Air Force Mentor Logo

 

Exams (Home) | AFMentor | AFWriting | Bookmark | E-Mail Page | Search

































3C051 EOC Exam

Volume 1



1.  When must visitors to work centers be escorted, regardless of their security clearance, to prevent inadvertent disclosure of classified material?

     a.  Only when convenient.
     b.  At all times.
     c.  At the discretion of the NCOIC.
     d.  Only when material is not protected.


2.  What transmission method provides armed guard and receipts?

     a.  STU III.
     b.  AUTODIN.
     c.  DCS.
     d.  United States Mail.


3.  Within an AFSC what is a functional grouping of personnel requiring basically the same knowledge and skills.

     a.  Career Field (Family).
     b.  Career Field Subdivision.
     c.  Skill level
     d.  Career Group.


4.  The minimum amount of time required to gain job experience before attending 7-level school is

     a.  12 months.
     b.  6 months.
     c.  18 months.
     d.  24 months


5.  Planned operations to convey selected information and indicators to foreign audiences to influence their emotions, motives, objective reasoning are called what?

     a.  Counteranalysis
     b.  Countermeasures
     c.  Psychological operations.
     d.  Protective measures.


6.  You can determine the amount of current in an electrical device or circuit by the amount of

     a.  resistance only.
     b.  voltage multiplied by the amount of resistance
     c.  voltage only.
     d.  voltage divided by the amount of resistance.


7.  Who serves as the Air Force executive agency for CIS systems integration?

     a.  HQ AFCA.
     b.  HQ USAF.
     c.  DISA.
     d.  HQ ACC.


8.  The three types of viruses are

     a.  mild, benign, and malignant.
     b.  mild, malignant, and time bomb.
     c.  mild, difficult, and deadly.
     d.  benign, malignant, and deadly.


9.  The element of communications security (COMSEC) resulting from applying all available measures designed to protect information systems traffic from interception and exploitation is

     a.  cryptosecurity.
     b.  transmission security.
     c.  emission security.
     d.  physical security.


10.  Classified "clean-out" days are what type of destruction condition?

       a.  Normal
       b.  Emergency
       c.  Precautionary
       d.  Preliminary


11.  What are the months of responsibility for Air and Space Expeditionary Forces 9 and 10?

       a.  Sept through Nov.
       b.  Dec through Feb.
       c.  June through Aug.
       d.  March through May.


12.  Who is the Air Force focal point for design and construction of facilities containing radio frequency interference (RFI) and electromagnetic interference (EMI) shielding?

       a.  HQ AFCA.
       b.  HQ AFCESA/CESE.
       c.  HQ AFCIC/SYNI.
       d.  HQ USAF/ILE.


13.  If using compressed air, limit air pressure to less than how many pounds per square inch (psi)?

       a.  30
       b.  20
       c.  50
       d.  40


14.  What is the base or radix of the hexadecimal numbering system?

       a.  4.
       b.  16
       c.  8.
       d.  12


15.  Name the four types of SATE training.

       a.  Awareness, computer security, systems and network security.
       b.  Accession, initial/recurring, awareness, and specialized.
       c.  Computer security, awareness, accession and system security.
       d.  Initial/recurring, awareness, computer security, and system security.


16.  What is the binary equivalent to the decimal number 14210?

       a.  100010102
       b.  100011102
       c.  110010012.
       d.  110000112.


17.  What are the types of systems vulnerabilities?

       a.  Technical and procedural.
       b.  Administrative and personnel.
       c.  Technical and personnel.
       d.  Administrative and technical.


18.  Which of these categories of classified information's could reasonably be expected to cause identifiable damage to the national security if it were disclosed without authorization?

       a.  Secret.
       b.  FOUO.
       c.  Confidential.
       d.  Top Secret.


19.  What type of waiver allows them to continue processing classified information in order to accomplish mission and complete all the required EMSEC Countermeasures?

       a.  Permanent.
       b.  Temporary.
       c.  Disproportionate cost.
       d.  Countermeasure unavailability.


20.  The octal numbering system uses how many symbols?

       a.  Six
       b.  Four
       c.  Eight
       d.  Sixteen


21.  When was the first Operations Security (OPSEC) program introduced and in what region was it initiated?

       a.  1967, Great Britain.
       b.  1964, Alaska.
       c.  1965, Germany.
       d.  1966, Southeast Asia.


22.  Identify the Air Force security program that results from the proper application of crypto-security, emission security, physical security, and transmission security measures

       a.  OPSEC
       b.  SATE
       c.  COMSEC.
       d.  COMPUSEC


23.  Who advises the commander of existing EMSEC vulnerabilities, threats, and risks?

       a.  Computer security officers.
       b.  Security managers.
       c.  Wing IP offices.
       d.  Unit Computer security officer.


24.  Where do most of the attacks on our systems originate?

       a.  Outside our span of control.
       b.  Other countries intelligence agencies
       c.  Other US government agencies.
       d.  Inside of our span of control.


25.  What AFMAN, pertains to Classification of the enlisted AFSCs?

       a.  AFMAN 36-2108.
       b.  AFMAN 36-2105.
       c.  AFMAN 36-2107.
       d.  AFMAN 36-2106.


26.  Who has the authority to classify derivative documents?

       a.  Those who create and approve this type of material.
       b.  Unit commanders only.
       c.  Unit commanders and security managers.
       d.  Wing and unit commanders.


27.  What form is used to document end of day vault, secure room, or container checks?

       a.  SF704.
       b.  SF703
       c.  SF702
       d.  SF705


28.  To be successful, missions depend upon

       a.  leadership from officers.
       b.  teamwork from all personnel.
       c.  funds, material, and manning.
       d.  loyalty from enlisted personnel.


29.  Personnel working in controlled areas are trained on their security responsibilities by the unit

       a.  Training Manager.
       b.  SATE Monitor
       c.  Security Manager.
       d.  Controlled Area Monitor.


30.  Who do you consult regarding storage and disposal of used solvents, contaminated rags, and degreasing compounds requirements?

       a.  Unit safety manager.
       b.  Unit bio-environmental engineer.
       c.  Installation safety manager.
       d.  Installation bio-environmental engineer.


31.  Resource protection program reviews are often accomplished by

       a.  installation controlled area monitor.
       b.  unit controlled area monitor.
       c.  unit security manager.
       d.  wing security manager.


32.  What is the last step in binary to octal conversion?

       a.  Add the octal number and display with a radix 6.
       b.  Write the new binary number with a radix of 10.
       c.  Add the binary numbers with a power of 2.
       d.  Write the new octal number with a radix of 8.


33.  A disadvantage of open information systems is that they

       a.  are not interchangeable between operational applications.
       b.  are very difficult to replace due to their specific operational requirements.
       c.  can be influenced, jammed, interrupted, or exploited by adversaries and adversarial weapon systems.
       d.  are too difficult to maintain for operational purposes.


34.  Who do you notify upon finding an improperly marked classified document?

       a.  Supervisor
       b.  First sergeant.
       c.  Unit security manager.
       d.  Base security manager.


35.  What are methods to eliminate or prevent detection of Operations Security (OPSEC) indicators called?

       a.  OPSEC measures.
       b.  Action controls.
       c.  Countermeasures
       d.  Vulnerability measures.


36.  When developing a place value chart what is the power of the exponent at the far right of the charts base or radix line?

       a.  (°).
       b.  (¹).
       c.  (³).
       d.  (²).


37.  What form is not used as a cover sheet for classified material?

       a.  SF704
       b.  SF703
       c.  SF702
       d.  SF705.


38.  What MAJCOM uses mobility commitment lines to control and measure the tempo of the tanker and airlift force?

       a.  HQ AFMC.
       b.  HQ ACC.
       c.  HQ AMC.
       d.  HQ AFCA.


39.  The best defense against the silent war is

       a.  good OPSEC practices.
       b.  STU Ills.
       c.  good COMSEC practices.
       d.  approved safes and vaults.


40.  Who signs the "approval to operate" letter, officially accrediting CIS systems for operation?

       a.  Unit COMPUSEC manager.
       b.  Base Security manager.
       c.  Base COMPUSEC manager.
       d.  Designated approval authority.


41.  Which of the following is not a purpose for correctly marking classified documents?

       a.  It warns holders of special access, control, or safeguarding requirements.
       b.  It provides guidance on downgrading (if any) and declassification.
       c.  It gives information on the source(s) of and reasons for classification.
       d.  It ensures only people with a need to know will have access to it.


42.  In what type of US Postal Service is mail handled only by official postal employees and gets some degree of protection?

       a.  Certified
       b.  Courier
       c.  First class.
       d.  Registered


43.  Under the AF Physical Security Program, what priority is assigned to resources that are the most sensitive, critical, or vulnerable, to include nuclear weapons, communications-computer systems (C-CS) that is critical to mission success?

       a.  Priority B.
       b.  Priority A
       c.  Priority C
       d.  Priority D


44.  What Operations Security (OPSEC) function takes full advantage of any information that comes to hand for tactical or strategic purposes?

       a.  Command and Control Warfare (C²W).
       b.  Exploitation
       c.  Counterintelligence
       d.  Capability


45.  What is the remainder of hexadecimal subtraction problem CA47 - 4D3B?

       a.  7DOC16.
       b.  4BEl16
       c.  65A716
       d.  5F9016


46.  What is considered the key to Operations Security (OPSEC)?

       a.  AUTODIN
       b.  Continuous security awareness.
       c.  STU III.
       d.  Safes and vaults.


47.  When adding octal numbers, what results in a carry to the next higher order column?

       a.  The limit of 6 being exceeded.
       b.  The limit of 5 being exceeded.
       c.  The limit of 7 being exceeded.
       d.  The limit of 8 being exceeded.


48.  When adding binary numbers, what is the sum of a column of even numbers of 1?

       a.  Equal to the sum of 1 s in the column.
       b.  One less than the sum of 1s in the column.
       c.  The sum will always be a zero.
       d.  The sum will always be a one.


49.  Which of these categories of classified information could reasonably be expected to cause serious damage to the national security if it were disclosed without authorization9

       a.  Secret
       b.  FOUO.
       c.  Confidential
       d.  Top Secret.


50.  What are three key responsibilities of all military members?

       a.  Obeying the orders of those placed over you, adhering to military standards, and continually upgrading your technical expertise.
       b.  Adhering to military standards, fostering good customer relations, and continually maintaining and upgrading your technical competence
       c.  Adhering to military standards, and continually upgrading your technical expertise, and working to be selected for the next higher rank.
       d.  Obeying the orders of those placed over you, continually maintaining and upgrading your technical competence, and working to be selected for the next higher rank.


51.  Which of these is not a good communications security (COMSEC) practice?

       a.  Talk around classified information when you are on a nonapproved system.
       b.  Report all security violations immediately.
       c.  Do no operate nonapproved devices in close proximity to other subscriber sets.
       d.  Do not try to modify security safeguard devices.


52.  Which program's objective is to develop automatic information security behavioral patterns?

       a.  COMSEC
       b.  SATE
       c.  TRANSEC.
       d.  COMPUSEC


53.  Who does the Air Force hold responsible and accountable for mission results?

       a.  All personnel.
       b.  Wing commanders.
       c.  Group commanders.
       d.  Squadron commanders.


54.  How many Air and Space Expeditionary Force teams are developed to carry out our deployment missions?

       a.  8
       b.  9.
       c.  10
       d.  7.


55.  When was the present Operations Security (OPSEC) program established?

       a.  1972
       b.  1966
       c.  1970.
       d.  1990


56.  What is designed to streamline and consolidate responsibilities and to move to clear lines of command?

       a.  The objective wing.
       b.  The objective unit.
       c.  The one-base, one-boss program.
       d.  The objective group.


57.  When are more responsibilities given to you?

       a.  As you gain more experience.
       b.  As you get older.
       c.  By more time in service.
       d.  As your skill level increases.


58.  What is the overall objective that all security programs contribute to?

       a.  Deny information to all unauthorized.
       b.  Mission effectiveness.
       c.  Deny our adversary information.
       d.  Security checklists.


59.  Who is responsible for applying, implementing, and maintaining the required Countermeasures identified by the EMSEC Countermeasures review?

       a.  Unit FSAs.
       b.  All users.
       c.  Unit CSOs.
       d.  Unit COMPUSEC managers.


60.  What methods create closed information systems to prevent adversaries from gaining access to information and resources?

       a.  Counteranalysis.
       b.  OPSEC vulnerability studies.
       c.  Countermeasures
       d.  Protective measures.


61.  How long are technical deviations or variances to secure facilities applicable?

       a.  Three years.
       b.  One year
       c.  Two years
       d.  Indefinitely


62.  Who conducts an EMSEC security inspection once the countermeasure application and implementation is complete?

       a.  Wing CSOs.
       b.  Unit IPOs.
       c.  Unit CSOs.
       d.  Wing IPOs.


63.  What ASIM vulnerability category is a probing attack in the form of a Finger probe, FTP breakout, anonymous FTP, Telnet breakout or RFC?

       a.  Category IV.
       b.  Category I.
       c.  Category III.
       d.  Category II.


64.  What is used to control access to computer facilities, terminal areas, processing equipment, storage media and information?

       a.  Transmission Security.
       b.  Computer Security.
       c.  Passwords.
       d.  Physical Security.


65.  What level of protection is afforded to the combination of a lock that secures classified material?

       a.  Top secret.
       b.  The same as the highest authorized category stored inside.
       c.  Secret
       d.  Lock combinations are not protected as classified.


66.  The program designed to produce an increased awareness of the interceptibility of our Air Force information processing systems is

       a.  COMSEC.
       b.  SATE
       c.  TRANSEC
       d.  COMPUSEC


67.  Who has the responsibility for management of contracts and service agreements?

       a.  3C0X1s.
       b.  3A0X1s
       c.  3C3X1s
       d.  3C2X1s


68.  Which program is designed to promote consistent application of security principles in the use of Air Force CIS systems?

       a.  Security Awareness, Training, and Education (SATE).
       b.  Physical Security.
       c.  Operations Security.
       d.  Computer Security.


69.  Who is responsible for managing all real property assigned to an Air Force base?

       a.  Base Contracting office.
       b.  Wing commander.
       c.  Base Supply squadron.
       d.  Base Civil Engineering.


70.  What is the last step in hexadecimal to decimal conversion?

       a.  Convert the decimal number to a series of powers often expressions.
       b.  Write the new octal number with a radix of 8.
       c.  Decimally add the results and write the new number with a base ten subscript.
       d.  Convert the hexadecimal number to a series of powers of eight expressions.


71.  How many people usually make up an Air and Space Expeditionary Force?

       a.  20,000 to 25,000.
       b.  5,000 to 10,000.
       c.  15,000 to 20,000.
       d.  10,000 to 15,000.


72.  How often must entrance lists to the controlled workcenter be reviewed for updates?

       a.  60 days.
       b.  45 days.
       c.  30 days.
       d.  90 days.


73.  Immediately, report detected classified system vulnerabilities to

       a.  NCC.
       b.  wing IPO.
       c.  base security manager.
       d.  MAJCOM NCC.


74.  What is the base or radix of the octal numbering system?

       a.  Eight
       b.  Six
       c.  Sixteen
       d.  Ten


75.  What training aid allows you to do training in-house on all the functions in the information's systems flight?

       a.  CBAs
       b.  CDCs.
       c.  CBTs
       d.  QTPs


76.  What element of communications security (COMSEC) results from taking all measures available to deny unauthorized persons information of value that might be derived from interception from cryptological and information processing equipment?

       a.  Cryptosecurity
       b.  Emission security.
       c.  Physical security.
       d.  Transmission security.


77.  The most dangerous security violation is one that is

       a.  involving COMSEC.
       b.  Preventable
       c.  Undetected
       d.  involving personnel.


78.  What Air Force Security program's main objective is to provide protection for our operations during the planning, execution, and after-action phases?

       a.  COMPUSEC
       b.  COMSEC
       c.  INFOSEC
       d.  OPSEC


79.  Who is responsible for providing training to installers, operators, and maintenance technicians of systems that process classified information?

       a.  HQ AFCA
       b.  Owning MAJCOM.
       c.  Wing IPO.
       d.  HQ AETC.


80.  When may FOUO be transmitted by FAX?

       a.  Anytime since it is unclassified.
       b.  When special cover sheets are used and the recipient is standing by during transmission.
       c.  Only after specific approval from your commander.
       d.  Never because it contains information of possible value.


81.  What type of AFSC does the Air Force Military Personnel Center (AFPC) use for assignment and training purposes?

       a.  Primary
       b.  Administrative.
       c.  Control
       d.  Duty


82.  When may information be withheld from the American public?

       a.  Only when directed by the president
       b.  Never
       c.  Only when it is necessary in the nation's interest.
       d.  Only when it is critical to an ongoing covert operation.


83.  When converting binary numbers to HEX numbers, what is the binary number's total number of digits divided by?

       a.  4
       b.  8
       c.  16
       d.  12


84.  How is official Air Force information categorized?

       a.  Classified, unclassified.
       b.  Official, unofficial.
       c.  Classified, unclassified, and FOUO.
       d.  Official, unofficial, and FOUO.


85.  Who is authorized knowledge of the combinations of containers containing classified information?

       a.  Unit commanders and their staff only.
       b.  Unit commander, security manager and users required to accomplish the mission.
       c.  Unit commander, section superintendent and users required to accomplish the mission.
       d.  Only users required to accomplish the unit mission.


86.  Octal addition is performed by using a

       a.  sum-and-divide technique.
       b.  sum-and-carry technique.
       c.  multiply and sum technique.
       d.  multiply and carry technique.


87.  What are the three elements of the Multidiscipline Counterintelligence Threat Assessment?

       a.  OPSEC, HUMINT, SIGINT.
       b.  HUMINT, SIGINT, IMINT.
       c.  SIGINT, IMINT, EMSEC.
       d.  OPSEC, EMSEC, HUMINT.


88.  Your resistance to electrical current depends upon

       a.  external resistance only.
       b.  the amount of your body weight.
       c.  external and internal resistance.
       d.  internal resistance only.


89.  What type of AFSC shows your highest skill level?

       a.  Control
       b.  Administrative
       c.  Primary
       d.  Duty


90.  What is the designation of any building, area or structure containing Air Force resources that are lucrative targets for theft, compromise or destruction and to which entry must be limited to provide more protection?

       a.  Guarded area.
       b.  Closed area.
       c.  Controlled area.
       d.  Restricted area.


91.  What base function prepares for and supervises mobility exercises and deployments?

       a.  Base communications squadron.
       b.  Base mobility officer.
       c.  Base deputy commander.
       d.  Base planning staff.


92.  After verifying clearances and personnel information, who endorses the emergency authorization list prior to sending it to the commander for approval?

       a.  Flight commander.
       b.  Section superintendent.
       c.  Flight SATE manager.
       d.  Unit security manager.


93.  What is the minimum amount of current in any voltage capable of being lethal?

       a.  70 milliamperes (.070 amperes).
       b.  60 milliamperes (.060 amperes).
       c.  50 milliamperes (.050 amperes).
       d.  80 milliamperes (.080 amperes).


94.  Where possible, priority resources are grouped together into

       a.  classified areas.
       b.  controlled areas.
       c.  restricted areas.
       d.  intrusion detection areas.


95.  Operations Security (OPSEC) weaknesses tend to fall into what three broad categories?

a.  Communications, administrative, and physical indicators.
b.  Operations, communications, and human resource intelligence.
c.  Administrative, human resource intelligence, and operations.
d.  Operations, administrative, and communications.


96.  The value of a digit in the octal numbering system is equal to

       a.  the digit multiplied by the power of the PLACE it occupies.
       b.  four times the power of the PLACE it occupies.
       c.  ten times the power of the PLACE it occupies.
       d.  six times the power of the PLACE it occupies.


97.  How many steps are there in octal to decimal conversion?

       a.  3
       b.  4
       c.  6
       d.  5


98.  Most facility vulnerabilities are identified during

       a.  the annual resource protection program review.
       b.  the initial resource protection program review.
       c.  a normal resource protection program review.
       d.  the semi-annual resource protection program review.


99.  Name the flight in the Communications Squadron that functions such as the customer service help desk, job control, telecommunications center and network control center are contained.

       a.  Information Systems Flight.
       b.  Missions Systems Flight.
       c.  Plans Flight.
       d.  Support Flight.


100.  What is the Numerical Index of Specialized Education/Training Publications?

       a.  AFIND 8.
       b.  AFIND 9.
       c.  AFIND 11.
       d.  AFIND 10.

 

Click here for Answers


Click here to submit your information.
  Send a Comment and/or Suggestion


Page Added on: 17 January 2006

Copyright © 2005 AFMENTOR. All rights reserved.
Revised: 02/27/06.