1.
(401) Which communications security (COMSEC) tier generates, distributes, and performs
accounting functions of all modern key, physical traditional key, and certain electronic
key?
A. 
B. 
C. 
D. 
2.
(401) What is referred to as a logistic and accounting system through which
communications security (COMSEC) material marked “CRYPTO” is distributed,
controlled, and safeguarded?
A. 
Electronic key management system (EKMS).
B. 
Communications security material control system (CMCS).
C. 
Standard base supply system (SBSS).
D. 
Cryptologic systems group (CPSG).
3.
(402) All the following are requirements that must be met to be a communications security
account manager (CAM) without a waiver except
A. 
B. 
Meeting minimum grade requirements per Air Force Cryptologic Accounting Guide
(AFKAG)–1.
C. 
Possessing a security clearance commensurate for type of material in account
D. 
Being a 33XX officer, a 3D053 or 3D000 NCO, or 301, 391 or 2210 civilian employee
4.
(402) Who requires that the communications security account manager (CAM) be formally
trained to certify the training of local management device/key processor (LMD/KP)
platform users?
A. 
Federal Aviation Administration (FAA).
B. 
Cryptologic Systems Group (CPSG).
C. 
National Security Agency (NSA).
D. 
5.
(402) To determine the appropriate actions to take during the absence of the
communications security account manager (CAM), refer to
A. 
B. 
C. 
D. 
6.
(403) Which COMSEC publication provides step-by-step procedures for COMSEC
personnel to follow?
A. 
Air Force Cryptologic Accounting Guide (AFKAG)–1
B. 
C. 
D. 
7.
(403) Communications security (COMSEC) clerks should inspect all protective packaging
for signs of tampering and report discrepancies in accordance with
A. 
B. 
C. 
D. 
8.
404) The information assurance assessment and assistance program (IAAP) team consists
of personnel experienced in all the following Air Force specialties except
A. 
B. 
C. 
D. 
Base information infrastructures
9.
(405) Who assesses local communications security (COMSEC) elements during
“command” assessments?
A. 
Communications security account manager (CAM).
B. 
C. 
D. 
10.
(406) Drilled and repaired security containers or vaults may be used to store
communications security (COMSEC) material after they are inspected for safeguarding
capabilities according to which publication?
A. 
B. 
C. 
Air Force Cryptologic Accounting Guide (AFKAG)–1.
D. 
11.
(407) Which of the following are considered long term communications security
(COMSEC) key storage devices?
A. 
B. 
C. 
D. 
Communications security physical inventory (CPI)
12.
(407) What items should never be stored in the same container with COMSEC material?
A. 
B. 
Cryptographic maintenance manuals
C. 
Unkeyed classified COMSEC equipment
D. 
Cryptographic access program (CAP) documentation
13.
(408) What form is used to record the arrival or departure of all personnel not named on
the facility authorized access list?
A. 
B. 
C. 
D. 
Air Force Technical Order Form 36
14.
(409) Personnel at the temporary duty (TDY) location can/should verify an individual’s
cryptographic access program (CAP) status through
A. 
Two-person integrity (TPI).
B. 
The communications security physical inventory (CPI).
C. 
The communications security management system (CMS).
D. 
The certification authority workstation (CAW).
15.
(410) Who manages the cryptographic access program (CAP) database for AFCOMSEC
Form 9, Cryptographic Access Certificates, account update lists, and polygraph tests?
A. 
Air Force Network Integration Center (AFNIC)/EVPI.
B. 
C. 
D. 
Communications security account manager (CAM).
16.
(410) What cryptographic access program (CAP) withdrawal method is used for personnel
who are reassigned to another base or unit or to positions that do not require
cryptographic access?
A. 
Administrative withdrawal.
B. 
C. 
D. 
17.
(411) How often should communications security (COMSEC) access lists be reviewed for
accuracy and annotated?
A. 
B. 
C. 
D. 
18.
(411) Which type of security clearance is not valid for personnel on a communications
security (COMSEC) access list?
A. 
A final security clearance
B. 
An interim security clearance.
C. 
A clearance equal to the COMSEC being accessed.
D. 
A clearance higher than the COMSEC being accessed.
19.
(412) When classified material is not stored in a General Service Administration (GSA)-
approved container, the facility containing the classified material must be constructed
according to the requirements in DOD 5200.1–R MIL HDBK 1013/1A and
A. 
Air Force Instruction (AFI) 33–201, Volume 4.
B. 
Technical Order (TO) 00–20F–2.
C. 
Air Force Cryptologic Accounting Guide (AFKAG)–1.
D. 
20.
(413) When removing material from a communication security physical inventory (CPI),
always
A. 
B. 
C. 
D. 
21.
(414) The communication security physical inventory (CPI) will include all of the
following except
A. 
Accounting legend code (ALC).
B. 
C. 
D. 
22.
(414) How long should a communication security (COMSEC) inventory form be
retained?
A. 
B. 
C. 
Past six months plus the current month.
D. 
Based upon local guidance at each installation.
23.
(415) Changes that must be made to material in communication security (COMSEC)
publications are called
A. 
B. 
C. 
D. 
24.
(416) Except under special circumstances, destroy communication security (COMSEC)
keying material designated CRYPTO as soon as possible but no later than how many
hours after supersession?
A. 
B. 
C. 
D. 
25.
(416) The only authorized methods to destroy key tapes are by any of the following
methods except
A. 
B. 
C. 
D.