Z3d053 Ure Vol2

85 Questions | Attempts: 167
Share

SettingsSettingsSettings
Management Quizzes & Trivia

.


Questions and Answers
  • 1. 

    1. (201) What is a collection of interoperable systems developed for the services and government agencies to automate handling and management of communications security (COMSEC) material?

    • A.

      Electronic key management system (EKMS).

    • B.

      COMSEC account.

    • C.

      Firefly credentials.

    • D.

      Cryptonet.

    Correct Answer
    A. Electronic key management system (EKMS).
  • 2. 

    2. (201) What allows one electronic key management system (EKMS) element to pass required information to another EKMS element enabling both elements to generate the same key session?

    • A.

      Communications security (COMSEC) account.

    • B.

      Firefly credentials.

    • C.

      Cryptoperiod.

    • D.

      Cryptonet.

    Correct Answer
    B. Firefly credentials.
  • 3. 

    3. (201) Who appoints a communications security responsible officer (CRO) to support a unit’s communications security (COMSEC) mission?

    • A.

      Communications security account manager (CAM).

    • B.

      Communications unit commander.

    • C.

      Supported unit commander.

    • D.

      Wing commander.

    Correct Answer
    C. Supported unit commander.
  • 4. 

    4. (201) Who assists the communications security account manager (CAM) with day-to-day administration and maintenance of accounting records for communications security (COMSEC) material?

    • A.

      Local communication security management system (LCMS) administrator.

    • B.

      Communications security responsible officer (CRO).

    • C.

      COMSEC accountant.

    • D.

      Controlling authorities.

    Correct Answer
    C. COMSEC accountant.
  • 5. 

    5. (201) Who is responsible for identifying cryptonet members?

    • A.

      Local communication security management system (LCMS) administrator.

    • B.

      Communications security responsible officer (CRO).

    • C.

      Communications security (COMSEC) accountant.

    • D.

      Controlling authorities.

    Correct Answer
    D. Controlling authorities.
  • 6. 

    6. (202) Who requires that the communications security account manager (CAM) be formally trained to certify the training of local management device/key processor (LMD/KP) platform users?

    • A.

      Federal Aviation Administration (FAA).

    • B.

      Cryptologic Systems Division (CPSD).

    • C.

      National Security Agency (NSA).

    • D.

      Major command (MAJCOM).

    Correct Answer
    C. National Security Agency (NSA).
  • 7. 

    7. (202) Who must sign all communications security manager (CAM) waivers?

    • A.

      Unit commander.

    • B.

      Security manager.

    • C.

      Wing commander.

    • D.

      Communications security responsible officer (CRO).

    Correct Answer
    A. Unit commander.
  • 8. 

    8. (203) Who assists the communications security account manager (CAM) in his or her day-to-day duties?

    • A.

      Communications security responsible officer (CRO).

    • B.

      Communications access program (CAP) assistant.

    • C.

      Communications security accountant.

    • D.

      Security manager.

    Correct Answer
    C. Communications security accountant.
  • 9. 

    9. (204) Wing information assurance (IA) assessments are generally conducted every

    • A.

      Six months.

    • B.

      Year.

    • C.

      Two years.

    • D.

      Three years.

    Correct Answer
    C. Two years.
  • 10. 

    10. (204) When a unit receives an unsatisfactory rating on a communications security (COMSEC) inspection, the wing will reassess the unit within how many days?

    • A.

      30

    • B.

      45

    • C.

      60

    • D.

      90

    Correct Answer
    D. 90
  • 11. 

    11. (205) Who performs the semiannual inspections and audits on the base communications security (COMSEC) account?

    • A.

      Communications security responsible officer (CRO).

    • B.

      Communications security account manager (CAM).

    • C.

      COMSEC accountant.

    • D.

      Security manager.

    Correct Answer
    B. Communications security account manager (CAM).
  • 12. 

    12. (205) How often does the communications security account manager (CAM) perform an assessment on the communications security responsible officer (CRO) communication security (COMSEC) account?

    • A.

      Monthly.

    • B.

      Quarterly.

    • C.

      Semiannually.

    • D.

      Yearly.

    Correct Answer
    C. Semiannually.
  • 13. 

    13. (206) Qualified personnel perform preventative maintenance and security inspections on safes and vaults every

    • A.

      Two years.

    • B.

      Five years.

    • C.

      Two years for safes and five years for vaults.

    • D.

      Five years for safes and two years for vaults.

    Correct Answer
    D. Five years for safes and two years for vaults.
  • 14. 

    14. (206) Which form is used to document the highest level classification of a security container?

    • A.

      SF 700.

    • B.

      SF 702.

    • C.

      AF IMT 1109.

    • D.

      AFTO Form 36.

    Correct Answer
    A. SF 700.
  • 15. 

    15. (207) For accountability purposes, store short-term keyed devices in an approved container and account for the devices on a

    • A.

      Communications security physical inventory (CPI).

    • B.

      Electronic Key Management System (EKMS).

    • C.

      Standard Form (SF) 700, Security Container Information.

    • D.

      SF 702, Security Container Checklist.

    Correct Answer
    A. Communications security physical inventory (CPI).
  • 16. 

    16. (208) Which form do you use to document and annotate opening, closing, and checking of any GSA-approved security container?

    • A.

      SF 700.

    • B.

      SF 701.

    • C.

      SF 702.

    • D.

      AF IMT 1109.

    Correct Answer
    C. SF 702.
  • 17. 

    17. (208) Which form do you use to document when a safe or vault is put into use?

    • A.

      SF 701.

    • B.

      SF 702.

    • C.

      AF Form 1109.

    • D.

      AFTO Form 36.

    Correct Answer
    D. AFTO Form 36.
  • 18. 

    18. (208) Which form do you use to record the arrival or departure of all personnel not named on the facility authorized access list?

    • A.

      Standard Form (SF) 701.

    • B.

      SF 702.

    • C.

      AF Form 1109.

    • D.

      AFTO Form 36.

    Correct Answer
    C. AF Form 1109.
  • 19. 

    19. (209) Which of the following requirements would make a person ineligible for the cryptographic access program (CAP)?

    • A.

      Hold an interim security clearance.

    • B.

      Have a final security clearance.

    • C.

      Be a DOD cleared contractor.

    • D.

      Be a US citizen.

    Correct Answer
    A. Hold an interim security clearance.
  • 20. 

    20. (209) Those not eligible to be enrolled in the cryptographic access program (CAP) are personnel

    • A.

      Assigned to communications security (COMSEC) accounts.

    • B.

      Who operate certification authority workstations (CAW).

    • C.

      With access to only Confidential cryptographic media.

    • D.

      Who perform duties as cryptographic maintenance, engineering or installation technicians.

    Correct Answer
    C. With access to only Confidential cryptographic media.
  • 21. 

    21. (209) Who appoints a cryptographic access program (CAP) administrator?

    • A.

      Security manager.

    • B.

      Unit commander.

    • C.

      Communications security account manager (CAM).

    • D.

      Communications security responsible officer (CRO).

    Correct Answer
    B. Unit commander.
  • 22. 

    22. (209) Who is responsible for overseeing the cryptographic access program (CAP) and providing written local procedures to the CAP administrator?

    • A.

      Security manager.

    • B.

      Unit commander.

    • C.

      Communications security account manager (CAM).

    • D.

      Communications security responsible officer (CRO).

    Correct Answer
    C. Communications security account manager (CAM).
  • 23. 

    23. (210) Which type of security clearance is not valid for personnel on a communications security (COMSEC) access list?

    • A.

      A final security clearance.

    • B.

      An interim security clearance.

    • C.

      A clearance equal to the COMSEC being accessed.

    • D.

      A clearance higher than the COMSEC being accessed.

    Correct Answer
    B. An interim security clearance.
  • 24. 

    24. (210) How often should communications security (COMSEC) access lists be reviewed for accuracy?

    • A.

      Weekly.

    • B.

      Monthly.

    • C.

      Quarterly.

    • D.

      Annually.

    Correct Answer
    B. Monthly.
  • 25. 

    25. (210) At the base level, who initials the communications security (COMSEC) access list?

    • A.

      Communications security account manager (CAM).

    • B.

      Communications security responsible officer (CRO).

    • C.

      Base commander.

    • D.

      Base security manager.

    Correct Answer
    A. Communications security account manager (CAM).
  • 26. 

    26. (211) At a minimum, how often must you review the communications security (COMSEC) access list?

    • A.

      Every week.

    • B.

      Every two weeks.

    • C.

      Once a month.

    • D.

      Every six months.

    Correct Answer
    C. Once a month.
  • 27. 

    27. (212) What is the term used to identify the highest level of security lapse in handling communications security (COMSEC)?

    • A.

      COMSEC incident.

    • B.

      COMSEC deviation.

    • C.

      COMSEC insecurity.

    • D.

      Practice dangerous to security (PDS).

    Correct Answer
    C. COMSEC insecurity.
  • 28. 

    28. (212) What term is used to describe a communication security (COMSEC) security lapse with a potential to jeopardize the security of COMSEC material if it is allowed to continue?

    • A.

      COMSEC incident.

    • B.

      COMSEC deviation.

    • C.

      COMSEC insecurity.

    • D.

      Practice dangerous to security (PDS).

    Correct Answer
    D. Practice dangerous to security (PDS).
  • 29. 

    29. (213) When an error or anomaly is detected upon receipt/inspection of communications security (COMSEC) material, who sends a message to DIRNSA/I31132?

    • A.

      Unit commander.

    • B.

      Security manager.

    • C.

      Communications security account manager (CAM).

    • D.

      Communication security responsible officer (CRO).

    Correct Answer
    C. Communications security account manager (CAM).
  • 30. 

    30. (214) What type of incident includes the unauthorized disclosure of communications security (COMSEC) information or material?

    • A.

      Physical.

    • B.

      Personnel.

    • C.

      Cryptographic.

    • D.

      Practice dangerous to security.

    Correct Answer
    B. Personnel.
  • 31. 

    31. (214) What type of communications security (COMSEC) incident is any loss of control, theft, capture, recovery by salvage, tampering, unauthorized viewing, access, or photographing that has the potential to jeopardize COMSEC material?

    • A.

      Aircraft.

    • B.

      Physical.

    • C.

      Personnel.

    • D.

      Cryptographic.

    Correct Answer
    B. Physical.
  • 32. 

    32. (215) Report communications security (COMSEC) deviations and incidents immediately to all of these personnel except

    • A.

      Security manager.

    • B.

      Commander.

    • C.

      Communications security account manager (CAM).

    • D.

      Communications security responsible officer (CRO).

    Correct Answer
    A. Security manager.
  • 33. 

    33. (215) Within how many hours from the time a communications security (COMSEC) incident is discovered must a commander appoint an inquiry officer?

    • A.

      24

    • B.

      36

    • C.

      48

    • D.

      72

    Correct Answer
    D. 72
  • 34. 

    34. (215) The rank requirement for an inquiry officer includes all of these except

    • A.

      Captain.

    • B.

      Master Sergeant.

    • C.

      Technical Sergeant.

    • D.

      GS–9.

    Correct Answer
    C. Technical Sergeant.
  • 35. 

    35. (215) Who completes an initial report for each communications security (COMSEC) incident?

    • A.

      Communications security account manager (CAM).

    • B.

      Communications security responsible officer (CRO).

    • C.

      Information assurance officer (IAO).

    • D.

      Responsible party.

    Correct Answer
    A. Communications security account manager (CAM).
  • 36. 

    36. (215) A communications security account manager (CAM) submits an amplifying report every how many days until the final report is submitted?

    • A.

      7

    • B.

      14

    • C.

      30

    • D.

      45

    Correct Answer
    C. 30
  • 37. 

    37. (216) When removing material from a communication security physical inventory (CPI), always annotate it by

    • A.

      Using red ink.

    • B.

      Using green ink.

    • C.

      Using correction fluid.

    • D.

      Writing a memorandum for record (MFR).

    Correct Answer
    D. Writing a memorandum for record (MFR).
  • 38. 

    38. (217) When you create a communication security physical inventory (CPI), you will need to include all of the following information except

    • A.

      Accounting legend code (ALC).

    • B.

      Edition.

    • C.

      Quantity.

    • D.

      Short title.

    Correct Answer
    A. Accounting legend code (ALC).
  • 39. 

    39. (217) When you are sealing a package containing communications security (COMSEC) material where do you place your initials?

    • A.

      Upper right-hand corner.

    • B.

      Lower right-hand corner.

    • C.

      Bottom of envelope.

    • D.

      Across the seal.

    Correct Answer
    D. Across the seal.
  • 40. 

    40. (217) How often must a communications security account manager (CAM) review the communications security (COMSEC) physical inventory?

    • A.

      Once a month.

    • B.

      Every 3 months.

    • C.

      Every 6 months.

    • D.

      Every 12 months.

    Correct Answer
    A. Once a month.
  • 41. 

    41. (218) Changes that must be made to material in communication security (COMSEC) publications are called

    • A.

      Modifications.

    • B.

      Amendments.

    • C.

      Corrections.

    • D.

      Updates.

    Correct Answer
    B. Amendments.
  • 42. 

    42. (218) How many people are required to complete page replacements in unclassified communication security (COMSEC) publications?

    • A.

      One.

    • B.

      Two.

    • C.

      Three.

    • D.

      Four.

    Correct Answer
    A. One.
  • 43. 

    43. (219) Who requests disposition instructions for communications security (COMSEC) material?

    • A.

      Unit commander.

    • B.

      COMSEC material user.

    • C.

      Communications security account manager (CAM).

    • D.

      Cryptographic access program (CAP) administrator.

    Correct Answer
    C. Communications security account manager (CAM).
  • 44. 

    44. (219) Who may destroy communications security (COMSEC) material?

    • A.

      Communications security account manager (CAM) or any responsible person on the COMSEC access list.

    • B.

      Communications security responsible officer (CRO).

    • C.

      Alternate CAM only.

    • D.

      CAM only.

    Correct Answer
    A. Communications security account manager (CAM) or any responsible person on the COMSEC access list.
  • 45. 

    45. (219) Which is not an authorized method for routinely destroying paper communications security (COMSEC) aids?

    • A.

      Disintegrating.

    • B.

      Pulverizing.

    • C.

      Burning.

    • D.

      Pulping.

    Correct Answer
    A. Disintegrating.
  • 46. 

    46. (219) Which is not an authorized method to destroy key tapes?

    • A.

      Disintegrating.

    • B.

      Pulverizing.

    • C.

      Shredding.

    • D.

      Burning.

    Correct Answer
    C. Shredding.
  • 47. 

    47. (220) What form serves as the destruction certificate for communication security (COMSEC) material?

    • A.

      Standard Form (SF) 153.

    • B.

      Air Force (AF) Form 1109.

    • C.

      Air Force Communications Security (AFCOMSEC) Form 9.

    • D.

      AFCOMSEC Form 16.

    Correct Answer
    A. Standard Form (SF) 153.
  • 48. 

    48. (220) Sign the communication security (COMSEC) material destruction record

    • A.

      Immediately after the material is destroyed.

    • B.

      Immediately before the material is destroyed.

    • C.

      Within 12 hours after the material is destroyed.

    • D.

      Within 12 hours before the material is destroyed.

    Correct Answer
    A. Immediately after the material is destroyed.
  • 49. 

    49. (220) What is the classification of the Standard Form (SF) 153 when the disposition record card (DRC) is attached?

    • A.

      Top Secret (TS).

    • B.

      Secret.

    • C.

      Confidential.

    • D.

      Unclassified.

    Correct Answer
    C. Confidential.
  • 50. 

    50. (221) Two-person integrity (TPI) is the storage and handling system that prohibits access by any single person to what classification of communications security (COMSEC) material?

    • A.

      Top Secret (TS).

    • B.

      Secret.

    • C.

      Confidential.

    • D.

      Unclassified.

    Correct Answer
    A. Top Secret (TS).

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 06, 2017
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 06, 2017
    Quiz Created by
    Airman
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.