Air Force Mentor Logo

 

Exams (Home) | AFMentor | AFWriting | Bookmark | E-Mail Page | Search


















3C051 EOC Exam

Volume 2



1.  Which one does Public Key Infrastructure not support? (66)

      a.  Confidentiality.
      b.  Non-repudiation.
      c.  Authentication.
      d.  Software virus protection.


2.  What algorithm was designed exclusively for signing/verification and data integrity?

      a.  Diffie and Hellman (DH).
      b.  Digital Signature Algorithm (DSA).
      c.  Secure Hash Algorithm (SHA-1).
      d.  Rivest-Shamir-Adleman (RSA).


3.  Who issues and manages security certificates and public keys for message encryption and decryption in Public Key Infrastructure?

      a.  Domain name authority.
      b.  Registration authority
      c.  Directory Service Repository.
      d.  Certification authority.


4.  In all cases where the user generates keys, the user is required to prove possession of

      a.  the private key, that corresponds to the public key in the request.
      b.  the public key digital signature.
      c.  the public key, that corresponds to the private key in the request.
      d.  both the public and private keys in the request.


5.  The Computer Systems Management, Equipment Custodian inventory listing can be generated after the

      a.  ECO verifies the equipment with the CSO.
      b.  inventory is completed.
      c.  ECO loads the equipment into IPMS.
      d.  final copy of the inventory is received from the ECO.


6.  The original message, after to being changed to gibberish called

      a.  first-text.
      b.  cipher-text.
      c.  blocktext.
      d.  plaintext.


7.  Within how many hours of deployment notification are initial communications support designed to provide basic communications to a bare base operation and for up to how many days do they remain in place?

      a.  48 hours; 30 days.
      b.  72 hours; 30 days.
      c.  48 hours; 60 days.
      d.  72 hours; 60 days.


8.  A change to a system that is still being produced is known as

      a.  an upgrade.
      b.  modification.
      c.  refurbishment.
      d.  an alternative.


9.  What will disappear as personnel become adept in the standardized expeditionary communications and information skill sets needed to support the Expeditionary Air and Space Force throughout the entire predeployment/deployment cycle?

      a.  The different equipment required to support fixed and tactical deployment cycles.
      b.  The dividing line between fixed and tactical communications and information skill sets.
      c.  Fixed and tactical deployment cycles.
      d.  Fixed deployment cycles only.


10.  What are COMSEC incidents generally classified until receiving guidance from higher agencies?

       a.  Confidential.
       b.  Unclassified.
       c.  Top Secret.
       d.  Secret.


11.  In public/key cryptography, key establishment can occur by key

       a.  security verification or key acknowledgement.
       b.  transfer or key security verification.
       c.  agreement or key security verification.
       d.  transfer or key agreement.


12.  What is the "Type C" mobility bag and what does it contain?

       a.  Chemical warfare defense equipment bag; mask, filter units, over-garments, and atropine.
       b.  Hot weather bag; desert environment equipment, salt pills.
       c.  General purpose bag; helmet, canteen, mess kit, and wet weather overalls.
       d.  Cold weather gear bag; mittens, parka, lined field caps, etc.


13.  What is the preferred method for listing material on the AFCOMSEC Form 16?

       a.  Alphabetically by edition.
       b.  By shelf arrangement.
       c.  By drawer arrangement.
       d.  Alphabetically by short title.


14.  What is the most overlooked area of COMSEC material protection procedures?

       a.  Reporting of practices dangerous to security.
       b.  Administration paperwork.
       c.  Proper and timely destruction of used material.
       d.  Inspections of the COMSEC responsibility officer accounts.


15.  A cryptography hash is used to take

       a.  a fixed input and change it to an arbitrary input.
       b.  an arbitrary input and change it to a fixed input.
       c.  a fixed input and change it to an arbitrary output.
       d.  an arbitrary input and change it to an arbitrary output.


16.  The term used when referring to specific COMSEC material (other than equipment) is COMSEC

       a.  supplies
       b.  entities
       c.  aids
       d.  materials


17.  In what technology is security based on the fact that it is computationally infeasible for anyone other than the key pair creator to derive the private key from knowledge of the public key?

       a.  Private-key cryptography.
       b.  Public-key cryptography.
       c.  Unclassified-key cryptography.
       d.  Classified-key cryptography.


18.  If it is physically impossible to conduct an inventory of a user because of distance, the COMSEC manager

       a.  conducts the inventory with the user by telephone.
       b.  requests special TDY orders from CSGP.
       c.  requests special TDY orders from MAJCOM.
       d.  asks the user to verify his or her holding by letter or message.


19.  Who establishes the Air Force computer system management working group (CSMWG)?

       a.  HQ USAF/ILM.
       b.  HQ USAF/SCMOS.
       c.  HQ SSG/ENEI.
       d.  HQ AETC/TT.


20.  The Secure Hash Algorithm (SHA-1) was designed specifically for use with what other algorithm?

       a.  Diffie and Hellman (DH).
       b.  Rivest-Shamir-Adleman (RSA).
       c.  EIGamal signature (EIG85).
       d.  Digital Signature Algorithm (DSA).


21.  The Theater Deployable Communications-Integrated Communications Access Package (TDC-ICAP) is ideal in a sustained deployment because of its

       a.  modular design and transportability.
       b.  scalable features and its expandability.
       c.  interoperability with other equipment.
       d.  modular design and expandability.


22.  To ensure COMSEC responsibility officers are complying with applicable directives and accounting for the COMSEC material under their control, the COMSEC manager is required to inspect their accounts at least

       a.  monthly
       b.  semi-annually.
       c.  quarterly.
       d.  annually.


23.  Who appoints the COMSEC manager?

       a.  MAJCOM commander.
       b.  Air Force Cryptologic Support Center (AFCSC).
       c.  National Security Agency (NSA).
       d.  Wing commander.


24.  When a given user has multiple "old" certificates and at least one "current" certificate, the user has a key

       a.  security database.
       b.  update.
       c.  access database.
       d.  history.


25.  What system automates the functions of an Air Operations Center (AOC) and Air Support Operations Center (ASOC)?

       a.  Theater Deployable Communications System (TDCS).
       b.  Ground Theater Air Control System (GTACS).
       c.  Contingency Theater Automated Planning System (CTAPS).
       d.  Tri-Service Tactical Communications System (TTCS).


26.  Who is responsible for the production and management of cryptographic material within the US government?

       a.  Director National Security Agency (DIRNSA).
       b.  Commander, AFIC.
       c.  MAJCOM.
       d.  Cryptologic Support Group (CPSG).


27.  Who is the final approval authority for a person going into two-person control positions?

       a.  A doctor at the local military hospital.
       b.  The commander of the unit holding two-person control material.
       c.  The COMSEC manager of a unit holding two-person control material.
       d.  The wing commander of a unit holding two-person control material.


28.  Which of the following is NOT a proper step of planning equipment utilization?

       a.  Research equipment specifications
       b.  Research administrator preferences.
       c.  Identify mission requirements:
       d.  Identify user needs.


29.  What type of software is used specifically to write or create other software?

       a.  Machine language software.
       b.  Development software.
       c.  Creation software.
       d.  Two tier software.


30.  To conduct an inspection, COMSEC managers (CM) use the Air Force Form

       a.  4500.
       b.  3215.
       c.  3718.
       d.  4160.


31.  AFCOMSEC Forms 16 COMSEC inventories are retained for the current inventory plus

       a.  1 month
       b.  6 months
       c.  3 months
       d.  12 months


32.  The individual who is required to use and safeguard COMSEC aids in the performance of official duties is the COMSEC

       a.  user.
       b.  Manager
       c.  responsibility officer.
       d.  account manager


33.  What is defined as a procedure that has the potential to jeopardize the security of COMSEC material?

       a.  Practice dangerous to security.
       b.  Incident
       c.  Deviation
       d.  Insecurity


34.  In which phase does the COMSEC responsibility officer check the material issued against the list on the SF 153?

       a.  Preparation.
       b.  Protection
       c.  Distribution.
       d.  Administration.


35.  Who oversees and manages the operational use and control of COMSEC material?

       a.  COMSEC manager.
       b.  COMSEC responsibility officer (CRO).
       c.  Controlling authority.
       d.  Cryptonet member.


36.  What must be in place for users to locate the certificates needed to communicate securely?

       a.  Registration repository.
       b.  Certification authority.
       c.  Certificate repository.
       d.  Registration management authority.


37.  To protect COMSEC information and material, the classification of the combination to any security container is

       a.  always classified FOUO.
       b.  not classified.
       c.  classified to the highest classification of material within the container.
       d.  always classified Confidential.


38.  What is the maximum time between Emergency Action Plan exercises at COMSEC responsibility officers' accounts?

       a.  6 months.
       b.  1 month.
       c.  12 months.
       d.  2 months.


39.  A Theater Deployable Communications-Integrated Communications Access Package (TDC-ICAP) metropolitan area network (MAN) normally covers the size of an area between

       a.  10 and 50 square kilometers.
       b.  2 and 50 square kilometers
       c.  2 and 50 square miles.
       d.  10 and 50 square miles.


40.  What term suggests movement of material from one place to another by someone with an active interest in that material?

       a.  Shipment.
       b.  Carrier.
       c.  Transfer.
       d.  Transport.


41.  What is the maximum number of different actions that can be accomplished on a single SF 153?

       a.  4
       b.  2
       c.  3
       d.  1


42.  On the SF-153 is the transfer voucher number is placed in block number

       a.  1
       b.  4
       c.  2
       d.  3


43.  Which class of certification requires the user to personally appear before a certificate management authority (CMA), or an agent approved by a CMA, and present an official photo ID, such as a military ID card?

       a.  4
       b.  1
       c.  2
       d.  3


44.  After completing the COMSEC inventory, where does the original copy of the voucher goes to the

       a.  Cryptologic Systems Group (CSGP).
       b.  National Security Agency (NSA).
       c.  COMSEC manager.
       d.  MAJCOM.


45.  Failure to comply with an urgent dissemination message could constitute a

       a.  cryptographic incident.
       b.  failure to respond.
       c.  long delay in pickup.
       d.  withdrawn from use.


46.  When can a lone person transport Top Secret keying material?

       a.  As long as the material is in a National Security Agency approved container.
       b.  There are no restrictions as long as the person holds a Top Secret clearance.
       c.  When he or she has the proper clearance and be enrolled in the Cryptographic Access Program, and the material is in a National Security Agency approved container.
       d.  Only after being properly trained on COMSEC material courier duties.


47.  Where are original SF 153 hand-receipts maintained?

       a.  COMSEC manager's replica of the CRO's 6-part folder.
       b.  COMSEC manager's account 6-part folder.
       c.  Sent to the MAJCOM's COMSEC Information Assurance office.
       d.  COMSEC responsibility officer's 6-part folder.


48.  Who directs the Air Force Computer Systems Redistribution Program?

       a.  HQ USAF/SC.
       b.  HQ USAF/SCMOS.
       c.  HQ USAF/SCX.
       d.  HQ USAF/ILM.


49.  Who is the final authority on all aspects of communications and information systems in the Air Force?

       a.  HQ USAF/SC.
       b.  HQ USAF/SCX.
       c.  HQ USAF/ILM.
       d.  HQ USAF/SCMOS.


50.  Which class of certification requires the user to personally appear before a Certificate Management Authority (CMA), and present two forms of identification or credentials?

       a.  3
       b.  1
       c.  2
       d.  4


51.  What type of method allows one of the keys in the pair to be revealed publicly without endangering the other key?

       a.  Private-key cryptography.
       b.  Public-key cryptography.
       c.  Unclassified-key cryptography.
       d.  Classified-key cryptography.


52.  The transformation of gibberish back to the original text in a message is called

       a.  decryption
       b.  encryption
       c.  cipher lock.
       d.  text manipulation.


53.  Who ensures all legal aspects of the requirement are correctly addressed and handled?

       a.  Systems Tele-Communications Engineering Manager (STEM)-B.
       b.  Requirements authorizing official.
       c.  MAJCOM equipment control officers (MECO).
       d.  MAJCOM information manager (IM).


54.  Which is the most significant consideration when scheduling system maintenance?

       a.  Number of commanders affected.
       b.  Number of disks affected.
       c.  Number of computers affected.
       d.  Number of users affected.


55.  AF Forms 1109 are destroyed after

       a.  30 days.
       b.  90 days.
       c.  1 year.
       d.  5 years


56.  You do not get approval to ship or transfer COMSEC material from the

       a.  Cryptologic Systems Group (CSGP).
       b.  controlling authority.
       c.  National Security Agency (NSA).
       d.  MAJCOM.


57.  Which type of COMSEC incident includes the recovery by salvage that can potentially jeopardize COMSEC material?

       a.  Physical
       b.  Personnel.
       c.  Cryptographic
       d.  Unauthorized.


58.  What agency is responsible for shipping most COMSEC aids to the base COMSEC accounts?

       a.  Cryptologic Systems Group (CSGP).
       b.  HQ AFCA.
       c.  DIRNSA
       d.  MAJCOM.


59.  A deployment will be initiated/implemented by a warning order under the direction of the

       a.  Chairman, Joint Chiefs of Staff.
       b.  Secretary of Defense (SECDEF).
       c.  Chief of Staff, USAF.
       d.  MAJCOM commander.


60.  What do combat-ready communications and information forces provide?

       a.  Sustaining capabilities to support peacetime through non-combat operations worldwide.
       b.  First-in and sustaining capabilities to support peacetime through combat operations worldwide.
       c.  First-in capabilities to support peacetime through combat operations worldwide.
       d.  First-in and sustaining capabilities to support peacetime through non-combat operations worldwide.


61.  What certifies access to the user Personal Computer Memory Card International Association (PCMCIA) FORTEZZA card?

       a.  Authentication services.
       b.  User workstation password.
       c.  User network password.
       d.  Personal Identification Number (PIN).


62.  What block on the Standard Form 153 is marked with "destruction"?

       a.  3
       b.  4
       c.  6
       d.  5


63.  Corrective maintenance can be preformed if a server is starting to fail, if there is a change in requirements, or

       a.  no users are currently on the network.
       b.  there is an equipment upgrade for network servers/routers.
       c.  over 30% of on-duty technicians require upgrade training.
       d.  the Computer Emergency Response Team (CERT) issues new testing procedures.


64.  After a suspected COMSEC incident, what is one of the commander's primary responsibilities is to

       a.  appoint an investigating officer.
       b.  issue the incident a case number.
       c.  prepare the initial report of the incident.
       d.  prepare the final report of the incident.


65.  When a transfer report for COMSEC materials is received from the addressee, where is the form filed?

       a.  There is no requirement to file the transfer report from the addressee.
       b.  In folder 1 of the COMSEC account 6-part folder.
       c.  It is filed with the rest of the forms from that particular addressee.
       d.  In the AFCOMSEC Form 14 file folder.


66.  What program is a state-of-the-art ground communications infrastructure designed to replace existing older communication systems?

       a.  Theater Deployable Communications program.
       b.  Tactical Deployable Communications program.
       c.  Joint Service Deployable Communications program.
       d.  Tri-Service Tactical Communications program.


67.  Which of the following is not a reason to change a security container combination?

       a.  When placed in service.
       b.  Following a repair.
       c.  In use for 3 months.
       d.  When an individual is no longer authorized access.


68.  What algorithm is exclusively a key establishment protocol?

       a.  Digital Signature Algorithm (DSA).
       b.  Diffie and Hellman (DH).
       c.  Rivest-Shamir-Adleman (RSA).
       d.  Secure Hash Algorithm (SHA-1).


69.  For destruction purposes, what is the most sensitive keying material?

       a.  Encrypted keying information.
       b.  Current keying material.
       c.  Decrypted keying information.
       d.  Superseded keying material.


70.  Within how many days after filing the initial report are interim reports submitted?

       a.  60 days
       b.  30 days.
       c.  90 days
       d.  120 days


71.  What form is commonly used as a destruction certificate of COMSEC material?

       a.  AFCOMSEC Form 14.
       b.  SF 700.
       c.  SF153.
       d.  AFCOMSEC Form 16.


72.  What is not part of a requirements justification statement?

       a.  Cannibalization ability.
       b.  Cost
       c.  Security requirements.
       d.  Quality of life.


73.  Who assists organizations in obtaining new communications and information capabilities through equipment purchases?

       a.  Equipment custodian (EC).
       b.  MAJCOM equipment control officer (MECO).
       c.  Equipment control officer (ECO).
       d.  Communications and information systems officer (CSO).


74.  A change to a system that is out of production is known as

       a.  a modification.
       b.  an alternative.
       c.  an upgrade.
       d.  a refurbishment.


75.  What is the amount of annual recurring costs for a requirement that will initiate an economic analysis?

       a.  $150,000.
       b.  $50,000.
       c.  $100,000.
       d.  $200,000.


76.  Which phase is not involved in issuing COMSEC material?

       a.  Protection.
       b.  Preparation.
       c.  Administration
       d.  Distribution


77.  What should each COMSEC responsibility officer do prior to signing the COMSEC hand receipt?

       a.  Ensure the required COMSEC material is listed on the SF 153 and ready for issue.
       b.  Check the COMSEC manager's clearance status.
       c.  Check the users clearance to ensure they are authorized to utilize the material.
       d.  Check to see if the effective dates of material are correct.


78.  Which Air Force Instruction covers the Cryptographic Access Program?

       a.  AFI33-210.
       b.  AFI33-211.
       c.  API 33-213.
       d.  AFI 33-212.


79.  In which phase does the COMSEC manager determine which materials the COMSEC responsibility officers need?

       a.  Distribution.
       b.  Protection.
       c.  Preparation.
       d.  Administration.


80.  What are the major components of the Tri-Service Tactical Communications System (TRI-TAC)?

       a.  Voice and data switching, secure telephone systems, and technical systems control.
       b.  Voice and data switching, non-secure telephone systems, and technical systems control.
       c.  Voice and data switching, secure and non-secure telephone systems, and technical systems control.
       d.  Cryptographic data switching, secure and non-secure telephone systems, and technical systems control.


81.  Which item is contained in a unit's designed operational capability (DOC)?

       a.  Current training records.
       b.  Unit manning document.
       c.  Allocated resources.
       d.  Security access requirement (SAR) codes.


82.  Look on the back of the AFCOMSEC Form 16 during an inspection of an account to

       a.  ensure all account personnel have initialed the AFCOMSEC Form 16.
       b.  ensure nothing is on the back.
       c.  check if the COMSEC responsibility officer is inspecting the forms for accuracy.
       d.  ensure only the COMSEC responsibility officer has written on the back.


83.  Who is responsible for preparing the emergency action plan for the protection, security, or destruction of COMSEC material in case of an emergency?

       a.  National Security Agency (NSA).
       b.  COMSEC manager.
       c.  Cryptologic Systems Group (CSGP).
       d.  Wing commander.


84.  To create a digital signature, the private-key cryptography operation requires

       a.  a fixed-size input and computes an a arbitrary-size output.
       b.  an arbitrary-size input and computes a fixed-size output.
       c.  a fixed-size input and computes a fixed-size output.
       d.  an arbitrary-size input and computes an a arbitrary-size output.


85.  Which form can be considered a daily physical security inventory of your environment?

       a.  SF700.
       b.  SF701.
       c.  SF702
       d.  AF Form 1109.


86.  Who is the approval authority for primary COMSEC responsibility officer (CRO) grade waivers?

       a.  Wing commander.
       b.  Unit commander.
       c.  COMSEC manager.
       d.  Wing commanders with approval of COMSEC managers.


87.  Within how many days after you ship COMSEC materials, should you expect to receive a transfer report from an addressee?

       a.  30
       b.  60
       c.  120
       d.  90


88.  What security classification is marked on the COMSEC account semiannual inventory?

       a.  Top Secret.
       b.  UNCLASSIFIED.
       c.  Secret.
       d.  UNCLASSIFIED For Official Use Only.


89.  In what type of key cryptography are keys so different, that it would be possible to publicize one without danger of anyone being able to derive or compute the other?

       a.  Unrelated key.
       b.  Symetric cypher.
       c.  Related key.
       d.  Asymetric cypher.


90.  What rank must primary COMSEC responsibility officers (CRO) hold?

       a.  SSgt.
       b.  TSgt.
       c.  Capt
       d.  MSgt.


91.  Which COMSEC material is accounted for and inventoried continuously by quantity?

       a.  ALC-3.
       b.  ALC-1.
       c.  ALC-2.
       d.  ALC-4.


92.  All DOD certificate management infrastructures (CMI) have the ability to generate, sign, and process certificates that contain a

       a.  X.400 Distinguished Name (DN).
       b.  X.500 Distinguished Name (DN).
       c.  X.450 Distinguished Name (DN).
       d.  X.525 Distinguished Name (DN).


93.  Who approves or disapproves hardware maintenance below the line replaceable unit (LRU) level?

       a.  HQ AETC/TT.
       b.  HQ USAF/SCMOS.
       c.  HQ SSG/ENEI.
       d.  HQ USAF/ILM.


94.  When the COMSEC manager watches a user perform an inventory, the manager can tell

       a.  if the user is authorized access.
       b.  the kind of user training being conducted.
       c.  the user's ability to work under pressure.
       d.  the unit commander's interest in the program.


95.  The four steps in the requirements' process are

       a.  identifying CIS requirements, developing a certified technical solution, allocating resources, and evaluating the result in mission needs met.
       b.  identifying CIS requirements, developing a certified technical solution, implementing the requirement, and evaluating the result in mission needs met.
       c.  identifying CIS requirements, developing a certified technical solution, allocating resources, and implementing the requirement.
       d.  allocating resources, developing a certified technical solution, implementing the requirement, and evaluating the result in mission needs met.


96.  What is used as a segment disposition record of accessed and destroyed multiple keytape?

       a.  AFCOMSEC Form 22.
       b.  AFCOMSEC Form 16.
       c.  AFCOMSEC Form 30.
       d.  AFCOMSEC Form 23.


97.  Where does the next unused voucher number come from that is used on transfer reports?

       a.  Standard Form 153.
       b.  AFCOMSEC Form 23.
       c.  AFCOMSEC Form 14.
       d.  Standard Form 701.


98.  What is used for the generation, management, and distribution of keying material, including the programming of FORTEZZA cards?

       a.  Certification authority workstation (CAW).
       b.  Certificate repository.
       c.  Registration management authority.
       d.  Certification authority.


99.  AFI 33-211, COMSEC Users Handbook, directs the COMSEC responsibility officer to answer write-ups found during an inspection within what time period until the write-up is cleared?

       a.  90 days.
       b.  30 days.
       c.  60 days.
       d.  At the discretion of the COMSEC manager.


100.  Who issues a COMSEC incident a case number and determines when to close the case?

       a.  Air Force Communications Agency (AFCA).
       b.  National Security Agency (NSA).
       c.  COMSEC manager.
       d.  Wing commander.


101.  Who decides a unit's unit type code (UTC) tasking?

         a.  Unit commander.
         b.  MAJCOM.
         c.  Wing commander.
         d.  HQ USAF/SC.


102.  In which folder of the COMSEC account 6-part folder are destruction certificates filed?

         a.  1
         b.  6
         c.  2
         d.  4


103.  What system provides the capability to plan, execute and reconstitute both offensive and defensive operations in continually building phases?

         a.  The Theater Battle Management Core Systems (TBMCS).
         b.  Ground Theater Air Control System (GTACS).
         c.  Contingency Theater Automated Planning System (CTAPS).
         d.  Theater Deployable Communications System (TDCS).


104.  Which class of certification establishes an identity through an association with a service, agency, or other component of the DOD?

         a.  4
         b.  1
         c.  3
         d.  2


105.  Who provides oversight of Air Force supplemental technical training?

         a.  HQ SSG/ENEI.
         b.  HQ AETC/TT.
         c.  HQ USAF/SCMOS.
         d.  HQ USAF/ILM.


106.  Judicious deployment of a single, unifying Public Key Infrastructure technology can help to

         a.  optimize system administrator productivity.
         b.  reduce the number of sign-on events required by end-users.
         c.  increase throughput of a network.
         d.  reduce hardware overhead.


107.  Who is ultimately responsible for all Emergency Actions Plans on base?

         a.  COMSEC manager.
         b.  COMSEC responsibility officer.
         c.  MAJCOM.
         d.  Unit commander.


108.  Disposition records and/or destruction reports are not required for material that has been issued to

         a.  base COMSEC account itself.
         b.  NATO forces.
         c.  transient aircrews.
         d.  joint military operations.


109.  Who handles the day-to-day operations of the base (Communications Sq) account?

         a.  Users
         b.  COMSEC accountants.
         c.  COMSEC manager.
         d.  COMSEC responsibility officers.


110.  In what folder of the COMSEC account 6-part folder is the account copy of the Standard Form 153 transfer report filed?

         a.  3
         b.  2
         c.  1
         d.  4


111.  What establishes a person's right to access and need to know classified information?

         a.  security clearance.
         b.  An access list.
         c.  Unit commander's approval.
         d.  A security access requirement.


112.  How often must the security clearances of personnel working in a COMSEC account be verified?

         a.  Quarterly.
         b.  Monthly.
         c.  Semi-annually.
         d.  Annually.


113.  The handling and accounting of COMSEC material is determined by the

         a.  amount of material.
         b.  type of material.
         c.  accounting legend code.
         d.  effective date of the material.


114.  In the Public Key Infrastructure, who verifies user requests for digital certificates?

         a.  Directory Service Repository.
         b.  Certification authority.
         c.  Domain name authority.
         d.  Registration authority.


115.  What system provides the ability to rapidly detect and identify airborne targets with minimal or no support?

         a.  Theater Deployable Communications System.
         b.  Ground Theater Air Control System (GTACS).
         c.  Tri-Service Tactical Communications System.
         d.  Joint Service Deployable Communications System.


116.  Who is ultimately responsible for disseminating information affecting COMSEC material issued is the user holding the material?

         a.  Unit commander.
         b.  COMSEC responsibility officer.
         c.  COMSEC manager.
         d.  MAJCOM.


117.  The listing of your accounts holdings that helps you verify which COMSEC responsibility officer (CRO) requires particular aids is the

         a.  request message.
         b.  request letter.
         c.  account database.
         d.  shipping requisition.


118.  Which theater deployable communication (TDC) component provides easily deployable, long haul communications?

         a.  Switched Circuit Network (SCN).
         b.  Lightweight Multiband Satellite Terminal (LMST).
         c.  Datagram Switched Network (DSN).
         d.  Integrated Communications Access Package (ICAP).


119.  How many years is it suggested you use for the system life expectancy if this information is not available from the manufacturer or Air Force Material Command (AFMC)?

         a.  6
         b.  4
         c.  10
         d.  8


120.  What is the "Type B" mobility bag and what does it contain?
         a.  Chemical warfare defense equipment bags; mask, filter units, over-garments, and atropine.
         b.  Hot weather bag; desert environment equipment, salt pills.
         c.  General purpose bags; helmet, canteen, mess kit, and wet weather overalls.
         d.  Cold weather gear bag; mittens, parka, lined field caps, etc.


121.  Whenever COMSEC material needs to be replaced or amended immediately, who develops the original messages for COMSEC accounts by urgent electronic message?

         a.  Cryptologic Systems Group (CSGP).
         b.  National Security Agency (NSA).
         c.  COMSEC manager.
         d.  MAJCOM.


122.  The shared secret information specifying exactly how the transformation of a message to and from gibberish is to be accomplished is called a

         a.  lock
         b.  key
         c.  cipher
         d.  lock and key process.


123.  What is the "Type A" mobility bag and what does it contain?

         a.  Hot weather bag; desert environment equipment, salt pills.
         b.  General purpose bag; helmet, canteen, mess kit, and wet weather overalls.
         c.  Cold weather gear bag; mittens, parka, lined field caps, etc.
         d.  Chemical warfare defense equipment bag; mask, filter units, over-garments, and atropine.


124.  Who should the communications and information systems officer (CSO) request assistance from if the requirement request is beyond the scope of local expertise?

         a.  HQ SSG/ENEI.
         b.  Systems Tele-Communications Engineering Manager (STEM)-B.
         c.  MAJCOM equipment control officers (MECO).
         d.  HQ USAF/ILM.

Click here for Answers


Click here to submit your information.
  Send a Comment and/or Suggestion


Page Added on: 16 January 2006

Copyright © 2005 AFMENTOR. All rights reserved.
Revised: 02/27/06.