CDC 3D053 Cyber Surety Journeyman Volume 3. Communications Security (Comsec)

52 Questions | Total Attempts: 606

SettingsSettingsSettings
Please wait...
Cyber Security Quizzes & Trivia

CDC 3D053 Cyber Surety Journeyman Volume 3. Communications Security (COMSEC)


Questions and Answers
  • 1. 
    (401) Which communications security (COMSEC) tier generates, distributes, and performs accounting functions of all modern key, physical traditional key, and certain electronic key?
    • A. 

      Zero.

    • B. 

      One.

    • C. 

      Two.

    • D. 

      Three.

  • 2. 
    (401) What is referred to as a logistic and accounting system through which communications security (COMSEC) material marked “CRYPTO” is distributed, controlled, and safeguarded?
    • A. 

      Electronic key management system (EKMS).

    • B. 

      Communications security material control system (CMCS).

    • C. 

      Standard base supply system (SBSS).

    • D. 

      Cryptologic systems group (CPSG).

  • 3. 
    (402) All the following are requirements that must be met to be a communications security account manager (CAM) without a waiver except
    • A. 

      Being a .U.S. citizen

    • B. 

      Meeting minimum grade requirements per Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • C. 

      Possessing a security clearance commensurate for type of material in account

    • D. 

      Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee

  • 4. 
    (402) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?
    • A. 

      Federal Aviation Administration (FAA).

    • B. 

      Cryptologic Systems Group (CPSG).

    • C. 

      National Security Agency (NSA).

    • D. 

      Major command (MAJCOM).

  • 5. 
    (402) To determine the appropriate actions to take during the absence of the communications security account manager (CAM), refer to
    • A. 

      AFI 33–201, volume 4

    • B. 

      TO 00–20F–2

    • C. 

      AFKAG–1

    • D. 

      AFKAG-2

  • 6. 
    (403) Which COMSEC publication provides step-by-step procedures for COMSEC personnel to follow?
    • A. 

      Air Force Cryptologic Accounting Guide (AFKAG)–1

    • B. 

      AFKAG–2

    • C. 

      AFKAG–3

    • D. 

      AFKAG–4

  • 7. 
    (403) Communications security (COMSEC) clerks should inspect all protective packaging for signs of tampering and report discrepancies in accordance with
    • A. 

      AFSSI 4201

    • B. 

      AFSSI 4202

    • C. 

      AFSSI 4211

    • D. 

      AFSSI 4212

  • 8. 
    404) The information assurance assessment and assistance program (IAAP) team consists of personnel experienced in all the following Air Force specialties except
    • A. 

      Security forces

    • B. 

      Information systems

    • C. 

      Information assurance

    • D. 

      Base information infrastructures

  • 9. 
    (405) Who assesses local communications security (COMSEC) elements during “command” assessments?
    • A. 

      Communications security account manager (CAM).

    • B. 

      Squadron commander

    • C. 

      Security forces

    • D. 

      MAJCOM

  • 10. 
    (406) Drilled and repaired security containers or vaults may be used to store communications security (COMSEC) material after they are inspected for safeguarding capabilities according to which publication?
    • A. 

      AFI 33–201 volume 4.

    • B. 

      TO 00–20F–2.

    • C. 

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D. 

      AFKAG–2.

  • 11. 
    (407) Which of the following are considered long term communications security (COMSEC) key storage devices?
    • A. 

      KYK–13

    • B. 

      KYX–15

    • C. 

      Simple key loader (SKL)

    • D. 

      Communications security physical inventory (CPI)

  • 12. 
    (407) What items should never be stored in the same container with COMSEC material?
    • A. 

      High theft items

    • B. 

      Cryptographic maintenance manuals

    • C. 

      Unkeyed classified COMSEC equipment

    • D. 

      Cryptographic access program (CAP) documentation

  • 13. 
    (408) What form is used to record the arrival or departure of all personnel not named on the facility authorized access list?
    • A. 

      Standard Form 701

    • B. 

      Standard Form 702

    • C. 

      Air Force Form 1109

    • D. 

      Air Force Technical Order Form 36

  • 14. 
    (409) Personnel at the temporary duty (TDY) location can/should verify an individual’s cryptographic access program (CAP) status through
    • A. 

      Two-person integrity (TPI).

    • B. 

      The communications security physical inventory (CPI).

    • C. 

      The communications security management system (CMS).

    • D. 

      The certification authority workstation (CAW).

  • 15. 
    (410) Who manages the cryptographic access program (CAP) database for AFCOMSEC Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?
    • A. 

      Air Force Network Integration Center (AFNIC)/EVPI.

    • B. 

      Unit Commander.

    • C. 

      CAP Administrator.

    • D. 

      Communications security account manager (CAM).

  • 16. 
    (410) What cryptographic access program (CAP) withdrawal method is used for personnel who are reassigned to another base or unit or to positions that do not require cryptographic access?
    • A. 

      Administrative withdrawal.

    • B. 

      Suspension.

    • C. 

      Termination.

    • D. 

      Revocation.

  • 17. 
    (411) How often should communications security (COMSEC) access lists be reviewed for accuracy and annotated?
    • A. 

      Weekly.

    • B. 

      Monthly.

    • C. 

      Quarterly.

    • D. 

      Annually.

  • 18. 
    (411) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?
    • A. 

      A final security clearance

    • B. 

      An interim security clearance.

    • C. 

      A clearance equal to the COMSEC being accessed.

    • D. 

      A clearance higher than the COMSEC being accessed.

  • 19. 
    (412) When classified material is not stored in a General Service Administration (GSA)- approved container, the facility containing the classified material must be constructed according to the requirements in DOD 5200.1–R MIL HDBK 1013/1A and
    • A. 

      Air Force Instruction (AFI) 33–201, Volume 4.

    • B. 

      Technical Order (TO) 00–20F–2.

    • C. 

      Air Force Cryptologic Accounting Guide (AFKAG)–1.

    • D. 

      AFKAG–2.

  • 20. 
    (413) When removing material from a communication security physical inventory (CPI), always
    • A. 

      Use red ink.

    • B. 

      Use green ink.

    • C. 

      Write an MFR.

    • D. 

      Use correction fluid.

  • 21. 
    (414) The communication security physical inventory (CPI) will include all of the following except
    • A. 

      Accounting legend code (ALC).

    • B. 

      Edition.

    • C. 

      Quantity.

    • D. 

      Short title.

  • 22. 
    (414) How long should a communication security (COMSEC) inventory form be retained?
    • A. 

      Current month only.

    • B. 

      Past six months only.

    • C. 

      Past six months plus the current month.

    • D. 

      Based upon local guidance at each installation.

  • 23. 
    (415) Changes that must be made to material in communication security (COMSEC) publications are called
    • A. 

      Modifications.

    • B. 

      Amendments.

    • C. 

      Corrections.

    • D. 

      Updates.

  • 24. 
    (416) Except under special circumstances, destroy communication security (COMSEC) keying material designated CRYPTO as soon as possible but no later than how many hours after supersession?
    • A. 

      Eight.

    • B. 

      Twelve.

    • C. 

      Twenty-four.

    • D. 

      Forty-eight.

  • 25. 
    (416) The only authorized methods to destroy key tapes are by any of the following methods except
    • A. 

      Disintegrating.

    • B. 

      Pulverizing.

    • C. 

      Shredding.

    • D. 

      Burning.