Z3d053 Ure Vol2

85 Questions | Attempts: 167
Please wait...
Question 1 / 86
🏆 Rank #--
Score 0/100

1. 23. (210) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?

Submit
Please wait...
About This Quiz
Management Quizzes & Trivia

.

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. 31. (214) What type of communications security (COMSEC) incident is any loss of control, theft, capture, recovery by salvage, tampering, unauthorized viewing, access, or photographing that has the potential to jeopardize COMSEC material?

Submit

3. 48. (220) Sign the communication security (COMSEC) material destruction record

Submit

4. 78. (235) What comm kit type do you build for emergency war orders (EWO)?

Submit

5. 6. (202) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?

Submit

6. 11. (205) Who performs the semiannual inspections and audits on the base communications security (COMSEC) account?

Submit

7. 19. (209) Which of the following requirements would make a person ineligible for the cryptographic access program (CAP)?

Submit

8. 24. (210) How often should communications security (COMSEC) access lists be reviewed for accuracy?

Submit

9. 26. (211) At a minimum, how often must you review the communications security (COMSEC) access list?

Submit

10. 28. (212) What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?

Submit

11. 37. (216) When removing material from a communication security physical inventory (CPI), always annotate it by

Submit

12. 38. (217) When you create a communication security physical inventory (CPI), you will need to include all of the following information except

Submit

13. 39. (217) When you are sealing a package containing communications security (COMSEC) material where do you place your initials?

Submit

14. 41. (218) Changes that must be made to material in communication security (COMSEC) publications are called

Submit

15. 44. (219) Who may destroy communications security (COMSEC) material?

Submit

16. 71. (233) Who provides formal classroom training to instruct aircrews on how to establish and maintain communications?

Submit

17. 10. (204) When a unit receives an unsatisfactory rating on a communications security (COMSEC) inspection, the wing will reassess the unit within how many days?

Submit

18. 18. (208) Which form do you use to record the arrival or departure of all personnel not named on the facility authorized access list?

Submit

19. 22. (209) Who is responsible for overseeing the cryptographic access program (CAP) and providing written local procedures to the CAP administrator?

Submit

20. 30. (214) What type of incident includes the unauthorized disclosure of communications security (COMSEC) information or material?

Submit

21. 34. (215) The rank requirement for an inquiry officer includes all of these except

Submit

22. 35. (215) Who completes an initial report for each communications security (COMSEC) incident?

Submit

23. 64. (229) The front of the KOK–22A device fill connector allows interface with which type of file devices?

Submit

24. 2. (201) What allows one electronic key management system (EKMS) element to pass required information to another EKMS element enabling both elements to generate the same key session?

Submit

25. 4. (201) Who assists the communications security account manager (CAM) with day-to-day administration and maintenance of accounting records for communications security (COMSEC) material?

Submit

26. 12. (205) How often does the communications security account manager (CAM) perform an assessment on the communications security responsible officer (CRO) communication security (COMSEC) account?

Submit

27. 13. (206) Qualified personnel perform preventative maintenance and security inspections on safes and vaults every

Submit

28. 54. (223) When you are performing courier duties and transporting bulky communication security (COMSEC) material through the airlines, when is it acceptable to leave the COMSEC material unattended?

Submit

29. 76. (235) Who is responsible for building, issuing, and recovering comm kits?

Submit

30. 16. (208) Which form do you use to document and annotate opening, closing, and checking of any GSA-approved security container?

Submit

31. 1. (201) What is a collection of interoperable systems developed for the services and government agencies to automate handling and management of communications security (COMSEC) material?

Submit

32. 8. (203) Who assists the communications security account manager (CAM) in his or her day-to-day duties?

Submit

33. 15. (207) For accountability purposes, store short-term keyed devices in an approved container and account for the devices on a

Submit

34. 47. (220) What form serves as the destruction certificate for communication security (COMSEC) material?

Submit

35. 50. (221) Two-person integrity (TPI) is the storage and handling system that prohibits access by any single person to what classification of communications security (COMSEC) material?

Submit

36. 63. (228) How often must local communications management software (LCMS) audit data be reviewed?

Submit

37. 65. (229) On the back of the KOK–22A, which interface allows you to connect the serial input/output (I/O) port of the key processor (KP) to the serial I/O port of the controlling computer?

Submit

38. 20. (209) Those not eligible to be enrolled in the cryptographic access program (CAP) are personnel

Submit

39. 79. (235) Comm kits are normally contained in

Submit

40. 84. (236) What type of change notice is not scheduled and is only published as required to provide amendments for safety and flight information?

Submit

41. 7. (202) Who must sign all communications security manager (CAM) waivers?

Submit

42. 9. (204) Wing information assurance (IA) assessments are generally conducted every

Submit

43. 33. (215) Within how many hours from the time a communications security (COMSEC) incident is discovered must a commander appoint an inquiry officer?

Submit

44. 36. (215) A communications security account manager (CAM) submits an amplifying report every how many days until the final report is submitted?

Submit

45. 42. (218) How many people are required to complete page replacements in unclassified communication security (COMSEC) publications?

Submit

46. 43. (219) Who requests disposition instructions for communications security (COMSEC) material?

Submit

47. 55. (224) How many times do you wrap communications security (COMSEC) material prior to transportation?

Submit

48. 58. (226) Which statement is not accurate regarding firefly credentials?

Submit

49. 17. (208) Which form do you use to document when a safe or vault is put into use?

Submit

50. 25. (210) At the base level, who initials the communications security (COMSEC) access list?

Submit

51. 27. (212) What is the term used to identify the highest level of security lapse in handling communications security (COMSEC)?

Submit

52. 51. (221) What provides the special protection of Top Secret (TS) communications security (COMSEC) material that is needed to help prevent otherwise avoidable problems from happening?

Submit

53. 72. (233) What squadron are Combat Crew Communications (CCC) units assigned to?

Submit

54. 73. (234) Combat Crew Communications (CCC) Level 2 certification ensures personnel are qualified to support

Submit

55. 83. (236) Flight Information Handbooks (FIH) are issued every

Submit

56. 14. (206) Which form is used to document the highest level classification of a security container?

Submit

57. 29. (213) When an error or anomaly is detected upon receipt/inspection of communications security (COMSEC) material, who sends a message to DIRNSA/I31132?

Submit

58. 32. (215) Report communications security (COMSEC) deviations and incidents immediately to all of these personnel except

Submit

59. 3. (201) Who appoints a communications security responsible officer (CRO) to support a unit’s communications security (COMSEC) mission?

Submit

60. 53. (222) How many people are required to transport Top Secret (TS) keying material (KEYMAT) sealed in National Security Agency (NSA) protective packaging?

Submit

61. 57. (225) What local communications security management software (LCMS) desktop function provides a user with the ability to securely pass information and/or transfer Electronic Key Management System (EKMS) messages/keys directly to other EKMS accounts?

Submit

62. 81. (236) Flight Information Publications (FLIP) are divided into how many geographical regions?

Submit

63. 59. (226) The simple key loader (SKL) is the replacement for which device?

Submit

64. 5. (201) Who is responsible for identifying cryptonet members?

Submit

65. 66. (230) What is the classification of magnetic media used to transport encrypted key?

Submit

66. 75. (234) Which code helps the Air Force identify special experience and training?

Submit

67. 82. (236) Which documents are designed to provide aircrews with information on radio navigation, departure, airway structure, approach and landing information?

Submit

68. 46. (219) Which is not an authorized method to destroy key tapes?

Submit

69. 52. (222) How many people must unwrap the inner wrapper of a top secret (TS) crypto package?

Submit

70. 56. (224) Which method is not used to complete a bulk encrypted transaction (BET)?

Submit

71. 74. (234) Once entered into Combat Crew Communications (CCC) Level 1 certification training, how long does an active duty technician have to complete certification?

Submit

72. 80. (236) Which is not a flight phase that Flight Information Publications (FLIP) are aligned with?

Submit

73. 85. (236) Which squadron commander must be notified before outdated Flight Information Publications (FLIP) information is issued?

Submit

74. 61. (227) The local management device (LMD) supports or utilizes all of the following except

Submit

75. 70. (232) Which communications security (COMSEC) management software does not allow an account to perform a semiannual inventory?

Submit

76. 45. (219) Which is not an authorized method for routinely destroying paper communications security (COMSEC) aids?

Submit

77. 60. (227) What classification of communication security (COMSEC) material is the local management device (LMD) designed to support and process?

Submit

78. 77. (235) Of the four types of comm kits you can build, which one includes the coverage period of the mission plus 3 days?

Submit

79. 40. (217) How often must a communications security account manager (CAM) review the communications security (COMSEC) physical inventory?

Submit

80. 21. (209) Who appoints a cryptographic access program (CAP) administrator?

Submit

81. 67. (231) Which communication security (COMSEC) management software is used in conjunction with the key processor (KP) to generate electronic keys as well as transfer physical and electronic keys to other COMSEC accounts?

Submit

82. 49. (220) What is the classification of the Standard Form (SF) 153 when the disposition record card (DRC) is attached?

Submit

83. 68. (231) Which communication security (COMSEC) management software allows a user to view the exact location of any COMSEC item held by the local account or a local element?

Submit

84. 69. (232) Which communications security (COMSEC) management software uses menus and submenus for necessary tasks?

Submit

85. 62. (228) Which type of National Security Agency (NSA)-approved encryption device does the local management device (LMD) use to communicate over a communications link?

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (85)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
23. (210) Which type of security clearance is not valid for personnel...
31. (214) What type of communications security (COMSEC) incident is...
48. (220) Sign the communication security (COMSEC) material...
78. (235) What comm kit type do you build for emergency war orders...
6. (202) Who requires that the communications security account manager...
11. (205) Who performs the semiannual inspections and audits on the...
19. (209) Which of the following requirements would make a person...
24. (210) How often should communications security (COMSEC) access...
26. (211) At a minimum, how often must you review the communications...
28. (212) What term is used to describe a communication security...
37. (216) When removing material from a communication security...
38. (217) When you create a communication security physical inventory...
39. (217) When you are sealing a package containing communications...
41. (218) Changes that must be made to material in communication...
44. (219) Who may destroy communications security (COMSEC) material?
71. (233) Who provides formal classroom training to instruct aircrews...
10. (204) When a unit receives an unsatisfactory rating on a...
18. (208) Which form do you use to record the arrival or departure of...
22. (209) Who is responsible for overseeing the cryptographic access...
30. (214) What type of incident includes the unauthorized disclosure...
34. (215) The rank requirement for an inquiry officer includes all of...
35. (215) Who completes an initial report for each communications...
64. (229) The front of the KOK–22A device fill connector allows...
2. (201) What allows one electronic key management system (EKMS)...
4. (201) Who assists the communications security account manager (CAM)...
12. (205) How often does the communications security account manager...
13. (206) Qualified personnel perform preventative maintenance and...
54. (223) When you are performing courier duties and transporting...
76. (235) Who is responsible for building, issuing, and recovering...
16. (208) Which form do you use to document and annotate opening,...
1. (201) What is a collection of interoperable systems developed for...
8. (203) Who assists the communications security account manager (CAM)...
15. (207) For accountability purposes, store short-term keyed devices...
47. (220) What form serves as the destruction certificate for...
50. (221) Two-person integrity (TPI) is the storage and handling...
63. (228) How often must local communications management software...
65. (229) On the back of the KOK–22A, which interface allows you to...
20. (209) Those not eligible to be enrolled in the cryptographic...
79. (235) Comm kits are normally contained in
84. (236) What type of change notice is not scheduled and is only...
7. (202) Who must sign all communications security manager (CAM)...
9. (204) Wing information assurance (IA) assessments are generally...
33. (215) Within how many hours from the time a communications...
36. (215) A communications security account manager (CAM) submits an...
42. (218) How many people are required to complete page replacements...
43. (219) Who requests disposition instructions for communications...
55. (224) How many times do you wrap communications security (COMSEC)...
58. (226) Which statement is not accurate regarding firefly...
17. (208) Which form do you use to document when a safe or vault is...
25. (210) At the base level, who initials the communications security...
27. (212) What is the term used to identify the highest level of...
51. (221) What provides the special protection of Top Secret (TS)...
72. (233) What squadron are Combat Crew Communications (CCC) units...
73. (234) Combat Crew Communications (CCC) Level 2 certification...
83. (236) Flight Information Handbooks (FIH) are issued every
14. (206) Which form is used to document the highest level...
29. (213) When an error or anomaly is detected upon receipt/inspection...
32. (215) Report communications security (COMSEC) deviations and...
3. (201) Who appoints a communications security responsible officer...
53. (222) How many people are required to transport Top Secret (TS)...
57. (225) What local communications security management software...
81. (236) Flight Information Publications (FLIP) are divided into how...
59. (226) The simple key loader (SKL) is the replacement for which...
5. (201) Who is responsible for identifying cryptonet members?
66. (230) What is the classification of magnetic media used to...
75. (234) Which code helps the Air Force identify special experience...
82. (236) Which documents are designed to provide aircrews with...
46. (219) Which is not an authorized method to destroy key tapes?
52. (222) How many people must unwrap the inner wrapper of a top...
56. (224) Which method is not used to complete a bulk encrypted...
74. (234) Once entered into Combat Crew Communications (CCC) Level 1...
80. (236) Which is not a flight phase that Flight Information...
85. (236) Which squadron commander must be notified before outdated...
61. (227) The local management device (LMD) supports or utilizes all...
70. (232) Which communications security (COMSEC) management software...
45. (219) Which is not an authorized method for routinely destroying...
60. (227) What classification of communication security (COMSEC)...
77. (235) Of the four types of comm kits you can build, which one...
40. (217) How often must a communications security account manager...
21. (209) Who appoints a cryptographic access program (CAP)...
67. (231) Which communication security (COMSEC) management software is...
49. (220) What is the classification of the Standard Form (SF) 153...
68. (231) Which communication security (COMSEC) management software...
69. (232) Which communications security (COMSEC) management software...
62. (228) Which type of National Security Agency (NSA)-approved...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!