3D1X1 Volume 3 Chap 2 Flashcards

1
Q

What is symmetric systems and the advantages

A

It’s a secret key and has great speed but the key can be compromised during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Asymmetric systems and advantages and what is public and private keys

A

They are two keys public and private but they used a lot of time to decrypt long message … Public key is used for encryption and private key is used for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Authentication

A

Verifies your identity message origin and content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Certificates

A

Digitally signed data structures that bind the identity of the cert holder to a public key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public key infrastructure (PKI)

A

A set of hardware, software, policies, and procedures used by CAs to create, manage, store, distribute, and revoke digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Repositories

A

Online facilities where CAs post certificates and certificate statues info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Secure socket later (SSL)

A

Internet protocol that allows protocols like http FTP and telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is 3DES

A

Uses 3 algorithms … E individual keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Skipjack

A

Symmetric encryption/decryption that users 80 bit key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is AES and what did it replace

A

It replace DES as the government standard in 2002 because it uses 128 bit 192 bit and 256 bit key lengths

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is COMSEC

A

Deny unauthorized persons information derived from information systems of the U.S. Government related to national security and ensure the authenticity of these information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What form is used for COMSEC package and how many?

A

SF 153 COMSEC Material Report and 3 of these forms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is SF 702?

A

Security container check sheet … Annotates opening and closing of the secure container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is AF Form 1109?

A

Visitor register log which is used to record visitors into restricted areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the security core of the STE

A

KOV-14 (Fortezza card)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What’s the difference between PSTN AND ISDN?

A

PSTN - is a standard telephone line

ISDN - is a high speed digital line capable of sending data at 128 Kpbs

17
Q

What can be removed from the KIV-7 cryptographic device ?

A

Cryptographic ignition key (CIK) and prevents unauthorized access and protects all internally stored keys and has the highest classification level of the keying material

18
Q

How many TACLANE ARE THERE?

A

TACLANE Classic
TACLANE -E100
KG-175D TACLANE micro

19
Q

What is the KOI-18 general purpose tape reader

A

A hand held paper tape reader fill device for loading crypt keys into security devices. It can read 8 lever paper or polyester tape and is battery powered with no internal memory and loads different key lengths like 128 keys

20
Q

Integrated maintenance day system (IMDS)

A

Used for tracking purposes and uses REMIS permits base level logistics data to be rolled up to the AF level

21
Q

What is Asset inventory management (AIM)

A

Part of AFEMS and is used for tracking purposes

22
Q

What is AFI 33-119

A

Guidance for messaging email accounts etc