CDC 3D053 : Trivia Questions Quiz On Cyber Surety!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By CommV1
C
CommV1
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,095
Questions: 52 | Attempts: 207

SettingsSettingsSettings
CDC 3D053 : Trivia Questions Quiz On Cyber Surety! - Quiz

This is a set of CDC 3D053 trivia Questions on Cyber Surety. In the world today a lot of the communication takes place over the internet or computer thus are susceptible to distortion. In the course we got how to safeguard air force information from that. Take this test and see how well you understood the course. All the best!


Questions and Answers
  • 1. 

    Which communications security (COMSEC) tier generates, distributes, and performs account functions of all modern key, physical traditional key, and certain electronic key?

    • A.

      Zero

    • B.

      One

    • C.

      Two

    • D.

      Three

    Correct Answer
    A. Zero
    Explanation
    Zero is the correct answer because the question is asking about the communications security (COMSEC) tier that handles the generation, distribution, and account functions of all modern key, physical traditional key, and certain electronic key. Zero is the highest tier in COMSEC and is responsible for managing and securing the most sensitive communications.

    Rate this question:

  • 2. 

    What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked "CRYPTO" is distributed, controlled and safeguarded?

    • A.

      Electronic key management system (EKMS)

    • B.

      Communication security material control system (CMCS)

    • C.

      Standard base supply systems (SBSS)

    • D.

      Cryptologic system group (CPSG)

    Correct Answer
    B. Communication security material control system (CMCS)
    Explanation
    The correct answer is Communication security material control system (CMCS). This system is specifically designed for the distribution, control, and safeguarding of communications security (COMSEC) material that is marked as "CRYPTO." It ensures that the material is properly managed and protected to maintain the security of communications.

    Rate this question:

  • 3. 

    All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except

    • A.

      Being a U.S. citizen

    • B.

      Meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)-1

    • C.

      Possessing a security clearance commensurate for type of material in account

    • D.

      Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee

    Correct Answer
    D. Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee
    Explanation
    To be a communications security account manager (CAM) without a waiver, the individual must meet the following requirements: being a U.S. citizen, meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)-1, and possessing a security clearance commensurate for the type of material in the account. The answer choice "being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee" is not a requirement to be a CAM without a waiver.

    Rate this question:

  • 4. 

    Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform, users?

    • A.

      Federal Aviation Administration (FAA)

    • B.

      Cryptologic Systems Group (CPSG)

    • C.

      Nation Security Agency (NSA)

    • D.

      Major Command (MAJCOM)

    Correct Answer
    C. Nation Security Agency (NSA)
    Explanation
    The Nation Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform, users.

    Rate this question:

  • 5. 

    To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to 

    • A.

      AFI 33-201, volume 4

    • B.

      TO 00-20F-2

    • C.

      AFKAG-1

    • D.

      AFKAG-2

    Correct Answer
    D. AFKAG-2
    Explanation
    To determine the appropriate actions to take during the absence of the communications security account manager (CAM), one should refer to AFKAG-2. This document likely contains guidelines or procedures specifically related to the responsibilities and duties of the CAM, as well as instructions on how to handle situations when the CAM is not available. By referring to AFKAG-2, individuals can ensure that they are following the correct protocols and taking the necessary actions in the absence of the CAM.

    Rate this question:

  • 6. 

    Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow?

    • A.

      Air Force Cryptologic Accouting Guide (AFKAG)-1

    • B.

      AFKAG-2

    • C.

      AFKAG-3

    • D.

      AFKAG-4

    Correct Answer
    B. AFKAG-2
    Explanation
    AFKAG-2 is the correct answer because it is a COMSEC publication that provides step-by-step procedures for COMSEC personnel to follow. The other options, AFKAG-1, AFKAG-3, and AFKAG-4, do not specifically mention providing step-by-step procedures for COMSEC personnel.

    Rate this question:

  • 7. 

    Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with 

    • A.

      AFSSI 4201

    • B.

      AFSSI 4202

    • C.

      AFSSI 4211

    • D.

      AFSSI 4212

    Correct Answer
    D. AFSSI 4212
    Explanation
    Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with AFSSI 4212. This means that they should carefully examine the packaging of communication equipment or materials to ensure that it has not been tampered with or compromised in any way. If any signs of tampering are found, they should immediately report it according to the procedures outlined in AFSSI 4212. This ensures that any potential security breaches or compromises are quickly identified and addressed.

    Rate this question:

  • 8. 

    The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following  Air Force specialties except

    • A.

      Security forces

    • B.

      Information systems

    • C.

      Information assurance

    • D.

      Base information infrastructures

    Correct Answer
    A. Security forces
    Explanation
    The IAAP team consists of personnel experienced in all the Air Force specialties except security forces. This means that the team includes personnel experienced in information systems, information assurance, and base information infrastructures. However, security forces personnel are not part of the IAAP team.

    Rate this question:

  • 9. 

    Who assesses local communications security (COMSEC) elements during "command" assessments?

    • A.

      Communications Security Account Manager (CAM)

    • B.

      Squadron commander

    • C.

      Security Forces

    • D.

      MAJCOM

    Correct Answer
    D. MAJCOM
    Explanation
    MAJCOM stands for Major Command, which is a level of command in the United States Air Force. During "command" assessments, it is the responsibility of the MAJCOM to assess local communications security (COMSEC) elements. The MAJCOM is responsible for overseeing and managing the operations of subordinate units within their command, including assessing and ensuring the security of communications.

    Rate this question:

  • 10. 

    Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?

    • A.

      AFI 33-201 volume 4

    • B.

      TO 00-20F-2

    • C.

      Air Force Cryptologic Accounting Guide (AFKAG)-1

    • D.

      AFKAG-2

    Correct Answer
    B. TO 00-20F-2
    Explanation
    The correct answer is TO 00-20F-2. This publication provides guidelines and instructions for the inspection and safeguarding of communications security (COMSEC) material. It specifically addresses the use of drilled and repaired security containers or vaults for storing COMSEC material after they have been inspected for their safeguarding capabilities. AFI 33-201 volume 4, Air Force Cryptologic Accounting Guide (AFKAG)-1, and AFKAG-2 do not provide specific guidance on the inspection and storage of COMSEC material in drilled and repaired security containers or vaults.

    Rate this question:

  • 11. 

    Which of the following are considered long term communications security (COMSEC) key storage devices?

    • A.

      KYK-13

    • B.

      KYX-15

    • C.

      Simple key loader (SKL)

    • D.

      Communications security physical inventory (CPI)

    Correct Answer
    C. Simple key loader (SKL)
    Explanation
    The Simple Key Loader (SKL) is considered a long-term Communications Security (COMSEC) key storage device. The SKL is a portable electronic device used to load cryptographic keys into various communication equipment and systems. It securely stores and manages cryptographic keys, allowing for the secure transmission of sensitive information. It is designed to provide long-term storage of keys and is widely used by military and government organizations to ensure the confidentiality and integrity of their communications. The other options listed, KYK-13, KYX-15, and Communications Security Physical Inventory (CPI), are not specifically designed for long-term key storage.

    Rate this question:

  • 12. 

    What items should never be stored in the same container with COMSEC material?

    • A.

      High theft items

    • B.

      Cryptographic maintenance manuals

    • C.

      Unkeyed classified COMSEC equipment

    • D.

      Cryptographic access program (CAP) documentation

    Correct Answer
    A. High theft items
    Explanation
    High theft items should never be stored in the same container with COMSEC material because it poses a security risk. COMSEC material refers to sensitive information and equipment used for secure communication, while high theft items are items that are prone to being stolen. Storing these items together increases the chances of unauthorized access and compromise of the COMSEC material. Keeping them separate helps to maintain the confidentiality and integrity of the COMSEC material.

    Rate this question:

  • 13. 

    What form is used to record the arrival or departure of all personnel not​ named on the facility authorized access list?

    • A.

      Standard Form 701

    • B.

      Standard Form 702

    • C.

      Air Force Form 1109

    • D.

      Air Force Technical Order Form 36

    Correct Answer
    C. Air Force Form 1109
    Explanation
    Air Force Form 1109 is used to record the arrival or departure of all personnel not named on the facility authorized access list. This form is specific to the Air Force and is likely used to maintain security and track individuals who are not authorized to access the facility. Standard Form 701 and Standard Form 702 may be used for other purposes, while Air Force Technical Order Form 36 is not mentioned in relation to recording personnel arrivals or departures.

    Rate this question:

  • 14. 

    Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through

    • A.

      Two-person integrity (TPI)

    • B.

      The communications security physical inventory (CPI)

    • C.

      The communications security management system (CMS)

    • D.

      The certification authority workstation (CAW)

    Correct Answer
    C. The communications security management system (CMS)
  • 15. 

    Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?

    • A.

      Air Force Network Integration Center (AFNIC)/EVPI

    • B.

      Unit Commander

    • C.

      CAP administrator

    • D.

      Communications security account manger (CAM)

    Correct Answer
    A. Air Force Network Integration Center (AFNIC)/EVPI
    Explanation
    The Air Force Network Integration Center (AFNIC)/EVPI manages the cryptographic access program (CAP) database, AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests. They are responsible for maintaining and updating these records and ensuring the security of cryptographic access within the Air Force.

    Rate this question:

  • 16. 

    What cryptographic access program (CAP) withdrawal method is used for personnel who are reassigned to another base or unit or to positions that do not â€‹require cryptographic access?

    • A.

      Administrative withdrawal

    • B.

      Suspension

    • C.

      Termination

    • D.

      Revocation

    Correct Answer
    A. Administrative withdrawal
    Explanation
    Administrative withdrawal is the cryptographic access program (CAP) withdrawal method used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access. This method involves removing the individual's access privileges and credentials from the system, effectively withdrawing their cryptographic access rights. It is a standard procedure to ensure that only authorized personnel have access to sensitive information and resources.

    Rate this question:

  • 17. 

    How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?

    • A.

      Weekly

    • B.

      Monthly

    • C.

      Quarterly

    • D.

      Annually

    Correct Answer
    B. Monthly
    Explanation
    Communications security (COMSEC) access lists should be reviewed for accuracy and annotated on a monthly basis. This frequency allows for regular monitoring and updating of the access lists to ensure that only authorized individuals have access to sensitive information. Reviewing the lists monthly also helps in identifying any potential security breaches or unauthorized access attempts in a timely manner, allowing for prompt action to mitigate any risks. Quarterly or annual reviews may not be frequent enough to address changes in personnel or security requirements, while weekly reviews may be too frequent and time-consuming for larger organizations.

    Rate this question:

  • 18. 

    Which type of security clearance is not valid for personnel on a communications security (COMSEC) access-list?

    • A.

      A final security clearance

    • B.

      An interim security clearance

    • C.

      A clearance equal to the COMSEC being accessed

    • D.

      A clearance higher than the COMSEC being accessed

    Correct Answer
    B. An interim security clearance
    Explanation
    An interim security clearance is not valid for personnel on a communications security (COMSEC) access-list because it is only a temporary clearance granted while a full background investigation is being conducted. It is not equivalent to a final security clearance or a clearance equal to or higher than the COMSEC being accessed. Therefore, personnel with an interim security clearance should not have access to COMSEC materials until their full clearance is granted.

    Rate this question:

  • 19. 

    When classified material is not stored in a General Service Administration (GSA)-Approved container, the facility containing the classified material must be constructed according to the requirements in DOD 5200.1R MIL HDBK 1013/1A and

    • A.

      Air Force Instruction (AFI)33-201, Volume 4

    • B.

      Technical Order (TO) 00-20F-2

    • C.

      Air Force Cryptologic Accounting Guide (AFKAG)-1

    • D.

      AFKAG-2

    Correct Answer
    C. Air Force Cryptologic Accounting Guide (AFKAG)-1
  • 20. 

    When removing material from a communication security physical inventory (CPI), always

    • A.

      Use red ink

    • B.

      Use green ink

    • C.

      Write an MFR

    • D.

      Use correction fluid

    Correct Answer
    C. Write an MFR
    Explanation
    When removing material from a communication security physical inventory (CPI), it is necessary to write an MFR (Memorandum for Record). This is because an MFR serves as a formal documentation of the removal, providing a record of the action taken. It helps in maintaining accountability and transparency in the inventory management process. Using red or green ink or correction fluid may not provide the necessary documentation or may not be considered as an official record of the removal.

    Rate this question:

  • 21. 

    The communication security physical inventory (CPI) will include all of the following â€‹except

    • A.

      Accounting legend code (ALC)

    • B.

      Edition

    • C.

      Quantity

    • D.

      Short title

    Correct Answer
    A. Accounting legend code (ALC)
    Explanation
    The communication security physical inventory (CPI) is a process that involves counting and documenting all communication security equipment and materials. It helps ensure that all items are properly accounted for and accounted for accurately. The CPI includes items such as editions, quantities, and short titles of communication security materials. However, the accounting legend code (ALC) is not included in the CPI. The ALC is a code used to classify and categorize financial transactions, and it is not directly related to the physical inventory of communication security materials.

    Rate this question:

  • 22. 

    How long should a communication security (COMSEC) inventory form be retained?

    • A.

      Current month only

    • B.

      Past six months only

    • C.

      Past six months plus the current month

    • D.

      Based upon local guidance at each installation

    Correct Answer
    C. Past six months plus the current month
    Explanation
    The correct answer is "Past six months plus the current month." This means that a communication security (COMSEC) inventory form should be retained for a period of six months, including the current month. This ensures that there is a record of the inventory for a sufficient amount of time to track any changes or discrepancies. Retaining the form for this duration allows for proper monitoring and accountability of communication security measures.

    Rate this question:

  • 23. 

    Changes that must be made to material in communication security (COMSEC) publications are called

    • A.

      Modifications

    • B.

      Amendments

    • C.

      Corrections

    • D.

      Updates

    Correct Answer
    B. Amendments
    Explanation
    In the context of communication security (COMSEC) publications, changes made to the material are referred to as amendments. Amendments are typically made to update or modify the existing information in the publications to ensure accuracy and effectiveness. Corrections may refer to fixing errors, but amendments encompass a broader scope of changes. Updates may also imply changes, but amendments specifically indicate modifications made to the material in COMSEC publications.

    Rate this question:

  • 24. 

    Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession?

    • A.

      Eight

    • B.

      Twelve

    • C.

      Twenty-four

    • D.

      Forty-eight

    Correct Answer
    B. Twelve
    Explanation
    Under normal circumstances, communication security (COMSEC) keying material designated CRYPTO should be destroyed as soon as possible after supersession. However, it must be destroyed no later than twelve hours after supersession. This ensures that the old keying material is not compromised or used for unauthorized access to sensitive information.

    Rate this question:

  • 25. 

    The only authorized methods to destroy key tapes are by of the following methods â€‹except

    • A.

      Disintegrating

    • B.

      Pulverizing

    • C.

      Shredding

    • D.

      Burning

    Correct Answer
    C. Shredding
    Explanation
    The question asks for the method that is not authorized to destroy key tapes. The given options include disintegrating, pulverizing, shredding, and burning. Among these options, shredding is the correct answer because it is the only method that is not authorized to destroy key tapes. The other three methods, disintegrating, pulverizing, and burning, are authorized methods for destroying key tapes.

    Rate this question:

  • 26. 

    Sign the communication security (COMSEC) material destruction record

    • A.

      Immediately after material is destroyed

    • B.

      Immediately before the material is destroyed

    • C.

      Within 12 hours after the material is destroyed

    • D.

      Within 12 hours before the material is detroyed

    Correct Answer
    A. Immediately after material is destroyed
    Explanation
    The correct answer is to sign the communication security (COMSEC) material destruction record immediately after the material is destroyed. This ensures that there is a clear and timely record of the destruction process. Signing the record after the destruction prevents any potential errors or discrepancies in the documentation. It also helps to maintain accountability and traceability for the destroyed material.

    Rate this question:

  • 27. 

    As part of a two-person control (TCP) team, you must be designated to handle communication security (COMSEC) material under the

    • A.

      Personnel reliability program (PRP)

    • B.

      Sealed authenticator systems (SAS)

    • C.

      Permissive action link (PAL)

    • D.

      Coded switch system (CSS)

    Correct Answer
    A. Personnel reliability program (PRP)
    Explanation
    The correct answer is personnel reliability program (PRP). The personnel reliability program (PRP) is a program that ensures the trustworthiness and reliability of individuals who have access to sensitive information and materials, such as communication security (COMSEC) material. It involves a thorough screening process, ongoing monitoring, and regular training to ensure that individuals designated to handle COMSEC material are trustworthy and can effectively protect and secure it. The PRP is an essential component of maintaining communication security and preventing unauthorized access or compromise of sensitive information.

    Rate this question:

  • 28. 

    An area, room, or space which, when attended, must be occupied by two or more appropriately clear individuals who remain within sight of each other is called a communication security (COMSEC) 

    • A.

      Two-person integrity (TPI) zone

    • B.

      Two-person control (TPC)zone

    • C.

      No-lone zone

    • D.

      Controlled area

    Correct Answer
    C. No-lone zone
    Explanation
    A "no-lone zone" is an area, room, or space that requires two or more individuals to be present at all times and remain within sight of each other. This is done to ensure communication security (COMSEC) and prevent any unauthorized access or tampering. By having multiple individuals present, the risk of security breaches or compromises is minimized, as there is always someone to monitor and verify activities within the zone. The term "no-lone zone" emphasizes the importance of avoiding solitary presence in order to maintain a secure environment.

    Rate this question:

  • 29. 

    What situation is â€‹not an authorized exception to two-person integrity (TPI) requirements?

    • A.

      Unopened National Security Agency (NSA) protective package material

    • B.

      Communication security (COMSEC) material used in tactical situations

    • C.

      COMSEC material handled in minimum manning situations

    • D.

      Unopened packages received from or in the custody of the Defense Courier Division (DCD)

    Correct Answer
    C. COMSEC material handled in minimum manning situations
    Explanation
    Two-person integrity (TPI) requirements are in place to ensure the security and accountability of sensitive materials. This means that certain situations may require two authorized individuals to be present when handling such materials. The other options listed in the question all involve scenarios where additional security measures are in place. However, COMSEC material handled in minimum manning situations does not meet the TPI requirements as it involves a reduced number of personnel, which increases the risk of unauthorized access or mishandling of the sensitive material.

    Rate this question:

  • 30. 

    Which of the following is not an authorized official who may designate in writing individuals selected to perform courier duty?

    • A.

      Supervisor

    • B.

      Unit Commander

    • C.

      Security manager

    • D.

      Communications security account manager (CAM)

    Correct Answer
    D. Communications security account manager (CAM)
    Explanation
    The Communications Security Account Manager (CAM) is not an authorized official who may designate individuals selected to perform courier duty. The supervisor, unit commander, and security manager have the authority to designate individuals for courier duty. However, the CAM is responsible for managing communications security accounts and ensuring compliance with security protocols, but they do not have the authority to designate individuals for courier duty.

    Rate this question:

  • 31. 

    When transproting bulky communication security (COMSEC) material through arilines, you may leave COMSEC material unattended

    • A.

      Under no circumstances

    • B.

      When it is in a baggage area

    • C.

      When it is loaded on a cargo dock

    • D.

      When it is passed on to authorized airport personnel

    Correct Answer
    A. Under no circumstances
    Explanation
    It is important to never leave COMSEC material unattended under any circumstances. This means that whether it is in a baggage area, loaded on a cargo dock, or passed on to authorized airport personnel, it should always be supervised and not left alone. This is necessary to ensure the security and integrity of the communication systems and to prevent unauthorized access or tampering. Leaving COMSEC material unattended can pose a significant risk to national security and compromise sensitive information.

    Rate this question:

  • 32. 

    When transporting communication security (COMSEC), MAJCOM approval is required when traveling 

    • A.

      Via commercial airlines

    • B.

      Via all types of airlines

    • C.

      Via non-U.S. flag airlines

    • D.

      Via U.S. flag or chartered airlines

    Correct Answer
    C. Via non-U.S. flag airlines
    Explanation
    MAJCOM approval is required when transporting communication security (COMSEC) via non-U.S. flag airlines because these airlines are not operated by the United States and may not have the same level of security measures in place as U.S. flag or chartered airlines. This ensures that the sensitive COMSEC information is protected during transit and reduces the risk of it falling into the wrong hands.

    Rate this question:

  • 33. 

    What term is used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards?

    • A.

      COMSEC incident

    • B.

      COMSEC deviation

    • C.

      COMSEC insecurity

    • D.

      Practice dangerous to security (PDS)

    Correct Answer
    B. COMSEC deviation
    Explanation
    A COMSEC deviation refers to a communication security (COMSEC) security lapse that happens when individuals do not comply with the established instructions, procedures, or standards of COMSEC. It implies that there has been a departure from the prescribed protocols, which can potentially compromise the security of communication.

    Rate this question:

  • 34. 

    What term is used to describe a communication security  (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue? 

    • A.

      COMSEC incident

    • B.

      COMSEC deviation

    • C.

      COMSEC insecurity

    • D.

      Practice dangerous to security (PDS)

    Correct Answer
    D. Practice dangerous to security (PDS)
    Explanation
    Practice dangerous to security (PDS) is the term used to describe a communication security (COMSEC) security lapse that has the potential to jeopardize the security of COMSEC material if it is allowed to continue. This term is used to highlight the seriousness of the situation and the need for immediate action to prevent any further compromise of COMSEC material. It signifies that certain practices or behaviors are posing a significant risk to the security of communication systems and must be addressed promptly.

    Rate this question:

  • 35. 

    What office assigns a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy?

    • A.

      TOBYHANNA/CA5B1099

    • B.

      HQ CPSG/CA6166600

    • C.

      HQ AFNIC/EVIC

    • D.

      DIRNSA/I5113

    Correct Answer
    C. HQ AFNIC/EVIC
    Explanation
    HQ AFNIC/EVIC is the correct answer because AFNIC stands for Air Force Network Integration Center, which is responsible for managing and securing the Air Force's communication networks. EVIC stands for Electronic Video Imagery Center, which suggests that this office is involved in handling and tracking communication security material. Therefore, it is likely that HQ AFNIC/EVIC would be the office that assigns a tracking number to any reported COMSEC material receipt reporting discrepancy.

    Rate this question:

  • 36. 

    Guidance for processing COMSEC material receipt reporting discrepancies can be found in 

    • A.

      ASSI 4201 and AFKAG-1

    • B.

      ASSI 4202 and AFKAG-1

    • C.

      ASSI 4211 and AFKAG-2

    • D.

      ASSI 4212 and AFKAG-2

    Correct Answer
    D. ASSI 4212 and AFKAG-2
    Explanation
    The correct answer is ASSI 4212 and AFKAG-2. This is because the question is asking for the guidance for processing COMSEC material receipt reporting discrepancies, and the correct answer provides the specific references (ASSI 4212 and AFKAG-2) where this guidance can be found.

    Rate this question:

  • 37. 

    Which situation does not â€‹describe a communication security (COMSEC) cryptographic incident? 

    • A.

      Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT)

    • B.

      Using keying material that is compromised, superseded, defective, or misused

    • C.

      Using keying material that was produced without National Security Agency (NSA) authorization

    • D.

      Using equipment with defective logic circuitry

    Correct Answer
    A. Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT)
    Explanation
    Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT) is a procedure related to the proper handling of cryptographic key material, not a communication security (COMSEC) cryptographic incident. A COMSEC cryptographic incident refers to situations where there is a compromise or misuse of keying material, or the use of unauthorized keying material or equipment with defective logic circuitry.

    Rate this question:

  • 38. 

    As a mininum, to what classification should you mark a communication security (COMSEC) incident report when the report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised?

    • A.

      SECRET

    • B.

      TOP SECRET

    • C.

      CONFIDENTIAL

    • D.

      For Official Use Only

    Correct Answer
    C. CONFIDENTIAL
    Explanation
    When a communication security (COMSEC) incident report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised, it should be marked as CONFIDENTIAL. This classification ensures that the information is protected and only accessible to individuals with the appropriate clearance level.

    Rate this question:

  • 39. 

    final communication security (COMSEC) incident report must be submitted no later then how many days after the initial report?

    • A.

      5 days

    • B.

      10 days

    • C.

      30 days

    • D.

      60 days

    Correct Answer
    D. 60 days
    Explanation
    A final communication security (COMSEC) incident report must be submitted no later than 60 days after the initial report because it allows for a thorough investigation and analysis of the incident. This timeframe ensures that all relevant information is gathered and evaluated before a final report is submitted. It also allows for any necessary actions or measures to be taken to prevent similar incidents in the future.

    Rate this question:

  • 40. 

    What local communications security managemet software (LCMS) desktop function provides a user with the ablility to securely pass information and/or transfer electronic key management system (EKMS) messages/keys directley to other EKMS accounts?

    • A.

      X.400

    • B.

      X.500

    • C.

      Message

    • D.

      Direct Comms.

    Correct Answer
    D. Direct Comms.
    Explanation
    Direct Comms is the correct answer because it refers to a local communications security management software (LCMS) desktop function that allows users to securely pass information and transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts. This function ensures secure communication and transfer of sensitive information within the LCMS system.

    Rate this question:

  • 41. 

    Which device connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture?

    • A.

      Simple key loader (SKL)

    • B.

      Data transfer devices (DTD)

    • C.

      Secure terminal equipment (STE)

    • D.

      Data management devices (DMD)

    Correct Answer
    C. Secure terminal equipment (STE)
    Explanation
    Secure terminal equipment (STE) connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture. This means that STE enables secure communication between different sites within the EKMS system, ensuring the confidentiality and integrity of the transmitted data. It acts as a secure gateway for communication, allowing authorized users to exchange information securely.

    Rate this question:

  • 42. 

    What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?

    • A.

      SECRET

    • B.

      CRYPTO

    • C.

      TOP SECRET

    • D.

      CONFIDENTIAL

    Correct Answer
    A. SECRET
    Explanation
    The local management device (LMD) is designed to support and process SECRET classification of communication security (COMSEC) material.

    Rate this question:

  • 43. 

    The local management device (LMD) supports or utilizes all of the following except

    • A.

      Dial-up communications

    • B.

      Encrypted keying material

    • C.

      Unencrypted keying material

    • D.

      The Santa Cruz Operation (SCO) UNIX OpenServer operating system

    Correct Answer
    C. Unencrypted keying material
    Explanation
    The local management device (LMD) supports or utilizes dial-up communications, encrypted keying material, and the Santa Cruz Operation (SCO) UNIX OpenServer operating system. However, it does not support or utilize unencrypted keying material. Unencrypted keying material refers to sensitive information that is not protected or secured, which can pose a security risk. Therefore, the LMD does not utilize unencrypted keying material to ensure the security of its operations.

    Rate this question:

  • 44. 

    Which type of Nation Security Agency (NSA) approved encryption devices does the local management device (LMD) use to communicate over a communications link?

    • A.

      Type I

    • B.

      Type II

    • C.

      Type III

    • D.

      Type IV

    Correct Answer
    A. Type I
    Explanation
    The local management device (LMD) uses Type I Nation Security Agency (NSA) approved encryption devices to communicate over a communications link. Type I encryption devices are the highest level of encryption devices approved by the NSA, providing the most secure communication. These devices are designed to protect sensitive information and ensure that unauthorized individuals cannot access or intercept the communication.

    Rate this question:

  • 45. 

    The front of the KOK-22A device fill connector allows interface with which type of file devices?

    • A.

      DS-101 only

    • B.

      DS-102 only

    • C.

      DS-101 and DS-102

    • D.

      All types of fill devices

    Correct Answer
    C. DS-101 and DS-102
    Explanation
    The front of the KOK-22A device fill connector allows interface with both DS-101 and DS-102 types of fill devices.

    Rate this question:

  • 46. 

    The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as

    • A.

      Accounting legend code (ALC)-1

    • B.

      ALC-2

    • C.

      ALC-3

    • D.

      ALC-4

    Correct Answer
    D. ALC-4
    Explanation
    The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as ALC-4. This suggests that ALC-4 is the correct accounting legend code for tracking and managing the CIK. It is likely that ALC-4 is specifically designated for the CIKs in the accounting system, ensuring proper documentation and control over these keys.

    Rate this question:

  • 47. 

    What is not true about firefly credentials?

    • A.

      They have set cryptoperiod

    • B.

      They have an expiration date

    • C.

      They are valid for one month from the creation date

    • D.

      They must be generated to successfully exchange keying material (KEYMAT)

    Correct Answer
    A. They have set cryptoperiod
    Explanation
    Firefly credentials do not have a set cryptoperiod. Cryptoperiod refers to the time period for which a cryptographic key is considered secure and should be used. This statement implies that firefly credentials do not have a predetermined time period after which they expire or become invalid.

    Rate this question:

  • 48. 

    Unless directed by National Security Agency (NSA) or HQ CPSQ, how often is the electronic rekey of the firefly vector set completed?

    • A.

      Monthly

    • B.

      Annually

    • C.

      Quarterly

    • D.

      Bi-annually

    Correct Answer
    B. Annually
    Explanation
    The correct answer is "Annually". This means that the electronic rekey of the firefly vector set is completed once a year, unless specifically instructed by the National Security Agency (NSA) or HQ CPSQ. This regular rekeying helps to maintain the security and effectiveness of the firefly vector set.

    Rate this question:

  • 49. 

    When loading the vector set for the firefly credentials and you click on "Load EKMS Vector Set", what should immediately happen?

    • A.

      The screen will go black

    • B.

      The user will be prompted to insert and turn the KDS-64A

    • C.

      The user will be prompted to input the key use information

    • D.

      The user will be prompted to turn and remove the KSD-64A

    Correct Answer
    A. The screen will go black
    Explanation
    When loading the vector set for the firefly credentials and clicking on "Load EKMS Vector Set", the screen going black is the expected immediate response. This could indicate that the system is processing the request and preparing to load the vector set. The black screen may be a temporary state before the system displays the next prompt or action.

    Rate this question:

  • 50. 

    Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts?

    • A.

      User application software (UAS)

    • B.

      Common user application software (CUAS)

    • C.

      Local communications security management software (LCMS)

    • D.

      Card loader user application software (CLUAS)

    Correct Answer
    C. Local communications security management software (LCMS)
    Explanation
    The correct answer is Local communications security management software (LCMS). LCMS is used in conjunction with the key processor (KP) to generate electronic keys and transfer both physical and electronic keys to other COMSEC accounts. LCMS is specifically designed for managing communication security and ensures the secure transfer of keys between different accounts. Other options such as User application software (UAS), Common user application software (CUAS), and Card loader user application software (CLUAS) do not specifically focus on communication security management.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 25, 2012
    Quiz Created by
    CommV1
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.