EKMS 1E, EKMS POLICY AND PROCEDURES FOR NAVY ELECTRONIC KEY MANAGEMENT SYSTEM TIERS 2&3 Flashcards

1
Q

Which material is used to protect U.S. Government and partner classified or sensitive unclassified communications or information from unauthorized persons?

A

Communications Security (COMSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which system was established to distribute, control, and safeguard Communications Security (COMSEC) material?

A

(COMSEC) Material Control System (CMCS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an interoperable collection of systems, facilities, and components developed by the services and agencies of the U.S. Government to automate the planning, ordering, filling, generation, distribution, accountability, storage, usage, destruction and management of electronic key and other types of Communications Security (COMSEC) material?

A

Electronic Key Management System (EKMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The overall Electronic Key Management System (EKMS) architecture consists of how many layers or tiers?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Electronic Key Management System (EKMS) Tier consists of the National Security Agency’s (NSA) Fort Meade and Finksburg Key Facilities and provides centralized key management services for all forms of Communications Security (COMSEC) key?

A

Tier 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Electronic Key Management System (EKMS) layer serves as the intermediate key generation and distribution center, central offices of record (COR), privilege managers, and registration authorities for EKMS/COMSEC accounts?

A

Tier 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What houses the physical Electronic Key Management System (EKMS) servers that are used for accounting and will provide for the generation and distribution of many traditional key types for large nets?

A

Common Tier I (CT1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Electronic Key Management System (EKMS) layer is comprised of the EKMS Accounts that manage and other Communications Security (COMSEC) material?

A

Tier 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Electronic Key Management System (EKMS) layer is the lowest tier or layer of the EKMS architecture?

A

Tier 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What serves as Tier 0 and is the executive agent for developing and implementing national level policy affecting the control of Communications Security (COMSEC) material ?

A

National Security Agency (NSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which term is used to refer to the Tier 1 site having primary COR (Central Office of Record) responsibility for a portion of the Tier 2 accounts?

A

Primary Tier 1 Segment (PT1S)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who has overall responsibility and authority for implementation of National Communications Security (COMSEC) policy within the Department of the Navy (DoN)?

A

Chief of Naval Operations (CNO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What serves as Communications Security (COMSEC) resource sponsor for the Marine Corps?

A

Headquarters Marine Corps (HQMC) C4 CY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What administers the Department of the Navy (DoN) Communications Security (COMSEC) program and is the Service Authority for the Department of the Navy (DoN)?

A

Naval Communications Security Material System (NCMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What receives, stores, and ships Ready for Issue (RFI) equipment and is the Physical Material Handling Segment (PMHS) for Navy in the EKMS?

A

COMSEC Material Issuing Office (CMIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the consolidated (Air Force, Army, Navy and NSA) Communications Security (COMSEC) distribution facility for keying material?

A

United States National Distribution Authority (USNDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is responsible for evaluating Communications Security (COMSEC) incidents and authorizing the issue/destruction of COMSEC material under their control?

A

Controlling Authority (CONAUTH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A Communications Security (COMSEC) account is an administrative entity in which custody and control of Communications Security (COMSEC) material are maintained. These accounts are called Tier 2 accounts and are identified by an account number consisting of how many digits?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many LCMS System Administrators at a minimum must be appointed?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who is the Commanding Officers (CO’s) primary advisor on matters concerning the security and handling of Communications Security (COMSEC) material and the associated records, reports, and audits?

A

COMSEC Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many variants of Local Elements are there?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How many categories do Local Elements (LEs) in transit fall into?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is defined as any activity, organization, or person(s) performing some type of key management-related function or functions, which has been assigned an EKMS ID?

A

Key Management Entity (KME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the FIREFLY POC for modern key privileges?

A

Naval Communications Security Material System (NCMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Communications Security (COMSEC) material must be handled and safeguarded based on its assigned classification and accounted for based on which code?

A

Accountability Legend (AL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

How many standard classification markings are used to indicate the classification of Communications Security (COMSEC) material?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A short title consists of how many alphanumeric characters without special characters, e.g., /, -, etc.?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Within Local COMSEC Management Software (LCMS), electronically generated keying material can be assigned an accounting number of what?

A

0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Short titles are created and defined based on guidance found in which publication?

A

CNSSI-4033

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which codes determine how Communications Security (COMSEC) material is accounted for within the (COMSEC) Material Control System (CMCS)?

A

Accountability Legend (AL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

How many Accountability Legend (AL) codes are used to identify the minimum accounting controls required for Communications Security (COMSEC) material?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which Accountability Legend (AL) is assigned to traditional hardcopy Communications Security (COMSEC) material that is continuously accountable to the Central Office of Record (COR) by accounting (serial/register) number from production to destruction?

A

AL Code 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which Accountability Legend (AL) code is assigned to traditional hard copy Communications Security (COMSEC) material that is continuously accountable to the Central Office of Record (COR) by quantity from production to destruction?

A

AL Code 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which Accountability Legend (AL) code is assigned to traditional hardcopy Communications Security (COMSEC) material that after initial receipt to the Central Office of Record (COR), Communications Security (COMSEC) material is locally accountable by quantity and handled/safeguarded based on its classification?

A

AL Code 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which Accountability Legend (AL) code is assigned to electronically generated keys for Communications Security (COMSEC) material that is electronically generated and continuously accountable to the Central Office of Record (COR) from production to destruction?

A

AL Code 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which Accountability Legend (AL) code is assigned to electronically generated keys for Communications Security (COMSEC) material that is electronically generated and locally accountable to the generating facility?

A

AL Code 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Electronic key generated under the provisions of which series other than the KP (KOK-22) is not assigned an Accountability Legend (AL) code?

A

NAG 16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

COMSEC Material Issuing Office (CMIO) Norfolk is required to continuously account to the Central Office of Record (COR) for all Accountability Legend (AL) material falling under which code?

A

AL Code 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Which marking or designator identifies all Communications Security (COMSEC) keying material that is used to protect or authenticate classified or sensitive unclassified government or government-derived information, the loss of which could adversely affect national security?

A

CRYPTO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Any physical media to be transferred or issued, other than a KSD-64A, on which electronic keys have been loaded will have a short title and an Accountability Legend (AL) code of 1 or what else?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which type of Electronic Key Management System (EKMS) Message key is a modern (asymmetric) key used to create FIREFLY vectors (credentials) to encrypt keying material for distribution between EKMS accounts or to perform benign fill techniques?

A

KP FIREFLY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which type of Electronic Key Management System key is a modern key generated by the EKMS CF and filled from a KSD-64A cryptographically “sign” EKMS messages?

A

Message Signature Key (MSK)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

FIREFLY Key and Message Signature Key (MSK) along with the KP Privilege Certificate (PRIV CERT) must be requested from what whenever an LMD/KP is brought on-line for the first time (site initialization) or following a catastrophic failure of the LMD/KP that results in the system requiring a new site initialization?

A

Naval Communications Security Material System (NCMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Procedures for loading of either the FireFly (FF) Vector Set or Message Signature Key (MSK) are outlined in which series?

A

EKMS-704

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

There are several keys the Key Processor (KP) generates and uses internally which the user never encounters directly, but are affected by certain LMD/KP processes; these processes are: Site Re-initialization, KP Changeover, and what else?

A

KP re-key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which process enables the recovery of all protected data stored on the Local Management Device (LMD) and is used when a key processor (KP) must be replaced with a new Key Processor (KP) due to failure or recertification?

A

Site Reinitialization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Which process is used to re-encrypt the Local Management Device (LMD) database when the crypto period of the Key Encryption Key Local (KEKL) expires?

A

Changeover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Changeover will be performed following a Site Reinitialization and at a minimum of every three months thereafter (maximum of how many days between Changeovers)?

A

92

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which process is when the Account Manager requests an update to the FIREFLY Key?

A

KP Rekey

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

How often at a minimum must KP Rekeys be performed?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

What must be processed prior to conducting a KP rekey and posting new credentials?

A

Bulk Encrypted Transactions (BETs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

What are designed to enable to KOK-22A (KP) to locally produce keying material for existing and emerging Communications Security (COMSEC) equipment?

A

KG Rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

What is a designator which identifies secure telecommunications or information handling equipment, or an associated cryptographic component, which is unclassified but controlled within the (COMSEC) Material Control System (CMCS)?

A

Controlled Cryptographic Item (CCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Communications Security (COMSEC) keying material will, at all times, be in one of how many status conditions?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which Communications Security (COMSEC) keying material status condition means it is being held for future use?

A

Reserve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which Communications Secuirty (COMSEC) keying material status condition means it is authorized for use?

A

Effective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which Communications Security (COMSEC) keying material status condition means it is no longer authorized for use and must be destroyed within the time frames in Article 540?

A

Superseded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which term refers to a time when a particular item of Communications Security (COMSEC) material is no longer eligible for use?

A

Supersession

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

How many ways can Communications Security (COMSEC) material be superseded?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which type of Communications Security (COMSEC) material supersession is based on a specific, pre-determined supersession date for each edition of material by the Controlling Authority?

A

Regular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Which type of Communications Security (COMSEC) material supersession is not pre-determined but which occurs as a result of use?

A

Irregular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which type of Communications Security (COMSEC) material supersession is defined as an unplanned change of supersession, usually as the result of a compromise directed by the Controlling Authority?

A

Emergency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What reflects most Communications Security (COMSEC) material distributed to Department of the Navy (DoN) accounts and is a guide and not an authoritative source for destruction of keying material?

A

Status of COMSEC Material Report (SCMR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What contains status information for NATO Communications Security (COMSEC) material and must be held by Department of the Navy (DoN) accounts which hold NATO material?

A

AMSG-600

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Status information for keying material designated for use as part of the Inter-Theater COMSEC Package (ICP) is promulgated in a series of messages using pre-determined date-time-groups (DTGs) by the Joint COMSEC Management Office (JCMO) on what basis?

A

Quarterly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Policy and procedures for handling Two-Person Controlled (TPC)/Sealed Authentication Systems (SAS) material are contained in which series?

A

CJCSI 3260.01

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

The status of Communications Security (COMSEC) manuals and publications is normally listed on which page within these documents?

A

Letter of Promulgation (LOP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Communications Security (COMSEC) material is divided into how many categories or material types?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which type of Communications Security (COMSEC) material supplies either encoding means for manual and auto-manual cryptosystems or key for machine cryptosystems?

A

Keying

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which type of keying material includes keylists, codes, authenticators, Identify Friend or Foe (IFF) keying material, and one-time pads, but does not include canister-packaged key tapes?

A

Paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which type of keying material is designed to permit the extraction and removal of individual segments of key for hourly, daily, weekly, etc… use?

A

Extractable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which type of keying material is designed to remain intact throughout its entire effective period?

A

Non-extractable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which type of keying material includes electronically genereated key, either produced by a KP or other key variable generating device, electronic keys converted from key tape, electronic keys stored on magnetic media (e.g., floppy disk) and key loaded onto a fill device (e.g., KSD 64A)?

A

Electronic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which type of keying material includes, key tapes, keying plugs, keyed microcircuits, removable media (e.g., floppy disks), magnetic tapes, and keying material in solid state form such as programmable read-only memories (PROMs), read-only memories (ROMs), metallic oxide semi-conductor (MOS) chips, and micro-miniature tamper protection systems (micro-TPS)?

A

Non-paper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Communications Security (COMSEC) keying material packaged in canisters has a preprinted digraph, consisting of how many letters, printed to the left of the short title on each extractable segment of the tape leader?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Due to the ongoing DoD-wide transition to the Key Management Infrastructure (KMI) driven by the NSA-directed End-of-Life) for EKMS, the EKMS Manager COI is only available in how many geographical locations?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

All USN military personnel appointed or designated as an Account Managers, Alternate, LEs Issuing or LE User, must complete the applicable portions of the latest version of NAVEDTRA 43462-1 (EKMS PQS) or what else for the position they are fulfilling?

A

NAVEDTRA 43462-2 (KMI PQS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Department of the Navy (DoN) Communications Security (COMSEC) accounts have the option to receive a Training Visit from their local Central Office of Record (COR) Audit Team at any time. It is HIGHLY RECOMMENDED and in the command’s best interest to take advantage of the training and assistance services prior to an audit, deployment or upon change of command or Manager. How many training visits will be funded by Naval Communications Security Material System (NCMS) per audit cycle?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

All Department of the Navy (DoN) Communications Security (COMSEC) accounts must undergo a formal CMS COR Audit at least once every how many months?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Communications Security (COMSEC) Account Managers are required to use the current version of which publication to conduct a semi-annual self-assessment?

A

EKMS-3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which Audit Teams constitute a worldwide network of COMSEC subject matter experts established to provide assistance and training to personnel assigned Communications Security (COMSEC) responsibilities?

A

Central Office of Record (COR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Central Office of Record (COR) Auditiors must attend the Central Office of Record (COR) Audit Team Training seminar once every how many months to maintain certification?

A

36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

How often are EKMS/KMI Town Halls hosted, permitting funding, by Naval Communications Security Material System (NCMS) and are primarily intended for Commanding Officers (COs), COR Auditors, and account Managers?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Central Office of Record (COR) Audit Team responsibilities are divided among how many teams?

A

11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

How many steps are required to establish a Communications Security (COMSEC) account?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

The distribution of all Communications Security (COMSEC) material requires authorization from who in relation to the material?

A

Controlling Authority (CONAUTH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Who are responsible for obtaining Controlling Authority (CONAUTH) validation for Communications Security (COMSEC) material not reflected in fleet instructions as part of the commands standard allowance?

A

Immediate Superiors in Command (ISICs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

At least how many days is required to establish a Communications Security (COMSEC) account and to provide the initial Communications Security (COMSEC) material?

A

45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

The account Manager must coordinate with the area Defense Courier Division (DCD) station and establish a Defense Courier (DC) account by submitting which form?

A

USTRANSCOM Form 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

Accounts expecting to receive over-the-counter (OTC) service from CMIO must submit which form to the Communications Security (COMSEC) Material Issuing Office (CMIO) reflecting account personnel authorized to receipt for and courier Communications Security (COMSEC) equipment for their command?

A

CMS Form 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

Upon receipt of a Communications Security (COMSEC) account establishment message reflecting the account number assigned to the command from Naval Communications Security Material System (NCMS), the command must establish a User Representative (UR) account with the Electronic Key Management System (EKMS) Central Facility (CF). This is accomplished through completion and submission of which form to the commands Command Authority (CA)?

A

CF Form 1206

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

When an installation date is received, the command, not the installation team, must submit a request for a FIREFLY Vector Set (FF), Message Signature Key (MSK), and how many KSV-21 cards with Electronic Key Management System (EKMS) privileges in accordance with Article 670 to this manual?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

When appointing Electronic Key Management System (EKMS) personnel, the Commanding Officer must consider the size of the account, the number of Local Elements (LEs) supported, the location where the Local Elements (LEs) operate, and which other requirements?

A

Two-Person Integrity (TPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which form must be reviewed and executed by personnel with access to cryptographic information?

A

SD Form 572

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Each numbered Communications Security (COMSEC) account will have a Manager, and a minimum of how many alternates appointed by the current Commanding Officer?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Individual appointment letters for Communications Security (COMSEC) account managers and alternates will be updated/signed by the incoming CO/OIC within how many days of assumption of command?

A

60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

What is the minimum required enlisted pay grade to be assigned as a Communications Security (COMSEC) account manager?

A

E-6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

What is the minimum required enlisted pay grade to be assigned as a Communications Security (COMSEC) account manager alternate?

A

E-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Temporary access for which clearance level may only be authorized by DON CAF?

A

SCI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

What is the minimum required enlisted paygrade to be assigned as a Local Element (LE) issuing (for keying material designated as CRYPTO)?

A

E-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

Commanding Officers are authorized to waive the length of government service required for Managers. If approved, waivers will be granted for the minimum duration required for the unit to comply with the policy in which the waiver was obtained, up to a maximum of how many years?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

The Communications Security (COMSEC) account manager may not be absent for more than how many days?

A

60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

During the temporary absence of the Communications Security (COMSEC) account manager, the Primary Alternate Manager must administer the account but may not do so for longer than how many days?

A

60

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

In accordance with which publication can Commanding Officers or Officers in Charge grant temporary access to individuals pending completion of full investigative requirements and pending establishment of security clearance eligibility by the DON CAF?

A

SECNAV M-5510.30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

What is used to determine the highest classification of Communications Security (COMSEC) material that an account may hold?

A

Highest Classification Indicator (HCI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

Commands that undergo a shift in claimancy or a name change will refer to which series for instructions on modifying their own Common Account Data (CAD) and uploading account registration changes and credentials to the Directory Server?

A

EKMS 704

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

Assignment of a Staff CMS Responsibility Officer (SCMSRO) does not relieve the appointing official of ultimate responsibility for the proper management of an Electronic Key Management System (EKMS) account. The SCMSRO may delegate how many of the Commanding Officer (CO) spot checks to the Communications Officer (COMMO), as long as the COMMO is not designated as the Communications Security (COMSEC) Account Manager or Alternate?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

What must be executed between the Electronic Key Management System (EKMS) account command and the Local Element (LE) command when a Local Element (LE) is responsible to a Commanding Officer other than that of the numbered Electronic Key Management System (EKMS) account command or issuing activity?

A

Letter of Agreement (LOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Letters of Agreement remain in effect until modified or the support is no longer required. LOAs/MOUs will be reviewed at a minimum of how often?

A

Triennially

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Commanding Officers (crypto net members) can extend crypto periods for how many hours without Controlling Authority authorization when necessary to complete a transmission or conversation?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

How often at a minimum must Commanding Officers (COs) conduct spot checks of the Communications Security (COMSEC) Vault and spaces where Communications Security (COMSEC) material is used and stored?

A

Quarterly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

How often at a minimum must training be held to ensure that all personnel handling Communications Security (COMSEC) material must be familiar with and adhere to proper communications Security (COMSEC) procedures?

A

Monthly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

The Communications Security (COMSEC) account manager must ensure that procedures are established to reassign local custody responsibility for Communications Security (COMSEC) material held by individuals permanently leaving the command, and those who are departing on TAD/TDY in excess of how many days?

A

30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

The Communications Security (COMSEC) account manager must ensure that modifications to Communications Security (COMSEC) equipment are promptly and properly performed by qualified individuals in accordance with which series and that modification residue is disposed of properly?

A

OPNAVINST 2221.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

The Communications Security (COMSEC) account manager must track and manage production and destruction dates for Modern Key held by the account and ensure timely submission of key orders for replacement material required no later than how many days from the expiration date of the keys currently held?

A

30

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which personnel are responsible to their Commanding Officer for the proper management and security of all Communications Security (COMSEC) material held by the command?

A

Local Element (LE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Local Element (LE) personnel issue Communications Security (COMSEC) material on local custody forms after verifying that the recipient is authorized to hold Communications Security (COMSEC) material and has executed which form?

A

SD Form 572

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

Each person authorized access to Communications Security (COMSEC) material as a user or witness, when required is personally responsible for the proper safeguarding, accountability, usage and what else in regards to the material?

A

Disposal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

Construction specifications for shore-based Communications Security (COMSEC) storage vaults used to store keying material constructed or modified after 01 Jan 2013 will be in accordance with which publication?

A

ICD-705

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

All personnel having access to cryptographic information (keying material, book packaged material marked/ designated crypto, or equipment which permits extraction of key (SKL, TKL, KP)) must be authorized in writing by the current Commanding Officer or “Acting Commanding Officer”. The use of what is not authorized in granting access to COMSEC material?

A

By Direction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

Access lists used for granting access to cryptographic information will be updated whenever the status of an individual changes, upon Change of Command or how often at a minimum?

A

Annually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

While only U.S. citizens are eligible for a security clearance, a resident alien or foreign national may be granted a “Limited Access Authorization” (LAA) in compliance with DoD 5200.2-R section C3.4.3 Such individuals may have access to COMSEC material no higher than what, if they have an LAA based on a completed successful background investigation and indoctrination, on a “need to know” basis, when their duties require such access?

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Who may not be appointed as Communications Security (COMSEC) Account Managers, Clerks, or equipment maintenance personnel nor have access to safes or areas where Communications Security (COMSEC) keying material is accounted for, visible, or stored?

A

Resident aliens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

The release of Communications Security (COMSEC) material to a contractor account or direct issuance to contractor personnel as Local Elements (LEs) by a DON COMSEC account is restricted to U.S. Industrial firms operating under contract to the U.S. Navy in accordance with the provisions of which series?

A

OPNAVINST 2221.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

What is the system of storage and handling designed to prohibit individual access by requiring the presence of at least two authorized individuals, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed?

A

Two-Person Integrity (TPI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Two-Person Integrity (TPI) storage requires the use of an approved Communications Security (COMSEC) vault or which type of approved security container?

A

General Services Administration (GSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Combinations must be changed at least once every how many years?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Combinations to Communications Security (COMSEC) material security containers, KP PINs and LCMS passwords must be recorded and individually wrapped in aluminum foil and protectively packaged in a separate combination envelope (which form)?

A

SF-700

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

How often at a minimum must an inventory document be created and used to inspect SF-700s?

A

Monthly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
130
Q

In an emergency, the Commanding Officer or other designated authority may direct the opening of any Communications Security (COMSEC) material security container. At least how many individuals shall be present to conduct and witness the emergency opening?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
131
Q

The Local Management Device (LMD) is pre-configured to lock out accounts after 3 failed attempts and to request a password change every how many days?

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
132
Q

If unauthorized adjustments or suspicious activity is detected on the LMD, consult local, service-specific Information Assurance (IA) policy or which series for any required reporting?

A

SECNAVINST 5239.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
133
Q

The LMD/KP including connecting cables, must be maintained, operated, and stored in a space approved for the open storage of which type of material?

A

SECRET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
134
Q

What must be maintained for each lock on a Communications Security (COMSEC) storage container?

A

SF-702

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
135
Q

Which form must be prepared and maintained when a container, lock or vault door is put in use?

A

OF-89

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
136
Q

The FIREFLY vector set is classified based on the Highest Classification Indicator (HCI) of the account; designated as CRYPTO; accounted for as ALC 1 or what else and permits the ability to generate and exchange credentials to transfer or receive keying material up to the Highest Classification Indicator (HCI)?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
137
Q

All magnetic media, including backup media, floppy diskettes, etc… used in the LMD/KP must be classified and safeguarded at which level?

A

SECRET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
138
Q

PINS must be changed at a minimum of every how many days or upon change of personnel?

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
139
Q

When shipping keying material marked CRYPTO, packages will contain no more than how many editions for material that is superseded quarterly or more frequently?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
140
Q

All TOP SECRET and SECRET keying material marked or designated CRYPTO and items that embody or describe a cryptographic logic or algorithm must be transported by one of how many different methods?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
141
Q

SECRET COMSEC equipment may be shipped by cleared commercial carrier using what?

A

Protective Security Services (PSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
142
Q

Within CONUS, FTRs shipped separately from the associated device may be shipped as SECRET collateral using a GSA authorized carrier per which publication?

A

SECNAV M-5510.36

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
143
Q

What is the “Application/License for Permanent Export of Unclassified Defense Articles and Related Technical Data” form number?

A

Form DSP-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
144
Q

What is the “Application/License for Temporary Export of Unclassified Defense Articles” form number?

A

Form DSP-73

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
145
Q

Courier personnel, including government, military or contractor personnel must have current, written authorization in the form of official travel orders, a DD-2501 or which other form from their organization?

A

DHS 11000-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
146
Q

Controlled Cryptographic Items (CCIs) are centrally accountable in the (COMSEC) Material Control System (CMCS) to the Central Office of Record (COR) by serial number (ALC 1) or what else?

A

Quantity (ALC 2)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
147
Q

What is not required for access to keyed or unkeyed Controlled Cryptographic Item (CCI) unless the equipment permits extraction of key?

A

SD-572

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
148
Q

Regardless of the method used to transport Controlled Cryptographic Item (CCI), the transferring command must, within how many hours of shipping, notify the intended recipient of the method of transportation and a list of Controlled Cryptographic Items (CCIs) that have been shipped?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
149
Q

If a shipment of Controlled Cryptographic Item (CCI) equipment has not been received within how many working days after the expected delivery date, contact the originator of the shipment immediately?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
150
Q

What provides the ability to view all expired modern (asymmetric) or superseded traditional (symmetric) electronic keying material?

A

Local COMSEC Management Software (LCMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
151
Q

Which series provides step-by-step guidance in preparing destruction reports and destroying electronic key at the account level?

A

EKMS 704

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
152
Q

Routine Destruction of Regularly and Irregularly Superseded Keying Material must be destroyed immediately after use when more than one copy of the key setting is available, or as soon as possible after the cryptoperiod and always within how many hours after the end of the cryptoperiod?

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
153
Q

Superseded segments of sealed segmented/extractable keying material (unissued or issued) need not be destroyed until the entire edition is superseded or the keying material is unsealed, whichever occurs first. When retained until the entire edition is superseded, unissued must be destroyed no later than 5 days after the month in which supersession occurs, issued must be destroyed no later than how many hours after the entire edition supersedes?

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
154
Q

To permit processing of message traffic receieved after the effective cryptoperiod of a key, keying material for all auto manual off-line systems (e.g., KL-42, KL-43, KL-51, AN/PYQ20 or later devices intended for off-line encryption) may be retained up to, but no longer than, how many hours after supersession?

A

72

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
155
Q

GPS keying material may be retained and used for up to how many hours after the regularly scheduled supersession period to comply with the NAVSTAR GPS Selective Availability and Anti-Spoofing Host Application Equipment Design Requirements with the Precise Positioning Security Module (SAASM)?

A

12

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
156
Q

Destruction of Maintenance Manuals, Operating Instructions, and General Doctrinal Publications must be destroyed within how many days after the end of the month in which superseded?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
157
Q

When authorization to destroy Communications Security (COMSEC) equipment has been received by an account from NCMS//N3// and a deadline destruction date has not been identified, destroy within how many days of receipt of the destruction is authorized?

A

90

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
158
Q

Only devices and methods approved by NSA, as reflected on which NSA list will be used for terminal destruction of COMSEC material?

A

Evaluated Products List (EPL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
159
Q

How many ways may paper Communications Security (COMSEC) material be destroyed?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
160
Q

Pulping (wet process) must break down the paper Communications Security (COMSEC) material to non-legible fiber residue (which size)?

A

5 mm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
161
Q

Acetone or methylene chloride may be used to destroy microfiche or microfilm when burning is not feasible. Enclose each in a separate paper jacket or place in the chemical bath one at a time for approximately how many minutes?

A

5

162
Q

Which type of fire should not be used to burn magnetic tapes on aluminum reels as it may cause an explosion?

A

Sodium-nitrate

163
Q

Submarines in port may destroy microfiche, floppy disks, and superseded key tape using a NSA-approved shredder and retain the residue onboard until return to sea and the next available jettisoning operation. When at-sea, submerged submarines with hydraulic compactors shall compress the shredded material into a standard disposable perforated metal container with a minimum weight of 30 pounds, then jettison no closer than how many nautical miles from land in accordance with Navy and Submarine regulations?

A

12

164
Q

How many types of Communications Security (COMSEC) facilities are there?

A

4

165
Q

Facilities that generate, process, or transfer unencrypted classified information by electrical, electronic, electro-mechanical, or optical means shall conform to the guidance and standards herein and which other series?

A

OPNAVINST C5510.93

166
Q

A general Communications Security (COMSEC) inspection must be conducted prior to initial activation, where practicable, but in no case later than how many days after activation?

A

90

167
Q

What must be conducted when facilities are initially activated or reactivated after foreign occupation, or when there is known or suspected access by foreign maintenance or construction personnel, or when clandestine surveillance or recording devices are suspected in or near a Communications Security (COMSEC) facility?

A

Technical Security Evaluation (TSE)

168
Q

In a continuously manned facility, a security check will be conducted at least once every how many hours to ensure all classified COMSEC information is properly safeguarded, and that physical security protection system/devices (e.g., door locks and vent covers) are functioning properly?

A

24

169
Q

What is the “End of Day Security Checklist” form number?

A

SF-701

170
Q

Which type of inspection is designed to detect attempts at technical exploitation of Communications Security (COMSEC) equipment by tampering, bugging, key extraction, or reverse engineering?

A

Quadrant

171
Q

Which type of area that, when staffed, must be occupied by two or more appropriately cleared individuals who must remain within sight of each other?

A

No-Lone Zone (NLZ)

172
Q

Windows less than how many feet above the ground at an unattended fixed secure telecommunications facility, measured from the bottom of the window, or are easily accessible by means of objects directly beneath that window, will be covered by an IDS?

A

18

Page 5-7

173
Q

Unattended fixed secure telecommunications facilities must be inspected at approximately how many-day intervals to confirm the integrity of the facility?

A

30

174
Q

Which term is defined as the area within a structure occupied by a DOD bulk encryption facility?

A

Space

175
Q

Which term is defined as the structure that contains a space?

A

Site

176
Q

What manages the authorized allowance of Communications Security (COMSEC) material as validated by the Immediate Superior in Command (ISIC) of the command?

A

CMIO Norfolk

177
Q

What is the primary means used by the Central Office of Record (COR) to obtain Point of Contact (POC) data for Electronic Key Management System (EKMS) Accounts?

A

Common Account Data (CAD)

178
Q

How often at a minimum must Communications Security (COMSEC) account managers review and update Common Account Data (CAD)?

A

Semi-Annually

179
Q

Shipboard allowances for Communications Security (COMSEC) equipment, related devices, equipment manuals and operating instructions by ship type and/or design are based, in part, upon the guidance in which series?

A

OPNAVINST 2300.44

180
Q

Chief of Naval Operations (CNO) validation and approval is required for all cryptographic equipment and associated ancillary devices. Further guidance related to equipment allowances, transfers, recertification, etc… can be found in which series?

A

EKMS-5

181
Q

Reserve-on-Board (ROB) levels typically range from how many months of keying material?

A

2-6

182
Q

Each Communications Security (COMSEC) Account Manager must review their holdings at a minimum of how often to ensure a continuing need for the quantity and types of all Communications Security (COMSEC) material held still exists?

A

Annually

183
Q

Superseded material received in a Reserve-on-Board (ROB) shipment must be destroyed within how many hours of opening the shipment?

A

12

184
Q

Three months of Reserve-on-Board (ROB) is standard for most Electronic Key Management System (EKMS) accounts, however, some COMFLT/TYCOM identified units are authorized to hold how many months of material to support extended operations?

A

7

185
Q

A request to increase Reserve-on-Board (ROB) levels for Short Titles the account is validated for requires at least 60 days notice if material is shipped via Defense Courier Service (DCS). A request to decrease a Reserve-on-Board (ROB) level requires a minimum of how many days notice?

A

14

186
Q

The United States Transportation Command, Defense Courier Division (USTRANSCOM TCJ3-C) operates a network of how many

A

18

187
Q

Requests for Special movements will be processed and entered into Defense Courier Service (DCS) within how many hours or less?

A

48

188
Q

Regardless of grade or position, personnel picking up material from Defense Courier Division (DCD) must be authorized by the current CO/OIC of the account as reflected on which form on file with the servicing Defense Courier Division (DCD) station?

A

Form-10

189
Q

Which form reflects Communications Security (COMSEC) Account Managers and Alternates authorized to receipt for and courier Communications Security (COMSEC) material between their command and the COMSEC Material Issuing Office (CMIO)?

A

CMS Form 1

190
Q

A routine modification to a command’s authorized allowance for physical keying material can be met by regular Defense Courier Service (DCS) delivery (minimum of how many days lead-time)?

A

60

191
Q

Who is the approving authority for any increase in allowance related to Communications Security (COMSEC) equipment?

A

Chief of Naval Operations (CNO)

192
Q

Requests for standard deployment keymat, as listed in the COMFLT, TYCOM, or CG area instructions, must be submitted a minimum of how many days before departure from homeport?

A

60

193
Q

COMSEC Material Issuing Office (CMIO) will respond to requests for electronic key within how many hours?

A

48

194
Q

LMD/KP-equipped Electronic Key Management System (EKMS) accounts are authorized to generate which key locally without prior authorization from Naval Communications Security Material System (NCMS)?

A

AL Code 7

195
Q

Which series contains a list of equipment types the Key Processor (KP) is capable of producing keys for?

A

EKMS 704

196
Q

There are several keys the Key Processor (KP) generates and uses internally which the user never encounters directly, but are affected by certain LMD/KP processes; these processes are: Site Re-initialization, KP Changeover, and what else?

A

KP re-key

197
Q

Which process enables the recovery of all protected data stored on the Local Management Device (LMD) and is used when a Key Processor (KP) must be replaced with a new Key Processor (KP) due to failure or recertification?

A

Site Reinitialization

198
Q

Which process is used to re-encrypt the Local Management Device (LMD) database when the crypto period of the Key Encryption Key Local (KEKL) expires?

A

Changeover

199
Q

Changeover will be performed following a Site Reinitialization and at a minimum of every three months thereafter (maximum of how many days between Changeovers)?

A

92

200
Q

Which process is when the Account Manager requests an update to the FIREFLY Key?

A

KP Rekey

201
Q

How often at a minimum must KP Rekeys be performed?

A

Annually

202
Q

What must be processed prior to conducting a KP rekey and posting new credentials?

A

Bulk Encrypted Transactions (BETs)

203
Q

What are designed to enable to KOK-22A (KP) to locally produce keying material for existing and emerging Communications Security (COMSEC) equipment?

A

KG Rules

204
Q

What is a designator which identifies secure telecommunications or information handling equipment, or an associated cryptographic component, which is unclassified but controlled within the (COMSEC) Material Control System (CMCS)?

A

Controlled Cryptographic Item (CCI)

205
Q

Communications Security (COMSEC) keying material will, at all times, be in one of how many status conditions?

A

3

206
Q

Which Communications Security (COMSEC) keying material status condition means it is being held for future use?

A

Reserve

207
Q

Which Communications Security (COMSEC) keying material status condition means it is authorized for use?

A

Effective

208
Q

Which Communications Security (COMSEC) keying material status condition means it is no longer authorized for use and must be destroyed within the time frames in Article 540?

A

Superseded

209
Q

Which term refers to a time when a particular item of Communications Security (COMSEC) material is no longer eligible for use?

A

Supersession

210
Q

How many ways can Communications Security (COMSEC) material be superseded?

A

3

211
Q

Which type of Communications Security (COMSEC) material suppression is based on a specific, pre-determined supersession date for each edition of material by the Controlling Authority?

A

Regular

212
Q

Which type of Communications Security (COMSEC) material supersession is not pre-determined but which occurs as a result of use?

A

Irregular

213
Q

Which type of Communications Security (COMSEC) material supersession is defined as an unplanned change of supersession, usually as a result of a compromise directed by the Controlling Authority?

A

Emergency

214
Q

What reflects most Communications Security (COMSEC) material distributed to Department of the Navy (DoN) accounts and is a guide and not an authoritative source for destruction of keying material?

A

Status of COMSEC Material Report (SCMR)

215
Q

What contains status information for NATO Communications Security (COMSEC) material and must be held by Department of the Navy (DoN) accounts which hold NATO material?

A

AMSG-600

216
Q

Status information for keying material designated for use as part of the Inter - Theater COMSEC Package (ICP) is promulgated in a series of messages using pre-determined date-time-groups (DTGs) by the Joint COMSEC Management Office (JCMO) on what basis?

A

Quarterly

217
Q

Policy and procedures for handling Two-Person Controlled (TPC)/Sealed Authentication Systems (SAS) material are contained in which series?

A

CJCSI 3260.01

218
Q

The status of Communications Security (COMSEC) manuals and publications is normally listed on which page within these documents?

A

Letter of Promulgation (LOP)

219
Q

Communications Security (COMSEC) material is divided into how many categories or material types?

A

3

220
Q

Which type of Communications Security (COMSEC) material supplies either encoding means for manual and auto-manual cryptosystems or key for machine cryptosystems?

A

Keying

221
Q

Which type of keying material includes keylists, codes, authenticators, Identify Friend or Foe (IFF) keying material, and one-time pads, but does not include canister-packaged key tapes?

A

Paper

222
Q

Which type of keying material is designed to permit the extraction and removal of individual segments of key for hourly, daily, weekly, etc… use?

A

Extractable

223
Q

Which type of keying material is designed to remain intact throughout its entire effective period?

A

Non-extractable

224
Q

Which type of keying material includes electronically generated key, either produced by a KP or other key variable generating device, electronic keys converted from key tape, electronic keys stored on magnetic media (e.g., floppy disk) and key loaded onto a fill device (e.g., KSD 64A)?

A

Electronic

225
Q

Which type of keying material includes, key tapes, keying plugs, keyed microcircuits, removable media (e.g., floppy disks), magnetic tapes, and keying material in solid state form such as programmable read-only memories (PROMs), read-only memories (ROMs), metallic oxide semi-conductor (MOS) chips, and micro-miniature tamper protection systems (micro-TPS)?

A

Non-paper

226
Q

Communications Security (COMSEC) keying material packaged in canisters has a preprinted digraph, consisting of how many letters, printed to the left of the short title on each extractable segment of the tape leader?

A

2

227
Q

Due to the ongoing DoD-wide transition to the Key Management Infrastructure (KMI) driven by the NSA-directed End-of-Life) for EKMS, the EKMS Manager COI is only available in how many geographical locations?

A

2

228
Q

All USN military personnel appointed or designated as an Account Managers, Alternate, LEs Issuing or LE User, must complete the applicable portions of the latest version of NAVEDTRA 43462-1 (EKMS PQS) or what else for the position they are fulfilling?

A

NAVEDTRA 43462-2 (KMI PQS)

229
Q

Department of the Navy (DoN) Communications Security (COMSEC) accounts have the option to receive a Training Visit from their local Central Office of Record (COR) Audit Team at any time. It is HIGHLY RECOMMENDED and in the command’s best interest to take advantage of the training and assistance services prior to an audit, deployment or upon change of command or Manager. How many training visits will be funded by Naval Communications Security Material System (NCMS) per audit cycle?

A

1

230
Q

All Department of the Navy (DoN) Communications Security (COMSEC) accounts must undergo a formal CMS COR Audit at least once every how many months?

A

24

231
Q

Communications Security (COMSEC) Account Managers are required to use the current version of which publication to conduct a semi-annual self-assessment?

A

EKMS-3

232
Q

Which Audit Teams constitue a worldwide network of COMSEC subject matter experts established to provide assistance and training to personnel assigned Communications Security (COMSEC) responsibilities?

A

Central Office of Record (COR)

233
Q

Central Office of Record (COR) Auditors must attend the Central Office of Record (COR) Audit Team Training seminar once every how many months to maintain certification?

A

36

234
Q

How often are EKMS/KMI Town Halls hosted, permitting funding, by Naval Communications Security Material System (NCMS) and are primarily intended for Commanding Officers (COs), COR Auditiors, and account Managers?

A

Annually

235
Q

Central Office of Record (COR) Audit Team responsibilities are divided among how many teams?

A

11

236
Q

How many steps are required to establish a Communications Security (COMSEC) account?

A

6

237
Q

The distribution of all Communications Security (COMSEC) material requires authorization from who in relation to the material?

A

Controlling Authority (CONAUTH)

238
Q

Who are responsible for obtaining Controlling Authority (CONAUTH) validation for Communications Security (COMSEC) material not reflected in fleet instructions as part of the commands standard allowance?

A

Immediate Superiors in Command (ISICs)

239
Q

At least how many days is required to establish a Communications Security (COMSEC) account and to provide the initial Communications Security (COMSEC) material?

A

45

240
Q

The account Manager must coordinate with the area Defense Courier Division (DCD) station and establish a Defense Courier (DC) account by submitting which form?

A

USTRANSCOM Form 10

241
Q

Accounts expecting to receive over-the-counter (OTC) service from the CMIO must submit which form to the Communications Security (COMSEC) Material Issuing Office (CMIO) reflecting account personnel authorized for reveipt for and courier Communications Security (COMSEC) equipment for their command?

A

CMS Form 1

242
Q

Upon receipt of a Communications Security (COMSEC) account establishment message reflecting the account number assigned to the command from Naval Communications Security Material System (NCMS), the command must establish a User Representative (UR) account with the Electronic Key Management System (EKMS) Central Facility (CF). This is accomplished through completion and submission of which form to the commands Command Authority (CA)?

A

CF Form 1206

243
Q

When an installation date is received, the command, not the installation team, must submit a request for a FIREFLY Vector Set (FF), Message Signature Key (MSK), and how many KSV-21 cards with Electronic Key Management System (EKMS) privileges in accordance with Article 670 to this manual?

A

2

244
Q

When appointing Electronic Key Management System (EKMS) personnel, the Commanding Officer must consider the size of the account, the number of Local Elements (LEs) supported, the location where the Local Elements (LEs) operate, and which other requirements?

A

Two-Person Integrity (TPI)

245
Q

Which form must be reviewed and executed by personnel with access to cryptographic information?

A

SD Form 572

246
Q

Each numbered Communications Security (COMSEC) account will have a Manager, and a minimum of how many alternates appointed by the current Commanding Officer?

A

1

247
Q

Individual appointment letters for Communications Security (COMSEC) account managers and alternates will be updated/signed by the incoming CO/OIC within how many days of assumption of command?

A

60

248
Q

What is the minimum required enlisted paygrade to be assigned as a Communications Security (COMSEC) account manager?

A

E-6

249
Q

What is the minimum required enlisted paygrade to be assigned as a Communications Security (COMSEC) account manager alternate?

A

E-5

250
Q

Temporary access for which clearance level may only be authorized by DON CAF?

A

SCI

251
Q

What is the minimum required enlisted paygrade to be assigned as a Local Element (LE) issuing (for keying material designated as CRYPTO)?

A

E-5

252
Q

Commanding Officers are authorized to waive the length of government service required for Managers. If approved, waivers will be granted for the minimum duration required for the unit to comply with the policy in which the waiver was obtained, up to a maximum of how many years?

A

1

253
Q

The Communications Security (COMSEC) account manager may not be absent for more than how many days?

A

60

254
Q

In accordance with which publication can Commanding Officers or Officers in Charge grant temporary access to individuals pending completion of full investigative requirements and pending establishment of security clearance eligibility by the DON CAF?

A

SECNAV M-5510.30

255
Q

What is used to determine the highest classification of Communications Security (COMSEC) material that an account may hold?

A

Highest Classification Indicator (HCI)

256
Q

Commands that undergo a shift in claimancy or a name change will refer to which series for instructions on modifying their own Common Account Data (CAD) and uploading account registration changes and credentials to the Directory Server?

A

EKMS 704

257
Q

Assignment of a Staff CMS Responsibility Officer (SCMSRO) does not relieve the appointing official of ultimate responsibility for the proper management of an Electronic Key Management System (EKMS) account. The SCMSRO may delegate how many of the Commanding Officer (CO) spot checks to the Communications Security (COMSEC) Account Manager or Alternate?

A

2

258
Q

What must be executed between the Electronic Key Management System (EKMS) account command and the Local Element (LE) command when a Local Element (LE) is responsible to a Commanding Officer other than that of the numbered Electronic Key Management System (EKMS) account command or issuing activity?

A

Letter of Agreement (LOA)

259
Q

Letters of Agreement remain in effect until modified or the support is no longer required. LOAs/MOUs will be reviewed at a minimum of how often?

A

Triennially

260
Q

Commanding Officers (cryptonet members) can extend cryptoperiods for how many hours without Controlling Authority authorization when necessary to complete a transmission or conversation?

A

2

261
Q

How often at a minimum must Commanding Officers (COs) conduct spot checks of the Communications Security (COMSEC) Vault and spaces where Communications Security (COMSEC) material is used and stored?

A

Quarterly

262
Q

How often at a minimum must training be held to ensure that all personnel handling Communications Security (COMSEC) material are familiar with and adhere to proper Communications Security (COMSEC) procedures?

A

Monthly

263
Q

The Communications Security (COMSEC) account manager must ensure that procedures are established to reassign local custody responsibility for Communications Security (COMSEC) material held by individuals permanently leaving the command, and those who are departing on TAD/TDY in excess of how many days?

A

30

264
Q

The Communications Security (COMSEC) account manager must ensure that modifications to Communications Security (COMSEC) equipment are promptly and properly performed by qualified individuals in accordance with which series and that modification residue is disposed of properly?

A

OPNAVINST 2221.3

265
Q

The Communications Security (COMSEC) account manager must track and manage production and destruction dates for Modern Key held by the account and ensure timely submission of key orders for replacement material required no later than how many days from the expiration date of the keys currently held?

A

30

266
Q

Which personnel are responsible to their Commanding Officer for the proper management and security of all Communications Security (COMSEC) material held by the command?

A

Local Element (LE)

267
Q

Local Element (LE) personnel issue Communications Security (COMSEC) material on local custody forms after verifying that the recipient is authorized to hold Communications Security (COMSEC) material and has executed which form?

A

SD Form 572

268
Q

Each person authorized access to Communications Security (COMSEC) material as a user or witness, when required is personally responsible for the proper safeguarding, accountability, usage and what else in regards to the material?

A

Disposal

269
Q

Construction specifications for shore-based Communications Security (COMSEC) storage vaults used to store keying material constructed or modified after 01 Jan 2013 will be in accordance with which publication?

A

ICD-705

270
Q

All personnel having access to cryptographic information (keying material, book packaged material marked/designated crypto, or equipment which permits extraction of key (SKL, TKL, KP)) must be authorized in writing by the current Commanding Officer or “Acting Commanding Officer”. The use of what is not authorized in granting access to COMSEC material?

A

By Direction

271
Q

Access lists used for granting access to cryptographic information will be updated whenever the status of an individual changes, upon Change of Command or how often at a minimum?

A

Annually

272
Q

While only U.S. citizens are eligible for a security clearance, a resident alien or foreign national may be granted a “Limited Access Authorization” (LAA) in compliance with DoD 5200.2-R section C3.4.3 Such individuals may have access to COMSEC material no higher than what, if they have an LAA based on a completed successful background investigation and indoctrination, on a “need to know” basis, when their duties require such access?

A

Confidential

273
Q

Who may not be appointed as Communications Security (COMSEC) Account Managers, Clerks, or equipment maintenance personnel nor have access to safes or areas where Communications Security (COMSEC) keying material is accounted for, visible, or stored?

A

Resident aliens

274
Q

The release of Communications Security (COMSEC) material to a contractor account or direct issuance to contractor personnel as Local Elements (LEs) by a DON COMSEC account is restricted to U.S. Industrial firms operating under contract to the U.S. Navy in accordance with the provisions of which series?

A

OPNAVINST 2221.5

275
Q

What is the system of storage and handling designed to prohibit individual access by requiring the presence of at least two authorized individuals, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed?

A

Two-Person Integrity (TPI)

276
Q

Two-Person Integrity (TPI) storage requires the use of an approved Communications Security (COMSEC) vault or which type of approved security container?

A

General Services Administration (GSA)

277
Q

Combinations must be changed at least once every how many years?

A

2

278
Q

Combinations to Communications Security (COMSEC) material security containers, KP PINs and LCMS passwords must be recorded and individually wrapped in aluminum foil and protectively packaged in a separate combination envelope (which form)?

A

SF-700

279
Q

How often at a minimum must an inventory document be created and used to inspect SF-700s?

A

Monthly

280
Q

In an emergency, the Commanding Officer or other designated authority may direct the opening of any Communications Security (COMSEC) material security container. At least how many individuals shall be present to conduct and witness the emergency opening?

A

2

281
Q

The Local Management Device (LMD) is pre-configured to lock out accounts after 3 failed attempts and to request a password change every how many days?

A

90

282
Q

If unauthorized adjustments or suspicious activity is detected on the LMD, consult local, service-specific Information Assurance (IA) policy or which series for any required reporting?

A

SECNAVINST 5239.3

283
Q

The LMD/KP including connecting cables, must be maintained, operated, and stored in a space approved for the open storage of which type of material?

A

SECRET

284
Q

What must be maintained for each lock on a Communications Security (COMSEC) storage container?

A

SF-702

285
Q

Which form must be prepared and maintained when a container, lock or vault door is put in use?

A

OF-89

286
Q

The FIREFLY vector set is classified based on the Highest Classification Indicator (HCI) of the account; designation as CRYPTO; accounted for as ALC 1 or what else and permits the ability to generate and exchange credentials to transfer or receive keying material up to the Highest Classification Indicator (HCI)?

A

6

287
Q

All magnetic media, including back up media, floppy diskettes, etc… used in the LMD/KP must be classified and safeguarded at which level?

A

SECRET

288
Q

PINS must be changed at a minimum of every how many days or upon a change of personnel?

A

90

289
Q

When shipping keying material marked CRYPTO, packages will contain no more than how many editions for material that is superseded quarterly or more frequently?

A

4

290
Q

All TOP SECRET and SECRET keying material marked or designated CRYPTO and items that embody or describe a cryptographic logic or algorithm must be transported by one of how many different methods?

A

3

291
Q

SECRET COMSEC equipment may be shipped by cleared commercial carrier using what?

A

Protective Security Services (PSS)

292
Q

Within CONUS, FTRs shipped separately from the associated device may be shipped as SECRET collateral using a GSA authorized carrier per which publication?

A

SECNAV M-5510.36

293
Q

What is the “Application/License for Permanent Export of Unclassified Defense Articles and Related Technical Data” form number?

A

Form DSP-5

294
Q

What is the “Application/License for Temporary Export of Unclassified Defense Articles” form number?

A

Form DSP-73

295
Q

Courier personnel, including government, military or contractor personnel must have current, written authorization in the form of official travel orders, a DD-2501 or which other form from their organization?

A

DHS 11000-1

296
Q

Controlled Cryptographic Items (CCIs) are centrally accountable in the (COMSEC) Material Control System (CMCS) to the Central Office of Record (COR) by serial number (ALC 1) or what else?

A

Quantity (ALC 2)

297
Q

What is not required for access to keyed or unkeyed Controlled Cryptographic Item (CCI) unless the equipment permits extraction of key?

A

SD-572

298
Q

Regardless of the method used to transport Controlled Cryptographic Items (CCIs) that have been shipped?

A

24

299
Q

If a shipment of Controlled Cryptographic Item (CCI) equipment has not been received within how many working days after the expected delivery date, contact the originator of the shipment immediately?

A

5

300
Q

What provides the ability to view all expired modern (asymmetric) or superseded traditional (symmetric) electronic keying material?

A

Local COMSEC Management Software (LCMS)

301
Q

Which series provides step-by-step guidance in preparing destruction reports and destroying electronic key at the account level?

A

EKMS 704

302
Q

Routine Destruction of Regularly and Irregularly Superseded Keying Material must be destroyed immediately after use when more than one copy of the key setting is available, or as soon as possible after the cryptoperiod and always within how many hours after the end of the cryptoperiod?

A

12

303
Q

Superseded segments of sealed segmented/extractable keying material (unissused or issued) need not be destroyed until the entire edition is superseded or the keying material is unsealed, whichever occurs first. When retained until the entire edition is superseded, unissued must be destroyed no later than 5 days after the month n which e supersession occurs, issued must be destroyed no later than how many hours after the entire edition supersedes?

A

12

304
Q

To permit processing of message traffic received after the effective cryptoperiod of a key, keying material for all auto manual off-line systems (e.g., KL-42, KL-43, KL-51, AN/PYQ20 or later devices intended for offline encryption) may be retained up to, but no longer than, how many hours after supersession?

A

72

305
Q

GPS keying material may be retained and used for up to how many hours after the regularly scheduled supersession period to comply with the NAVSTAR GPS Selective Availability and Anti-Spoofing Host Application Equipment Design Requirements with the Precise Positioning Security Module (SAASM)?

A

12

306
Q

Destruction of Maintenance Manuals, Operating Instructions, and General Doctrinal Publications must be destroyed within how many days after theend of the month in which it is superseded?

A

5

307
Q

When authorization to destroy Communications Security (COMSEC) equipment has been received by an account from NCMS//N3//and a deadline destruction date has not been identified, destroy within how many days of receipt of the destruction authorization?

A

90

308
Q

Only devices and methods approved by the NSA, as reflected on which NSA list will be used for termination destruction of COMSEC material?

A

Evaluated Products List (EPL)

309
Q

How many ways may paper Communications Security (COMSEC) material to non-legible fiber residue (which size)?

A

5 mm

310
Q

Acetone or methylene chloride may be used to destroy microfiche or microfilm when burning is not feasible. Enclose each in a separate paper jacket or place in the chemical bath one at a time for approximately how many minutes?

A

5

311
Q

Which type of fire should not be used to burn magnetic tapes on aluminum reels as it may cause an explosion?

A

Sodium-nitrate

312
Q

Submarines in port may destroy microfiche, floppy disks, and superseded key tape using a NSA-approved shredder and retain the residue onboard until return to sea and the next available jettisoning operation. When at-sea, submerged submarines with hydraulic compactors shall compress the shredded material into a standard disposable perforated metal container with a minimum weight of 30 pounds, then jettison no closer than how many nautical miles from land in accordance with Navy and Submarine regulations?

A

12

313
Q

How many types of Communications Security (COMSEC) facilities are there?

A

4

314
Q

Facilities that generate, process, or transfer unencrypted classified information by electrical, electronic, electro-mechanical, or optical means shall conform to the guidance and standards herein and which other series?

A

OPNAVINST C5510.93

315
Q

A general Communications Security (COMSEC) inspection must be conducted prior to initial activation, where practicable, but in no case later than how many days after activation?

A

90

316
Q

What must be conducted when facilities are initially activated or reactivated after foreign occupation, or when there is known or suspected access by foreign maintenance or construction personnel, or when clandestine surveillance or recording devices are suspected in or near a Communications Security (COMSEC) facility?

A

Technical Security Evaluation (TSE)

317
Q

In a continuously manned facility, a security check will be conducted at least once every how many hours to ensure all classified COMSEC information is properly safeguarded, and that physical security protection system/devices (e.g., door locks and vent covers) are functioning properly?

A

24

318
Q

What is the “End of Day Security Checklist” form number?

A

SF-701

319
Q

Which type of inspection is designed to detect attempts at technical exploitation of Communications Security (COMSEC) equipment by tampering, bugging, key extraction, or reverse engineering?

A

Quadrant

320
Q

Which type of area that, when staffed, must be occupied by two or more appropriately cleared individuals who must remain within sight of each other?

A

No-Lone Zone (NLZ)

321
Q

Windows less than how many feet above the ground at an unattended fixed secure telecommunications facility, measured from bottom of the window, or are easily accessible by means of objects directly beneath that window, will be covered by an IDS?

A

18

322
Q

Unattended fixed secure telecommunications facilities must be inspected at approximately how many-day intervals to confirm the integrity of the facility?

A

30

323
Q

Which term is defined as the area within a structure occupied by a DoD bulk encryption facility?

A

Space

324
Q

Which term is defined as the structure that contains a space?

A

Site

325
Q

What manages the authorized allowance of Communications Security (COMSEC) material as validated by the Immediate Superior in Command (ISIC) of the command?

A

CMIO Norfolk

326
Q

What is the primary means used by the Central Office of Record (COR) to obtain Point Of Contact (POC) data for Electronic Key Management System (EKMS) Accounts?

A

Common Account Data (CAD)

327
Q

How often at a minimum must Communications Security (COMSEC) account managers review and update Common Account Data (CAD)?

A

Semi-Annually

328
Q

Shipboard allowances for Communications Security (COMSEC) equipment, related devices, equipment annuals and operating instructions by shiptype and/or design are based, in part, upon the guidance in which series?

A

OPNAVINST 2300.44

329
Q

Chief of Naval Operations (CNO) validation and approval is required for all cryptographic equipment and associated ancillary devices. Further guidance related to equipment allowances , transfers, recertification, etc… can be found in which series?

A

EKMS-5

330
Q

Reserve-on-Board (ROB) levels typically range from how many months of keying material?

A

2-6

331
Q

Each Communications Security (COMSEC) Account Manager must review their holdings at a minimum of how often to ensure a continuing need for the quantity and types of all Communications Security (COMSEC) material held still exists?

A

Annually

332
Q

Superseded material received in a Reserve-on-Board (ROB) shipment must be destroyed within how many hours of opening the shipment?

A

12

333
Q

Three months of Reserve-on-Board (ROB) is standard for most Electronic Key Management System (EKMS) accounts, however, some COMFLT/TYCOM identified units are authorized to hold how many months of material to support extended operations?

A

7

334
Q

A request to increase Reserve-on-Board (ROB) levels for Short Titles the account is validated for requires at least 60 days notice if material is shipped via Defense Courier Service (DCS). A request to decrease a Reserve-on-Board (ROB) level requires a minimum of how many days notice?

A

14

335
Q

The United States Transportation Command, Defense Courier Division (USTRANSCOM TCJ3-C) operates a network of how many stations to provide the secure, timely and efficient global distribution of classified and sensitive material for the U.S. Government and its allies?

A

18

336
Q

Requests for Special movements will be processed and entered into Defense Courier Service (DCS) within how many hours or less?

A

48

337
Q

Regardless of grade or position, personnel picking up material from Defense Courier Division (DCD) must be authorized by the current CO/OIC of the account as reflected on which form on file with the servicing Defense Courier Division (DCD) station?

A

Form-10

338
Q

Which form reflects Communications Security (COMSEC) Account Managers and Alternates authorized to receipt for and courier Communications Security (COMSEC) material between their command and the COMSEC Material Issuing Office (CMIO)?

A

CMS Form 1

339
Q

A routine modification to a command’s authorized allowance for physical keying material can be met by regular Defense Courier Service (DCS) delivery (minimum of how many days lead-time)?

A

60

340
Q

Who is the approving authority for any increase in allowance related to Communications Security (COMSEC) equipment?

A

Chief of Naval Operations (CNO)

341
Q

Requests for standard deployment keymat, as listed in the COMFLT, TYCOM, or CG area instructions, must be submitted a minimum of how many days before departure from homeport?

A

60

342
Q

COMSEC Material Issuing Office (CMIO) will respond to requests for electronic key within how many hours?

A

48

343
Q

LMD/KP-equipped Electronic Key Management System (EKMS) accounts are authorized to generate which key locally without prior authorization from Naval Communications Security Material System (NCMS)?

A

AL Code 7

344
Q

Which series contains a list of equipment types the Key Processor (KP) is capable of producing keys for?

A

EKMS 704

345
Q

Electronic Key Management System (EKMS) accounts are encouraged to generate their own AL Code 7 key for cryptonets of how many or less nodes?

A

10

346
Q

Temporary transfers of Communications Security (COMSEC) equipment will be in accordance with which series?

A

EKMS-5

347
Q

Regardless of format, temporary transfer of keying material is restricted to no more than two editions and a period not to exceed how many months?

A

3

348
Q

Afloat commands which are permanently re-locating to a homeport in a different ocean area must inform Naval Communications Security Material System (NCMS) and the COMSEC Material Issuing Office (CMIO) of new OPAREA physical Communications Security (COMSEC) material requirements how many days prior to departure from their present homeport?

A

60

349
Q

Each Electronic Key Management System (EKMS) account will establish and maintain how many different Communications Security (COMSEC)-related files?

A

4

350
Q

What is the “Secure Data Network System (SDNS) Key Order Requests form number?

A

CF Form 1050

351
Q

How often are Account Managers authorized to generate an inventory for material issued and have (2) Local Element (LE) personnel conduct an inventory of all material issued and sign/return the inventory to the Communications Security (COMSEC) Account Manager?

A

Semi-annually

352
Q

The Local Custody File must contain a signed document (i.e., SF-153 or locally prepared equivalent form) for each item of Communications Security (COMSEC) material issued to authorized LEs. Material issued to personnel who have signed for Communications Security (COMSEC) material who go on leave or TAD in excess of how many days or who transfer, are reassigned or retire must be returned within Local COMSEC Management Software (LCMS) to the COMSEC Account Manager and reissued?

A

30

353
Q

Which form is used to document the receipt, transfer, destruction, inventory, possession, relief from accountability and generation of COMSEC material?

A

SF-153

354
Q

A transfer is the movement of Communications Security (COMSEC) material, hardcopy or electronic, between two Electronic Key Management System (EKMS) accounts. How many types of transfers are there?

A

2

355
Q

The physical transfer of AL Code 1, 2, or 4 material between Department of the Navy (DoN) accounts requires a hard copy of which form to be enclosed with the material?

A

TRI SF-153

356
Q

The physical transfer of all AL Code 1, 2, or which other Communications Security (COMSEC) material involving a DON EKMS accounts must be reported to the COR via a TRI EKMS Transaction prepared by the account transferring the material?

A

6

357
Q

Except in cases of extreme emergency (e.g., enemy attack, civil uprising, or natural disaster, or terrorism), Communications Security (COMSEC) material must always be destroyed by how many appropriately cleared and authorized persons?

A

2

358
Q

Local destruction records are optional for AL Code 4 and which other Communications Security (COMSEC) material classified CONFIDENTIAL and below, regardless of CRYPTO markings?

A

7

359
Q

What provides the interface for the operator to direct the destruction of locally held electronic key, request and confirm destruction of material by a non-Local Management Device (LMD) account or Local Element (LE), report destruction to a superior account, and process electronic destruction reports from an account?

A

Local COMSEC Management Software (LCMS)

360
Q

Which form is used to return AL Code 1 or 2 Communications Security (COMSEC) material to proper accountability controls?

A

SF-153

361
Q

Which type of expired credentials are the most common reason an account cannot reconcile for received Bulk-Encrypted Transactions (BETs)?

A

FIREFLY

362
Q

Communications Security (COMSEC) Account Managers must report receipt of corrupt Bulk-Encrypted Transactions (BETs) within how many business days of downloading the Bulk-Encrypted Transaction (BET)?

A

3

363
Q

What are generated by originators of Communications Security (COMSEC) material transfers at specified time intervals to notify the intended recipient of overdue receipts?

A

Tracers

364
Q

How many days from the date of a shipment is the first tracer sent?

A

30

365
Q

How many days from the date of a shipment is the second tracer sent?

A

40

366
Q

How many days from the date of a shipment is the third tracer sent?

A

50

367
Q

Shipment originators that do not receive a communication or a receipt from the intended recipient within how many days of the date of the first tracer action will generate a Communications Security (COMSEC) Material Incident Report (“Physical Incident”)?

A

60

368
Q

Failure to respond to a final tracer notice from the Central Facility (CF) may result in the Modern Key being marked as compromised and placed on which list?

A

Compromised Key List (CKL)

369
Q

What is the process through which received accountable material is added to the local account’s data base?

A

Reconciliation

370
Q

Most Communications Security (COMSEC) material is shipped from the United States National Distribution Authority (USNDA), COMSEC Material Issuing Office (CMIO) and other accounts via which service?

A

Defense Courier Service (DCS)

371
Q

Which up-to-date form is required to be on file at the COMSEC Material Issuing Office (CMIO) for pick-ups or turn-in of material?

A

CMS Form 1

372
Q

Local COMSEC Management Software (LCMS) supports reconciling of electronic and hard copy receipts for material received and material distributed. How many functions are available for reconciling received material?

A

3

373
Q

What are conducted to ensure the completeness of Communications Security (COMSEC) material?

A

Page checks

374
Q

How often must all Communications Security (COMSEC) material (including equipment and publications) assigned AL Code 1, 2, 4, 6, and 7 be inventoried?

A

Semi-annually

375
Q

The Central Office of Record (COR) must be notified via official naval message or digitally-signed PKI email no later than how many days prior to the start date of a Change of Manager inventory?

A

10

376
Q

How many types of Electronic Key Management System (EKMS) inventories are there?

A

5

377
Q

Procedures for electronic submission of a Semi-Annual Inventory Report (SAIR) can be found in which series?

A

EKMS-704

378
Q

The Central Office of Record (COR) will monitor the response to inventory transactions and will notify commands that fail to return a reconciled inventory within how many days?

A

30

379
Q

Surface units conducting either crew or hull swaps must notify the Central Office of Record (COR) via naval message no later than how many days prior to the turnover?

A

120

380
Q

Which report satisfies National and Navy policy which requires an inventory be completely conducted, documented, reported to and reconciled by the Central Office of Record (COR) to document a Change of Communications Security (COMSEC) Account Manager?

A

Change of Custodian Inventory Report (CCIR)

381
Q

Which inventory is a primary management tool intended to assist Communications Security (COMSEC) Account Managers in determining the health and status of the account?

A

Change of Account Location (COAL)

382
Q

A new Communications Security (COMSEC) Account Manager must be appointed and a Change of Manager Inventory conducted if the COMSEC Account Manager is or will be absent for more than how many days?

A

60

383
Q

Material in the custody of a Crypto Repair Facility (CRF) or a maintenance pool for less than how many years may be inventoried by sighting the local custody document for the material?

A

1

384
Q

What is automatically generated by the Central Office of Record (COR) upon submission of an Electronic Key Management System (EKMS) inventory?

A

Inventory Reconciliation Status Transaction (IRST)

385
Q

Which form must be completed by every person with access to cryptographic information?

A

SD-572

386
Q

Except as permitted by the respective Operational Security Doctrine (OSD) for the device, Communications Security (COMSEC) keying material in either hard copy or electronic form marked or designated CRYPTO, may not be issued any earlier than how many days prior to the effective period (month) of the material without prior authorization of the Controlling Authority (CONAUTH)?

A

30

387
Q

If keying material is issued to a LE via a FD, the loading of the FD and issue can only occur just before the planned mission. If a SKL or TKL is used, loading of the encrypted key may occur how many hours prior to the planned mission?

A

24

388
Q

Electronic key in a FD superseded during a mission will be zeroized within how many hours of supersession?

A

12

389
Q

Within how many working days of receipt, EKMS key transactions stored on removable media must be uploaded to the LMD or LMD/KP, as applicable, and the media destroyed by burning or melting or returned to DIRNSA for destruction?

A

3

390
Q

What is the only functioning entity under the Cryptographic Equipment Exchange Program (CEEP)?

A

CRF San Diego

391
Q

KGV-68Bs installed in missiles are considered embedded Communications Security (COMSEC) and are accountable within the (COMSEC) Material Control System (CMCS) as which items?

A

ALC 2

392
Q

How many KGV-68Bs are typically installed in each missile?

A

2

393
Q

Items returned to the Communications Security (COMSEC) Account Manager prior to the end of the month reflected on the watch-to-watch inventory will be done using which form and lined out from the date of return on the watch-to-watch inventory and be initialed by two Local Element (LE) personnel?

A

SF-153

394
Q

What is the reproduction of less than an entire copy of COMSEC material called?

A

Extract

395
Q

Extracts of other Communications Security (COMSEC) material, including keying material not marked CRYPTO, do not have to be documented on local custody forms. This material must be handled and accounted for based on its assigned classification in accordance with which publication?

A

SECNAV M-5510.36

396
Q

Communications Security (COMSEC) Account Managers who transfer AL Code 4 publications to another Electronic Key Management System (EKMS) account must forward all amendments or corrections to the command(s) holding the basic publication for a period not to exceed how many days?

A

90

397
Q

Destruction of amendment residue may be verified in one of how many ways at the option of the Communications Security (COMSEC) Account Manager?

A

2

398
Q

Classified and unclassified amendment residue must be destroyed as soon as possible but no later than how many working days after an amendment entry?

A

5

399
Q

Keying material marked or designated as what is the most sensitive item of COMSEC material?

A

CRYPTO

400
Q

Which Communications Security (COMSEC) keying material report is a two-sided document used to record destruction of individual, one-time keying material segments of Communications Security (COMSEC) material?

A

CMS 25

401
Q

What is used to record destruction of multiple copy segments (i.e., 1/01, 1/02, 1/03, etc.) of COMSEC keying material packaged in canisters?

A

CMS 25MC