Cyber Transport Block 2 Flashcards

(90 cards)

0
Q

What are the two broad categories for official information and materials?

A

Classified

Unclassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

This is information that is owned by, and produced or is subject to the control of the United States government and supported agencies.

A

Official information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

This information is information that must be safe guarded in the interest of national security, and that of our allies.

A

Classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the three classification levels that are assigned by who?

A

Top secret
Secret
Confidential
NSA is who assign the levels of classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is the highest NSA classification and is given to any information and material that is expected to cause exceptional “grave” damage to national security if it were to fall in the wrong hands.

A

Top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What information is held to the highest degree of protection?

A

Top secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This is the NSA classification given to any information that is expected to cause a serious level of damage to national security if revealed.

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is the NSA classification given to any information that is expected to cause “damage” or identifiable damage to national security

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True/false

Unclassified information needs no limited degree of control or protection

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is any information that requires minimum safeguarding to prevent widespread distribution to the public.

A

For official use only

FOUO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What act does for official use only fall under to prevent the release to the public?

A

Freedom of information act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false

Markings are required for documents containing FOUO.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two unclassified FOUO information?

A

Privacy act

Critical information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What year was the privacy act enacted?

A

1974

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some examples of the privacy act govern?

A

Social security number
Date of birth
Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How long do you keep privacy act information, and how is it disposed of?

A

Only as long as necessary and must be destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is critical information?

A

Any unclassified information providing clues in regards to US and friendly forces activities, capabilities, intentions or limitations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

According to AF133-201V1, what is COMSEC?

A

Refers to measures and controls taken to deny any unauthorized persons information derived from information systems of the United States government related to national security and to ensure the authenticity of such information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the components of COMSEC?

A

TRANSEC
CRYPTOSEC
EMSEC
Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True/false:
TRANSEC techniques are not used to protect or secure transmitted classified or sensitive information.
(If false, make it true)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are authorized TRANSEC Methods?

A
Changing radio frequencies 
Cancel or alter communications patterns 
Implement radio silence 
Use frequency hopping systems
Use directional antennas
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

This is a component of COMSEC resulting from the application of measures designed to protect transmission from intercepting and exploitation by means other than “cryptanalysis” or complex code-breaking techniques used to reveal encrypted information

A

Transmission security (TRANSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is crypto security?(CRYPTOSEC)

A

Provisions and proper use of technically sound crypto systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This security is the part of the COMSEC that results from using all physical measures necessary to safeguard information or material from access by unauthorized persons.

A

Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
This determines protective measures that will deny unauthorized personnel access to classified and in some instance, unclassified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals from system processing this information.
Emission security (EMSEC)
25
Cryptography relies on what two basic components?
Algorithm | Crypto-key
26
What is cryptography?
The transformation of ordinary plain text in to code from(cipher text) and then recovering the plaintext data from its cipher text form
27
This is authorized use of cryptographic system to return encrypted information to its original, readable form
Decryption
28
This is the mathematical function or formula used in encryption and decryption
Algorithm
29
This is known as a key "variable" is the parameter or numerical value used in encryption and decryption
Crypto-key
30
The act or science of deciphering a code or coded message without a prior knowledge of the key.
Cryptanalysis
31
Who approves all cryptographic systems and techniques used by or on the behalf of DOD activities to encrypt ______ and certain _______ ________ information.
NSA Classified Sensitive information
32
Who approves all techniques and system used to encrypt unclassified sensitive information?
National institute of standards and technology | NIST
33
What are two types of approved cryptographic systems?
Secret-key | Public-key
34
What high encryption/decryption key speed using hi tech crypto system
Symmetric (secret-key)
35
True/false: | Symmetric (secret-key) encrypt is approved by odd and the NSA to use to encrypt classified information.
True
36
What are the two types of symmetric keys?
Block cipher | Stream cipher
37
This encrypts/ decrypts varying lengths of data in a continuous stream instead of fixed chunks at one time
Stream cipher
38
This operates by encrypting/decrypting one chunk of data at a time
Block ciphers
39
This was issued to protect sensitive computer data in federal computer system by using block cipher cryptographic algorithm that converts plain text into cipher text using a key that consists of 64 bits.
DES
40
This was issued as a "band-aid" for block cipher secret-key algorithm shortfalls
Triple data encryption standard(3DES)
41
This classified symmetric encryption/ decryption block cipher algorithm developed by the US government for voice phones
Skipjack
42
This was developed in a five year competition to replacement of the unsecured DES,
Advanced Encryption Standard (AES)
43
True/false: The problem with the secret-key system is that copies of one key must be distributed to all sides to establish a mirror image, if the keys are distributed through a secured communication channel it will be compromised during transmission.
False- it won't be compromised
44
The _______ the key length, the _____ possible keys there will be to search through to break the code, and the information will be ______ secure.
Larger More More
45
This system secure data transmission, approved by the NSA to transmit classified data. to and from various types of terminal equipment, such as desktop computers, teletype and etc.
Data encryption
46
What are different types of data encryption devices?
TSEC/KG-84, 84A and 84C general purpose encryption device | KIV-7 high speed data encryption device
47
How does voice encryption work?
Transmission is first scrambled by the encryption device and then carried via modem or similar communication devices securely over leased lines, satellite, microwave or radio signals.
48
What are different types of voice encryption?
TSEC/KY-57 & KY-58 voice encryption TSEC/KY-68 digital subscriber voice terminal Secure terminal equipment
49
This encryption is also known as trunk encrypts microwave trunks, high speed landlines(fiber optics) circuits and T-1/T-3 satellite channels.
Bulk encryption
50
What are different types of bulk encryption systems?
TSEC/KG-194 and 194A trunk encryption devices KIV-19 TACLANE-Micro KG-175D
51
This encryption system are products that classified data while in transit over internet protocol network.
Network encryption
52
What is one network encryption device?
KG-250 Network encryptior
53
This person is usually the wing-level manager for the base COMSEC accounts and all COMSEC programs and material on base.
COMSEC manager
54
This person is the squadron or flight liaisons for COMSEC management, they are responsible for administering the physical security procedures for their responsible sub-accounts, validating access, and training/certifying all authorized COMSEC users
COMSEC responsible officer
55
This person uses COMSEC materials and equipment to perform his/her mission and must safeguard these assets at all time. Once the individual May be designated as a COMSEC Authorized user and granted unescorted access to the material within their account.
Authorized user
56
In order to be granted unrestricted access to areas containing COMSEC material, what three requirements must be verified and valid?
Need-to-know Proper security clearance Proper identification
57
What are the two areas protected by physical security?
Controlled area | Restricted area
58
This is a restricted area, room, group of rooms, building or installation where sensitive compartmented information may be stored and used, discussed and/or electronically processed.
Sensitive compartmented information facility( SCIF)
59
A failure to safeguard information or protect materials from unwanted access. This is sometimes known as a _____
Breach
60
This is a government agency that has worked to establish standards for storage containers used to safeguard materials.
General services administration (GSA)
61
What GSA file container has a dual- combo capability to ensure two-person integrity and stores top secret material.
Class A vault
62
Secret material must be stored in this GSA-approved safe with a single combination
Class B vault
63
True/false: Confidential material will be stored in a secured room but may not be stored under the same safeguards as top secret or secret COMSEC materials.
False- it can be stored the same as TS and secret.
64
This form is a record of events such as who opened/closed the container, the time it was opened/closed and who checked the container to ensure it was secured properly
Standard form 702. Security container check list
65
How often are combinations changed and how long are cipher locks changed?
Combo: annually Cipher: monthly
66
When should you immediately change combination locks?
- a person that knows the combination and no longer requires access - a container as locked is found open - if the combination is compromised - any repairs work has been made
67
This is a list for unescorted access to COMSEC material that has proper authorization to gain access to a secured area
Access list
68
This is where someone has proper identification and a sufficient need-to-know, but does not have a security clearance that is equal to or greater than the area of information. They wouldn't be put on the access list. What form would you use?
AF form 1109 visitor register log
69
This is required when dealing with Top secret information and material
Two person integrity (TPI)
70
What form would you use for inventory?
AFCOMSEC Form 16
71
What ALC code whorls use for the following? - must require continuous accountability from cradle to grave and incl. short title, reg number, and quantity - must include short title and quantity - reserved for electronic keys
1- ALC-1 2- ALC-2 3- ALC-6
72
What form do you use for destruction of information?
Standard form 153 COMSEC Destruction report
73
When do you destroy COMSEC material?
When it becomes outdated and must be destroyed
74
This occurs when material is destroyed without proper authority or destroyed before the super session date.
Premature destruction
75
This occurs when material is destroyed completely by accident.
Inadvertent destruction
76
True/false: | Destroying superseded COMSEC equipment beyond any possible reconstruction
False
77
What are the authorized methods for routinely destroying methods of COMSEC aids?
Burning Shredding Pulping
78
What are two methods of emergency destruction which are not suitable for destruction?
Sodium nitrate | Thermite
79
What type of keying material should be destroyed first during emergency destruction?
All superseded keying material
80
This determines protective measures that will deny unauthorized personnel access to classified information and intelligence that might be derived from the interception and analysis of unintentionally emitted electrical signals.
EMSEC
81
This code name referring to investigation and studies of compromising emission
TEMPEST
82
This is defined as unintentional intelligence-bearing signals which, if intercepted and analyzed, may disclose the information transmitted, received, handled or otherwise processed by any information processing equipment.
Compromising emanations
83
Red and black equipment shall be separated by at least_____?
3ft.
84
Red equipment shall be separated by at least ______ within the air craft.
2 inches
85
Black voice equipment shall be separated from red equipment by at least________.
6 ft.
86
What agency must approve modifications to CCI?
NSA
87
What are unauthorized modifications to CCI considered?
Tampering
88
Who publish the time compliance technical order or the time compliance limited maintenance manual?
NSA
89
How will ciphering devices be delivered to a military client?
From the production line to a central COMSEC depot via a special courier