Secure Communications Flashcards
When using a Secure Terminal Equipment (STE), what is encrypted?
The digital signal.
When using a Secure Terminal Equipment (STE), what is encrypted?
The digital signal.
What is the difference between data encryption and voice encryption?
In data, the encryption is handled by separate device.
What components are used in both encryption and decryption?
Algorithm and key.
What are the two basic types of computer cryptology?
Symmetric-secret key system and asymmetric-public key system.
Which cryptology system has a disadvantage of using more processing power and time?
Asymmetric.
Which authorities are trusted entities that issue certificates?
Certification.
In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?
Its public key.
In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?
Its public key.
What is the difference between data encryption and voice encryption?
In data, the encryption is handled by separate device.
What components are used in both encryption and decryption?
Algorithm and key.
What are the two basic types of computer cryptology?
Symmetric-secret key system and asymmetric-public key system.
Which cryptology system has a disadvantage of using more processing power and time?
Asymmetric.
Which authorities are trusted entities that issue certificates?
Certification.
What infrastructure is a set of hardware, software, policies and procedures used to create,
manage, store, distribute and revoke digital certificates?
Public Key.
Which Communications Security (COMSEC) application provides us with guidance to
deter, detect, and defeat hostile acts against US Air Force priority resources?
Physical security.
What are the two major types of encryption algorithms in use today that operate by
encrypting or decrypting one chunk of data at a time?
Block algorithms and stream ciphers.
Data Encryption Standard (DES) uses how many bits for its key?
64.
Triple Data Encryption Standard (DES) is based on three compound operations of
encryption/decryption and can incorporate the use of how many individual keys?
Three.
Which encryption is not a telecommunications encryption type?
Open.
Communications Security (COMSEC) is defined as the measures and controls taken to deny unauthorized persons information and to ensure
authenticity.
The Communications Security (COMSEC) program is designed to
detect and correct procedural weaknesses that could expose critical information.
What reference would you use for guidance on Air Force messaging?
AFI 33–119.
Which Communications Security (COMSEC) application provides us with guidance to
deter, detect, and defeat hostile acts against US Air Force priority resources?
Physical security.
Where would you find guidance on how to properly store, control, safeguard, transfer, and
destroy Communications Security (COMSEC) material?
AFI 33–201, Volume 1.
Top secret keying material must be handled, stored, transported and destroyed under
two-person integrity (TPI) control.
Which form is used with a transfer report to accompany a Communications Security
(COMSEC) package?
SF 153.
When a security container is opened, it is inventoried at the
end of the shift or duty day.
Which form is used as a register log to record visitors into restricted areas?
AF Form 1109.
What is the newest generation of secure voice telephone?
Secure Terminal Equipment (STE).
Which secure voice telephone can be used on the Integrated Services Digital Network
(ISDN)?
Secure Terminal Equipment (STE).
The Secure Telephone Equipment (STE) consists of what two parts?
Host terminal and removable security core.
The Secure Telephone Equipment (STE) cannot communicate securely with the
land mobile radio.
Which port on the office version Secure Telephone Equipment (STE) can be used to
connect to a fax machine?
RS–232.
What provides the Secure Telephone Equipment (STE) with its security services?
Fortezza card.
The KIV–7 cryptographic device provides protection up to what classification level?
Top Secret.
The KIV–7 does not support which set of electrical standards?
RS–422.
TACLANE–Classic and TACLANE–E100 are high-speed encryption devices that provide
confidentiality, data integrity, and authentication security services for which type of network?
Internet Protocol networks.
What is the maximum throughput in megabits per second (Mbps) for the TACLANE–E100?
165 for full-duplex and 100 for half-duplex.
The KG–175D is what type of Tactical Local Area Network Encryptor (TACLANE)?
TACLANE–Micro.
The Tactical Local Area Network Encryptor (TACLANE)–Micro is a packet encryption
device for Internet Protocol (IP)
version 4 only.
The Tactical Local Area Network Encryptor (TACLANE)–Micro may be equipped to
handle all of the following types of networks except?
Wireless.
The Tactical Local Area Network Encryptor (TACLANE)–Micro can acquire an Internet
Protocol (IP) address via Dynamic Host Configuration Protocol (DHCP) on which side?
Ciphertext or plaintext.
The Tactical Local Area Network Encryptor (TACLANE)–Micro can be used to overlay
what type of networks on top of existing public and private network infrastructures?
Secure Virtual Networks.
Which common crypto fill device is battery powered and has no internal memory storage?
KOI–18 General Purpose Tape Reader.
Which common crypto fill device is a hand-held personal computer compatible device and
is a Cryptographic Controlled Item (CCI)?
AN/CYZ–10 Data Transfer Device.
Which common crypto fill device is capable of downloading cryptographic keys to over 70
end item Communication Security (COMSEC) equipment and communications systems?
AN/PYQ–10 Simple Key Loader.
Which common crypto fill device uses the Windows CE operating system?
AN/PYQ–10 Simple Key Loader.