CDC 3D053 : Trivia Questions Quiz On Cyber Surety!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By CommV1
C
CommV1
Community Contributor
Quizzes Created: 3 | Total Attempts: 4,095
| Attempts: 207 | Questions: 52
Please wait...
Question 1 / 52
0 %
0/100
Score 0/100
1. The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following  Air Force specialties except

Explanation

The IAAP team consists of personnel experienced in all the Air Force specialties except security forces. This means that the team includes personnel experienced in information systems, information assurance, and base information infrastructures. However, security forces personnel are not part of the IAAP team.

Submit
Please wait...
About This Quiz
CDC 3D053 : Trivia Questions Quiz On Cyber Surety! - Quiz

This is a set of CDC 3D053 trivia Questions on Cyber Surety. In the world today a lot of the communication takes place over the internet or computer... see morethus are susceptible to distortion. In the course we got how to safeguard air force information from that. Take this test and see how well you understood the course. All the best! see less

2. What items should never be stored in the same container with COMSEC material?

Explanation

High theft items should never be stored in the same container with COMSEC material because it poses a security risk. COMSEC material refers to sensitive information and equipment used for secure communication, while high theft items are items that are prone to being stolen. Storing these items together increases the chances of unauthorized access and compromise of the COMSEC material. Keeping them separate helps to maintain the confidentiality and integrity of the COMSEC material.

Submit
3. Which type of security clearance is not valid for personnel on a communications security (COMSEC) access-list?

Explanation

An interim security clearance is not valid for personnel on a communications security (COMSEC) access-list because it is only a temporary clearance granted while a full background investigation is being conducted. It is not equivalent to a final security clearance or a clearance equal to or higher than the COMSEC being accessed. Therefore, personnel with an interim security clearance should not have access to COMSEC materials until their full clearance is granted.

Submit
4. Changes that must be made to material in communication security (COMSEC) publications are called

Explanation

In the context of communication security (COMSEC) publications, changes made to the material are referred to as amendments. Amendments are typically made to update or modify the existing information in the publications to ensure accuracy and effectiveness. Corrections may refer to fixing errors, but amendments encompass a broader scope of changes. Updates may also imply changes, but amendments specifically indicate modifications made to the material in COMSEC publications.

Submit
5. When transproting bulky communication security (COMSEC) material through arilines, you may leave COMSEC material unattended

Explanation

It is important to never leave COMSEC material unattended under any circumstances. This means that whether it is in a baggage area, loaded on a cargo dock, or passed on to authorized airport personnel, it should always be supervised and not left alone. This is necessary to ensure the security and integrity of the communication systems and to prevent unauthorized access or tampering. Leaving COMSEC material unattended can pose a significant risk to national security and compromise sensitive information.

Submit
6. How long should a communication security (COMSEC) inventory form be retained?

Explanation

The correct answer is "Past six months plus the current month." This means that a communication security (COMSEC) inventory form should be retained for a period of six months, including the current month. This ensures that there is a record of the inventory for a sufficient amount of time to track any changes or discrepancies. Retaining the form for this duration allows for proper monitoring and accountability of communication security measures.

Submit
7. As part of a two-person control (TCP) team, you must be designated to handle communication security (COMSEC) material under the

Explanation

The correct answer is personnel reliability program (PRP). The personnel reliability program (PRP) is a program that ensures the trustworthiness and reliability of individuals who have access to sensitive information and materials, such as communication security (COMSEC) material. It involves a thorough screening process, ongoing monitoring, and regular training to ensure that individuals designated to handle COMSEC material are trustworthy and can effectively protect and secure it. The PRP is an essential component of maintaining communication security and preventing unauthorized access or compromise of sensitive information.

Submit
8. What form is used to record the arrival or departure of all personnel not​ named on the facility authorized access list?

Explanation

Air Force Form 1109 is used to record the arrival or departure of all personnel not named on the facility authorized access list. This form is specific to the Air Force and is likely used to maintain security and track individuals who are not authorized to access the facility. Standard Form 701 and Standard Form 702 may be used for other purposes, while Air Force Technical Order Form 36 is not mentioned in relation to recording personnel arrivals or departures.

Submit
9. What cryptographic access program (CAP) withdrawal method is used for personnel who are reassigned to another base or unit or to positions that do not ​require cryptographic access?

Explanation

Administrative withdrawal is the cryptographic access program (CAP) withdrawal method used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access. This method involves removing the individual's access privileges and credentials from the system, effectively withdrawing their cryptographic access rights. It is a standard procedure to ensure that only authorized personnel have access to sensitive information and resources.

Submit
10. Sign the communication security (COMSEC) material destruction record

Explanation

The correct answer is to sign the communication security (COMSEC) material destruction record immediately after the material is destroyed. This ensures that there is a clear and timely record of the destruction process. Signing the record after the destruction prevents any potential errors or discrepancies in the documentation. It also helps to maintain accountability and traceability for the destroyed material.

Submit
11. Which of the following are considered long term communications security (COMSEC) key storage devices?

Explanation

The Simple Key Loader (SKL) is considered a long-term Communications Security (COMSEC) key storage device. The SKL is a portable electronic device used to load cryptographic keys into various communication equipment and systems. It securely stores and manages cryptographic keys, allowing for the secure transmission of sensitive information. It is designed to provide long-term storage of keys and is widely used by military and government organizations to ensure the confidentiality and integrity of their communications. The other options listed, KYK-13, KYX-15, and Communications Security Physical Inventory (CPI), are not specifically designed for long-term key storage.

Submit
12. The front of the KOK-22A device fill connector allows interface with which type of file devices?

Explanation

The front of the KOK-22A device fill connector allows interface with both DS-101 and DS-102 types of fill devices.

Submit
13. When loading the vector set for the firefly credentials and you click on "Load EKMS Vector Set", what should immediately happen?

Explanation

When loading the vector set for the firefly credentials and clicking on "Load EKMS Vector Set", the screen going black is the expected immediate response. This could indicate that the system is processing the request and preparing to load the vector set. The black screen may be a temporary state before the system displays the next prompt or action.

Submit
14. When transporting communication security (COMSEC), MAJCOM approval is required when traveling 

Explanation

MAJCOM approval is required when transporting communication security (COMSEC) via non-U.S. flag airlines because these airlines are not operated by the United States and may not have the same level of security measures in place as U.S. flag or chartered airlines. This ensures that the sensitive COMSEC information is protected during transit and reduces the risk of it falling into the wrong hands.

Submit
15. What office assigns a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy?

Explanation

HQ AFNIC/EVIC is the correct answer because AFNIC stands for Air Force Network Integration Center, which is responsible for managing and securing the Air Force's communication networks. EVIC stands for Electronic Video Imagery Center, which suggests that this office is involved in handling and tracking communication security material. Therefore, it is likely that HQ AFNIC/EVIC would be the office that assigns a tracking number to any reported COMSEC material receipt reporting discrepancy.

Submit
16. Guidance for processing COMSEC material receipt reporting discrepancies can be found in 

Explanation

The correct answer is ASSI 4212 and AFKAG-2. This is because the question is asking for the guidance for processing COMSEC material receipt reporting discrepancies, and the correct answer provides the specific references (ASSI 4212 and AFKAG-2) where this guidance can be found.

Submit
17. Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with 

Explanation

Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with AFSSI 4212. This means that they should carefully examine the packaging of communication equipment or materials to ensure that it has not been tampered with or compromised in any way. If any signs of tampering are found, they should immediately report it according to the procedures outlined in AFSSI 4212. This ensures that any potential security breaches or compromises are quickly identified and addressed.

Submit
18. What situation is ​not an authorized exception to two-person integrity (TPI) requirements?

Explanation

Two-person integrity (TPI) requirements are in place to ensure the security and accountability of sensitive materials. This means that certain situations may require two authorized individuals to be present when handling such materials. The other options listed in the question all involve scenarios where additional security measures are in place. However, COMSEC material handled in minimum manning situations does not meet the TPI requirements as it involves a reduced number of personnel, which increases the risk of unauthorized access or mishandling of the sensitive material.

Submit
19. Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through

Explanation

not-available-via-ai

Submit
20. How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?

Explanation

Communications security (COMSEC) access lists should be reviewed for accuracy and annotated on a monthly basis. This frequency allows for regular monitoring and updating of the access lists to ensure that only authorized individuals have access to sensitive information. Reviewing the lists monthly also helps in identifying any potential security breaches or unauthorized access attempts in a timely manner, allowing for prompt action to mitigate any risks. Quarterly or annual reviews may not be frequent enough to address changes in personnel or security requirements, while weekly reviews may be too frequent and time-consuming for larger organizations.

Submit
21. The communication security physical inventory (CPI) will include all of the following ​except

Explanation

The communication security physical inventory (CPI) is a process that involves counting and documenting all communication security equipment and materials. It helps ensure that all items are properly accounted for and accounted for accurately. The CPI includes items such as editions, quantities, and short titles of communication security materials. However, the accounting legend code (ALC) is not included in the CPI. The ALC is a code used to classify and categorize financial transactions, and it is not directly related to the physical inventory of communication security materials.

Submit
22. When removing material from a communication security physical inventory (CPI), always

Explanation

When removing material from a communication security physical inventory (CPI), it is necessary to write an MFR (Memorandum for Record). This is because an MFR serves as a formal documentation of the removal, providing a record of the action taken. It helps in maintaining accountability and transparency in the inventory management process. Using red or green ink or correction fluid may not provide the necessary documentation or may not be considered as an official record of the removal.

Submit
23. All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except

Explanation

To be a communications security account manager (CAM) without a waiver, the individual must meet the following requirements: being a U.S. citizen, meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)-1, and possessing a security clearance commensurate for the type of material in the account. The answer choice "being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee" is not a requirement to be a CAM without a waiver.

Submit
24. Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession?

Explanation

Under normal circumstances, communication security (COMSEC) keying material designated CRYPTO should be destroyed as soon as possible after supersession. However, it must be destroyed no later than twelve hours after supersession. This ensures that the old keying material is not compromised or used for unauthorized access to sensitive information.

Submit
25. An area, room, or space which, when attended, must be occupied by two or more appropriately clear individuals who remain within sight of each other is called a communication security (COMSEC) 

Explanation

A "no-lone zone" is an area, room, or space that requires two or more individuals to be present at all times and remain within sight of each other. This is done to ensure communication security (COMSEC) and prevent any unauthorized access or tampering. By having multiple individuals present, the risk of security breaches or compromises is minimized, as there is always someone to monitor and verify activities within the zone. The term "no-lone zone" emphasizes the importance of avoiding solitary presence in order to maintain a secure environment.

Submit
26. Which situation does not ​describe a communication security (COMSEC) cryptographic incident? 

Explanation

Failing to zeroize a common fill device within 12 hours of supersession of the effective key material (KEYMAT) is a procedure related to the proper handling of cryptographic key material, not a communication security (COMSEC) cryptographic incident. A COMSEC cryptographic incident refers to situations where there is a compromise or misuse of keying material, or the use of unauthorized keying material or equipment with defective logic circuitry.

Submit
27. What local communications security managemet software (LCMS) desktop function provides a user with the ablility to securely pass information and/or transfer electronic key management system (EKMS) messages/keys directley to other EKMS accounts?

Explanation

Direct Comms is the correct answer because it refers to a local communications security management software (LCMS) desktop function that allows users to securely pass information and transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts. This function ensures secure communication and transfer of sensitive information within the LCMS system.

Submit
28. The only authorized methods to destroy key tapes are by of the following methods ​except

Explanation

The question asks for the method that is not authorized to destroy key tapes. The given options include disintegrating, pulverizing, shredding, and burning. Among these options, shredding is the correct answer because it is the only method that is not authorized to destroy key tapes. The other three methods, disintegrating, pulverizing, and burning, are authorized methods for destroying key tapes.

Submit
29. What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?

Explanation

The local management device (LMD) is designed to support and process SECRET classification of communication security (COMSEC) material.

Submit
30. Which device connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture?

Explanation

Secure terminal equipment (STE) connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture. This means that STE enables secure communication between different sites within the EKMS system, ensuring the confidentiality and integrity of the transmitted data. It acts as a secure gateway for communication, allowing authorized users to exchange information securely.

Submit
31. Who assesses local communications security (COMSEC) elements during "command" assessments?

Explanation

MAJCOM stands for Major Command, which is a level of command in the United States Air Force. During "command" assessments, it is the responsibility of the MAJCOM to assess local communications security (COMSEC) elements. The MAJCOM is responsible for overseeing and managing the operations of subordinate units within their command, including assessing and ensuring the security of communications.

Submit
32. Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform, users?

Explanation

The Nation Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform, users.

Submit
33. What is not true about firefly credentials?

Explanation

Firefly credentials do not have a set cryptoperiod. Cryptoperiod refers to the time period for which a cryptographic key is considered secure and should be used. This statement implies that firefly credentials do not have a predetermined time period after which they expire or become invalid.

Submit
34. As a mininum, to what classification should you mark a communication security (COMSEC) incident report when the report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised?

Explanation

When a communication security (COMSEC) incident report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised, it should be marked as CONFIDENTIAL. This classification ensures that the information is protected and only accessible to individuals with the appropriate clearance level.

Submit
35. The local management device (LMD) supports or utilizes all of the following except

Explanation

The local management device (LMD) supports or utilizes dial-up communications, encrypted keying material, and the Santa Cruz Operation (SCO) UNIX OpenServer operating system. However, it does not support or utilize unencrypted keying material. Unencrypted keying material refers to sensitive information that is not protected or secured, which can pose a security risk. Therefore, the LMD does not utilize unencrypted keying material to ensure the security of its operations.

Submit
36.final communication security (COMSEC) incident report must be submitted no later then how many days after the initial report?

Explanation

A final communication security (COMSEC) incident report must be submitted no later than 60 days after the initial report because it allows for a thorough investigation and analysis of the incident. This timeframe ensures that all relevant information is gathered and evaluated before a final report is submitted. It also allows for any necessary actions or measures to be taken to prevent similar incidents in the future.

Submit
37. Which communications security (COMSEC) tier generates, distributes, and performs account functions of all modern key, physical traditional key, and certain electronic key?

Explanation

Zero is the correct answer because the question is asking about the communications security (COMSEC) tier that handles the generation, distribution, and account functions of all modern key, physical traditional key, and certain electronic key. Zero is the highest tier in COMSEC and is responsible for managing and securing the most sensitive communications.

Submit
38. Unless directed by National Security Agency (NSA) or HQ CPSQ, how often is the electronic rekey of the firefly vector set completed?

Explanation

The correct answer is "Annually". This means that the electronic rekey of the firefly vector set is completed once a year, unless specifically instructed by the National Security Agency (NSA) or HQ CPSQ. This regular rekeying helps to maintain the security and effectiveness of the firefly vector set.

Submit
39. What term is used to describe a communication security  (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue? 

Explanation

Practice dangerous to security (PDS) is the term used to describe a communication security (COMSEC) security lapse that has the potential to jeopardize the security of COMSEC material if it is allowed to continue. This term is used to highlight the seriousness of the situation and the need for immediate action to prevent any further compromise of COMSEC material. It signifies that certain practices or behaviors are posing a significant risk to the security of communication systems and must be addressed promptly.

Submit
40. Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?

Explanation

The correct answer is TO 00-20F-2. This publication provides guidelines and instructions for the inspection and safeguarding of communications security (COMSEC) material. It specifically addresses the use of drilled and repaired security containers or vaults for storing COMSEC material after they have been inspected for their safeguarding capabilities. AFI 33-201 volume 4, Air Force Cryptologic Accounting Guide (AFKAG)-1, and AFKAG-2 do not provide specific guidance on the inspection and storage of COMSEC material in drilled and repaired security containers or vaults.

Submit
41. Which of the following is not an authorized official who may designate in writing individuals selected to perform courier duty?

Explanation

The Communications Security Account Manager (CAM) is not an authorized official who may designate individuals selected to perform courier duty. The supervisor, unit commander, and security manager have the authority to designate individuals for courier duty. However, the CAM is responsible for managing communications security accounts and ensuring compliance with security protocols, but they do not have the authority to designate individuals for courier duty.

Submit
42. Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow?

Explanation

AFKAG-2 is the correct answer because it is a COMSEC publication that provides step-by-step procedures for COMSEC personnel to follow. The other options, AFKAG-1, AFKAG-3, and AFKAG-4, do not specifically mention providing step-by-step procedures for COMSEC personnel.

Submit
43. Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts?

Explanation

The correct answer is Local communications security management software (LCMS). LCMS is used in conjunction with the key processor (KP) to generate electronic keys and transfer both physical and electronic keys to other COMSEC accounts. LCMS is specifically designed for managing communication security and ensures the secure transfer of keys between different accounts. Other options such as User application software (UAS), Common user application software (CUAS), and Card loader user application software (CLUAS) do not specifically focus on communication security management.

Submit
44. Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?

Explanation

The Air Force Network Integration Center (AFNIC)/EVPI manages the cryptographic access program (CAP) database, AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests. They are responsible for maintaining and updating these records and ensuring the security of cryptographic access within the Air Force.

Submit
45. What term is used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards?

Explanation

A COMSEC deviation refers to a communication security (COMSEC) security lapse that happens when individuals do not comply with the established instructions, procedures, or standards of COMSEC. It implies that there has been a departure from the prescribed protocols, which can potentially compromise the security of communication.

Submit
46. What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked "CRYPTO" is distributed, controlled and safeguarded?

Explanation

The correct answer is Communication security material control system (CMCS). This system is specifically designed for the distribution, control, and safeguarding of communications security (COMSEC) material that is marked as "CRYPTO." It ensures that the material is properly managed and protected to maintain the security of communications.

Submit
47. The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as

Explanation

The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as ALC-4. This suggests that ALC-4 is the correct accounting legend code for tracking and managing the CIK. It is likely that ALC-4 is specifically designated for the CIKs in the accounting system, ensuring proper documentation and control over these keys.

Submit
48. To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to 

Explanation

To determine the appropriate actions to take during the absence of the communications security account manager (CAM), one should refer to AFKAG-2. This document likely contains guidelines or procedures specifically related to the responsibilities and duties of the CAM, as well as instructions on how to handle situations when the CAM is not available. By referring to AFKAG-2, individuals can ensure that they are following the correct protocols and taking the necessary actions in the absence of the CAM.

Submit
49. Which communications security (COMSEC) management software does not allow an account to perform a semi-annual inventory?

Explanation

CUAS is a type of communications security (COMSEC) management software that does not allow an account to perform a semi-annual inventory. This means that users of CUAS cannot conduct a regular inventory of their COMSEC materials and equipment every six months. The other options, UAS, LCMS, and CLUAS, may have the capability to perform a semi-annual inventory.

Submit
50. Which type of Nation Security Agency (NSA) approved encryption devices does the local management device (LMD) use to communicate over a communications link?

Explanation

The local management device (LMD) uses Type I Nation Security Agency (NSA) approved encryption devices to communicate over a communications link. Type I encryption devices are the highest level of encryption devices approved by the NSA, providing the most secure communication. These devices are designed to protect sensitive information and ensure that unauthorized individuals cannot access or intercept the communication.

Submit
51. Which communications security (COMSEC) management software uses menus and submenus for necessary tasks?

Explanation

User application software (UAS) is the correct answer because it uses menus and submenus for necessary tasks. This type of software provides a user-friendly interface with organized menus and submenus that allow users to easily navigate and access the various functions and features of the software. This makes it convenient for managing communications security (COMSEC) as users can easily find and execute the necessary tasks related to COMSEC management.

Submit
52. When classified material is not stored in a General Service Administration (GSA)-Approved container, the facility containing the classified material must be constructed according to the requirements in DOD 5200.1R MIL HDBK 1013/1A and

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 19, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 19, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 25, 2012
    Quiz Created by
    CommV1
Cancel
  • All
    All (52)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
The information assurance assessment and assistance program (IAAP)...
What items should never be stored in the same container with COMSEC...
Which type of security clearance is not valid for personnel...
Changes that must be made to material in communication security...
When transproting bulky communication security (COMSEC) material...
How long should a communication security (COMSEC) inventory form be...
As part of a two-person control (TCP) team, you must be designated to...
What form is used to record the arrival or departure of all...
What cryptographic access program (CAP) withdrawal method is used for...
Sign the communication security (COMSEC) material destruction record
Which of the following are considered long term communications...
The front of the KOK-22A device fill connector allows interface with...
When loading the vector set for the firefly credentials and you click...
When transporting communication security (COMSEC), MAJCOM approval is...
What office assigns a tracking number to any reported communication...
Guidance for processing COMSEC material receipt reporting...
Communications security (COMSEC) clerks should inspect all protective...
What situation is ​not an authorized exception to...
Personnel at the temporary duty (TDY) location can/should verify an...
How often should communications security (COMSEC) access lists be...
The communication security physical inventory (CPI) will include all...
When removing material from a communication security physical...
All the following are requirements that must be met to be a...
Except under special circumstances, destroy communication security...
An area, room, or space which, when attended, must be occupied by two...
Which situation does not ​describe a communication...
What local communications security managemet software (LCMS) desktop...
The only authorized methods to destroy key tapes are by of the...
What classification of communication security (COMSEC) material is the...
Which device connects to the local management device (LMD) and...
Who assesses local communications security (COMSEC) elements during...
Who requires that the communications security account manager (CAM) be...
What is not true about firefly credentials?
As a mininum, to what classification should you mark a...
The local management device (LMD) supports or utilizes all of the...
A final communication security (COMSEC) incident report...
Which communications security (COMSEC) tier generates, distributes,...
Unless directed by National Security Agency (NSA) or HQ CPSQ, how...
What term is used to describe a communication security  (COMSEC)...
Drilled and repaired security containers or vaults may be used to...
Which of the following is not an authorized official who may...
Which COMSEC publication provides step-by-step procedures for COMSEC...
Which communication security (COMSEC) management software is used in...
Who manages the cryptographic access program (CAP) database for...
What term is used to describe a communication security (COMSEC)...
What is referred to as a logistic and accounting system through which...
The transit cryptographic ignition key (CIK) for the KOK-22A is...
To determine the appropriate actions to take during the absence of the...
Which communications security (COMSEC) management software does not...
Which type of Nation Security Agency (NSA) approved encryption devices...
Which communications security (COMSEC) management software uses menus...
When classified material is not stored in a General Service...
Alert!

Advertisement