1B Flashcards

1
Q

The practice of ___ ensures messages, be it voice or data, are transmitted and received by only the intended parties.

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is a Cybersecurity discipline identified in AFI 17-130 Cybersecurity Program Management with the purpose of implementing appropriate measures to protect all Air Force Information System (IS) resources and sensitive or classified information.

A

COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

COMSEC is a Cybersecurity discipline identified in ____ Cybersecurity Program Management with the purpose of implementing appropriate measures to protect all Air Force Information System (IS) resources and sensitive or classified information.

A

AFI 17-130

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This ___ leads the U.S. Government in cryptology that encompasses both signals intelligence (SIGINT) and cybersecurity.

A

The National Security Agency/Central Security Service (NSA/CSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The NSA ranks cryptographic products or algorithms by a certification called…?

A

product types

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Each Type Product requires a Type Key at the appropriate level to encrypt the information. The ___ defines the Type 1, 2, 3, and 4 products.

A

CNSSI No. 4009 National Information Assurance Glossary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which type key is the following describing?

For encrypting and decrypting classified and sensitive national security information.

A

Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type key is the following describing?

For encrypting or decrypting sensitive national security information.

A

Type 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type key is the following describing?

For encrypting or decrypting unclassified sensitive U.S. Government or commercial information, and to protect systems requiring protection mechanisms consistent with standard commercial practices.

A

Type 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type key is the following describing?

For unevaluated commercial cryptographic equipment that are neither NSA nor NIST certified for any Government usage. These products may contain either vendor proprietary algorithms, algorithms registered by NIST, or algorithms registered by NIST and published in a Federal Information Processing Standard (FIPS).

A

Type 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Classifications of encryption-device types are further broken down into two releasable categories:

A

Suite A and Suite B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which classification of encryption-type devices is the following describing?

(Confidential through Top Secret) A specific set of classified cryptographic algorithms used for the protection of some categories of restricted mission critical information.

A

Suite A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which classification of encryption-type devices is the following describing?

(Confidential through Secret) A specific set of cryptographic algorithms suitable for protecting both classified and unclassified national security systems and information throughout the US government and to support interoperability with allies and coalition partners.

A

Suite B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This is the art and science of making and breaking codes and ciphers.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Those who try to “break” a cryptosystem are practicing…?

A

cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

___ is the process of converting information to a disguised form in order to send it across a potentially unsafe channel.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

___ is the reverse process, providing a means of revealing the information.

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

In cryptographic terminology, ___ is the un-encoded or unsecure message;

A

plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In cryptographic terminology, ___ is the encrypted message.

A

cipher text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Encryption and decryption methods make use of a key and a coding algorithm, aka…?

A

scheme

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Modern encryption schemes utilize the concepts of…?

A

symmetric-keys
public-keys (asymmetric keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which scheme is the following describing?

The encryption and decryption keys are the same. Communicating parties must have the same key in order to achieve secure communication.

A

Symmetric-keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which scheme is the following describing?

The encryption key is published for anyone to use and encrypt messages. However, only the receiving party has access to the decryption key that enables messages to be read.

A

Public-Keys (asymmetric keys)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The need to keep data secure has been around since people started passing messages and wanted to keep it a secret from others. While many iterations have come along and later been deemed obsolete, one of the standard’s most used today is the symmetric-key algorithm ___, also known as “___”.

A

Advanced Encryption Standard (AES)
Rijndael

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The U.S. Government adopted this standard in 2001, moving away from the former Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES).

A

Advanced Encryption Standard (AES)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

While DES and 3DES would cypher using 56-bit encryption, AES proved to be a much-needed upgrade, providing encryption using three different key lengths:

A

128, 192, and 256 bits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Confidential and Secret information requires AES of ___ key lengths or higher.

A

128-bit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Top Secret requires AES ___ or ___- bit key length.

A

192 or 256-bit

29
Q

What does HAIPE stand for?

A

High Assurance Internet Protocol Encryption

30
Q

Provides a secure gateway that allows two enclaves to exchange data over an untrusted or lower-classification network, such as commercial internet.

A

HAIPE

31
Q

HAIPE provides a tactical advantage to military radio communications by introducing the ability to establish…?

A

secure mobile ad hoc networking (MANET) capabilities for users

32
Q

This refers to the encryption of voice communications over a range of systems such as radio, telephone or internet protocol (IP).

A

Secure Voice

33
Q

This is a standard for secure voice and data communication.

A

Secure Communications Interoperability Protocol

34
Q

What is the only requirement of SCIP?

A

A minimum bandwidth of 2400 Hz

35
Q

This is a technology used to transmit voice communication over a data network using Internet Protocol.

A

Voice over IP (VoIP)

36
Q

___ is when secure phones are used to protect information sent over the VoIP network.

A

Secure Voice over IP (SVoIP)

37
Q

The ___ is an example of an SVoIP device, providing end-to-end encryption over commercial wired networks.

A

vIPer Universal Secure Phone

38
Q

___ is the same as SVoIP in that they are technologies used to securely transmit voice communications, but with ___, the security is provided by separate encryption devices in the network rather than the secure phones themselves.

A

Voice over Secure IP (VoSIP)

39
Q

This provides a secure connection for multiple users in a network by encrypting a multiplexed line, which combines multiple data and/or voice lines into a single output.

A

Trunk Encryption

40
Q

Trunk encryption is AKA?

A

Bulk Encryption

41
Q

The following describes which kind of encryption device?

  • originated in the 1980s
  • Measuring at 38 x 19.5 x 19 cm
  • Weighing 10kg
  • In asynchronous mode, it can handle data rates between 50 – 9600 baud
  • In synchronous mode – using the internal clock – it can handle data up to 32,000 baud
  • suitable for full-duplex, half-duplex and simplex communication.
  • was replaced by the smaller, more versatile KIV-7
A

KG-84

42
Q

When an encryption device is correctly configured with the proper codes, it is considered…?

A

keyed

43
Q

When an encryption device has the absence of a code it renders the device useless; and it is then considered…?

A

un-keyed

44
Q

Un-keyed encryption devices are classified differently. When the device is empty and free of codes, COMSEC hardware is categorized as a ___, and it is considered UNCLASSIFIED.

A

controlled cryptographic item (CC)

45
Q

Which External Cryptographic Equipment is the following describing?

  • HAIPE keying
  • 200 Mb/s throughput
  • certified to protect information classified Top Secret and below
  • lightweight, ruggedized, encryption device that is ideal for both tactical and strategic environments.
  • provides end-to-end encryption for IPv4/IPv6 networks
A

The KG–175D TACLANE-Micro

46
Q

Which external cryptographic equipment is the following describing?

  • family of embeddable KG-84 COMSEC modules are lightweight, compact, cryptographic devices
  • NSA Type-1 certified digital and voice communications
  • It requires a Crypto Ignition Key (CIK), at least one Traffic Encryption Key (TEK) or fill and can support up to 10 fills.
  • provides traditional bulk encryption for non-IP–based systems, such as the Ground Multiband Terminal (GMT)
  • It supports synchronous data rates up to 50 Mbps
  • backward compatible
  • It is also interoperable with the KG-84, KG- 194/A, and KIV-19.
A

KIV-7/M

47
Q

Which external cryptographic equipment is the following describing?

  • is a lightweight, low power, single-channel, half-duplex, narrowband/wideband/wireline terminal providing secure voice and data communications.
  • is compatible with most other COMSEC systems.
  • The unit holds up to six codes and can receive a fill from devices like the PYQ–10, KIK-30, or OTAR.
A

KY-99A

48
Q

What is the difference between red data and black data?

A

red data = non-secure
black data = secure

49
Q

A ___ is an electronic device used primarily by the military for the distribution of cryptographic variables such as Transmission Encryption Keys (TEK), a key used to encrypt messages, and Transmission Security Keys (TSK), used to secure the link by which the message will travel.

A

key transfer device (fill device)

50
Q

What is a TEK?

A

Transmission Encryption Keys - a key used to encrypt messages

51
Q

What is a TSK?

A

Transmission Security Keys - used to secure the link by which the message will travel

52
Q

Fill devices often use a standard data protocol such as ___, both developed by the NSA, but some devices use proprietary protocols as well.

A

DS-101 or DS-102

53
Q

Fill devices can store and transfer:

A

TEKs, TSKs, GPS (Global Positioning System) data, IFF (Identification Friend or Foe) data, and software updates.

54
Q

Regardless of whether encryption devices are external or internal, you always need a way to..?

A

load the keys

55
Q

AN/PYQ-10 is otherwise known as…?

A

Simple Key Loader (SKL)

56
Q

This is a ruggedized, portable, hand-held fill device for securely receiving, storing, and transferring data between compatible cryptographic and communications equipment.

A

AN/PYQ-10

57
Q

The AN/PYQ-10 utilizes the ___ operating system for a more user-friendly interface.

A

Microsoft Windows CE.net

58
Q

The SKL is ___ compatible with existing End Cryptographic Units (ECU) and ___ compatible with future security equipment and systems.

A

backward
forward

59
Q

KIK-30 is also known as?

A

Really Simple Key Loader (RASKL)

60
Q

This is a user-friendly, ruggedized, handheld fill device approved by the NSA for the distribution of Type 1 cryptographic keys.

A

KIK-30

61
Q

It can store and transfer related communications security material, including control data (“load sets”) for frequency hopping radios, such as SINCGARS and Have Quick.

A

KIK-30

62
Q

KIK-30 replaces legacy fill devices (i.e KIK-13), is small, lightweight, and can store up to __ cryptographic keys.

A

40

63
Q

What does KVL-3000 stand for?

A

Key Variable Loader

64
Q

This is a device for loading cryptographic material (key variables) into a series of Motorola brand two-way radios, commonly referred to as Land Mobile Radios (LMRs).

A

KVL-3000

65
Q

This device is equipped with a matrix display (bitmap), allowing icons and graphics to be displayed.

A

KVL-3000

66
Q

The KVL-3000 has the capability to store up to ___ keys.

A

1024

67
Q
A
68
Q
A