1.
(401) Which communications security (COMSEC) tier generates, distributes, and performs
accounting functions of all modern key, physical traditional key, and certain electronic
key?
Correct Answer
A. Zero.
Explanation
Zero is the correct answer because it refers to the highest level of communications security (COMSEC) tier. This tier is responsible for generating, distributing, and performing accounting functions for all modern key, physical traditional key, and certain electronic key.
2.
(401) What is referred to as a logistic and accounting system through which
communications security (COMSEC) material marked “CRYPTO” is distributed,
controlled, and safeguarded?
Correct Answer
B. Communications security material control system (CMCS).
3.
(402) All the following are requirements that must be met to be a communications security
account manager (CAM) without a waiver except
Correct Answer
D. Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee
Explanation
To be a communications security account manager (CAM) without a waiver, all the requirements mentioned must be met except for being a 33XX officer, a 3D053 or 3D000 NCO, or a 301, 391 or 2210 civilian employee. The other requirements include being a U.S. citizen, meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1, and possessing a security clearance commensurate for the type of material in the account.
4.
(402) Who requires that the communications security account manager (CAM) be formally
trained to certify the training of local management device/key processor (LMD/KP)
platform users?
Correct Answer
C. National Security Agency (NSA).
Explanation
The National Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users.
5.
(402) To determine the appropriate actions to take during the absence of the
communications security account manager (CAM), refer to
Correct Answer
D. AFKAG-2
Explanation
The correct answer is AFKAG-2. This is because AFKAG-2 is likely a document or reference that provides guidance on the appropriate actions to take during the absence of the communications security account manager (CAM). AFI 33–201, volume 4 is a document that provides guidance on communications security, but it may not specifically address actions to take during the absence of the CAM. TO 00–20F–2 is a technical order that may not be relevant to this specific situation. AFKAG–1 is not mentioned in the question and therefore cannot be determined as the correct answer.
6.
(403) Which COMSEC publication provides step-by-step procedures for COMSEC
personnel to follow?
Correct Answer
B. AFKAG–2
Explanation
The correct answer is AFKAG–2. This publication provides step-by-step procedures for COMSEC personnel to follow.
7.
(403) Communications security (COMSEC) clerks should inspect all protective packaging
for signs of tampering and report discrepancies in accordance with
Correct Answer
D. AFSSI 4212
8.
404) The information assurance assessment and assistance program (IAAP) team consists
of personnel experienced in all the following Air Force specialties except
Correct Answer
A. Security forces
Explanation
The IAAP team consists of personnel experienced in all Air Force specialties except security forces. This means that the team includes individuals with expertise in information systems, information assurance, and base information infrastructures. The security forces specialty is not part of the IAAP team.
9.
(405) Who assesses local communications security (COMSEC) elements during
“command” assessments?
Correct Answer
D. MAJCOM
Explanation
MAJCOM, or Major Command, assesses local communications security (COMSEC) elements during "command" assessments. This suggests that MAJCOM is responsible for evaluating the effectiveness and compliance of COMSEC measures within a command. The other options, such as the communications security account manager (CAM), squadron commander, and security forces, may have roles related to COMSEC but are not specifically mentioned in the context of conducting assessments.
10.
(406) Drilled and repaired security containers or vaults may be used to store
communications security (COMSEC) material after they are inspected for safeguarding
capabilities according to which publication?
Correct Answer
B. TO 00–20F–2.
11.
(407) Which of the following are considered long term communications security
(COMSEC) key storage devices?
Correct Answer
C. Simple key loader (SKL)
Explanation
The Simple Key Loader (SKL) is considered a long-term Communications Security (COMSEC) key storage device. It is a portable electronic device used to load cryptographic keys into various communication equipment. The SKL securely stores and manages cryptographic keys, ensuring their confidentiality and integrity. It is designed for long-term use and is commonly used by military and government organizations to protect sensitive information during communications.
12.
(407) What items should never be stored in the same container with COMSEC material?
Correct Answer
A. High theft items
Explanation
High theft items should never be stored in the same container with COMSEC material because it could increase the risk of theft or unauthorized access to the sensitive information. COMSEC material includes cryptographic keys and equipment used to encrypt and protect classified information. Storing high theft items, which are likely to attract attention and theft, with COMSEC material could compromise the security and confidentiality of the information.
13.
(408) What form is used to record the arrival or departure of all personnel not named on
the facility authorized access list?
Correct Answer
C. Air Force Form 1109
Explanation
Air Force Form 1109 is used to record the arrival or departure of all personnel not named on the facility authorized access list. This form is specific to the Air Force and is used to ensure proper documentation and tracking of personnel entering or leaving a facility. It helps maintain security and accountability by keeping a record of individuals who are not authorized to access the facility.
14.
(409) Personnel at the temporary duty (TDY) location can/should verify an individual’s
cryptographic access program (CAP) status through
Correct Answer
C. The communications security management system (CMS).
Explanation
Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through the communications security management system (CMS). The CMS is responsible for managing and controlling access to cryptographic materials and systems. It maintains records of individuals authorized to have access to these materials and systems, including their CAP status. By checking the CMS, personnel at the TDY location can ensure that an individual's CAP status is valid and up-to-date. This helps to maintain the security and integrity of cryptographic materials and systems.
15.
(410) Who manages the cryptographic access program (CAP) database for AFCOMSEC
Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?
Correct Answer
A. Air Force Network Integration Center (AFNIC)/EVPI.
Explanation
The Air Force Network Integration Center (AFNIC)/EVPI manages the cryptographic access program (CAP) database for AFCOMSEC. This includes managing Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests. The AFNIC/EVPI is responsible for ensuring the security and proper management of cryptographic access within the Air Force, making them the correct answer for this question.
16.
(410) What cryptographic access program (CAP) withdrawal method is used for personnel
who are reassigned to another base or unit or to positions that do not require
cryptographic access?
Correct Answer
A. Administrative withdrawal.
Explanation
Administrative withdrawal is the cryptographic access program (CAP) withdrawal method used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access. This means that their access to cryptographic materials and systems is removed due to administrative reasons, such as a change in their job responsibilities or location. This withdrawal method does not involve any negative actions or penalties, but rather a simple adjustment to their access privileges based on their new role or assignment.
17.
(411) How often should communications security (COMSEC) access lists be reviewed for
accuracy and annotated?
Correct Answer
B. Monthly.
Explanation
COMSEC access lists should be reviewed for accuracy and annotated on a monthly basis. This ensures that any changes or updates to the access lists are promptly made, reducing the risk of unauthorized access to sensitive information. Regular reviews also help to identify any discrepancies or anomalies in the access lists, allowing for timely corrective actions to be taken. Reviewing the access lists monthly strikes a balance between frequent checks and practicality, ensuring that any necessary adjustments are made in a timely manner.
18.
(411) Which type of security clearance is not valid for personnel on a communications
security (COMSEC) access list?
Correct Answer
B. An interim security clearance.
Explanation
An interim security clearance is not valid for personnel on a communications security (COMSEC) access list because it is a temporary clearance given to individuals who need access to classified information while their full security clearance is being processed. Since COMSEC access involves highly sensitive information, only individuals with a final security clearance, which is a permanent clearance, are allowed access.
19.
(412) When classified material is not stored in a General Service Administration (GSA)-
approved container, the facility containing the classified material must be constructed
according to the requirements in DOD 5200.1–R MIL HDBK 1013/1A and
Correct Answer
C. Air Force Cryptologic Accounting Guide (AFKAG)–1.
20.
(413) When removing material from a communication security physical inventory (CPI),
always
Correct Answer
A. Use red ink.
Explanation
When removing material from a communication security physical inventory (CPI), it is recommended to use red ink. This is because red ink stands out and is easily noticeable, making it easier to track and identify any changes or modifications made to the inventory. Additionally, using red ink helps to ensure that any updates or adjustments are clearly visible and can be easily distinguished from the original entries.
21.
(414) The communication security physical inventory (CPI) will include all of the
following except
Correct Answer
A. Accounting legend code (ALC).
Explanation
The communication security physical inventory (CPI) is a process that involves conducting a physical count of all communication security (COMSEC) material to ensure accuracy and accountability. The CPI includes verifying the edition of the material, the quantity of items present, and their short title or description. However, the accounting legend code (ALC) is not included in the CPI. The ALC is a code used to track and categorize COMSEC material for accounting purposes, but it is not part of the physical inventory process.
22.
(414) How long should a communication security (COMSEC) inventory form be
retained?
Correct Answer
C. Past six months plus the current month.
Explanation
The correct answer is "Past six months plus the current month." This means that a communication security (COMSEC) inventory form should be retained for a period of six months, including the current month. This ensures that there is a record of the inventory for a sufficient amount of time, allowing for any necessary audits or reviews to take place.
23.
(415) Changes that must be made to material in communication security (COMSEC)
publications are called
Correct Answer
B. Amendments.
Explanation
Amendments refer to changes that must be made to material in communication security (COMSEC) publications. They are used to update and modify the content of these publications. Corrections, on the other hand, typically refer to fixing errors or mistakes, while updates generally imply bringing information up to date. Therefore, amendments best describe the changes made to COMSEC publications.
24.
(416) Except under special circumstances, destroy communication security (COMSEC)
keying material designated CRYPTO as soon as possible but no later than how many
hours after supersession?
Correct Answer
B. Twelve.
Explanation
The correct answer is twelve. Under normal circumstances, communication security (COMSEC) keying material designated CRYPTO should be destroyed as soon as possible but no later than twelve hours after supersession. This ensures that the old key material is no longer used, preventing unauthorized access to sensitive information.
25.
(416) The only authorized methods to destroy key tapes are by any of the following
methods except
Correct Answer
C. Shredding.
Explanation
The question asks for the only authorized methods to destroy key tapes, excluding one method. The options provided are disintegrating, pulverizing, shredding, and burning. The correct answer is shredding, as it is not an authorized method to destroy key tapes.
26.
(417) Sign the communication security (COMSEC) material destruction record
Correct Answer
A. Immediately after the material is destroyed.
Explanation
The correct answer is "immediately after the material is destroyed." This is because signing the communication security (COMSEC) material destruction record immediately after the material is destroyed ensures that the record accurately reflects the destruction and prevents any potential tampering or manipulation of the record. By signing immediately after destruction, it provides a clear and timely documentation of the destruction process.
27.
(418) As part of a two-person control (TPC) team, you must be designated to handle
communication security (COMSEC) material under the
Correct Answer
A. Personnel reliability program (PRP).
Explanation
The correct answer is "personnel reliability program (PRP)." In a two-person control (TPC) team, one person is designated to handle communication security (COMSEC) material. This responsibility falls under the personnel reliability program (PRP), which ensures that individuals with access to sensitive information or materials are trustworthy and reliable. The other options, sealed authenticator systems (SAS), permissive action link (PAL), and coded switch system (CSS), are not directly related to the handling of COMSEC material in a TPC team.
28.
(419) An area, room, or space which, when attended, must be occupied by two or more
appropriately cleared individuals who remain within sight of each other is called a
communication security (COMSEC)
Correct Answer
C. No-lone zone.
Explanation
A "no-lone zone" refers to an area, room, or space where two or more individuals who have been appropriately cleared must be present and remain within sight of each other. This measure is taken to ensure communication security and prevent any unauthorized access or tampering with sensitive information or equipment. The term "no-lone zone" emphasizes the importance of having multiple individuals present to maintain security and accountability.
29.
(419) What situation is not an authorized exception to two-person integrity (TPI)
requirements?
Correct Answer
C. COMSEC material handled in minimum manning situations.
Explanation
Two-person integrity (TPI) requirements are in place to ensure the security and accountability of sensitive materials. TPI requires that two authorized individuals be present at all times when handling certain materials. The exception to this requirement is when handling unopened National Security Agency (NSA) protective packaged material, communication security (COMSEC) material used in tactical situations, and unopened packages received from or in the custody of the Defense Courier Division (DCD). However, COMSEC material handled in minimum manning situations is not an authorized exception to TPI requirements. This means that even in situations where there is minimal staff available, TPI must still be maintained when handling COMSEC material.
30.
(420) Which of the following is not an authorized official who may designate in writing
individuals selected to perform courier duty?
Correct Answer
D. Communications security account manager (CAM).
Explanation
The Communications Security Account Manager (CAM) is not an authorized official who may designate individuals to perform courier duty. The other options, such as the supervisor, unit commander, and security manager, have the authority to designate individuals for courier duty. However, the CAM's role is focused on managing communications security accounts and is not directly related to courier duties.
31.
(420) When transporting bulky communication security (COMSEC) material through
airlines, you may leave COMSEC material unattended
Correct Answer
A. Under no circumstances.
Explanation
COMSEC material is highly sensitive and should never be left unattended, regardless of the circumstances. This is to ensure the security and protection of the material from unauthorized access or theft. Leaving it unattended increases the risk of compromising the confidentiality and integrity of the communication systems it is meant to protect. Therefore, it is crucial to always keep COMSEC material under constant supervision and control.
32.
(421) When transporting communication security (COMSEC), MAJCOM approval is
required when traveling
Correct Answer
C. Via non-U.S. flag airlines.
Explanation
MAJCOM approval is required when transporting communication security (COMSEC) via non-U.S. flag airlines. This means that if COMSEC is being transported on an airline that is not registered in the United States, approval from the major command (MAJCOM) is necessary. This ensures that appropriate security measures are in place and that the transportation of COMSEC is conducted in a manner that aligns with national security protocols.
33.
(422) What term is used to describe a communication security (COMSEC) security lapse that
occurs when people fail to follow established COMSEC instructions, procedures, or standards?
Correct Answer
B. COMSEC deviation.
Explanation
A COMSEC deviation is the term used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards. It refers to any action or behavior that deviates from the established protocols and guidelines for ensuring secure communication. This can include unauthorized disclosure of sensitive information, improper handling of cryptographic material, or failure to implement proper security measures. A COMSEC deviation indicates a breach in security protocols and highlights the importance of adhering to established procedures to maintain the confidentiality and integrity of communication systems.
34.
(422) What term is used to describe a communication security (COMSEC) security lapse with a
potential to jeopardize the security of COMSEC material if it is allowed to continue?
Correct Answer
D. Practice dangerous to security (PDS).
Explanation
A "Practice dangerous to security (PDS)" is used to describe a communication security (COMSEC) security lapse that has the potential to jeopardize the security of COMSEC material if it continues. This term is used to highlight the seriousness of the situation and the need for immediate action to prevent any further compromise of COMSEC material.
35.
(423) What office assigns a tracking number to any reported communication security (COMSEC)
material receipt reporting discrepancy?
Correct Answer
C. HQ AFNIC/EVIC.
Explanation
The correct answer is HQ AFNIC/EVIC. The HQ AFNIC/EVIC office is responsible for assigning a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy. This office ensures that all reported discrepancies are properly documented and tracked for resolution.
36.
(423) Guidance for processing COMSEC material receipt reporting discrepancies can be found in
Correct Answer
D. AFSSI 4212 and AFKAG–2.
Explanation
The correct answer is AFSSI 4212 and AFKAG–2. This can be determined by carefully reading the question and identifying the correct sources for guidance on processing COMSEC material receipt reporting discrepancies.
37.
(424) Which situation does not describe a communication security (COMSEC) cryptographic
incident?
Correct Answer
A. Failing to zeroize a common fill device within 12 hours of supersession of the effective key
material (KEYMAT).
38.
(425) As a minimum, to what classification should you mark a communication security
(COMSEC) incident report when the report reveals effective dates of classified keying material,
enough information to determine the effective date, or material suspected of being compromised?
Correct Answer
C. CONFIDENTIAL.
Explanation
When a communication security (COMSEC) incident report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised, it should be marked as CONFIDENTIAL. This classification indicates that the information is sensitive and could cause damage or harm if disclosed, but it is not as highly classified as SECRET or TOP SECRET. The classification of For Official Use Only is used for information that is sensitive but does not meet the criteria for higher classifications.
39.
(425) A final communication security (COMSEC) incident report must be submitted no later than
how many days after the initial report?
Correct Answer
D. 60 days.
Explanation
A final communication security (COMSEC) incident report must be submitted no later than 60 days after the initial report because it allows for a thorough investigation and analysis of the incident. This timeframe ensures that all relevant information is collected and reviewed before the final report is submitted. Additionally, it allows for any necessary corrective actions to be taken to prevent similar incidents in the future.
40.
(426) What local communications security management software (LCMS) desktop
function provides a user with the ability to securely pass information and/or transfer
electronic key management system (EKMS) messages/keys directly to other EKMS
accounts?
Correct Answer
D. Direct Comms.
Explanation
Direct Comms is a local communications security management software (LCMS) desktop function that allows users to securely pass information and transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts. This feature ensures the secure and efficient transfer of sensitive information within the EKMS system.
41.
(427) Which device connects to the local management device (LMD) and provides secure
direct communications capabilities between sites in the electronic key management
system (EKMS) architecture?
Correct Answer
C. Secure terminal equipment (STE).
Explanation
Secure terminal equipment (STE) connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture. STE ensures the secure transfer of sensitive data and encryption keys between different sites, allowing for secure communication and management of encryption keys in the EKMS system.
42.
(428) What classification of communication security (COMSEC) material is the local
management device (LMD) designed to support and process?
Correct Answer
A. SECRET.
Explanation
The local management device (LMD) is designed to support and process SECRET classification of communication security (COMSEC) material.
43.
(428) The local management device (LMD) supports or utilizes all of the following except
Correct Answer
C. Unencrypted keying material.
Explanation
The local management device (LMD) supports or utilizes dial-up communications, encrypted keying material, and the Santa Cruz Operation (SCO) UNIX OpenServer operating system. However, it does not support or utilize unencrypted keying material.
44.
(429) Which type of National Security Agency (NSA) approved encryption device does
the local management device (LMD) use to communicate over a communications link?
Correct Answer
A. Type I
Explanation
The local management device (LMD) uses a Type I National Security Agency (NSA) approved encryption device to communicate over a communications link. Type I encryption devices are the highest level of encryption approved by the NSA and are used for securing classified information.
45.
(430) The front of the KOK–22A device fill connector allows interface with which type of
file devices?
Correct Answer
C. DS-101 and DS-102
Explanation
The front of the KOK-22A device fill connector allows interface with both DS-101 and DS-102 type of file devices.
46.
(431) The transit cryptographic ignition key (CIK) for the KOK–22A is created at the
depot and is accounted for as
Correct Answer
D. ALC-4
Explanation
The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as ALC-4.
47.
(432) What is not true about firefly credentials?
Correct Answer
A. They have a set cryptoperiod.
Explanation
Firefly credentials do not have a set cryptoperiod. This means that they do not have a predetermined lifespan or validity period. Unlike other credentials, such as certificates, which have a specific expiration date, firefly credentials do not expire. They are valid indefinitely from the creation date and do not require renewal or reissuance. Firefly credentials are used for successful key exchange and do not have a fixed time frame in which they are valid.
48.
(432) Unless directed by National Security Agency (NSA) or HQ CPSQ, how often is the
electronic rekey of the firefly vector set completed?
Correct Answer
B. Annually.
Explanation
The correct answer is annually. This means that the electronic rekey of the firefly vector set is completed once a year, unless specifically instructed by the National Security Agency (NSA) or HQ CPSQ.
49.
(433) When loading the vector set for the firefly credentials and you click on “Load
EKMS Vector Set”, what should immediately happen?
Correct Answer
A. The screen will go blank.
50.
(434) Which communication security (COMSEC) management software is used in
conjunction with the key processor (KP) to generate electronic key as well as transfer
physical and electronic keys to other COMSEC accounts?
Correct Answer
C. Local communications security management software (LCMS).
Explanation
The correct answer is Local communications security management software (LCMS). LCMS is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts.