CDC 3D053 Cyber Surety Journeyman Volume 3. Communications Security (Comsec)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Bmx41992
B
Bmx41992
Community Contributor
Quizzes Created: 3 | Total Attempts: 1,426
| Attempts: 714 | Questions: 52
Please wait...
Question 1 / 52
0 %
0/100
Score 0/100
1. (415) Changes that must be made to material in communication security (COMSEC) publications are called

Explanation

Amendments refer to changes that must be made to material in communication security (COMSEC) publications. They are used to update and modify the content of these publications. Corrections, on the other hand, typically refer to fixing errors or mistakes, while updates generally imply bringing information up to date. Therefore, amendments best describe the changes made to COMSEC publications.

Submit
Please wait...
About This Quiz
CDC 3D053 Cyber Surety Journeyman Volume 3. Communications Security (Comsec) - Quiz

This CDC 3D053 Cyber Surety Journeyman Volume 3 quiz focuses on Communications Security (COMSEC), including key generation, distribution, accounting, and safeguarding. It assesses understanding of systems like CMCS and roles such as the Communications Security Account Manager (CAM).

2. (420) When transporting bulky communication security (COMSEC) material through airlines, you may leave COMSEC material unattended

Explanation

COMSEC material is highly sensitive and should never be left unattended, regardless of the circumstances. This is to ensure the security and protection of the material from unauthorized access or theft. Leaving it unattended increases the risk of compromising the confidentiality and integrity of the communication systems it is meant to protect. Therefore, it is crucial to always keep COMSEC material under constant supervision and control.

Submit
3. (411) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?

Explanation

An interim security clearance is not valid for personnel on a communications security (COMSEC) access list because it is a temporary clearance given to individuals who need access to classified information while their full security clearance is being processed. Since COMSEC access involves highly sensitive information, only individuals with a final security clearance, which is a permanent clearance, are allowed access.

Submit
4. (417) Sign the communication security (COMSEC) material destruction record

Explanation

The correct answer is "immediately after the material is destroyed." This is because signing the communication security (COMSEC) material destruction record immediately after the material is destroyed ensures that the record accurately reflects the destruction and prevents any potential tampering or manipulation of the record. By signing immediately after destruction, it provides a clear and timely documentation of the destruction process.

Submit
5. (407) What items should never be stored in the same container with COMSEC material?

Explanation

High theft items should never be stored in the same container with COMSEC material because it could increase the risk of theft or unauthorized access to the sensitive information. COMSEC material includes cryptographic keys and equipment used to encrypt and protect classified information. Storing high theft items, which are likely to attract attention and theft, with COMSEC material could compromise the security and confidentiality of the information.

Submit
6. 404) The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following Air Force specialties except

Explanation

The IAAP team consists of personnel experienced in all Air Force specialties except security forces. This means that the team includes individuals with expertise in information systems, information assurance, and base information infrastructures. The security forces specialty is not part of the IAAP team.

Submit
7. (407) Which of the following are considered long term communications security (COMSEC) key storage devices?

Explanation

The Simple Key Loader (SKL) is considered a long-term Communications Security (COMSEC) key storage device. It is a portable electronic device used to load cryptographic keys into various communication equipment. The SKL securely stores and manages cryptographic keys, ensuring their confidentiality and integrity. It is designed for long-term use and is commonly used by military and government organizations to protect sensitive information during communications.

Submit
8.   (409) Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through

Explanation

Personnel at the temporary duty (TDY) location can/should verify an individual's cryptographic access program (CAP) status through the communications security management system (CMS). The CMS is responsible for managing and controlling access to cryptographic materials and systems. It maintains records of individuals authorized to have access to these materials and systems, including their CAP status. By checking the CMS, personnel at the TDY location can ensure that an individual's CAP status is valid and up-to-date. This helps to maintain the security and integrity of cryptographic materials and systems.

Submit
9. (414) The communication security physical inventory (CPI) will include all of the following except

Explanation

The communication security physical inventory (CPI) is a process that involves conducting a physical count of all communication security (COMSEC) material to ensure accuracy and accountability. The CPI includes verifying the edition of the material, the quantity of items present, and their short title or description. However, the accounting legend code (ALC) is not included in the CPI. The ALC is a code used to track and categorize COMSEC material for accounting purposes, but it is not part of the physical inventory process.

Submit
10. (414) How long should a communication security (COMSEC) inventory form be retained?

Explanation

The correct answer is "Past six months plus the current month." This means that a communication security (COMSEC) inventory form should be retained for a period of six months, including the current month. This ensures that there is a record of the inventory for a sufficient amount of time, allowing for any necessary audits or reviews to take place.

Submit
11. (430) The front of the KOK–22A device fill connector allows interface with which type of file devices?

Explanation

The front of the KOK-22A device fill connector allows interface with both DS-101 and DS-102 type of file devices.

Submit
12. (410) What cryptographic access program (CAP) withdrawal method is used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access?

Explanation

Administrative withdrawal is the cryptographic access program (CAP) withdrawal method used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access. This means that their access to cryptographic materials and systems is removed due to administrative reasons, such as a change in their job responsibilities or location. This withdrawal method does not involve any negative actions or penalties, but rather a simple adjustment to their access privileges based on their new role or assignment.

Submit
13. (418) As part of a two-person control (TPC) team, you must be designated to handle communication security (COMSEC) material under the

Explanation

The correct answer is "personnel reliability program (PRP)." In a two-person control (TPC) team, one person is designated to handle communication security (COMSEC) material. This responsibility falls under the personnel reliability program (PRP), which ensures that individuals with access to sensitive information or materials are trustworthy and reliable. The other options, sealed authenticator systems (SAS), permissive action link (PAL), and coded switch system (CSS), are not directly related to the handling of COMSEC material in a TPC team.

Submit
14. (402) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?

Explanation

The National Security Agency (NSA) requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users.

Submit
15. (408) What form is used to record the arrival or departure of all personnel not named on the facility authorized access list?

Explanation

Air Force Form 1109 is used to record the arrival or departure of all personnel not named on the facility authorized access list. This form is specific to the Air Force and is used to ensure proper documentation and tracking of personnel entering or leaving a facility. It helps maintain security and accountability by keeping a record of individuals who are not authorized to access the facility.

Submit
16. (416) Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession?

Explanation

The correct answer is twelve. Under normal circumstances, communication security (COMSEC) keying material designated CRYPTO should be destroyed as soon as possible but no later than twelve hours after supersession. This ensures that the old key material is no longer used, preventing unauthorized access to sensitive information.

Submit
17. (423) Guidance for processing COMSEC material receipt reporting discrepancies can be found in

Explanation

The correct answer is AFSSI 4212 and AFKAG–2. This can be determined by carefully reading the question and identifying the correct sources for guidance on processing COMSEC material receipt reporting discrepancies.

Submit
18. (411) How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?

Explanation

COMSEC access lists should be reviewed for accuracy and annotated on a monthly basis. This ensures that any changes or updates to the access lists are promptly made, reducing the risk of unauthorized access to sensitive information. Regular reviews also help to identify any discrepancies or anomalies in the access lists, allowing for timely corrective actions to be taken. Reviewing the access lists monthly strikes a balance between frequent checks and practicality, ensuring that any necessary adjustments are made in a timely manner.

Submit
19. (421) When transporting communication security (COMSEC), MAJCOM approval is required when traveling

Explanation

MAJCOM approval is required when transporting communication security (COMSEC) via non-U.S. flag airlines. This means that if COMSEC is being transported on an airline that is not registered in the United States, approval from the major command (MAJCOM) is necessary. This ensures that appropriate security measures are in place and that the transportation of COMSEC is conducted in a manner that aligns with national security protocols.

Submit
20. (423) What office assigns a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy?

Explanation

The correct answer is HQ AFNIC/EVIC. The HQ AFNIC/EVIC office is responsible for assigning a tracking number to any reported communication security (COMSEC) material receipt reporting discrepancy. This office ensures that all reported discrepancies are properly documented and tracked for resolution.

Submit
21. (403) Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with

Explanation

not-available-via-ai

Submit
22. (402) All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except

Explanation

To be a communications security account manager (CAM) without a waiver, all the requirements mentioned must be met except for being a 33XX officer, a 3D053 or 3D000 NCO, or a 301, 391 or 2210 civilian employee. The other requirements include being a U.S. citizen, meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1, and possessing a security clearance commensurate for the type of material in the account.

Submit
23. (426) What local communications security management software (LCMS) desktop function provides a user with the ability to securely pass information and/or transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts?

Explanation

Direct Comms is a local communications security management software (LCMS) desktop function that allows users to securely pass information and transfer electronic key management system (EKMS) messages/keys directly to other EKMS accounts. This feature ensures the secure and efficient transfer of sensitive information within the EKMS system.

Submit
24. (413) When removing material from a communication security physical inventory (CPI), always

Explanation

When removing material from a communication security physical inventory (CPI), it is recommended to use red ink. This is because red ink stands out and is easily noticeable, making it easier to track and identify any changes or modifications made to the inventory. Additionally, using red ink helps to ensure that any updates or adjustments are clearly visible and can be easily distinguished from the original entries.

Submit
25. (416) The only authorized methods to destroy key tapes are by any of the following methods except

Explanation

The question asks for the only authorized methods to destroy key tapes, excluding one method. The options provided are disintegrating, pulverizing, shredding, and burning. The correct answer is shredding, as it is not an authorized method to destroy key tapes.

Submit
26. (425) As a minimum, to what classification should you mark a communication security (COMSEC) incident report when the report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised?

Explanation

When a communication security (COMSEC) incident report reveals effective dates of classified keying material, enough information to determine the effective date, or material suspected of being compromised, it should be marked as CONFIDENTIAL. This classification indicates that the information is sensitive and could cause damage or harm if disclosed, but it is not as highly classified as SECRET or TOP SECRET. The classification of For Official Use Only is used for information that is sensitive but does not meet the criteria for higher classifications.

Submit
27. (419) What situation is not an authorized exception to two-person integrity (TPI) requirements?

Explanation

Two-person integrity (TPI) requirements are in place to ensure the security and accountability of sensitive materials. TPI requires that two authorized individuals be present at all times when handling certain materials. The exception to this requirement is when handling unopened National Security Agency (NSA) protective packaged material, communication security (COMSEC) material used in tactical situations, and unopened packages received from or in the custody of the Defense Courier Division (DCD). However, COMSEC material handled in minimum manning situations is not an authorized exception to TPI requirements. This means that even in situations where there is minimal staff available, TPI must still be maintained when handling COMSEC material.

Submit
28. (422) What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?

Explanation

A "Practice dangerous to security (PDS)" is used to describe a communication security (COMSEC) security lapse that has the potential to jeopardize the security of COMSEC material if it continues. This term is used to highlight the seriousness of the situation and the need for immediate action to prevent any further compromise of COMSEC material.

Submit
29.  (432) Unless directed by National Security Agency (NSA) or HQ CPSQ, how often is the electronic rekey of the firefly vector set completed?

Explanation

The correct answer is annually. This means that the electronic rekey of the firefly vector set is completed once a year, unless specifically instructed by the National Security Agency (NSA) or HQ CPSQ.

Submit
30. (405) Who assesses local communications security (COMSEC) elements during "command" assessments?

Explanation

MAJCOM, or Major Command, assesses local communications security (COMSEC) elements during "command" assessments. This suggests that MAJCOM is responsible for evaluating the effectiveness and compliance of COMSEC measures within a command. The other options, such as the communications security account manager (CAM), squadron commander, and security forces, may have roles related to COMSEC but are not specifically mentioned in the context of conducting assessments.

Submit
31. (428) What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?

Explanation

The local management device (LMD) is designed to support and process SECRET classification of communication security (COMSEC) material.

Submit
32. (428) The local management device (LMD) supports or utilizes all of the following except

Explanation

The local management device (LMD) supports or utilizes dial-up communications, encrypted keying material, and the Santa Cruz Operation (SCO) UNIX OpenServer operating system. However, it does not support or utilize unencrypted keying material.

Submit
33. (433) When loading the vector set for the firefly credentials and you click on "Load EKMS Vector Set", what should immediately happen?

Explanation

not-available-via-ai

Submit
34.     (427) Which device connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture?

Explanation

Secure terminal equipment (STE) connects to the local management device (LMD) and provides secure direct communications capabilities between sites in the electronic key management system (EKMS) architecture. STE ensures the secure transfer of sensitive data and encryption keys between different sites, allowing for secure communication and management of encryption keys in the EKMS system.

Submit
35. (401) Which communications security (COMSEC) tier generates, distributes, and performs accounting functions of all modern key, physical traditional key, and certain electronic key?

Explanation

Zero is the correct answer because it refers to the highest level of communications security (COMSEC) tier. This tier is responsible for generating, distributing, and performing accounting functions for all modern key, physical traditional key, and certain electronic key.

Submit
36. (424) Which situation does not describe a communication security (COMSEC) cryptographic incident?

Explanation

not-available-via-ai

Submit
37. (434) Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts?

Explanation

The correct answer is Local communications security management software (LCMS). LCMS is used in conjunction with the key processor (KP) to generate electronic key as well as transfer physical and electronic keys to other COMSEC accounts.

Submit
38. (419) An area, room, or space which, when attended, must be occupied by two or more appropriately cleared individuals who remain within sight of each other is called a communication security (COMSEC)

Explanation

A "no-lone zone" refers to an area, room, or space where two or more individuals who have been appropriately cleared must be present and remain within sight of each other. This measure is taken to ensure communication security and prevent any unauthorized access or tampering with sensitive information or equipment. The term "no-lone zone" emphasizes the importance of having multiple individuals present to maintain security and accountability.

Submit
39. (435) Which communications security (COMSEC) management software uses menus and submenus for necessary tasks?

Explanation

LCMS is the correct answer because it is a type of communications security (COMSEC) management software that uses menus and submenus for necessary tasks. This software is typically used at a local level to manage and secure communications within a specific area or organization. It provides users with a user-friendly interface that allows them to navigate through different options and perform the necessary tasks related to COMSEC management.

Submit
40. (406) Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?

Explanation

not-available-via-ai

Submit
41. (403) Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow?

Explanation

The correct answer is AFKAG–2. This publication provides step-by-step procedures for COMSEC personnel to follow.

Submit
42. (432) What is not true about firefly credentials?

Explanation

Firefly credentials do not have a set cryptoperiod. This means that they do not have a predetermined lifespan or validity period. Unlike other credentials, such as certificates, which have a specific expiration date, firefly credentials do not expire. They are valid indefinitely from the creation date and do not require renewal or reissuance. Firefly credentials are used for successful key exchange and do not have a fixed time frame in which they are valid.

Submit
43. (425) A final communication security (COMSEC) incident report must be submitted no later than how many days after the initial report?

Explanation

A final communication security (COMSEC) incident report must be submitted no later than 60 days after the initial report because it allows for a thorough investigation and analysis of the incident. This timeframe ensures that all relevant information is collected and reviewed before the final report is submitted. Additionally, it allows for any necessary corrective actions to be taken to prevent similar incidents in the future.

Submit
44. (402) To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to

Explanation

The correct answer is AFKAG-2. This is because AFKAG-2 is likely a document or reference that provides guidance on the appropriate actions to take during the absence of the communications security account manager (CAM). AFI 33–201, volume 4 is a document that provides guidance on communications security, but it may not specifically address actions to take during the absence of the CAM. TO 00–20F–2 is a technical order that may not be relevant to this specific situation. AFKAG–1 is not mentioned in the question and therefore cannot be determined as the correct answer.

Submit
45. (431) The transit cryptographic ignition key (CIK) for the KOK–22A is created at the depot and is accounted for as

Explanation

The transit cryptographic ignition key (CIK) for the KOK-22A is created at the depot and is accounted for as ALC-4.

Submit
46. (420) Which of the following is not an authorized official who may designate in writing individuals selected to perform courier duty?

Explanation

The Communications Security Account Manager (CAM) is not an authorized official who may designate individuals to perform courier duty. The other options, such as the supervisor, unit commander, and security manager, have the authority to designate individuals for courier duty. However, the CAM's role is focused on managing communications security accounts and is not directly related to courier duties.

Submit
47. (422) What term is used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards?

Explanation

A COMSEC deviation is the term used to describe a communication security (COMSEC) security lapse that occurs when people fail to follow established COMSEC instructions, procedures, or standards. It refers to any action or behavior that deviates from the established protocols and guidelines for ensuring secure communication. This can include unauthorized disclosure of sensitive information, improper handling of cryptographic material, or failure to implement proper security measures. A COMSEC deviation indicates a breach in security protocols and highlights the importance of adhering to established procedures to maintain the confidentiality and integrity of communication systems.

Submit
48.     (410) Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?

Explanation

The Air Force Network Integration Center (AFNIC)/EVPI manages the cryptographic access program (CAP) database for AFCOMSEC. This includes managing Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests. The AFNIC/EVPI is responsible for ensuring the security and proper management of cryptographic access within the Air Force, making them the correct answer for this question.

Submit
49. (435) Which communications security (COMSEC) management software does not allow an account to perform a semi-annual inventory?

Explanation

CUAS stands for Common User Application Software. This software does not allow an account to perform a semi-annual inventory. This means that the CUAS does not have the capability to conduct inventory checks on a semi-annual basis. The other options, UAS, LCMS, and CLUAS, do not specify whether they allow or disallow a semi-annual inventory, so they cannot be determined as the correct answer based on the given information.

Submit
50. (401) What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked "CRYPTO" is distributed, controlled, and safeguarded?

Explanation

not-available-via-ai

Submit
51. (429) Which type of National Security Agency (NSA) approved encryption device does the local management device (LMD) use to communicate over a communications link?

Explanation

The local management device (LMD) uses a Type I National Security Agency (NSA) approved encryption device to communicate over a communications link. Type I encryption devices are the highest level of encryption approved by the NSA and are used for securing classified information.

Submit
52. (412) When classified material is not stored in a General Service Administration (GSA)- approved container, the facility containing the classified material must be constructed according to the requirements in DOD 5200.1–R MIL HDBK 1013/1A and

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 01, 2012
    Quiz Created by
    Bmx41992
Cancel
  • All
    All (52)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
(415) Changes that must be made to material in communication security...
(420) When transporting bulky communication security (COMSEC) material...
(411) Which type of security clearance is not valid for personnel on a...
(417) Sign the communication security (COMSEC) material destruction...
(407) What items should never be stored in the same container with...
404) The information assurance assessment and assistance program...
(407) Which of the following are considered long term communications...
  ...
(414) The communication security physical inventory (CPI) will include...
(414) How long should a communication security (COMSEC) inventory form...
(430) The front of the KOK–22A device fill connector allows...
(410) What cryptographic access program (CAP) withdrawal method is...
(418) As part of a two-person control (TPC) team, you must be...
(402) Who requires that the communications security account manager...
(408) What form is used to record the arrival or departure of all...
(416) Except under special circumstances, destroy communication...
(423) Guidance for processing COMSEC material receipt reporting...
(411) How often should communications security (COMSEC) access lists...
(421) When transporting communication security (COMSEC), MAJCOM...
(423) What office assigns a tracking number to any reported...
(403) Communications security (COMSEC) clerks should inspect all...
(402) All the following are requirements that must be met to be a...
(426) What local communications security management software (LCMS)...
(413) When removing material from a communication security physical...
(416) The only authorized methods to destroy key tapes are by any of...
(425) As a minimum, to what classification should you mark a...
(419) What situation is not an authorized exception to two-person...
(422) What term is used to describe a communication security (COMSEC)...
 (432) Unless directed by National Security Agency (NSA) or HQ...
(405) Who assesses local communications security (COMSEC) elements...
(428) What classification of communication security (COMSEC) material...
(428) The local management device (LMD) supports or utilizes all of...
(433) When loading the vector set for the firefly credentials and you...
  ...
(401) Which communications security (COMSEC) tier generates,...
(424) Which situation does not describe a communication security...
(434) Which communication security (COMSEC) management software is...
(419) An area, room, or space which, when attended, must be occupied...
(435) Which communications security (COMSEC) management software uses...
(406) Drilled and repaired security containers or vaults may be used...
(403) Which COMSEC publication provides step-by-step procedures for...
(432) What is not true about firefly credentials?
(425) A final communication security (COMSEC) incident report must be...
(402) To determine the appropriate actions to take during the absence...
(431) The transit cryptographic ignition key (CIK) for the...
(420) Which of the following is not an authorized official who may...
(422) What term is used to describe a communication security (COMSEC)...
  ...
(435) Which communications security (COMSEC) management software does...
(401) What is referred to as a logistic and accounting system through...
(429) Which type of National Security Agency (NSA) approved encryption...
(412) When classified material is not stored in a General Service...
Alert!

Advertisement