CDC 3D053 Cyber Surety Journeyman Volume 3. Communications Security (Comsec)

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Bmx41992
B
Bmx41992
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,426
Questions: 52 | Attempts: 714

SettingsSettingsSettings
CDC 3D053 Cyber Surety Journeyman Volume 3. Communications Security (Comsec) - Quiz

CDC 3D053Cyber Surety JourneymanVolume 3. Communications Security(COMSEC)


Questions and Answers
  • 1. 

    (401) Which communications security (COMSEC) tier generates, distributes, and performs accounting functions of all modern key, physical traditional key, and certain electronic key?

    • A.

      Zero.

    • B.

      One.

    • C.

      Two.

    • D.

      Three.

    Correct Answer
    A. Zero.
    Explanation
    Zero is the correct answer because it refers to the highest level of communications security (COMSEC) tier. This tier is responsible for generating, distributing, and performing accounting functions for all modern key, physical traditional key, and certain electronic key.

    Rate this question:

  • 2. 

    (401) What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked “CRYPTO” is distributed, controlled, and safeguarded?

    • A.

      Electronic key management system (EKMS).

    • B.

      Communications security material control system (CMCS).

    • C.

      Standard base supply system (SBSS).

    • D.

      Cryptologic systems group (CPSG).

    Correct Answer
    B. Communications security material control system (CMCS).
  • 3. 

    (402) All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except

    • A.

      Being a .U.S. citizen

    • B.

      Meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • C.

      Possessing a security clearance commensurate for type of material in account

    • D.

      Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee

    Correct Answer
    D. Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee
    Explanation
    To be a communications security account manager (CAM) without a waiver, all the requirements mentioned must be met except for being a 33XX officer, a 3D053 or 3D000 NCO, or a 301, 391 or 2210 civilian employee. The other requirements include being a U.S. citizen, meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1, and possessing a security clearance commensurate for the type of material in the account.

    Rate this question:

  • 4. 

    (402) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?

    • A.

      Federal Aviation Administration (FAA).

    • B.

      Cryptologic Systems Group (CPSG).

    • C.

      National Security Agency (NSA).

    • D.

      Major command (MAJCOM).

    Correct Answer
    C. National Security Agency (NSA).
    Explanation
    The National Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users.

    Rate this question:

  • 5. 

    (402) To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to

    • A.

      AFI 33–201, volume 4

    • B.

      TO 00–20F–2

    • C.

      AFKAG–1

    • D.

      AFKAG-2

    Correct Answer
    D. AFKAG-2
    Explanation
    The correct answer is AFKAG-2. This is because AFKAG-2 is likely a document or reference that provides guidance on the appropriate actions to take during the absence of the communications security account manager (CAM). AFI 33–201, volume 4 is a document that provides guidance on communications security, but it may not specifically address actions to take during the absence of the CAM. TO 00–20F–2 is a technical order that may not be relevant to this specific situation. AFKAG–1 is not mentioned in the question and therefore cannot be determined as the correct answer.

    Rate this question:

  • 6. 

    (403) Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow?

    • A.

      Air Force Cryptologic Accounting Guide (AFKAG)–1

    • B.

      AFKAG–2

    • C.

      AFKAG–3

    • D.

      AFKAG–4

    Correct Answer
    B. AFKAG–2
    Explanation
    The correct answer is AFKAG–2. This publication provides step-by-step procedures for COMSEC personnel to follow.

    Rate this question:

  • 7. 

    (403) Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with

    • A.

      AFSSI 4201

    • B.

      AFSSI 4202

    • C.

      AFSSI 4211

    • D.

      AFSSI 4212

    Correct Answer
    D. AFSSI 4212
  • 8. 

    404) The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following Air Force specialties except

    • A.

      Security forces

    • B.

      Information systems

    • C.

      Information assurance

    • D.

      Base information infrastructures

    Correct Answer
    A. Security forces
    Explanation
    The IAAP team consists of personnel experienced in all Air Force specialties except security forces. This means that the team includes individuals with expertise in information systems, information assurance, and base information infrastructures. The security forces specialty is not part of the IAAP team.

    Rate this question:

  • 9. 

    (405) Who assesses local communications security (COMSEC) elements during “command” assessments?

    • A.

      Communications security account manager (CAM).

    • B.

      Squadron commander

    • C.

      Security forces

    • D.

      MAJCOM

    Correct Answer
    D. MAJCOM
    Explanation
    MAJCOM, or Major Command, assesses local communications security (COMSEC) elements during "command" assessments. This suggests that MAJCOM is responsible for evaluating the effectiveness and compliance of COMSEC measures within a command. The other options, such as the communications security account manager (CAM), squadron commander, and security forces, may have roles related to COMSEC but are not specifically mentioned in the context of conducting assessments.

    Rate this question:

  • 10. 

    (406) Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?

    • A.

      AFI 33–201 volume 4.

    • B.

      TO 00–20F–2.

    • C.

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D.

      AFKAG–2.

    Correct Answer
    B. TO 00–20F–2.
  • 11. 

    (407) Which of the following are considered long term communications security (COMSEC) key storage devices?

    • A.

      KYK–13

    • B.

      KYX–15

    • C.

      Simple key loader (SKL)

    • D.

      Communications security physical inventory (CPI)

    Correct Answer
    C. Simple key loader (SKL)
    Explanation
    The Simple Key Loader (SKL) is considered a long-term Communications Security (COMSEC) key storage device. It is a portable electronic device used to load cryptographic keys into various communication equipment. The SKL securely stores and manages cryptographic keys, ensuring their confidentiality and integrity. It is designed for long-term use and is commonly used by military and government organizations to protect sensitive information during communications.

    Rate this question:

  • 12. 

    (407) What items should never be stored in the same container with COMSEC material?

    • A.

      High theft items

    • B.

      Cryptographic maintenance manuals

    • C.

      Unkeyed classified COMSEC equipment

    • D.

      Cryptographic access program (CAP) documentation

    Correct Answer
    A. High theft items
    Explanation
    High theft items should never be stored in the same container with COMSEC material because it could increase the risk of theft or unauthorized access to the sensitive information. COMSEC material includes cryptographic keys and equipment used to encrypt and protect classified information. Storing high theft items, which are likely to attract attention and theft, with COMSEC material could compromise the security and confidentiality of the information.

    Rate this question:

  • 13. 

    (408) What form is used to record the arrival or departure of all personnel not named on the facility authorized access list?

    • A.

      Standard Form 701

    • B.

      Standard Form 702

    • C.

      Air Force Form 1109

    • D.

      Air Force Technical Order Form 36

    Correct Answer
    C. Air Force Form 1109
    Explanation
    Air Force Form 1109 is used to record the arrival or departure of all personnel not named on the facility authorized access list. This form is specific to the Air Force and is used to ensure proper documentation and tracking of personnel entering or leaving a facility. It helps maintain security and accountability by keeping a record of individuals who are not authorized to access the facility.

    Rate this question:

  • 14. 

    (409) Personnel at the temporary duty (TDY) location can/should verify an individual’s cryptographic access program (CAP) status through

    • A.

      Two-person integrity (TPI).

    • B.

      The communications security physical inventory (CPI).

    • C.

      The communications security management system (CMS).

    • D.

      The certification authority workstation (CAW).

    Correct Answer
    C. The communications security management system (CMS).
    Explanation
    Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through the communications security management system (CMS). The CMS is responsible for managing and controlling access to cryptographic materials and systems. It maintains records of individuals authorized to have access to these materials and systems, including their CAP status. By checking the CMS, personnel at the TDY location can ensure that an individual's CAP status is valid and up-to-date. This helps to maintain the security and integrity of cryptographic materials and systems.

    Rate this question:

  • 15. 

    (410) Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?

    • A.

      Air Force Network Integration Center (AFNIC)/EVPI.

    • B.

      Unit Commander.

    • C.

      CAP Administrator.

    • D.

      Communications security account manager (CAM).

    Correct Answer
    A. Air Force Network Integration Center (AFNIC)/EVPI.
    Explanation
    The Air Force Network Integration Center (AFNIC)/EVPI manages the cryptographic access program (CAP) database for AFCOMSEC. This includes managing Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests. The AFNIC/EVPI is responsible for ensuring the security and proper management of cryptographic access within the Air Force, making them the correct answer for this question.

    Rate this question:

  • 16. 

    (410) What cryptographic access program (CAP) withdrawal method is used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access?

    • A.

      Administrative withdrawal.

    • B.

      Suspension.

    • C.

      Termination.

    • D.

      Revocation.

    Correct Answer
    A. Administrative withdrawal.
    Explanation
    Administrative withdrawal is the cryptographic access program (CAP) withdrawal method used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access. This means that their access to cryptographic materials and systems is removed due to administrative reasons, such as a change in their job responsibilities or location. This withdrawal method does not involve any negative actions or penalties, but rather a simple adjustment to their access privileges based on their new role or assignment.

    Rate this question:

  • 17. 

    (411) How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?

    • A.

      Weekly.

    • B.

      Monthly.

    • C.

      Quarterly.

    • D.

      Annually.

    Correct Answer
    B. Monthly.
    Explanation
    COMSEC access lists should be reviewed for accuracy and annotated on a monthly basis. This ensures that any changes or updates to the access lists are promptly made, reducing the risk of unauthorized access to sensitive information. Regular reviews also help to identify any discrepancies or anomalies in the access lists, allowing for timely corrective actions to be taken. Reviewing the access lists monthly strikes a balance between frequent checks and practicality, ensuring that any necessary adjustments are made in a timely manner.

    Rate this question:

  • 18. 

    (411) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?

    • A.

      A final security clearance

    • B.

      An interim security clearance.

    • C.

      A clearance equal to the COMSEC being accessed.

    • D.

      A clearance higher than the COMSEC being accessed.

    Correct Answer
    B. An interim security clearance.
    Explanation
    An interim security clearance is not valid for personnel on a communications security (COMSEC) access list because it is a temporary clearance given to individuals who need access to classified information while their full security clearance is being processed. Since COMSEC access involves highly sensitive information, only individuals with a final security clearance, which is a permanent clearance, are allowed access.

    Rate this question:

  • 19. 

    (412) When classified material is not stored in a General Service Administration (GSA)- approved container, the facility containing the classified material must be constructed according to the requirements in DOD 5200.1–R MIL HDBK 1013/1A and

    • A.

      Air Force Instruction (AFI) 33–201, Volume 4.

    • B.

      Technical Order (TO) 00–20F–2.

    • C.

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D.

      AFKAG–2.

    Correct Answer
    C. Air Force Cryptologic Accounting Guide (AFKAG)–1.
  • 20. 

    (413) When removing material from a communication security physical inventory (CPI), always

    • A.

      Use red ink.

    • B.

      Use green ink.

    • C.

      Write an MFR.

    • D.

      Use correction fluid.

    Correct Answer
    A. Use red ink.
    Explanation
    When removing material from a communication security physical inventory (CPI), it is recommended to use red ink. This is because red ink stands out and is easily noticeable, making it easier to track and identify any changes or modifications made to the inventory. Additionally, using red ink helps to ensure that any updates or adjustments are clearly visible and can be easily distinguished from the original entries.

    Rate this question:

  • 21. 

    (414) The communication security physical inventory (CPI) will include all of the following except

    • A.

      Accounting legend code (ALC).

    • B.

      Edition.

    • C.

      Quantity.

    • D.

      Short title.

    Correct Answer
    A. Accounting legend code (ALC).
    Explanation
    The communication security physical inventory (CPI) is a process that involves conducting a physical count of all communication security (COMSEC) material to ensure accuracy and accountability. The CPI includes verifying the edition of the material, the quantity of items present, and their short title or description. However, the accounting legend code (ALC) is not included in the CPI. The ALC is a code used to track and categorize COMSEC material for accounting purposes, but it is not part of the physical inventory process.

    Rate this question:

  • 22. 

    (414) How long should a communication security (COMSEC) inventory form be retained?

    • A.

      Current month only.

    • B.

      Past six months only.

    • C.

      Past six months plus the current month.

    • D.

      Based upon local guidance at each installation.

    Correct Answer
    C. Past six months plus the current month.
    Explanation
    The correct answer is "Past six months plus the current month." This means that a communication security (COMSEC) inventory form should be retained for a period of six months, including the current month. This ensures that there is a record of the inventory for a sufficient amount of time, allowing for any necessary audits or reviews to take place.

    Rate this question:

  • 23. 

    (415) Changes that must be made to material in communication security (COMSEC) publications are called

    • A.

      Modifications.

    • B.

      Amendments.

    • C.

      Corrections.

    • D.

      Updates.

    Correct Answer
    B. Amendments.
    Explanation
    Amendments refer to changes that must be made to material in communication security (COMSEC) publications. They are used to update and modify the content of these publications. Corrections, on the other hand, typically refer to fixing errors or mistakes, while updates generally imply bringing information up to date. Therefore, amendments best describe the changes made to COMSEC publications.

    Rate this question:

  • 24. 

    (416) Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession?

    • A.

      Eight.

    • B.

      Twelve.

    • C.

      Twenty-four.

    • D.

      Forty-eight.

    Correct Answer
    B. Twelve.
    Explanation
    The correct answer is twelve. Under normal circumstances, communication security (COMSEC) keying material designated CRYPTO should be destroyed as soon as possible but no later than twelve hours after supersession. This ensures that the old key material is no longer used, preventing unauthorized access to sensitive information.

    Rate this question:

  • 25. 

    (416) The only authorized methods to destroy key tapes are by any of the following methods except

    • A.

      Disintegrating.

    • B.

      Pulverizing.

    • C.

      Shredding.

    • D.

      Burning.

    Correct Answer
    C. Shredding.
    Explanation
    The question asks for the only authorized methods to destroy key tapes, excluding one method. The options provided are disintegrating, pulverizing, shredding, and burning. The correct answer is shredding, as it is not an authorized method to destroy key tapes.

    Rate this question:

  • 26. 

    (417) Sign the communication security (COMSEC) material destruction record

    • A.

      Immediately after the material is destroyed.

    • B.

      Immediately before the material is destroyed.

    • C.

      Within 12 hours after the material is destroyed.

    • D.

      Within 12 hours before the material is destroyed.

    Correct Answer
    A. Immediately after the material is destroyed.
    Explanation
    The correct answer is "immediately after the material is destroyed." This is because signing the communication security (COMSEC) material destruction record immediately after the material is destroyed ensures that the record accurately reflects the destruction and prevents any potential tampering or manipulation of the record. By signing immediately after destruction, it provides a clear and timely documentation of the destruction process.

    Rate this question:

  • 27. 

    (418) As part of a two-person control (TPC) team, you must be designated to handle communication security (COMSEC) material under the

    • A.

      Personnel reliability program (PRP).

    • B.

      Sealed authenticator systems (SAS).

    • C.

      Permissive action link (PAL).

    • D.

      Coded switch system (CSS).

    Correct Answer
    A. Personnel reliability program (PRP).
    Explanation
    The correct answer is "personnel reliability program (PRP)." In a two-person control (TPC) team, one person is designated to handle communication security (COMSEC) material. This responsibility falls under the personnel reliability program (PRP), which ensures that individuals with access to sensitive information or materials are trustworthy and reliable. The other options, sealed authenticator systems (SAS), permissive action link (PAL), and coded switch system (CSS), are not directly related to the handling of COMSEC material in a TPC team.

    Rate this question:

  • 28. 

    (419) An area, room, or space which, when attended, must be occupied by two or more appropriately cleared individuals who remain within sight of each other is called a communication security (COMSEC)

    • A.

      Two-person integrity (TPI) zone.

    • B.

      Two-person control (TPC) zone.

    • C.

      No-lone zone.

    • D.

      Controlled area.

    Correct Answer
    C. No-lone zone.
    Explanation
    A "no-lone zone" refers to an area, room, or space where two or more individuals who have been appropriately cleared must be present and remain within sight of each other. This measure is taken to ensure communication security and prevent any unauthorized access or tampering with sensitive information or equipment. The term "no-lone zone" emphasizes the importance of having multiple individuals present to maintain security and accountability.

    Rate this question:

  • 29. 

    (419) What situation is not an authorized exception to two-person integrity (TPI) requirements?

    • A.

      Unopened National Security Agency (NSA) protective packaged material.

    • B.

      Communication security (COMSEC) material used in tactical situations.

    • C.

      COMSEC material handled in minimum manning situations.

    • D.

      Unopened packages received from or in the custody of the Defense Courier Division (DCD).

    Correct Answer
    C. COMSEC material handled in minimum manning situations.
    Explanation
    Two-person integrity (TPI) requirements are in place to ensure the security and accountability of sensitive materials. TPI requires that two authorized individuals be present at all times when handling certain materials. The exception to this requirement is when handling unopened National Security Agency (NSA) protective packaged material, communication security (COMSEC) material used in tactical situations, and unopened packages received from or in the custody of the Defense Courier Division (DCD). However, COMSEC material handled in minimum manning situations is not an authorized exception to TPI requirements. This means that even in situations where there is minimal staff available, TPI must still be maintained when handling COMSEC material.

    Rate this question:

  • 30. 

    (420) Which of the following is not an authorized official who may designate in writing individuals selected to perform courier duty?

    • A.

      Supervisor.

    • B.

      Unit commander.

    • C.

      Security manager.

    • D.

      Communications security account manager (CAM).

    Correct Answer
    D. Communications security account manager (CAM).
    Explanation
    The Communications Security Account Manager (CAM) is not an authorized official who may designate individuals to perform courier duty. The other options, such as the supervisor, unit commander, and security manager, have the authority to designate individuals for courier duty. However, the CAM's role is focused on managing communications security accounts and is not directly related to courier duties.

    Rate this question:

  • 31. 

    (420) When transporting bulky communication security (COMSEC) material through airlines, you may leave COMSEC material unattended

    • A.

      Under no circumstances.

    • B.

      When it is in a baggage area.

    • C.

      When it is loaded on a cargo dock.

    • D.

      When it is passed on to authorized airport personnel.

    Correct Answer
    A. Under no circumstances.
    Explanation
    COMSEC material is highly sensitive and should never be left unattended, regardless of the circumstances. This is to ensure the security and protection of the material from unauthorized access or theft. Leaving it unattended increases the risk of compromising the confidentiality and integrity of the communication systems it is meant to protect. Therefore, it is crucial to always keep COMSEC material under constant supervision and control.

    Rate this question:

  • 32. 

    (421) When transporting communication security (COMSEC), MAJCOM approval is required when traveling

    • A.

      Via commercial airlines.

    • B.

      Via all types of airlines.

    • C.

      Via non-U.S. flag airlines.

    • D.

      Via U.S. flag or chartered airlines.

    Correct Answer
    C. Via non-U.S. flag airlines.
    Explanation
    MAJCOM approval is required when transporting communication security (COMSEC) via non-U.S. flag airlines. This means that if COMSEC is being transported on an airline that is not registered in the United States, approval from the major command (MAJCOM) is necessary. This ensures that appropriate security measures are in place and that the transportation of COMSEC is conducted in a manner that aligns with national security protocols.

    Rate this question:

  • 33. 

    (422) What term is used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards?

    • A.

      COMSEC incident.

    • B.

      COMSEC deviation.

    • C.

      COMSEC insecurity.

    • D.

      D. Practice dangerous to security (PDS).

    Correct Answer
    B. COMSEC deviation.
    Explanation
    A COMSEC deviation is the term used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards. It refers to any action or behavior that deviates from the established protocols and guidelines for ensuring secure communication. This can include unauthorized disclosure of sensitive information, improper handling of cryptographic material, or failure to implement proper security measures. A COMSEC deviation indicates a breach in security protocols and highlights the importance of adhering to established procedures to maintain the confidentiality and integrity of communication systems.

    Rate this question:

  • 34. 

    (422) What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?

    • A.

      COMSEC incident.

    • B.

      COMSEC deviation.

    • C.

      COMSEC insecurity.

    • D.

      Practice dangerous to security (PDS).

    Correct Answer
    D. Practice dangerous to security (PDS).
    Explanation
    A "Practice dangerous to security (PDS)" is used to describe a communication security (COMSEC) security lapse that has the potential to jeopardize the security of COMSEC material if it continues. This term is used to highlight the seriousness of the situation and the need for immediate action to prevent any further compromise of COMSEC material.

    Rate this question:

  • 35. 

    (423) What office assigns a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy?

    • A.

      TOBYHANNA/CA5B1099.

    • B.

      HQ CPSG/CA616600.

    • C.

      HQ AFNIC/EVIC.

    • D.

      DIRNSA/I5113.

    Correct Answer
    C. HQ AFNIC/EVIC.
    Explanation
    The correct answer is HQ AFNIC/EVIC. The HQ AFNIC/EVIC office is responsible for assigning a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy. This office ensures that all reported discrepancies are properly documented and tracked for resolution.

    Rate this question:

  • 36. 

    (423) Guidance for processing COMSEC material receipt reporting discrepancies can be found in

    • A.

      AFSSI 4201 and AFKAG–1.

    • B.

      AFSSI 4202 and AFKAG–1.

    • C.

      AFSSI 4211 and AFKAG–2.

    • D.

      AFSSI 4212 and AFKAG–2.

    Correct Answer
    D. AFSSI 4212 and AFKAG–2.
    Explanation
    The correct answer is AFSSI 4212 and AFKAG–2. This can be determined by carefully reading the question and identifying the correct sources for guidance on processing COMSEC material receipt reporting discrepancies.

    Rate this question:

  • 37. 

    (424) Which situation does not describe a communication security (COMSEC) cryptographic incident?

    • A.

      Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT).

    • B.

      Using keying material that is compromised, superseded, defective, or misused.

    • C.

      C. Using keying material that was produced without National Security Agency (NSA) authorization.

    • D.

      Using equipment with defective logic circuitry.

    Correct Answer
    A. Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT).
  • 38. 

    (425) As a minimum, to what classification should you mark a communication security (COMSEC) incident report when the report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised?

    • A.

      SECRET.

    • B.

      TOP SECRET.

    • C.

      CONFIDENTIAL.

    • D.

      For Official Use Only.

    Correct Answer
    C. CONFIDENTIAL.
    Explanation
    When a communication security (COMSEC) incident report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised, it should be marked as CONFIDENTIAL. This classification indicates that the information is sensitive and could cause damage or harm if disclosed, but it is not as highly classified as SECRET or TOP SECRET. The classification of For Official Use Only is used for information that is sensitive but does not meet the criteria for higher classifications.

    Rate this question:

  • 39. 

    (425) A final communication security (COMSEC) incident report must be submitted no later than how many days after the initial report?

    • A.

      5 days.

    • B.

      10 days.

    • C.

      30 days.

    • D.

      60 days.

    Correct Answer
    D. 60 days.
    Explanation
    A final communication security (COMSEC) incident report must be submitted no later than 60 days after the initial report because it allows for a thorough investigation and analysis of the incident. This timeframe ensures that all relevant information is collected and reviewed before the final report is submitted. Additionally, it allows for any necessary corrective actions to be taken to prevent similar incidents in the future.

    Rate this question:

  • 40. 

    (426) What local communications security management software (LCMS) desktop function provides a user with the ability to securely pass information and/or transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts?

    • A.

      X.400

    • B.

      X.500

    • C.

      Message.

    • D.

      Direct Comms.

    Correct Answer
    D. Direct Comms.
    Explanation
    Direct Comms is a local communications security management software (LCMS) desktop function that allows users to securely pass information and transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts. This feature ensures the secure and efficient transfer of sensitive information within the EKMS system.

    Rate this question:

  • 41. 

    (427) Which device connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture?

    • A.

      Simple key loader (SKL).

    • B.

      Data transfer device (DTD).

    • C.

      Secure terminal equipment (STE).

    • D.

      Data management device (DMD).

    Correct Answer
    C. Secure terminal equipment (STE).
    Explanation
    Secure terminal equipment (STE) connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture. STE ensures the secure transfer of sensitive data and encryption keys between different sites, allowing for secure communication and management of encryption keys in the EKMS system.

    Rate this question:

  • 42. 

    (428) What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?

    • A.

      SECRET.

    • B.

      CRYPTO.

    • C.

      TOP SECRET.

    • D.

      CONFIDENTIAL.

    Correct Answer
    A. SECRET.
    Explanation
    The local management device (LMD) is designed to support and process SECRET classification of communication security (COMSEC) material.

    Rate this question:

  • 43. 

    (428) The local management device (LMD) supports or utilizes all of the following except

    • A.

      Dial-up communications.

    • B.

      Encrypted keying material.

    • C.

      Unencrypted keying material.

    • D.

      The Santa Cruz Operation (SCO) UNIX OpenServer operating system.

    Correct Answer
    C. Unencrypted keying material.
    Explanation
    The local management device (LMD) supports or utilizes dial-up communications, encrypted keying material, and the Santa Cruz Operation (SCO) UNIX OpenServer operating system. However, it does not support or utilize unencrypted keying material.

    Rate this question:

  • 44. 

    (429) Which type of National Security Agency (NSA) approved encryption device does the local management device (LMD) use to communicate over a communications link?

    • A.

      Type I

    • B.

      Type II

    • C.

      Type III

    • D.

      Type IV

    Correct Answer
    A. Type I
    Explanation
    The local management device (LMD) uses a Type I National Security Agency (NSA) approved encryption device to communicate over a communications link. Type I encryption devices are the highest level of encryption approved by the NSA and are used for securing classified information.

    Rate this question:

  • 45. 

    (430) The front of the KOK–22A device fill connector allows interface with which type of file devices?

    • A.

      DS-101 only

    • B.

      DS-102 only

    • C.

      DS-101 and DS-102

    • D.

      All types of fill devices

    Correct Answer
    C. DS-101 and DS-102
    Explanation
    The front of the KOK-22A device fill connector allows interface with both DS-101 and DS-102 type of file devices.

    Rate this question:

  • 46. 

    (431) The transit cryptographic ignition key (CIK) for the KOK–22A is created at the depot and is accounted for as

    • A.

      ALC-1

    • B.

      ALC-2

    • C.

      ALC-3

    • D.

      ALC-4

    Correct Answer
    D. ALC-4
    Explanation
    The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as ALC-4.

    Rate this question:

  • 47. 

    (432) What is not true about firefly credentials?

    • A.

      They have a set cryptoperiod.

    • B.

      They have an expiration date.

    • C.

      They are valid for one month from the creation date.

    • D.

      They must be generated to successfully exchange keying material (KEYMAT).

    Correct Answer
    A. They have a set cryptoperiod.
    Explanation
    Firefly credentials do not have a set cryptoperiod. This means that they do not have a predetermined lifespan or validity period. Unlike other credentials, such as certificates, which have a specific expiration date, firefly credentials do not expire. They are valid indefinitely from the creation date and do not require renewal or reissuance. Firefly credentials are used for successful key exchange and do not have a fixed time frame in which they are valid.

    Rate this question:

  • 48. 

     (432) Unless directed by National Security Agency (NSA) or HQ CPSQ, how often is the electronic rekey of the firefly vector set completed?

    • A.

      Monthly.

    • B.

      Annually.

    • C.

      Quarterly.

    • D.

      Bi-annually.

    Correct Answer
    B. Annually.
    Explanation
    The correct answer is annually. This means that the electronic rekey of the firefly vector set is completed once a year, unless specifically instructed by the National Security Agency (NSA) or HQ CPSQ.

    Rate this question:

  • 49. 

    (433) When loading the vector set for the firefly credentials and you click on “Load EKMS Vector Set”, what should immediately happen?

    • A.

      The screen will go blank.

    • B.

      The user will be prompted to insert and turn the KSD–64A.

    • C.

      The user will be prompted to input the key use information.

    • D.

      The user will be prompted to turn and remove the KSD–64A.

    Correct Answer
    A. The screen will go blank.
  • 50. 

    (434) Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts?

    • A.

      User application software (UAS).

    • B.

      Common user application software (CUAS).

    • C.

      Local communications security management software (LCMS).

    • D.

      Card loader user application software (CLUAS).

    Correct Answer
    C. Local communications security management software (LCMS).
    Explanation
    The correct answer is Local communications security management software (LCMS). LCMS is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 01, 2012
    Quiz Created by
    Bmx41992
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.