Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards
share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

3D053 Vol 1

Information Protection - Internal Controls

QuestionAnswer
1. What is the difference between COMSEC material and COMSEC equipment COMSEC materials are items designed to secure or authenticate telecommunications. COMSEC equipment is designed to provide security to our telecommunications by first encrypting information, thereby making it unintelligible to an unauthorized interceptor,
What is a cryptonet A Cryptonet is a site/station that holds a specific key for use.
In a cryptonet, what are two keys that both ends of the cryptonet must be using to successfully communicate Both ends of the circuit must be using the same Key Encryption Key (KEK) or Traffic Encryption Key (TEK).
How is a COMSEC account or EKMS ID designated Six uppercase letters or digits
Without a waiver, what is the minimum grade requirement to be a CAM Officer, Warrant Officer, Senior NCO, or GS–9 or above (civilian).
What is the AFSC requirement or civilian occupational series needed to be a CAM without a waiver An officer in the AFSC 33XX, NCOs in the AFSC 3D053 or 3D000, or civilian in occupational series of 301, 391, or 2210.
What criteria must be met to request a waiver for CAM An organization that does not have an individual meeting the requirements outlined AFKAG–1 and AFKAG–2 for grade, security clearance, AFSC and skill code, and/or experience level, that needs to appoint a new CAM must request a waiver from their MAJCOM
What information must be included when submitting a waiver letter for a CAM (1) COMSEC account number, name, grade, AFSC or skill code, clearance. (2) CAM or alternate. (3) Present duty assignment and complete justification. (4) Date of appointment and date of any known projected gains meeting the minimum COMSEC requirements.
What is the purpose of the AFCOMSEC Form 16 To list accountable COMSEC material stored in a GSA-approved container and is annotated each time a COMSEC safe is opened.
How should mistakes on the AFCOMSEC Form 16 be corrected and what should be annotated on the back of the form If a mistake is made, line through the mistake/error, initial, and then number the error. Write the error number followed by a MFR on the back of the inventory.
Which COMSEC ALC must be annotated on the AFCOMSEC Form 16 ALC–1 and ALC–2 must be listed on the inventory.
Who decides whether to add ALC–4 material to the AFCOMSEC Form 16 The decision to add ALC–4 material to CPIs is left up to the discretion of the monitoring MAJCOM
information assurance office or the local CAM. SF 701, Activity Security Checklist.
What is the rule of thumb for performing an inventory on COMSEC storage containers Always inventory the material in the container against the CPI--not the other way around!
When conducting a page replacement change to a COMSEC publication, what should be done with the “Record of Amendment” Annotate that the replacement has been completed on the “Record of Amendment” page in the basic document.
What is used to make a write-in change in a COMSEC publication Blue or black ink pen.
What is meant by the term “disposition” as it refers to COMSEC material How to properly dispose of COMSEC material in our possession
What are three actions that may result from receiving disposition instructions (1)Transfer COMSEC material to another numbered account or agency. (2)Destroy the COMSEC material.(3)Continue to hold the material
Who is responsible for destroying COMSEC material The primary/alternate CAM—for base COMSEC accounts—or the primary/alternate CRO—for local unit accounts—are responsible for destroying COMSEC material; however, any responsible person on the COMSEC access list and witness may destroy the COMSEC material t
What are the qualifications of a COMSEC destruction official The destruction official is any appropriately cleared, responsible COMSEC person. The destruction and witnessing official must have a final clearance commensurate with the material.
For which items of COMSEC material does the CAM prepare a destruction certificate For all ALC–1 and ALC–6 material and classified ALC–4 and ALC–7 COMSEC material authorized for destruction.
What is TPC The continuous surveillance and control of positive control material at all times by a minimum of two authorized individuals, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed and each familiar with es
During which instances will TPC personnel handle positive control COMSEC material During issue, inventory, and destruction of split-knowledge positive control material where the containers are opened and the material is exposed.
What is TPI The storage and handling system prohibiting and denying access by any single person to TOP SECRET COMSEC material
How is TPI different from TPC Unlike TPC, TPI does not pertain to “positive control material.”
What conveyences are COMSEC couriers authorized to use Commercial airlines or private conveyance.
Are COMSEC couriers required to be armed Only if local conditions require it.
What are the requirements for transporting TS keying material that is sealed in NSA-protective packaging TPI controls are not required.
What are the requirements for shipping TOP SECRET and SECRET COMSEC material marked
CRYPTO Ship this material only through Defense Courier Division (DCD), State Department Courier Service, or any formally designated and appropriately cleared department, agency, or contractor couriers.
What is the purpose of the AFCOMSEC Form 16 To list accountable COMSEC material stored in a GSA-approved container and is annotated each time a COMSEC safe is opened.
How should mistakes on the AFCOMSEC Form 16 be corrected and what should be annotated on the back of the form If a mistake is made, line through the mistake/error, initial, and then number the error. Write the error number followed by a MFR on the back of the inventory.
Which COMSEC ALC must be annotated on the AFCOMSEC Form 16 ALC–1 and ALC–2 must be listed on the inventory.
Who decides whether to add ALC–4 material to the AFCOMSEC Form 16 The decision to add ALC–4 material to CPIs is left up to the discretion of the monitoring MAJCOM
information assurance office or the local CAM. SF 701, Activity Security Checklist.
What is the rule of thumb for performing an inventory on COMSEC storage containers Always inventory the material in the container against the CPI--not the other way around!
When conducting a page replacement change to a COMSEC publication, what should be done with the “Record of Amendment” Annotate that the replacement has been completed on the “Record of Amendment” page in the basic document.
What is used to make a write-in change in a COMSEC publication Blue or black ink pen.
What is meant by the term “disposition” as it refers to COMSEC material How to properly dispose of COMSEC material in our possession
What are three actions that may result from receiving disposition instructions (1)Transfer COMSEC material to another numbered account or agency. (2)Destroy the COMSEC material.(3)Continue to hold the material
Who is responsible for destroying COMSEC material The primary/alternate CAM—for base COMSEC accounts—or the primary/alternate CRO—for local unit accounts—are responsible for destroying COMSEC material; however, any responsible person on the COMSEC access list and witness may destroy the COMSEC material t
What are the qualifications of a COMSEC destruction official The destruction official is any appropriately cleared, responsible COMSEC person. The destruction and witnessing official must have a final clearance commensurate with the material.
For which items of COMSEC material does the CAM prepare a destruction certificate For all ALC–1 and ALC–6 material and classified ALC–4 and ALC–7 COMSEC material authorized for destruction.
What is TPC The continuous surveillance and control of positive control material at all times by a minimum of two authorized individuals, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed and each familiar with es
During which instances will TPC personnel handle positive control COMSEC material During issue, inventory, and destruction of split-knowledge positive control material where the containers are opened and the material is exposed.
What is TPI The storage and handling system prohibiting and denying access by any single person to TOP SECRET COMSEC material
How is TPI different from TPC Unlike TPC, TPI does not pertain to “positive control material.”
What conveyences are COMSEC couriers authorized to use Commercial airlines or private conveyance.
Are COMSEC couriers required to be armed Only if local conditions require it.
What are the requirements for transporting TS keying material that is sealed in NSA-protective packaging TPI controls are not required.
What are the requirements for shipping TOP SECRET and SECRET COMSEC material marked Ship this material only through Defense Courier Division (DCD), State Department Courier Service, or any formally designated and appropriately cleared department, agency, or contractor couriers.
What is LCMS The LCMS is a menu driven software used to manage day-to-day COMSEC accounting functions and is the overall management system for COMSEC account operations.
What is CUAS The CUAS is a GUI-driven software and is considered by most users to be more user-friendly than LCMS.
What is the primary use for LCMS LCMS is the primary software used for transfers, semi-annual inventories, creating electronic key, uploading/downloading electronic key to ECUs, and communications.
What is the primary use for CUAS CUAS is our primary software for managing the account.
What are the drawbacks to using LCMS Use of menus and submenus for necessary tasks, which makes using LCMS tedious and time consuming. Additionally LCMS does not provide a manager the ability to generate COMSEC physical inventories, assign material to a storage container (safe), or specify t
What are the drawbacks to using CUAS Does not allow an account to transfer key from one account to another, to perform a semi-annual inventory, or to generate electronic key. Furthermore, although the KP is required to generate short titles and produce key, CUAS does not interface with the K
What is the KP The KP, or KOK–22A, is a device that connects to the LMD (i.e., a peripheral) and is used to generate and verify cryptographic signatures, produce electronic key, encrypt and decrypt (wrap and unwrap) electronic key packages, and distribute electronic key
What feature on the back side of the KP protects it from damage due to AC power surges Circuit Breaker Press to Reset.
What minimum classification is the KP, and how is the KP accountable The KP is a SECRET CRYPTO device that is accountable by serial number (ALC–1) when un-keyed (CIKnot inserted) or when a sole operator is logged on (CIK inserted).
How many appropriately cleared persons must be physically present when the KP is keyed to output unencrypted TOP SECRET key or TPI designated key Two
What is a firefly A trusted key exchange mechanism used to generate encryption keys based on a unique public key principle that encrypts and decrypts information without compromising either side.
How often is the electronic rekey of the Firefly Vector Set completed Annually or when directed by NSA or HQ CPSG.
What does firefly registration involve The exchange of firefly credentials between the originating and receiving EKMS accounts; this exchange must take place before these accounts can communicate or electronically transfer keymat.
What must be done with the firefly vector set prior to loading the set into the key processor It must be entered into the LCMS and reconciled into your account.
What is the SKL An approved storage device for keying material, is the replacement for the DTD. It is a hand-held device capable of emulating the KYK-13 electronic key transfer device, the KYX-15 net control device, and the electronic functions of the KOI-18 tape reader.
In simple terms, what is an LMD The LMD is simply a customized computer.
What software comes pre-installed on the LMD LCMS
What clearance criteria and enrollment criteria must be met to operate the LMD or the the KP Minimum of a final SECRET clearance and must be enrolled in the CAP.
What is the classification of the LMD, Provide one reason for the LMD to be classified at this level SECRET; the LCMS software installed on the system (LCMS itself is classified SECRET).
What are five COMSEC devices that you may use that interface with the EKMS platform (1)STU-III. (2)STE.(3)DTD. (4)SKL. (5)DMD.
What are the seven operating system and software applications that make up the EKMS platform (1)SCO UNIX.(2)LCMS.(3)CUAS. (4)Oracle. (5)UAS.(6)CLUAS.(7)LONE-Tar server backup crash recovery software
What is a COMSEC insecurity A COMSEC security lapse that was investigated, evaluated, and was determined to jeopardize the security of COMSEC material or the secure transmission of information.
What is the difference between a COMSEC insecurity and a COMSEC incident 2. While a COMSEC insecurity is ultimately evaluated as a “compromise,” a COMSEC incident is evaluated either as “no compromise” or “compromise cannot be ruled out.”
What is a COMSEC material receipt reporting discrepancy The COMSEC material shipped does not agree with the shipping document (SF 153) and the package does not appear to have been tampered with.
When submitting a report for a COMSEC material receipt reporting discrepancy, who are the information addressees For all messages, the information addressees are HQ AFNIC/EVIC, the controlling authority, the MAJCOM IA office, DIRNSA FT GEORGE G MEADE MD//I9123// AND HQ CPSG SAN ANTONIO TX//NIK//.
What are the ten different types of COMSEC incidents (1)TPI/TPC (2)Cryptographic (3)Personnel(4)Physical(5)Aircraft accident(6)Disaster(7)Codebook(8)Production errors(9)Defective KEYMAT(10) Damaged protective packaging
What are the six required documents for each Air Force COMSEC incident assigned an Air ForceCOMSEC incident case number (1)Initial or amplifying (if applicable) report. (2) Case assignment.(3) Final report.(4) Evaluation report.(5) MAJCOM closure recommendation. (6)HQ AFNIC/EVIA case closure.
Created by: voodoo1978