Cyber Transport Block 2 Flashcards

0
Q

What are the two broad categories for official information and materials?

A

Classified

Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

This is information that is owned by, and produced or is subject to the control of the United States government and supported agencies.

A

Official information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This information is information that must be safe guarded in the interest of national security, and that of our allies.

A

Classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three classification levels that are assigned by who?

A

Top secret
Secret
Confidential
NSA is who assign the levels of classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is the highest NSA classification and is given to any information and material that is expected to cause exceptional “grave” damage to national security if it were to fall in the wrong hands.

A

Top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What information is held to the highest degree of protection?

A

Top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is the NSA classification given to any information that is expected to cause a serious level of damage to national security if revealed.

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is the NSA classification given to any information that is expected to cause “damage” or identifiable damage to national security

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True/false

Unclassified information needs no limited degree of control or protection

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is any information that requires minimum safeguarding to prevent widespread distribution to the public.

A

For official use only

FOUO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What act does for official use only fall under to prevent the release to the public?

A

Freedom of information act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false

Markings are required for documents containing FOUO.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two unclassified FOUO information?

A

Privacy act

Critical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What year was the privacy act enacted?

A

1974

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of the privacy act govern?

A

Social security number
Date of birth
Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How long do you keep privacy act information, and how is it disposed of?

A

Only as long as necessary and must be destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is critical information?

A

Any unclassified information providing clues in regards to US and friendly forces activities, capabilities, intentions or limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

According to AF133-201V1, what is COMSEC?

A

Refers to measures and controls taken to deny any unauthorized persons information derived from information systems of the United States government related to national security and to ensure the authenticity of such information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the components of COMSEC?

A

TRANSEC
CRYPTOSEC
EMSEC
Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True/false:
TRANSEC techniques are not used to protect or secure transmitted classified or sensitive information.
(If false, make it true)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are authorized TRANSEC Methods?

A
Changing radio frequencies 
Cancel or alter communications patterns 
Implement radio silence 
Use frequency hopping systems
Use directional antennas
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is a component of COMSEC resulting from the application of measures designed to protect transmission from intercepting and exploitation by means other than “cryptanalysis” or complex code-breaking techniques used to reveal encrypted information

A

Transmission security (TRANSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is crypto security?(CRYPTOSEC)

A

Provisions and proper use of technically sound crypto systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This security is the part of the COMSEC that results from using all physical measures necessary to safeguard information or material from access by unauthorized persons.

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This determines protective measures that will deny unauthorized personnel access to classified and in some instance, unclassified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals from system processing this information.

A

Emission security (EMSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Cryptography relies on what two basic components?

A

Algorithm

Crypto-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is cryptography?

A

The transformation of ordinary plain text in to code from(cipher text) and then recovering the plaintext data from its cipher text form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This is authorized use of cryptographic system to return encrypted information to its original, readable form

A

Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

This is the mathematical function or formula used in encryption and decryption

A

Algorithm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

This is known as a key “variable” is the parameter or numerical value used in encryption and decryption

A

Crypto-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

The act or science of deciphering a code or coded message without a prior knowledge of the key.

A

Cryptanalysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Who approves all cryptographic systems and techniques used by or on the behalf of DOD activities to encrypt ______ and certain _______ ________ information.

A

NSA
Classified
Sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Who approves all techniques and system used to encrypt unclassified sensitive information?

A

National institute of standards and technology

NIST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are two types of approved cryptographic systems?

A

Secret-key

Public-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What high encryption/decryption key speed using hi tech crypto system

A

Symmetric (secret-key)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

True/false:

Symmetric (secret-key) encrypt is approved by odd and the NSA to use to encrypt classified information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are the two types of symmetric keys?

A

Block cipher

Stream cipher

37
Q

This encrypts/ decrypts varying lengths of data in a continuous stream instead of fixed chunks at one time

A

Stream cipher

38
Q

This operates by encrypting/decrypting one chunk of data at a time

A

Block ciphers

39
Q

This was issued to protect sensitive computer data in federal computer system by using block cipher cryptographic algorithm that converts plain text into cipher text using a key that consists of 64 bits.

A

DES

40
Q

This was issued as a “band-aid” for block cipher secret-key algorithm shortfalls

A

Triple data encryption standard(3DES)

41
Q

This classified symmetric encryption/ decryption block cipher algorithm developed by the US government for voice phones

A

Skipjack

42
Q

This was developed in a five year competition to replacement of the unsecured DES,

A

Advanced Encryption Standard (AES)

43
Q

True/false:
The problem with the secret-key system is that copies of one key must be distributed to all sides to establish a mirror image, if the keys are distributed through a secured communication channel it will be compromised during transmission.

A

False- it won’t be compromised

44
Q

The _______ the key length, the _____ possible keys there will be to search through to break the code, and the information will be ______ secure.

A

Larger
More
More

45
Q

This system secure data transmission, approved by the NSA to transmit classified data. to and from various types of terminal equipment, such as desktop computers, teletype and etc.

A

Data encryption

46
Q

What are different types of data encryption devices?

A

TSEC/KG-84, 84A and 84C general purpose encryption device

KIV-7 high speed data encryption device

47
Q

How does voice encryption work?

A

Transmission is first scrambled by the encryption device and then carried via modem or similar communication devices securely over leased lines, satellite, microwave or radio signals.

48
Q

What are different types of voice encryption?

A

TSEC/KY-57 & KY-58 voice encryption
TSEC/KY-68 digital subscriber voice terminal
Secure terminal equipment

49
Q

This encryption is also known as trunk encrypts microwave trunks, high speed landlines(fiber optics) circuits and T-1/T-3 satellite channels.

A

Bulk encryption

50
Q

What are different types of bulk encryption systems?

A

TSEC/KG-194 and 194A trunk encryption devices
KIV-19
TACLANE-Micro KG-175D

51
Q

This encryption system are products that classified data while in transit over internet protocol network.

A

Network encryption

52
Q

What is one network encryption device?

A

KG-250 Network encryptior

53
Q

This person is usually the wing-level manager for the base COMSEC accounts and all COMSEC programs and material on base.

A

COMSEC manager

54
Q

This person is the squadron or flight liaisons for COMSEC management, they are responsible for administering the physical security procedures for their responsible sub-accounts, validating access, and training/certifying all authorized COMSEC users

A

COMSEC responsible officer

55
Q

This person uses COMSEC materials and equipment to perform his/her mission and must safeguard these assets at all time. Once the individual May be designated as a COMSEC Authorized user and granted unescorted access to the material within their account.

A

Authorized user

56
Q

In order to be granted unrestricted access to areas containing COMSEC material, what three requirements must be verified and valid?

A

Need-to-know
Proper security clearance
Proper identification

57
Q

What are the two areas protected by physical security?

A

Controlled area

Restricted area

58
Q

This is a restricted area, room, group of rooms, building or installation where sensitive compartmented information may be stored and used, discussed and/or electronically processed.

A

Sensitive compartmented information facility( SCIF)

59
Q

A failure to safeguard information or protect materials from unwanted access. This is sometimes known as a _____

A

Breach

60
Q

This is a government agency that has worked to establish standards for storage containers used to safeguard materials.

A

General services administration (GSA)

61
Q

What GSA file container has a dual- combo capability to ensure two-person integrity and stores top secret material.

A

Class A vault

62
Q

Secret material must be stored in this GSA-approved safe with a single combination

A

Class B vault

63
Q

True/false:
Confidential material will be stored in a secured room but may not be stored under the same safeguards as top secret or secret COMSEC materials.

A

False- it can be stored the same as TS and secret.

64
Q

This form is a record of events such as who opened/closed the container, the time it was opened/closed and who checked the container to ensure it was secured properly

A

Standard form 702. Security container check list

65
Q

How often are combinations changed and how long are cipher locks changed?

A

Combo: annually
Cipher: monthly

66
Q

When should you immediately change combination locks?

A
  • a person that knows the combination and no longer requires access
  • a container as locked is found open
  • if the combination is compromised
  • any repairs work has been made
67
Q

This is a list for unescorted access to COMSEC material that has proper authorization to gain access to a secured area

A

Access list

68
Q

This is where someone has proper identification and a sufficient need-to-know, but does not have a security clearance that is equal to or greater than the area of information. They wouldn’t be put on the access list. What form would you use?

A

AF form 1109 visitor register log

69
Q

This is required when dealing with Top secret information and material

A

Two person integrity (TPI)

70
Q

What form would you use for inventory?

A

AFCOMSEC Form 16

71
Q

What ALC code whorls use for the following?

  • must require continuous accountability from cradle to grave and incl. short title, reg number, and quantity
  • must include short title and quantity
  • reserved for electronic keys
A

1- ALC-1
2- ALC-2
3- ALC-6

72
Q

What form do you use for destruction of information?

A

Standard form 153 COMSEC Destruction report

73
Q

When do you destroy COMSEC material?

A

When it becomes outdated and must be destroyed

74
Q

This occurs when material is destroyed without proper authority or destroyed before the super session date.

A

Premature destruction

75
Q

This occurs when material is destroyed completely by accident.

A

Inadvertent destruction

76
Q

True/false:

Destroying superseded COMSEC equipment beyond any possible reconstruction

A

False

77
Q

What are the authorized methods for routinely destroying methods of COMSEC aids?

A

Burning
Shredding
Pulping

78
Q

What are two methods of emergency destruction which are not suitable for destruction?

A

Sodium nitrate

Thermite

79
Q

What type of keying material should be destroyed first during emergency destruction?

A

All superseded keying material

80
Q

This determines protective measures that will deny unauthorized personnel access to classified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals.

A

EMSEC

81
Q

This code name referring to investigation and studies of compromising emission

A

TEMPEST

82
Q

This is defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled or otherwise processed by any information processing equipment.

A

Compromising emanations

83
Q

Red and black equipment shall be separated by at least_____?

A

3ft.

84
Q

Red equipment shall be separated by at least ______ within the air craft.

A

2 inches

85
Q

Black voice equipment shall be separated from red equipment by at least________.

A

6 ft.

86
Q

What agency must approve modifications to CCI?

A

NSA

87
Q

What are unauthorized modifications to CCI considered?

A

Tampering

88
Q

Who publish the time compliance technical order or the time compliance limited maintenance manual?

A

NSA

89
Q

How will ciphering devices be delivered to a military client?

A

From the production line to a central COMSEC depot via a special courier