Secure Communications Flashcards

1
Q

When using a Secure Terminal Equipment (STE), what is encrypted?

A

The digital signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When using a Secure Terminal Equipment (STE), what is encrypted?

A

The digital signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between data encryption and voice encryption?

A

In data, the encryption is handled by separate device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What components are used in both encryption and decryption?

A

Algorithm and key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two basic types of computer cryptology?

A

Symmetric-secret key system and asymmetric-public key system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which cryptology system has a disadvantage of using more processing power and time?

A

Asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which authorities are trusted entities that issue certificates?

A

Certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?

A

Its public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?

A

Its public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between data encryption and voice encryption?

A

In data, the encryption is handled by separate device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What components are used in both encryption and decryption?

A

Algorithm and key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two basic types of computer cryptology?

A

Symmetric-secret key system and asymmetric-public key system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which cryptology system has a disadvantage of using more processing power and time?

A

Asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which authorities are trusted entities that issue certificates?

A

Certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What infrastructure is a set of hardware, software, policies and procedures used to create,
manage, store, distribute and revoke digital certificates?

A

Public Key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Communications Security (COMSEC) application provides us with guidance to
deter, detect, and defeat hostile acts against US Air Force priority resources?

A

Physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two major types of encryption algorithms in use today that operate by
encrypting or decrypting one chunk of data at a time?

A

Block algorithms and stream ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Encryption Standard (DES) uses how many bits for its key?

A

64.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Triple Data Encryption Standard (DES) is based on three compound operations of
encryption/decryption and can incorporate the use of how many individual keys?

A

Three.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which encryption is not a telecommunications encryption type?

21
Q
Communications Security (COMSEC) is defined as the measures and controls taken to deny
unauthorized persons information and to ensure
A

authenticity.

22
Q

The Communications Security (COMSEC) program is designed to

A

detect and correct procedural weaknesses that could expose critical information.

23
Q

What reference would you use for guidance on Air Force messaging?

A

AFI 33–119.

24
Q

Which Communications Security (COMSEC) application provides us with guidance to
deter, detect, and defeat hostile acts against US Air Force priority resources?

A

Physical security.

25
Where would you find guidance on how to properly store, control, safeguard, transfer, and destroy Communications Security (COMSEC) material?
AFI 33–201, Volume 1.
26
Top secret keying material must be handled, stored, transported and destroyed under
two-person integrity (TPI) control.
27
Which form is used with a transfer report to accompany a Communications Security (COMSEC) package?
SF 153.
28
When a security container is opened, it is inventoried at the
end of the shift or duty day.
29
Which form is used as a register log to record visitors into restricted areas?
AF Form 1109.
30
What is the newest generation of secure voice telephone?
Secure Terminal Equipment (STE).
31
Which secure voice telephone can be used on the Integrated Services Digital Network (ISDN)?
Secure Terminal Equipment (STE).
32
The Secure Telephone Equipment (STE) consists of what two parts?
Host terminal and removable security core.
33
The Secure Telephone Equipment (STE) cannot communicate securely with the
land mobile radio.
34
Which port on the office version Secure Telephone Equipment (STE) can be used to connect to a fax machine?
RS–232.
35
What provides the Secure Telephone Equipment (STE) with its security services?
Fortezza card.
36
The KIV–7 cryptographic device provides protection up to what classification level?
Top Secret.
37
The KIV–7 does not support which set of electrical standards?
RS–422.
38
TACLANE–Classic and TACLANE–E100 are high-speed encryption devices that provide confidentiality, data integrity, and authentication security services for which type of network?
Internet Protocol networks.
39
What is the maximum throughput in megabits per second (Mbps) for the TACLANE–E100?
165 for full-duplex and 100 for half-duplex.
40
The KG–175D is what type of Tactical Local Area Network Encryptor (TACLANE)?
TACLANE–Micro.
41
The Tactical Local Area Network Encryptor (TACLANE)–Micro is a packet encryption device for Internet Protocol (IP)
version 4 only.
42
The Tactical Local Area Network Encryptor (TACLANE)–Micro may be equipped to handle all of the following types of networks except?
Wireless.
43
The Tactical Local Area Network Encryptor (TACLANE)–Micro can acquire an Internet Protocol (IP) address via Dynamic Host Configuration Protocol (DHCP) on which side?
Ciphertext or plaintext.
44
The Tactical Local Area Network Encryptor (TACLANE)–Micro can be used to overlay what type of networks on top of existing public and private network infrastructures?
Secure Virtual Networks.
45
Which common crypto fill device is battery powered and has no internal memory storage?
KOI–18 General Purpose Tape Reader.
46
Which common crypto fill device is a hand-held personal computer compatible device and is a Cryptographic Controlled Item (CCI)?
AN/CYZ–10 Data Transfer Device.
47
Which common crypto fill device is capable of downloading cryptographic keys to over 70 end item Communication Security (COMSEC) equipment and communications systems?
AN/PYQ–10 Simple Key Loader.
48
Which common crypto fill device uses the Windows CE operating system?
AN/PYQ–10 Simple Key Loader.