1.
Which communications security (COMSEC) tier generates, distributes, and performs account functions of all modern key, physical traditional key, and certain electronic key?
Correct Answer
A. Zero
Explanation
Zero is the correct answer because the question is asking about the communications security (COMSEC) tier that handles the generation, distribution, and account functions of all modern key, physical traditional key, and certain electronic key. Zero is the highest tier in COMSEC and is responsible for managing and securing the most sensitive communications.
2.
What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked "CRYPTO" is distributed, controlled and safeguarded?
Correct Answer
B. Communication security material control system (CMCS)
Explanation
The correct answer is Communication security material control system (CMCS). This system is specifically designed for the distribution, control, and safeguarding of communications security (COMSEC) material that is marked as "CRYPTO." It ensures that the material is properly managed and protected to maintain the security of communications.
3.
All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except
Correct Answer
D. Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee
Explanation
To be a communications security account manager (CAM) without a waiver, the individual must meet the following requirements: being a U.S. citizen, meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)-1, and possessing a security clearance commensurate for the type of material in the account. The answer choice "being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee" is not a requirement to be a CAM without a waiver.
4.
Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform, users?
Correct Answer
C. Nation Security Agency (NSA)
Explanation
The Nation Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform, users.
5.
To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to
Correct Answer
D. AFKAG-2
Explanation
To determine the appropriate actions to take during the absence of the communications security account manager (CAM), one should refer to AFKAG-2. This document likely contains guidelines or procedures specifically related to the responsibilities and duties of the CAM, as well as instructions on how to handle situations when the CAM is not available. By referring to AFKAG-2, individuals can ensure that they are following the correct protocols and taking the necessary actions in the absence of the CAM.
6.
Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow?
Correct Answer
B. AFKAG-2
Explanation
AFKAG-2 is the correct answer because it is a COMSEC publication that provides step-by-step procedures for COMSEC personnel to follow. The other options, AFKAG-1, AFKAG-3, and AFKAG-4, do not specifically mention providing step-by-step procedures for COMSEC personnel.
7.
Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with
Correct Answer
D. AFSSI 4212
Explanation
Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with AFSSI 4212. This means that they should carefully examine the packaging of communication equipment or materials to ensure that it has not been tampered with or compromised in any way. If any signs of tampering are found, they should immediately report it according to the procedures outlined in AFSSI 4212. This ensures that any potential security breaches or compromises are quickly identified and addressed.
8.
The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following Air Force specialties except
Correct Answer
A. Security forces
Explanation
The IAAP team consists of personnel experienced in all the Air Force specialties except security forces. This means that the team includes personnel experienced in information systems, information assurance, and base information infrastructures. However, security forces personnel are not part of the IAAP team.
9.
Who assesses local communications security (COMSEC) elements during "command" assessments?
Correct Answer
D. MAJCOM
Explanation
MAJCOM stands for Major Command, which is a level of command in the United States Air Force. During "command" assessments, it is the responsibility of the MAJCOM to assess local communications security (COMSEC) elements. The MAJCOM is responsible for overseeing and managing the operations of subordinate units within their command, including assessing and ensuring the security of communications.
10.
Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?
Correct Answer
B. TO 00-20F-2
Explanation
The correct answer is TO 00-20F-2. This publication provides guidelines and instructions for the inspection and safeguarding of communications security (COMSEC) material. It specifically addresses the use of drilled and repaired security containers or vaults for storing COMSEC material after they have been inspected for their safeguarding capabilities. AFI 33-201 volume 4, Air Force Cryptologic Accounting Guide (AFKAG)-1, and AFKAG-2 do not provide specific guidance on the inspection and storage of COMSEC material in drilled and repaired security containers or vaults.
11.
Which of the following are considered long term communications security (COMSEC) key storage devices?
Correct Answer
C. Simple key loader (SKL)
Explanation
The Simple Key Loader (SKL) is considered a long-term Communications Security (COMSEC) key storage device. The SKL is a portable electronic device used to load cryptographic keys into various communication equipment and systems. It securely stores and manages cryptographic keys, allowing for the secure transmission of sensitive information. It is designed to provide long-term storage of keys and is widely used by military and government organizations to ensure the confidentiality and integrity of their communications. The other options listed, KYK-13, KYX-15, and Communications Security Physical Inventory (CPI), are not specifically designed for long-term key storage.
12.
What items should never be stored in the same container with COMSEC material?
Correct Answer
A. High theft items
Explanation
High theft items should never be stored in the same container with COMSEC material because it poses a security risk. COMSEC material refers to sensitive information and equipment used for secure communication, while high theft items are items that are prone to being stolen. Storing these items together increases the chances of unauthorized access and compromise of the COMSEC material. Keeping them separate helps to maintain the confidentiality and integrity of the COMSEC material.
13.
What form is used to record the arrival or departure of all personnel not​ named on the facility authorized access list?
Correct Answer
C. Air Force Form 1109
Explanation
Air Force Form 1109 is used to record the arrival or departure of all personnel not named on the facility authorized access list. This form is specific to the Air Force and is likely used to maintain security and track individuals who are not authorized to access the facility. Standard Form 701 and Standard Form 702 may be used for other purposes, while Air Force Technical Order Form 36 is not mentioned in relation to recording personnel arrivals or departures.
14.
Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through
Correct Answer
C. The communications security management system (CMS)
15.
Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?
Correct Answer
A. Air Force Network Integration Center (AFNIC)/EVPI
Explanation
The Air Force Network Integration Center (AFNIC)/EVPI manages the cryptographic access program (CAP) database, AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests. They are responsible for maintaining and updating these records and ensuring the security of cryptographic access within the Air Force.
16.
What cryptographic access program (CAP) withdrawal method is used for personnel who are reassigned to another base or unit or to positions that do not ​require cryptographic access?
Correct Answer
A. Administrative withdrawal
Explanation
Administrative withdrawal is the cryptographic access program (CAP) withdrawal method used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access. This method involves removing the individual's access privileges and credentials from the system, effectively withdrawing their cryptographic access rights. It is a standard procedure to ensure that only authorized personnel have access to sensitive information and resources.
17.
How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?
Correct Answer
B. Monthly
Explanation
Communications security (COMSEC) access lists should be reviewed for accuracy and annotated on a monthly basis. This frequency allows for regular monitoring and updating of the access lists to ensure that only authorized individuals have access to sensitive information. Reviewing the lists monthly also helps in identifying any potential security breaches or unauthorized access attempts in a timely manner, allowing for prompt action to mitigate any risks. Quarterly or annual reviews may not be frequent enough to address changes in personnel or security requirements, while weekly reviews may be too frequent and time-consuming for larger organizations.
18.
Which type of security clearance is not valid for personnel on a communications security (COMSEC) access-list?
Correct Answer
B. An interim security clearance
Explanation
An interim security clearance is not valid for personnel on a communications security (COMSEC) access-list because it is only a temporary clearance granted while a full background investigation is being conducted. It is not equivalent to a final security clearance or a clearance equal to or higher than the COMSEC being accessed. Therefore, personnel with an interim security clearance should not have access to COMSEC materials until their full clearance is granted.
19.
When classified material is not stored in a General Service Administration (GSA)-Approved container, the facility containing the classified material must be constructed according to the requirements in DOD 5200.1R MIL HDBK 1013/1A and
Correct Answer
C. Air Force Cryptologic Accounting Guide (AFKAG)-1
20.
When removing material from a communication security physical inventory (CPI), always
Correct Answer
C. Write an MFR
Explanation
When removing material from a communication security physical inventory (CPI), it is necessary to write an MFR (Memorandum for Record). This is because an MFR serves as a formal documentation of the removal, providing a record of the action taken. It helps in maintaining accountability and transparency in the inventory management process. Using red or green ink or correction fluid may not provide the necessary documentation or may not be considered as an official record of the removal.
21.
The communication security physical inventory (CPI) will include all of the following ​except
Correct Answer
A. Accounting legend code (ALC)
Explanation
The communication security physical inventory (CPI) is a process that involves counting and documenting all communication security equipment and materials. It helps ensure that all items are properly accounted for and accounted for accurately. The CPI includes items such as editions, quantities, and short titles of communication security materials. However, the accounting legend code (ALC) is not included in the CPI. The ALC is a code used to classify and categorize financial transactions, and it is not directly related to the physical inventory of communication security materials.
22.
How long should a communication security (COMSEC) inventory form be retained?
Correct Answer
C. Past six months plus the current month
Explanation
The correct answer is "Past six months plus the current month." This means that a communication security (COMSEC) inventory form should be retained for a period of six months, including the current month. This ensures that there is a record of the inventory for a sufficient amount of time to track any changes or discrepancies. Retaining the form for this duration allows for proper monitoring and accountability of communication security measures.
23.
Changes that must be made to material in communication security (COMSEC) publications are called
Correct Answer
B. Amendments
Explanation
In the context of communication security (COMSEC) publications, changes made to the material are referred to as amendments. Amendments are typically made to update or modify the existing information in the publications to ensure accuracy and effectiveness. Corrections may refer to fixing errors, but amendments encompass a broader scope of changes. Updates may also imply changes, but amendments specifically indicate modifications made to the material in COMSEC publications.
24.
Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession?
Correct Answer
B. Twelve
Explanation
Under normal circumstances, communication security (COMSEC) keying material designated CRYPTO should be destroyed as soon as possible after supersession. However, it must be destroyed no later than twelve hours after supersession. This ensures that the old keying material is not compromised or used for unauthorized access to sensitive information.
25.
The only authorized methods to destroy key tapes are by of the following methods ​except
Correct Answer
C. Shredding
Explanation
The question asks for the method that is not authorized to destroy key tapes. The given options include disintegrating, pulverizing, shredding, and burning. Among these options, shredding is the correct answer because it is the only method that is not authorized to destroy key tapes. The other three methods, disintegrating, pulverizing, and burning, are authorized methods for destroying key tapes.
26.
Sign the communication security (COMSEC) material destruction record
Correct Answer
A. Immediately after material is destroyed
Explanation
The correct answer is to sign the communication security (COMSEC) material destruction record immediately after the material is destroyed. This ensures that there is a clear and timely record of the destruction process. Signing the record after the destruction prevents any potential errors or discrepancies in the documentation. It also helps to maintain accountability and traceability for the destroyed material.
27.
As part of a two-person control (TCP) team, you must be designated to handle communication security (COMSEC) material under the
Correct Answer
A. Personnel reliability program (PRP)
Explanation
The correct answer is personnel reliability program (PRP). The personnel reliability program (PRP) is a program that ensures the trustworthiness and reliability of individuals who have access to sensitive information and materials, such as communication security (COMSEC) material. It involves a thorough screening process, ongoing monitoring, and regular training to ensure that individuals designated to handle COMSEC material are trustworthy and can effectively protect and secure it. The PRP is an essential component of maintaining communication security and preventing unauthorized access or compromise of sensitive information.
28.
An area, room, or space which, when attended, must be occupied by two or more appropriately clear individuals who remain within sight of each other is called a communication security (COMSEC)
Correct Answer
C. No-lone zone
Explanation
A "no-lone zone" is an area, room, or space that requires two or more individuals to be present at all times and remain within sight of each other. This is done to ensure communication security (COMSEC) and prevent any unauthorized access or tampering. By having multiple individuals present, the risk of security breaches or compromises is minimized, as there is always someone to monitor and verify activities within the zone. The term "no-lone zone" emphasizes the importance of avoiding solitary presence in order to maintain a secure environment.
29.
What situation is ​not an authorized exception to two-person integrity (TPI) requirements?
Correct Answer
C. COMSEC material handled in minimum manning situations
Explanation
Two-person integrity (TPI) requirements are in place to ensure the security and accountability of sensitive materials. This means that certain situations may require two authorized individuals to be present when handling such materials. The other options listed in the question all involve scenarios where additional security measures are in place. However, COMSEC material handled in minimum manning situations does not meet the TPI requirements as it involves a reduced number of personnel, which increases the risk of unauthorized access or mishandling of the sensitive material.
30.
Which of the following is not an authorized official who may designate in writing individuals selected to perform courier duty?
Correct Answer
D. Communications security account manager (CAM)
Explanation
The Communications Security Account Manager (CAM) is not an authorized official who may designate individuals selected to perform courier duty. The supervisor, unit commander, and security manager have the authority to designate individuals for courier duty. However, the CAM is responsible for managing communications security accounts and ensuring compliance with security protocols, but they do not have the authority to designate individuals for courier duty.
31.
When transproting bulky communication security (COMSEC) material through arilines, you may leave COMSEC material unattended
Correct Answer
A. Under no circumstances
Explanation
It is important to never leave COMSEC material unattended under any circumstances. This means that whether it is in a baggage area, loaded on a cargo dock, or passed on to authorized airport personnel, it should always be supervised and not left alone. This is necessary to ensure the security and integrity of the communication systems and to prevent unauthorized access or tampering. Leaving COMSEC material unattended can pose a significant risk to national security and compromise sensitive information.
32.
When transporting communication security (COMSEC), MAJCOM approval is required when traveling
Correct Answer
C. Via non-U.S. flag airlines
Explanation
MAJCOM approval is required when transporting communication security (COMSEC) via non-U.S. flag airlines because these airlines are not operated by the United States and may not have the same level of security measures in place as U.S. flag or chartered airlines. This ensures that the sensitive COMSEC information is protected during transit and reduces the risk of it falling into the wrong hands.
33.
What term is used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards?
Correct Answer
B. COMSEC deviation
Explanation
A COMSEC deviation refers to a communication security (COMSEC) security lapse that happens when individuals do not comply with the established instructions, procedures, or standards of COMSEC. It implies that there has been a departure from the prescribed protocols, which can potentially compromise the security of communication.
34.
What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?
Correct Answer
D. Practice dangerous to security (PDS)
Explanation
Practice dangerous to security (PDS) is the term used to describe a communication security (COMSEC) security lapse that has the potential to jeopardize the security of COMSEC material if it is allowed to continue. This term is used to highlight the seriousness of the situation and the need for immediate action to prevent any further compromise of COMSEC material. It signifies that certain practices or behaviors are posing a significant risk to the security of communication systems and must be addressed promptly.
35.
What office assigns a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy?
Correct Answer
C. HQ AFNIC/EVIC
Explanation
HQ AFNIC/EVIC is the correct answer because AFNIC stands for Air Force Network Integration Center, which is responsible for managing and securing the Air Force's communication networks. EVIC stands for Electronic Video Imagery Center, which suggests that this office is involved in handling and tracking communication security material. Therefore, it is likely that HQ AFNIC/EVIC would be the office that assigns a tracking number to any reported COMSEC material receipt reporting discrepancy.
36.
Guidance for processing COMSEC material receipt reporting discrepancies can be found in
Correct Answer
D. ASSI 4212 and AFKAG-2
Explanation
The correct answer is ASSI 4212 and AFKAG-2. This is because the question is asking for the guidance for processing COMSEC material receipt reporting discrepancies, and the correct answer provides the specific references (ASSI 4212 and AFKAG-2) where this guidance can be found.
37.
Which situation does not ​describe a communication security (COMSEC) cryptographic incident?
Correct Answer
A. Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT)
Explanation
Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT) is a procedure related to the proper handling of cryptographic key material, not a communication security (COMSEC) cryptographic incident. A COMSEC cryptographic incident refers to situations where there is a compromise or misuse of keying material, or the use of unauthorized keying material or equipment with defective logic circuitry.
38.
As a mininum, to what classification should you mark a communication security (COMSEC) incident report when the report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised?
Correct Answer
C. CONFIDENTIAL
Explanation
When a communication security (COMSEC) incident report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised, it should be marked as CONFIDENTIAL. This classification ensures that the information is protected and only accessible to individuals with the appropriate clearance level.
39.
A final communication security (COMSEC) incident report must be submitted no later then how many days after the initial report?
Correct Answer
D. 60 days
Explanation
A final communication security (COMSEC) incident report must be submitted no later than 60 days after the initial report because it allows for a thorough investigation and analysis of the incident. This timeframe ensures that all relevant information is gathered and evaluated before a final report is submitted. It also allows for any necessary actions or measures to be taken to prevent similar incidents in the future.
40.
What local communications security managemet software (LCMS) desktop function provides a user with the ablility to securely pass information and/or transfer electronic key management system (EKMS) messages/keys directley to other EKMS accounts?
Correct Answer
D. Direct Comms.
Explanation
Direct Comms is the correct answer because it refers to a local communications security management software (LCMS) desktop function that allows users to securely pass information and transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts. This function ensures secure communication and transfer of sensitive information within the LCMS system.
41.
Which device connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture?
Correct Answer
C. Secure terminal equipment (STE)
Explanation
Secure terminal equipment (STE) connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture. This means that STE enables secure communication between different sites within the EKMS system, ensuring the confidentiality and integrity of the transmitted data. It acts as a secure gateway for communication, allowing authorized users to exchange information securely.
42.
What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?
Correct Answer
A. SECRET
Explanation
The local management device (LMD) is designed to support and process SECRET classification of communication security (COMSEC) material.
43.
The local management device (LMD) supports or utilizes all of the following except
Correct Answer
C. Unencrypted keying material
Explanation
The local management device (LMD) supports or utilizes dial-up communications, encrypted keying material, and the Santa Cruz Operation (SCO) UNIX OpenServer operating system. However, it does not support or utilize unencrypted keying material. Unencrypted keying material refers to sensitive information that is not protected or secured, which can pose a security risk. Therefore, the LMD does not utilize unencrypted keying material to ensure the security of its operations.
44.
Which type of Nation Security Agency (NSA) approved encryption devices does the local management device (LMD) use to communicate over a communications link?
Correct Answer
A. Type I
Explanation
The local management device (LMD) uses Type I Nation Security Agency (NSA) approved encryption devices to communicate over a communications link. Type I encryption devices are the highest level of encryption devices approved by the NSA, providing the most secure communication. These devices are designed to protect sensitive information and ensure that unauthorized individuals cannot access or intercept the communication.
45.
The front of the KOK-22A device fill connector allows interface with which type of file devices?
Correct Answer
C. DS-101 and DS-102
Explanation
The front of the KOK-22A device fill connector allows interface with both DS-101 and DS-102 types of fill devices.
46.
The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as
Correct Answer
D. ALC-4
Explanation
The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as ALC-4. This suggests that ALC-4 is the correct accounting legend code for tracking and managing the CIK. It is likely that ALC-4 is specifically designated for the CIKs in the accounting system, ensuring proper documentation and control over these keys.
47.
What is not true about firefly credentials?
Correct Answer
A. They have set cryptoperiod
Explanation
Firefly credentials do not have a set cryptoperiod. Cryptoperiod refers to the time period for which a cryptographic key is considered secure and should be used. This statement implies that firefly credentials do not have a predetermined time period after which they expire or become invalid.
48.
Unless directed by National Security Agency (NSA) or HQ CPSQ, how often is the electronic rekey of the firefly vector set completed?
Correct Answer
B. Annually
Explanation
The correct answer is "Annually". This means that the electronic rekey of the firefly vector set is completed once a year, unless specifically instructed by the National Security Agency (NSA) or HQ CPSQ. This regular rekeying helps to maintain the security and effectiveness of the firefly vector set.
49.
When loading the vector set for the firefly credentials and you click on "Load EKMS Vector Set", what should immediately happen?
Correct Answer
A. The screen will go black
Explanation
When loading the vector set for the firefly credentials and clicking on "Load EKMS Vector Set", the screen going black is the expected immediate response. This could indicate that the system is processing the request and preparing to load the vector set. The black screen may be a temporary state before the system displays the next prompt or action.
50.
Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts?
Correct Answer
C. Local communications security management software (LCMS)
Explanation
The correct answer is Local communications security management software (LCMS). LCMS is used in conjunction with the key processor (KP) to generate electronic keys and transfer both physical and electronic keys to other COMSEC accounts. LCMS is specifically designed for managing communication security and ensures the secure transfer of keys between different accounts. Other options such as User application software (UAS), Common user application software (CUAS), and Card loader user application software (CLUAS) do not specifically focus on communication security management.