Secure Communications Flashcards

1
Q

When using a Secure Terminal Equipment (STE), what is encrypted?

A

The digital signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

When using a Secure Terminal Equipment (STE), what is encrypted?

A

The digital signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between data encryption and voice encryption?

A

In data, the encryption is handled by separate device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What components are used in both encryption and decryption?

A

Algorithm and key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two basic types of computer cryptology?

A

Symmetric-secret key system and asymmetric-public key system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which cryptology system has a disadvantage of using more processing power and time?

A

Asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which authorities are trusted entities that issue certificates?

A

Certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?

A

Its public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In Secure Socket Layer (SSL), before an encrypted transaction takes place, what does the
web server give to the browser?

A

Its public key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the difference between data encryption and voice encryption?

A

In data, the encryption is handled by separate device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What components are used in both encryption and decryption?

A

Algorithm and key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two basic types of computer cryptology?

A

Symmetric-secret key system and asymmetric-public key system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which cryptology system has a disadvantage of using more processing power and time?

A

Asymmetric.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which authorities are trusted entities that issue certificates?

A

Certification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What infrastructure is a set of hardware, software, policies and procedures used to create,
manage, store, distribute and revoke digital certificates?

A

Public Key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which Communications Security (COMSEC) application provides us with guidance to
deter, detect, and defeat hostile acts against US Air Force priority resources?

A

Physical security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two major types of encryption algorithms in use today that operate by
encrypting or decrypting one chunk of data at a time?

A

Block algorithms and stream ciphers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data Encryption Standard (DES) uses how many bits for its key?

A

64.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Triple Data Encryption Standard (DES) is based on three compound operations of
encryption/decryption and can incorporate the use of how many individual keys?

A

Three.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which encryption is not a telecommunications encryption type?

A

Open.

21
Q
Communications Security (COMSEC) is defined as the measures and controls taken to deny
unauthorized persons information and to ensure
A

authenticity.

22
Q

The Communications Security (COMSEC) program is designed to

A

detect and correct procedural weaknesses that could expose critical information.

23
Q

What reference would you use for guidance on Air Force messaging?

A

AFI 33–119.

24
Q

Which Communications Security (COMSEC) application provides us with guidance to
deter, detect, and defeat hostile acts against US Air Force priority resources?

A

Physical security.

25
Q

Where would you find guidance on how to properly store, control, safeguard, transfer, and
destroy Communications Security (COMSEC) material?

A

AFI 33–201, Volume 1.

26
Q

Top secret keying material must be handled, stored, transported and destroyed under

A

two-person integrity (TPI) control.

27
Q

Which form is used with a transfer report to accompany a Communications Security
(COMSEC) package?

A

SF 153.

28
Q

When a security container is opened, it is inventoried at the

A

end of the shift or duty day.

29
Q

Which form is used as a register log to record visitors into restricted areas?

A

AF Form 1109.

30
Q

What is the newest generation of secure voice telephone?

A

Secure Terminal Equipment (STE).

31
Q

Which secure voice telephone can be used on the Integrated Services Digital Network
(ISDN)?

A

Secure Terminal Equipment (STE).

32
Q

The Secure Telephone Equipment (STE) consists of what two parts?

A

Host terminal and removable security core.

33
Q

The Secure Telephone Equipment (STE) cannot communicate securely with the

A

land mobile radio.

34
Q

Which port on the office version Secure Telephone Equipment (STE) can be used to
connect to a fax machine?

A

RS–232.

35
Q

What provides the Secure Telephone Equipment (STE) with its security services?

A

Fortezza card.

36
Q

The KIV–7 cryptographic device provides protection up to what classification level?

A

Top Secret.

37
Q

The KIV–7 does not support which set of electrical standards?

A

RS–422.

38
Q

TACLANE–Classic and TACLANE–E100 are high-speed encryption devices that provide
confidentiality, data integrity, and authentication security services for which type of network?

A

Internet Protocol networks.

39
Q

What is the maximum throughput in megabits per second (Mbps) for the TACLANE–E100?

A

165 for full-duplex and 100 for half-duplex.

40
Q

The KG–175D is what type of Tactical Local Area Network Encryptor (TACLANE)?

A

TACLANE–Micro.

41
Q

The Tactical Local Area Network Encryptor (TACLANE)–Micro is a packet encryption
device for Internet Protocol (IP)

A

version 4 only.

42
Q

The Tactical Local Area Network Encryptor (TACLANE)–Micro may be equipped to
handle all of the following types of networks except?

A

Wireless.

43
Q

The Tactical Local Area Network Encryptor (TACLANE)–Micro can acquire an Internet
Protocol (IP) address via Dynamic Host Configuration Protocol (DHCP) on which side?

A

Ciphertext or plaintext.

44
Q

The Tactical Local Area Network Encryptor (TACLANE)–Micro can be used to overlay
what type of networks on top of existing public and private network infrastructures?

A

Secure Virtual Networks.

45
Q

Which common crypto fill device is battery powered and has no internal memory storage?

A

KOI–18 General Purpose Tape Reader.

46
Q

Which common crypto fill device is a hand-held personal computer compatible device and
is a Cryptographic Controlled Item (CCI)?

A

AN/CYZ–10 Data Transfer Device.

47
Q

Which common crypto fill device is capable of downloading cryptographic keys to over 70
end item Communication Security (COMSEC) equipment and communications systems?

A

AN/PYQ–10 Simple Key Loader.

48
Q

Which common crypto fill device uses the Windows CE operating system?

A

AN/PYQ–10 Simple Key Loader.