EKMS 1E, EKMS POLICY AND PROCEDURES FOR NAVY ELECTRONIC KEY MANAGEMENT SYSTEM TIERS 2&3 Flashcards
Which material is used to protect U.S. Government and partner classified or sensitive unclassified communications or information from unauthorized persons?
Communications Security (COMSEC)
Which system was established to distribute, control, and safeguard Communications Security (COMSEC) material?
(COMSEC) Material Control System (CMCS)
What is an interoperable collection of systems, facilities, and components developed by the services and agencies of the U.S. Government to automate the planning, ordering, filling, generation, distribution, accountability, storage, usage, destruction and management of electronic key and other types of Communications Security (COMSEC) material?
Electronic Key Management System (EKMS)
The overall Electronic Key Management System (EKMS) architecture consists of how many layers or tiers?
4
Which Electronic Key Management System (EKMS) Tier consists of the National Security Agency’s (NSA) Fort Meade and Finksburg Key Facilities and provides centralized key management services for all forms of Communications Security (COMSEC) key?
Tier 0
Which Electronic Key Management System (EKMS) layer serves as the intermediate key generation and distribution center, central offices of record (COR), privilege managers, and registration authorities for EKMS/COMSEC accounts?
Tier 1
What houses the physical Electronic Key Management System (EKMS) servers that are used for accounting and will provide for the generation and distribution of many traditional key types for large nets?
Common Tier I (CT1)
Which Electronic Key Management System (EKMS) layer is comprised of the EKMS Accounts that manage and other Communications Security (COMSEC) material?
Tier 2
Which Electronic Key Management System (EKMS) layer is the lowest tier or layer of the EKMS architecture?
Tier 3
What serves as Tier 0 and is the executive agent for developing and implementing national level policy affecting the control of Communications Security (COMSEC) material ?
National Security Agency (NSA)
Which term is used to refer to the Tier 1 site having primary COR (Central Office of Record) responsibility for a portion of the Tier 2 accounts?
Primary Tier 1 Segment (PT1S)
Who has overall responsibility and authority for implementation of National Communications Security (COMSEC) policy within the Department of the Navy (DoN)?
Chief of Naval Operations (CNO)
What serves as Communications Security (COMSEC) resource sponsor for the Marine Corps?
Headquarters Marine Corps (HQMC) C4 CY
What administers the Department of the Navy (DoN) Communications Security (COMSEC) program and is the Service Authority for the Department of the Navy (DoN)?
Naval Communications Security Material System (NCMS)
What receives, stores, and ships Ready for Issue (RFI) equipment and is the Physical Material Handling Segment (PMHS) for Navy in the EKMS?
COMSEC Material Issuing Office (CMIO)
What is the consolidated (Air Force, Army, Navy and NSA) Communications Security (COMSEC) distribution facility for keying material?
United States National Distribution Authority (USNDA)
What is responsible for evaluating Communications Security (COMSEC) incidents and authorizing the issue/destruction of COMSEC material under their control?
Controlling Authority (CONAUTH)
A Communications Security (COMSEC) account is an administrative entity in which custody and control of Communications Security (COMSEC) material are maintained. These accounts are called Tier 2 accounts and are identified by an account number consisting of how many digits?
6
How many LCMS System Administrators at a minimum must be appointed?
2
Who is the Commanding Officers (CO’s) primary advisor on matters concerning the security and handling of Communications Security (COMSEC) material and the associated records, reports, and audits?
COMSEC Manager
How many variants of Local Elements are there?
2
How many categories do Local Elements (LEs) in transit fall into?
2
What is defined as any activity, organization, or person(s) performing some type of key management-related function or functions, which has been assigned an EKMS ID?
Key Management Entity (KME)
What is the FIREFLY POC for modern key privileges?
Naval Communications Security Material System (NCMS)
Communications Security (COMSEC) material must be handled and safeguarded based on its assigned classification and accounted for based on which code?
Accountability Legend (AL)
How many standard classification markings are used to indicate the classification of Communications Security (COMSEC) material?
4
A short title consists of how many alphanumeric characters without special characters, e.g., /, -, etc.?
24
Within Local COMSEC Management Software (LCMS), electronically generated keying material can be assigned an accounting number of what?
0
Short titles are created and defined based on guidance found in which publication?
CNSSI-4033
Which codes determine how Communications Security (COMSEC) material is accounted for within the (COMSEC) Material Control System (CMCS)?
Accountability Legend (AL)
How many Accountability Legend (AL) codes are used to identify the minimum accounting controls required for Communications Security (COMSEC) material?
5
Which Accountability Legend (AL) is assigned to traditional hardcopy Communications Security (COMSEC) material that is continuously accountable to the Central Office of Record (COR) by accounting (serial/register) number from production to destruction?
AL Code 1
Which Accountability Legend (AL) code is assigned to traditional hard copy Communications Security (COMSEC) material that is continuously accountable to the Central Office of Record (COR) by quantity from production to destruction?
AL Code 2
Which Accountability Legend (AL) code is assigned to traditional hardcopy Communications Security (COMSEC) material that after initial receipt to the Central Office of Record (COR), Communications Security (COMSEC) material is locally accountable by quantity and handled/safeguarded based on its classification?
AL Code 4
Which Accountability Legend (AL) code is assigned to electronically generated keys for Communications Security (COMSEC) material that is electronically generated and continuously accountable to the Central Office of Record (COR) from production to destruction?
AL Code 6
Which Accountability Legend (AL) code is assigned to electronically generated keys for Communications Security (COMSEC) material that is electronically generated and locally accountable to the generating facility?
AL Code 7
Electronic key generated under the provisions of which series other than the KP (KOK-22) is not assigned an Accountability Legend (AL) code?
NAG 16
COMSEC Material Issuing Office (CMIO) Norfolk is required to continuously account to the Central Office of Record (COR) for all Accountability Legend (AL) material falling under which code?
AL Code 4
Which marking or designator identifies all Communications Security (COMSEC) keying material that is used to protect or authenticate classified or sensitive unclassified government or government-derived information, the loss of which could adversely affect national security?
CRYPTO
Any physical media to be transferred or issued, other than a KSD-64A, on which electronic keys have been loaded will have a short title and an Accountability Legend (AL) code of 1 or what else?
4
Which type of Electronic Key Management System (EKMS) Message key is a modern (asymmetric) key used to create FIREFLY vectors (credentials) to encrypt keying material for distribution between EKMS accounts or to perform benign fill techniques?
KP FIREFLY
Which type of Electronic Key Management System key is a modern key generated by the EKMS CF and filled from a KSD-64A cryptographically “sign” EKMS messages?
Message Signature Key (MSK)
FIREFLY Key and Message Signature Key (MSK) along with the KP Privilege Certificate (PRIV CERT) must be requested from what whenever an LMD/KP is brought on-line for the first time (site initialization) or following a catastrophic failure of the LMD/KP that results in the system requiring a new site initialization?
Naval Communications Security Material System (NCMS)
Procedures for loading of either the FireFly (FF) Vector Set or Message Signature Key (MSK) are outlined in which series?
EKMS-704
There are several keys the Key Processor (KP) generates and uses internally which the user never encounters directly, but are affected by certain LMD/KP processes; these processes are: Site Re-initialization, KP Changeover, and what else?
KP re-key
Which process enables the recovery of all protected data stored on the Local Management Device (LMD) and is used when a key processor (KP) must be replaced with a new Key Processor (KP) due to failure or recertification?
Site Reinitialization
Which process is used to re-encrypt the Local Management Device (LMD) database when the crypto period of the Key Encryption Key Local (KEKL) expires?
Changeover
Changeover will be performed following a Site Reinitialization and at a minimum of every three months thereafter (maximum of how many days between Changeovers)?
92
Which process is when the Account Manager requests an update to the FIREFLY Key?
KP Rekey
How often at a minimum must KP Rekeys be performed?
Annually
What must be processed prior to conducting a KP rekey and posting new credentials?
Bulk Encrypted Transactions (BETs)
What are designed to enable to KOK-22A (KP) to locally produce keying material for existing and emerging Communications Security (COMSEC) equipment?
KG Rules
What is a designator which identifies secure telecommunications or information handling equipment, or an associated cryptographic component, which is unclassified but controlled within the (COMSEC) Material Control System (CMCS)?
Controlled Cryptographic Item (CCI)
Communications Security (COMSEC) keying material will, at all times, be in one of how many status conditions?
3
Which Communications Security (COMSEC) keying material status condition means it is being held for future use?
Reserve
Which Communications Secuirty (COMSEC) keying material status condition means it is authorized for use?
Effective
Which Communications Security (COMSEC) keying material status condition means it is no longer authorized for use and must be destroyed within the time frames in Article 540?
Superseded
Which term refers to a time when a particular item of Communications Security (COMSEC) material is no longer eligible for use?
Supersession
How many ways can Communications Security (COMSEC) material be superseded?
3
Which type of Communications Security (COMSEC) material supersession is based on a specific, pre-determined supersession date for each edition of material by the Controlling Authority?
Regular
Which type of Communications Security (COMSEC) material supersession is not pre-determined but which occurs as a result of use?
Irregular
Which type of Communications Security (COMSEC) material supersession is defined as an unplanned change of supersession, usually as the result of a compromise directed by the Controlling Authority?
Emergency
What reflects most Communications Security (COMSEC) material distributed to Department of the Navy (DoN) accounts and is a guide and not an authoritative source for destruction of keying material?
Status of COMSEC Material Report (SCMR)
What contains status information for NATO Communications Security (COMSEC) material and must be held by Department of the Navy (DoN) accounts which hold NATO material?
AMSG-600
Status information for keying material designated for use as part of the Inter-Theater COMSEC Package (ICP) is promulgated in a series of messages using pre-determined date-time-groups (DTGs) by the Joint COMSEC Management Office (JCMO) on what basis?
Quarterly
Policy and procedures for handling Two-Person Controlled (TPC)/Sealed Authentication Systems (SAS) material are contained in which series?
CJCSI 3260.01
The status of Communications Security (COMSEC) manuals and publications is normally listed on which page within these documents?
Letter of Promulgation (LOP)
Communications Security (COMSEC) material is divided into how many categories or material types?
3
Which type of Communications Security (COMSEC) material supplies either encoding means for manual and auto-manual cryptosystems or key for machine cryptosystems?
Keying
Which type of keying material includes keylists, codes, authenticators, Identify Friend or Foe (IFF) keying material, and one-time pads, but does not include canister-packaged key tapes?
Paper
Which type of keying material is designed to permit the extraction and removal of individual segments of key for hourly, daily, weekly, etc… use?
Extractable
Which type of keying material is designed to remain intact throughout its entire effective period?
Non-extractable
Which type of keying material includes electronically genereated key, either produced by a KP or other key variable generating device, electronic keys converted from key tape, electronic keys stored on magnetic media (e.g., floppy disk) and key loaded onto a fill device (e.g., KSD 64A)?
Electronic
Which type of keying material includes, key tapes, keying plugs, keyed microcircuits, removable media (e.g., floppy disks), magnetic tapes, and keying material in solid state form such as programmable read-only memories (PROMs), read-only memories (ROMs), metallic oxide semi-conductor (MOS) chips, and micro-miniature tamper protection systems (micro-TPS)?
Non-paper
Communications Security (COMSEC) keying material packaged in canisters has a preprinted digraph, consisting of how many letters, printed to the left of the short title on each extractable segment of the tape leader?
2
Due to the ongoing DoD-wide transition to the Key Management Infrastructure (KMI) driven by the NSA-directed End-of-Life) for EKMS, the EKMS Manager COI is only available in how many geographical locations?
2
All USN military personnel appointed or designated as an Account Managers, Alternate, LEs Issuing or LE User, must complete the applicable portions of the latest version of NAVEDTRA 43462-1 (EKMS PQS) or what else for the position they are fulfilling?
NAVEDTRA 43462-2 (KMI PQS)
Department of the Navy (DoN) Communications Security (COMSEC) accounts have the option to receive a Training Visit from their local Central Office of Record (COR) Audit Team at any time. It is HIGHLY RECOMMENDED and in the command’s best interest to take advantage of the training and assistance services prior to an audit, deployment or upon change of command or Manager. How many training visits will be funded by Naval Communications Security Material System (NCMS) per audit cycle?
1
All Department of the Navy (DoN) Communications Security (COMSEC) accounts must undergo a formal CMS COR Audit at least once every how many months?
24
Communications Security (COMSEC) Account Managers are required to use the current version of which publication to conduct a semi-annual self-assessment?
EKMS-3
Which Audit Teams constitute a worldwide network of COMSEC subject matter experts established to provide assistance and training to personnel assigned Communications Security (COMSEC) responsibilities?
Central Office of Record (COR)
Central Office of Record (COR) Auditiors must attend the Central Office of Record (COR) Audit Team Training seminar once every how many months to maintain certification?
36
How often are EKMS/KMI Town Halls hosted, permitting funding, by Naval Communications Security Material System (NCMS) and are primarily intended for Commanding Officers (COs), COR Auditors, and account Managers?
Annually
Central Office of Record (COR) Audit Team responsibilities are divided among how many teams?
11
How many steps are required to establish a Communications Security (COMSEC) account?
6
The distribution of all Communications Security (COMSEC) material requires authorization from who in relation to the material?
Controlling Authority (CONAUTH)
Who are responsible for obtaining Controlling Authority (CONAUTH) validation for Communications Security (COMSEC) material not reflected in fleet instructions as part of the commands standard allowance?
Immediate Superiors in Command (ISICs)
At least how many days is required to establish a Communications Security (COMSEC) account and to provide the initial Communications Security (COMSEC) material?
45
The account Manager must coordinate with the area Defense Courier Division (DCD) station and establish a Defense Courier (DC) account by submitting which form?
USTRANSCOM Form 10
Accounts expecting to receive over-the-counter (OTC) service from CMIO must submit which form to the Communications Security (COMSEC) Material Issuing Office (CMIO) reflecting account personnel authorized to receipt for and courier Communications Security (COMSEC) equipment for their command?
CMS Form 1
Upon receipt of a Communications Security (COMSEC) account establishment message reflecting the account number assigned to the command from Naval Communications Security Material System (NCMS), the command must establish a User Representative (UR) account with the Electronic Key Management System (EKMS) Central Facility (CF). This is accomplished through completion and submission of which form to the commands Command Authority (CA)?
CF Form 1206
When an installation date is received, the command, not the installation team, must submit a request for a FIREFLY Vector Set (FF), Message Signature Key (MSK), and how many KSV-21 cards with Electronic Key Management System (EKMS) privileges in accordance with Article 670 to this manual?
2
When appointing Electronic Key Management System (EKMS) personnel, the Commanding Officer must consider the size of the account, the number of Local Elements (LEs) supported, the location where the Local Elements (LEs) operate, and which other requirements?
Two-Person Integrity (TPI)
Which form must be reviewed and executed by personnel with access to cryptographic information?
SD Form 572
Each numbered Communications Security (COMSEC) account will have a Manager, and a minimum of how many alternates appointed by the current Commanding Officer?
1
Individual appointment letters for Communications Security (COMSEC) account managers and alternates will be updated/signed by the incoming CO/OIC within how many days of assumption of command?
60
What is the minimum required enlisted pay grade to be assigned as a Communications Security (COMSEC) account manager?
E-6
What is the minimum required enlisted pay grade to be assigned as a Communications Security (COMSEC) account manager alternate?
E-5
Temporary access for which clearance level may only be authorized by DON CAF?
SCI
What is the minimum required enlisted paygrade to be assigned as a Local Element (LE) issuing (for keying material designated as CRYPTO)?
E-5
Commanding Officers are authorized to waive the length of government service required for Managers. If approved, waivers will be granted for the minimum duration required for the unit to comply with the policy in which the waiver was obtained, up to a maximum of how many years?
1
The Communications Security (COMSEC) account manager may not be absent for more than how many days?
60
During the temporary absence of the Communications Security (COMSEC) account manager, the Primary Alternate Manager must administer the account but may not do so for longer than how many days?
60
In accordance with which publication can Commanding Officers or Officers in Charge grant temporary access to individuals pending completion of full investigative requirements and pending establishment of security clearance eligibility by the DON CAF?
SECNAV M-5510.30
What is used to determine the highest classification of Communications Security (COMSEC) material that an account may hold?
Highest Classification Indicator (HCI)
Commands that undergo a shift in claimancy or a name change will refer to which series for instructions on modifying their own Common Account Data (CAD) and uploading account registration changes and credentials to the Directory Server?
EKMS 704
Assignment of a Staff CMS Responsibility Officer (SCMSRO) does not relieve the appointing official of ultimate responsibility for the proper management of an Electronic Key Management System (EKMS) account. The SCMSRO may delegate how many of the Commanding Officer (CO) spot checks to the Communications Officer (COMMO), as long as the COMMO is not designated as the Communications Security (COMSEC) Account Manager or Alternate?
2
What must be executed between the Electronic Key Management System (EKMS) account command and the Local Element (LE) command when a Local Element (LE) is responsible to a Commanding Officer other than that of the numbered Electronic Key Management System (EKMS) account command or issuing activity?
Letter of Agreement (LOA)
Letters of Agreement remain in effect until modified or the support is no longer required. LOAs/MOUs will be reviewed at a minimum of how often?
Triennially
Commanding Officers (crypto net members) can extend crypto periods for how many hours without Controlling Authority authorization when necessary to complete a transmission or conversation?
2
How often at a minimum must Commanding Officers (COs) conduct spot checks of the Communications Security (COMSEC) Vault and spaces where Communications Security (COMSEC) material is used and stored?
Quarterly
How often at a minimum must training be held to ensure that all personnel handling Communications Security (COMSEC) material must be familiar with and adhere to proper communications Security (COMSEC) procedures?
Monthly
The Communications Security (COMSEC) account manager must ensure that procedures are established to reassign local custody responsibility for Communications Security (COMSEC) material held by individuals permanently leaving the command, and those who are departing on TAD/TDY in excess of how many days?
30
The Communications Security (COMSEC) account manager must ensure that modifications to Communications Security (COMSEC) equipment are promptly and properly performed by qualified individuals in accordance with which series and that modification residue is disposed of properly?
OPNAVINST 2221.3
The Communications Security (COMSEC) account manager must track and manage production and destruction dates for Modern Key held by the account and ensure timely submission of key orders for replacement material required no later than how many days from the expiration date of the keys currently held?
30
Which personnel are responsible to their Commanding Officer for the proper management and security of all Communications Security (COMSEC) material held by the command?
Local Element (LE)
Local Element (LE) personnel issue Communications Security (COMSEC) material on local custody forms after verifying that the recipient is authorized to hold Communications Security (COMSEC) material and has executed which form?
SD Form 572
Each person authorized access to Communications Security (COMSEC) material as a user or witness, when required is personally responsible for the proper safeguarding, accountability, usage and what else in regards to the material?
Disposal
Construction specifications for shore-based Communications Security (COMSEC) storage vaults used to store keying material constructed or modified after 01 Jan 2013 will be in accordance with which publication?
ICD-705
All personnel having access to cryptographic information (keying material, book packaged material marked/ designated crypto, or equipment which permits extraction of key (SKL, TKL, KP)) must be authorized in writing by the current Commanding Officer or “Acting Commanding Officer”. The use of what is not authorized in granting access to COMSEC material?
By Direction
Access lists used for granting access to cryptographic information will be updated whenever the status of an individual changes, upon Change of Command or how often at a minimum?
Annually
While only U.S. citizens are eligible for a security clearance, a resident alien or foreign national may be granted a “Limited Access Authorization” (LAA) in compliance with DoD 5200.2-R section C3.4.3 Such individuals may have access to COMSEC material no higher than what, if they have an LAA based on a completed successful background investigation and indoctrination, on a “need to know” basis, when their duties require such access?
Confidential
Who may not be appointed as Communications Security (COMSEC) Account Managers, Clerks, or equipment maintenance personnel nor have access to safes or areas where Communications Security (COMSEC) keying material is accounted for, visible, or stored?
Resident aliens
The release of Communications Security (COMSEC) material to a contractor account or direct issuance to contractor personnel as Local Elements (LEs) by a DON COMSEC account is restricted to U.S. Industrial firms operating under contract to the U.S. Navy in accordance with the provisions of which series?
OPNAVINST 2221.5
What is the system of storage and handling designed to prohibit individual access by requiring the presence of at least two authorized individuals, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed?
Two-Person Integrity (TPI)
Two-Person Integrity (TPI) storage requires the use of an approved Communications Security (COMSEC) vault or which type of approved security container?
General Services Administration (GSA)
Combinations must be changed at least once every how many years?
2
Combinations to Communications Security (COMSEC) material security containers, KP PINs and LCMS passwords must be recorded and individually wrapped in aluminum foil and protectively packaged in a separate combination envelope (which form)?
SF-700
How often at a minimum must an inventory document be created and used to inspect SF-700s?
Monthly
In an emergency, the Commanding Officer or other designated authority may direct the opening of any Communications Security (COMSEC) material security container. At least how many individuals shall be present to conduct and witness the emergency opening?
2
The Local Management Device (LMD) is pre-configured to lock out accounts after 3 failed attempts and to request a password change every how many days?
90
If unauthorized adjustments or suspicious activity is detected on the LMD, consult local, service-specific Information Assurance (IA) policy or which series for any required reporting?
SECNAVINST 5239.3
The LMD/KP including connecting cables, must be maintained, operated, and stored in a space approved for the open storage of which type of material?
SECRET
What must be maintained for each lock on a Communications Security (COMSEC) storage container?
SF-702
Which form must be prepared and maintained when a container, lock or vault door is put in use?
OF-89
The FIREFLY vector set is classified based on the Highest Classification Indicator (HCI) of the account; designated as CRYPTO; accounted for as ALC 1 or what else and permits the ability to generate and exchange credentials to transfer or receive keying material up to the Highest Classification Indicator (HCI)?
6
All magnetic media, including backup media, floppy diskettes, etc… used in the LMD/KP must be classified and safeguarded at which level?
SECRET
PINS must be changed at a minimum of every how many days or upon change of personnel?
90
When shipping keying material marked CRYPTO, packages will contain no more than how many editions for material that is superseded quarterly or more frequently?
4
All TOP SECRET and SECRET keying material marked or designated CRYPTO and items that embody or describe a cryptographic logic or algorithm must be transported by one of how many different methods?
3
SECRET COMSEC equipment may be shipped by cleared commercial carrier using what?
Protective Security Services (PSS)
Within CONUS, FTRs shipped separately from the associated device may be shipped as SECRET collateral using a GSA authorized carrier per which publication?
SECNAV M-5510.36
What is the “Application/License for Permanent Export of Unclassified Defense Articles and Related Technical Data” form number?
Form DSP-5
What is the “Application/License for Temporary Export of Unclassified Defense Articles” form number?
Form DSP-73
Courier personnel, including government, military or contractor personnel must have current, written authorization in the form of official travel orders, a DD-2501 or which other form from their organization?
DHS 11000-1
Controlled Cryptographic Items (CCIs) are centrally accountable in the (COMSEC) Material Control System (CMCS) to the Central Office of Record (COR) by serial number (ALC 1) or what else?
Quantity (ALC 2)
What is not required for access to keyed or unkeyed Controlled Cryptographic Item (CCI) unless the equipment permits extraction of key?
SD-572
Regardless of the method used to transport Controlled Cryptographic Item (CCI), the transferring command must, within how many hours of shipping, notify the intended recipient of the method of transportation and a list of Controlled Cryptographic Items (CCIs) that have been shipped?
24
If a shipment of Controlled Cryptographic Item (CCI) equipment has not been received within how many working days after the expected delivery date, contact the originator of the shipment immediately?
5
What provides the ability to view all expired modern (asymmetric) or superseded traditional (symmetric) electronic keying material?
Local COMSEC Management Software (LCMS)
Which series provides step-by-step guidance in preparing destruction reports and destroying electronic key at the account level?
EKMS 704
Routine Destruction of Regularly and Irregularly Superseded Keying Material must be destroyed immediately after use when more than one copy of the key setting is available, or as soon as possible after the cryptoperiod and always within how many hours after the end of the cryptoperiod?
12
Superseded segments of sealed segmented/extractable keying material (unissued or issued) need not be destroyed until the entire edition is superseded or the keying material is unsealed, whichever occurs first. When retained until the entire edition is superseded, unissued must be destroyed no later than 5 days after the month in which supersession occurs, issued must be destroyed no later than how many hours after the entire edition supersedes?
12
To permit processing of message traffic receieved after the effective cryptoperiod of a key, keying material for all auto manual off-line systems (e.g., KL-42, KL-43, KL-51, AN/PYQ20 or later devices intended for off-line encryption) may be retained up to, but no longer than, how many hours after supersession?
72
GPS keying material may be retained and used for up to how many hours after the regularly scheduled supersession period to comply with the NAVSTAR GPS Selective Availability and Anti-Spoofing Host Application Equipment Design Requirements with the Precise Positioning Security Module (SAASM)?
12
Destruction of Maintenance Manuals, Operating Instructions, and General Doctrinal Publications must be destroyed within how many days after the end of the month in which superseded?
5
When authorization to destroy Communications Security (COMSEC) equipment has been received by an account from NCMS//N3// and a deadline destruction date has not been identified, destroy within how many days of receipt of the destruction is authorized?
90
Only devices and methods approved by NSA, as reflected on which NSA list will be used for terminal destruction of COMSEC material?
Evaluated Products List (EPL)
How many ways may paper Communications Security (COMSEC) material be destroyed?
3
Pulping (wet process) must break down the paper Communications Security (COMSEC) material to non-legible fiber residue (which size)?
5 mm