Term
| What is the first job the basic input/output system (BIOS) does at start-up? |
|
Definition
| (d) Run the power-on self-test (POST) |
|
|
Term
| Which original component was very susceptible to damage from electrostatic distcharge? |
|
Definition
| (c) Complementary metal-oxide semiconductor (CMOS) |
|
|
Term
| Which component uses a lithium battery to maintain computer settings when power is removed |
|
Definition
| (c) Complementary metal-oxide semiconductor (CMOS) |
|
|
Term
| What is considered as nonvolitile permanent memory? |
|
Definition
| (a) Read-only memory (ROM) |
|
|
Term
| What is a form of firmware that contains the computer's startup instructions? |
|
Definition
| (a) Basic Input Output System (BIOS) |
|
|
Term
| What static RAM (SRAM) uses special applications in a CPU? |
|
Definition
|
|
Term
| On most modern computers, which has two or three levels of memory? |
|
Definition
|
|
Term
| Actively sampling the status of an external device by a client program is known as |
|
Definition
|
|
Term
| What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event? |
|
Definition
|
|
Term
| What interrupt request (IRQ) line number is normally used for the floppy disk controller? |
|
Definition
|
|
Term
| Which term describes that data is whole or complete |
|
Definition
|
|
Term
| What is considered as a technique or method of checking data integrity? |
|
Definition
|
|
Term
| Which is a very simple example of an error detecting code? |
|
Definition
|
|
Term
| What component initializes communication with all hardware devices and sends a message if a keyboard or mouse is not found? |
|
Definition
| (b) Basic input output system (BIOS) |
|
|
Term
| Which is a small, low-level program used by the computer operating system to interact with hardware devices? |
|
Definition
|
|
Term
| What is the sudden and monentary electric current that flows between two objects at different electrical potentials? |
|
Definition
| (d) Electrostatic discharge |
|
|
Term
| Static electricity remains intact until it is |
|
Definition
|
|
Term
| Under what class of electrostatic discharge (ESD) would an item fall if it was sensitive to 900 volts? |
|
Definition
|
|
Term
| Electrostatic discharge (ESD) items sensitive to more than 4000 but lass than 15000 volts fall into category |
|
Definition
|
|
Term
| What measure would you take to prevent the build up of static electricity? |
|
Definition
| (a) Ground the electrostatic discharge sensitive (ESDS) device. |
|
|
Term
| What is the first step you must take when either installing or removing an electrostatic discharge sensitive (ESDS) device? |
|
Definition
| (d) Turn the power switch to the off position |
|
|
Term
| The process of collecting and analyzing data to determine the cause of an operational failure and how to prevent it from recurring is called |
|
Definition
|
|
Term
| In which troubleshooting step would you determine which conditions are present? |
|
Definition
|
|
Term
| In which troubleshooting step would you confirm a dilemma exists? |
|
Definition
|
|
Term
| In which troubleshooting step would you identify likely causes and eliminate unlikely causes? |
|
Definition
|
|
Term
| In which troubleshooting step would you review the case history and assure no steps were missed? |
|
Definition
| (d) Confirm the resolution |
|
|
Term
| What is normally the next step in the boot up process after initial power is supplied? |
|
Definition
| (a) the keyboard lights should flash |
|
|
Term
| What is normally the next step in the boot up process after the BIOS message appears on the monitor? |
|
Definition
| (a) A memory test should be visible on the monitor |
|
|
Term
| Normally the last step in the boot up process is |
|
Definition
| (d) the operating system (OS) loads into memory and user interface appears. |
|
|
Term
| What can detect if central processing unit (CPU) hardware problems exist? |
|
Definition
| (b) Power-on-self-test (POST) |
|
|
Term
| When troubleshooting hardware, one simple method of identifying cables is to |
|
Definition
| (d) place masking tape to the cables and connection points. |
|
|
Term
| What rank must primary communications security responsible officers (CRO) hold? |
|
Definition
|
|
Term
| Who has the authority to approve waivers that are mission justified? |
|
Definition
| (a) Communications security (COMSEC) manager |
|
|
Term
| After receiving their initial educations in communications security (COMSEC) account management, how often must communications security resposible officer's (CRO) be trained to remain qualified to manage their account? |
|
Definition
|
|
Term
| To ensure communications security responsible officers (CRO) are complying with applicable directives and accounting for the communications security (COMSEC) material under their control, the COMSEC manager is required to inspect their accounts at least |
|
Definition
|
|
Term
| Who is responsible for the production and management of cryptographic material within the US government? |
|
Definition
| (a) Director National Security Agency (DIRNSA) |
|
|
Term
| What is the classification of the combination to any security container? |
|
Definition
| (d) Always classified to the highest classification of material within the container. |
|
|
Term
| The operational use and control of communications security (COMSEC) material is overseen and managed by |
|
Definition
| (a) a controlling authority |
|
|
Term
| This communications security (COMSEC) material requires the most strenuous accounting practices by using an accounting control number. |
|
Definition
| (a) Accounting legend code (ALC)-1 |
|
|
Term
| This communications security (COMSEC) material is accounted for continuously by quantity. |
|
Definition
| (b) Accounting legend code (ALC)-2 |
|
|
Term
| This communications security (COMSEC) material is not required to be tracked on the daily or shift inventory. |
|
Definition
| (d) Accounting legend code (ALC)-4 |
|
|
Term
| This form is considered a daily physical security inventory for your environment. |
|
Definition
|
|
Term
| What form do you fill out and affix to the inside of the locking drawer when you change a safe combination? |
|
Definition
| (a) Standard Form (SF) 700 |
|
|
Term
| At a minimum, how often do you change a cipher lock combination? |
|
Definition
|
|
Term
| What is the preferred method for listing material on the Air Force communications security (AFCOMSEC) Form 16? |
|
Definition
| (d) Alphabetically by short title. |
|
|
Term
| Air Force communicaitons security (AFCOMSEC) Form 16 inventories are retained for the current inventory plus how many previous months of inventory? |
|
Definition
|
|
Term
| If it is physically impossible to conduct an inventory of a user because of distance, the communicaitions security (COMSEC) manager |
|
Definition
| (d) asks the user to verify his or her holding by letter or message. |
|
|
Term
| Who establishes the semi-annual inventory date for each communication security (COMSEC) account number? |
|
Definition
| (d) Cryptologic support group (CPSG) |
|
|
Term
| The individual who is required to use an safeguard communications security (COMSEC) aids while performing official duties is the |
|
Definition
|
|
Term
| What is the term used when referring to specific communications security (COMSEC) material other than equipment? |
|
Definition
|
|
Term
| Where does the next unused voucher number come from that is used on transfer reports? |
|
Definition
| (a) Air Force communications security (AFCOMSEC) Form 14 |
|
|
Term
| In which phase does the communications security (COMSEC) manager determine which materials the communicaitons security responsible officer (CRO) needs? |
|
Definition
|
|
Term
| In which phase does the communications security responsible officer (CRO) check the material issued against the list on the Standard Form (SF) 153? |
|
Definition
|
|
Term
| What should each communications security responsible officer (CRO) do before signing the commmunications security (COMSEC) hand receipt? |
|
Definition
| (d) Ensure the required COMSEC material is listed on the Standard Form (SF) 153 and ready for issue |
|
|
Term
| Disposition records and/or destruction reports are not required for material that has been issued to |
|
Definition
|
|
Term
| What term suggests movement of material from one place to another by someone with an active interest in that material? |
|
Definition
|
|
Term
| What is the maximum number of different actions that can be accomplished on a single Standard Form (SF) 153? |
|
Definition
|
|
Term
| What form is commonly used as a destruction certificate of communications security (COMSEC) material? |
|
Definition
| (a) Standard Form (SF) 153 |
|
|
Term
| In which folder of the communications security (COMSEC) account 6-part folder are destruciton certificates filed? |
|
Definition
|
|
Term
| Whenever communications security (COMSEC) material needs to be replaced or amended immediately, who develops the original messages for COMSEC accounts by urgent electronic message? |
|
Definition
| (b) Cryptologic systems group (CSGP) |
|
|
Term
| Failure to comply with an urgent dissemination message could constitute in what kind of violation? |
|
Definition
| (d) Cryptographic incident |
|
|
Term
| Who is ultimately responsible for all emergency actions plans (EAP) on base? |
|
Definition
| (a) Communications security manager (CM) |
|
|
Term
| How long do you need to maintain the written documentaion of the semiannual emergency action plan (EAP) exercises? |
|
Definition
|
|
Term
| Which Air Force form do communications security managers (CM) use when conducting an inspection of a sub communications security (COMSEC) account? |
|
Definition
|
|
Term
| What is the maximum time between emergency action plan (EAP) exercises at communications security responsible officers (CRO) accounts? |
|
Definition
|
|
Term
| Who is the final approvay authority for a person going into two-person control (TPC) positions? |
|
Definition
| (b) The commander of the unit holding TPC material |
|
|
Term
| What is used for the generation, management, and distribution of keying material, including, programming FORTEZZA cards? |
|
Definition
| (d) Certification authority workstation (CAW) |
|
|
Term
| What is know as a state-of-the-art, ground-to-ground communications infrastructure? |
|
Definition
| (c) Theater deployable communications (TDC) |
|
|
Term
| What theater deployable communications (TDC) characteristic reflects module architecture which comply with established international or commercial communication standards? |
|
Definition
| (d) Open system standards |
|
|
Term
| What theater deployable communications (TDC) characteristic requires equipment setup times are kept to an absolute minimum to support transportation, deployment, and operations in a deployed environment? |
|
Definition
|
|
Term
| What theater deployable communications (TDC) characteristic requires equipment be capable of operation/maintenance by personnel wearing nuclear, biological, and chemical (NBC) protective gear? |
|
Definition
|
|
Term
| What is known as a suite of modules and accessory kits serving as the backbone of deployed communication networks? |
|
Definition
| (d) Integrated communications access package (ICAP) |
|
|
Term
| Who provides uninterrupted flow of mission critical information to field units, in-garrison units for the duration of a contingency? |
|
Definition
| (d) Sustained communications support teams |
|
|
Term
| Who should you notify immediately of any predeployment shortfalls? |
|
Definition
| (c) Unit deployment manager and commander |
|
|
Term
| What phase is concerned with exercises to ensure you are familiar with the deployement process and with your equipment? |
|
Definition
|
|