3D053 CDC Edit 02 Vol 3

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Rediculous
R
Rediculous
Community Contributor
Quizzes Created: 2 | Total Attempts: 1,188
Questions: 68 | Attempts: 657

SettingsSettingsSettings
CDC Quizzes & Trivia

The UREs for vol 3 3D053 edit code 02 which became active 4 April 2013


Questions and Answers
  • 1. 

    What is a collection of interoperable systems developed for the services and government agencies to automate handling and management of communications security (COMSEC) material?

    • A.

      Electronic key management system (EMKS).

    • B.

      COMSEC account.

    • C.

      Firefly credentials.

    • D.

      Cryptonet

    Correct Answer
    A. Electronic key management system (EMKS).
    Explanation
    The correct answer is Electronic key management system (EMKS). EMKS is a collection of interoperable systems developed for services and government agencies to automate the handling and management of communications security material, specifically COMSEC material. It is designed to securely generate, distribute, and manage cryptographic keys used for encrypting and decrypting sensitive information. EMKS ensures the confidentiality, integrity, and availability of communications by providing a centralized and automated solution for key management.

    Rate this question:

  • 2. 

    What allows one element to pass required information to another element enabling both elements to generate the same key session?

    • A.

      Electronic key management system (EMKS).

    • B.

      Communications security (COMSEC) account.

    • C.

      Firefly credentials.

    • D.

      Cryptonet

    Correct Answer
    C. Firefly credentials.
    Explanation
    Firefly credentials enable one element to pass required information to another element, allowing both elements to generate the same key session. This suggests that Firefly credentials have the capability to establish a secure and synchronized communication between the two elements, ensuring that they can generate and use the same key for their sessions. This implies that Firefly credentials play a crucial role in facilitating secure and consistent communication between elements in a system.

    Rate this question:

  • 3. 

    Who appoints communications security responsible officers (CRO) to support a unit’s communications security (COMSEC) mission?

    • A.

      Communications security account manager (CAM).

    • B.

      Communications unit commander.

    • C.

      Supported unit commander.

    • D.

      Wing commander.

    Correct Answer
    C. Supported unit commander.
    Explanation
    The supported unit commander appoints communications security responsible officers (CRO) to support a unit's communications security (COMSEC) mission. This individual has the authority and responsibility to select and assign CROs who will be responsible for implementing and maintaining COMSEC measures within the unit. The CROs play a crucial role in ensuring the confidentiality, integrity, and availability of communications systems and information within the unit.

    Rate this question:

  • 4. 

    Who is responsible for identifying cryptonet members?

    • A.

      Local communication security management system (LCMS) administrator.

    • B.

      Communications security responsible officer (CRO).

    • C.

      Communications security (COMSEC) accountant.

    • D.

      Controlling authorities.

    Correct Answer
    D. Controlling authorities.
    Explanation
    Controlling authorities are responsible for identifying cryptonet members. They have the authority and control to determine who can access and be part of the cryptonet. They play a crucial role in managing the security and access control of the network, ensuring that only authorized individuals are granted membership. The other options mentioned, such as the LCMS administrator, CRO, and COMSEC accountant, may have roles related to communication security management, but they do not specifically address the responsibility of identifying cryptonet members.

    Rate this question:

  • 5. 

    Which communications security (COMSEC) tier generates, distributes, and performs accounting functions of all modern key, physical traditional key, and certain electronic key?

    • A.

      Zero

    • B.

      One

    • C.

      Two

    • D.

      Three

    Correct Answer
    A. Zero
    Explanation
    COMSEC tier Zero is responsible for generating, distributing, and performing accounting functions of all modern key, physical traditional key, and certain electronic key. This means that tier Zero handles the entire process of key management and ensures the secure distribution and accounting of keys for communication security.

    Rate this question:

  • 6. 

    All are requirements that must be met to be a primary communications security account manager (CAM) without a waiver except

    • A.

      Being a US citizen.

    • B.

      Being a 3D0XX noncommissioned officer (NCO).

    • C.

      Possessing a security clearance commensurate for type of material in account.

    • D.

      Meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1.

    Correct Answer
    B. Being a 3D0XX noncommissioned officer (NCO).
    Explanation
    To be a primary communications security account manager (CAM), one must meet several requirements without needing a waiver. These requirements include being a US citizen, possessing a security clearance that matches the type of material in the account, and meeting the minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1. However, being a 3D0XX noncommissioned officer (NCO) is not a requirement that must be met without a waiver.

    Rate this question:

  • 7. 

    To become a communications security account manager (CAM), you must either complete the CAM course or have had how many years of previous communications security (COMSEC) operations experience?

    • A.

      One

    • B.

      Two

    • C.

      Three

    • D.

      Four

    Correct Answer
    C. Three
    Explanation
    To become a communications security account manager (CAM), you must have had three years of previous communications security (COMSEC) operations experience. This indicates that the CAM course is not the only requirement for becoming a CAM, and that practical experience in COMSEC operations is also considered as a qualification for the role.

    Rate this question:

  • 8. 

    Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?

    • A.

      Federal Aviation Administration (FAA).

    • B.

      Cryptologic Systems Division (CPSD).

    • C.

      National Security Agency (NSA).

    • D.

      Major command (MAJCOM).

    Correct Answer
    C. National Security Agency (NSA).
    Explanation
    The National Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users. This implies that the NSA has specific standards and protocols in place for the certification of LMD/KP platform users, and they have designated the CAM as the responsible party for ensuring that these standards are met.

    Rate this question:

  • 9. 

    How often must communications security account manager (CAM) waivers be renewed?

    • A.

      Three months.

    • B.

      Six months.

    • C.

      Annually.

    • D.

      Biannually.

    Correct Answer
    C. Annually.
    Explanation
    CAM waivers for communications security account managers must be renewed annually. This means that the waivers need to be reviewed and updated every year to ensure that the manager is still qualified and authorized to handle communications security. This regular renewal process helps to maintain the security and integrity of communications systems within an organization.

    Rate this question:

  • 10. 

    How many copies of a communications security account manager (CAM) rescission letter must be prepared?

    • A.

      Two

    • B.

      Four

    • C.

      Six

    • D.

      Seven

    Correct Answer
    B. Four
    Explanation
    Four copies of a communications security account manager (CAM) rescission letter must be prepared. This is because multiple copies of the letter are usually required for distribution to different parties involved in the process, such as the recipient, the sender's records, legal department, or any other relevant departments or individuals.

    Rate this question:

  • 11. 

    Communications security (COMSEC) accountants should inspect all protective packaging for signs of tampering and report discrepancies in accordance with

    • A.

      Air Force System Security Instruction (AFSSI) 4201.

    • B.

      AFSSI 4202.

    • C.

      AFSSI 4211

    • D.

      AFSSI 4212.

    Correct Answer
    D. AFSSI 4212.
    Explanation
    COMSEC accountants are responsible for ensuring the security of communications systems. They are required to inspect all protective packaging for signs of tampering. If any discrepancies are found, they must report them. The correct answer, AFSSI 4212, is the Air Force System Security Instruction that provides guidance on the inspection of protective packaging and reporting any tampering.

    Rate this question:

  • 12. 

    The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following Air Force specialties except

    • A.

      Security forces

    • B.

      Information systems.

    • C.

      Information assurance (IA).

    • D.

      Base information infrastructures.

    Correct Answer
    A. Security forces
    Explanation
    The correct answer is security forces. The IAAP team consists of personnel experienced in all the mentioned Air Force specialties except security forces. This means that the team includes personnel with experience in information systems, information assurance (IA), and base information infrastructures. However, security forces is not one of the specialties represented in the IAAP team.

    Rate this question:

  • 13. 

    Air Force (AF) Form 4160 is used to assess all the following programs except

    • A.

      Communications security (COMSEC).

    • B.

      Operations security (OPSEC).

    • C.

      Emission security (EMSEC).

    • D.

      Information assurance (IA).

    Correct Answer
    B. Operations security (OPSEC).
    Explanation
    Air Force (AF) Form 4160 is used to assess programs related to communications security (COMSEC), emission security (EMSEC), and information assurance (IA). However, it is not used to assess programs related to operations security (OPSEC).

    Rate this question:

  • 14. 

    Who assesses local communications security (COMSEC) elements during “command” assessments?

    • A.

      Communications security account manager (CAM).

    • B.

      Major command (MAJCOM).

    • C.

      Squadron commander.

    • D.

      Security forces.

    Correct Answer
    B. Major command (MAJCOM).
    Explanation
    During "command" assessments, the local communications security (COMSEC) elements are assessed by the Major command (MAJCOM). This means that the responsibility of evaluating and ensuring the security of the communication systems within a specific command falls on the MAJCOM. They are responsible for overseeing and managing the COMSEC elements to ensure that they are in compliance with the necessary security protocols and standards.

    Rate this question:

  • 15. 

    Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?

    • A.

      Air Force Instruction (AFI) 33–201 volume 4.

    • B.

      Technical Order (TO) 00–20F–2.

    • C.

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D.

      AFKAG–2.

    Correct Answer
    B. Technical Order (TO) 00–20F–2.
    Explanation
    The correct answer is Technical Order (TO) 00–20F–2. This is because TO 00–20F–2 provides instructions and guidance on the inspection and repair of security containers or vaults used for storing communications security (COMSEC) material. It ensures that these containers or vaults meet the necessary safeguarding capabilities to protect the COMSEC material.

    Rate this question:

  • 16. 

    Qualified personnel perform preventative maintenance and security inspections on safes and vaults every

    • A.

      Two years for safes and vaults.

    • B.

      Five years for safes and vaults.

    • C.

      Two years for safes; every five years for vaults.

    • D.

      Five years for safes; every two years for vaults.

    Correct Answer
    D. Five years for safes; every two years for vaults.
  • 17. 

    In which type of safe must you store top secret (TS) keying material (KEYMAT)?

    • A.

      Class A.

    • B.

      Class B.

    • C.

      Class C.

    • D.

      Class D.

    Correct Answer
    A. Class A.
    Explanation
    Top secret (TS) keying material (KEYMAT) must be stored in a Class A safe. Class A safes are specifically designed to provide the highest level of protection for classified information and materials. These safes have the most stringent security measures and are capable of safeguarding sensitive information against unauthorized access, theft, and physical damage. Storing TS keying material in a Class A safe ensures that it is adequately protected and only accessible to authorized personnel with the appropriate clearance level.

    Rate this question:

  • 18. 

    Where should you account for keyed short-term devices?

    • A.

      Communications security physical inventory (CPI).

    • B.

      Electronic Key Management System (EKMS).

    • C.

      Standard Form (SF) 700, Security Container Information.

    • D.

      SF 702, Security Container Checklist.

    Correct Answer
    A. Communications security physical inventory (CPI).
    Explanation
    The correct answer is Communications security physical inventory (CPI). This is the appropriate place to account for keyed short-term devices. CPI is a process that ensures the proper control, accountability, and safeguarding of communications security (COMSEC) material, including short-term devices. It involves conducting regular inventories to verify the presence and condition of COMSEC material, including short-term devices, and maintaining accurate records of these inventories. By accounting for keyed short-term devices in CPI, organizations can effectively manage and protect their COMSEC material.

    Rate this question:

  • 19. 

    Which is considered a long-term communications security (COMSEC) key storage device?

    • A.

      KYK–13.

    • B.

      KYX–15.

    • C.

      Simple key loader (SKL).

    • D.

      Communications security physical inventory (CPI).

    Correct Answer
    C. Simple key loader (SKL).
    Explanation
    The Simple Key Loader (SKL) is considered a long-term communications security (COMSEC) key storage device. It is designed to securely store and manage cryptographic keys used in secure communication systems. The SKL allows authorized personnel to load, store, and distribute cryptographic keys to various communication devices, ensuring the confidentiality and integrity of sensitive information.

    Rate this question:

  • 20. 

    How long is a Standard Form (SF) 701, Activity Security Checklist retained?

    • A.

      Three months.

    • B.

      Six months.

    • C.

      One year.

    • D.

      Two years.

    Correct Answer
    A. Three months.
    Explanation
    A Standard Form (SF) 701, Activity Security Checklist is retained for three months. This means that after three months, the checklist is no longer considered valid or up to date. It is important to regularly update and review security checklists to ensure that all necessary security measures are in place and up to date. Retaining the checklist for three months allows for an appropriate timeframe to review and update security procedures as needed.

    Rate this question:

  • 21. 

    What items should never be stored in the same container with communications security (COMSEC) material?

    • A.

      High theft items.

    • B.

      Cryptographic maintenance manuals.

    • C.

      Unkeyed COMSEC equipment.

    • D.

      Cryptographic access program (CAP) documentation.

    Correct Answer
    A. High theft items.
    Explanation
    High theft items should never be stored in the same container with communications security (COMSEC) material. This is because high theft items may attract attention and increase the risk of theft or unauthorized access to the COMSEC material. Storing high theft items separately helps to ensure the security and confidentiality of the COMSEC material.

    Rate this question:

  • 22. 

    What form is used to document when a safe or vault is put into use?

    • A.

      Standard Form (SF) 701.

    • B.

      SF 702.

    • C.

      Air Force (AF) Form 1109.

    • D.

      Air Force technical order (AFTO) Form 36.

    Correct Answer
    D. Air Force technical order (AFTO) Form 36.
    Explanation
    Air Force technical order (AFTO) Form 36 is used to document when a safe or vault is put into use. This form is specific to the Air Force and is the correct form for recording such information. The other options, Standard Form (SF) 701, SF 702, and AF Form 1109, are not applicable for this purpose.

    Rate this question:

  • 23. 

    What form is used to record the arrival or departure of all personnel not named on the facility authorized access list?

    • A.

      Standard Form (SF) 701.

    • B.

      SF 702.

    • C.

      Air Force (AF) Form 1109.

    • D.

      Air Force technical order (AFTO) Form 36.

    Correct Answer
    C. Air Force (AF) Form 1109.
    Explanation
    Air Force (AF) Form 1109 is used to record the arrival or departure of all personnel not named on the facility authorized access list. This form is specifically designed for the Air Force and is used to maintain security and keep track of individuals entering or leaving a facility. The other options, Standard Form (SF) 701, SF 702, and Air Force technical order (AFTO) Form 36, are not specifically used for recording personnel arrivals or departures.

    Rate this question:

  • 24. 

    Who manages the cryptographic access program (CAP) database for Air Force Communications Security (AFCOMSEC) Form 9, cryptographic access certificates, account update lists, and polygraph tests?

    • A.

      Headquarters, Air Force Network Integration Center (HQ AFNIC)/EVP.

    • B.

      Communications security account manger (CAM).

    • C.

      CAP administrator.

    • D.

      Unit commander.

    Correct Answer
    A. Headquarters, Air Force Network Integration Center (HQ AFNIC)/EVP.
    Explanation
    The correct answer is Headquarters, Air Force Network Integration Center (HQ AFNIC)/EVP. This entity is responsible for managing the cryptographic access program (CAP) database for Air Force Communications Security (AFCOMSEC) Form 9, cryptographic access certificates, account update lists, and polygraph tests. They oversee the administration and maintenance of these important security measures within the Air Force.

    Rate this question:

  • 25. 

    Who identifies and grants cryptographic access in the commander’s name to personnel who require authorized access to classified cryptographic information?

    • A.

      Communications security responsible officer (CRO).

    • B.

      Cryptographic access program (CAP) administrator.

    • C.

      Communications security account manger (CAM).

    • D.

      Information assurance officer (IAO).

    Correct Answer
    B. Cryptographic access program (CAP) administrator.
    Explanation
    The CAP administrator is responsible for identifying and granting cryptographic access in the commander's name to personnel who need authorized access to classified cryptographic information. This role ensures that only authorized individuals have access to sensitive information and helps maintain the security of the communication system. The other options mentioned (CRO, CAM, IAO) may have different responsibilities related to communications security, but they are not specifically responsible for granting cryptographic access.

    Rate this question:

  • 26. 

    Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?

    • A.

      A final security clearance.

    • B.

      An interim security clearance.

    • C.

      A clearance equal to the COMSEC being accessed.

    • D.

      A clearance higher than the COMSEC being accessed.

    Correct Answer
    B. An interim security clearance.
    Explanation
    An interim security clearance is not valid for personnel on a communications security (COMSEC) access list because it is a temporary clearance that is granted while a full security clearance is being processed. It does not provide the same level of access and authorization as a final security clearance or a clearance equal to or higher than the COMSEC being accessed. Therefore, personnel with only an interim security clearance would not be authorized to access COMSEC materials.

    Rate this question:

  • 27. 

    How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?

    • A.

      Weekly.

    • B.

      Monthly.

    • C.

      Quarterly.

    • D.

      Annually.

    Correct Answer
    B. Monthly.
    Explanation
    Communications security (COMSEC) access lists should be reviewed for accuracy and annotated on a monthly basis. This ensures that any changes or updates to the access lists are promptly identified and implemented. Regular reviews help to maintain the integrity and effectiveness of the COMSEC measures in place, reducing the risk of unauthorized access or breaches. Quarterly or annual reviews may not be frequent enough to address any potential security vulnerabilities or changes in personnel or access requirements. Therefore, monthly reviews strike a balance between maintaining security and minimizing administrative burden.

    Rate this question:

  • 28. 

    Which paragraph of a communications security (COMSEC) access list contains the name, rank, and clearance of all individuals who have COMSEC responsibilities within the account?

    • A.

      First paragraph.

    • B.

      Second paragraph.

    • C.

      Third paragraph.

    • D.

      Fourth paragraph.

    Correct Answer
    A. First paragraph.
    Explanation
    The first paragraph of a communications security (COMSEC) access list contains the name, rank, and clearance of all individuals who have COMSEC responsibilities within the account. This paragraph serves as an introduction and provides a comprehensive list of the authorized personnel with access to COMSEC information.

    Rate this question:

  • 29. 

    Which publication provides further guidance on handling top secret (TS) or sensitive compartmented information (SCI) keys?

    • A.

      Air Force Instruction (AFI) 33–201, Volume 4.

    • B.

      Technical Order (TO) 00–20F–2.

    • C.

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D.

      AFKAG–2.

    Correct Answer
    C. Air Force Cryptologic Accounting Guide (AFKAG)–1.
    Explanation
    The Air Force Cryptologic Accounting Guide (AFKAG)–1 provides further guidance on handling top secret (TS) or sensitive compartmented information (SCI) keys.

    Rate this question:

  • 30. 

    Which form is used to list accountable communication security (COMSEC) material stored in a General Service Administration (GSA)-approved container and is annotated each time a COMSEC safe is opened?

    • A.

      Standard Form (SF) 153.

    • B.

      Air Force (AF) Form 1109.

    • C.

      AF Communications Security (AFCOMSEC) Form 9.

    • D.

      AFCOMSEC Form 16.

    Correct Answer
    D. AFCOMSEC Form 16.
    Explanation
    AFCOMSEC Form 16 is used to list accountable communication security (COMSEC) material stored in a General Service Administration (GSA)-approved container and is annotated each time a COMSEC safe is opened. This form helps to keep track of the material and ensure proper accountability and security measures are maintained.

    Rate this question:

  • 31. 

    What type of ink is used when marking the boxes on a communication security (COMSEC) inventory form?

    • A.

      Blue ink only.

    • B.

      Black ink only.

    • C.

      Blue or black ink only.

    • D.

      There are no restrictions as long as the inventory is properly marked.

    Correct Answer
    B. Black ink only.
    Explanation
    The correct answer is "Black ink only" because when marking the boxes on a communication security (COMSEC) inventory form, it is specified that only black ink should be used. This restriction ensures consistency and legibility of the inventory form, as well as prevents any confusion or misinterpretation that may arise from using different colored inks.

    Rate this question:

  • 32. 

    When you create a communication security physical inventory (CPI), you will need to include all of the following information except

    • A.

      Accounting legend code (ALC).

    • B.

      Edition.

    • C.

      Quantity.

    • D.

      Short title.

    Correct Answer
    A. Accounting legend code (ALC).
    Explanation
    When creating a communication security physical inventory (CPI), it is important to include information such as edition, quantity, and short title. However, the accounting legend code (ALC) is not necessary for this inventory. The ALC is typically used for financial purposes and is not relevant to the physical inventory process.

    Rate this question:

  • 33. 

    Within how many working days after receipt of a sealed package must you process it?

    • A.

      One day.

    • B.

      Three days.

    • C.

      Ten days.

    • D.

      Fifteen days.

    Correct Answer
    B. Three days.
    Explanation
    The correct answer is three days. This means that after receiving a sealed package, you are required to process it within three working days. This timeframe allows for efficient handling and ensures that the package is dealt with in a timely manner. It is important to adhere to this deadline to maintain productivity and meet any necessary deadlines associated with the package.

    Rate this question:

  • 34. 

    How often must a communications security account manager (CAM) review the communications security (COMSEC) physical inventory?

    • A.

      Once a month.

    • B.

      Every three months.

    • C.

      Every six months.

    • D.

      Every twelve months.

    Correct Answer
    A. Once a month.
    Explanation
    A communications security account manager (CAM) must review the communications security (COMSEC) physical inventory once a month to ensure the security and integrity of the communication systems. This regular review allows for timely identification of any discrepancies or unauthorized access to the COMSEC equipment, ensuring that any issues can be addressed promptly. By conducting monthly reviews, the CAM can maintain a high level of security and minimize the risk of potential breaches or compromises in the communication systems.

    Rate this question:

  • 35. 

    Changes that must be made to material in communication security (COMSEC) publications are called

    • A.

      Modifications.

    • B.

      Amendments.

    • C.

      Corrections.

    • D.

      Updates.

    Correct Answer
    B. Amendments.
    Explanation
    Amendments refer to changes that must be made to material in communication security publications. They are modifications or corrections to the existing content in order to update or improve it.

    Rate this question:

  • 36. 

    How many people are required to complete page replacements in unclassified communication security (COMSEC) publications?

    • A.

      One

    • B.

      Two

    • C.

      Three

    • D.

      Four

    Correct Answer
    A. One
    Explanation
    Only one person is required to complete page replacements in unclassified communication security (COMSEC) publications. This suggests that the task can be handled by a single individual, indicating that it does not require a team or multiple people to complete the task.

    Rate this question:

  • 37. 

    Who requests disposition instructions for communications security (COMSEC) material?

    • A.

      Unit commander.

    • B.

      COMSEC material user.

    • C.

      Communications security account manger (CAM).

    • D.

      Cryptographic access program (CAP) administrator.

    Correct Answer
    C. Communications security account manger (CAM).
    Explanation
    A Communications Security Account Manager (CAM) is responsible for requesting disposition instructions for Communications Security (COMSEC) material. This role involves managing and maintaining the inventory of COMSEC material, ensuring its proper use and handling, and coordinating with higher-level authorities for the proper disposal or transfer of the material when necessary. The CAM acts as a liaison between the unit commander, COMSEC material users, and other relevant parties to ensure the security and proper management of COMSEC material.

    Rate this question:

  • 38. 

    Who may destroy communications security (COMSEC) material?

    • A.

      Communications security account manager (CAM), communications security responsible officer (CRO), and any responsible person on the access list.

    • B.

      CAM and any responsible person on access list only.

    • C.

      CAM only.

    • D.

      CRO only.

    Correct Answer
    A. Communications security account manager (CAM), communications security responsible officer (CRO), and any responsible person on the access list.
    Explanation
    The correct answer is Communications security account manager (CAM), communications security responsible officer (CRO), and any responsible person on the access list. This means that the individuals mentioned in the answer have the authority to destroy communications security (COMSEC) material.

    Rate this question:

  • 39. 

    Except under special circumstances, destroy communication security (COMSEC) keying material (KEYMAT) designated Crypto as soon as possible but no later than how many hours after supersession?

    • A.

      Eight.

    • B.

      Twelve.

    • C.

      Twenty-four.

    • D.

      Forty-eight.

    Correct Answer
    B. Twelve.
    Explanation
    The correct answer is Twelve. Under normal circumstances, communication security (COMSEC) keying material (KEYMAT) designated Crypto should be destroyed as soon as possible but no later than twelve hours after supersession. This ensures that the old key material is no longer accessible and reduces the risk of unauthorized access or decryption of sensitive information.

    Rate this question:

  • 40. 

    The only authorized methods for routinely destroying paper communications security (COMSEC) aids are by any of the following methods except

    • A.

      Disintegrating.

    • B.

      Pulverizing.

    • C.

      Burning.

    • D.

      Pulping.

    Correct Answer
    A. Disintegrating.
    Explanation
    The correct answer is disintegrating. This means that disintegrating is not an authorized method for routinely destroying paper communications security (COMSEC) aids. The other three methods mentioned - pulverizing, burning, and pulping - are all authorized methods for routine destruction.

    Rate this question:

  • 41. 

    What form serves as the destruction certificate for communication security (COMSEC) material?

    • A.

      Standard Form (SF) 153.

    • B.

      Air Force (AF) Form 1109.

    • C.

      Air Force Communications Security (AFCOMSEC) Form 9.

    • D.

      AFCOMSEC Form 16.

    Correct Answer
    A. Standard Form (SF) 153.
    Explanation
    The correct answer is Standard Form (SF) 153. This form serves as the destruction certificate for communication security (COMSEC) material.

    Rate this question:

  • 42. 

    The communication security (COMSEC) material destruction record will be signed

    • A.

      Immediately after the material is destroyed.

    • B.

      Immediately before the material is destroyed.

    • C.

      Within 12 hours after the material is destroyed.

    • D.

      Within 12 hours before the material is destroyed.

    Correct Answer
    A. Immediately after the material is destroyed.
    Explanation
    The correct answer is "immediately after the material is destroyed." This means that the communication security (COMSEC) material destruction record should be signed right after the material has been destroyed. This ensures that the record accurately reflects the destruction and prevents any potential tampering or alteration of the record. Signing the record immediately after the destruction also helps maintain accountability and provides a clear timeline of when the destruction took place.

    Rate this question:

  • 43. 

    What is the classification of the Standard Form (SF) 153 when the disposition record card (DRC) is attached?

    • A.

      Top Secret (TS).

    • B.

      Secret.

    • C.

      Confidential.

    • D.

      Unclassified.

    Correct Answer
    C. Confidential.
    Explanation
    When the disposition record card (DRC) is attached to the Standard Form (SF) 153, the classification is Confidential. This means that the information contained in the SF 153, along with the attached DRC, is considered confidential and should only be accessed by individuals with the appropriate clearance level.

    Rate this question:

  • 44. 

    What provides the special protection of top secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening?

    • A.

      Two-person control (TPC).

    • B.

      Two-person integrity (TPI).

    • C.

      Cryptographic access program (CAP).

    • D.

      Communications security management system (CMS).

    Correct Answer
    B. Two-person integrity (TPI).
    Explanation
    Two-person integrity (TPI) provides the special protection of top secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening. TPI ensures that two authorized individuals are present and actively involved in the handling, storage, and transportation of sensitive materials, reducing the risk of unauthorized access or tampering. This system increases accountability and minimizes the potential for insider threats or mistakes that could compromise the security of the material.

    Rate this question:

  • 45. 

    What situation is not an authorized exception to two-person integrity (TPI) requirements?

    • A.

      Unopened packages received from or in the custody of the Defense Courier Service (DCS).

    • B.

      Unopened National Security Agency (NSA) protective packaged material.

    • C.

      Communication security (COMSEC) material used in tactical situations.

    • D.

      COMSEC material handled in minimum manning situations.

    Correct Answer
    D. COMSEC material handled in minimum manning situations.
  • 46. 

    How many people must unwrap the inner wrapper of a top secret (TS) crypto package?

    • A.

      One

    • B.

      Two

    • C.

      Three

    • D.

      Four

    Correct Answer
    B. Two
    Explanation
    Two people must unwrap the inner wrapper of a top secret (TS) crypto package. This suggests that there are multiple layers of wrapping or security measures in place for the package. Having two people involved in the unwrapping process ensures that there is an added level of security and accountability. It also minimizes the risk of any one person gaining unauthorized access to the contents of the package.

    Rate this question:

  • 47. 

    When transporting bulky communication security (COMSEC) material through airlines, you may leave COMSEC material unattended

    • A.

      Under no circumstances.

    • B.

      When it is in a baggage area.

    • C.

      When it is loaded on a cargo dock.

    • D.

      When it is passed on to authorized airport personnel.

    Correct Answer
    A. Under no circumstances.
    Explanation
    COMSEC material is highly sensitive and should never be left unattended, regardless of the circumstances. This is to ensure the security and protection of the material from unauthorized access or theft. Leaving it unattended in any situation, whether it is in a baggage area, on a cargo dock, or with authorized airport personnel, poses a risk to the confidentiality and integrity of the material. Therefore, under no circumstances should COMSEC material be left unattended.

    Rate this question:

  • 48. 

    What guidance provides the requirements for transporting classified information?

    • A.

      Air Force Instruction (AFI) 33–401.

    • B.

      Technical Order (TO) 00–20F–2.

    • C.

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D.

      AFKAG–2.

    Correct Answer
    A. Air Force Instruction (AFI) 33–401.
    Explanation
    Air Force Instruction (AFI) 33–401 is the correct answer because it provides the requirements for transporting classified information. It is a directive issued by the Air Force that outlines the specific guidelines and procedures for handling and transporting classified information within the organization. This instruction ensures that classified information is properly protected and safeguarded during transportation to prevent unauthorized access or disclosure.

    Rate this question:

  • 49. 

    When transporting communication security (COMSEC), major command (MAJCOM) approval is required when traveling via

    • A.

      Commercial airlines.

    • B.

      All types of airlines.

    • C.

      Non-US flag airlines.

    • D.

      US flag or chartered airlines.

    Correct Answer
    C. Non-US flag airlines.
    Explanation
    When transporting communication security (COMSEC), major command (MAJCOM) approval is required when traveling via non-US flag airlines. This means that if the communication security is being transported on a flight operated by an airline that is not registered in the United States, MAJCOM approval is necessary. This is likely because non-US flag airlines may have different security protocols and regulations compared to US flag airlines, and therefore require additional approval to ensure the safe transportation of COMSEC.

    Rate this question:

  • 50. 

    Which method is not used to complete a bulk encrypted transaction (BET)?

    • A.

      X.400.

    • B.

      Floppy disk.

    • C.

      Direct communications.

    • D.

      Defense Courier Service (DCS).

    Correct Answer
    D. Defense Courier Service (DCS).
    Explanation
    The Defense Courier Service (DCS) is not used to complete a bulk encrypted transaction (BET). DCS is a physical courier service that is used for the secure transport of sensitive and classified materials, documents, and equipment. It is not a method or technology used for encrypting or transmitting data electronically. Therefore, it is not applicable to completing a bulk encrypted transaction.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 28, 2013
    Quiz Created by
    Rediculous
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.