Term
which communications security (COMSEC) tier generates, distributes, and performs accounting functions of all modern key, physical traditional key, and certain electronic key? |
|
Definition
|
|
Term
What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked "CRYPTO" is distributed, controlled, ad safeguarded? |
|
Definition
Communications security material control system (CMCS) |
|
|
Term
All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except |
|
Definition
Being a 33xx officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee |
|
|
Term
Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) |
|
Definition
National Security Agency (NSA) |
|
|
Term
To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to |
|
Definition
|
|
Term
Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow? |
|
Definition
Air Force Cryptologic Accounting Guide (AFKAG)-1 |
|
|
Term
Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with |
|
Definition
|
|
Term
The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following Air Force specialties except |
|
Definition
|
|
Term
Who assesses local communications security (COMSEC) elements during "command" assessments? |
|
Definition
Communications security account manager (CAM) |
|
|
Term
Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication? |
|
Definition
|
|
Term
Which of the following are considered long term communications security (COMSEC) key storage devices? |
|
Definition
|
|
Term
What items should never be stored in the same container with COMSEC material? |
|
Definition
|
|
Term
What form is used to record the arrival of departure of all personnel not named on the facility authorized access list? |
|
Definition
|
|
Term
Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through |
|
Definition
the communications security management system (CMS) |
|
|
Term
Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests? |
|
Definition
Air Force Network Integration Center (AFNIC)EVPI |
|
|
Term
What cryptographic access program (CAP) withdrawal method is used for personnel whoa re reassigned to another base or unit or to positions that do not require cryptographic access? |
|
Definition
administrative withdrawal |
|
|
Term
How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated? |
|
Definition
|
|
Term
which type of security clearance is not valid for personnel on a communications security (COMSEC) access list? |
|
Definition
An interim security clearance |
|
|
Term
When classified material is not stored in a General Service Administration (GSA)-according to the requirements in DOD 5200.1-R MIL HDBK 1013/1A and |
|
Definition
Air Force Cryptologic Accounting Guide (AFKAG)-1. |
|
|
Term
When removing material from a communication security physical inventory (CPI) always |
|
Definition
|
|
Term
The communication security physical inventory (CPI) will include all of the following except |
|
Definition
accounting legend code (ALC) |
|
|
Term
How long should a communication security (COMSEC) inventory form be retained? |
|
Definition
Past six months plus the current month |
|
|
Term
Changes that must be made to material in communication security (COMSEC) publications are called |
|
Definition
|
|
Term
Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession? |
|
Definition
|
|
Term
The only authorized methods to destroy key tapes are by any of the folling methods except |
|
Definition
|
|
Term
Sign the communitcation security (COMSEC) material destruction record |
|
Definition
Immediately after the material is destroyed |
|
|
Term
As part of a two-person control (TPC) team, you must be designated to handle communication security (COMSEC) material under the |
|
Definition
personnel reliability program (PRP) |
|
|
Term
An area, room, or space which, when attended, must be occupied by two or more appropriately cleared individuals who remain within sight of each other is called a communication security (COMSEC) |
|
Definition
|
|
Term
What stuation is not an authorized exception to two-person integrity (TPI) requirements? |
|
Definition
COMSEC material handled in minimum manning situations |
|
|
Term
Which of the following is not an authorized official who may designate in writing individuals selected to perform courier duty |
|
Definition
Communications security account manager (CAM) |
|
|
Term
When transporting bulky communication security (COMSEC) material through airlines, you may leave COMSEC material unattended |
|
Definition
|
|
Term
When transporting communication security (COMSEC) MAJCOM approval is required when traveling |
|
Definition
via non-U.S. flag airlines |
|
|
Term
What term is used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards? |
|
Definition
|
|
Term
What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue? |
|
Definition
Practice dangerous to security PDS |
|
|
Term
What office assigns a tracking number to any reported communications security(COMSEC) material receipt reporting deiscrepancy? |
|
Definition
|
|
Term
Guidance for processing COMSEC material receipt reporting discrepancies can be found in |
|
Definition
|
|
Term
Which situation does not describe a communication security (COMSEC) cryptographic incident? |
|
Definition
Failing to zeroize a common fill device within 12 hours of super session of the effective key material (KEYMAT) |
|
|
Term
As a minimum, to what classification should you mark a communication security (COMSEC) incident report when the report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised? |
|
Definition
|
|
Term
A final communication security (COMSEC) incident report must be submitted no later than how many dats after the initial report? |
|
Definition
|
|
Term
What local communications security management software (LCMS) desktop function provides a user with the ability to securely pass information and/or transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts? |
|
Definition
|
|
Term
Which device connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture? |
|
Definition
Secure terminal equipment (STE) |
|
|
Term
What classification of communication security (COMSEC) material is the local mangement device LMD) designed to support and process? |
|
Definition
|
|
Term
(428) Which type of National Security Agency (NSA) approved encryption device does the local management device (LMD) use to communicate over a communications link? |
|
Definition
|
|
Term
The local management device (LMD) supports or utilizes all of the following except |
|
Definition
unencrypted keying material |
|
|
Term
Which communications security (COMSEC) management software uses menus and sub menus for necessary tasks? |
|
Definition
Local communications security management software LCMS |
|
|
Term
The front of the KOK-22A device fill connector allows interface with which type of file devices? |
|
Definition
|
|
Term
The transit cryptographic ignition key (CIK) for the KOK 22A is created at the depot and is accounted for as |
|
Definition
|
|
Term
What is not true about firefly credentials |
|
Definition
They have a set cryptoperiod |
|
|
Term
Unless directed by national Security Agency (NSA) or HQ CPSQ, how often is the electronic rekey of the firefly vector set completed? |
|
Definition
|
|
Term
When loading the vector set for the firefly credentials and you click on "load EKMS Vector Set", what should immediately happen? |
|
Definition
|
|
Term
Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts? |
|
Definition
Local communications security management software (LCMS) |
|
|
Term
Which communications security (COMSEC) management software does not allow an account to perform a semi-annual inventory? |
|
Definition
Common user application software (CUAS) |
|
|