Board Flashcards

0
Q

FAIRECONRONONEINST 2280.1A

A

Handling and accounting of CMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

COMVAQWINGPACINST 2280.1F

A

COMSEC material system (CMS) policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FAIRECONRONONEINST 5530.1F

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FAIRECONRONONEINST 5510.2

A

VQ1 CMS emergency action plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FAIRECONRONONEINST 5510.4

A

VQ1 emergency destruction plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is the command security manager?

A

N2 department head. LCDR Peeler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the command security managers relationship to the CMS/EKMS program?

A

Verifying that potential users have the proper clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 requirements for gaining access to COMSEC

A
  1. Authorized writing by the CO
  2. Proper clearance
  3. Need to know
  4. PQS qualification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define access

A

The opportunity and capability to obtain knowledge of COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define need to know

A

Individuals with a valid need to know whose official duties require access to COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define clearance

A

Requires a security clearance equal to or higher than the classification of the material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 uses of the SF 153

A
  1. Transfer
  2. Inventory
  3. Destruction
  4. Hand receipt
  5. Other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the SF 700 used for?

A

Record passwords and combos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Storage procedures for safeguarding PINs, passwords and combos.

A

Use SF 700. Store in a secure off site central location and do monthly integrity checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a SF 701 used for?

A

End of day security checklist for spaces containing classified material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the SF 702 used for?

A

Records the opening/closing of secure containers or doorways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the CMS 25 form used for?

A

Record of routine destruction of KEYMAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an optional form 89 used for?

A

Documents maintenance of a security container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How long do you keep an optional form 89? Where do you keep it?

A

For the life of the security container.

The back of the drawer that has the lock on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are AL codes?

A

Accountability Legend codes.

Determine how COMSEC material is accounted for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2 places you could locate what each AL Code means.

A
  1. SF 153

2. EKMS 1B CH. 2 Section 230

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain the importance of reporting COMSEC incidents

A

So appropriate action can be taken to minimize adverse impact on national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What chapter in the EKMS 1B covers COMSEC incidents?

A

Chapter 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 types of COMSEC incidents with examples.

A
  1. Physical incident: the physical loss of COMSEC material.
  2. Personnel incident: espionage, capture of persons
  3. Cryptographic incident: using COMSEC keying material that is compromised or superseded.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is PDS?

A

Practices Dangerous to Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What chapter in the EKMS 1B has information pertaining to PDS?

A

Chapter 10

26
Q

2 types of PDS and an example.

A
  1. Reportable: early destruction of key that needs reissue

2. Non Reportable: early destruction of key that does not need to be reissued

27
Q

What does CCI stand for?

A

Controlled Cryptographic Item.

KY-58, KYV-5, KG-84

28
Q

State the reason for zeroizing CCI and fill devices.

A

To prevent compromise

29
Q

What are the preferred methods of destruction for CCI?

A

Zeroize and destroy till total breakage

30
Q

Is COMSEC repaired at command level?

31
Q

Who do we turn broken COMSEC to and what forms are required?

A

FRCNW with a green MAF and CMS 17 custody card.

32
Q

Who can authorize cryptographic period extensions?

A

The Controlling Authority of the material.

33
Q

How would you locate a cryptographic period for a short title?

A

Using a current ESM Effective Status Message

34
Q

How would you locate a current ESM?

A

Check message traffic and search SIPR net or JWICS

35
Q

What is a page check and when are they required?

A

The process of checking every page of an issued document or pub for discrepancies and damage.
Upon issuance, transfer, destruction and inventory.

36
Q

What are the 3 possible statuses of KEYMAT?

A

Reserve on Board (ROB), effective and superseded

37
Q

Define black key

A

Encrypted key

38
Q

Define red key

A

Unencrypted key

39
Q

Define modern key

A

FIREFLY type key. Electronic.

40
Q

Define traditional key

A

Non FIREFLY key or paper key.

41
Q

Can COMSEC be stored with non COMSEC in the same drawer?

42
Q

How should COMSEC be organized when stored?

A

By status (ROB, effective, superseded) and classification.

43
Q

Why is it important to store COMSEC by status and classification?

A

To execute EAP/EDP effectively by precedence of material

44
Q

What type of container is used to store COMSEC?

A

General Service Administration (GSA) approved safe

45
Q

What type of container can COMSEC materials be couriered in when not on an aircraft?

A

Any container that can’t be easily tampered or accessed by unauthorized personnel.

46
Q

How is a GSA approved container identified?

A

By a GSA labeled placard

47
Q

What are the approved locks for use when safeguarding COMSEC materials?

A
  1. X series
  2. S&G combo locks
  3. Standard navy issued brass locks with no master key
48
Q

How are lock combos classified?

A

Classified the same as the highest level of material being protected.

49
Q

When must a combo be changed?

A
  1. Initial use
  2. No longer require access
  3. Compromise
  4. Taken out of service
  5. Maintenance
  6. Every two years
50
Q

What are the preferred methods of destruction for key tape?

A
  1. Burning
  2. NSA approved microfilm shredder
  3. Acetone
51
Q

How long do you have to destroy issued KEYMAT? KEYMAT on board an aircraft?

A

12 hours on the ground.

On board an AC, destroy as soon as practicable upon completion of airborne operations.

52
Q

What are the 3 different types of super session?

A
  1. Emergency: the destruction of KEYMAT that has or may be compromised.
  2. Routine: the normal destruction of KEYMAT that has regularly superseded.
  3. Irregular: destruction of KEYMAT when an event happens.
53
Q

What actions should a user take when an unauthorized destruction occurs?

A

Submit a report to the EKMS custodian. It is assessed as a reportable or non reportable PDS.

54
Q

What is TPC?

A

Two Person Control: continuos surveillance and control of materials and devices at all times by a minimum of two authorized persons

55
Q

What is TPI?

A

Two Person Integrity: a system of handling and storing designed to prevent single person access to certain COMSEC KEYMAT

56
Q

What are the TPI/TPC requirements for using and storing KEYMAT?

A

TPC when KEYMAT is unsecured

TPI when storing or securing.

57
Q

What are the TPI/TPC requirements for electronic fill devices?

A

TPC & TPI when filled.

Not needed when empty.

58
Q

What are the TPI/TPC requirements for routine destructions?

59
Q

What are the TPI/TPC requirements for crypto ignition keys CIK?

A

TPC is only needed when plugged into the corresponding gear that has been filled.

60
Q

What are the TPI/TPC requirements for the flight line?

A

TPC and TPI for outside the flight line.

TPC or TPI inside the flight line.

61
Q

How does the COMSEC material control system apply to this command?

A

It applies to VQ1 because we use sensitive information to operate and it is important to our national security protect that information.

62
Q

Can our command execute missions without a CMS program in place?