3C051 CDC Vol. 1

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By 72jmpmaster
7
72jmpmaster
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,942
| Attempts: 1,116
SettingsSettings
Please wait...
  • 1/73 Questions

    (005) What can detect if central processing unit (CPU) hardware problem exist?

    • Event evaluation
    • Power-on-self-test (POST)
    • Process investigation
    • Analytical consideration
Please wait...
About This Quiz

This is all URE questions from Volume 1 of the 3C051 CDC (As of 2009)

CDC Quizzes & Trivia

Quiz Preview

  • 2. 

    (006) What is the classification of the combination to any security container?

    • Not classified

    • Always classified for official use only (FOUO)

    • Always classified confidential

    • Always classified to the highest classification of material within the container

    Correct Answer
    A. Always classified to the highest classification of material within the container
    Explanation
    The correct answer is always classified to the highest classification of material within the container. This means that regardless of the individual classifications of the items within the security container, the combination itself is considered to have the highest level of classification among them. This ensures that the container remains secure and protected, even if the items within it have varying levels of sensitivity.

    Rate this question:

  • 3. 

    (020) What phase is concerned with exercises to ensure you are familiar with the deployment process and with your equipment?

    • Deployment

    • Re-deployment

    • Predeployment

    • Reconstitution

    Correct Answer
    A. Predeployment
    Explanation
    Predeployment is the phase that focuses on conducting exercises to ensure familiarity with the deployment process and equipment. This phase is crucial in preparing individuals or teams for deployment, as it allows them to practice and become comfortable with the necessary procedures and equipment before actually being deployed. By going through these exercises, individuals can identify any potential issues or challenges that may arise during deployment and address them beforehand, ultimately improving the overall effectiveness and efficiency of the deployment process.

    Rate this question:

  • 4. 

    (001) Actively sampling the status of an external device by a client program is know as

    • Polling

    • Signaling

    • Processing

    • Multitasking

    Correct Answer
    A. Polling
    Explanation
    Polling refers to the act of actively sampling the status of an external device by a client program. This means that the client program regularly checks the device to see if there are any updates or changes in its status. It is a common method used to communicate with external devices and gather information from them. This process allows the client program to stay updated with the current state of the device and take appropriate actions based on the received information.

    Rate this question:

  • 5. 

    (003) Static electricity remains intact until it is

    • Absorbed

    • Dissolved

    • Discharged

    • Neutralized

    Correct Answer
    A. Discharged
    Explanation
    Static electricity remains intact until it is discharged. When an object becomes charged with static electricity, it has an excess or deficiency of electrons. These charges build up on the surface of the object and create an imbalance. Discharging the static electricity means allowing the excess or deficiency of electrons to flow between objects, restoring balance. This can be done through various means, such as grounding the object or connecting it to a conductor. Once discharged, the object will no longer have a build-up of static electricity.

    Rate this question:

  • 6. 

    (005) When troubleshooting hardware, one simple method of identifying cables is to

    • Review the schematic diagram for errors

    • Make a complete drawing of all the components

    • Call the manufacturer and speak to customer service

    • Place masking tape to the cables and connection points

    Correct Answer
    A. Place masking tape to the cables and connection points
    Explanation
    One simple method of identifying cables when troubleshooting hardware is to place masking tape on the cables and connection points. This can help in keeping track of which cables are connected to which components, making it easier to identify and troubleshoot any issues. This method is cost-effective and easy to implement, requiring minimal additional equipment or resources. Additionally, the masking tape can be easily removed once the troubleshooting process is complete, leaving no permanent marks or damage.

    Rate this question:

  • 7. 

    (006) What rank must primary communications security responsible officers (CRO) hold? 

    • SSgt

    • TSgt

    • MSgt

    • Capt

    Correct Answer
    A. SSgt
    Explanation
    Primary Communications Security Responsible Officers (CRO) must hold the rank of SSgt. This indicates that they should be at the Staff Sergeant level in order to be responsible for primary communications security.

    Rate this question:

  • 8. 

    (002) What component initializes communication with all hardware devices and sends a message if a keyboard or mouse is not found?

    • Read-only memory (ROM)

    • Basic input output system (BIOS)

    • Complementary metal-oxide semiconductor (CMOS)

    • Electrically erasable programmable read-only memory (EEPROM)

    Correct Answer
    A. Basic input output system (BIOS)
    Explanation
    The correct answer is BIOS. The BIOS is responsible for initializing communication with all hardware devices during the boot process. It also performs a power-on self-test (POST) to check if all hardware components are functioning properly. If a keyboard or mouse is not found, the BIOS will send an error message to alert the user. ROM, CMOS, and EEPROM are all types of memory storage used in computer systems, but they do not specifically handle hardware initialization or error detection.

    Rate this question:

  • 9. 

    (001) Which component uses a lithium battery to maintain computer settings when power is removed?

    • Read-only memory (ROM).

    • Basic input/output system (BIOS).

    • Complementary metal-oxide semiconductor (CMOS).

    • Electrically erasable programmable read-only memory (EEPROM).

    Correct Answer
    A. Complementary metal-oxide semiconductor (CMOS).
    Explanation
    The correct answer is Complementary metal-oxide semiconductor (CMOS). CMOS uses a lithium battery to maintain computer settings when power is removed. CMOS is a type of memory that stores the computer's BIOS settings, such as the date and time, boot sequence, and hardware configuration. The lithium battery provides backup power to the CMOS chip, ensuring that these settings are not lost when the computer is turned off or unplugged.

    Rate this question:

  • 10. 

    (004) Normally the last step in the boot up process is

    • The keyboard lights should flash

    • A memory test should be visible on the monitor

    • The hard drive access light should come on briefly

    • The operating system (OS) loads into memory and user interface appears

    Correct Answer
    A. The operating system (OS) loads into memory and user interface appears
    Explanation
    The last step in the boot up process is when the operating system (OS) loads into memory and the user interface appears. This is the final stage where the computer's software is loaded and ready for the user to interact with. The other options mentioned, such as the keyboard lights flashing, the memory test being visible on the monitor, and the hard drive access light coming on briefly, may occur earlier in the boot up process but do not represent the final step.

    Rate this question:

  • 11. 

    (001) What is the first job the basic input/output system (BIOS) does at start up?

    • Run memory byte count.

    • Test for parity errors.

    • Load instructions to random access memory (RAM).

    • Run the power-on self-test.

    Correct Answer
    A. Run the power-on self-test.
    Explanation
    The first job of the basic input/output system (BIOS) at start-up is to run the power-on self-test. This test checks the hardware components of the computer to ensure they are functioning properly. It helps in identifying any errors or issues that may prevent the computer from starting up successfully. Once the power-on self-test is completed, the BIOS moves on to other tasks such as loading instructions to random access memory (RAM) and initializing the hardware devices.

    Rate this question:

  • 12. 

    (002) What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?

    • Cache

    • Buffer

    • Interface

    • Interrupt

    Correct Answer
    A. Interrupt
    Explanation
    An interrupt is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event. It is a mechanism that allows hardware devices to communicate with the CPU and request its attention. When an interrupt occurs, the CPU suspends its current task and transfers control to a specific interrupt handler routine to handle the requested action. This allows for efficient multitasking and responsiveness in computer systems.

    Rate this question:

  • 13. 

    (002) What is considered as a technique or method of checking data?

    • Asynchronous

    • Parity bit

    • Interrupt

    • Fault

    Correct Answer
    A. Parity bit
    Explanation
    A parity bit is a technique used to check data by adding an extra bit to a binary code. This bit is set to either 0 or 1, depending on whether the number of 1s in the code is even or odd. When the data is received, the parity bit is checked to ensure that the number of 1s is still even or odd. If it doesn't match, it indicates that an error has occurred during transmission. Therefore, a parity bit is considered a technique or method of checking data for errors.

    Rate this question:

  • 14. 

    (003) What measure would you take to prevent the build up of static electricity?

    • Ground the electrostatic discharge sensitive (ESDS) device

    • Check the relative humidity

    • Disconnect the circuit from the device

    • Turn the power switch to the off position

    Correct Answer
    A. Ground the electrostatic discharge sensitive (ESDS) device
    Explanation
    To prevent the build-up of static electricity, grounding the electrostatic discharge sensitive (ESDS) device is the correct measure to take. Grounding helps to dissipate any static charge that may have built up on the device, preventing potential damage or interference. By providing a path for the static charge to flow into the ground, the ESDS device remains protected. Checking the relative humidity, disconnecting the circuit from the device, or turning the power switch off may not directly address the issue of static electricity build-up.

    Rate this question:

  • 15. 

    (006) This communications security (COMSEC) material requires the most strenuous accounting practices by using an accounting control number

    • Accounting legend code (ALC)-1

    • ALC-2

    • ALC-3

    • ALC-4

    Correct Answer
    A. Accounting legend code (ALC)-1
    Explanation
    This communications security (COMSEC) material requires the most strenuous accounting practices by using an accounting control number. The correct answer, accounting legend code (ALC)-1, indicates that this code is the most stringent and requires the highest level of accountability and control.

    Rate this question:

  • 16. 

    (020) Who should you notify immediately of any predeployment shortfalls?

    • Manpower and equipment monitor

    • Manager of deployable communications

    • Unit deployment manager and commander

    • Initial communications support monitor

    Correct Answer
    A. Unit deployment manager and commander
    Explanation
    The unit deployment manager and commander should be notified immediately of any predeployment shortfalls. This is because they are responsible for overseeing the deployment process and ensuring that all necessary resources, including manpower and equipment, are available. By notifying them, they can take appropriate action to address any shortfalls and ensure a successful deployment. The manpower and equipment monitor, manager of deployable communications, and initial communications support monitor may also play a role in addressing the shortfalls, but the unit deployment manager and commander have the overall authority and responsibility.

    Rate this question:

  • 17. 

    (003) What is the sudden and momentary electric current that flows between two objects at different electrical potentials?

    • Voltage

    • Amperage

    • Conductivity

    • Electrostatic discharge

    Correct Answer
    A. Electrostatic discharge
    Explanation
    Electrostatic discharge refers to the sudden and momentary electric current that occurs between two objects at different electrical potentials. This discharge happens when there is a buildup of static electricity on one object and it is discharged to another object with a lower electrical potential. This can happen when objects are rubbed together or when there is a sudden change in electrical potential. Electrostatic discharge can cause damage to electronic devices and can also be felt as a small shock when touching certain objects.

    Rate this question:

  • 18. 

    (004) The process of collecting and analyzing data to determine the cause of an operational failure and how to prevent it from recurring is called

    • Fault isolation

    • Event evaluation

    • Process investigation

    • Analytical consideration

    Correct Answer
    A. Fault isolation
    Explanation
    Fault isolation is the correct answer because it refers to the process of identifying and resolving the cause of an operational failure. This involves collecting and analyzing data to determine the root cause of the failure and implementing measures to prevent it from happening again in the future. Fault isolation is an important step in troubleshooting and improving system reliability.

    Rate this question:

  • 19. 

    (004) What is normally the next step in the boot up process after initial power is applied?

    • The keyboard lights should flash

    • A memory test should be visible on the monitor

    • The hard drive access light should come on briefly

    • The operating system (OS) loads into memory and user interface appears

    Correct Answer
    A. The keyboard lights should flash
    Explanation
    After initial power is applied, the keyboard lights should flash. This is a common step in the boot up process known as the Power-On Self-Test (POST). During the POST, the computer checks the hardware components to ensure they are functioning properly. The flashing keyboard lights indicate that the computer is performing this test. Once the POST is completed successfully, the boot process continues with other steps such as loading the operating system into memory and displaying the user interface.

    Rate this question:

  • 20. 

    (008) What is the preferred method for listing material on the Air Force communications security (AFCOMSEC) Form 16?

    • By shelf arrangement

    • By drawer arrangement

    • Alphabetically by edition

    • Alphabetically by short title

    Correct Answer
    A. Alphabetically by short title
    Explanation
    The preferred method for listing material on the AFCOMSEC Form 16 is alphabetically by short title. This means that the materials will be organized in alphabetical order based on their short titles, making it easier to locate specific items on the form. This method ensures that the form is well-organized and allows for efficient retrieval of information when needed.

    Rate this question:

  • 21. 

    (018) What theater deployable communications (TDC) characteristic requires equipment be capable of operation/maintenance by personnel wearing nuclear, biological, and chemical protective gear?

    • Mobility

    • Survivability

    • Interoperability

    • Open systems standard

    Correct Answer
    A. Survivability
    Explanation
    The characteristic of survivability in theater deployable communications (TDC) requires equipment to be capable of operation and maintenance by personnel wearing nuclear, biological, and chemical protective gear. This means that the equipment should be able to function effectively even in hazardous environments where such protective gear is necessary. This ensures that communication capabilities can be maintained and sustained in potentially dangerous situations, enhancing the overall survivability of the communication system.

    Rate this question:

  • 22. 

    (001) What is considered as nonvolatile permanent memory?

    • Read-only memory (ROM).

    • Basic input/output system (BIOS).

    • Complementary metal-oxide semiconductor (CMOS).

    • Electrically erasable programmable read-only memory (EEPROM).

    Correct Answer
    A. Read-only memory (ROM).
    Explanation
    ROM is considered as nonvolatile permanent memory because it retains its data even when the power is turned off. Unlike other types of memory, such as RAM, ROM is not affected by power loss or restarts. It contains pre-programmed data that cannot be modified or erased by normal computer operations. This makes ROM ideal for storing firmware, operating systems, and other essential software that need to be permanently stored and accessed by the computer. Therefore, ROM is the correct answer for the question.

    Rate this question:

  • 23. 

    (002) Which term describes that data is whole or complete?

    • Driver

    • Parity bit

    • Data integrity

    • Error correction

    Correct Answer
    A. Data integrity
    Explanation
    Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that data is whole and complete, without any unauthorized modifications or corruption. Data integrity measures, such as checksums and hashing algorithms, are used to verify the integrity of data during storage, transmission, and processing. By maintaining data integrity, organizations can trust that their data is reliable and can make informed decisions based on it.

    Rate this question:

  • 24. 

    (002) Which is a small, low-level program used by the computer operating system to interact with hardware devices?

    • Basic input output system (BIOS)

    • Driver

    • Parity

    • Interrupt

    Correct Answer
    A. Driver
    Explanation
    A driver is a small, low-level program used by the computer operating system to interact with hardware devices. It acts as a bridge between the operating system and the hardware, allowing the operating system to send commands and receive data from the hardware. Without drivers, the operating system would not be able to communicate effectively with the hardware devices, resulting in them being unusable. Drivers are essential for the proper functioning of hardware devices in a computer system.

    Rate this question:

  • 25. 

    (003) Under what class of electrostatic discharge (ESD) would an item fall if it was sensitive to 900 volts?

    • I

    • II

    • III

    • IV

    Correct Answer
    A. I
    Explanation
    An item that is sensitive to 900 volts would fall under Class I of electrostatic discharge (ESD). Class I ESD sensitivity refers to items that can be damaged by a discharge of less than 100 volts. Since 900 volts is significantly higher than 100 volts, it falls within the Class I category.

    Rate this question:

  • 26. 

    (008) If it is physically impossible to conduct an inventory of a user because of distance, the communications security (COMSEC) manager

    • Requests special temporary duty (TDY) orders from combat support group (CSGP)

    • Requests special TDY orders from major command (MAJCOM)

    • Conducts the inventory with the user by telephone

    • Asks the user to verify his or her holding by letter or message

    Correct Answer
    A. Asks the user to verify his or her holding by letter or message
    Explanation
    The correct answer is "asks the user to verify his or her holding by letter or message." In situations where it is physically impossible to conduct an inventory of a user due to distance, the communications security (COMSEC) manager would request the user to verify their holding by sending a letter or message. This allows the COMSEC manager to ensure that the user still has possession of the necessary equipment or materials without the need for physical presence.

    Rate this question:

  • 27. 

    (001) On most modern computers, which has two or three levels of memory?

    • Complementary metal-oxide semiconductor (CMOS).

    • Cache.

    • Double Data Random Access Memory (DDRAM).

    • Electrically erasable programmable read-only memory (EEPROM).

    Correct Answer
    A. Cache.
    Explanation
    Cache is the correct answer because most modern computers have two or three levels of memory, with cache being one of them. Cache memory is a type of high-speed memory that stores frequently accessed data and instructions, allowing the computer to access them quickly. It acts as a buffer between the processor and main memory, improving overall system performance by reducing the time it takes to retrieve data from the main memory. Therefore, cache memory plays a crucial role in enhancing the computer's speed and efficiency.

    Rate this question:

  • 28. 

    (001) What is a form of firmware that contains the computer's startup instructions?

    • Basic input/output system (BIOS).

    • Complementary metal-oxide semiconductor (CMOS).

    • Cache.

    • Electrically erasable programmable read-only memory (EEPROM).

    Correct Answer
    A. Basic input/output system (BIOS).
    Explanation
    The correct answer is Basic input/output system (BIOS). BIOS is a form of firmware that contains the computer's startup instructions. It is responsible for initializing and testing hardware components during the boot process. It also provides a bridge between the hardware and the operating system, allowing the computer to communicate with the various components. CMOS, cache, and EEPROM are all different types of memory or storage technologies and are not specifically related to the computer's startup instructions.

    Rate this question:

  • 29. 

    (003) Electrostatic discharge (ESD) items sensitive to more than 4,000 but less than 15,000 volts fall into category

    • I

    • II

    • III

    • IV

    Correct Answer
    A. III
    Explanation
    Electrostatic discharge (ESD) items that are sensitive to more than 4,000 but less than 15,000 volts fall into category III. This means that these items have a moderate sensitivity to ESD and require appropriate precautions to prevent damage.

    Rate this question:

  • 30. 

    (003) What is the first step you must take when either installing or removing an electrostatic discharge sensitive device (ESDS)?

    • Ground the ESDS device

    • Check the relative humidity level

    • Disconnect the circuit from the device

    • Turn the power switch to the off position

    Correct Answer
    A. Turn the power switch to the off position
    Explanation
    When either installing or removing an electrostatic discharge sensitive device (ESDS), the first step you must take is to turn the power switch to the off position. This is important to ensure that there is no electrical current flowing through the device, reducing the risk of electrostatic discharge that could damage the sensitive components. Grounding the ESDS device, checking the relative humidity level, and disconnecting the circuit from the device may be necessary steps in the overall process, but they are not the first step.

    Rate this question:

  • 31. 

    (011) What is the maximum number of different actions that can be accomplished on a single standard form (SF) 153?

    • 1

    • 2

    • 3

    • 4

    Correct Answer
    A. 1
  • 32. 

    (009) The individual who is required to use and safeguard communications security (COMSEC) aids while performing officail duties is the

    • User

    • Manager

    • Account manager

    • Responsible officer

    Correct Answer
    A. User
    Explanation
    The individual who is required to use and safeguard communications security (COMSEC) aids while performing official duties is the "user." This person is responsible for properly utilizing and protecting COMSEC equipment and information in order to maintain the security and confidentiality of communications. They are expected to follow established protocols and procedures to ensure that sensitive information is not compromised.

    Rate this question:

  • 33. 

    (009) What is the term used when referring to specific communications security (COMSEC) material other than equipment?

    • Aids

    • Entities

    • Supplies

    • Materials

    Correct Answer
    A. Aids
    Explanation
    The term used when referring to specific communications security (COMSEC) material other than equipment is "aids". This term encompasses various tools, documents, or resources that assist in the implementation and maintenance of COMSEC measures. These aids may include encryption algorithms, key management systems, authentication protocols, or other related materials that support secure communication.

    Rate this question:

  • 34. 

    (010) Disposition records and/or destruction reports are not required for material that has been issued to

    • North Atlantic Treaty Organization (NATO) forces

    • Transient aircrews

    • Base communications security (COMSEC) account itself

    • Joint military operations

    Correct Answer
    A. Transient aircrews
    Explanation
    Disposition records and destruction reports are not required for material that has been issued to transient aircrews. This means that when material is given to temporary or short-term aircrews, there is no need to keep records of what happened to the material or report its destruction. This is because transient aircrews are not responsible for the long-term maintenance or accountability of the material, as they are only temporarily using it.

    Rate this question:

  • 35. 

    (002) What interrupt request (IRQ) line number is normally used for the floppy disk controller?

    • 2

    • 4

    • 6

    • 8

    Correct Answer
    A. 6
    Explanation
    The floppy disk controller typically uses IRQ line number 6. IRQ (Interrupt Request) lines are used by devices to request the attention of the CPU. Each device is assigned a specific IRQ line, and in the case of the floppy disk controller, it is usually assigned to IRQ line 6. This allows the controller to interrupt the CPU when it needs to transfer data to or from the floppy disk.

    Rate this question:

  • 36. 

    (004) In which troubleshooting step would you review the case history and assure no steps were missed?

    • Define the problem

    • Isolate the problem

    • Resolve the problem

    • Confirm the resolution

    Correct Answer
    A. Confirm the resolution
    Explanation
    In the troubleshooting process, after resolving the problem, the next step is to confirm the resolution. This step involves reviewing the case history to ensure that all necessary steps were taken and no steps were missed during the troubleshooting process. It is important to confirm the resolution to ensure that the problem has been fully resolved and that there are no further issues or steps that need to be addressed.

    Rate this question:

  • 37. 

    (004) What is normally the next step in the boot up process after the basic input output system (BIOS) message appears on the monitor?

    • The keyboard lights should flash

    • A memory test should be visible on the monitor

    • The hard drive access light should come on briefly

    • The operating system (OS) loads into memory and user interface appears

    Correct Answer
    A. A memory test should be visible on the monitor
    Explanation
    After the BIOS message appears on the monitor, the next step in the boot up process is typically a memory test being visible on the monitor. This test checks the integrity and functionality of the computer's memory modules. It helps ensure that the memory is working properly before the operating system is loaded into memory and the user interface appears.

    Rate this question:

  • 38. 

    (010) In which phase does the communication security (COMSEC) manager determine which materials the communications security responsible (CRO) officer needs?

    • Protection

    • Preparation

    • Distribution

    • Administration

    Correct Answer
    A. Preparation
    Explanation
    In the preparation phase, the communication security (COMSEC) manager determines which materials the communications security responsible (CRO) officer needs. This phase involves gathering and organizing the necessary resources and materials to ensure secure communication. It is during this phase that the COMSEC manager assesses the specific requirements and responsibilities of the CRO officer and identifies the materials that will be required to fulfill those responsibilities effectively.

    Rate this question:

  • 39. 

    (013) Failure to comply with an urgent dissemination message could constitute in what kind of violation?

    • Failure to respond

    • Withdrawn from use

    • Long delay in pickup

    • Cryptographic incident

    Correct Answer
    A. Cryptographic incident
    Explanation
    Failure to comply with an urgent dissemination message could constitute a cryptographic incident. This means that not following the instructions or failing to take immediate action in response to the message could result in a breach or compromise of cryptographic security measures. It is important to promptly and appropriately respond to such messages to ensure the integrity and confidentiality of sensitive information.

    Rate this question:

  • 40. 

    (002) Which is a very simple example of an error detecting code?

    • Interrupt

    • Parity bit

    • Asyncronous

    • Data integrity

    Correct Answer
    A. Parity bit
    Explanation
    A parity bit is a simple error detecting code that is commonly used in data transmission. It is a single bit that is added to a binary code to ensure that the total number of 1s in the code is either even or odd. By checking the parity bit, errors in transmission can be detected. This makes the parity bit a very simple example of an error detecting code.

    Rate this question:

  • 41. 

    (004) In which troubleshooting step would you determine which conditions are present?

    • Define the problem

    • Isolate the problem

    • Resolve the problem

    • Confirm the resolution

    Correct Answer
    A. Define the problem
    Explanation
    In the troubleshooting process, the step of defining the problem involves gathering information and identifying the symptoms or issues that need to be resolved. In this step, the focus is on understanding the conditions or factors contributing to the problem. By determining which conditions are present, it becomes easier to narrow down the potential causes and develop an effective solution. Therefore, in the given question, the correct answer of "define the problem" aligns with the step of determining the conditions that are present.

    Rate this question:

  • 42. 

    (006) This communications security (COMSEC) material is not required to be tracked on the daily or shift inventory

    • Accounting legend code (ALC)-1

    • ALC-2

    • ALC-3

    • ALC-4

    Correct Answer
    A. ALC-4
    Explanation
    ALC-4 is the correct answer because it indicates that the communications security material mentioned in the question does not need to be tracked on a daily or shift inventory. ALC-4 suggests that this material is not considered crucial or high-risk, and therefore does not require the same level of tracking and accountability as materials labeled with ALC-1, ALC-2, or ALC-3.

    Rate this question:

  • 43. 

    (007) This form is considered a daily physical security inventory for your environment

    • Standard Form (SF) 700

    • SF701

    • SF702

    • SF703

    Correct Answer
    A. SF701
    Explanation
    The SF701 form is considered a daily physical security inventory for your environment. It is used to record the presence and condition of security measures such as locks, alarms, and surveillance systems on a daily basis. This form helps to ensure that all security measures are in place and functioning properly, reducing the risk of unauthorized access or security breaches.

    Rate this question:

  • 44. 

    (006) After receiving their initial educations in communications security (COMSEC) account management, how often must communications security responsible officer's (CRO) be trained to remain qualified to mange their account?

    • Quarterly

    • Semi-annually

    • Annually

    • Biennially

    Correct Answer
    A. Annually
    Explanation
    Communications security responsible officers (CRO) must be trained annually to remain qualified to manage their account. This training ensures that they stay up to date with the latest practices and procedures in communications security (COMSEC) account management. By receiving annual training, CROs can effectively fulfill their responsibilities and maintain the security of their accounts throughout the year. Quarterly, semi-annually, and biennially training intervals would not provide the same level of ongoing knowledge and skills development that is necessary for this role. Therefore, the correct answer is annually.

    Rate this question:

  • 45. 

    (008) Air Force communications security (AFCOMSEC) Form 16 inventories are retained for the current inventory plus how many previous months of inventory?

    • 1

    • 3

    • 6

    • 12

    Correct Answer
    A. 6
    Explanation
    AFCOMSEC Form 16 inventories are retained for the current inventory plus the previous six months of inventory. This means that the records are kept for a total of seven months. This allows for easy tracking and monitoring of communication security equipment and materials over a significant period of time.

    Rate this question:

  • 46. 

    (011) What term suggests movement of material from one place to another by someone with an active interest in that material?

    • Carrier

    • Transfer

    • Transport

    • Shipment

    Correct Answer
    A. Transport
    Explanation
    Transport suggests movement of material from one place to another by someone with an active interest in that material. It implies the action of physically moving goods or people from one location to another using various modes of transportation such as trucks, trains, ships, or airplanes. The term "transport" emphasizes the active involvement of a person or organization in the process of moving the material.

    Rate this question:

  • 47. 

    (012) In which folder of the communications security (COMSEC) account 6-part folder are destruction certificates filed?

    • 1

    • 2

    • 4

    • 6

    Correct Answer
    A. 6
    Explanation
    In the communications security (COMSEC) account 6-part folder, destruction certificates are filed in folder number 6.

    Rate this question:

  • 48. 

    (006) Who is responsible for the production and management of crytographic material within the US Government?

    • Director National Security Agency (DIRNSA)

    • HQ USAF/SCX

    • Air Force Communications Agency (AFCA)

    • Cryptologic support group (CPSG)

    Correct Answer
    A. Director National Security Agency (DIRNSA)
    Explanation
    The Director of the National Security Agency (DIRNSA) is responsible for the production and management of cryptographic material within the US Government. The National Security Agency (NSA) is the primary intelligence agency responsible for cryptography and signals intelligence in the United States. As the director of this agency, the DIRNSA oversees and coordinates the development, implementation, and management of cryptographic material to ensure the security of communication and information systems used by the US Government.

    Rate this question:

  • 49. 

    (007) At a minimum, how often do you change a cipher lock combination?

    • Monthly

    • Quarterly

    • Annually

    • Bi-annually

    Correct Answer
    A. Monthly
    Explanation
    A cipher lock combination should be changed at a minimum of once a month. This frequent change helps to maintain a high level of security by preventing unauthorized access. Changing the combination regularly reduces the chances of someone figuring out the code and gaining entry. It also ensures that any individuals who previously had access to the combination but should no longer have it, are unable to use it. Regularly changing the cipher lock combination is a proactive measure to enhance security.

    Rate this question:

Quiz Review Timeline (Updated): Mar 18, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 18, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Sep 01, 2009
    Quiz Created by
    72jmpmaster
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.