JQS 11-20 Flashcards

1
Q

11.1 Prior to allowing access to MECS materials, all holders of the material must what?

A

Positively identify personnel requesting access, verify clearance, and establish the need to know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

11.2 Individuals requiring access to MECS/MEED material must be what?

A

US citizen, possess a secret or higher US government clearance, be authorized crypto access, be assigned to A or B side control group.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

11.3 Personnel with an interim secret security clearance are not authorized access to m e c s / Meed material unless approved by whom?

A

NSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

12.2 what are the reasons for emergency zeroization?

A

Compromised by overt or covert means, when ordered by competent Authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

13.1 when will FSCs zeroize hhu?

A

At the end of the crypto period, whenever the master key changes, on SF changeover day.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

13.2 When will routine zeroization of a master key in the DTU be accomplished?

A

When all devices issued field Keys generated from that master key are returned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

13.3 when will emergency zeroization of field key in the DTU be accomplished?

A

Immediately upon notification that a hhu has been lost or otherwise compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

14.1 when is an FSC considered unavailable or unsecure?

A

When there is no contact with the FSC by all available means or other indications of duress.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

14.3 using the RVA system, FSCs will do what after receiving notification of a security situation?

A

Verify the LF identifier, determine the presence of human versus non human activity, attempt to determine intent of any unauthorized activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

14.4 if the FSC, using RVA, finds an authorized individuals on site, who will he or she notify?

A

MCC, MSC, Responding SF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

14.9 when multiple LFs report the same response priority, the FSC will dispatch the ART to which sites first?

A

Those without RVA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

14.11 which teams will never be used to respond to alarms?

A

Those carrying code components, critical components, or classified material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

14.12 what will a visual assessment by a non SF team consist of?

A

Driving to the visual vicinity of the alarmed LF, providing feedback to the FSC concerning the status of the site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

15.2 what two key things occur during the assess phase?

A

Determine the level of access the enemy has and determine the physical proximity to access points and areas containing the resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

16.1 which weapon system is light enough to support rapid movement and conpact enough to be effectively used for close-quarters battle?

A

M4 carbine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

16.3 which weapon is primarily used as suppression, area-denial, light armor penetration, and counter standoff?

A

MK-19 automatic grenade launcher

17
Q

16.8 what is used as a means to interdict or disrupt adversaries progress until such time that responding forces can conduct an assault on the adversary?

A

M25A2 Riot hand grenades, CS

18
Q

18.1 when must verbal directions codes be changed?

A

Every 6 months

19
Q

19.4 when are teams not required to authenticate when generating i z alarms during an LF check?

A

When two authentications have occurred within 30 minutes.