Block 8 Flashcards

0
Q

Official information is broken down into what two categories?

A

Classified and Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

This is information that is owned by, produced for or by, or is subject to the control of the United States government and supporting agencies

A

Official Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 3 levels of classified information?

A

Top secret

Secret

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This type of classified information could cause exceptionally grave damage to the national security of it were to fall into the wrong hands.

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is type of classified is any information and material that is expected to cause “damage” or Identifiable damage to national security of revealed to our enemies

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a classified type and can cause a serious level of damage to national security if revealed to our enemies

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 types of unclassified information ?

A

FOUO

Privacy Act (PA)

Critical Information (CI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This falls under unclassified and is information that requires minimum safeguards to prevent widespread distribution to the public

Also referred to as sensitive but unclassified information (SBU)

A

FOUO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is an example of unclassified and it is made in 1974

And some examples are DOB, Social security number, name , etc.

A

Privacy act (PA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This falls under unclassified and it is any information providing clues in regard to US and friendly forces activities, capabilities, intentions , or limitations that an adversary might need to gain a military, diplomatic or technological advantage.

A

Critical Information (CI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This refers to measures and controls taken to deny unauthorized persons information derived from information systems of the United States Government related to national security and to ensure the authenticity of such information systems.

A

COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the four sections under COMSEC?

A

Transec

Cryptosec

Emsec

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

This is a component of COMSEC resulting from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis or complex code breaking techniques used to review encrypted information.

Example:

Change radio frequencies

Implement radio silence

Use directional antennas

A

Transec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The component of COMSEC resulting from the provision and proper use of technically sound crypto systems is called what?

A

CRYPTOSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

This subcategory of COMSEC determines protective measures that will deny unauthorized personnel access to classified and in some instances unclassified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals from systems processing this information

A

EMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This is another part of COMSEC that results from using all physical measures necessary to safeguard COMSEC material from access by unauthorized persons

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

This is the transformation of plaintext into ciphertext and then recovering the plaintext data from its ciphertext form

A

Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Cryptography relies on what two basic components?

A

Algorithm and a Crypto-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

This is turning ordinary data plaintext into coded form Ciphertext.

A

Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Turning ciphertext back into plaintext

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is the mathematical function or formula used in encryption and decryption

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is also known as a key variable,is the parameter or numeric value used in encryption and decryption

A

Crypto-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

This is the act or science of deciphering a code or coded message without a prior knowledge of the key.

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Points in the program where people break the security provided.

A

Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Actual or perceived actions that may cause harm to information or equipment

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the two basic types of approved cryptographic systems?

A

Secret key and public-key systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The system is also called secret key cryptography because an identical copy of keys is used in the cryptography process.

A

The symmetric key system

27
Q

This is also called public-key cryptography

A

Asymmetric key system

28
Q

This concept allows for a very secure means of telecommunications and is approved by the NSA for classified use

A

Symmetric (secret-key)

29
Q

This cipher operates encrypting/decrypting one chunk of data at a time and is the MOST COMMON type of symmetric algorithm

A

Block ciphers

30
Q

This symmetric algorithm cipher encrypts/decrypts varying links of data in a continuous stream.

A

Stream ciphers

31
Q

This is a publicly known block cipher cryptographic algorithm that converts plaintext into ciphertext using a key that consist of 64 binary digits

It is considered unsecure an insufficient for classified use

A

Data encryption standard(DES)

32
Q

This block cipher secret key algorithm was developed by the private sector as a countermeasure the shortfalls of DES

More secure than DES

A

Triple data encryption standard(3DES)

33
Q

This block cipher algorithm and Encrpts the message, but the key to encrypt the message is itself encrypted with a key combined with two escrowed keys

Widely used in Fortezza card technology for voice encryption systems

A

SKIPJACK

34
Q

This is a replacement for the unsecured DES made by the national Institute of standards and technology(NIST)

A

Advanced encryption standard(AES)

35
Q

This key system uses two different keys a public-key for encryption and a private key for decryption

A

Asymmetric(Public-Key systems)

36
Q

These systems secure data transmission to and from various types of terminal equipment such as desktop computers,servers, teletypes and etc.

A

Data encryption systems

37
Q

What are some hardware devices approved by NSA for securing classified data?

A

KG-84(A)

KG-84C

KIV-7

38
Q

What are some examples of encryption systems commonly used to secure classified voice transmissions?

A

KY-57

KY-58

KY-68

Secure terminal equipment (STE)

39
Q

This encryption system is also known as trunk encryption devices or TEDs and are designed to encrypt and decrypt a trunk.

A

Bulk encryption systems

40
Q

What are some examples of bulk encryption devices ?

A

KG-194

KIV-19

KG-175

41
Q

These systems are employed to ensure secure, network-centric connections over satellite, WANs,Broadband,Dial-up, and wireless networks

A

Network encryption

42
Q

What is the most common network encryption system used ?

A

KG-250 IP network encryptor

43
Q

What are the 3 roles in COMSEC program management?

A

COMSEC Manager

COMSEC Responsible officer

COMSEC authorized user

44
Q

This is information that must be safeguarded in the interest of national defense.

A

Classified information

45
Q

This is the wing level manager for COMSEC

A

COMSEC manager

46
Q

Subordinate to the COMSEC manager and is the squadron or flight liaisons between the users and the COMSEC manager

A

COMSEC responsible officer

47
Q

What are the access requirements to gain unrestricted access to areas containing COMSEC materials ?

A

Need to know

Proper security clearance

Proper identification

48
Q

These are areas or facilities containing military resources which could be targets for theft compromise or destruction into which entry must be limited in order to provide protection

Example Keesler Air Force Base

A

Controlled area

49
Q

These are any areas under military jurisdiction in which special security measures are employed to prevent unauthorized entry

Example: the flightline

A

Restricted area

50
Q

This is a restricted area room or group of rooms buildings or insulation where sensitive compartmented information(SCI) may be stored used discussed or electronically processed

A

Sensitive compartmented information facility

SCIF

51
Q

This organization was formed to Provide continuity in the protection of classified items

A

General services administration

GSA

52
Q

What is the top secret vault comprised of and what is The name of the vault?

A

A duel combo and two-person integrity and it is called a class A vault

53
Q

Secret material must be stored in what type of class vault ?

A

Class B volt or higher

And use a single combination

54
Q

KIV-7HS is used for what type of encryption?

A

Data

55
Q

A GSA container will have what form attached to it ?

A

Standard form 702

SF702

56
Q

When are lock combinations changed?

A

For combination locks it’s annually for cipher locks it’s monthly

also when a person who knows the combination no longer requires access to the container , container certified as locked just found open the combination is compromised and any repair work has been performed on the lock

57
Q

This form is used to record daily,shift or local inventories of accountable COMSEC material

Used for inventory checklist

A

AFCOMSEC Form 16

58
Q

These are used identify the level of accountability of a particular COMSEC item.

A

Accounting legend codes

ALCs

59
Q

What does ALC-1 inventory include?

A

Short title, edition, registry number, and quantity

60
Q

What does ALC-2 get inventoried by what two things?

A

Short title and quantity

61
Q

True or false: no inventory is required for the ALC-4 unless the local COMSPEC manager directs it

A

True

62
Q

What is ALC-6 reserved for?

A

Electronic keys

63
Q

How many personnel are required when posting amendments?

A

2

The first person as the new pages then checks the removed pages against the amended instructions to make sure that the only obsolete pages are removed and then records the change on the record of amendments page in the basic document

The second person checks the pages of the basic documents against the current list of effective pages and records the check on the record page of checks page in the basic document

64
Q

What form is used for COMSEC destruction reports?

A

Standard form 153

65
Q

This type of destruction occurs when material is destroyed without proper authority or was destroyed before the supersession date

A

Premature destruction

66
Q

This type of destruction occurs whens material are destroyed by accident

A

Inadvertent destruction