Related Topics
Take Another Quiz

CDC 3d053 Cyber Surety Journeyman Volume 3. Communications Security (comsec)

52 Questions
CDC Quizzes & Trivia

CDC 3D053 Cyber Surety Journeyman Volume 3. Communications Security (COMSEC)

Questions and Answers
  • 1. 
    (401) Which communications security (COMSEC) tier generates, distributes, and performs accounting functions of all modern key, physical traditional key, and certain electronic key?
    • A. 

      Zero.

    • B. 

      One.

    • C. 

      Two.

    • D. 

      Three.

  • 2. 
    (401) What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked “CRYPTO” is distributed, controlled, and safeguarded?
    • A. 

      Electronic key management system (EKMS).

    • B. 

      Communications security material control system (CMCS).

    • C. 

      Standard base supply system (SBSS).

    • D. 

      Cryptologic systems group (CPSG).

  • 3. 
    (402) All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except
    • A. 

      Being a .U.S. citizen

    • B. 

      Meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • C. 

      Possessing a security clearance commensurate for type of material in account

    • D. 

      Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee

  • 4. 
    (402) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?
    • A. 

      Federal Aviation Administration (FAA).

    • B. 

      Cryptologic Systems Group (CPSG).

    • C. 

      National Security Agency (NSA).

    • D. 

      Major command (MAJCOM).

  • 5. 
    (402) To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to
    • A. 

      AFI 33–201, volume 4

    • B. 

      TO 00–20F–2

    • C. 

      AFKAG–1

    • D. 

      AFKAG-2

  • 6. 
    (403) Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow?
    • A. 

      Air Force Cryptologic Accounting Guide (AFKAG)–1

    • B. 

      AFKAG–2

    • C. 

      AFKAG–3

    • D. 

      AFKAG–4

  • 7. 
    (403) Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with
    • A. 

      AFSSI 4201

    • B. 

      AFSSI 4202

    • C. 

      AFSSI 4211

    • D. 

      AFSSI 4212

  • 8. 
    404) The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following Air Force specialties except
    • A. 

      Security forces

    • B. 

      Information systems

    • C. 

      Information assurance

    • D. 

      Base information infrastructures

  • 9. 
    (405) Who assesses local communications security (COMSEC) elements during “command” assessments?
    • A. 

      Communications security account manager (CAM).

    • B. 

      Squadron commander

    • C. 

      Security forces

    • D. 

      MAJCOM

  • 10. 
    (406) Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?
    • A. 

      AFI 33–201 volume 4.

    • B. 

      TO 00–20F–2.

    • C. 

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D. 

      AFKAG–2.

  • 11. 
    (407) Which of the following are considered long term communications security (COMSEC) key storage devices?
    • A. 

      KYK–13

    • B. 

      KYX–15

    • C. 

      Simple key loader (SKL)

    • D. 

      Communications security physical inventory (CPI)

  • 12. 
    (407) What items should never be stored in the same container with COMSEC material?
    • A. 

      High theft items

    • B. 

      Cryptographic maintenance manuals

    • C. 

      Unkeyed classified COMSEC equipment

    • D. 

      Cryptographic access program (CAP) documentation

  • 13. 
    (408) What form is used to record the arrival or departure of all personnel not named on the facility authorized access list?
    • A. 

      Standard Form 701

    • B. 

      Standard Form 702

    • C. 

      Air Force Form 1109

    • D. 

      Air Force Technical Order Form 36

  • 14. 
    (409) Personnel at the temporary duty (TDY) location can/should verify an individual’s cryptographic access program (CAP) status through
    • A. 

      Two-person integrity (TPI).

    • B. 

      The communications security physical inventory (CPI).

    • C. 

      The communications security management system (CMS).

    • D. 

      The certification authority workstation (CAW).

  • 15. 
    (410) Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?
    • A. 

      Air Force Network Integration Center (AFNIC)/EVPI.

    • B. 

      Unit Commander.

    • C. 

      CAP Administrator.

    • D. 

      Communications security account manager (CAM).

  • 16. 
    (410) What cryptographic access program (CAP) withdrawal method is used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access?
    • A. 

      Administrative withdrawal.

    • B. 

      Suspension.

    • C. 

      Termination.

    • D. 

      Revocation.

  • 17. 
    (411) How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?
    • A. 

      Weekly.

    • B. 

      Monthly.

    • C. 

      Quarterly.

    • D. 

      Annually.

  • 18. 
    (411) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?
    • A. 

      A final security clearance

    • B. 

      An interim security clearance.

    • C. 

      A clearance equal to the COMSEC being accessed.

    • D. 

      A clearance higher than the COMSEC being accessed.

  • 19. 
    (412) When classified material is not stored in a General Service Administration (GSA)- approved container, the facility containing the classified material must be constructed according to the requirements in DOD 5200.1–R MIL HDBK 1013/1A and
    • A. 

      Air Force Instruction (AFI) 33–201, Volume 4.

    • B. 

      Technical Order (TO) 00–20F–2.

    • C. 

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D. 

      AFKAG–2.

  • 20. 
    (413) When removing material from a communication security physical inventory (CPI), always
    • A. 

      Use red ink.

    • B. 

      Use green ink.

    • C. 

      Write an MFR.

    • D. 

      Use correction fluid.

  • 21. 
    (414) The communication security physical inventory (CPI) will include all of the following except
    • A. 

      Accounting legend code (ALC).

    • B. 

      Edition.

    • C. 

      Quantity.

    • D. 

      Short title.

  • 22. 
    (414) How long should a communication security (COMSEC) inventory form be retained?
    • A. 

      Current month only.

    • B. 

      Past six months only.

    • C. 

      Past six months plus the current month.

    • D. 

      Based upon local guidance at each installation.

  • 23. 
    (415) Changes that must be made to material in communication security (COMSEC) publications are called
    • A. 

      Modifications.

    • B. 

      Amendments.

    • C. 

      Corrections.

    • D. 

      Updates.

  • 24. 
    (416) Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession?
    • A. 

      Eight.

    • B. 

      Twelve.

    • C. 

      Twenty-four.

    • D. 

      Forty-eight.

  • 25. 
    (416) The only authorized methods to destroy key tapes are by any of the following methods except
    • A. 

      Disintegrating.

    • B. 

      Pulverizing.

    • C. 

      Shredding.

    • D. 

      Burning.

  • 26. 
    (417) Sign the communication security (COMSEC) material destruction record
    • A. 

      Immediately after the material is destroyed.

    • B. 

      Immediately before the material is destroyed.

    • C. 

      Within 12 hours after the material is destroyed.

    • D. 

      Within 12 hours before the material is destroyed.

  • 27. 
    (418) As part of a two-person control (TPC) team, you must be designated to handle communication security (COMSEC) material under the
    • A. 

      Personnel reliability program (PRP).

    • B. 

      Sealed authenticator systems (SAS).

    • C. 

      Permissive action link (PAL).

    • D. 

      Coded switch system (CSS).

  • 28. 
    (419) An area, room, or space which, when attended, must be occupied by two or more appropriately cleared individuals who remain within sight of each other is called a communication security (COMSEC)
    • A. 

      Two-person integrity (TPI) zone.

    • B. 

      Two-person control (TPC) zone.

    • C. 

      No-lone zone.

    • D. 

      Controlled area.

  • 29. 
    (419) What situation is not an authorized exception to two-person integrity (TPI) requirements?
    • A. 

      Unopened National Security Agency (NSA) protective packaged material.

    • B. 

      Communication security (COMSEC) material used in tactical situations.

    • C. 

      COMSEC material handled in minimum manning situations.

    • D. 

      Unopened packages received from or in the custody of the Defense Courier Division (DCD).

  • 30. 
    (420) Which of the following is not an authorized official who may designate in writing individuals selected to perform courier duty?
    • A. 

      Supervisor.

    • B. 

      Unit commander.

    • C. 

      Security manager.

    • D. 

      Communications security account manager (CAM).

  • 31. 
    (420) When transporting bulky communication security (COMSEC) material through airlines, you may leave COMSEC material unattended
    • A. 

      Under no circumstances.

    • B. 

      When it is in a baggage area.

    • C. 

      When it is loaded on a cargo dock.

    • D. 

      When it is passed on to authorized airport personnel.

  • 32. 
    (421) When transporting communication security (COMSEC), MAJCOM approval is required when traveling
    • A. 

      Via commercial airlines.

    • B. 

      Via all types of airlines.

    • C. 

      Via non-U.S. flag airlines.

    • D. 

      Via U.S. flag or chartered airlines.

  • 33. 
    (422) What term is used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards?
    • A. 

      COMSEC incident.

    • B. 

      COMSEC deviation.

    • C. 

      COMSEC insecurity.

    • D. 

      D. Practice dangerous to security (PDS).

  • 34. 
    (422) What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?
    • A. 

      COMSEC incident.

    • B. 

      COMSEC deviation.

    • C. 

      COMSEC insecurity.

    • D. 

      Practice dangerous to security (PDS).

  • 35. 
    (423) What office assigns a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy?
    • A. 

      TOBYHANNA/CA5B1099.

    • B. 

      HQ CPSG/CA616600.

    • C. 

      HQ AFNIC/EVIC.

    • D. 

      DIRNSA/I5113.

  • 36. 
    (423) Guidance for processing COMSEC material receipt reporting discrepancies can be found in
    • A. 

      AFSSI 4201 and AFKAG–1.

    • B. 

      AFSSI 4202 and AFKAG–1.

    • C. 

      AFSSI 4211 and AFKAG–2.

    • D. 

      AFSSI 4212 and AFKAG–2.

  • 37. 
    (424) Which situation does not describe a communication security (COMSEC) cryptographic incident?
    • A. 

      Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT).

    • B. 

      Using keying material that is compromised, superseded, defective, or misused.

    • C. 

      C. Using keying material that was produced without National Security Agency (NSA) authorization.

    • D. 

      Using equipment with defective logic circuitry.

  • 38. 
    (425) As a minimum, to what classification should you mark a communication security (COMSEC) incident report when the report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised?
    • A. 

      SECRET.

    • B. 

      TOP SECRET.

    • C. 

      CONFIDENTIAL.

    • D. 

      For Official Use Only.

  • 39. 
    (425) A final communication security (COMSEC) incident report must be submitted no later than how many days after the initial report?
    • A. 

      5 days.

    • B. 

      10 days.

    • C. 

      30 days.

    • D. 

      60 days.

  • 40. 
    (426) What local communications security management software (LCMS) desktop function provides a user with the ability to securely pass information and/or transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts?
    • A. 

      X.400

    • B. 

      X.500

    • C. 

      Message.

    • D. 

      Direct Comms.

  • 41. 
    (427) Which device connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture?
    • A. 

      Simple key loader (SKL).

    • B. 

      Data transfer device (DTD).

    • C. 

      Secure terminal equipment (STE).

    • D. 

      Data management device (DMD).

  • 42. 
    (428) What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?
    • A. 

      SECRET.

    • B. 

      CRYPTO.

    • C. 

      TOP SECRET.

    • D. 

      CONFIDENTIAL.

  • 43. 
    (428) The local management device (LMD) supports or utilizes all of the following except
    • A. 

      Dial-up communications.

    • B. 

      Encrypted keying material.

    • C. 

      Unencrypted keying material.

    • D. 

      The Santa Cruz Operation (SCO) UNIX OpenServer operating system.

  • 44. 
    (429) Which type of National Security Agency (NSA) approved encryption device does the local management device (LMD) use to communicate over a communications link?
    • A. 

      Type I

    • B. 

      Type II

    • C. 

      Type III

    • D. 

      Type IV

  • 45. 
    (430) The front of the KOK–22A device fill connector allows interface with which type of file devices?
    • A. 

      DS-101 only

    • B. 

      DS-102 only

    • C. 

      DS-101 and DS-102

    • D. 

      All types of fill devices

  • 46. 
    (431) The transit cryptographic ignition key (CIK) for the KOK–22A is created at the depot and is accounted for as
    • A. 

      ALC-1

    • B. 

      ALC-2

    • C. 

      ALC-3

    • D. 

      ALC-4

  • 47. 
    (432) What is not true about firefly credentials?
    • A. 

      They have a set cryptoperiod.

    • B. 

      They have an expiration date.

    • C. 

      They are valid for one month from the creation date.

    • D. 

      They must be generated to successfully exchange keying material (KEYMAT).

  • 48. 
     (432) Unless directed by National Security Agency (NSA) or HQ CPSQ, how often is the electronic rekey of the firefly vector set completed?
    • A. 

      Monthly.

    • B. 

      Annually.

    • C. 

      Quarterly.

    • D. 

      Bi-annually.

  • 49. 
    (433) When loading the vector set for the firefly credentials and you click on “Load EKMS Vector Set”, what should immediately happen?
    • A. 

      The screen will go blank.

    • B. 

      The user will be prompted to insert and turn the KSD–64A.

    • C. 

      The user will be prompted to input the key use information.

    • D. 

      The user will be prompted to turn and remove the KSD–64A.

  • 50. 
    (434) Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts?
    • A. 

      User application software (UAS).

    • B. 

      Common user application software (CUAS).

    • C. 

      Local communications security management software (LCMS).

    • D. 

      Card loader user application software (CLUAS).

  • 51. 
    (435) Which communications security (COMSEC) management software does not allow an account to perform a semi-annual inventory?
    • A. 

      User application software (UAS).

    • B. 

      Common user application software (CUAS).

    • C. 

      Local communications security management software (LCMS).

    • D. 

      Card loader user application software (CLUAS).

  • 52. 
    (435) Which communications security (COMSEC) management software uses menus and submenus for necessary tasks?
    • A. 

      User application software (UAS)

    • B. 

      Common user application software (CUAS).

    • C. 

      Local communications security management software (LCMS).

    • D. 

      Card communications security management software (CLUAS).