This site is 100% ad supported. Please add an exception to adblock for this site.

3C051 Exam

Terms

undefined, object
copy deck
List the inventory requirements for each category of accounting legend code material
a. ALC-1 Inventory this material by short title, edition, accounting control number, and quantity.
b. This material is accounted for continuously, just as ALC-1, except you inventory and account by quantity rather than by the accounting control number.
c. ALC-4 It is not required to account for this material on the daily or the shift inventory.
What is a trap?
An unsolicited message from an agent to the manager and, therefore, does not have a corresponding request message. The trap operation reports the occurrance of an event on a system and may provide the value of one or more instances of management information.
How can we catorgorize users in relation to file management?
By their job or duty position.
What is AF form 1109, visitor register, used for?
To record access to COMSEC materials by persons not on the authorized access list.
What is the difference between a fault and an error?
Faults are abnormal conditions that require NCC personnel to take action to correct or repair. Errors sometimes arise on a normal functioning of the network and do not necessarily require attention.
Convert the following octal numbers to their decimal equivalents:
a. 73^8
b. 460^8
c. 1045^8
d. 1724^8
e. 4304^8
f. 11762^8
a. 50^10
b. 304^10
c. 549^10
d. 980^10
e. 2244^10
f. 5106^10
Which layer provides a routing path through a network by which users can comunicate?
The network layer
What is the major portion of a comsec managers job?
Training those individuals who are responsible for the COMSEC program within their units.
If there is a disreprancy in the classification marking of a received COMSEC material, what do you do.
Send a message to the originator, keep the wrappers, and await disposition.
Why is each device assigned a separate interupt level?
To reduce or eliminate conflicts with other devices that require the attention of the CPU.
Who is responsible for the production and management of crytographic material within the US Government?
The Director of the National Security Agency (DIRNSA)
List the 4 phases of DITSCAP
1. Definition
2. Verification
3. Validation
4. Post accreditation
In fiber optic cabling what is the principles that keeps the light trapped in the core and allows it to bend round curves in the fiber?
Total internal reflection.
Subtract the following Hex numbers:
1CD^16 400^16 D29^16
-142^16 -240^16 - C5^16
---------------------------
a. 8A^16
b. 1C0^16
c. C64^16
When in doubt about wether or not someone is eligible for access to classified information who do you ask?
Your supervisor
When must you change a security container combinations.
When placed in/out of service
When an individual is no longer authorized access.
Annually
If the container is found open, but certified as having been locked.
If there is a possibility that the combination has been compromised.
When would a controlled area warning sign not be posted?
Cotrolled area warning signs are posted conspicuously, except when a sign would compromise the security of the area.
How do you insure a binary number contains the required number of digits to be converted to its octal equivalent?
To condition a binary number for conversion to octal equivalence, you must add placeholder zeros to the extreme left of the integer portion and to the extreme right of the fractional portion(if any) until the total number of binary digits is divisible by three.
What is meant by talking shop?
Discussing our mission or jobs in a leisure or unsecured area.
What component is connected to the oscillator to lend consistency to the oscillation.
The crystal.
Beyond the terms RAM or ROM, memory in a pc is broken into what four basic divisions?
Conventional memory, upper memory, high memory and extended memmory areas.
What is the basic stance of the network security policy?
To allow authorized traffic and deny all else.
What is the basis for any decision a computer makes?
Any decision a computer makes is based upon a comparison of some type.
What is the protocol used for error reporting with IP?
Internet control message protocol(ICMP)
What action should you take if you discover a classified document is improperly marked?
Report it to your security manager.
Why is personal awareness especially important for security of a controlled area?
Unless physical barriers are specifically required, the actual effectiveness of a controlled area may depend entirely on the security awareness of the people working within that area.
What is a comsec user?
Any individual required to use and safeguard COMSEC material and or aids in the performance of their official duties.
What is a simple add-on device that works at the physical layer of the OSI model, and helps to reduce attenuation by duplication the cables signal?
A repeater.
What are two ways you can receive classified COMSEC material?
Via the Defense Courier service or the US postal system.
What form is normally used to record daily, shift, or other local inventories of COMSEC material?
AFCOMSEC Form 16

Deck Info

30

permalink