3D053 CDC Edit 02 Vol 3

68 Questions | Total Attempts: 635

SettingsSettingsSettings
CDC Quizzes & Trivia

The UREs for vol 3 3D053 edit code 02 which became active 4 April 2013


Questions and Answers
  • 1. 
    What is a collection of interoperable systems developed for the services and government agencies to automate handling and management of communications security (COMSEC) material?
    • A. 

      Electronic key management system (EMKS).

    • B. 

      COMSEC account.

    • C. 

      Firefly credentials.

    • D. 

      Cryptonet

  • 2. 
    What allows one element to pass required information to another element enabling both elements to generate the same key session?
    • A. 

      Electronic key management system (EMKS).

    • B. 

      Communications security (COMSEC) account.

    • C. 

      Firefly credentials.

    • D. 

      Cryptonet

  • 3. 
    Who appoints communications security responsible officers (CRO) to support a unit’s communications security (COMSEC) mission?
    • A. 

      Communications security account manager (CAM).

    • B. 

      Communications unit commander.

    • C. 

      Supported unit commander.

    • D. 

      Wing commander.

  • 4. 
    Who is responsible for identifying cryptonet members?
    • A. 

      Local communication security management system (LCMS) administrator.

    • B. 

      Communications security responsible officer (CRO).

    • C. 

      Communications security (COMSEC) accountant.

    • D. 

      Controlling authorities.

  • 5. 
    Which communications security (COMSEC) tier generates, distributes, and performs accounting functions of all modern key, physical traditional key, and certain electronic key?
    • A. 

      Zero

    • B. 

      One

    • C. 

      Two

    • D. 

      Three

  • 6. 
    All are requirements that must be met to be a primary communications security account manager (CAM) without a waiver except
    • A. 

      Being a US citizen.

    • B. 

      Being a 3D0XX noncommissioned officer (NCO).

    • C. 

      Possessing a security clearance commensurate for type of material in account.

    • D. 

      Meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1.

  • 7. 
    To become a communications security account manager (CAM), you must either complete the CAM course or have had how many years of previous communications security (COMSEC) operations experience?
    • A. 

      One

    • B. 

      Two

    • C. 

      Three

    • D. 

      Four

  • 8. 
    Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?
    • A. 

      Federal Aviation Administration (FAA).

    • B. 

      Cryptologic Systems Division (CPSD).

    • C. 

      National Security Agency (NSA).

    • D. 

      Major command (MAJCOM).

  • 9. 
    How often must communications security account manager (CAM) waivers be renewed?
    • A. 

      Three months.

    • B. 

      Six months.

    • C. 

      Annually.

    • D. 

      Biannually.

  • 10. 
    How many copies of a communications security account manager (CAM) rescission letter must be prepared?
    • A. 

      Two

    • B. 

      Four

    • C. 

      Six

    • D. 

      Seven

  • 11. 
    Communications security (COMSEC) accountants should inspect all protective packaging for signs of tampering and report discrepancies in accordance with
    • A. 

      Air Force System Security Instruction (AFSSI) 4201.

    • B. 

      AFSSI 4202.

    • C. 

      AFSSI 4211

    • D. 

      AFSSI 4212.

  • 12. 
    The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following Air Force specialties except
    • A. 

      Security forces

    • B. 

      Information systems.

    • C. 

      Information assurance (IA).

    • D. 

      Base information infrastructures.

  • 13. 
    Air Force (AF) Form 4160 is used to assess all the following programs except
    • A. 

      Communications security (COMSEC).

    • B. 

      Operations security (OPSEC).

    • C. 

      Emission security (EMSEC).

    • D. 

      Information assurance (IA).

  • 14. 
    Who assesses local communications security (COMSEC) elements during “command” assessments?
    • A. 

      Communications security account manager (CAM).

    • B. 

      Major command (MAJCOM).

    • C. 

      Squadron commander.

    • D. 

      Security forces.

  • 15. 
    Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?
    • A. 

      Air Force Instruction (AFI) 33–201 volume 4.

    • B. 

      Technical Order (TO) 00–20F–2.

    • C. 

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D. 

      AFKAG–2.

  • 16. 
    Qualified personnel perform preventative maintenance and security inspections on safes and vaults every
    • A. 

      Two years for safes and vaults.

    • B. 

      Five years for safes and vaults.

    • C. 

      Two years for safes; every five years for vaults.

    • D. 

      Five years for safes; every two years for vaults.

  • 17. 
    In which type of safe must you store top secret (TS) keying material (KEYMAT)?
    • A. 

      Class A.

    • B. 

      Class B.

    • C. 

      Class C.

    • D. 

      Class D.

  • 18. 
    Where should you account for keyed short-term devices?
    • A. 

      Communications security physical inventory (CPI).

    • B. 

      Electronic Key Management System (EKMS).

    • C. 

      Standard Form (SF) 700, Security Container Information.

    • D. 

      SF 702, Security Container Checklist.

  • 19. 
    Which is considered a long-term communications security (COMSEC) key storage device?
    • A. 

      KYK–13.

    • B. 

      KYX–15.

    • C. 

      Simple key loader (SKL).

    • D. 

      Communications security physical inventory (CPI).

  • 20. 
    How long is a Standard Form (SF) 701, Activity Security Checklist retained?
    • A. 

      Three months.

    • B. 

      Six months.

    • C. 

      One year.

    • D. 

      Two years.

  • 21. 
    What items should never be stored in the same container with communications security (COMSEC) material?
    • A. 

      High theft items.

    • B. 

      Cryptographic maintenance manuals.

    • C. 

      Unkeyed COMSEC equipment.

    • D. 

      Cryptographic access program (CAP) documentation.

  • 22. 
    What form is used to document when a safe or vault is put into use?
    • A. 

      Standard Form (SF) 701.

    • B. 

      SF 702.

    • C. 

      Air Force (AF) Form 1109.

    • D. 

      Air Force technical order (AFTO) Form 36.

  • 23. 
    What form is used to record the arrival or departure of all personnel not named on the facility authorized access list?
    • A. 

      Standard Form (SF) 701.

    • B. 

      SF 702.

    • C. 

      Air Force (AF) Form 1109.

    • D. 

      Air Force technical order (AFTO) Form 36.

  • 24. 
    Who manages the cryptographic access program (CAP) database for Air Force Communications Security (AFCOMSEC) Form 9, cryptographic access certificates, account update lists, and polygraph tests?
    • A. 

      Headquarters, Air Force Network Integration Center (HQ AFNIC)/EVP.

    • B. 

      Communications security account manger (CAM).

    • C. 

      CAP administrator.

    • D. 

      Unit commander.

  • 25. 
    Who identifies and grants cryptographic access in the commander’s name to personnel who require authorized access to classified cryptographic information?
    • A. 

      Communications security responsible officer (CRO).

    • B. 

      Cryptographic access program (CAP) administrator.

    • C. 

      Communications security account manger (CAM).

    • D. 

      Information assurance officer (IAO).

Back to Top Back to top