Term
What is the first job the basic input/output system (BIOS) does at start-up? |
|
Definition
(d) Run the power-on self-test (POST) |
|
|
Term
Which original component was very susceptible to damage from electrostatic distcharge? |
|
Definition
(c) Complementary metal-oxide semiconductor (CMOS) |
|
|
Term
Which component uses a lithium battery to maintain computer settings when power is removed |
|
Definition
(c) Complementary metal-oxide semiconductor (CMOS) |
|
|
Term
What is considered as nonvolitile permanent memory? |
|
Definition
(a) Read-only memory (ROM) |
|
|
Term
What is a form of firmware that contains the computer's startup instructions? |
|
Definition
(a) Basic Input Output System (BIOS) |
|
|
Term
What static RAM (SRAM) uses special applications in a CPU? |
|
Definition
|
|
Term
On most modern computers, which has two or three levels of memory? |
|
Definition
|
|
Term
Actively sampling the status of an external device by a client program is known as |
|
Definition
|
|
Term
What is defined as an asynchronous signal from a computer hardware device indicating the need for attention from a central processing unit (CPU) or a synchronous event? |
|
Definition
|
|
Term
What interrupt request (IRQ) line number is normally used for the floppy disk controller? |
|
Definition
|
|
Term
Which term describes that data is whole or complete |
|
Definition
|
|
Term
What is considered as a technique or method of checking data integrity? |
|
Definition
|
|
Term
Which is a very simple example of an error detecting code? |
|
Definition
|
|
Term
What component initializes communication with all hardware devices and sends a message if a keyboard or mouse is not found? |
|
Definition
(b) Basic input output system (BIOS) |
|
|
Term
Which is a small, low-level program used by the computer operating system to interact with hardware devices? |
|
Definition
|
|
Term
What is the sudden and monentary electric current that flows between two objects at different electrical potentials? |
|
Definition
(d) Electrostatic discharge |
|
|
Term
Static electricity remains intact until it is |
|
Definition
|
|
Term
Under what class of electrostatic discharge (ESD) would an item fall if it was sensitive to 900 volts? |
|
Definition
|
|
Term
Electrostatic discharge (ESD) items sensitive to more than 4000 but lass than 15000 volts fall into category |
|
Definition
|
|
Term
What measure would you take to prevent the build up of static electricity? |
|
Definition
(a) Ground the electrostatic discharge sensitive (ESDS) device. |
|
|
Term
What is the first step you must take when either installing or removing an electrostatic discharge sensitive (ESDS) device? |
|
Definition
(d) Turn the power switch to the off position |
|
|
Term
The process of collecting and analyzing data to determine the cause of an operational failure and how to prevent it from recurring is called |
|
Definition
|
|
Term
In which troubleshooting step would you determine which conditions are present? |
|
Definition
|
|
Term
In which troubleshooting step would you confirm a dilemma exists? |
|
Definition
|
|
Term
In which troubleshooting step would you identify likely causes and eliminate unlikely causes? |
|
Definition
|
|
Term
In which troubleshooting step would you review the case history and assure no steps were missed? |
|
Definition
(d) Confirm the resolution |
|
|
Term
What is normally the next step in the boot up process after initial power is supplied? |
|
Definition
(a) the keyboard lights should flash |
|
|
Term
What is normally the next step in the boot up process after the BIOS message appears on the monitor? |
|
Definition
(a) A memory test should be visible on the monitor |
|
|
Term
Normally the last step in the boot up process is |
|
Definition
(d) the operating system (OS) loads into memory and user interface appears. |
|
|
Term
What can detect if central processing unit (CPU) hardware problems exist? |
|
Definition
(b) Power-on-self-test (POST) |
|
|
Term
When troubleshooting hardware, one simple method of identifying cables is to |
|
Definition
(d) place masking tape to the cables and connection points. |
|
|
Term
What rank must primary communications security responsible officers (CRO) hold? |
|
Definition
|
|
Term
Who has the authority to approve waivers that are mission justified? |
|
Definition
(a) Communications security (COMSEC) manager |
|
|
Term
After receiving their initial educations in communications security (COMSEC) account management, how often must communications security resposible officer's (CRO) be trained to remain qualified to manage their account? |
|
Definition
|
|
Term
To ensure communications security responsible officers (CRO) are complying with applicable directives and accounting for the communications security (COMSEC) material under their control, the COMSEC manager is required to inspect their accounts at least |
|
Definition
|
|
Term
Who is responsible for the production and management of cryptographic material within the US government? |
|
Definition
(a) Director National Security Agency (DIRNSA) |
|
|
Term
What is the classification of the combination to any security container? |
|
Definition
(d) Always classified to the highest classification of material within the container. |
|
|
Term
The operational use and control of communications security (COMSEC) material is overseen and managed by |
|
Definition
(a) a controlling authority |
|
|
Term
This communications security (COMSEC) material requires the most strenuous accounting practices by using an accounting control number. |
|
Definition
(a) Accounting legend code (ALC)-1 |
|
|
Term
This communications security (COMSEC) material is accounted for continuously by quantity. |
|
Definition
(b) Accounting legend code (ALC)-2 |
|
|
Term
This communications security (COMSEC) material is not required to be tracked on the daily or shift inventory. |
|
Definition
(d) Accounting legend code (ALC)-4 |
|
|
Term
This form is considered a daily physical security inventory for your environment. |
|
Definition
|
|
Term
What form do you fill out and affix to the inside of the locking drawer when you change a safe combination? |
|
Definition
(a) Standard Form (SF) 700 |
|
|
Term
At a minimum, how often do you change a cipher lock combination? |
|
Definition
|
|
Term
What is the preferred method for listing material on the Air Force communications security (AFCOMSEC) Form 16? |
|
Definition
(d) Alphabetically by short title. |
|
|
Term
Air Force communicaitons security (AFCOMSEC) Form 16 inventories are retained for the current inventory plus how many previous months of inventory? |
|
Definition
|
|
Term
If it is physically impossible to conduct an inventory of a user because of distance, the communicaitions security (COMSEC) manager |
|
Definition
(d) asks the user to verify his or her holding by letter or message. |
|
|
Term
Who establishes the semi-annual inventory date for each communication security (COMSEC) account number? |
|
Definition
(d) Cryptologic support group (CPSG) |
|
|
Term
The individual who is required to use an safeguard communications security (COMSEC) aids while performing official duties is the |
|
Definition
|
|
Term
What is the term used when referring to specific communications security (COMSEC) material other than equipment? |
|
Definition
|
|
Term
Where does the next unused voucher number come from that is used on transfer reports? |
|
Definition
(a) Air Force communications security (AFCOMSEC) Form 14 |
|
|
Term
In which phase does the communications security (COMSEC) manager determine which materials the communicaitons security responsible officer (CRO) needs? |
|
Definition
|
|
Term
In which phase does the communications security responsible officer (CRO) check the material issued against the list on the Standard Form (SF) 153? |
|
Definition
|
|
Term
What should each communications security responsible officer (CRO) do before signing the commmunications security (COMSEC) hand receipt? |
|
Definition
(d) Ensure the required COMSEC material is listed on the Standard Form (SF) 153 and ready for issue |
|
|
Term
Disposition records and/or destruction reports are not required for material that has been issued to |
|
Definition
|
|
Term
What term suggests movement of material from one place to another by someone with an active interest in that material? |
|
Definition
|
|
Term
What is the maximum number of different actions that can be accomplished on a single Standard Form (SF) 153? |
|
Definition
|
|
Term
What form is commonly used as a destruction certificate of communications security (COMSEC) material? |
|
Definition
(a) Standard Form (SF) 153 |
|
|
Term
In which folder of the communications security (COMSEC) account 6-part folder are destruciton certificates filed? |
|
Definition
|
|
Term
Whenever communications security (COMSEC) material needs to be replaced or amended immediately, who develops the original messages for COMSEC accounts by urgent electronic message? |
|
Definition
(b) Cryptologic systems group (CSGP) |
|
|
Term
Failure to comply with an urgent dissemination message could constitute in what kind of violation? |
|
Definition
(d) Cryptographic incident |
|
|
Term
Who is ultimately responsible for all emergency actions plans (EAP) on base? |
|
Definition
(a) Communications security manager (CM) |
|
|
Term
How long do you need to maintain the written documentaion of the semiannual emergency action plan (EAP) exercises? |
|
Definition
|
|
Term
Which Air Force form do communications security managers (CM) use when conducting an inspection of a sub communications security (COMSEC) account? |
|
Definition
|
|
Term
What is the maximum time between emergency action plan (EAP) exercises at communications security responsible officers (CRO) accounts? |
|
Definition
|
|
Term
Who is the final approvay authority for a person going into two-person control (TPC) positions? |
|
Definition
(b) The commander of the unit holding TPC material |
|
|
Term
What is used for the generation, management, and distribution of keying material, including, programming FORTEZZA cards? |
|
Definition
(d) Certification authority workstation (CAW) |
|
|
Term
What is know as a state-of-the-art, ground-to-ground communications infrastructure? |
|
Definition
(c) Theater deployable communications (TDC) |
|
|
Term
What theater deployable communications (TDC) characteristic reflects module architecture which comply with established international or commercial communication standards? |
|
Definition
(d) Open system standards |
|
|
Term
What theater deployable communications (TDC) characteristic requires equipment setup times are kept to an absolute minimum to support transportation, deployment, and operations in a deployed environment? |
|
Definition
|
|
Term
What theater deployable communications (TDC) characteristic requires equipment be capable of operation/maintenance by personnel wearing nuclear, biological, and chemical (NBC) protective gear? |
|
Definition
|
|
Term
What is known as a suite of modules and accessory kits serving as the backbone of deployed communication networks? |
|
Definition
(d) Integrated communications access package (ICAP) |
|
|
Term
Who provides uninterrupted flow of mission critical information to field units, in-garrison units for the duration of a contingency? |
|
Definition
(d) Sustained communications support teams |
|
|
Term
Who should you notify immediately of any predeployment shortfalls? |
|
Definition
(c) Unit deployment manager and commander |
|
|
Term
What phase is concerned with exercises to ensure you are familiar with the deployement process and with your equipment? |
|
Definition
|
|