1.
What is a collection of interoperable systems developed for the services and
government agencies to automate handling and management of communications security
(COMSEC) material?
Correct Answer
A. Electronic key management system (EMKS).
Explanation
The correct answer is Electronic key management system (EMKS). EMKS is a collection of interoperable systems developed for services and government agencies to automate the handling and management of communications security material, specifically COMSEC material. It is designed to securely generate, distribute, and manage cryptographic keys used for encrypting and decrypting sensitive information. EMKS ensures the confidentiality, integrity, and availability of communications by providing a centralized and automated solution for key management.
2.
What allows one element to pass required information to another element enabling
both elements to generate the same key session?
Correct Answer
C. Firefly credentials.
Explanation
Firefly credentials enable one element to pass required information to another element, allowing both elements to generate the same key session. This suggests that Firefly credentials have the capability to establish a secure and synchronized communication between the two elements, ensuring that they can generate and use the same key for their sessions. This implies that Firefly credentials play a crucial role in facilitating secure and consistent communication between elements in a system.
3.
Who appoints communications security responsible officers (CRO) to support a
unit’s communications security (COMSEC) mission?
Correct Answer
C. Supported unit commander.
Explanation
The supported unit commander appoints communications security responsible officers (CRO) to support a unit's communications security (COMSEC) mission. This individual has the authority and responsibility to select and assign CROs who will be responsible for implementing and maintaining COMSEC measures within the unit. The CROs play a crucial role in ensuring the confidentiality, integrity, and availability of communications systems and information within the unit.
4.
Who is responsible for identifying cryptonet members?
Correct Answer
D. Controlling authorities.
Explanation
Controlling authorities are responsible for identifying cryptonet members. They have the authority and control to determine who can access and be part of the cryptonet. They play a crucial role in managing the security and access control of the network, ensuring that only authorized individuals are granted membership. The other options mentioned, such as the LCMS administrator, CRO, and COMSEC accountant, may have roles related to communication security management, but they do not specifically address the responsibility of identifying cryptonet members.
5.
Which communications security (COMSEC) tier generates, distributes, and performs
accounting functions of all modern key, physical traditional key, and certain electronic
key?
Correct Answer
A. Zero
Explanation
COMSEC tier Zero is responsible for generating, distributing, and performing accounting functions of all modern key, physical traditional key, and certain electronic key. This means that tier Zero handles the entire process of key management and ensures the secure distribution and accounting of keys for communication security.
6.
All are requirements that must be met to be a primary communications security
account manager (CAM) without a waiver except
Correct Answer
B. Being a 3D0XX noncommissioned officer (NCO).
Explanation
To be a primary communications security account manager (CAM), one must meet several requirements without needing a waiver. These requirements include being a US citizen, possessing a security clearance that matches the type of material in the account, and meeting the minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1. However, being a 3D0XX noncommissioned officer (NCO) is not a requirement that must be met without a waiver.
7.
To become a communications security account manager (CAM), you must either
complete the CAM course or have had how many years of previous communications
security (COMSEC) operations experience?
Correct Answer
C. Three
Explanation
To become a communications security account manager (CAM), you must have had three years of previous communications security (COMSEC) operations experience. This indicates that the CAM course is not the only requirement for becoming a CAM, and that practical experience in COMSEC operations is also considered as a qualification for the role.
8.
Who requires that the communications security account manager (CAM) be formally
trained to certify the training of local management device/key processor (LMD/KP)
platform users?
Correct Answer
C. National Security Agency (NSA).
Explanation
The National Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users. This implies that the NSA has specific standards and protocols in place for the certification of LMD/KP platform users, and they have designated the CAM as the responsible party for ensuring that these standards are met.
9.
How often must communications security account manager (CAM) waivers be
renewed?
Correct Answer
C. Annually.
Explanation
CAM waivers for communications security account managers must be renewed annually. This means that the waivers need to be reviewed and updated every year to ensure that the manager is still qualified and authorized to handle communications security. This regular renewal process helps to maintain the security and integrity of communications systems within an organization.
10.
How many copies of a communications security account manager (CAM) rescission
letter must be prepared?
Correct Answer
B. Four
Explanation
Four copies of a communications security account manager (CAM) rescission letter must be prepared. This is because multiple copies of the letter are usually required for distribution to different parties involved in the process, such as the recipient, the sender's records, legal department, or any other relevant departments or individuals.
11.
Communications security (COMSEC) accountants should inspect all protective
packaging for signs of tampering and report discrepancies in accordance with
Correct Answer
D. AFSSI 4212.
Explanation
COMSEC accountants are responsible for ensuring the security of communications systems. They are required to inspect all protective packaging for signs of tampering. If any discrepancies are found, they must report them. The correct answer, AFSSI 4212, is the Air Force System Security Instruction that provides guidance on the inspection of protective packaging and reporting any tampering.
12.
The information assurance assessment and assistance program (IAAP) team consists
of personnel experienced in all the following Air Force specialties except
Correct Answer
A. Security forces
Explanation
The correct answer is security forces. The IAAP team consists of personnel experienced in all the mentioned Air Force specialties except security forces. This means that the team includes personnel with experience in information systems, information assurance (IA), and base information infrastructures. However, security forces is not one of the specialties represented in the IAAP team.
13.
Air Force (AF) Form 4160 is used to assess all the following programs except
Correct Answer
B. Operations security (OPSEC).
Explanation
Air Force (AF) Form 4160 is used to assess programs related to communications security (COMSEC), emission security (EMSEC), and information assurance (IA). However, it is not used to assess programs related to operations security (OPSEC).
14.
Who assesses local communications security (COMSEC) elements during
“command” assessments?
Correct Answer
B. Major command (MAJCOM).
Explanation
During "command" assessments, the local communications security (COMSEC) elements are assessed by the Major command (MAJCOM). This means that the responsibility of evaluating and ensuring the security of the communication systems within a specific command falls on the MAJCOM. They are responsible for overseeing and managing the COMSEC elements to ensure that they are in compliance with the necessary security protocols and standards.
15.
Drilled and repaired security containers or vaults may be used to store
communications security (COMSEC) material after they are inspected for safeguarding
capabilities according to which publication?
Correct Answer
B. Technical Order (TO) 00–20F–2.
Explanation
The correct answer is Technical Order (TO) 00–20F–2. This is because TO 00–20F–2 provides instructions and guidance on the inspection and repair of security containers or vaults used for storing communications security (COMSEC) material. It ensures that these containers or vaults meet the necessary safeguarding capabilities to protect the COMSEC material.
16.
Qualified personnel perform preventative maintenance and security inspections on
safes and vaults every
Correct Answer
D. Five years for safes; every two years for vaults.
17.
In which type of safe must you store top secret (TS) keying material (KEYMAT)?
Correct Answer
A. Class A.
Explanation
Top secret (TS) keying material (KEYMAT) must be stored in a Class A safe. Class A safes are specifically designed to provide the highest level of protection for classified information and materials. These safes have the most stringent security measures and are capable of safeguarding sensitive information against unauthorized access, theft, and physical damage. Storing TS keying material in a Class A safe ensures that it is adequately protected and only accessible to authorized personnel with the appropriate clearance level.
18.
Where should you account for keyed short-term devices?
Correct Answer
A. Communications security pHysical inventory (CPI).
Explanation
The correct answer is Communications security physical inventory (CPI). This is the appropriate place to account for keyed short-term devices. CPI is a process that ensures the proper control, accountability, and safeguarding of communications security (COMSEC) material, including short-term devices. It involves conducting regular inventories to verify the presence and condition of COMSEC material, including short-term devices, and maintaining accurate records of these inventories. By accounting for keyed short-term devices in CPI, organizations can effectively manage and protect their COMSEC material.
19.
Which is considered a long-term communications security (COMSEC) key storage
device?
Correct Answer
C. Simple key loader (SKL).
Explanation
The Simple Key Loader (SKL) is considered a long-term communications security (COMSEC) key storage device. It is designed to securely store and manage cryptographic keys used in secure communication systems. The SKL allows authorized personnel to load, store, and distribute cryptographic keys to various communication devices, ensuring the confidentiality and integrity of sensitive information.
20.
How long is a Standard Form (SF) 701, Activity Security Checklist retained?
Correct Answer
A. Three months.
Explanation
A Standard Form (SF) 701, Activity Security Checklist is retained for three months. This means that after three months, the checklist is no longer considered valid or up to date. It is important to regularly update and review security checklists to ensure that all necessary security measures are in place and up to date. Retaining the checklist for three months allows for an appropriate timeframe to review and update security procedures as needed.
21.
What items should never be stored in the same container with communications
security (COMSEC) material?
Correct Answer
A. High theft items.
Explanation
High theft items should never be stored in the same container with communications security (COMSEC) material. This is because high theft items may attract attention and increase the risk of theft or unauthorized access to the COMSEC material. Storing high theft items separately helps to ensure the security and confidentiality of the COMSEC material.
22.
What form is used to document when a safe or vault is put into use?
Correct Answer
D. Air Force technical order (AFTO) Form 36.
Explanation
Air Force technical order (AFTO) Form 36 is used to document when a safe or vault is put into use. This form is specific to the Air Force and is the correct form for recording such information. The other options, Standard Form (SF) 701, SF 702, and AF Form 1109, are not applicable for this purpose.
23.
What form is used to record the arrival or departure of all personnel not named on
the facility authorized access list?
Correct Answer
C. Air Force (AF) Form 1109.
Explanation
Air Force (AF) Form 1109 is used to record the arrival or departure of all personnel not named on the facility authorized access list. This form is specifically designed for the Air Force and is used to maintain security and keep track of individuals entering or leaving a facility. The other options, Standard Form (SF) 701, SF 702, and Air Force technical order (AFTO) Form 36, are not specifically used for recording personnel arrivals or departures.
24.
Who manages the cryptographic access program (CAP) database for Air Force
Communications Security (AFCOMSEC) Form 9, cryptographic access certificates,
account update lists, and polygraph tests?
Correct Answer
A. Headquarters, Air Force Network Integration Center (HQ AFNIC)/EVP.
Explanation
The correct answer is Headquarters, Air Force Network Integration Center (HQ AFNIC)/EVP. This entity is responsible for managing the cryptographic access program (CAP) database for Air Force Communications Security (AFCOMSEC) Form 9, cryptographic access certificates, account update lists, and polygraph tests. They oversee the administration and maintenance of these important security measures within the Air Force.
25.
Who identifies and grants cryptographic access in the commander’s name to
personnel who require authorized access to classified cryptographic information?
Correct Answer
B. CryptograpHic access program (CAP) administrator.
Explanation
The CAP administrator is responsible for identifying and granting cryptographic access in the commander's name to personnel who need authorized access to classified cryptographic information. This role ensures that only authorized individuals have access to sensitive information and helps maintain the security of the communication system. The other options mentioned (CRO, CAM, IAO) may have different responsibilities related to communications security, but they are not specifically responsible for granting cryptographic access.
26.
Which type of security clearance is not valid for personnel on a communications
security (COMSEC) access list?
Correct Answer
B. An interim security clearance.
Explanation
An interim security clearance is not valid for personnel on a communications security (COMSEC) access list because it is a temporary clearance that is granted while a full security clearance is being processed. It does not provide the same level of access and authorization as a final security clearance or a clearance equal to or higher than the COMSEC being accessed. Therefore, personnel with only an interim security clearance would not be authorized to access COMSEC materials.
27.
How often should communications security (COMSEC) access lists be reviewed for
accuracy and annotated?
Correct Answer
B. Monthly.
Explanation
Communications security (COMSEC) access lists should be reviewed for accuracy and annotated on a monthly basis. This ensures that any changes or updates to the access lists are promptly identified and implemented. Regular reviews help to maintain the integrity and effectiveness of the COMSEC measures in place, reducing the risk of unauthorized access or breaches. Quarterly or annual reviews may not be frequent enough to address any potential security vulnerabilities or changes in personnel or access requirements. Therefore, monthly reviews strike a balance between maintaining security and minimizing administrative burden.
28.
Which paragraph of a communications security (COMSEC) access list contains the
name, rank, and clearance of all individuals who have COMSEC responsibilities within
the account?
Correct Answer
A. First paragrapH.
Explanation
The first paragraph of a communications security (COMSEC) access list contains the name, rank, and clearance of all individuals who have COMSEC responsibilities within the account. This paragraph serves as an introduction and provides a comprehensive list of the authorized personnel with access to COMSEC information.
29.
Which publication provides further guidance on handling top secret (TS) or
sensitive compartmented information (SCI) keys?
Correct Answer
C. Air Force Cryptologic Accounting Guide (AFKAG)–1.
Explanation
The Air Force Cryptologic Accounting Guide (AFKAG)–1 provides further guidance on handling top secret (TS) or sensitive compartmented information (SCI) keys.
30.
Which form is used to list accountable communication security (COMSEC) material
stored in a General Service Administration (GSA)-approved container and is annotated
each time a COMSEC safe is opened?
Correct Answer
D. AFCOMSEC Form 16.
Explanation
AFCOMSEC Form 16 is used to list accountable communication security (COMSEC) material stored in a General Service Administration (GSA)-approved container and is annotated each time a COMSEC safe is opened. This form helps to keep track of the material and ensure proper accountability and security measures are maintained.
31.
What type of ink is used when marking the boxes on a communication security
(COMSEC) inventory form?
Correct Answer
B. Black ink only.
Explanation
The correct answer is "Black ink only" because when marking the boxes on a communication security (COMSEC) inventory form, it is specified that only black ink should be used. This restriction ensures consistency and legibility of the inventory form, as well as prevents any confusion or misinterpretation that may arise from using different colored inks.
32.
When you create a communication security physical inventory (CPI), you will need
to include all of the following information except
Correct Answer
A. Accounting legend code (ALC).
Explanation
When creating a communication security physical inventory (CPI), it is important to include information such as edition, quantity, and short title. However, the accounting legend code (ALC) is not necessary for this inventory. The ALC is typically used for financial purposes and is not relevant to the physical inventory process.
33.
Within how many working days after receipt of a sealed package must you process
it?
Correct Answer
B. Three days.
Explanation
The correct answer is three days. This means that after receiving a sealed package, you are required to process it within three working days. This timeframe allows for efficient handling and ensures that the package is dealt with in a timely manner. It is important to adhere to this deadline to maintain productivity and meet any necessary deadlines associated with the package.
34.
How often must a communications security account manager (CAM) review the
communications security (COMSEC) physical inventory?
Correct Answer
A. Once a month.
Explanation
A communications security account manager (CAM) must review the communications security (COMSEC) physical inventory once a month to ensure the security and integrity of the communication systems. This regular review allows for timely identification of any discrepancies or unauthorized access to the COMSEC equipment, ensuring that any issues can be addressed promptly. By conducting monthly reviews, the CAM can maintain a high level of security and minimize the risk of potential breaches or compromises in the communication systems.
35.
Changes that must be made to material in communication security (COMSEC)
publications are called
Correct Answer
B. Amendments.
Explanation
Amendments refer to changes that must be made to material in communication security publications. They are modifications or corrections to the existing content in order to update or improve it.
36.
How many people are required to complete page replacements in unclassified
communication security (COMSEC) publications?
Correct Answer
A. One
Explanation
Only one person is required to complete page replacements in unclassified communication security (COMSEC) publications. This suggests that the task can be handled by a single individual, indicating that it does not require a team or multiple people to complete the task.
37.
Who requests disposition instructions for communications security (COMSEC)
material?
Correct Answer
C. Communications security account manger (CAM).
Explanation
A Communications Security Account Manager (CAM) is responsible for requesting disposition instructions for Communications Security (COMSEC) material. This role involves managing and maintaining the inventory of COMSEC material, ensuring its proper use and handling, and coordinating with higher-level authorities for the proper disposal or transfer of the material when necessary. The CAM acts as a liaison between the unit commander, COMSEC material users, and other relevant parties to ensure the security and proper management of COMSEC material.
38.
Who may destroy communications security (COMSEC) material?
Correct Answer
A. Communications security account manager (CAM), communications security
responsible officer (CRO), and any responsible person on the access list.
Explanation
The correct answer is Communications security account manager (CAM), communications security responsible officer (CRO), and any responsible person on the access list. This means that the individuals mentioned in the answer have the authority to destroy communications security (COMSEC) material.
39.
Except under special circumstances, destroy communication security (COMSEC)
keying material (KEYMAT) designated Crypto as soon as possible but no later than how
many hours after supersession?
Correct Answer
B. Twelve.
Explanation
The correct answer is Twelve. Under normal circumstances, communication security (COMSEC) keying material (KEYMAT) designated Crypto should be destroyed as soon as possible but no later than twelve hours after supersession. This ensures that the old key material is no longer accessible and reduces the risk of unauthorized access or decryption of sensitive information.
40.
The only authorized methods for routinely destroying paper communications
security (COMSEC) aids are by any of the following methods except
Correct Answer
A. Disintegrating.
Explanation
The correct answer is disintegrating. This means that disintegrating is not an authorized method for routinely destroying paper communications security (COMSEC) aids. The other three methods mentioned - pulverizing, burning, and pulping - are all authorized methods for routine destruction.
41.
What form serves as the destruction certificate for communication security
(COMSEC) material?
Correct Answer
A. Standard Form (SF) 153.
Explanation
The correct answer is Standard Form (SF) 153. This form serves as the destruction certificate for communication security (COMSEC) material.
42.
The communication security (COMSEC) material destruction record will be signed
Correct Answer
A. Immediately after the material is destroyed.
Explanation
The correct answer is "immediately after the material is destroyed." This means that the communication security (COMSEC) material destruction record should be signed right after the material has been destroyed. This ensures that the record accurately reflects the destruction and prevents any potential tampering or alteration of the record. Signing the record immediately after the destruction also helps maintain accountability and provides a clear timeline of when the destruction took place.
43.
What is the classification of the Standard Form (SF) 153 when the disposition
record card (DRC) is attached?
Correct Answer
C. Confidential.
Explanation
When the disposition record card (DRC) is attached to the Standard Form (SF) 153, the classification is Confidential. This means that the information contained in the SF 153, along with the attached DRC, is considered confidential and should only be accessed by individuals with the appropriate clearance level.
44.
What provides the special protection of top secret (TS) communications security
(COMSEC) material that is needed to help prevent otherwise avoidable problems from
happening?
Correct Answer
B. Two-person integrity (TPI).
Explanation
Two-person integrity (TPI) provides the special protection of top secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening. TPI ensures that two authorized individuals are present and actively involved in the handling, storage, and transportation of sensitive materials, reducing the risk of unauthorized access or tampering. This system increases accountability and minimizes the potential for insider threats or mistakes that could compromise the security of the material.
45.
What situation is not an authorized exception to two-person integrity (TPI)
requirements?
Correct Answer
D. COMSEC material handled in minimum manning situations.
46.
How many people must unwrap the inner wrapper of a top secret (TS) crypto
package?
Correct Answer
B. Two
Explanation
Two people must unwrap the inner wrapper of a top secret (TS) crypto package. This suggests that there are multiple layers of wrapping or security measures in place for the package. Having two people involved in the unwrapping process ensures that there is an added level of security and accountability. It also minimizes the risk of any one person gaining unauthorized access to the contents of the package.
47.
When transporting bulky communication security (COMSEC) material through
airlines, you may leave COMSEC material unattended
Correct Answer
A. Under no circumstances.
Explanation
COMSEC material is highly sensitive and should never be left unattended, regardless of the circumstances. This is to ensure the security and protection of the material from unauthorized access or theft. Leaving it unattended in any situation, whether it is in a baggage area, on a cargo dock, or with authorized airport personnel, poses a risk to the confidentiality and integrity of the material. Therefore, under no circumstances should COMSEC material be left unattended.
48.
What guidance provides the requirements for transporting classified information?
Correct Answer
A. Air Force Instruction (AFI) 33–401.
Explanation
Air Force Instruction (AFI) 33–401 is the correct answer because it provides the requirements for transporting classified information. It is a directive issued by the Air Force that outlines the specific guidelines and procedures for handling and transporting classified information within the organization. This instruction ensures that classified information is properly protected and safeguarded during transportation to prevent unauthorized access or disclosure.
49.
When transporting communication security (COMSEC), major command
(MAJCOM) approval is required when traveling via
Correct Answer
C. Non-US flag airlines.
Explanation
When transporting communication security (COMSEC), major command (MAJCOM) approval is required when traveling via non-US flag airlines. This means that if the communication security is being transported on a flight operated by an airline that is not registered in the United States, MAJCOM approval is necessary. This is likely because non-US flag airlines may have different security protocols and regulations compared to US flag airlines, and therefore require additional approval to ensure the safe transportation of COMSEC.
50.
Which method is not used to complete a bulk encrypted transaction (BET)?
Correct Answer
D. Defense Courier Service (DCS).
Explanation
The Defense Courier Service (DCS) is not used to complete a bulk encrypted transaction (BET). DCS is a physical courier service that is used for the secure transport of sensitive and classified materials, documents, and equipment. It is not a method or technology used for encrypting or transmitting data electronically. Therefore, it is not applicable to completing a bulk encrypted transaction.