Crypto Devices Flashcards

0
Q

What are HJ times?

A

Bio grams wich tells us when to change crypto.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Does kyk13 store HJ times and short titles?

A

No fills only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protocol to send a fill SKL - KYK13?

A

DS102 (smart to dumb)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protocol to send a fill CYZ10 - SKL?

A

DS101 (dumb to smart)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name security threats/methods with a brief description?

A

Imint - info gained from aerial recon flights and sat platforms
Sigint - used to describe communication intelligence
Comint - exploitation of electromagnetic transmissions and electronic int
Humint - includes patrol reports, interrogation, espionage and loose talk
Loss or compromise - theft, loss, destruction, disclosure or modification of government assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name principle sources of information?

A
Surveillance and reconnaissance 
Radio and communications
Non comms emissions 
Document and information technology system
Loose talk
Discussions/brief
Private correspondence 
Private telephone calls
The media
The Internet
Civilians
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Main threads to security and explain?

A

Espionage - obtaining info about organisation or a society that is considered secret or confidential without permission of the holder of the information

Sabotage - deliberate action aimed at weakening on enemy, oppressor or employer through subversion, obstruction disruption and/on destruction

Subversion - action designed to weaken the military, economic or political strength of a nation by undermining the morale loyalty or reliability of its citizens

Terrorism - unlawful use of or threatened use of force or violence against individuals or property to coerce or intimate government or societies, often to achieve political, religious or ideological objectives

Non traditional - events such as natural disasters, or actions by investigative journalists, criminals, disaffected or dishonest staff computer hackers and viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Four common causes to security breaches?

A

Handling
Custody
Access
Discussion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name the 3 veting States?

A

Bc
Sc
Dv

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

When should you change combination?

A
1st brought into service
Any one with access leaves or no longer requires access
Intervals no longer than six months
After any form of repairs by a locksmith
After any inspection on the locks
Suspected compromise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name four ways of destruction?

A

Incineration
Shredding
Wet pulping
Mechanical disintegration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does USO stand for and who does he report to?

A

Unit security officer and reports to the commanding officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the action of loss of a classified document?

A

Conduct a thorough search up to a hour
Inform USO
extend the search

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the action of compromise ?

A

100% check of contents
Inform the USO
Change the combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does TEMPEST stand for?

A

Transient Electromagnetic Pulse Emanation Standard

-unintentional radiation of intelligence bearing signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Name 3 crypto statuses?

A

Current
Reserve
Superseded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What form do you use to account for your crypto?

A

MOD 371

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What do you need to do before a road move with crypto?

A

Get authorisation from CDA Hereford
Be in possession of courier and escort documents
Have a locked container possibly bolted down
2 people in the vehicle (one person must be crypto authorised)
Never leave vehicle unattended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How many fills does a kyk take?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many fills can a crazy 10 hold?

A

1000

20
Q

How long do you have to replace a battery in a crazy10?

A

30 sec

21
Q

When starting up a crazy 10 you get a cold boot, what does this mean?

A

Zeroised and you have to re initialise the CIK

22
Q

What does the green light on top the SKL mean?

A

The kov 21 card is logged in or faulty

23
Q

How many fills does a SKL hold?

A

500 000

24
Q

SKL power source must be replaced within ?

A

2min

25
Q

What’s the battery life of the SKL?

A

Standard battery - 50 h

Extended battery - 100h

26
Q

What are the battery life’s for the crazy 10?
33v battery
1
9v battery

A

3*3v battery - 6months

1*9v battery - 3months

27
Q

What is the correct closing down roc endure of the SKL?

A

File, save database, file, exit, session, log out, power button

28
Q
What does the following stand for?
KV's
KEK
OTAD
OTAR
TEK
TSK
A
Key variables
Key encryption key
Over the air distribution
Over the air rekeying
Traffic encryption kv
Transec variable
29
Q

WHAT SEPARATES THE RED FROM THE BLACK DATA ON THE SKL?

A

Kov 21 card

30
Q

WHAT IS THE CES OF THE SKL (9 ITEMS)? 



A

AN-PYQ 10
STANDARD BATTERY
HEAVY DUTY BATTERY
CHARGER
PSU
2 X KETTLE LEADS, UK & US
FILL LEAD
QUICK REFERENCE GUIDE
STANDARD USB TO MINI USB CONVERTER

31
Q

What is the classification of a ledger if the items are classified below SECRET?

A

Restricted

32
Q

What is the MOD name for the register of Crypto items?

A

MOD Form 1728

33
Q

Name the two types of Crypto compromises?

A

Physical and Crypto

34
Q

What must we never do to the SKL?

A

Carry out a card self-test, never reset the card, never just turn it off

35
Q

What access does DV give the holder?

A

FREQUENT AND UNCONTROLLED ACCESS TO ASSETS MARKED TOP SECRET

36
Q

Name four aspects of physical security.

A

FENCES, LIGHTING, GUARDS, GATE CONTROL, ACCESS CONTROL, KEEP AREAS, STRONG ROOMS

37
Q

What must we be logged in as to set the date and time on the PYQ- 10?

A

SSO

38
Q

What are the Crypto short titles for Brent, MBITR and SKL?

A

BID/2010/1, AN PRC 148, AN PYQ 10

39
Q

WHAT INFORMATION SHOULD BE WRITTEN ON THE SIDE OF A KYK13

A

Short title only

40
Q

WHAT CLASIFICATION OF KEYS CAN THE CYZ 10 HOLD?


A

UP TO TOP SECRET

41
Q

WITHIN WHAT TIMEFRAME SHOULD EXPIRED KEYMAT/FILLS BE DESTROYED/DELETED?

A

72 hrs

42
Q

BEFORE ISSUING OUT CRYPTO, WHAT DO YOU NEED TO CHECK ABOUT THE INDIVIDUAL. WHO WISHES TO TAKE RECEIPT?

A

ESTABLISH ID
ENSURE INDIVIDUAL HAS CORRECT CLEARANCE
ENSURE THEY ARE CRYPTO AUTHORISED

43
Q

How would you confirm a store on the KYK-13?

A

SELECT RELEVANT STORE. SWITCH KYK-13 OFF. PRESS GREY NIPPLE.

44
Q

When cryptographic material and equipment is in use what are the six periodic checks to be carried out in the field?

A
HOTO
INITIAL ISSUE
BEFORE & AFTER MOVE
DAILY BY DET COMMANDER
SOPS
ENDEX
45
Q

Name 4 vulnerabilities to IT security?

A
Hacking
Social Networks
Virus/malware/spyware/trojan
Loss or theft of 
laptops
usb
classified docs
occifical docs
46
Q

Name 5 TEMPEST HAZARDS?

A
Equipment again
Equipment compatibility
Siting
Mains voltage variations
The human factor
47
Q

Explain why impex policy is used?

A

To ensure the correct policy is followed in regards to placing marked material onto one system from another without any compromise. normally carried out by a single individual or controlled from a single point of contact.