EKMS 1E, EKMS POLICY AND PROCEDURES FOR NAVY ELECTRONIC KEY MANAGEMENT SYSTEM TIERS 2&3 Flashcards
Which material is used to protect U.S. Government and partner classified or sensitive unclassified communications or information from unauthorized persons?
Communications Security (COMSEC)
Which system was established to distribute, control, and safeguard Communications Security (COMSEC) material?
(COMSEC) Material Control System (CMCS)
What is an interoperable collection of systems, facilities, and components developed by the services and agencies of the U.S. Government to automate the planning, ordering, filling, generation, distribution, accountability, storage, usage, destruction and management of electronic key and other types of Communications Security (COMSEC) material?
Electronic Key Management System (EKMS)
The overall Electronic Key Management System (EKMS) architecture consists of how many layers or tiers?
4
Which Electronic Key Management System (EKMS) Tier consists of the National Security Agency’s (NSA) Fort Meade and Finksburg Key Facilities and provides centralized key management services for all forms of Communications Security (COMSEC) key?
Tier 0
Which Electronic Key Management System (EKMS) layer serves as the intermediate key generation and distribution center, central offices of record (COR), privilege managers, and registration authorities for EKMS/COMSEC accounts?
Tier 1
What houses the physical Electronic Key Management System (EKMS) servers that are used for accounting and will provide for the generation and distribution of many traditional key types for large nets?
Common Tier I (CT1)
Which Electronic Key Management System (EKMS) layer is comprised of the EKMS Accounts that manage and other Communications Security (COMSEC) material?
Tier 2
Which Electronic Key Management System (EKMS) layer is the lowest tier or layer of the EKMS architecture?
Tier 3
What serves as Tier 0 and is the executive agent for developing and implementing national level policy affecting the control of Communications Security (COMSEC) material ?
National Security Agency (NSA)
Which term is used to refer to the Tier 1 site having primary COR (Central Office of Record) responsibility for a portion of the Tier 2 accounts?
Primary Tier 1 Segment (PT1S)
Who has overall responsibility and authority for implementation of National Communications Security (COMSEC) policy within the Department of the Navy (DoN)?
Chief of Naval Operations (CNO)
What serves as Communications Security (COMSEC) resource sponsor for the Marine Corps?
Headquarters Marine Corps (HQMC) C4 CY
What administers the Department of the Navy (DoN) Communications Security (COMSEC) program and is the Service Authority for the Department of the Navy (DoN)?
Naval Communications Security Material System (NCMS)
What receives, stores, and ships Ready for Issue (RFI) equipment and is the Physical Material Handling Segment (PMHS) for Navy in the EKMS?
COMSEC Material Issuing Office (CMIO)
What is the consolidated (Air Force, Army, Navy and NSA) Communications Security (COMSEC) distribution facility for keying material?
United States National Distribution Authority (USNDA)
What is responsible for evaluating Communications Security (COMSEC) incidents and authorizing the issue/destruction of COMSEC material under their control?
Controlling Authority (CONAUTH)
A Communications Security (COMSEC) account is an administrative entity in which custody and control of Communications Security (COMSEC) material are maintained. These accounts are called Tier 2 accounts and are identified by an account number consisting of how many digits?
6
How many LCMS System Administrators at a minimum must be appointed?
2
Who is the Commanding Officers (CO’s) primary advisor on matters concerning the security and handling of Communications Security (COMSEC) material and the associated records, reports, and audits?
COMSEC Manager
How many variants of Local Elements are there?
2
How many categories do Local Elements (LEs) in transit fall into?
2
What is defined as any activity, organization, or person(s) performing some type of key management-related function or functions, which has been assigned an EKMS ID?
Key Management Entity (KME)
What is the FIREFLY POC for modern key privileges?
Naval Communications Security Material System (NCMS)
Communications Security (COMSEC) material must be handled and safeguarded based on its assigned classification and accounted for based on which code?
Accountability Legend (AL)
How many standard classification markings are used to indicate the classification of Communications Security (COMSEC) material?
4
A short title consists of how many alphanumeric characters without special characters, e.g., /, -, etc.?
24
Within Local COMSEC Management Software (LCMS), electronically generated keying material can be assigned an accounting number of what?
0
Short titles are created and defined based on guidance found in which publication?
CNSSI-4033
Which codes determine how Communications Security (COMSEC) material is accounted for within the (COMSEC) Material Control System (CMCS)?
Accountability Legend (AL)
How many Accountability Legend (AL) codes are used to identify the minimum accounting controls required for Communications Security (COMSEC) material?
5
Which Accountability Legend (AL) is assigned to traditional hardcopy Communications Security (COMSEC) material that is continuously accountable to the Central Office of Record (COR) by accounting (serial/register) number from production to destruction?
AL Code 1
Which Accountability Legend (AL) code is assigned to traditional hard copy Communications Security (COMSEC) material that is continuously accountable to the Central Office of Record (COR) by quantity from production to destruction?
AL Code 2
Which Accountability Legend (AL) code is assigned to traditional hardcopy Communications Security (COMSEC) material that after initial receipt to the Central Office of Record (COR), Communications Security (COMSEC) material is locally accountable by quantity and handled/safeguarded based on its classification?
AL Code 4
Which Accountability Legend (AL) code is assigned to electronically generated keys for Communications Security (COMSEC) material that is electronically generated and continuously accountable to the Central Office of Record (COR) from production to destruction?
AL Code 6
Which Accountability Legend (AL) code is assigned to electronically generated keys for Communications Security (COMSEC) material that is electronically generated and locally accountable to the generating facility?
AL Code 7
Electronic key generated under the provisions of which series other than the KP (KOK-22) is not assigned an Accountability Legend (AL) code?
NAG 16
COMSEC Material Issuing Office (CMIO) Norfolk is required to continuously account to the Central Office of Record (COR) for all Accountability Legend (AL) material falling under which code?
AL Code 4
Which marking or designator identifies all Communications Security (COMSEC) keying material that is used to protect or authenticate classified or sensitive unclassified government or government-derived information, the loss of which could adversely affect national security?
CRYPTO
Any physical media to be transferred or issued, other than a KSD-64A, on which electronic keys have been loaded will have a short title and an Accountability Legend (AL) code of 1 or what else?
4
Which type of Electronic Key Management System (EKMS) Message key is a modern (asymmetric) key used to create FIREFLY vectors (credentials) to encrypt keying material for distribution between EKMS accounts or to perform benign fill techniques?
KP FIREFLY
Which type of Electronic Key Management System key is a modern key generated by the EKMS CF and filled from a KSD-64A cryptographically “sign” EKMS messages?
Message Signature Key (MSK)
FIREFLY Key and Message Signature Key (MSK) along with the KP Privilege Certificate (PRIV CERT) must be requested from what whenever an LMD/KP is brought on-line for the first time (site initialization) or following a catastrophic failure of the LMD/KP that results in the system requiring a new site initialization?
Naval Communications Security Material System (NCMS)
Procedures for loading of either the FireFly (FF) Vector Set or Message Signature Key (MSK) are outlined in which series?
EKMS-704
There are several keys the Key Processor (KP) generates and uses internally which the user never encounters directly, but are affected by certain LMD/KP processes; these processes are: Site Re-initialization, KP Changeover, and what else?
KP re-key
Which process enables the recovery of all protected data stored on the Local Management Device (LMD) and is used when a key processor (KP) must be replaced with a new Key Processor (KP) due to failure or recertification?
Site Reinitialization
Which process is used to re-encrypt the Local Management Device (LMD) database when the crypto period of the Key Encryption Key Local (KEKL) expires?
Changeover
Changeover will be performed following a Site Reinitialization and at a minimum of every three months thereafter (maximum of how many days between Changeovers)?
92
Which process is when the Account Manager requests an update to the FIREFLY Key?
KP Rekey
How often at a minimum must KP Rekeys be performed?
Annually
What must be processed prior to conducting a KP rekey and posting new credentials?
Bulk Encrypted Transactions (BETs)
What are designed to enable to KOK-22A (KP) to locally produce keying material for existing and emerging Communications Security (COMSEC) equipment?
KG Rules
What is a designator which identifies secure telecommunications or information handling equipment, or an associated cryptographic component, which is unclassified but controlled within the (COMSEC) Material Control System (CMCS)?
Controlled Cryptographic Item (CCI)
Communications Security (COMSEC) keying material will, at all times, be in one of how many status conditions?
3
Which Communications Security (COMSEC) keying material status condition means it is being held for future use?
Reserve
Which Communications Secuirty (COMSEC) keying material status condition means it is authorized for use?
Effective
Which Communications Security (COMSEC) keying material status condition means it is no longer authorized for use and must be destroyed within the time frames in Article 540?
Superseded
Which term refers to a time when a particular item of Communications Security (COMSEC) material is no longer eligible for use?
Supersession
How many ways can Communications Security (COMSEC) material be superseded?
3
Which type of Communications Security (COMSEC) material supersession is based on a specific, pre-determined supersession date for each edition of material by the Controlling Authority?
Regular
Which type of Communications Security (COMSEC) material supersession is not pre-determined but which occurs as a result of use?
Irregular
Which type of Communications Security (COMSEC) material supersession is defined as an unplanned change of supersession, usually as the result of a compromise directed by the Controlling Authority?
Emergency
What reflects most Communications Security (COMSEC) material distributed to Department of the Navy (DoN) accounts and is a guide and not an authoritative source for destruction of keying material?
Status of COMSEC Material Report (SCMR)
What contains status information for NATO Communications Security (COMSEC) material and must be held by Department of the Navy (DoN) accounts which hold NATO material?
AMSG-600
Status information for keying material designated for use as part of the Inter-Theater COMSEC Package (ICP) is promulgated in a series of messages using pre-determined date-time-groups (DTGs) by the Joint COMSEC Management Office (JCMO) on what basis?
Quarterly
Policy and procedures for handling Two-Person Controlled (TPC)/Sealed Authentication Systems (SAS) material are contained in which series?
CJCSI 3260.01
The status of Communications Security (COMSEC) manuals and publications is normally listed on which page within these documents?
Letter of Promulgation (LOP)
Communications Security (COMSEC) material is divided into how many categories or material types?
3
Which type of Communications Security (COMSEC) material supplies either encoding means for manual and auto-manual cryptosystems or key for machine cryptosystems?
Keying
Which type of keying material includes keylists, codes, authenticators, Identify Friend or Foe (IFF) keying material, and one-time pads, but does not include canister-packaged key tapes?
Paper
Which type of keying material is designed to permit the extraction and removal of individual segments of key for hourly, daily, weekly, etc… use?
Extractable
Which type of keying material is designed to remain intact throughout its entire effective period?
Non-extractable
Which type of keying material includes electronically genereated key, either produced by a KP or other key variable generating device, electronic keys converted from key tape, electronic keys stored on magnetic media (e.g., floppy disk) and key loaded onto a fill device (e.g., KSD 64A)?
Electronic
Which type of keying material includes, key tapes, keying plugs, keyed microcircuits, removable media (e.g., floppy disks), magnetic tapes, and keying material in solid state form such as programmable read-only memories (PROMs), read-only memories (ROMs), metallic oxide semi-conductor (MOS) chips, and micro-miniature tamper protection systems (micro-TPS)?
Non-paper
Communications Security (COMSEC) keying material packaged in canisters has a preprinted digraph, consisting of how many letters, printed to the left of the short title on each extractable segment of the tape leader?
2
Due to the ongoing DoD-wide transition to the Key Management Infrastructure (KMI) driven by the NSA-directed End-of-Life) for EKMS, the EKMS Manager COI is only available in how many geographical locations?
2
All USN military personnel appointed or designated as an Account Managers, Alternate, LEs Issuing or LE User, must complete the applicable portions of the latest version of NAVEDTRA 43462-1 (EKMS PQS) or what else for the position they are fulfilling?
NAVEDTRA 43462-2 (KMI PQS)
Department of the Navy (DoN) Communications Security (COMSEC) accounts have the option to receive a Training Visit from their local Central Office of Record (COR) Audit Team at any time. It is HIGHLY RECOMMENDED and in the command’s best interest to take advantage of the training and assistance services prior to an audit, deployment or upon change of command or Manager. How many training visits will be funded by Naval Communications Security Material System (NCMS) per audit cycle?
1
All Department of the Navy (DoN) Communications Security (COMSEC) accounts must undergo a formal CMS COR Audit at least once every how many months?
24
Communications Security (COMSEC) Account Managers are required to use the current version of which publication to conduct a semi-annual self-assessment?
EKMS-3
Which Audit Teams constitute a worldwide network of COMSEC subject matter experts established to provide assistance and training to personnel assigned Communications Security (COMSEC) responsibilities?
Central Office of Record (COR)
Central Office of Record (COR) Auditiors must attend the Central Office of Record (COR) Audit Team Training seminar once every how many months to maintain certification?
36
How often are EKMS/KMI Town Halls hosted, permitting funding, by Naval Communications Security Material System (NCMS) and are primarily intended for Commanding Officers (COs), COR Auditors, and account Managers?
Annually
Central Office of Record (COR) Audit Team responsibilities are divided among how many teams?
11
How many steps are required to establish a Communications Security (COMSEC) account?
6
The distribution of all Communications Security (COMSEC) material requires authorization from who in relation to the material?
Controlling Authority (CONAUTH)
Who are responsible for obtaining Controlling Authority (CONAUTH) validation for Communications Security (COMSEC) material not reflected in fleet instructions as part of the commands standard allowance?
Immediate Superiors in Command (ISICs)
At least how many days is required to establish a Communications Security (COMSEC) account and to provide the initial Communications Security (COMSEC) material?
45
The account Manager must coordinate with the area Defense Courier Division (DCD) station and establish a Defense Courier (DC) account by submitting which form?
USTRANSCOM Form 10
Accounts expecting to receive over-the-counter (OTC) service from CMIO must submit which form to the Communications Security (COMSEC) Material Issuing Office (CMIO) reflecting account personnel authorized to receipt for and courier Communications Security (COMSEC) equipment for their command?
CMS Form 1
Upon receipt of a Communications Security (COMSEC) account establishment message reflecting the account number assigned to the command from Naval Communications Security Material System (NCMS), the command must establish a User Representative (UR) account with the Electronic Key Management System (EKMS) Central Facility (CF). This is accomplished through completion and submission of which form to the commands Command Authority (CA)?
CF Form 1206
When an installation date is received, the command, not the installation team, must submit a request for a FIREFLY Vector Set (FF), Message Signature Key (MSK), and how many KSV-21 cards with Electronic Key Management System (EKMS) privileges in accordance with Article 670 to this manual?
2
When appointing Electronic Key Management System (EKMS) personnel, the Commanding Officer must consider the size of the account, the number of Local Elements (LEs) supported, the location where the Local Elements (LEs) operate, and which other requirements?
Two-Person Integrity (TPI)
Which form must be reviewed and executed by personnel with access to cryptographic information?
SD Form 572
Each numbered Communications Security (COMSEC) account will have a Manager, and a minimum of how many alternates appointed by the current Commanding Officer?
1
Individual appointment letters for Communications Security (COMSEC) account managers and alternates will be updated/signed by the incoming CO/OIC within how many days of assumption of command?
60
What is the minimum required enlisted pay grade to be assigned as a Communications Security (COMSEC) account manager?
E-6
What is the minimum required enlisted pay grade to be assigned as a Communications Security (COMSEC) account manager alternate?
E-5
Temporary access for which clearance level may only be authorized by DON CAF?
SCI
What is the minimum required enlisted paygrade to be assigned as a Local Element (LE) issuing (for keying material designated as CRYPTO)?
E-5
Commanding Officers are authorized to waive the length of government service required for Managers. If approved, waivers will be granted for the minimum duration required for the unit to comply with the policy in which the waiver was obtained, up to a maximum of how many years?
1
The Communications Security (COMSEC) account manager may not be absent for more than how many days?
60
During the temporary absence of the Communications Security (COMSEC) account manager, the Primary Alternate Manager must administer the account but may not do so for longer than how many days?
60
In accordance with which publication can Commanding Officers or Officers in Charge grant temporary access to individuals pending completion of full investigative requirements and pending establishment of security clearance eligibility by the DON CAF?
SECNAV M-5510.30
What is used to determine the highest classification of Communications Security (COMSEC) material that an account may hold?
Highest Classification Indicator (HCI)
Commands that undergo a shift in claimancy or a name change will refer to which series for instructions on modifying their own Common Account Data (CAD) and uploading account registration changes and credentials to the Directory Server?
EKMS 704
Assignment of a Staff CMS Responsibility Officer (SCMSRO) does not relieve the appointing official of ultimate responsibility for the proper management of an Electronic Key Management System (EKMS) account. The SCMSRO may delegate how many of the Commanding Officer (CO) spot checks to the Communications Officer (COMMO), as long as the COMMO is not designated as the Communications Security (COMSEC) Account Manager or Alternate?
2
What must be executed between the Electronic Key Management System (EKMS) account command and the Local Element (LE) command when a Local Element (LE) is responsible to a Commanding Officer other than that of the numbered Electronic Key Management System (EKMS) account command or issuing activity?
Letter of Agreement (LOA)
Letters of Agreement remain in effect until modified or the support is no longer required. LOAs/MOUs will be reviewed at a minimum of how often?
Triennially
Commanding Officers (crypto net members) can extend crypto periods for how many hours without Controlling Authority authorization when necessary to complete a transmission or conversation?
2
How often at a minimum must Commanding Officers (COs) conduct spot checks of the Communications Security (COMSEC) Vault and spaces where Communications Security (COMSEC) material is used and stored?
Quarterly
How often at a minimum must training be held to ensure that all personnel handling Communications Security (COMSEC) material must be familiar with and adhere to proper communications Security (COMSEC) procedures?
Monthly
The Communications Security (COMSEC) account manager must ensure that procedures are established to reassign local custody responsibility for Communications Security (COMSEC) material held by individuals permanently leaving the command, and those who are departing on TAD/TDY in excess of how many days?
30
The Communications Security (COMSEC) account manager must ensure that modifications to Communications Security (COMSEC) equipment are promptly and properly performed by qualified individuals in accordance with which series and that modification residue is disposed of properly?
OPNAVINST 2221.3
The Communications Security (COMSEC) account manager must track and manage production and destruction dates for Modern Key held by the account and ensure timely submission of key orders for replacement material required no later than how many days from the expiration date of the keys currently held?
30
Which personnel are responsible to their Commanding Officer for the proper management and security of all Communications Security (COMSEC) material held by the command?
Local Element (LE)
Local Element (LE) personnel issue Communications Security (COMSEC) material on local custody forms after verifying that the recipient is authorized to hold Communications Security (COMSEC) material and has executed which form?
SD Form 572
Each person authorized access to Communications Security (COMSEC) material as a user or witness, when required is personally responsible for the proper safeguarding, accountability, usage and what else in regards to the material?
Disposal
Construction specifications for shore-based Communications Security (COMSEC) storage vaults used to store keying material constructed or modified after 01 Jan 2013 will be in accordance with which publication?
ICD-705
All personnel having access to cryptographic information (keying material, book packaged material marked/ designated crypto, or equipment which permits extraction of key (SKL, TKL, KP)) must be authorized in writing by the current Commanding Officer or “Acting Commanding Officer”. The use of what is not authorized in granting access to COMSEC material?
By Direction
Access lists used for granting access to cryptographic information will be updated whenever the status of an individual changes, upon Change of Command or how often at a minimum?
Annually
While only U.S. citizens are eligible for a security clearance, a resident alien or foreign national may be granted a “Limited Access Authorization” (LAA) in compliance with DoD 5200.2-R section C3.4.3 Such individuals may have access to COMSEC material no higher than what, if they have an LAA based on a completed successful background investigation and indoctrination, on a “need to know” basis, when their duties require such access?
Confidential
Who may not be appointed as Communications Security (COMSEC) Account Managers, Clerks, or equipment maintenance personnel nor have access to safes or areas where Communications Security (COMSEC) keying material is accounted for, visible, or stored?
Resident aliens
The release of Communications Security (COMSEC) material to a contractor account or direct issuance to contractor personnel as Local Elements (LEs) by a DON COMSEC account is restricted to U.S. Industrial firms operating under contract to the U.S. Navy in accordance with the provisions of which series?
OPNAVINST 2221.5
What is the system of storage and handling designed to prohibit individual access by requiring the presence of at least two authorized individuals, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed?
Two-Person Integrity (TPI)
Two-Person Integrity (TPI) storage requires the use of an approved Communications Security (COMSEC) vault or which type of approved security container?
General Services Administration (GSA)
Combinations must be changed at least once every how many years?
2
Combinations to Communications Security (COMSEC) material security containers, KP PINs and LCMS passwords must be recorded and individually wrapped in aluminum foil and protectively packaged in a separate combination envelope (which form)?
SF-700
How often at a minimum must an inventory document be created and used to inspect SF-700s?
Monthly
In an emergency, the Commanding Officer or other designated authority may direct the opening of any Communications Security (COMSEC) material security container. At least how many individuals shall be present to conduct and witness the emergency opening?
2
The Local Management Device (LMD) is pre-configured to lock out accounts after 3 failed attempts and to request a password change every how many days?
90
If unauthorized adjustments or suspicious activity is detected on the LMD, consult local, service-specific Information Assurance (IA) policy or which series for any required reporting?
SECNAVINST 5239.3
The LMD/KP including connecting cables, must be maintained, operated, and stored in a space approved for the open storage of which type of material?
SECRET
What must be maintained for each lock on a Communications Security (COMSEC) storage container?
SF-702
Which form must be prepared and maintained when a container, lock or vault door is put in use?
OF-89
The FIREFLY vector set is classified based on the Highest Classification Indicator (HCI) of the account; designated as CRYPTO; accounted for as ALC 1 or what else and permits the ability to generate and exchange credentials to transfer or receive keying material up to the Highest Classification Indicator (HCI)?
6
All magnetic media, including backup media, floppy diskettes, etc… used in the LMD/KP must be classified and safeguarded at which level?
SECRET
PINS must be changed at a minimum of every how many days or upon change of personnel?
90
When shipping keying material marked CRYPTO, packages will contain no more than how many editions for material that is superseded quarterly or more frequently?
4
All TOP SECRET and SECRET keying material marked or designated CRYPTO and items that embody or describe a cryptographic logic or algorithm must be transported by one of how many different methods?
3
SECRET COMSEC equipment may be shipped by cleared commercial carrier using what?
Protective Security Services (PSS)
Within CONUS, FTRs shipped separately from the associated device may be shipped as SECRET collateral using a GSA authorized carrier per which publication?
SECNAV M-5510.36
What is the “Application/License for Permanent Export of Unclassified Defense Articles and Related Technical Data” form number?
Form DSP-5
What is the “Application/License for Temporary Export of Unclassified Defense Articles” form number?
Form DSP-73
Courier personnel, including government, military or contractor personnel must have current, written authorization in the form of official travel orders, a DD-2501 or which other form from their organization?
DHS 11000-1
Controlled Cryptographic Items (CCIs) are centrally accountable in the (COMSEC) Material Control System (CMCS) to the Central Office of Record (COR) by serial number (ALC 1) or what else?
Quantity (ALC 2)
What is not required for access to keyed or unkeyed Controlled Cryptographic Item (CCI) unless the equipment permits extraction of key?
SD-572
Regardless of the method used to transport Controlled Cryptographic Item (CCI), the transferring command must, within how many hours of shipping, notify the intended recipient of the method of transportation and a list of Controlled Cryptographic Items (CCIs) that have been shipped?
24
If a shipment of Controlled Cryptographic Item (CCI) equipment has not been received within how many working days after the expected delivery date, contact the originator of the shipment immediately?
5
What provides the ability to view all expired modern (asymmetric) or superseded traditional (symmetric) electronic keying material?
Local COMSEC Management Software (LCMS)
Which series provides step-by-step guidance in preparing destruction reports and destroying electronic key at the account level?
EKMS 704
Routine Destruction of Regularly and Irregularly Superseded Keying Material must be destroyed immediately after use when more than one copy of the key setting is available, or as soon as possible after the cryptoperiod and always within how many hours after the end of the cryptoperiod?
12
Superseded segments of sealed segmented/extractable keying material (unissued or issued) need not be destroyed until the entire edition is superseded or the keying material is unsealed, whichever occurs first. When retained until the entire edition is superseded, unissued must be destroyed no later than 5 days after the month in which supersession occurs, issued must be destroyed no later than how many hours after the entire edition supersedes?
12
To permit processing of message traffic receieved after the effective cryptoperiod of a key, keying material for all auto manual off-line systems (e.g., KL-42, KL-43, KL-51, AN/PYQ20 or later devices intended for off-line encryption) may be retained up to, but no longer than, how many hours after supersession?
72
GPS keying material may be retained and used for up to how many hours after the regularly scheduled supersession period to comply with the NAVSTAR GPS Selective Availability and Anti-Spoofing Host Application Equipment Design Requirements with the Precise Positioning Security Module (SAASM)?
12
Destruction of Maintenance Manuals, Operating Instructions, and General Doctrinal Publications must be destroyed within how many days after the end of the month in which superseded?
5
When authorization to destroy Communications Security (COMSEC) equipment has been received by an account from NCMS//N3// and a deadline destruction date has not been identified, destroy within how many days of receipt of the destruction is authorized?
90
Only devices and methods approved by NSA, as reflected on which NSA list will be used for terminal destruction of COMSEC material?
Evaluated Products List (EPL)
How many ways may paper Communications Security (COMSEC) material be destroyed?
3
Pulping (wet process) must break down the paper Communications Security (COMSEC) material to non-legible fiber residue (which size)?
5 mm
Acetone or methylene chloride may be used to destroy microfiche or microfilm when burning is not feasible. Enclose each in a separate paper jacket or place in the chemical bath one at a time for approximately how many minutes?
5
Which type of fire should not be used to burn magnetic tapes on aluminum reels as it may cause an explosion?
Sodium-nitrate
Submarines in port may destroy microfiche, floppy disks, and superseded key tape using a NSA-approved shredder and retain the residue onboard until return to sea and the next available jettisoning operation. When at-sea, submerged submarines with hydraulic compactors shall compress the shredded material into a standard disposable perforated metal container with a minimum weight of 30 pounds, then jettison no closer than how many nautical miles from land in accordance with Navy and Submarine regulations?
12
How many types of Communications Security (COMSEC) facilities are there?
4
Facilities that generate, process, or transfer unencrypted classified information by electrical, electronic, electro-mechanical, or optical means shall conform to the guidance and standards herein and which other series?
OPNAVINST C5510.93
A general Communications Security (COMSEC) inspection must be conducted prior to initial activation, where practicable, but in no case later than how many days after activation?
90
What must be conducted when facilities are initially activated or reactivated after foreign occupation, or when there is known or suspected access by foreign maintenance or construction personnel, or when clandestine surveillance or recording devices are suspected in or near a Communications Security (COMSEC) facility?
Technical Security Evaluation (TSE)
In a continuously manned facility, a security check will be conducted at least once every how many hours to ensure all classified COMSEC information is properly safeguarded, and that physical security protection system/devices (e.g., door locks and vent covers) are functioning properly?
24
What is the “End of Day Security Checklist” form number?
SF-701
Which type of inspection is designed to detect attempts at technical exploitation of Communications Security (COMSEC) equipment by tampering, bugging, key extraction, or reverse engineering?
Quadrant
Which type of area that, when staffed, must be occupied by two or more appropriately cleared individuals who must remain within sight of each other?
No-Lone Zone (NLZ)
Windows less than how many feet above the ground at an unattended fixed secure telecommunications facility, measured from the bottom of the window, or are easily accessible by means of objects directly beneath that window, will be covered by an IDS?
18
Page 5-7
Unattended fixed secure telecommunications facilities must be inspected at approximately how many-day intervals to confirm the integrity of the facility?
30
Which term is defined as the area within a structure occupied by a DOD bulk encryption facility?
Space
Which term is defined as the structure that contains a space?
Site
What manages the authorized allowance of Communications Security (COMSEC) material as validated by the Immediate Superior in Command (ISIC) of the command?
CMIO Norfolk
What is the primary means used by the Central Office of Record (COR) to obtain Point of Contact (POC) data for Electronic Key Management System (EKMS) Accounts?
Common Account Data (CAD)
How often at a minimum must Communications Security (COMSEC) account managers review and update Common Account Data (CAD)?
Semi-Annually
Shipboard allowances for Communications Security (COMSEC) equipment, related devices, equipment manuals and operating instructions by ship type and/or design are based, in part, upon the guidance in which series?
OPNAVINST 2300.44
Chief of Naval Operations (CNO) validation and approval is required for all cryptographic equipment and associated ancillary devices. Further guidance related to equipment allowances, transfers, recertification, etc… can be found in which series?
EKMS-5
Reserve-on-Board (ROB) levels typically range from how many months of keying material?
2-6
Each Communications Security (COMSEC) Account Manager must review their holdings at a minimum of how often to ensure a continuing need for the quantity and types of all Communications Security (COMSEC) material held still exists?
Annually
Superseded material received in a Reserve-on-Board (ROB) shipment must be destroyed within how many hours of opening the shipment?
12
Three months of Reserve-on-Board (ROB) is standard for most Electronic Key Management System (EKMS) accounts, however, some COMFLT/TYCOM identified units are authorized to hold how many months of material to support extended operations?
7
A request to increase Reserve-on-Board (ROB) levels for Short Titles the account is validated for requires at least 60 days notice if material is shipped via Defense Courier Service (DCS). A request to decrease a Reserve-on-Board (ROB) level requires a minimum of how many days notice?
14
The United States Transportation Command, Defense Courier Division (USTRANSCOM TCJ3-C) operates a network of how many
18
Requests for Special movements will be processed and entered into Defense Courier Service (DCS) within how many hours or less?
48
Regardless of grade or position, personnel picking up material from Defense Courier Division (DCD) must be authorized by the current CO/OIC of the account as reflected on which form on file with the servicing Defense Courier Division (DCD) station?
Form-10
Which form reflects Communications Security (COMSEC) Account Managers and Alternates authorized to receipt for and courier Communications Security (COMSEC) material between their command and the COMSEC Material Issuing Office (CMIO)?
CMS Form 1
A routine modification to a command’s authorized allowance for physical keying material can be met by regular Defense Courier Service (DCS) delivery (minimum of how many days lead-time)?
60
Who is the approving authority for any increase in allowance related to Communications Security (COMSEC) equipment?
Chief of Naval Operations (CNO)
Requests for standard deployment keymat, as listed in the COMFLT, TYCOM, or CG area instructions, must be submitted a minimum of how many days before departure from homeport?
60
COMSEC Material Issuing Office (CMIO) will respond to requests for electronic key within how many hours?
48
LMD/KP-equipped Electronic Key Management System (EKMS) accounts are authorized to generate which key locally without prior authorization from Naval Communications Security Material System (NCMS)?
AL Code 7
Which series contains a list of equipment types the Key Processor (KP) is capable of producing keys for?
EKMS 704
There are several keys the Key Processor (KP) generates and uses internally which the user never encounters directly, but are affected by certain LMD/KP processes; these processes are: Site Re-initialization, KP Changeover, and what else?
KP re-key
Which process enables the recovery of all protected data stored on the Local Management Device (LMD) and is used when a Key Processor (KP) must be replaced with a new Key Processor (KP) due to failure or recertification?
Site Reinitialization
Which process is used to re-encrypt the Local Management Device (LMD) database when the crypto period of the Key Encryption Key Local (KEKL) expires?
Changeover
Changeover will be performed following a Site Reinitialization and at a minimum of every three months thereafter (maximum of how many days between Changeovers)?
92
Which process is when the Account Manager requests an update to the FIREFLY Key?
KP Rekey
How often at a minimum must KP Rekeys be performed?
Annually
What must be processed prior to conducting a KP rekey and posting new credentials?
Bulk Encrypted Transactions (BETs)
What are designed to enable to KOK-22A (KP) to locally produce keying material for existing and emerging Communications Security (COMSEC) equipment?
KG Rules
What is a designator which identifies secure telecommunications or information handling equipment, or an associated cryptographic component, which is unclassified but controlled within the (COMSEC) Material Control System (CMCS)?
Controlled Cryptographic Item (CCI)
Communications Security (COMSEC) keying material will, at all times, be in one of how many status conditions?
3
Which Communications Security (COMSEC) keying material status condition means it is being held for future use?
Reserve
Which Communications Security (COMSEC) keying material status condition means it is authorized for use?
Effective
Which Communications Security (COMSEC) keying material status condition means it is no longer authorized for use and must be destroyed within the time frames in Article 540?
Superseded
Which term refers to a time when a particular item of Communications Security (COMSEC) material is no longer eligible for use?
Supersession
How many ways can Communications Security (COMSEC) material be superseded?
3
Which type of Communications Security (COMSEC) material suppression is based on a specific, pre-determined supersession date for each edition of material by the Controlling Authority?
Regular
Which type of Communications Security (COMSEC) material supersession is not pre-determined but which occurs as a result of use?
Irregular
Which type of Communications Security (COMSEC) material supersession is defined as an unplanned change of supersession, usually as a result of a compromise directed by the Controlling Authority?
Emergency
What reflects most Communications Security (COMSEC) material distributed to Department of the Navy (DoN) accounts and is a guide and not an authoritative source for destruction of keying material?
Status of COMSEC Material Report (SCMR)
What contains status information for NATO Communications Security (COMSEC) material and must be held by Department of the Navy (DoN) accounts which hold NATO material?
AMSG-600
Status information for keying material designated for use as part of the Inter - Theater COMSEC Package (ICP) is promulgated in a series of messages using pre-determined date-time-groups (DTGs) by the Joint COMSEC Management Office (JCMO) on what basis?
Quarterly
Policy and procedures for handling Two-Person Controlled (TPC)/Sealed Authentication Systems (SAS) material are contained in which series?
CJCSI 3260.01
The status of Communications Security (COMSEC) manuals and publications is normally listed on which page within these documents?
Letter of Promulgation (LOP)
Communications Security (COMSEC) material is divided into how many categories or material types?
3
Which type of Communications Security (COMSEC) material supplies either encoding means for manual and auto-manual cryptosystems or key for machine cryptosystems?
Keying
Which type of keying material includes keylists, codes, authenticators, Identify Friend or Foe (IFF) keying material, and one-time pads, but does not include canister-packaged key tapes?
Paper
Which type of keying material is designed to permit the extraction and removal of individual segments of key for hourly, daily, weekly, etc… use?
Extractable
Which type of keying material is designed to remain intact throughout its entire effective period?
Non-extractable
Which type of keying material includes electronically generated key, either produced by a KP or other key variable generating device, electronic keys converted from key tape, electronic keys stored on magnetic media (e.g., floppy disk) and key loaded onto a fill device (e.g., KSD 64A)?
Electronic
Which type of keying material includes, key tapes, keying plugs, keyed microcircuits, removable media (e.g., floppy disks), magnetic tapes, and keying material in solid state form such as programmable read-only memories (PROMs), read-only memories (ROMs), metallic oxide semi-conductor (MOS) chips, and micro-miniature tamper protection systems (micro-TPS)?
Non-paper
Communications Security (COMSEC) keying material packaged in canisters has a preprinted digraph, consisting of how many letters, printed to the left of the short title on each extractable segment of the tape leader?
2
Due to the ongoing DoD-wide transition to the Key Management Infrastructure (KMI) driven by the NSA-directed End-of-Life) for EKMS, the EKMS Manager COI is only available in how many geographical locations?
2
All USN military personnel appointed or designated as an Account Managers, Alternate, LEs Issuing or LE User, must complete the applicable portions of the latest version of NAVEDTRA 43462-1 (EKMS PQS) or what else for the position they are fulfilling?
NAVEDTRA 43462-2 (KMI PQS)
Department of the Navy (DoN) Communications Security (COMSEC) accounts have the option to receive a Training Visit from their local Central Office of Record (COR) Audit Team at any time. It is HIGHLY RECOMMENDED and in the command’s best interest to take advantage of the training and assistance services prior to an audit, deployment or upon change of command or Manager. How many training visits will be funded by Naval Communications Security Material System (NCMS) per audit cycle?
1
All Department of the Navy (DoN) Communications Security (COMSEC) accounts must undergo a formal CMS COR Audit at least once every how many months?
24
Communications Security (COMSEC) Account Managers are required to use the current version of which publication to conduct a semi-annual self-assessment?
EKMS-3
Which Audit Teams constitue a worldwide network of COMSEC subject matter experts established to provide assistance and training to personnel assigned Communications Security (COMSEC) responsibilities?
Central Office of Record (COR)
Central Office of Record (COR) Auditors must attend the Central Office of Record (COR) Audit Team Training seminar once every how many months to maintain certification?
36
How often are EKMS/KMI Town Halls hosted, permitting funding, by Naval Communications Security Material System (NCMS) and are primarily intended for Commanding Officers (COs), COR Auditiors, and account Managers?
Annually
Central Office of Record (COR) Audit Team responsibilities are divided among how many teams?
11
How many steps are required to establish a Communications Security (COMSEC) account?
6
The distribution of all Communications Security (COMSEC) material requires authorization from who in relation to the material?
Controlling Authority (CONAUTH)
Who are responsible for obtaining Controlling Authority (CONAUTH) validation for Communications Security (COMSEC) material not reflected in fleet instructions as part of the commands standard allowance?
Immediate Superiors in Command (ISICs)
At least how many days is required to establish a Communications Security (COMSEC) account and to provide the initial Communications Security (COMSEC) material?
45
The account Manager must coordinate with the area Defense Courier Division (DCD) station and establish a Defense Courier (DC) account by submitting which form?
USTRANSCOM Form 10
Accounts expecting to receive over-the-counter (OTC) service from the CMIO must submit which form to the Communications Security (COMSEC) Material Issuing Office (CMIO) reflecting account personnel authorized for reveipt for and courier Communications Security (COMSEC) equipment for their command?
CMS Form 1
Upon receipt of a Communications Security (COMSEC) account establishment message reflecting the account number assigned to the command from Naval Communications Security Material System (NCMS), the command must establish a User Representative (UR) account with the Electronic Key Management System (EKMS) Central Facility (CF). This is accomplished through completion and submission of which form to the commands Command Authority (CA)?
CF Form 1206
When an installation date is received, the command, not the installation team, must submit a request for a FIREFLY Vector Set (FF), Message Signature Key (MSK), and how many KSV-21 cards with Electronic Key Management System (EKMS) privileges in accordance with Article 670 to this manual?
2
When appointing Electronic Key Management System (EKMS) personnel, the Commanding Officer must consider the size of the account, the number of Local Elements (LEs) supported, the location where the Local Elements (LEs) operate, and which other requirements?
Two-Person Integrity (TPI)
Which form must be reviewed and executed by personnel with access to cryptographic information?
SD Form 572
Each numbered Communications Security (COMSEC) account will have a Manager, and a minimum of how many alternates appointed by the current Commanding Officer?
1
Individual appointment letters for Communications Security (COMSEC) account managers and alternates will be updated/signed by the incoming CO/OIC within how many days of assumption of command?
60
What is the minimum required enlisted paygrade to be assigned as a Communications Security (COMSEC) account manager?
E-6
What is the minimum required enlisted paygrade to be assigned as a Communications Security (COMSEC) account manager alternate?
E-5
Temporary access for which clearance level may only be authorized by DON CAF?
SCI
What is the minimum required enlisted paygrade to be assigned as a Local Element (LE) issuing (for keying material designated as CRYPTO)?
E-5
Commanding Officers are authorized to waive the length of government service required for Managers. If approved, waivers will be granted for the minimum duration required for the unit to comply with the policy in which the waiver was obtained, up to a maximum of how many years?
1
The Communications Security (COMSEC) account manager may not be absent for more than how many days?
60
In accordance with which publication can Commanding Officers or Officers in Charge grant temporary access to individuals pending completion of full investigative requirements and pending establishment of security clearance eligibility by the DON CAF?
SECNAV M-5510.30
What is used to determine the highest classification of Communications Security (COMSEC) material that an account may hold?
Highest Classification Indicator (HCI)
Commands that undergo a shift in claimancy or a name change will refer to which series for instructions on modifying their own Common Account Data (CAD) and uploading account registration changes and credentials to the Directory Server?
EKMS 704
Assignment of a Staff CMS Responsibility Officer (SCMSRO) does not relieve the appointing official of ultimate responsibility for the proper management of an Electronic Key Management System (EKMS) account. The SCMSRO may delegate how many of the Commanding Officer (CO) spot checks to the Communications Security (COMSEC) Account Manager or Alternate?
2
What must be executed between the Electronic Key Management System (EKMS) account command and the Local Element (LE) command when a Local Element (LE) is responsible to a Commanding Officer other than that of the numbered Electronic Key Management System (EKMS) account command or issuing activity?
Letter of Agreement (LOA)
Letters of Agreement remain in effect until modified or the support is no longer required. LOAs/MOUs will be reviewed at a minimum of how often?
Triennially
Commanding Officers (cryptonet members) can extend cryptoperiods for how many hours without Controlling Authority authorization when necessary to complete a transmission or conversation?
2
How often at a minimum must Commanding Officers (COs) conduct spot checks of the Communications Security (COMSEC) Vault and spaces where Communications Security (COMSEC) material is used and stored?
Quarterly
How often at a minimum must training be held to ensure that all personnel handling Communications Security (COMSEC) material are familiar with and adhere to proper Communications Security (COMSEC) procedures?
Monthly
The Communications Security (COMSEC) account manager must ensure that procedures are established to reassign local custody responsibility for Communications Security (COMSEC) material held by individuals permanently leaving the command, and those who are departing on TAD/TDY in excess of how many days?
30
The Communications Security (COMSEC) account manager must ensure that modifications to Communications Security (COMSEC) equipment are promptly and properly performed by qualified individuals in accordance with which series and that modification residue is disposed of properly?
OPNAVINST 2221.3
The Communications Security (COMSEC) account manager must track and manage production and destruction dates for Modern Key held by the account and ensure timely submission of key orders for replacement material required no later than how many days from the expiration date of the keys currently held?
30
Which personnel are responsible to their Commanding Officer for the proper management and security of all Communications Security (COMSEC) material held by the command?
Local Element (LE)
Local Element (LE) personnel issue Communications Security (COMSEC) material on local custody forms after verifying that the recipient is authorized to hold Communications Security (COMSEC) material and has executed which form?
SD Form 572
Each person authorized access to Communications Security (COMSEC) material as a user or witness, when required is personally responsible for the proper safeguarding, accountability, usage and what else in regards to the material?
Disposal
Construction specifications for shore-based Communications Security (COMSEC) storage vaults used to store keying material constructed or modified after 01 Jan 2013 will be in accordance with which publication?
ICD-705
All personnel having access to cryptographic information (keying material, book packaged material marked/designated crypto, or equipment which permits extraction of key (SKL, TKL, KP)) must be authorized in writing by the current Commanding Officer or “Acting Commanding Officer”. The use of what is not authorized in granting access to COMSEC material?
By Direction
Access lists used for granting access to cryptographic information will be updated whenever the status of an individual changes, upon Change of Command or how often at a minimum?
Annually
While only U.S. citizens are eligible for a security clearance, a resident alien or foreign national may be granted a “Limited Access Authorization” (LAA) in compliance with DoD 5200.2-R section C3.4.3 Such individuals may have access to COMSEC material no higher than what, if they have an LAA based on a completed successful background investigation and indoctrination, on a “need to know” basis, when their duties require such access?
Confidential
Who may not be appointed as Communications Security (COMSEC) Account Managers, Clerks, or equipment maintenance personnel nor have access to safes or areas where Communications Security (COMSEC) keying material is accounted for, visible, or stored?
Resident aliens
The release of Communications Security (COMSEC) material to a contractor account or direct issuance to contractor personnel as Local Elements (LEs) by a DON COMSEC account is restricted to U.S. Industrial firms operating under contract to the U.S. Navy in accordance with the provisions of which series?
OPNAVINST 2221.5
What is the system of storage and handling designed to prohibit individual access by requiring the presence of at least two authorized individuals, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed?
Two-Person Integrity (TPI)
Two-Person Integrity (TPI) storage requires the use of an approved Communications Security (COMSEC) vault or which type of approved security container?
General Services Administration (GSA)
Combinations must be changed at least once every how many years?
2
Combinations to Communications Security (COMSEC) material security containers, KP PINs and LCMS passwords must be recorded and individually wrapped in aluminum foil and protectively packaged in a separate combination envelope (which form)?
SF-700
How often at a minimum must an inventory document be created and used to inspect SF-700s?
Monthly
In an emergency, the Commanding Officer or other designated authority may direct the opening of any Communications Security (COMSEC) material security container. At least how many individuals shall be present to conduct and witness the emergency opening?
2
The Local Management Device (LMD) is pre-configured to lock out accounts after 3 failed attempts and to request a password change every how many days?
90
If unauthorized adjustments or suspicious activity is detected on the LMD, consult local, service-specific Information Assurance (IA) policy or which series for any required reporting?
SECNAVINST 5239.3
The LMD/KP including connecting cables, must be maintained, operated, and stored in a space approved for the open storage of which type of material?
SECRET
What must be maintained for each lock on a Communications Security (COMSEC) storage container?
SF-702
Which form must be prepared and maintained when a container, lock or vault door is put in use?
OF-89
The FIREFLY vector set is classified based on the Highest Classification Indicator (HCI) of the account; designation as CRYPTO; accounted for as ALC 1 or what else and permits the ability to generate and exchange credentials to transfer or receive keying material up to the Highest Classification Indicator (HCI)?
6
All magnetic media, including back up media, floppy diskettes, etc… used in the LMD/KP must be classified and safeguarded at which level?
SECRET
PINS must be changed at a minimum of every how many days or upon a change of personnel?
90
When shipping keying material marked CRYPTO, packages will contain no more than how many editions for material that is superseded quarterly or more frequently?
4
All TOP SECRET and SECRET keying material marked or designated CRYPTO and items that embody or describe a cryptographic logic or algorithm must be transported by one of how many different methods?
3
SECRET COMSEC equipment may be shipped by cleared commercial carrier using what?
Protective Security Services (PSS)
Within CONUS, FTRs shipped separately from the associated device may be shipped as SECRET collateral using a GSA authorized carrier per which publication?
SECNAV M-5510.36
What is the “Application/License for Permanent Export of Unclassified Defense Articles and Related Technical Data” form number?
Form DSP-5
What is the “Application/License for Temporary Export of Unclassified Defense Articles” form number?
Form DSP-73
Courier personnel, including government, military or contractor personnel must have current, written authorization in the form of official travel orders, a DD-2501 or which other form from their organization?
DHS 11000-1
Controlled Cryptographic Items (CCIs) are centrally accountable in the (COMSEC) Material Control System (CMCS) to the Central Office of Record (COR) by serial number (ALC 1) or what else?
Quantity (ALC 2)
What is not required for access to keyed or unkeyed Controlled Cryptographic Item (CCI) unless the equipment permits extraction of key?
SD-572
Regardless of the method used to transport Controlled Cryptographic Items (CCIs) that have been shipped?
24
If a shipment of Controlled Cryptographic Item (CCI) equipment has not been received within how many working days after the expected delivery date, contact the originator of the shipment immediately?
5
What provides the ability to view all expired modern (asymmetric) or superseded traditional (symmetric) electronic keying material?
Local COMSEC Management Software (LCMS)
Which series provides step-by-step guidance in preparing destruction reports and destroying electronic key at the account level?
EKMS 704
Routine Destruction of Regularly and Irregularly Superseded Keying Material must be destroyed immediately after use when more than one copy of the key setting is available, or as soon as possible after the cryptoperiod and always within how many hours after the end of the cryptoperiod?
12
Superseded segments of sealed segmented/extractable keying material (unissused or issued) need not be destroyed until the entire edition is superseded or the keying material is unsealed, whichever occurs first. When retained until the entire edition is superseded, unissued must be destroyed no later than 5 days after the month n which e supersession occurs, issued must be destroyed no later than how many hours after the entire edition supersedes?
12
To permit processing of message traffic received after the effective cryptoperiod of a key, keying material for all auto manual off-line systems (e.g., KL-42, KL-43, KL-51, AN/PYQ20 or later devices intended for offline encryption) may be retained up to, but no longer than, how many hours after supersession?
72
GPS keying material may be retained and used for up to how many hours after the regularly scheduled supersession period to comply with the NAVSTAR GPS Selective Availability and Anti-Spoofing Host Application Equipment Design Requirements with the Precise Positioning Security Module (SAASM)?
12
Destruction of Maintenance Manuals, Operating Instructions, and General Doctrinal Publications must be destroyed within how many days after theend of the month in which it is superseded?
5
When authorization to destroy Communications Security (COMSEC) equipment has been received by an account from NCMS//N3//and a deadline destruction date has not been identified, destroy within how many days of receipt of the destruction authorization?
90
Only devices and methods approved by the NSA, as reflected on which NSA list will be used for termination destruction of COMSEC material?
Evaluated Products List (EPL)
How many ways may paper Communications Security (COMSEC) material to non-legible fiber residue (which size)?
5 mm
Acetone or methylene chloride may be used to destroy microfiche or microfilm when burning is not feasible. Enclose each in a separate paper jacket or place in the chemical bath one at a time for approximately how many minutes?
5
Which type of fire should not be used to burn magnetic tapes on aluminum reels as it may cause an explosion?
Sodium-nitrate
Submarines in port may destroy microfiche, floppy disks, and superseded key tape using a NSA-approved shredder and retain the residue onboard until return to sea and the next available jettisoning operation. When at-sea, submerged submarines with hydraulic compactors shall compress the shredded material into a standard disposable perforated metal container with a minimum weight of 30 pounds, then jettison no closer than how many nautical miles from land in accordance with Navy and Submarine regulations?
12
How many types of Communications Security (COMSEC) facilities are there?
4
Facilities that generate, process, or transfer unencrypted classified information by electrical, electronic, electro-mechanical, or optical means shall conform to the guidance and standards herein and which other series?
OPNAVINST C5510.93
A general Communications Security (COMSEC) inspection must be conducted prior to initial activation, where practicable, but in no case later than how many days after activation?
90
What must be conducted when facilities are initially activated or reactivated after foreign occupation, or when there is known or suspected access by foreign maintenance or construction personnel, or when clandestine surveillance or recording devices are suspected in or near a Communications Security (COMSEC) facility?
Technical Security Evaluation (TSE)
In a continuously manned facility, a security check will be conducted at least once every how many hours to ensure all classified COMSEC information is properly safeguarded, and that physical security protection system/devices (e.g., door locks and vent covers) are functioning properly?
24
What is the “End of Day Security Checklist” form number?
SF-701
Which type of inspection is designed to detect attempts at technical exploitation of Communications Security (COMSEC) equipment by tampering, bugging, key extraction, or reverse engineering?
Quadrant
Which type of area that, when staffed, must be occupied by two or more appropriately cleared individuals who must remain within sight of each other?
No-Lone Zone (NLZ)
Windows less than how many feet above the ground at an unattended fixed secure telecommunications facility, measured from bottom of the window, or are easily accessible by means of objects directly beneath that window, will be covered by an IDS?
18
Unattended fixed secure telecommunications facilities must be inspected at approximately how many-day intervals to confirm the integrity of the facility?
30
Which term is defined as the area within a structure occupied by a DoD bulk encryption facility?
Space
Which term is defined as the structure that contains a space?
Site
What manages the authorized allowance of Communications Security (COMSEC) material as validated by the Immediate Superior in Command (ISIC) of the command?
CMIO Norfolk
What is the primary means used by the Central Office of Record (COR) to obtain Point Of Contact (POC) data for Electronic Key Management System (EKMS) Accounts?
Common Account Data (CAD)
How often at a minimum must Communications Security (COMSEC) account managers review and update Common Account Data (CAD)?
Semi-Annually
Shipboard allowances for Communications Security (COMSEC) equipment, related devices, equipment annuals and operating instructions by shiptype and/or design are based, in part, upon the guidance in which series?
OPNAVINST 2300.44
Chief of Naval Operations (CNO) validation and approval is required for all cryptographic equipment and associated ancillary devices. Further guidance related to equipment allowances , transfers, recertification, etc… can be found in which series?
EKMS-5
Reserve-on-Board (ROB) levels typically range from how many months of keying material?
2-6
Each Communications Security (COMSEC) Account Manager must review their holdings at a minimum of how often to ensure a continuing need for the quantity and types of all Communications Security (COMSEC) material held still exists?
Annually
Superseded material received in a Reserve-on-Board (ROB) shipment must be destroyed within how many hours of opening the shipment?
12
Three months of Reserve-on-Board (ROB) is standard for most Electronic Key Management System (EKMS) accounts, however, some COMFLT/TYCOM identified units are authorized to hold how many months of material to support extended operations?
7
A request to increase Reserve-on-Board (ROB) levels for Short Titles the account is validated for requires at least 60 days notice if material is shipped via Defense Courier Service (DCS). A request to decrease a Reserve-on-Board (ROB) level requires a minimum of how many days notice?
14
The United States Transportation Command, Defense Courier Division (USTRANSCOM TCJ3-C) operates a network of how many stations to provide the secure, timely and efficient global distribution of classified and sensitive material for the U.S. Government and its allies?
18
Requests for Special movements will be processed and entered into Defense Courier Service (DCS) within how many hours or less?
48
Regardless of grade or position, personnel picking up material from Defense Courier Division (DCD) must be authorized by the current CO/OIC of the account as reflected on which form on file with the servicing Defense Courier Division (DCD) station?
Form-10
Which form reflects Communications Security (COMSEC) Account Managers and Alternates authorized to receipt for and courier Communications Security (COMSEC) material between their command and the COMSEC Material Issuing Office (CMIO)?
CMS Form 1
A routine modification to a command’s authorized allowance for physical keying material can be met by regular Defense Courier Service (DCS) delivery (minimum of how many days lead-time)?
60
Who is the approving authority for any increase in allowance related to Communications Security (COMSEC) equipment?
Chief of Naval Operations (CNO)
Requests for standard deployment keymat, as listed in the COMFLT, TYCOM, or CG area instructions, must be submitted a minimum of how many days before departure from homeport?
60
COMSEC Material Issuing Office (CMIO) will respond to requests for electronic key within how many hours?
48
LMD/KP-equipped Electronic Key Management System (EKMS) accounts are authorized to generate which key locally without prior authorization from Naval Communications Security Material System (NCMS)?
AL Code 7
Which series contains a list of equipment types the Key Processor (KP) is capable of producing keys for?
EKMS 704
Electronic Key Management System (EKMS) accounts are encouraged to generate their own AL Code 7 key for cryptonets of how many or less nodes?
10
Temporary transfers of Communications Security (COMSEC) equipment will be in accordance with which series?
EKMS-5
Regardless of format, temporary transfer of keying material is restricted to no more than two editions and a period not to exceed how many months?
3
Afloat commands which are permanently re-locating to a homeport in a different ocean area must inform Naval Communications Security Material System (NCMS) and the COMSEC Material Issuing Office (CMIO) of new OPAREA physical Communications Security (COMSEC) material requirements how many days prior to departure from their present homeport?
60
Each Electronic Key Management System (EKMS) account will establish and maintain how many different Communications Security (COMSEC)-related files?
4
What is the “Secure Data Network System (SDNS) Key Order Requests form number?
CF Form 1050
How often are Account Managers authorized to generate an inventory for material issued and have (2) Local Element (LE) personnel conduct an inventory of all material issued and sign/return the inventory to the Communications Security (COMSEC) Account Manager?
Semi-annually
The Local Custody File must contain a signed document (i.e., SF-153 or locally prepared equivalent form) for each item of Communications Security (COMSEC) material issued to authorized LEs. Material issued to personnel who have signed for Communications Security (COMSEC) material who go on leave or TAD in excess of how many days or who transfer, are reassigned or retire must be returned within Local COMSEC Management Software (LCMS) to the COMSEC Account Manager and reissued?
30
Which form is used to document the receipt, transfer, destruction, inventory, possession, relief from accountability and generation of COMSEC material?
SF-153
A transfer is the movement of Communications Security (COMSEC) material, hardcopy or electronic, between two Electronic Key Management System (EKMS) accounts. How many types of transfers are there?
2
The physical transfer of AL Code 1, 2, or 4 material between Department of the Navy (DoN) accounts requires a hard copy of which form to be enclosed with the material?
TRI SF-153
The physical transfer of all AL Code 1, 2, or which other Communications Security (COMSEC) material involving a DON EKMS accounts must be reported to the COR via a TRI EKMS Transaction prepared by the account transferring the material?
6
Except in cases of extreme emergency (e.g., enemy attack, civil uprising, or natural disaster, or terrorism), Communications Security (COMSEC) material must always be destroyed by how many appropriately cleared and authorized persons?
2
Local destruction records are optional for AL Code 4 and which other Communications Security (COMSEC) material classified CONFIDENTIAL and below, regardless of CRYPTO markings?
7
What provides the interface for the operator to direct the destruction of locally held electronic key, request and confirm destruction of material by a non-Local Management Device (LMD) account or Local Element (LE), report destruction to a superior account, and process electronic destruction reports from an account?
Local COMSEC Management Software (LCMS)
Which form is used to return AL Code 1 or 2 Communications Security (COMSEC) material to proper accountability controls?
SF-153
Which type of expired credentials are the most common reason an account cannot reconcile for received Bulk-Encrypted Transactions (BETs)?
FIREFLY
Communications Security (COMSEC) Account Managers must report receipt of corrupt Bulk-Encrypted Transactions (BETs) within how many business days of downloading the Bulk-Encrypted Transaction (BET)?
3
What are generated by originators of Communications Security (COMSEC) material transfers at specified time intervals to notify the intended recipient of overdue receipts?
Tracers
How many days from the date of a shipment is the first tracer sent?
30
How many days from the date of a shipment is the second tracer sent?
40
How many days from the date of a shipment is the third tracer sent?
50
Shipment originators that do not receive a communication or a receipt from the intended recipient within how many days of the date of the first tracer action will generate a Communications Security (COMSEC) Material Incident Report (“Physical Incident”)?
60
Failure to respond to a final tracer notice from the Central Facility (CF) may result in the Modern Key being marked as compromised and placed on which list?
Compromised Key List (CKL)
What is the process through which received accountable material is added to the local account’s data base?
Reconciliation
Most Communications Security (COMSEC) material is shipped from the United States National Distribution Authority (USNDA), COMSEC Material Issuing Office (CMIO) and other accounts via which service?
Defense Courier Service (DCS)
Which up-to-date form is required to be on file at the COMSEC Material Issuing Office (CMIO) for pick-ups or turn-in of material?
CMS Form 1
Local COMSEC Management Software (LCMS) supports reconciling of electronic and hard copy receipts for material received and material distributed. How many functions are available for reconciling received material?
3
What are conducted to ensure the completeness of Communications Security (COMSEC) material?
Page checks
How often must all Communications Security (COMSEC) material (including equipment and publications) assigned AL Code 1, 2, 4, 6, and 7 be inventoried?
Semi-annually
The Central Office of Record (COR) must be notified via official naval message or digitally-signed PKI email no later than how many days prior to the start date of a Change of Manager inventory?
10
How many types of Electronic Key Management System (EKMS) inventories are there?
5
Procedures for electronic submission of a Semi-Annual Inventory Report (SAIR) can be found in which series?
EKMS-704
The Central Office of Record (COR) will monitor the response to inventory transactions and will notify commands that fail to return a reconciled inventory within how many days?
30
Surface units conducting either crew or hull swaps must notify the Central Office of Record (COR) via naval message no later than how many days prior to the turnover?
120
Which report satisfies National and Navy policy which requires an inventory be completely conducted, documented, reported to and reconciled by the Central Office of Record (COR) to document a Change of Communications Security (COMSEC) Account Manager?
Change of Custodian Inventory Report (CCIR)
Which inventory is a primary management tool intended to assist Communications Security (COMSEC) Account Managers in determining the health and status of the account?
Change of Account Location (COAL)
A new Communications Security (COMSEC) Account Manager must be appointed and a Change of Manager Inventory conducted if the COMSEC Account Manager is or will be absent for more than how many days?
60
Material in the custody of a Crypto Repair Facility (CRF) or a maintenance pool for less than how many years may be inventoried by sighting the local custody document for the material?
1
What is automatically generated by the Central Office of Record (COR) upon submission of an Electronic Key Management System (EKMS) inventory?
Inventory Reconciliation Status Transaction (IRST)
Which form must be completed by every person with access to cryptographic information?
SD-572
Except as permitted by the respective Operational Security Doctrine (OSD) for the device, Communications Security (COMSEC) keying material in either hard copy or electronic form marked or designated CRYPTO, may not be issued any earlier than how many days prior to the effective period (month) of the material without prior authorization of the Controlling Authority (CONAUTH)?
30
If keying material is issued to a LE via a FD, the loading of the FD and issue can only occur just before the planned mission. If a SKL or TKL is used, loading of the encrypted key may occur how many hours prior to the planned mission?
24
Electronic key in a FD superseded during a mission will be zeroized within how many hours of supersession?
12
Within how many working days of receipt, EKMS key transactions stored on removable media must be uploaded to the LMD or LMD/KP, as applicable, and the media destroyed by burning or melting or returned to DIRNSA for destruction?
3
What is the only functioning entity under the Cryptographic Equipment Exchange Program (CEEP)?
CRF San Diego
KGV-68Bs installed in missiles are considered embedded Communications Security (COMSEC) and are accountable within the (COMSEC) Material Control System (CMCS) as which items?
ALC 2
How many KGV-68Bs are typically installed in each missile?
2
Items returned to the Communications Security (COMSEC) Account Manager prior to the end of the month reflected on the watch-to-watch inventory will be done using which form and lined out from the date of return on the watch-to-watch inventory and be initialed by two Local Element (LE) personnel?
SF-153
What is the reproduction of less than an entire copy of COMSEC material called?
Extract
Extracts of other Communications Security (COMSEC) material, including keying material not marked CRYPTO, do not have to be documented on local custody forms. This material must be handled and accounted for based on its assigned classification in accordance with which publication?
SECNAV M-5510.36
Communications Security (COMSEC) Account Managers who transfer AL Code 4 publications to another Electronic Key Management System (EKMS) account must forward all amendments or corrections to the command(s) holding the basic publication for a period not to exceed how many days?
90
Destruction of amendment residue may be verified in one of how many ways at the option of the Communications Security (COMSEC) Account Manager?
2
Classified and unclassified amendment residue must be destroyed as soon as possible but no later than how many working days after an amendment entry?
5
Keying material marked or designated as what is the most sensitive item of COMSEC material?
CRYPTO
Which Communications Security (COMSEC) keying material report is a two-sided document used to record destruction of individual, one-time keying material segments of Communications Security (COMSEC) material?
CMS 25
What is used to record destruction of multiple copy segments (i.e., 1/01, 1/02, 1/03, etc.) of COMSEC keying material packaged in canisters?
CMS 25MC