Terminal.
Approach.
Submit
73.
85. (236) Which squadron commander must be notified before outdated Flight Information Publications (FLIP) information is issued?
Communications.
Mission support.
Operations support.
Combat communications.
Submit
74.
61. (227) The local management device (LMD) supports or utilizes all of the following except
The Santa Cruz Operation (SCO) UNIX Open Server operating system.
Unencrypted keying material (KEYMAT).
Dial-up communications.
Encrypted KEYMAT.
Submit
75.
70. (232) Which communications security (COMSEC) management software does not allow an account to perform a semiannual inventory?
User application software (UAS).
Common user application software (CUAS).
Card loader user application software (CLUAS).
Local communications security management software (LCMS).
Submit
76.
45. (219) Which is not an authorized method for routinely destroying paper communications security (COMSEC) aids?
Disintegrating.
Pulverizing.
Burning.
Pulping.
Submit
77.
60. (227) What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?
Secret.
Crypto.
Top Secret.
Confidential.
Submit
78.
77. (235) Of the four types of comm kits you can build, which one includes the coverage period of the mission plus 3 days?
1
2
3
4
Submit
79.
40. (217) How often must a communications security account manager (CAM) review the communications security (COMSEC) physical inventory?
Once a month.
Every 3 months.
Every 6 months.
Every 12 months.
Submit
80.
21. (209) Who appoints a cryptographic access program (CAP) administrator?
Security manager.
Unit commander.
Communications security account manager (CAM).
Communications security responsible officer (CRO).
Submit
81.
67. (231) Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic keys as well as transfer physical and electronic keys to other COMSEC accounts?
User application software (UAS).
Common user application software (CUAS).
Card loader user application software (CLUAS).
Local communications security management software (LCMS).
Submit
82.
49. (220) What is the classification of the Standard Form (SF) 153 when the disposition record card (DRC) is attached?
Top Secret (TS).
Secret.
Confidential.
Unclassified.
Submit
83.
68. (231) Which communication security (COMSEC) management software allows a user to view the exact location of any COMSEC item held by the local account or a local element?
User application software (UAS).
Common user application software (CUAS).
Card loader user application software (CLUAS).
Local communication security management software (LCMS).
Submit
84.
69. (232) Which communications security (COMSEC) management software uses menus and submenus for necessary tasks?
User application software (UAS).
Common user application software (CUAS).
Card loader user application software (CLUAS).
Local communications security management software (LCMS).
Submit
85.
62. (228) Which type of National Security Agency (NSA)-approved encryption device does the local management device (LMD) use to communicate over a communications link?
Type I.
Type II.
Type III.
Type IV.
Submit
×
Thank you for your feedback!
View My Results
Related Quizzes
Diabetes Mellitus - Diagnosis To Management
Diabetes Mellitus - Diagnosis To Management
Introduction To Management Quiz With Answers!
Introduction To Management Quiz With Answers!
Business Administration Exam Practice Test
Business Administration Exam Practice Test
Business Partnership Quiz
Business Partnership Quiz
General Management MCQ Exam Quiz!
General Management MCQ Exam Quiz!
Test Your Business Management Skills With This Quiz
Test Your Business Management Skills With This Quiz
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (85)
Unanswered (
)
Answered (
)
23. (210) Which type of security clearance is not valid for personnel...
31. (214) What type of communications security (COMSEC) incident is...
48. (220) Sign the communication security (COMSEC) material...
78. (235) What comm kit type do you build for emergency war orders...
6. (202) Who requires that the communications security account manager...
11. (205) Who performs the semiannual inspections and audits on the...
19. (209) Which of the following requirements would make a person...
24. (210) How often should communications security (COMSEC) access...
26. (211) At a minimum, how often must you review the communications...
28. (212) What term is used to describe a communication security...
37. (216) When removing material from a communication security...
38. (217) When you create a communication security physical inventory...
39. (217) When you are sealing a package containing communications...
41. (218) Changes that must be made to material in communication...
44. (219) Who may destroy communications security (COMSEC) material?
71. (233) Who provides formal classroom training to instruct aircrews...
10. (204) When a unit receives an unsatisfactory rating on a...
18. (208) Which form do you use to record the arrival or departure of...
22. (209) Who is responsible for overseeing the cryptographic access...
30. (214) What type of incident includes the unauthorized disclosure...
34. (215) The rank requirement for an inquiry officer includes all of...
35. (215) Who completes an initial report for each communications...
64. (229) The front of the KOK–22A device fill connector allows...
2. (201) What allows one electronic key management system (EKMS)...
4. (201) Who assists the communications security account manager (CAM)...
12. (205) How often does the communications security account manager...
13. (206) Qualified personnel perform preventative maintenance and...
54. (223) When you are performing courier duties and transporting...
76. (235) Who is responsible for building, issuing, and recovering...
16. (208) Which form do you use to document and annotate opening,...
1. (201) What is a collection of interoperable systems developed for...
8. (203) Who assists the communications security account manager (CAM)...
15. (207) For accountability purposes, store short-term keyed devices...
47. (220) What form serves as the destruction certificate for...
50. (221) Two-person integrity (TPI) is the storage and handling...
63. (228) How often must local communications management software...
65. (229) On the back of the KOK–22A, which interface allows you to...
20. (209) Those not eligible to be enrolled in the cryptographic...
79. (235) Comm kits are normally contained in
84. (236) What type of change notice is not scheduled and is only...
7. (202) Who must sign all communications security manager (CAM)...
9. (204) Wing information assurance (IA) assessments are generally...
33. (215) Within how many hours from the time a communications...
36. (215) A communications security account manager (CAM) submits an...
42. (218) How many people are required to complete page replacements...
43. (219) Who requests disposition instructions for communications...
55. (224) How many times do you wrap communications security (COMSEC)...
58. (226) Which statement is not accurate regarding firefly...
17. (208) Which form do you use to document when a safe or vault is...
25. (210) At the base level, who initials the communications security...
27. (212) What is the term used to identify the highest level of...
51. (221) What provides the special protection of Top Secret (TS)...
72. (233) What squadron are Combat Crew Communications (CCC) units...
73. (234) Combat Crew Communications (CCC) Level 2 certification...
83. (236) Flight Information Handbooks (FIH) are issued every
14. (206) Which form is used to document the highest level...
29. (213) When an error or anomaly is detected upon receipt/inspection...
32. (215) Report communications security (COMSEC) deviations and...
3. (201) Who appoints a communications security responsible officer...
53. (222) How many people are required to transport Top Secret (TS)...
57. (225) What local communications security management software...
81. (236) Flight Information Publications (FLIP) are divided into how...
59. (226) The simple key loader (SKL) is the replacement for which...
5. (201) Who is responsible for identifying cryptonet members?
66. (230) What is the classification of magnetic media used to...
75. (234) Which code helps the Air Force identify special experience...
82. (236) Which documents are designed to provide aircrews with...
46. (219) Which is not an authorized method to destroy key tapes?
52. (222) How many people must unwrap the inner wrapper of a top...
56. (224) Which method is not used to complete a bulk encrypted...
74. (234) Once entered into Combat Crew Communications (CCC) Level 1...
80. (236) Which is not a flight phase that Flight Information...
85. (236) Which squadron commander must be notified before outdated...
61. (227) The local management device (LMD) supports or utilizes all...
70. (232) Which communications security (COMSEC) management software...
45. (219) Which is not an authorized method for routinely destroying...
60. (227) What classification of communication security (COMSEC)...
77. (235) Of the four types of comm kits you can build, which one...
40. (217) How often must a communications security account manager...
21. (209) Who appoints a cryptographic access program (CAP)...
67. (231) Which communication security (COMSEC) management software is...
49. (220) What is the classification of the Standard Form (SF) 153...
68. (231) Which communication security (COMSEC) management software...
69. (232) Which communications security (COMSEC) management software...
62. (228) Which type of National Security Agency (NSA)-approved...
X
OK
X
OK
Cancel
X
OK
Cancel
Your Rank: #-- / --
Leaderboard
✕