7E Flashcards

1
Q

Communications Security (COMSEC) is Cyber Security discipline outlined in AFI ____, Cybersecurity Program Management.

A

AFI 17-130

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The objective of the _____ program is to ensure the employment of measures and controls taken to deny unauthorized persons information derived from information systems of the United States Government related to national security and to ensure the authenticity of such information systems.

A

COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does COMSEC stand for?

A

Communications Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COMSEC protection results from applying security measures (i.e., cryptosecurity and transmission security) to communications and information systems generating, handling, storing, processing, or using classified or sensitive government or government-derived information, the loss of which could adversely affect the national security interest. It also includes applying ____ security measures to COMSEC information or materials.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

______ is the conversion of data into a form that cannot be easily understood by unauthorized people. Converts plain-text (unencrypted) to cipher-text (encrypted).

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

______ is the restoration of encrypted data to its original plain text or other readily usable state. Converts cipher-text (encrypted) to plain-text (unencrypted).

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is the use of coding systems to encrypt and decrypt information.

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ is the science of trying to break a coding system so that the information can be revealed to an unauthorized user.

A

Cryptoanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Due to a wide variety of vulnerabilities, COMSEC has been subdivided into manageable components:

A
  • Cryptosecurity
  • Transmission Security (TRANSEC)
  • Physical Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The following describes which COMSEC components?

____ is the protection that results from the proper use of cryptographic systems. ____ includes not only creating a highly secure encryption system, but also using it properly.

A

Cryptosecurity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ____ component under COMSEC is Transmission Security (TRANSEC).

A

second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_______ results from all measures designed to protect intentional transmissions from interception and exploitation by means other than crypto analysis.

A

TRANSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does TRANSEC stand for?

A

Transmission Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You have been practicing physical security all your life. When you leave home, you lock the doors and windows. The same goes for your car. When an uninvited stranger appears at your
door, you do not let them in without finding out who they are or what they want. These are aspects of ___ ___.

A

physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In COMSEC, physical security takes on additional threats that must
be addressed. These issues include…?

A
  1. improper destruction of waste
  2. improper handling
  3. unauthorized viewing or possession of COMSEC material
How well did you know this?
1
Not at all
2
3
4
5
Perfectly