Board Flashcards

(63 cards)

0
Q

FAIRECONRONONEINST 2280.1A

A

Handling and accounting of CMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

COMVAQWINGPACINST 2280.1F

A

COMSEC material system (CMS) policies and procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

FAIRECONRONONEINST 5530.1F

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

FAIRECONRONONEINST 5510.2

A

VQ1 CMS emergency action plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

FAIRECONRONONEINST 5510.4

A

VQ1 emergency destruction plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Who is the command security manager?

A

N2 department head. LCDR Peeler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the command security managers relationship to the CMS/EKMS program?

A

Verifying that potential users have the proper clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

4 requirements for gaining access to COMSEC

A
  1. Authorized writing by the CO
  2. Proper clearance
  3. Need to know
  4. PQS qualification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define access

A

The opportunity and capability to obtain knowledge of COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define need to know

A

Individuals with a valid need to know whose official duties require access to COMSEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define clearance

A

Requires a security clearance equal to or higher than the classification of the material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 uses of the SF 153

A
  1. Transfer
  2. Inventory
  3. Destruction
  4. Hand receipt
  5. Other
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the SF 700 used for?

A

Record passwords and combos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Storage procedures for safeguarding PINs, passwords and combos.

A

Use SF 700. Store in a secure off site central location and do monthly integrity checks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a SF 701 used for?

A

End of day security checklist for spaces containing classified material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the SF 702 used for?

A

Records the opening/closing of secure containers or doorways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the CMS 25 form used for?

A

Record of routine destruction of KEYMAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is an optional form 89 used for?

A

Documents maintenance of a security container

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How long do you keep an optional form 89? Where do you keep it?

A

For the life of the security container.

The back of the drawer that has the lock on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are AL codes?

A

Accountability Legend codes.

Determine how COMSEC material is accounted for

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

2 places you could locate what each AL Code means.

A
  1. SF 153

2. EKMS 1B CH. 2 Section 230

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Explain the importance of reporting COMSEC incidents

A

So appropriate action can be taken to minimize adverse impact on national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What chapter in the EKMS 1B covers COMSEC incidents?

A

Chapter 9

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

3 types of COMSEC incidents with examples.

A
  1. Physical incident: the physical loss of COMSEC material.
  2. Personnel incident: espionage, capture of persons
  3. Cryptographic incident: using COMSEC keying material that is compromised or superseded.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
What is PDS?
Practices Dangerous to Security
25
What chapter in the EKMS 1B has information pertaining to PDS?
Chapter 10
26
2 types of PDS and an example.
1. Reportable: early destruction of key that needs reissue | 2. Non Reportable: early destruction of key that does not need to be reissued
27
What does CCI stand for?
Controlled Cryptographic Item. | KY-58, KYV-5, KG-84
28
State the reason for zeroizing CCI and fill devices.
To prevent compromise
29
What are the preferred methods of destruction for CCI?
Zeroize and destroy till total breakage
30
Is COMSEC repaired at command level?
No
31
Who do we turn broken COMSEC to and what forms are required?
FRCNW with a green MAF and CMS 17 custody card.
32
Who can authorize cryptographic period extensions?
The Controlling Authority of the material.
33
How would you locate a cryptographic period for a short title?
Using a current ESM Effective Status Message
34
How would you locate a current ESM?
Check message traffic and search SIPR net or JWICS
35
What is a page check and when are they required?
The process of checking every page of an issued document or pub for discrepancies and damage. Upon issuance, transfer, destruction and inventory.
36
What are the 3 possible statuses of KEYMAT?
Reserve on Board (ROB), effective and superseded
37
Define black key
Encrypted key
38
Define red key
Unencrypted key
39
Define modern key
FIREFLY type key. Electronic.
40
Define traditional key
Non FIREFLY key or paper key.
41
Can COMSEC be stored with non COMSEC in the same drawer?
Nope
42
How should COMSEC be organized when stored?
By status (ROB, effective, superseded) and classification.
43
Why is it important to store COMSEC by status and classification?
To execute EAP/EDP effectively by precedence of material
44
What type of container is used to store COMSEC?
General Service Administration (GSA) approved safe
45
What type of container can COMSEC materials be couriered in when not on an aircraft?
Any container that can't be easily tampered or accessed by unauthorized personnel.
46
How is a GSA approved container identified?
By a GSA labeled placard
47
What are the approved locks for use when safeguarding COMSEC materials?
1. X series 2. S&G combo locks 3. Standard navy issued brass locks with no master key
48
How are lock combos classified?
Classified the same as the highest level of material being protected.
49
When must a combo be changed?
1. Initial use 2. No longer require access 3. Compromise 4. Taken out of service 5. Maintenance 6. Every two years
50
What are the preferred methods of destruction for key tape?
1. Burning 2. NSA approved microfilm shredder 3. Acetone
51
How long do you have to destroy issued KEYMAT? KEYMAT on board an aircraft?
12 hours on the ground. | On board an AC, destroy as soon as practicable upon completion of airborne operations.
52
What are the 3 different types of super session?
1. Emergency: the destruction of KEYMAT that has or may be compromised. 2. Routine: the normal destruction of KEYMAT that has regularly superseded. 3. Irregular: destruction of KEYMAT when an event happens.
53
What actions should a user take when an unauthorized destruction occurs?
Submit a report to the EKMS custodian. It is assessed as a reportable or non reportable PDS.
54
What is TPC?
Two Person Control: continuos surveillance and control of materials and devices at all times by a minimum of two authorized persons
55
What is TPI?
Two Person Integrity: a system of handling and storing designed to prevent single person access to certain COMSEC KEYMAT
56
What are the TPI/TPC requirements for using and storing KEYMAT?
TPC when KEYMAT is unsecured | TPI when storing or securing.
57
What are the TPI/TPC requirements for electronic fill devices?
TPC & TPI when filled. | Not needed when empty.
58
What are the TPI/TPC requirements for routine destructions?
TPC
59
What are the TPI/TPC requirements for crypto ignition keys CIK?
TPC is only needed when plugged into the corresponding gear that has been filled.
60
What are the TPI/TPC requirements for the flight line?
TPC and TPI for outside the flight line. | TPC or TPI inside the flight line.
61
How does the COMSEC material control system apply to this command?
It applies to VQ1 because we use sensitive information to operate and it is important to our national security protect that information.
62
Can our command execute missions without a CMS program in place?
No