Question
click below
click below
Question
Normal Size Small Size show me how
Comsec policy
CBT LH
Question | Answer |
---|---|
Who exercises overall authority for all coast guard telecommunications including comsec matters? | Cogard tiscom |
what organization develops and implements the comsec p-olicy for DON? | CNO |
What organization acts as the central office of record for the department of the navy? | NMCS |
What organization develops and produces cryptographic equipment? | NSA |
what office is responsible for all cms duties for the general officer COMSEC account? | SCMSRO |
Who exercises overall authority for all coast guard telecommunications including comsec matters? | Cogard tiscom |
what organization develops and implements the comsec p-olicy for DON? | CNO |
What organization acts as the central office of record for the department of the navy? | NMCS |
What organization develops and produces cryptographic equipment? | NSA |
what office is responsible for all cms duties for the general officer COMSEC account? | SCMSRO |
Who directs the establishment and operation of a crypto net and circuit? | Controlling authority |
What organization verifies requirements for a EKMS account? | CA |
Who must be actively involved in the daily operation of the account? | Alternate EKMS manager |
The witness must be familiar with COMSEC procedures and command directives. True or False. | True |
The commanding Officer is responsible to conduct monthly unannounced spotchecks? true or false | false |
Who is responsible for keeping the commanding officer informed of issues regarding an EKMS account? | EKMS manager |
The commanding officer designates, in writing, a list of authorized users. true or false | true |
The local element issuing reports to NCMS vice the parent account EKMS manager. true or false | false |
What keying material does not designate a release prefix and is not marked crypto. | OFF THE AIR |
What keying material includes keylists,codes,authenticators, one time tapes, and pads? | PAPER |
What keying material designation that bears a prefix US or A and is marked CRYPTO. | ON THE AIR |
What classification is applied to COMSEC related information, such as policy, if disclosed, could cause identifiable damage to national security? | CONFIDENTIAL |
what classification is applied to comsec information, such as frequency systems, if disclosed, could cause serious damage to national security? | SECRET |
Using the short title USKAT D 12479 AF 18 AMD2 identify the short title number section: | 12479 |
Using the short title USKAT D 12479 AF 18 AMD2 identify the short title edition? | AF |
Using the short title USKAT D 12479 AF 18 AMD2 identify the short title CLASS SECTION? | D |
Which accountability code is accountable to the COR by accounting serial/register number production to destruction? | AL CODE 1 |
Which electronically generated key is locally accountable to the generated facility? | AL CODE 7 |
Which codes are locally accountable by quantity and handled based on its classification after initial receipts to NCMS? | AL CODE 4 |
Which codes are continuously accountable to the COR by quantity from production to destruction? | AL CODE 2 |
Which electronically generated key is continously accountable to the COR from production to destruction? | AL CODE 6 |
If comsec material is in use to support an operational requirement, what is its status? | effective |
If comsec material is being held for future use, what is its status? | Reserve |
What status is inter theater comsec package (ICP) key material hold? | contingency |
Which supersession would apply when maintenance key is no longer serviceable? | Irregular |
Which supersession is based on predetermined data for each edition? | regular |
Which supersession applies to material that has been compromised? | emergency |
Which Comsec material source of supersession contains policy and procedures for two person controlled sealed authentication systems keying material? | CJCSINST 3260.01 |
Which comsec material source of supersession caontains information for nato comsec material? | AMSG-600 |
The A&A team of EKMS subject matter experts must schedule a training visit every 18 months true or false. | True |
The local Element should contact the A&A training team directly for a visit? true or false. | False |
An A&A team consists of EKMS subject matter experts who perform comec inventories? true or false. | False |
CMS?EKMS seminars address changes to policy and procedures and reccurring problems to accont management. True or False. | True |
During EKMS training for the Commanding Officer, What does the A&A team emphasis? | Conducting spot checks |
The A&A team STU/III STE brief provides guidance and training n policy and procedures for STU III/STE type 2 material? True or False? | False |
What type of A&A training addresses changes to comsec policy and procedures? | CMS/EKMS seminars |
The EKMS manager is required to conduct training to ensure that all personnel handling comsec material are familiar with and adhere to proper comsec procedures. True or false. | True |
Where are the general training policies set forth? | Opnavinst 3120.32C |
In which file would you find running inventory? | Chronological |
In which file would you find Comsec material accounting reports? | Chronological |
a comsec library consisting of manuals and instructions is described in EKMS 1A. true or false. | true |
In which file would you find the alcoms. | General message |
A comsec file, record, or log listing two-person-control (TPC) and/or containing the effective date of classified KEYMAT must hold a minimum classification of confidential. True or false. | True |
A comec report that contains the effective date of classified keying material should be classified confidential. True or False. | true |
A comsec file that lists two-person control should be classified confidential. True or False. | True |
TPI is a system of handling and storing designed to prevent two-person access to certain COMSEC material. true or false. | False |
TPI violations must be reported when a single person has access to unencryped TOP SECRET keying material marked or designated crypto except in an authorized emergency. true or false. | true |
Access to classified COMSEC material requires a security clearance equal to or higher than the classification of the material. True or False | True |
Fill devices containing unencrypted CONFIDENTIAL key must have TPI applied. True or False | False |
TPI storage requires the use of two approved combination locks with no one person authorized acces to both combinations. True or False. | True |
Which is an exception to TPI requirements for comsec KEY? | Crypto repair facilities where operational key is not handled. |
All personnel having access to COMSEC keying material must be authorized in writing by the commanding officer? true or false. | True |
Only EKMS Manager and persons with proper security clearance will know the combinations to the CMS vault and / or safe. true or False | False |
A combination (12-34-56) is an acceptable safe combination. True or False. | False |
Records for combinations should be maintained in a central location for emergency access. | true |
The envelopes containing safe combinations for comsec material are checked yearly. true or false. | False |
Only the EKMS manager and persons with proper security clearance will know the combinations to the CMS vault and/or safe. True or false. | false |
Unclassified, unkeyed comsec equipment may be left in an unlocked, unattended shed since it is unclassified. True or false. | False |
DON ships can store confidential comsec material in a file cabinet with lock meeting federal specifications, or in any container approved for storing secret keying material at a shore station. True or false. | True |
unkeyed DES will be controlled and protected as highly valued property and should not be released to foreign nationals without prior approval from NSA. True or False | True |
TOP SECRET COMSEC material must be stored in a class A vault or a GSA approved security container during a mobile situation. True or false | true |
What is the classified container information form? | SF 700 |
When do vaults require two combinations? | Whenever comsec material is Top Secret |
When is a security conainer used for storing comsec material is accessed through non-convention means it will require recertification by EKMS manager. true or False. | true |