Worksheet Flashcards

1
Q

The goal of COMSEC is to ensure the employment of measures and controls taken to deny _____ personnel information derived from ISs of the US government related to national security and to ensure the ____ of such ISs.

A

unauthorized
authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which key type is used for classified and sensitive national security information?

A

Type 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type key is used for unclassified government information and proprietary information?

A

Type 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Suite A classification level is?

A

Confidential - TS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Suite B classification level is?

A

Confidential - Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cryptography is the art and science of ___ and ___ codes and ciphers.

A

making
breaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cryptanalysis is for ___ the cryptosystem.

A

“breaking”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the 2 modern encryption schemes?
Symmetric key is where the encryption and decryption keys are ____ in order to achieve secure communication.
Public key is where the encryption key is ____ for anyone to use and encrypt messages. Only the receiving party has access to the decryption key that enables messages to be read.

A

the same
published

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the two types of data encryption?

A

Advanced Encryption Standard (AES)
High Assurance Internet Protocol Encryption (HAIPE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the bit lengths for AES?

A

128
192
256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What bit lengths can be used for TS?

A

192 and 256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the minimum bandwidth for SCIP?

A

2400Hz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

VoIP is used to transmit ___ over a data network using internal protocol

A

voice communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SVoIP is when secure ___ are used to protect information sent over the VoIP network

A

phones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VoSIP is the same as SVoIP but the security is provided by separate ___ devices in the network rather than the secure phones themselves

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which piece of crypto equipment was for IPv4 & IPv6 networks?

A

KG-175D

17
Q

Which piece of crypto equipment was for non-IP based systems?

A

KIV-7/M

18
Q

How many codes can the KY-99 hold?

A

6

19
Q

TEK is a key used to ___ messages

A

encrypt

20
Q

TSK is used to ___ the link by which the message will travel

A

secure

21
Q

TEK and TSK are both ___ devices

A

fill

22
Q

Which fill device is forward and backward compatible with equipment and systems?

A

PYQ-10

23
Q

How many keys can the KIK-30 hold?

A

40

24
Q

Which fill device is used for proprietary data protocol?

A

KVL-3000/LMRs
Land Mobile Radios

25
Q
A