3C051 Set 2 Volume 1 Practice Test

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By A1cbecker
A
A1cbecker
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,176
Questions: 77 | Attempts: 439

SettingsSettingsSettings
Practice Test Quizzes & Trivia

Mixture of URES/Short Answer Questions for the first Volume.


Questions and Answers
  • 1. 

    What is the main goal of buffers?

    • A.

      Move Data

    • B.

      Send data through the CPU for higher performance

    • C.

      Temporarily hold data used by some types of hardware

    • D.

      Detect and Fix errors

    Correct Answer
    C. Temporarily hold data used by some types of hardware
    Explanation
    The main goal of buffers is to temporarily hold data used by some types of hardware. Buffers act as a temporary storage area that allows for smoother data flow between different components of a system. By temporarily holding data, buffers can help prevent data loss or corruption when there is a difference in the speed at which data is produced and consumed. This ensures that data is available when needed and can be processed at a consistent rate, improving overall system performance.

    Rate this question:

  • 2. 

    What static RAM (SRAM) uses special applications in a CPU?

    • A.

      CMOS

    • B.

      DDRAM

    • C.

      Cache

    • D.

      EEPROM

    Correct Answer
    C. Cache
    Explanation
    Cache memory is a type of static RAM (SRAM) that is used in special applications in a CPU. Cache memory is a high-speed memory that stores frequently accessed data and instructions, allowing the CPU to retrieve them quickly. By keeping this data closer to the CPU, cache memory helps to reduce the time it takes for the CPU to access the main memory. This improves overall system performance and efficiency. Therefore, cache memory is an important component in a CPU for optimizing data access and improving processing speed.

    Rate this question:

  • 3. 

    How long does static electricity stay intact?

    • A.

      48 Hours

    • B.

      Until power is removed from the device

    • C.

      Until something causes it to discharge

    • D.

      24 Hours

    Correct Answer
    C. Until something causes it to discharge
    Explanation
    Static electricity stays intact until something causes it to discharge. This means that the static charge remains until it is transferred or neutralized by coming into contact with a conductor or another object with a different charge. Once the discharge occurs, the static electricity is no longer present.

    Rate this question:

  • 4. 

    What is the easiest harware installation on a computer?

    • A.

      Video Card

    • B.

      Memory Chips

    • C.

      CPU

    • D.

      Motherboard

    Correct Answer
    B. Memory Chips
    Explanation
    Memory chips are the easiest hardware installation on a computer because they can be easily inserted into the memory slots on the motherboard. Unlike other hardware components such as the video card, CPU, or motherboard, memory chips do not require additional cables or connectors. They simply need to be properly aligned and firmly inserted into the memory slots. This process is relatively simple and can be done by most computer users without any technical expertise.

    Rate this question:

  • 5. 

    What is considered as nonvolatile memory?

    • A.

      Read-Only memory (ROM)

    • B.

      Basic input outpute system (BIOS)

    • C.

      CMOS

    • D.

      EEPROM

    Correct Answer
    A. Read-Only memory (ROM)
    Explanation
    Nonvolatile memory refers to a type of computer memory that retains its stored data even when the power is turned off or lost. Among the options provided, Read-Only Memory (ROM) is considered as nonvolatile memory. ROM is a type of memory that stores permanent data and instructions that cannot be modified or erased by normal computer operations. It is commonly used to store firmware, such as the BIOS, which is essential for booting up the computer. Unlike volatile memory, which loses its data when the power is turned off, ROM retains its contents, making it a nonvolatile memory option.

    Rate this question:

  • 6. 

    What is the first job the basic input output system does at start-up?

    • A.

      Run memory byte count

    • B.

      Run the power-on self-test

    • C.

      Load instructions into random access memory

    • D.

      Test for parity errors

    Correct Answer
    B. Run the power-on self-test
    Explanation
    The first job that the basic input output system (BIOS) does at start-up is to run the power-on self-test (POST). The POST is a series of diagnostic tests that the BIOS performs to check the hardware components of the computer system. It ensures that all essential hardware components are functioning properly before proceeding with the boot process. This helps in identifying any potential issues or errors that may prevent the system from starting up successfully.

    Rate this question:

  • 7. 

    Which original component was very susceptible to damage from electrostatic discharge?

    • A.

      Read-only memory (ROM)

    • B.

      Basic input output system (BIOS)

    • C.

      Electrically erasable programmable read-only memory (EEPROM)

    • D.

      Complementary metal-oxide semiconductor (CMOS)

    Correct Answer
    D. Complementary metal-oxide semiconductor (CMOS)
    Explanation
    The CMOS (Complementary metal-oxide semiconductor) is very susceptible to damage from electrostatic discharge. CMOS is a type of semiconductor technology used in microprocessors and other digital logic circuits. It is sensitive to static electricity, which can cause permanent damage to the component. Therefore, proper handling and precautions must be taken when working with CMOS to prevent electrostatic discharge.

    Rate this question:

  • 8. 

    Which component uses a lithium battey to maintain computer settings when power is removed?

    • A.

      Read-only memory (ROM

    • B.

      Basic input output system (BIOS)

    • C.

      Electrically erasable programmable read-only memory (EEPROM)

    • D.

      Complementary metal-oxide semiconductor (CMOS)

    Correct Answer
    D. Complementary metal-oxide semiconductor (CMOS)
    Explanation
    The CMOS (Complementary metal-oxide semiconductor) component uses a lithium battery to maintain computer settings when power is removed. CMOS is responsible for storing the BIOS (Basic input output system) settings, including date, time, and hardware configuration. The lithium battery provides a continuous power supply to the CMOS chip, ensuring that the settings are not lost when the computer is turned off or unplugged. This allows the computer to retain its configuration and settings even when not connected to a power source.

    Rate this question:

  • 9. 

    Actively sampling the status of an external device by a client program is known as...

    • A.

      Signaling

    • B.

      Polling

    • C.

      Processing

    • D.

      Multitasking

    Correct Answer
    B. Polling
    Explanation
    Polling refers to the process of actively sampling the status of an external device by a client program. In this method, the client program regularly checks the device to see if there is any new information or if any action needs to be taken. It is a common technique used in computer programming to interact with external hardware or devices.

    Rate this question:

  • 10. 

    What is a form of firmware that contains the computer's startup instructions?

    • A.

      CMOS

    • B.

      Cache

    • C.

      BIOS

    • D.

      EEPROM

    Correct Answer
    C. BIOS
    Explanation
    BIOS stands for Basic Input/Output System. It is a form of firmware that contains the computer's startup instructions. It is responsible for initializing and testing hardware components during the boot process, and it also provides a set of low-level software routines that allow the operating system to communicate with the hardware. The BIOS is stored on a chip on the motherboard and is essential for the computer to start up and function properly.

    Rate this question:

  • 11. 

    Which is a very simple example of an error detecting code?

    • A.

      Interrupt

    • B.

      Asynchronous

    • C.

      Data Integrity

    • D.

      Parity Bit

    Correct Answer
    D. Parity Bit
    Explanation
    A parity bit is a simple error detecting code that is commonly used in data communication. It is a single bit added to a binary code to ensure that the total number of 1s in the code is either even or odd. The receiver can then check the parity bit to detect if any errors occurred during transmission. If the number of 1s is different from what the parity bit indicates, an error is detected. Therefore, the parity bit is a very simple example of an error detecting code.

    Rate this question:

  • 12. 

    What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event?

    • A.

      Cache

    • B.

      Buffer

    • C.

      Interface

    • D.

      Interrupt

    Correct Answer
    D. Interrupt
    Explanation
    An interrupt is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event. It is a mechanism used by hardware devices to communicate with the CPU and request its attention. When an interrupt occurs, the CPU suspends its current execution and handles the interrupt request. This allows the CPU to prioritize and respond to different events or devices in a timely manner, ensuring efficient processing of tasks.

    Rate this question:

  • 13. 

    Which is a small, low-level program used by the computer operation system to interact with hardware devices?

    • A.

      BIOS

    • B.

      Driver

    • C.

      Parity

    • D.

      Interrupt

    Correct Answer
    B. Driver
    Explanation
    A driver is a small, low-level program used by the computer operating system to interact with hardware devices. It acts as a bridge between the hardware and the operating system, allowing the operating system to communicate with and control the hardware. Drivers are essential for the proper functioning of hardware devices, as they provide the necessary instructions and protocols for the operating system to utilize the hardware effectively.

    Rate this question:

  • 14. 

    Which term describes the data is whole or complete?

    • A.

      Driver

    • B.

      Parity bit

    • C.

      Data Integrity

    • D.

      Error correction

    Correct Answer
    C. Data Integrity
    Explanation
    Data integrity refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that the data is whole and complete, without any errors or inconsistencies. Data integrity is crucial in maintaining the quality and trustworthiness of data, especially in databases and information systems. It involves various measures and techniques to prevent data corruption, unauthorized modifications, or loss of data. Therefore, data integrity is the term that describes the data as whole or complete.

    Rate this question:

  • 15. 

    What component initializes communication with all hardware devices and sends a message if a keyboard or mouse is not found?

    • A.

      ROM

    • B.

      BIOS

    • C.

      CMOS

    • D.

      EEPROM

    Correct Answer
    B. BIOS
    Explanation
    BIOS, or Basic Input/Output System, is responsible for initializing communication with all hardware devices in a computer system. It performs a power-on self-test (POST) during the boot process and checks if all hardware components are functioning properly. If a keyboard or mouse is not found, BIOS sends an error message to the user. Therefore, BIOS is the correct answer for the given question.

    Rate this question:

  • 16. 

    On most modern computers, which has two or three levels of memory?

    • A.

      CMOS

    • B.

      Cache

    • C.

      DDRAM

    • D.

      EEPROM

    Correct Answer
    B. Cache
    Explanation
    Cache is the correct answer because most modern computers have two or three levels of memory, and cache is one of those levels. Cache memory is a small and fast memory that is closer to the CPU, allowing for quick access to frequently used data and instructions. It helps to improve the computer's overall performance by reducing the time it takes to retrieve data from the slower main memory.

    Rate this question:

  • 17. 

    What interrupt request (IRQ) line number is normally used for the floppy disk controller?

    • A.

      2

    • B.

      4

    • C.

      6

    • D.

      8

    Correct Answer
    C. 6
    Explanation
    The floppy disk controller typically uses IRQ line number 6. IRQ lines are used by devices to request the attention of the CPU. Each device is assigned a specific IRQ line number to avoid conflicts. In the case of the floppy disk controller, it commonly uses IRQ 6 to communicate with the CPU and handle disk operations.

    Rate this question:

  • 18. 

    What is the sudden and momentary electric current that flows between two objects at different electrical potentials?

    • A.

      Voltage

    • B.

      Amperage

    • C.

      Conductivity

    • D.

      Electrostatic discharge

    Correct Answer
    D. Electrostatic discharge
    Explanation
    Electrostatic discharge refers to the sudden and momentary electric current that occurs between two objects at different electrical potentials. This discharge happens when there is a buildup of static electricity on one object, and it is transferred to another object with a lower electrical potential. It can occur due to various reasons such as friction, contact, or separation of materials. This discharge can be hazardous and cause damage to electronic devices, which is why precautions such as grounding and using anti-static measures are necessary.

    Rate this question:

  • 19. 

    Static electricity remains intact until it is

    • A.

      Absorbed

    • B.

      Dissolved

    • C.

      Discharged

    • D.

      Neutrilized

    Correct Answer
    C. Discharged
    Explanation
    Static electricity remains intact until it is discharged. Discharging refers to the process of releasing or transferring the excess electric charge from an object to the ground or another object with a lower electric potential. When static electricity is discharged, the accumulation of electric charge is balanced, and the object returns to a neutral state. This can happen through various means, such as through contact with a conductor or through a spark or electric discharge. Once discharged, the object no longer carries a static electric charge.

    Rate this question:

  • 20. 

    Under what class of electrostatic discharge (ESD) would an item fall if it was sensitive to 900 volts?

    • A.

      I

    • B.

      II

    • C.

      III

    • D.

      IV

    Correct Answer
    A. I
    Explanation
    Class I of electrostatic discharge (ESD) refers to items that are sensitive to voltages below 1000 volts. Since the item in question is sensitive to 900 volts, it falls under Class I.

    Rate this question:

  • 21. 

    Electrostatic discharge (ESD) items sensitive to more than 4000 but less than 15000 volts fall into category

    • A.

      I

    • B.

      II

    • C.

      IV

    • D.

      III

    Correct Answer
    D. III
    Explanation
    Items that are sensitive to more than 4000 but less than 15000 volts fall into category III.

    Rate this question:

  • 22. 

    What measure would you take to prevent the build up of static electricity?

    • A.

      Ground the electrostatic discharge sensitive devices

    • B.

      Check the relative humidity level

    • C.

      Disconnect the circuit from the device

    • D.

      Turn the power switch to the off position

    Correct Answer
    A. Ground the electrostatic discharge sensitive devices
    Explanation
    To prevent the build-up of static electricity, grounding the electrostatic discharge sensitive devices is necessary. This is because grounding provides a pathway for the static electricity to flow into the ground, preventing it from accumulating on the devices. By doing so, the risk of damaging the devices or causing a discharge that could harm individuals or disrupt the operation of electronic equipment is minimized. Checking the relative humidity level, disconnecting the circuit from the device, or turning the power switch to the off position may not directly address the issue of static electricity build-up.

    Rate this question:

  • 23. 

    In which troubleshooting step would you review the case history and assure no steps were missed?

    • A.

      Define the problem

    • B.

      Isolate the problem

    • C.

      Resolve the problem

    • D.

      Confirm the resolution

    Correct Answer
    D. Confirm the resolution
    Explanation
    In the troubleshooting process, reviewing the case history and ensuring that no steps were missed is done in the step of confirming the resolution. This step is taken after the problem has been resolved, and it involves double-checking the actions taken and the results achieved to ensure that the issue has been completely resolved. By reviewing the case history, the technician can verify that all necessary steps were taken and that no important details were overlooked, providing assurance that the problem has been effectively addressed.

    Rate this question:

  • 24. 

    Normally the last step in the boot up process is

    • A.

      The keyboard lights should flash

    • B.

      A memory test should be visible on the monitor

    • C.

      The hard disk drive access light should come on briefly

    • D.

      The operating system (OS) loads into memory and user interface appears

    Correct Answer
    D. The operating system (OS) loads into memory and user interface appears
    Explanation
    After the computer goes through the initial steps of the boot up process, such as the keyboard lights flashing and the memory test being visible on the monitor, the next and final step is for the operating system (OS) to load into memory. Once this happens, the user interface appears, allowing the user to interact with the computer and access its features and functions.

    Rate this question:

  • 25. 

    What is normally the next step in the boot up process after initial power is applied?

    • A.

      The keyboard lights should flash

    • B.

      A memory test should be visible on the minitor

    • C.

      The hard disk drive access light should come on briefly

    • D.

      The operation system loads into memory and user interface appears

    Correct Answer
    A. The keyboard lights should flash
    Explanation
    After initial power is applied, the next step in the boot-up process is for the keyboard lights to flash. This is a common indication that the computer is receiving power and initializing its hardware components. It does not necessarily mean that the operating system has loaded or that the user interface is visible.

    Rate this question:

  • 26. 

    What is the first step you must take when either installing or removing an electrostatic discharge sensitive (ESDS) device?

    • A.

      Ground the ESDS device

    • B.

      Check the relative humidity level

    • C.

      Disconnect the circuit from the device

    • D.

      Turn the power switch to the off position

    Correct Answer
    D. Turn the power switch to the off position
    Explanation
    When either installing or removing an electrostatic discharge sensitive (ESDS) device, the first step you must take is to turn the power switch to the off position. This is important to ensure that there is no electrical current flowing through the device, reducing the risk of electrostatic discharge and potential damage to the device. Grounding the ESDS device, checking the relative humidity level, and disconnecting the circuit from the device may be necessary steps in the process, but they should be done after turning off the power switch.

    Rate this question:

  • 27. 

    The process of collecting and analyzing data to determine the cause of an operational failure and how to prevent it from recurring is called

    • A.

      Event evaluation

    • B.

      Fault isolation

    • C.

      Process investigation

    • D.

      Analytical consideration

    Correct Answer
    B. Fault isolation
    Explanation
    Fault isolation is the correct answer because it refers to the process of collecting and analyzing data to determine the cause of an operational failure and how to prevent it from recurring. This involves identifying and isolating the specific fault or problem that led to the failure, in order to address it effectively and prevent it from happening again in the future.

    Rate this question:

  • 28. 

    In which troubleshooting step would you identify likely causes and eliminate unlikely causes?

    • A.

      Define the problem

    • B.

      Isolate the problem

    • C.

      Resolve the problem

    • D.

      Confirm the resolution

    Correct Answer
    C. Resolve the problem
    Explanation
    In the troubleshooting step of "Resolve the problem," you would identify likely causes and eliminate unlikely causes. This step involves analyzing the information gathered during the previous steps, such as defining and isolating the problem, to determine the root cause of the issue. By identifying the likely causes, you can focus on finding a solution that addresses those specific causes, while eliminating unlikely causes helps narrow down the potential solutions and prevents wasting time and resources on unnecessary troubleshooting steps.

    Rate this question:

  • 29. 

    In which troubleshooting step would you determine which conditions are present?

    • A.

      Define the problem

    • B.

      Isolate the problem

    • C.

      Resolve the problem

    • D.

      Confirm the resolution

    Correct Answer
    A. Define the problem
    Explanation
    In the troubleshooting step of "Define the problem," you would determine which conditions are present. This step involves gathering information about the issue, identifying any symptoms or error messages, and understanding the current state of the problem. By defining the problem, you can analyze the conditions that led to the issue and start formulating a plan to resolve it.

    Rate this question:

  • 30. 

    What is normally the next step in the boot up process after the basic input output system (BIOS) message appears on the monitor?

    • A.

      The keyboard lights should flash

    • B.

      A memory test should be visible on the monitor

    • C.

      The hard disk drive access light should come on briefly

    • D.

      The operating system (OS) loads into memory and the user interface appears

    Correct Answer
    B. A memory test should be visible on the monitor
    Explanation
    After the BIOS message appears on the monitor, the next step in the boot up process is usually a memory test being visible on the monitor. This test checks the computer's RAM (Random Access Memory) to ensure that it is functioning properly. It is an important step in the boot up process as it helps identify any potential issues with the computer's memory.

    Rate this question:

  • 31. 

    When troubleshooting hardware, one simple method of identifying cables is to

    • A.

      Review the schemantic diagram for errors

    • B.

      Make a complete drawing of all components

    • C.

      Call the manufacturer and speak to customer service

    • D.

      Place masking tape to the cables and connection points

    Correct Answer
    D. Place masking tape to the cables and connection points
    Explanation
    Placing masking tape on the cables and connection points is a simple method of identifying cables when troubleshooting hardware. This allows for easy identification and organization of the cables, making it easier to track and troubleshoot any issues. It also helps prevent confusion and ensures that the cables are properly connected.

    Rate this question:

  • 32. 

    After receiving their initial educations in COMSEC account management, how often must CRO's trained to remain qualified to manage their account?

    • A.

      Quarterly

    • B.

      Semi-annually

    • C.

      Annually

    • D.

      Biennially

    Correct Answer
    C. Annually
    Explanation
    CROs must receive their initial education in COMSEC account management. After that, they need to undergo training annually to remain qualified to manage their account. This ensures that they stay up to date with the latest practices and regulations in the field.

    Rate this question:

  • 33. 

    In which troubleshooting step would you confirm a dilemma exists?

    • A.

      Resolve the problem

    • B.

      Define the problem

    • C.

      Isolate the problem

    • D.

      Confirm the resolution

    Correct Answer
    C. Isolate the problem
    Explanation
    In the troubleshooting process, isolating the problem is the step where you confirm that a dilemma exists. This step involves identifying the specific issue or malfunction and separating it from other potential causes or factors. By isolating the problem, you can focus on finding a solution for that particular issue, rather than wasting time and effort on unrelated factors. Therefore, confirming the existence of the dilemma is an essential part of the isolation step in troubleshooting.

    Rate this question:

  • 34. 

    Who has the authority to approve waivers that are mission justified?

    • A.

      COMSEC Manager

    • B.

      Unit Commander

    • C.

      Wing Commander

    • D.

      Wing commanders with approval of COMSEC managers

    Correct Answer
    B. Unit Commander
    Explanation
    The Unit Commander has the authority to approve waivers that are mission justified. This means that they have the power to grant exceptions or exemptions to certain rules or requirements if they are necessary for the successful completion of a mission. This authority is specific to the Unit Commander and is not shared with other individuals or higher-ranking officials such as the COMSEC Manager or Wing Commander.

    Rate this question:

  • 35. 

    To enrure CRO's are complying with applicable directives and accounting for COMSEC material under their control, the COMSEC manager is required to inspect their accounts at least

    • A.

      Monthly

    • B.

      Quarterly

    • C.

      Semi-annually

    • D.

      Annually

    Correct Answer
    C. Semi-annually
    Explanation
    The COMSEC manager is responsible for ensuring that CRO's (Custodial Responsible Officers) are following the necessary directives and properly accounting for COMSEC (Communications Security) material. To fulfill this responsibility, the COMSEC manager is required to inspect the CRO's accounts on a semi-annual basis. This means that the inspections should occur twice a year, providing regular oversight and ensuring compliance with the applicable directives.

    Rate this question:

  • 36. 

    What rank must primary communications security responsible officers hold?

    • A.

      SSgt

    • B.

      TSgt

    • C.

      MSgt

    • D.

      Capt

    Correct Answer
    A. SSgt
    Explanation
    Primary communications security responsible officers must hold the rank of SSgt.

    Rate this question:

  • 37. 

    Who is responsible for the production and management of cryptographic material within the US government?

    • A.

      Director National Security Agency (DIRNSA)

    • B.

      HQ USAF/SCX

    • C.

      Air Force Communications Agency (AFCA)

    • D.

      Cryptologic Support Group (CPSG)

    Correct Answer
    A. Director National Security Agency (DIRNSA)
    Explanation
    The Director of the National Security Agency (DIRNSA) is responsible for the production and management of cryptographic material within the US government. The NSA is an intelligence agency that is responsible for collecting and analyzing foreign communications and protecting US government communications and information systems. As the head of the NSA, the DIRNSA oversees the development and implementation of cryptographic systems and protocols to ensure the security of sensitive information.

    Rate this question:

  • 38. 

    The operational use and control of COMSEC material is overseen and managed by

    • A.

      A controlling authority

    • B.

      A COMSEC manager

    • C.

      An installation commander

    • D.

      A cryptologic support group (CPSG)

    Correct Answer
    A. A controlling authority
    Explanation
    A controlling authority is responsible for overseeing and managing the operational use and control of COMSEC material. This means that they have the authority to ensure that proper procedures and protocols are followed in order to protect sensitive information and prevent unauthorized access. They play a crucial role in maintaining the security and integrity of COMSEC material and ensuring that it is used in accordance with established guidelines and regulations.

    Rate this question:

  • 39. 

    What can detect if a central processing unit (CPU) hardware problem exists?

    • A.

      Event Evaluation

    • B.

      Power-on-Self-test (POST)

    • C.

      Process investigation

    • D.

      Analytical consideration

    Correct Answer
    B. Power-on-Self-test (POST)
    Explanation
    The Power-on-Self-test (POST) is a diagnostic program that runs when a computer is turned on to check if all the hardware components, including the CPU, are functioning properly. It detects any hardware problems in the CPU by running a series of tests to ensure that all the components are working correctly. Therefore, the POST is specifically designed to detect if a CPU hardware problem exists.

    Rate this question:

  • 40. 

    What is the classification of the combination to any security container?

    • A.

      Not classified

    • B.

      Always classified for official user only (FOUO)

    • C.

      Always classified confidential

    • D.

      Always classified to the highest classification of the material within the container

    Correct Answer
    D. Always classified to the highest classification of the material within the container
    Explanation
    The correct answer is always classified to the highest classification of the material within the container. This means that the combination to any security container is always classified at the same level as the highest classified material that is stored within the container. This ensures that the container provides the appropriate level of protection for the sensitive information or materials it contains.

    Rate this question:

  • 41. 

    This COMSEC material requires the most strenuous accounting practices by using an accounting control number

    • A.

      Accounting legend code (ALC)-1

    • B.

      ALC-2

    • C.

      ALC-3

    • D.

      ALC-4

    Correct Answer
    A. Accounting legend code (ALC)-1
    Explanation
    This COMSEC material requires the most strenuous accounting practices by using an accounting control number. The answer "Accounting legend code (ALC)-1" suggests that ALC-1 is the specific accounting control number that should be used for this COMSEC material. This indicates that the material is of high importance and requires strict accounting procedures to ensure its security and proper handling.

    Rate this question:

  • 42. 

    This COMSEC material is accounted for continuously by quanity

    • A.

      Accounting Legend Code (ALC)-1

    • B.

      ALC-2

    • C.

      ALC-3

    • D.

      ALC-4

    Correct Answer
    B. ALC-2
    Explanation
    ALC-2 is the correct answer because it indicates that the COMSEC material is accounted for continuously by quantity. The other accounting legend codes (ALC-1, ALC-3, and ALC-4) do not specify continuous accounting by quantity.

    Rate this question:

  • 43. 

    This COMSEC material is NOT required to be tracked on the daily or shift inventory

    • A.

      ALC-1

    • B.

      ALC-2

    • C.

      ALC-3

    • D.

      ALC-4

    Correct Answer
    D. ALC-4
    Explanation
    The correct answer is ALC-4. This COMSEC material is not required to be tracked on the daily or shift inventory. This suggests that ALC-4 is either not considered as important or its tracking is not necessary for the daily or shift operations.

    Rate this question:

  • 44. 

    AFCOMSEC Form 16 inventories are retained for the current inventory plus how many previous months of inventory?

    • A.

      1

    • B.

      3

    • C.

      6

    • D.

      12

    Correct Answer
    C. 6
    Explanation
    AFCOMSEC Form 16 inventories are retained for the current inventory plus the previous 6 months of inventory. This means that the form includes information on the current inventory as well as the inventory from the past 6 months. This allows for a comprehensive record of inventory to be kept and helps in tracking any changes or discrepancies over time.

    Rate this question:

  • 45. 

    This form is considered a daily physical security inventory for your enviroment

    • A.

      SF700

    • B.

      SF701

    • C.

      SF702

    • D.

      SF703

    Correct Answer
    B. SF701
    Explanation
    SF701 is considered a daily physical security inventory for your environment. This form is used to document and track the physical security measures in place, such as locks, alarms, and access controls. By conducting a daily inventory using SF701, you can ensure that all security measures are functioning properly and identify any potential vulnerabilities or issues that need to be addressed. This helps to maintain a secure environment and protect against unauthorized access or breaches.

    Rate this question:

  • 46. 

    At a MINIMUM, how often do you change a cipher lock combination?

    • A.

      Monthly

    • B.

      Quarterly

    • C.

      Annually

    • D.

      Bi-annually

    Correct Answer
    A. Monthly
    Explanation
    It is recommended to change a cipher lock combination at least once a month to ensure maximum security. Regularly changing the combination reduces the risk of unauthorized access as it limits the time frame for someone to potentially figure out the current combination. This frequent change also prevents any potential security breaches or compromises that may occur over a longer period of time.

    Rate this question:

  • 47. 

    What form do you fill out and affix to the inside of the locking drawer when you change a safe combination

    • A.

      SF700

    • B.

      SF701

    • C.

      SF702

    • D.

      SF703

    Correct Answer
    A. SF700
    Explanation
    When changing a safe combination, you need to fill out and affix the SF700 form to the inside of the locking drawer.

    Rate this question:

  • 48. 

    What is the preferred method for listing material on the Air Force COMSEC Form 16?

    • A.

      By shelf arrangement

    • B.

      By drawer arrangement

    • C.

      Alphabetically by edition

    • D.

      Alphabetcally by short title

    Correct Answer
    D. AlpHabetcally by short title
    Explanation
    The preferred method for listing material on the Air Force COMSEC Form 16 is alphabetically by short title. This means that the materials should be organized and listed in alphabetical order based on their short titles. This method allows for easy and efficient referencing and retrieval of the materials when needed.

    Rate this question:

  • 49. 

    If it is physically impossible to conduct an inventory of a user because of dinstance, the COMSEC manager

    • A.

      Requests TDY orders from CPSG

    • B.

      Requests special TDY orders from MAJCOM

    • C.

      Conducts the inventory with the user by telephone

    • D.

      Asks the user to verify his or her holding by letter or message

    Correct Answer
    D. Asks the user to verify his or her holding by letter or message
    Explanation
    If it is physically impossible to conduct an inventory of a user because of distance, the COMSEC manager would ask the user to verify his or her holding by letter or message. This method allows the COMSEC manager to obtain the necessary information from the user without physically being present. It is a practical solution when conducting an inventory in person is not feasible due to distance constraints.

    Rate this question:

  • 50. 

    The individual who is required to use and safeguard COMSEC aids while performing official duties is the

    • A.

      User

    • B.

      Manager

    • C.

      Account Manager

    • D.

      Responsible Officer

    Correct Answer
    A. User
    Explanation
    The individual who is required to use and safeguard COMSEC aids while performing official duties is the user. This means that the person is responsible for utilizing and protecting communication security equipment and materials in their role. They must follow proper procedures and protocols to ensure the confidentiality and integrity of sensitive information. The user plays a crucial role in maintaining the security of communication systems and preventing unauthorized access or disclosure.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 01, 2010
    Quiz Created by
    A1cbecker
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.