Security Flashcards
Three types of restricted areas are:
Exclusion, limited and controlled
Where are classified markings placed on charts, maps,and drawings?
Charts, maps, and drawings shall bear the appropriate classification marking under the legend, title block or scale.
Which restricted area could serve as a buffer zone?
Controlled
What does SCI mean?
Sensitive Compartmented Information
COMSEC incidents are divided into how many categories?
3
What categories are COMSEC incidents divided into?
Physical
Personnel
Cryptographic
What are the types of COMSEC incident reports?
Initial
Amplifying
Final
Interim
What type of report is submitted for each COMSEC incident?
Initial report
How often should unannounced spot checks be conducted?
Quarterly
How many EKMS spot checks can the CO delegate to the XO?
2
Classified material may be jettisoned at sea to how many depths?
1000 fathoms/ 6000ft
Who controls the COMSEC library?
EKMS Manager
What does NCIRES mean?
National COMSEC Incident Reporting and Evaluation System
The cover, first page, and title page (if any) must be prominently marked at the ___ and _____ of the page with the highest classification of information contained within the document.
Top and bottom
Superseded keying material on board an _______ is exempt from the 12-hour destruction standard.
Aircraft
Any Coast Guard member, military, civilian, contractor, Auxiliarist or other person associated with the Coast Guard, having knowledge of the loss, unauthorized disclosure, or possible compromise of classified information, sabotage, espionage or other subversive activites, sall immediatel advise his/her ____ within ___hours or the next business day.
CSO within 24 hours
For a classified e-mail, the classification authority block shall be placed after the _______ block, but before the overall classification marking string at the end of the e-mail. These blocks may appear as single linear text strings instead of the traditional appearance of three lines of text.
Signature
The unauthorized disclosure of ____ information could be expected to cause serious damage to the national security.
Secret
The unauthorized disclosure of ____ information could reasonably be expected to cause damage to national security.
Confidential
The unauthorized disclosure of ______ information could reasonably be expected to cause exceptionally grave damage to the national security.
Top Secret
_____ shall be portioned marked to reflect the sensitivity of the information in the _____ itself and shall not reflect any classification markings for the email content or attachments.
___ and ____ shall be portion marked before the _____ or ____
Subject lines
subject line
Subject; title
subject; title
Who is responsible for EKMS spot checks?
Commanding Officer
What does COMSEC include?
Cryptographic security, transmission security, emission security (includes TEMPEST), physical security of COMSEC material
If an individual opens mail which is not correctly packaged causing exposure by an uncleared or unauthorized individual, the material will be delivered to the _____ and the ______ will be notified.
The ____ will investigate and submit a report of incident involving classified material outlined in CH. 13 of ________.
SCP; CSO
CSO
COMDINST M5510.23A
How often should EAP drills be conducted?
Drills shall be conducted and documented semi-annually to ensure that those responsible are familiar with the implementation of the EAP.
What shall EAP drills be used to evaluate?
The EAP drills shall be used to evaluate the effectiveness of the plan and resources required to carry it out.
When is classified information authorized to be used in EAP drills?
At no time shall actual classified material be used in the conduct of EAP drills.
When are safe combinations changed?
- When the safe is placed in use
- Whenever the individual using the safe, no longer requires access to it.
- When the combination has been compromised.
- When taken out of service
- At least annually, if none of the other conditions have applied
When is an individual required to sign a SF-312?
An individual is required to sign an NDA once unless they have been debriefed, or their clearance has been administratively withdrawn; in which case they receive another briefing and a new NDA is signed prior to receiving access.
What is a SF-312?
Classified Information Nondisclosure Agreement (NDA)
An SF-312 needs to be signed by a member every ____ years.
Only once.
What form is used to record safe combinations?
SF-700
What is a SF-700?
Security Container Information Form
How long are SF - 701 and SF- 702 forms retained?
They will be retained for 30 days beyond the last date recorded on them.
How often are SF-700s inspected?
Monthly
What are SF-700s inspected for and what data logged at the inspection?
SF-700s are inspected for tampering. The inspection date, printed name and signature are logged at the inspection.
What 3 forms is a safe required to have?
SF-700, SF-702, OF-89
What is an OF-89?
A Maintenance Record for security containers, vaults/doors, which must be prepared and maintained for each container, lock, vault and door.
What is an SF - 705?
Confidential cover sheet
What is a SF-703?
Top Secret cover sheet
What is a SF-704?
Secret cover sheet
What is an SF-701?
Activity Security Checklist
Who does the CMCO report to?
CSO - Command Security Officer
An EKMS account is required to maintain COMSEC related files. What are those files?
- Chronological file
- Correspondence, message and directives file
- General Message file
- Local Custody file
Which AL code is accountable to the COR by serial/register from production to destruction?
AL code 1
Which AL code is locally accountable by quantity and handled/safeguarded by classification?
AL code 4
______ are developed IAW the requirements of National Telecommunication Information Systems Security Instruction (NTISSI) C-4004
COMSEC EAPs
Appointment of a EKMS clerk is ______mandatory, but is at the discretion of the CO.
Appointment of a EKMS clerk is NOT mandatory, but is at the discretion of the CO.
Tier 0 (central facility) Composite of NSA’s _________ and _________
Key facilities that provides centralized key management services for all forms of key
EKMS 1 pg 32
Tier 0 (central facility) Composite of NSA’s Fort Meade and Finksburg Key facilities that provides centralized key management services for all forms of key.
_______ ___ ______ has overall responsibility and authority for implementation of National COMSEC policy within the DON.
EKMS 1 pg 34
Chief of Naval Operations