Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
287 Cards in this Set
- Front
- Back
What AFI series covers communications and information?
|
33
|
|
What Air Force publication establishes policy on how C4 systems are acuired, operated, and maintained?
|
AFPD 33--1
|
|
What Air Force publication identifies responsibilities for supporting critical Air Force communications and information networks, primarily through NCCs?
|
AFI 33-115, Vol 1
|
|
What Air Force publication provides the policy and procedures for certifying network professionals who manage and operate government-provided information systems on Air Force networks?
|
AFI 33-115, Vol 2
|
|
What organization does communication and information services entering and exiting the base or site fall under the oeprational control of?
|
Base NCC
|
|
What function within the NCC provides technical assistance to the unit functional system administrators and workgroup managers?
|
Network administration
|
|
Whose network area of responsibility starts at the user's terminal and ends at the server, but does NOT include the network backbone infrastructure components?
|
unit functional systems administrator
|
|
what AFI sets the policies that unit client support administrators must comply with?
|
AFI 33-115
|
|
What NCC function responds to detected security incidents, network faults (errors), and user reported outages at the time of help desk referral?
|
Network management
|
|
What NCC function is the central point of contact for network distribution and maintenance/update of an Air Force Computer Emergency Response Team and automated systems security and antivirus software?
|
Configuration management
|
|
Performance management can be broken into which two separate functional categories?
|
Monitoring and tuning
|
|
To determine the level of network service provided to users, you will make a measurement of the total response time
|
rejection rate and availability of the network.
|
|
What NCC function increases network responsibility by giving the network manager tools to detect problems and initiate recovery procedures?
|
Fault management
|
|
What does Network Security work to ensure about a network?
|
Availability, confidentiality, and integrity of data
|
|
What jobs are performed by a help desk technician on a daily basis?
|
Network monitoring, account unlocks, and account creations
|
|
With in the NCC, what function is initially responsible for taking trouble calls, decidin what type of problem has occurred, and what to do about the problem?
|
Help desk
|
|
What is one of the most important communications skills you can develop as a help desk operator?
|
Listening
|
|
What software is used to open trouble tickets for customer trouble calls?
|
Remedy
|
|
What are a set of subnets that are connected with routers?
|
Internetwork
|
|
What is a set of systems/nodes on a local segment that can be off of a switch or a router?
|
Intranetwork
|
|
What type of network environments consists of computer systems from different vendors that run different operating systems and communication protocols?
|
Heterogeneous network
|
|
What type of network is made up of componets from the same vendor or compatible equipemnt that all run under the same operating system ro network operating system?
|
Homogeneous network
|
|
What type of communications network serves users within a confined geographical area?
|
Local area network
|
|
What type of communications network links geographically dispersed offices in other cities or around the globe?
|
Wide are network
|
|
How many users ar in a peer-to-peer network?
|
2 to 10
|
|
How many users are in a single-server network?
|
10 to 50
|
|
How many users are in a multi-server high-speed backbone network?
|
250 to 1000
|
|
In most cases the frequencies used by wireless networks are in what frequency band?
|
Industrial, scientific, and medical (ISM)
|
|
What is the distorting and/or weakeing of a signal as it traverses the media called?
|
Attenuation
|
|
What is a measurement of data transferred through the media between network connections?
|
Throughput
|
|
What is a form of communications that transmits information as a serial stream of bits or bytes?
|
Asynchronous communication
|
|
What categoy of twisted-pair cables has the highest throughput?
|
Cat 5
|
|
A fiber optic network uses a laser or light-emitting diode to send a signal through what portion of the cable?
|
Core
|
|
Light signals in fiber optic cables can travel distances in excess of how many miles before they need to be boosted?
|
100
|
|
What type of otic fiber is used to span extremely long distances?
|
Single mode
|
|
What type of optic fiber is designed for the LAN environment and light is typically generated with an LED?
|
Multi mode
|
|
What are the principle advantages of fiber otics with present day transmission technologies?
|
Sturdiness and security
|
|
What network topology consists of a single central cable to which all computers and other devices connect?
|
Bus
|
|
What is the greatest risk to a bus network?
|
The bus itself can beome inoperable
|
|
On what netwrok topology, can multiple transmit frames co-exist?
|
Fiber Distributed Data Interface
|
|
hat is the major DOD contribution to networking?
|
The TCP/IP Suite
|
|
What is a set of rules tha tdefine how communications are to take place in a network, including the format, timing, sequences, and error checking and correction?
|
Protocol
|
|
What layer of the OSI model is really a set of rules regarding the hardware used to transmit data?
|
Physical
|
|
What layer of the OSI model provides the grammar by which machines converse with each other and serves as a vehicle for the information transmission?
|
Data Link
|
|
What layer of the OSI model prevents a fast computer from overwhelming a slow terminal?
|
Transport
|
|
A feature which involves the periodic insertion of points into data from which any recovery necessary can be started is known as what?
|
Checkpointing
|
|
Which layer of the OSI model is connected with network security, file transfers, and formatting functions?
|
Presentation
|
|
The IEEE 802.3 standard describes a local area network using what kind of topology?
|
Bus
|
|
What protocol is used by the IEEE 802.3 standard to avoid collisions on the network?
|
Carrier Sense Multiple Access/Collision Detection
|
|
What does a station specifically send when it sends a general request through the network asking any station to respond to receive the token?
|
Solicit successor frame
|
|
The IEEE 802.5 standard was developed to cover what local area network topology?
|
Token Ring
|
|
Why can a token rink network cover a greater distance than a token bus network without loss of signal?
|
Because each workstation repeats the signal
|
|
What X series protocol is a Message Handling System (MHS) standard, that defines the structure of a store-and-forward e-mail message handling system?
|
X.400
|
|
What X series protocol is a Directory Services specification standard that defines the structure of a store-and-forward e-mail MHS?
|
X.500
|
|
Which protocol of TCP/IP provides a connectionless datagram "network access" layer?
|
Internet Protocol
|
|
Which protocol of TCP/IP is a connection oriented, reliable, host-to-host transport protocol?
|
Transmission Control Protocol
|
|
What makes it possible for implementers to produce new NFS systems without having to reconstruct their own system's internal data representation formats to suit NFS?
|
eXternal data representation
|
|
As information passes down trhought the protocol layers, what is the packet that is formed called?
|
Protocol data unit
|
|
What is the only layer inthe OSI model that simply transmits the completed frame?
|
Physical
|
|
What layer of the OSI model adds a trailerto the packet?
|
Data Link
|
|
In the Ethernet environment, what is the minimum number of octetsin a frame so it can be sent and recieved?
|
46
|
|
What is used to identify network nodes on a physically connected network?
|
Media access control address
|
|
How many octes is the standard Internet Protocol broken down into?
|
4
|
|
What type of mask is used within a network that uses the same amount of bits for masking for all subnetworks?
|
Standard
|
|
What communications device converts binary electrical signals into acoustic sigals for transmission over telephone lines?
|
Modem
|
|
What communications device is used for converting analog signals to digital for transmission o digital lines?
|
Codecs
|
|
What NIC module drives the signal onto and from the physical medium?
|
Transmit/Receive
|
|
What NIC module converts information into a coded data stream?
|
Encode/Decode
|
|
What NIC module temporarily holds data for processing to or from the network?
|
Frame Buffering
|
|
What network component serves as a central connecting point and is used to extend the physical media by repeating the signal it receives in one port out to all the other ports indiscriminately?
|
Hub
|
|
What type of hub has special capabilities for configurations and or management?
|
An intelligent hub
|
|
What network condition usually begins slowly and (if not stopped) gradually grows in severity until all traffic flow on the network is effectively stopped?
|
Broadcast storm
|
|
What is a group of devices connected to the same physical media such that if two devices access the media at the same time, the result is a collision of the two signals?
|
A collision domain
|
|
The purpose of a network repeater is that it
|
regenerates any signal received.
|
|
What is a local area network connection dvice with two or more ports that forwards frames from one LAN segment to another?
|
Bridge
|
|
What are the four basic functions of bridge?
|
Listen, learn, filter, forward
|
|
Bidging loops are created when
|
there is more than one path to the destination.
|
|
What is used to logically eliminate loops within a network?
|
Spanning Tree Algorithm
|
|
The bridge in a network with the highest priority (the lowest number) is called the
|
root
|
|
Switching conducted at the layer 2 cetegory is based soley upon what information?
|
The MAC address
|
|
Switching conducted at the layer 3 category is based upon what information?
|
the MAC and IP address
|
|
What type of switch is limited in its applications to small workgroups where throughput is an issue but where protential network errors will not upset the network?
|
Cut through
|
|
What type of switch reads the first 64 bytes before forwarding the frame?
|
Fragment free
|
|
What is the technology called that allows NIC to determine the type of Ethernet signal transmitted by a device at the other end and adjust its speed to the highest common speed between the two devices?
|
Auto negotiation
|
|
What is a logical grouping of end stations, independent of physical location, with a common set of requirements called?
|
Virtual local area network
|
|
What is the most common method of defining Virtual local area network memebership?
|
Port grouping
|
|
At what level of the OSI model does a router work?
|
Network
|
|
What is the primary device used for connecting these networks, both within and between networks?
|
Router
|
|
The function performed by a router to move information from one router to another according to decided path determinations is
|
switching (book)
routing (answer sheet) |
|
What type of routing is the establishment of routes by the network administrator that changes only whne done manaually?
|
Static routing
|
|
What type of routing involves the use of routing protocols that adjust real-time to changing network circumstances?
|
Dynamic routing
|
|
In what Dynamic Routing Protocol must packets go the complete distance before discovering the destination is unreachable?
|
Distance Vectoring
|
|
What routing metric is generally based upon the bit-error rate of the link?
|
Reliability
|
|
What prevents a router from sending route information back to the router from which it came?
|
Split horizons
|
|
What acts as a translator between two workstations or networks that use different operating systems, communications protocols, and data format structures?
|
Gateway
|
|
Where is the backup copy of the Cisco Internet Operating System configuration information stored in the internetworking device?
|
Nonvolatile RAM
|
|
What are the network connections trhough which network traffic enters and exits a router called?
|
Interfaces
|
|
What prompt is displayed when in the User Exec mode on a router?
|
Router>
|
|
What prompt is displayed when in the Privileged Exec mode on a router?
|
Router#
|
|
From what level can all other command modes be accessed?
|
Privileged Exec level
|
|
From what mode is the banner motd command used in?
|
Global configuration mode
|
|
What command is used to restrict access to the Privileged Exec mode?
|
Enable password
|
|
What command interface configuration command is used to activate an interface?
|
No shutdown
|
|
To view the current configuration of a router, what command is used from privileged exec mode?
|
Show running
|
|
What command is used to change the bootup values within ROM monitor mode?
|
Confreg
|
|
What filters network traffic by controlling whether routed packets are forwarded or blocked at a router's interface?
|
Access control lists
|
|
What do all acces lists end with?
|
Implicit deny
|
|
Router access lists must be applied to
|
interfaces.
|
|
What does a standard access list use to filter packets?
|
Source IP address
|
|
What is the range of number that represents standard access lists?
|
1-99
|
|
What kind of server is set aside to perform a specific task or function all the time?
|
Dedicated server
|
|
What network type normally untilies non-dedicated servers?
|
Peer-to-peer
|
|
What is required to do the differences between the physical speed of the print device and the processing speed of the worststaion generating the print job?
|
Print qeues
|
|
What frees the computer's attention so the user can continue working while waiting for a document to print?
|
Print spooling
|
|
What type of server is a bundle of application software designed to significanlty improve netwrok efficiency and productivity?
|
Network Management System
|
|
What two type of environments are newtork operating systems implemented upon?
|
Peer-to-peer and client server
|
|
Within the Windows environment, what is the central repository for the entrie software and hardware configuration settings in a computer running the Windows based NT operating system?
|
Registry
|
|
What is a set of keys, subkeys, and values fromt he registry stored in its own file locations called?
|
Hive
|
|
Fsys in ehivh tooy-key determines which device drivers and services will load during the boot process?
|
HKEY_LOCAL_MACHINE
|
|
What is a set of statistical measurements made over a period of time that characterizes network performance?
|
Baseline
|
|
What is a detailed analysis of the performance of a specific application or a specific network element?
|
Benchmark
|
|
What network performance criteria is the most significant statistc to be collected and calculated?
|
Network availability
|
|
The measurement of traffic volume actually being carreid by the network typically expressed in kilobytes per second is
|
data throughput.
|
|
What is defined as a bundle of application software disgned to significantly improve network efficiency and productivity?
|
Network management server
|
|
What are the three most common network managment architectures?
|
Centralized, hierarical, and distributed
|
|
What network managment architecture has an NM platform on one computer system at a location that is responsible for all NM duties?
|
Centralized
|
|
What network managment architecture uses multiple systems, with one system acting as a central server and the others working as clients?
|
Hierarchical
|
|
At what level of network managment activity are you working when you, as the network manager, are moonitoring and troubleshooting components to eliminate the side-effect alarms and isolate problems to a root cause?
|
Interactive
|
|
At what level of network managment activity are you working when the automated monitoring of components provides problem analysis, giving a root cuase alarm for the problme at hand?
|
Proactive
|
|
Gathering information about current network device settings is a step of what functional network managment area?
|
Configuration managment
|
|
What are the two functional categories of performance management?
|
Monitoring and tuning
|
|
Which functional category of performance management tracks historical data by tracking activities on the network?
|
Security management
|
|
What is established to distinguish between errors that fall within a normal range and excessive errors because of a fault?
|
Tolerance parameters
|
|
network managment protocols are designed (in most cases) tp reside above what layer of the OSI model?
|
Session
|
|
What is a hierarchical, structured format that defines the network managment informaiton available from network devices?
|
Management information base
|
|
Which category of SNMP node is responsible for monitoring, collecting and reporting managment data to the managment system?
|
Agent
|
|
What SNMP operational message retrieves the value of one instance of management information?
|
Get
|
|
What type of SNMP node is responsbile for to authenticate logons for clients by validating the supplied username and password against the account in the database?
|
Domain controllers
|
|
In the event that a domain controller is no longer functioning, what action is taken to make another DC take over the responsibility?
|
No action is required
|
|
What type of network server is dedicated to an intensive application or database?
|
Member server
|
|
What protocol is used primarily to obtain connectivity to the large base of Novell NetWare clients?
|
IPX/SPX
|
|
What network protocol is used for network connection of HP network printers?
|
Data link control protocol
|
|
Why are users required to change thier passwords upon logging onto the network for the first time?
|
To ensure users don't creat vulnerability by leaving the default password in place.
|
|
For user accounts with elevated privileges, such as client support administrator, what are the correct number and type of characters needed for the account password?
|
Minimum of 15 characters, 2 upper and lowercase letters, 2 numbers, and 2 special characters
|
|
Which groups scope allows member permissions to be assigned in any domain or forest?
|
Universal
|
|
What defines the rules by which operations can be performed on a particular resource?
|
Permissions
|
|
What is used to verify the level of availablity an individual has to the resource?
|
Access control list
|
|
What file permission provides a user with the ability to change file permissions and take ownership of files on new technology file system volumes?
|
Full control
|
|
What permission always overrides all other permissions assigned to a user or group to which the user belongs?
|
No access
|
|
When a volume is formatted with new technology file system, what group is automatically assigned full control permission to the volume?
|
Everyone group
|
|
When a new folder or file is created on a new technology file system partition, what permissions are automatically assigned?
|
Inherited permissions of the folder it is contained in.
|
|
An administrator would normally allocate more file space to users maintaining what type of files?
|
Databases
|
|
What is one way to increase file server efficiency?
|
Limiting the access time of typical users
|
|
What usually has the most significance when determining the mount of space and access time users are given on a file server?
|
Job position
|
|
What two files are required for Windows operating systems to run on most client systems?
|
BOOT.INI and NTDETECT.COM
|
|
What is the name for the core set of software instructions contained in operating systems on which the higher-level functions are based?
|
System kernal
|
|
What is the first question "network experts" ask when beginning to troubleshoot a serious network problem?
|
Wher is the network map?
|
|
What is the first of sevel logical steps used to trouble shoot a network problem?
|
Define the main problems
|
|
What should yo udo after gathering all the facts about a netwrok problem?
|
Consider all possible causes
|
|
Why should only one possibility of a network problem be trouble shot at a time?
|
Isolate a definite cause if the action fixes the problem
|
|
What is one of the greatest downfalls of personnel who must work together to trouble shoot a network problem?
|
Failure to accurately observe and thoroughly document the results of their individual efforts.
|
|
What are the two basic ways netowrk faults can be detected?
|
Reactively and proactively
|
|
What are the most common, immediate, and service-affecting types of faults?
|
Devices that have lost power and have broken network connections.
|
|
Wat are th emost common, immediate, and service-affecting types of faults?
|
Devices that have lost power and have broken network connections.
|
|
What function of fault management identifies options for minimizing the effects of detected or predicted faults?
|
Fault correction
|
|
What is an indication that a noteworthy event has occurred on the network?
|
Alarm
|
|
What network managemnet system alarm browser informaiton item indicates if an alarm is related to other alarms?
|
Cor
|
|
When bits are missing in one of more octets in a frame, what type of error occurs?
|
Alignment
|
|
What function checks for damaged frames by recalculating the 32-bit cyclic redundancy check value of the received frame and comparing it to the received 32-bit CRC value in the frame check sequence field?
|
MAC frame
|
|
Within how many bytes of transmission should a NIC sense a collision and stop transmitting?
|
64
|
|
What are frames called that consist of garbled bits of data that are transmitted continuously on the network?
|
Jabbers
|
|
What is the maximum packet size (in bytes) for the IP?
|
65,535
|
|
What is the minimum packet size (in bytes) for the IP?
|
28
|
|
Over 60% of all network problems occur at what layers of the OSI model?
|
Data link and Physical
|
|
What type of network problem(s) is caused by collisions on the domain?
|
High utilization or jabbers
|
|
Ideally the average netwrok utilization value should be less than
|
30%
|
|
What type of network errors do jabbers usually cause?
|
High utilizations and collisions
|
|
What utilities are used to find the round-trip delay between a source and taget node?
|
PING and TRACERT
|
|
What diagnostics command is run exclusively on Windows based machines?
|
IPCONFIG
|
|
What IP address is used to packet internetwork groper a computer's own NIC
|
127.0.0.1
|
|
What is one of the most common types of hardware devices used for network troubleshooting?
|
Loopback plug
|
|
What are the three main components of the system management automated report tracking system?
|
Domain managers, broker, and clients
|
|
What is the centerpiece of the SMARTS application?
|
Domain manager
|
|
What component of the system management automated report tracking system application contains knowledge of available domain managers?
|
Broker
|
|
Waht color on the system managment automated report tracking system alarm log indicates one or more events?
|
Purple
|
|
How many different categories of information does the performance monitor provide you about your network?
|
21
|
|
What menu in the protocol analyzer provides information concerning the network utilization and frame errors that are related to a specific protocol?
|
Protocol statistics
|
|
What automatically runs in the background when the protocol analyzer application is activated?
|
Node discovery
|
|
What menu on the protocol analyzer provides information concerning the bandwidth utilization and the number of connections that are related to specific nodes?
|
Connection statistics
|
|
What is the process of analyzing threats against the vulnerabilities of an information system?
|
Risk analysis
|
|
In which phase of the DOD informaiton technology security certification and accreditation process is data gathered for system analysis?
|
Phase 1: Definition
|
|
What is the maximum number of automated information system iwht no changes to the baseline must be recertified or accredited?
|
Three
|
|
What is a measure used to verify eligibility of a subject and the ability of the subject to access certain information?
|
Authentication
|
|
How is a PIN categorized?
|
Something you know
|
|
What is a physical device that users carry to authenticate themselves over the Internet?
|
Token
|
|
What is a plastic/magnetic device that contains a microprocessor used to authenticate users over the Internet?
|
Smart card
|
|
What is uniquely generated to encrypt a specific message by the user?
|
Session key
|
|
What is at the very core of the Barrier Reef process?
|
Base network security policy
|
|
In what step of the Barrier Reef process do yo umap both the physical and logical topology of your network?
|
Step 1: Know thyself
|
|
In what step of the Barrier Reef process do you start a base network steering group to address base-wide network managemnet and security issues?
|
Step 2: Determine requirements
|
|
What are network attacks that bypass the firewall?
|
Tunneling and application-based attacks
|
|
What is the intrusion practice of encapsulating a message (that would be rejected by the firewall) inside a second message that will pass through the firewall?
|
Tunneling
|
|
What is the simplest and least expensive type of firewall to stop messages wiht inappropriate network addresses?
|
Packet filtering
|
|
What type of firewall is used to separate secure sites, networks, or network segments from less secure areas?
|
Bastion host
|
|
What type of firewall generates audit trails of all network-related activity for monitoring and intrusion detection purposes?
|
Bastion host
|
|
What network performs rigorous examinations of systems to identify weaknesses that might allow security violations?
|
Vulnerability scanners
|
|
What software program protects classified data by erasing it from the disk so that it is unrecoverable?
|
Wipeinfo
|
|
What is the preferred method of clearing magnetic tapes?
|
Degaussing
|
|
What web-based process incorporates identification and evaluation of new vulnerabilities, disseminates technical responses, and tracks compliance within the DOD community?
|
IAVA
|
|
Who is the IAVA process manager?
|
DISA
|
|
Withing the DOD computer emergency response team three-tiered "vulnerability hierarchy" for notifications, what tier documents a new vulnerability that poses an immediate, potentially severe threat to DOD systems?
|
Informaiton assurance vulnerability alert
|
|
Waht standard is utilized by the defense messaging system for messagin services?
|
X.400
|
|
What standard is utilized by the Defense Messaging System for directory services?
|
X.500
|
|
What is one of the most important part of security in the DMS?
|
Fortezza cards
|
|
What is the first job the basic input output system (BIOS) does at start-up?
|
Run the power-on self-test
|
|
Which original component was very susceptible to damage from electrostatic discharge?
|
CMOS
|
|
Which component uses a lithium battery to maintain computer settings when power is removed?
|
CMOS
|
|
What is considered as a nonvolatiles permanent memory?
|
ROM
|
|
What is a form of firmware that contains the computer's startup instructions?
|
BIOS
|
|
What static RAM (SRAM) uses special applications in a CPU?
|
Cache
|
|
On MOST modern computers, which has two or three levels of memory?
|
Cache
|
|
Actively sampling the status of an external device by a client program is known as
|
polling.
|
|
What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a CPU or a synchronous event?
|
Interrupt
|
|
What Interrupt request (IRQ) line number is normally used for the floppy disk controller?
|
6
|
|
which term describes that data is whole or complete?
|
Data integrity
|
|
What is considered as a technique or method of checking data integrity?
|
Parity bit
|
|
Which is a very simple example of an error detecting code?
|
Parity bit
|
|
What component initializes communication with all hardware devices and sends a message if a keyboard or mouse is not found?
|
BIOS
|
|
What is a small, low-level program used by the computer operating system to interact with hardware devices?
|
Driver
|
|
What is the sudden momentary electric current that flows between two objects at different electrical potentials?
|
Electrostatic discharge
|
|
Static electricity remains intact until it is
|
discharged.
|
|
under what class of ESD would an item fall if it was sensitive to 900 volts
|
I
|
|
What measure would you take to prevent the build up of static electricity?
|
Ground the ESDS device
|
|
What is the first step you must take when either installing or removing an ESDS device?
|
Turn the power switch to the off position.
|
|
The process of collecting and analyzing data to determine the cause of an operational failure and how to prevent it from recurring is called
|
fault isolation.
|
|
In which troubleshooting step would you determine which conditions are present?
|
Define the problem.
|
|
In which troubleshooting step would you confirm a dilemma exists?
|
Isolate the problem
|
|
In which troubleshooting step would you identify likely causes and eliminate unlikely causes?
|
Resolve the problem
|
|
In which troubleshooting step would you review the case history and assure no steps were missed?
|
Confirm the resolution
|
|
What is NORMALLy the next step in the boot up process after initial power is applied?
|
The keyboard lights should flash.
|
|
What is NORMALLY the next sept in the boot up process after the basic input output system (BIOS) message appears on the monitor?
|
A memory test should be visible on the monitor.
|
|
Normally the last step in the boot up process is
|
the OS loads into memory and user interface appears.
|
|
what can detect if CPU hardware problem exist?
|
Power-on-self-test (POST)
|
|
When troubleshooting hardware; one simple method of identifying cables is to
|
place masking tape to the cables and connection points.
|
|
What rank must primary communications security responsible officers (CRO) hold?
|
SSgt
|
|
Who has the authority to approve waivers that are mission justified?
|
COMSEC manager
|
|
After receiving their initial educations in COMSEC account management, how often must CROs be trained to remain qualified to manage their account?
|
Annually
|
|
To ensure CROs are complying with applicable directives and accounting for the COMSEC material under their control, the COMSEC manager is required to inspect their accounts at least
|
semi-annually
|
|
Who is responsible for the production and management of cryptographic material within the US government?
|
DIRSNA
|
|
What is the classification of the combination to any security container?
|
Always classified to the highest classification of material in the container.
|
|
The operational use and control of COMSEC material is overseen and managed by
|
a controlling authority.
|
|
This COMSEC material requires the most stenuous accounting practices by usinig an accounting control number.
|
ALC-1
|
|
Whis COMSEC material is accounted for continuously by quantity
|
ALC-2
|
|
This form is considered a daily physical security inventory for your environment.
|
SF701
|
|
What form do you fill out and affix to the inside of the locking drawer when you change a safe combination?
|
SF700
|
|
At a minimum, how often do you change a cipher lock combination?
|
Monthly
|
|
What is the perferred method for listing material on the AFCOMSEC Form 16?
|
Alphabetically by short title
|
|
AFCOMSEC Form 16 inventories are retained for the current inventory plaus howmany pevious months of inventory?
|
6
|
|
if it is physically impossible to conduct an inventory of a user because of distance, the COMSEC manager
|
asks the user to verify his or her holdings by letter or message.
|
|
Who establishes the semi-annual inventory date for each COMSEC account number?
|
CPSG
|
|
The individual who is required to use and safeguard COMSEC aids while performing official duties is the
|
user.
|
|
What is the term used when referring to specific COMSEC material other than equipment?
|
Aids
|
|
Where doe sthe next unused voucer number come form that is used on transfer reports?
|
COMSEC Form 14
|
|
In which phase does the COMSEC manager determine which materials the CRO needs?
|
Preparation
|
|
In which phase does the CRO check the material issued against the list on the SF153?
|
Distribution
|
|
What should each CRO do before signing the COMSEC hand receipt?
|
Ensure the required COMSEC material is listed on the SF153 and ready for issue.
|
|
Disposition records and/or destruction reports are not required for material that has been issued to
|
transient aircrews.
|
|
What term suggests movement from one place to another by someone with an active interest in that material?
|
Transport
|
|
What is the maximum number of different actions that can be accomplished on a singled SF153?
|
1
|
|
What form is commonly used as a destruction certificate of COMSEC material?
|
SF153
|
|
In which folder of the COMSEC account 6-part folder are destruction certificates filed?
|
6
|
|
Whenever COMSEC material needs to be replaced or amended immediately, who develops the original messages for COMSEC accounts by urgent electronic message?
|
CSGP
|
|
Failure to comply with an urgent dissemination message could consitute in what kind of violation?
|
Cryptographic incident
|
|
Who is ultimately responsible for all EAPs on base?
|
CM
|
|
How long do you need to maintain the written documentation of the semiannual EAP exercises?
|
24 months
|
|
Which AF form do CMs use when conducting an inspection of a sub-COMSEC account?
|
AF Form 4160
|
|
What is the maximum time between EAP exercises at CRO accounts
|
6 months
|
|
Who is the final approval authority for a person going into TPC positions?
|
The commander of the unity holding TPC material.
|
|
What is used for the generation, management, and distribution of keying material, including programming FORTEZZA cards?
|
Certification authority workstation
|
|
Wjat os lmpwm as a state-of-the-are ground-to-ground communications infrastructure?
|
TDC
|
|
What TDC characteristic reflects module architecture which comply with established international or commercial communication standards?
|
Open system standards
|
|
What TDC characteristic required equipment setup times are kept to an absolute minimum to support transportation, deployment, and operations in a deployed environment?
|
Mobility
|
|
What TDC characteristic required equipment be capable of operation/maintenance by personnel wearing nuclear, biological, and chemical protective gear?
|
Survivability
|
|
What is known as a suite of modules and accessory kids serving as the backbone of deployed communication networks?
|
ICAP
|
|
Who provides uniterrupted flow of mission critical informaiton to field units, in-garrison units for the duration of a contingency?
|
Sustained communications support teams
|
|
Who should you notify immediately of any predeployment shortfalls?
|
UDM and Commander
|
|
What phase is concerned with exercises to ensure you are familiar with the deployment process and with your equipment?
|
Predeployment.
|