Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CMS

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
show 5510.36  
🗑
show Commanding Officer  
🗑
show commanding officer  
🗑
Who is the Commanding Officers primary advisor on matters concerning the security and handling of comsec information and the associated records and reports?   show
🗑
show NWP naval warfare publications custodian  
🗑
Who serves as the point of contact for all command INFOSEC matters and implements the command INFOSEC program?   show
🗑
which of the following directives provides guidance concerning personnel security investigations adjudications and clearances?   show
🗑
What is the duration that the date or event of original classification shall not exceed under routine circumstances?   show
🗑
show true  
🗑
Term such as , For official use only FOUO or secret sensitive shall not be used for the identification for US classification information. true or false   show
🗑
show Top and bottom center  
🗑
Where on a document is the highest overall classification level and applicable warning notices for all enclosures or attachments?   show
🗑
When securing security containers rotate the dial of combination locks at least how many complete turns in the same direction?   show
🗑
How often must inventories of top secret material be conducted?   show
🗑
show 3  
🗑
who is responsible to control the dissemination of classified material within the command?   show
🗑
show 2 years  
🗑
How is classified correspondence serially numbered?   show
🗑
How many officials are required for top secret destruction?   show
🗑
Retain top secret records of destruction for what period of time   show
🗑
show at least annually  
🗑
Which of the following is a cover sheet used to cover top secret documents?   show
🗑
show sf 701,702  
🗑
show sf 700  
🗑
show E-7 or above or GS7 or above  
🗑
CMS 5?   show
🗑
The acronym CMCS stands for what and what is its mission?   show
🗑
KAM/SAM/KAO/LMM's are publications associated with what?   show
🗑
show DIRNSA- Director, National Security Agency  
🗑
All classified equipment and CCI is, by national policy, assigned what AL code?   show
🗑
What ALC requires report of intial receipt by local accountability thereafter?   show
🗑
show Annually* Upon change of custodian* Upon change of Command  
🗑
All COMSEC equipment requirements are programmed by whom?   show
🗑
show CCI- controlled Cyrptograpic Item  
🗑
This TIER is the central Facility, provides centralized key management services for all forms of key   show
🗑
show TIER 2  
🗑
This TIER is the intermediate and key generation and distribution center   show
🗑
This TIER is holds hard copy materials only. CYZ-10's, ECU's KME's   show
🗑
also known as TIER 0. responsible for developing and implementing, production and distribution of most comsec material?   show
🗑
show ISIC  
🗑
show EKMS manager  
🗑
show ALC-6  
🗑
What detemines how COMSEC material is accounted for?   show
🗑
show ALC-1  
🗑
show ALC- 7  
🗑
show ALC- 4  
🗑
COMSEC material that is accountable by quanitiy is assigned which AL code?   show
🗑
show SECNAVINST 5720.42  
🗑
Name the only three ways that COMSEC material becomes superseded?   show
🗑
The 2 letters on a preprinted digraph represents what?   show
🗑
show 24 months  
🗑
What are the reqired forms for storage containers?   show
🗑
show cryptographic* Personnel* Physical  
🗑
Known detection, espinage, unauthorized disclosure, attempts by unauthorized persons, is an example of which COMSEC incident?   show
🗑
Physical loss of COMSEC material, unauthorized access, left unsecure, is an example of which COMSEC incident?   show
🗑
Using material compromised, superseded, defective, previously used, is an example of which COMSEC incident?   show
🗑
show COMMUNICATIONS SECURITY MATERIAL SYSTEMS OVERVIEW  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: sussersd