CDC 3D053 : Trivia Questions Quiz On Cyber Surety!

52 Questions | Total Attempts: 187

SettingsSettingsSettings
CDC 3D053 : Trivia Questions Quiz On Cyber Surety!

This is a set of CDC 3D053 trivia Questions on Cyber Surety. In the world today a lot of the communication takes place over the internet or computer thus are susceptible to distortion. In the course we got how to safeguard air force information from that. Take this test and see how well you understood the course. All the best!


Questions and Answers
  • 1. 
    Which communications security (COMSEC) tier generates, distributes, and performs account functions of all modern key, physical traditional key, and certain electronic key?
    • A. 

      Zero

    • B. 

      One

    • C. 

      Two

    • D. 

      Three

  • 2. 
    What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked "CRYPTO" is distributed, controlled and safeguarded?
    • A. 

      Electronic key management system (EKMS)

    • B. 

      Communication security material control system (CMCS)

    • C. 

      Standard base supply systems (SBSS)

    • D. 

      Cryptologic system group (CPSG)

  • 3. 
    All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except
    • A. 

      Being a U.S. citizen

    • B. 

      Meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)-1

    • C. 

      Possessing a security clearance commensurate for type of material in account

    • D. 

      Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee

  • 4. 
    Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform, users?
    • A. 

      Federal Aviation Administration (FAA)

    • B. 

      Cryptologic Systems Group (CPSG)

    • C. 

      Nation Security Agency (NSA)

    • D. 

      Major Command (MAJCOM)

  • 5. 
    To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to 
    • A. 

      AFI 33-201, volume 4

    • B. 

      TO 00-20F-2

    • C. 

      AFKAG-1

    • D. 

      AFKAG-2

  • 6. 
    Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow?
    • A. 

      Air Force Cryptologic Accouting Guide (AFKAG)-1

    • B. 

      AFKAG-2

    • C. 

      AFKAG-3

    • D. 

      AFKAG-4

  • 7. 
    Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with 
    • A. 

      AFSSI 4201

    • B. 

      AFSSI 4202

    • C. 

      AFSSI 4211

    • D. 

      AFSSI 4212

  • 8. 
    The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following  Air Force specialties except
    • A. 

      Security forces

    • B. 

      Information systems

    • C. 

      Information assurance

    • D. 

      Base information infrastructures

  • 9. 
    Who assesses local communications security (COMSEC) elements during "command" assessments?
    • A. 

      Communications Security Account Manager (CAM)

    • B. 

      Squadron commander

    • C. 

      Security Forces

    • D. 

      MAJCOM

  • 10. 
    Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?
    • A. 

      AFI 33-201 volume 4

    • B. 

      TO 00-20F-2

    • C. 

      Air Force Cryptologic Accounting Guide (AFKAG)-1

    • D. 

      AFKAG-2

  • 11. 
    Which of the following are considered long term communications security (COMSEC) key storage devices?
    • A. 

      KYK-13

    • B. 

      KYX-15

    • C. 

      Simple key loader (SKL)

    • D. 

      Communications security physical inventory (CPI)

  • 12. 
    What items should never be stored in the same container with COMSEC material?
    • A. 

      High theft items

    • B. 

      Cryptographic maintenance manuals

    • C. 

      Unkeyed classified COMSEC equipment

    • D. 

      Cryptographic access program (CAP) documentation

  • 13. 
    What form is used to record the arrival or departure of all personnel not​ named on the facility authorized access list?
    • A. 

      Standard Form 701

    • B. 

      Standard Form 702

    • C. 

      Air Force Form 1109

    • D. 

      Air Force Technical Order Form 36

  • 14. 
    Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through
    • A. 

      Two-person integrity (TPI)

    • B. 

      The communications security physical inventory (CPI)

    • C. 

      The communications security management system (CMS)

    • D. 

      The certification authority workstation (CAW)

  • 15. 
    Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?
    • A. 

      Air Force Network Integration Center (AFNIC)/EVPI

    • B. 

      Unit Commander

    • C. 

      CAP administrator

    • D. 

      Communications security account manger (CAM)

  • 16. 
    What cryptographic access program (CAP) withdrawal method is used for personnel who are reassigned to another base or unit or to positions that do not ​require cryptographic access?
    • A. 

      Administrative withdrawal

    • B. 

      Suspension

    • C. 

      Termination

    • D. 

      Revocation

  • 17. 
    How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?
    • A. 

      Weekly

    • B. 

      Monthly

    • C. 

      Quarterly

    • D. 

      Annually

  • 18. 
    Which type of security clearance is not valid for personnel on a communications security (COMSEC) access-list?
    • A. 

      A final security clearance

    • B. 

      An interim security clearance

    • C. 

      A clearance equal to the COMSEC being accessed

    • D. 

      A clearance higher than the COMSEC being accessed

  • 19. 
    When classified material is not stored in a General Service Administration (GSA)-Approved container, the facility containing the classified material must be constructed according to the requirements in DOD 5200.1R MIL HDBK 1013/1A and
    • A. 

      Air Force Instruction (AFI)33-201, Volume 4

    • B. 

      Technical Order (TO) 00-20F-2

    • C. 

      Air Force Cryptologic Accounting Guide (AFKAG)-1

    • D. 

      AFKAG-2

  • 20. 
    When removing material from a communication security physical inventory (CPI), always
    • A. 

      Use red ink

    • B. 

      Use green ink

    • C. 

      Write an MFR

    • D. 

      Use correction fluid

  • 21. 
    The communication security physical inventory (CPI) will include all of the following ​except
    • A. 

      Accounting legend code (ALC)

    • B. 

      Edition

    • C. 

      Quantity

    • D. 

      Short title

  • 22. 
    How long should a communication security (COMSEC) inventory form be retained?
    • A. 

      Current month only

    • B. 

      Past six months only

    • C. 

      Past six months plus the current month

    • D. 

      Based upon local guidance at each installation

  • 23. 
    Changes that must be made to material in communication security (COMSEC) publications are called
    • A. 

      Modifications

    • B. 

      Amendments

    • C. 

      Corrections

    • D. 

      Updates

  • 24. 
    Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession?
    • A. 

      Eight

    • B. 

      Twelve

    • C. 

      Twenty-four

    • D. 

      Forty-eight

  • 25. 
    The only authorized methods to destroy key tapes are by of the following methods ​except
    • A. 

      Disintegrating

    • B. 

      Pulverizing

    • C. 

      Shredding

    • D. 

      Burning

Back to Top Back to top