Deck 2 Flashcards

Get That MONEY!!!

1
Q

Pass and Advanced

  1. Who is the properly designated individual authorized to release messages for transmission in the name of the command or activity?
A

Releaser.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pass and Advanced

  1. After a message has been properly released, where is it delivered for transmission?
A

The telecommunications center (TCC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pass and Advanced

  1. What is an important point to remember about the DTG?
A

It is assigned for identification and file purposes only and is not used to compute message processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pass and Advanced

  1. How long are messages held in the message center file?
A

Up to 60 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pass and Advanced

  1. Who must minimize messages be brought to the immediate attention of?
A

The leading communications petty oificer (LPO) and the communications officer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pass and Advanced

  1. Who is authorized to impose minimize conditions on users of naval communications systems?
A

The Chief of Naval Operations (CNO), fleet commanders in chief, and area coordinators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pass and Advanced

  1. During minimize conditions, how many words should FLASH and IMMEDIATE traffic be restricted to?
A

A maximum of 100 and 200 words.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pass and Advanced

  1. What messages have the authority of an official communication and must receive prompt attention?
A

Service messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pass and Advanced

  1. What topics do most service messages deal with?
A

Corrections, repetitions, broadcast reruns, and misrouted or miss sent messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pass and Advanced

  1. What will reduce the number of service messages required?
A

Careful attention to detail and the use of proper operating techniques by communications and crypto personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pass and Advanced

  1. What does the service message number immediately follow in the message text?
A

The abbreviation ?SVC.?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pass and Advanced

  1. What does the acronym COSIR in a service message text mean?
A

?Cite Our Service in Reply.?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pass and Advanced

  1. What messages are sent to determine the reason for excessive delay or non-delivery or a message previously sent?
A

Tracer messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pass and Advanced

  1. When must tracer action requests be initiated?
A

As soon as the discrepancy is discovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pass and Advanced

  1. What type of message do ships send to establish circuits with a NCTAMS or NAVCOMTELSTA on a limited or full-time basis?
A

Termination request messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pass and Advanced

  1. When must a termination request message be sent to the cognizant NCTAMS?
A

At least 48 hours prior to activating the requested termination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Pass and Advanced

  1. When are communications guard shift (COMMSHIFT) messages required?
A

When a command shifts its guard from one broadcast or servicing communications center to another.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Pass and Advanced

  1. Why are COMMSHIFT messages necessary?
A

Because of operational considerations or changes in the deployment schedule of a ship.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Pass and Advanced

  1. What are broadcast screen requests (BSRs)?
A

Service messages to request the rerun (ZDK) or missed or garbled messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Pass and Advanced

  1. What reports are used to advise of any situation that might cause significant disruption of tactical communications?
A

COMMSPOT reports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pass and Advanced

  1. When must COMMSPOT reports be submitted to minimize further deterioration of the communications situation?
A

As soon as unusual communications difficulties are experienced.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pass and Advanced

  1. What is the heart of the filing system?
A

The communications center master tile.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Pass and Advanced

  1. What file contains a copy of each Top Secret, SPECAT (less SIOP-ESI), and message designed for special privacy, regardless of classification?
A

Crypto center file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Pass and Advanced

  1. What file contains the master copy of all SIOP-ESI messages received by the communications center?
A

SPECAT SIOP-ESI file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Pass and Advanced

  1. What does the broadcast file contain?
A

A copy or tiller of each message transmitted or received by the broadcast method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Pass and Advanced

  1. What are the two parts of the station file?
A

Communications center master file and visual station file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Pass and Advanced

  1. What file contains copies of all effective general messages that require retention based on the communications center?s current guard list?
A

General message file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Pass and Advanced

  1. How are messages filed in the general message file since they are not in DTG order?
A

In serial number order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Pass and Advanced

  1. What happens if a general message is canceled during the current year?
A

The message may be destroyed, but a tiller must be placed in the tile to identify and indicate the disposition of all current-year general messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Pass and Advanced

  1. Who maintains the commercial traffic file?
A

The commercial traffic clerk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Pass and Advanced

  1. What personnel is responsible for processing outgoing and incoming messages for the embarked staff?
A

Flagship communications personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Pass and Advanced

  1. What instruction can you find U.S. equivalent and foreign classifications?
A

The Department of the Navy (DON) Information Security Program (ISP) Regulation, SECNAVINST 5510.36 (formerly OPNAVINST 5510.1).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Pass and Advanced

  1. Can NATO classified messages be filed with U.S. classified messages?
A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Pass and Advanced

  1. What should always be done when you remove a message from a file?
A

Insert a filler, or tickler, in its place.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Pass and Advanced

  1. What are fillers?
A

Locally prepared forms that identify the message by the original DTG, the message originator, information as to where the message is located, and the personal sign of the person removing the message from the file and completing the filler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Pass and Advanced

  1. How are messages and fillers filed?
A

In ascending date-time group order.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Pass and Advanced

  1. How long is the broadcast file retained?
A

24 hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Pass and Advanced

  1. How long is the commercial traffic file retained?
A

12 months.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Pass and Advanced

  1. What time period is the cryptocenter file retained?
A

2 years.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Pass and Advanced

  1. What time period is the facsimile file retained?
A

60 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Pass and Advanced

  1. What time period is the TOP SECRET control log retained?
A

60 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Pass and Advanced

  1. What are the primary objectives of communications?
A

To provide for effective connectivity to support the exercise of command and the exchange of essential information; and to advise the commander of the implications of communication capabilities and limitations for the operation plan and its execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Pass and Advanced

  1. What things does a communication plan have to consider?
A

Reliability, security, and speed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Pass and Advanced

  1. How is security usually referred to, as it pertains to communications?
A

In terms of communications security (COMSEC) and signal security (SIGSEC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Pass and Advanced

  1. What is a security measure, as it pertains to communications, designed to protect communications systems against acceptance of false transmissions or simulations by establishing the validity of a transmission, message, or originator?
A

Authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Pass and Advanced

  1. What is Radio Silence?
A

A condition in which all or certain radio equipment is kept inoperative (frequency band and/or types of equipment are specified).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Pass and Advanced

  1. What system uses electromagnetic transmissions to which equipment carried by friendly forces automatically responds?
A

Identification Friend or Foe (IFF).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Pass and Advanced

  1. What is the use of devices, operations, and techniques called, with the intent of confusing or misleading the user of a communications link or a navigation system?
A

Communications deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Pass and Advanced

  1. What is that division of electronic warfare (EW) involving actions taken to prevent or reduce an enemy?s effective use of the electromagnetic spectrum?
A

Electronic attack (EA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Pass and Advanced

  1. Why does enemy EA concern the communications planner?
A

Because overcoming enemy jamming and deception imposes certain restrictions on general communications operations procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Pass and Advanced

  1. What is that division of EW involving actions taken to ensure friendly effective use of the electromagnetic spectrum despite an enemy?s use of electronic warfare?
A

Electronic protection (EP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Pass and Advanced

  1. In planning communications, what factors must the planner evaluate?
A

The performance, capabilities, and capacities of systems, facilities, and personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Pass and Advanced

  1. What must a command initiate when it requires additions, deletions, or changes in existing Defense Communications System (DCS) circuits?
A

A telecommunications service request (TSR).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Pass and Advanced

  1. What is the authorization to start, change, or discontinue circuits, trunks, links, or systems?
A

The telecommunications service order (TSO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Pass and Advanced

  1. What term refers to the natural vibrations that occur when a force is applied to a substance?
A

?Electromagnetic spectrum.?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Pass and Advanced

  1. When will the Department of the Navy obligate funds for equipment?
A

Not until a frequency allocation has been obtained.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Pass and Advanced

  1. Who has the responsibility of interservice frequency coordination?
A

The Chief of Naval Operations (CNO), working through the United States Military Communications Electronics Board (USMCEB).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Pass and Advanced

  1. What is the process of authorizing a system or equipment to operate on a discrete frequency (or frequencies) and within a specified set of constraints?
A

Frequency assignment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Pass and Advanced

  1. Who is the authority for using radio frequencies by Navy and Marine Corps activities within the United States and Possessions (U S&P) obtained from?
A

The Administrator, National Telecommunications and Information Administration (NTIA), Washington, D.C. V

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Pass and Advanced

  1. Who establishes overall policy for spectrum management within the Department of the Navy?
A

The CNO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Pass and Advanced

  1. Authority for using radio frequencies by Navy and Marine Corps activities within the area of responsibility of a unified or specified commander is obtained from what source?
A

The Joint Chiefs of Staff through the USMCEB.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Pass and Advanced

  1. Within the Department of the Navy, what center authorizes frequency assignment applications and ensures all prerequisites are completed?
A

The Naval Electromagnetic Spectrum Center (NAVEMSCEN).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Pass and Advanced

  1. What is meant by the word ?caveat? when used with special-handling instructions?
A

A warning by authoritative orders that directs or imposes one to protect an element, usually special message traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Pass and Advanced

  1. The marking ?Restricted Data? (RD) is applied to what data?
A

All data concerned with the design, manufacture, or use of nuclear weapons; also the special nuclear material used in energy production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Pass and Advanced

  1. What information does the marking ?Formerly Restricted Data? (FRD) pertain to?
A

Defense information that has been removed from the RD category but must still be safeguarded as classified defense information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Pass and Advanced

  1. What message is the LIMDIS (Limited Distribution) designator applied to?
A

Only classified messages which, because of the subject matter, require limited distribution within the addressed activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Pass and Advanced

  1. What is the designation used on official information not requiring a security classification but which must be withheld and protected from public release?
A

For Official Use Only (FOUO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Pass and Advanced

  1. What special designation was established to protect certain categories of unclassified messages that is identified as having potential value if subject to analysis, but does not meet the criteria for security classification during electrical transmission?
A

Encrypt for Transmission Only (EFTO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Pass and Advanced

  1. When is EFTO not required on unclassified messages?
A

On those addressed exclusively among Navy, Marine Corps, and Coast Guard commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Pass and Advanced

  1. What instruction can you find detailed information on EFTO and FOUO markings?
A

In Basic Operational Communications Doctrine (U), NWP 4 (NWP 6-01).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Pass and Advanced

  1. What is the marking for special category?
A

SPECAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Pass and Advanced

  1. What are the four SPECAT categories?
A

SPECAT, SPECAT EXCLUSIVE FOR (SEF), SPECAT Single Integrated Operational Plan- Extremely Sensitive Information (SIOP-ESI), and PSEUDO-SPECAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Pass and Advanced

  1. What SPECAT messages are always Top Secret?
A

SIOP-ESI.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Pass and Advanced

  1. What SPECAT messages are normally unclassified messages that require limited distribution?
A

PSEUDO-SPECAT.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Pass and Advanced

  1. What personnel handle SPECAT messages?
A

Only those who are authorized by the commanding officer in writing to view them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Pass and Advanced

  1. What is the marking applied when message distribution must be limited to the named recipient? .
A

PERSONAL FOR.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Pass and Advanced

  1. What personnel may originate PERSONAL FOR messages?
A

Only flag officers, officers in a command status, or their designated representatives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Pass and Advanced

  1. Does the United States have a security classification equivalent to NATO RESTRICTED?
A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Pass and Advanced

  1. Since the United States does not have a security classification equivalent to ALLIED RESTRICTED, these messages must be handled in the same manner as what type of messages?
A

Confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Pass and Advanced

  1. What is it called when during an actual or simulated emergency it becomes necessary to decrease the amount of record and/or voice communications on military telecommunications circuits?
A

MINIMIZE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Pass and Advanced

  1. What happens to messages that will not be sent electrically during minimize periods?
A

They should be returned to the originator with the reason for their return.

82
Q

Pass and Advanced

  1. What messages contain key instructions or information from high-level authority and have fr predetermined formats (pro forma).
A

Joint Chiefs of Staff (JCS) Emergency Action Messages (EAMs)

83
Q

Pass and Advanced

  1. What SPECAT message is used only within the naval community for highly sensitive matters, high-level policy, or when politically sensitive information is to be passed only to a particular individual?
A

SPECAT EXCLUSIVE FOR (SEF).

84
Q

Pass and Advanced

  1. What is the designation assigned to that group of communications and operational publications designated as part of the publication allowance for the command?
A

NWPL (naval warfare publications library).

85
Q

Pass and Advanced

  1. What is the objective of central administration of naval warfare publications (NWPs)?
A

To ensure that these publications are correct and readily available for their intended use.

86
Q

Pass and Advanced

  1. Who is the responsibility for managing the NWPL assigned to?
A

An officer or senior petty oiiicer who is responsible to the executive officer, department head, or officer.

87
Q

Pass and Advanced

  1. What person is responsible for the overall administration and security of the NVVPL in accordance with the Naval Warfare Documentation Guide, NWPO (NWP 1-01)?
A

The naval warfare publications custodian (NWPC).

88
Q

Pass and Advanced

  1. Who is responsible for the upkeep and maintenance of the library and maintains all records and receipts in the central file, orders all necessary publications and changes thereto, and enters all changes and amendments to publications physically held in the NWPL?
A

The NWPL clerk.

89
Q

Pass and Advanced

  1. Who does the clerk report all matters of concern to?
A

The library custodian.

90
Q

Pass and Advanced

  1. What is the person called that the NWPL custodian issues publications to?
A

Holders and short-term users.

91
Q

Pass and Advanced

  1. What is the purpose of the custody file?
A

To maintain an up-to-date record of the holder and location of each publication.

92
Q

Pass and Advanced

  1. What does the administrative file, sometimes called the transaction file, contain?
A

Designation letters for custodian, local allowance/inventory sheets, the directives file, responsibility acknowledgment forms, publication notice route slips, destruction records, inspection documentation letters, and copies of all correspondence pertaining to naval warfare publications.

93
Q

Pass and Advanced

  1. How long must the material in the administrative file be retained?
A

2 years.

94
Q

Pass and Advanced

  1. What is the color of the Secret classification hinder for U.S. naval warfare publications?
A

Red.

95
Q

Pass and Advanced

  1. What is the color of the unclassified binder for U.S. naval warfare publications?
A

Blue.

96
Q

Pass and Advanced

  1. What is the color of the Confidential classification binder for U.S. naval warfare publications?
A

Yellow.

97
Q

Pass and Advanced

  1. What color is the binder of Allied/NATO publications regardless of security classification?
A

White.

98
Q

Pass and Advanced

  1. Who is responsible for making changes or corrections to NWPL publications or ensuring that holders receive and make the changes in a timely manner?
A

The NWPL clerk.

99
Q

Pass and Advanced

  1. When making entry of changes to NWPL publications why is red ink not used?
A

Because it is not visible under red night lights used aboard ship.

100
Q

Pass and Advanced

  1. How are corrections to NWPL publications issued when the material requires rapid dissemination?
A

By message.

101
Q

Pass and Advanced

  1. What does the first number of a numerical message corrections (NMCs) indicate?
A

The sequential number of the message correction to the original or revised publication.

102
Q

Pass and Advanced

  1. What notice keeps all cognizant personnel informed of the changes to naval warfare publications?
A

A publication notice.

103
Q

Pass and Advanced

  1. When are publication notices destroyed?
A

When no longer useful.

104
Q

Pass and Advanced

  1. What should be conducted to ensure positive control of NWPL publications?
A

A watch-to-watch inventory.

105
Q

Pass and Advanced

  1. What is certified by the signing of the watch-to-watch inventory by the relieving watch?
A

The publications were sighted, the required page checks were conducted, and that the relieving watch stander is responsible for the watch.

106
Q

Pass and Advanced

  1. What is required if watch-to-watch inventories are not required aboard ship?
A

A daily inventory.

107
Q

Pass and Advanced

  1. May naval warfare publications be extracted/reproduced for use in training or operations of U.S. forces?
A

Yes.

108
Q

Pass and Advanced

  1. When new or revised publications are received what should you check for the effective status of the publication?
A

The Foreword and the U.S. Letter of Promulgation.

109
Q

Pass and Advanced

  1. What series of publications provide communications instructions and procedures essential to conducting combined military operations and communications in which two or more allied nations are involved?
A

Allied communications ‘publications (ACPs).

110
Q

Pass and Advanced

  1. What publication was developed to coordinate and standardize communications among the U.S. military services?
A

Joint Army-Navy-Air Force publications (J ANAPS).

111
Q

Pass and Advanced

  1. What publication lists the short and long titles, content of each publication, and the current edition of JANAPS and ACPs?
A

The Status Of Non-cryptographic JAN/IP?s and A CPS, JANAP 201.

112
Q

Pass and Advanced

  1. What publications are the main communications publications in use by the U.S. Navy, Coast Guard, and Marine Corps?
A

Naval telecommunications publications (NTPS).

113
Q

Pass and Advanced

  1. What publication is the guiding doctrine of a NCTAMS for the communications area under its jurisdiction?
A

Fleet telecommunications publications (FTPS).

114
Q

Pass and Advanced

  1. What is developed by each NCTAMS to provide reference information on specific tactical communications subjects?
A

Communications information bulletins (CIBS).

115
Q

Pass and Advanced

  1. What is involved with communications security (COMSEC)?
A

All the protective measures taken to deny unauthorized persons information derived from the possession and study of telecommunications relating to national security.

116
Q

Pass and Advanced

  1. What system is designed to ensure the proper distribution, handling, and control of COMSEC material and maintains the cryptographic security of communications?
A

The communications security material system (CMS).

117
Q

Pass and Advanced

  1. Where can you find procedures governing the CMS?
A

In Communications Security Material System (CMS) Policy and Procedures Manual, CMS 1.

118
Q

Pass and Advanced

  1. Who assigns an account number for every command with a CMS account?
A

The Director, Communications Security Material System (DCMS).

119
Q

Pass and Advanced

  1. The CMS custodian is designated in writing by what person to maintain the CMS account for the command?
A

The commanding officer.

120
Q

Pass and Advanced

  1. What is a CMS local holder?
A

A command or activity that receives its COMSEC material support from a CMS account command.

121
Q

Pass and Advanced

  1. What is an individual considered who requires COMSEC material to accomplish an assigned duty or who needs COMSEC material for advancement study or training purposes?
A

A CMS user.

122
Q

Pass and Advanced

  1. All personnel who become involved with CMS should complete what training course?
A

The Personnel Qualifications Standards (PQS).

123
Q

Pass and Advanced

  1. Why must COMSEC material be stored separately from non-COMSEC material?
A

Because it helps ensure separate control for COMSEC material and makes emergency destruction of COMSEC material easier.

124
Q

Pass and Advanced

  1. When you are on duty, who is responsible for all the COMSEC material listed on the watch-to-watch inventory?
A

The watch supervisor.

125
Q

Pass and Advanced

  1. What must be done each time a watch section changes?
A

The oncoming watch supervisor and a witness _must inventory all COMSEC material held at a watch station.

126
Q

Pass and Advanced

  1. What report provides an audit trail for all accountable COMSEC material?
A

COMSEC material accounting reports.

127
Q

Pass and Advanced

  1. What report is used to document and report the transfer of COMSEC material from one CMS account to another or one holder to another?
A

Transfer Report.

128
Q

Pass and Advanced

  1. What are the three types of CMS inventories?
A

Fixed-cycle (FC), Special, and Combined.

129
Q

Pass and Advanced

  1. What CMS inventory is used to ensure that all accounts satisfy the national requirements for a semiannual inventory of keymat and an annual inventory of equipment and publications?
A

Fixed-cycle inventory.

130
Q

Pass and Advanced

  1. What CMS inventory satisfies the Navy requirement to conduct and document the mandatory Change of Command and Custodian inventories?
A

Special SF 153. `

131
Q

Pass and Advanced

  1. What report is used to record destruction of individual, one-time keying material segments of COMSEC material?
A

CMS 25 One-Time Keying Material Destruction Report.

132
Q

Pass and Advanced

  1. What report is used to record destruction of keytape segments of COMSEC keying material packaged in the ?VF? format?
A

CMS 25B COMSEC Keying Material Local Destruction Report.

133
Q

Pass and Advanced

  1. When must superseded COMSEC material be destroyed?
A

As soon as possible after supersession.

134
Q

Pass and Advanced

  1. When must keying material marked ?CRYPTO? be destroyed?
A

No later than 12 hours after supersession.

135
Q

Pass and Advanced

  1. COMSEC material that must be destroyed in an emergency is divided into what three categories?
A

Keying material, COMSEC document; and COMSEC equipment.

136
Q

Pass and Advanced

  1. In what order is keying material always destroyed?
A

Superseded, effective, reserve.

137
Q

Pass and Advanced

  1. What is reserve keying material?
A

Keying material that will become effective within the next 30 days.

138
Q

Pass and Advanced

  1. What type of information do COMSEC documents contain?
A

Information on the type of crypto equipments we use, the level of technology we have attained, and the way our COMSEC operations are organized and conducted.

139
Q

Pass and Advanced

  1. What are the two parts of verifying the destruction of COMSEC material?
A

Witnessing and inspection of destroyed material.

140
Q

Pass and Advanced

  1. What person will normally implement the emergency plan?
A

The commanding officer.

141
Q

Pass and Advanced

  1. What individual is usually authorized to implement the emergency plan should the situation prevent contact with the commanding officer?
A

The COMSEC officer or COMSEC custodian.

142
Q

Pass and Advanced

  1. What is the security measure taken to prevent single-person access to COMSEC keying material and cryptographic maintenance manuals?
A

Two-person integrity (TPI).

143
Q

Pass and Advanced

  1. Can one person have sole possession of COMSEC material that requires TPI security?
A

No.

144
Q

Pass and Advanced

  1. What type of material is the marking ?CRYPTO? used on?
A

All keying material and associated equipment to protect or authenticate national security-related information.

145
Q

Pass and Advanced

  1. What does the term ?crypto material? refer to?
A

All material, such as documents, devices, or apparatus, that contain crypto information.

146
Q

Pass and Advanced

  1. What is crypto material that supplies equipment settings and arrangements or that is used directly in the encryption and decryption process called?
A

Keying material.

147
Q

Pass and Advanced

  1. Is keying material always given priority when an emergency plan is implemented?
A

Yes.

148
Q

Pass and Advanced

  1. What is any failure, equipment, or operator that adversely affects the security of a crypto system called?
A

Crypto insecurity.

149
Q

Pass and Advanced

  1. What is a crypto variable?
A

An element of a crypto system that directly affects the encryption and decryption process.

150
Q

Pass and Advanced

  1. The crypto variables are divided into how many types?
A

Two.

151
Q

Pass and Advanced

  1. Which crypto variable is the most readily and frequently changed element of a crypto system?
A

Primary.

152
Q

Pass and Advanced

  1. During secure transmission, what is the function of crypto equipment?
A

To accept a ?plain text? tele printer or data signal containing classified information from the classified (red) patch panel and add a ?key? (randomly chosen bits generated internally), which is relayed as an encrypted signal.

153
Q

Pass and Advanced

  1. What process is known as over-the-air rekey (OTAR) or over-the-air transfer (OTAT)?
A

When the new cryptosystem that uses the 128-bit electronic key (ANDVT, KY-58, KG-84A/C, and KY-7 5) is capable of obtaining new or updated key via the circuit they protect or other secure communications circuits.

154
Q

Pass and Advanced

  1. What publications contain information on OTAR/OTAT?
A

The Procedures] manual for Over-the-Air Transfer (OTA T) and Over-the-Air Rekey (OTAR) and Field Generation and Over-the-Air Distribution of Tactical Electronic Key, NAG-16C/TSEC.

155
Q

Pass and Advanced

  1. What is the security measure designed to protect a communications or command system against fraudulent transmissions or simulation?
A

Authentication.

156
Q

Pass and Advanced

  1. What are the types of authentication?
A

Challenge and Reply and Transmission Authentication.

157
Q

Pass and Advanced

  1. What is the procedure called that a station uses to establish its own authenticity, and the called station is not required to challenge the calling station?
A

Self-authentication.

158
Q

Pass and Advanced

  1. Where can you find information on authentication?
A

In Communications Instructions Security (U), ACP 122.

159
Q

Pass and Advanced

  1. What is the term used to describe four types of interference that you are likely to experience in a given situation?
A

Meaconing, Intrusion, Jamming, and Interference (MIJI).

160
Q

Pass and Advanced

  1. What is the interception and rebroadcast of navigation signals?
A

Meaconing.

161
Q

Pass and Advanced

  1. How is intrusion defined?
A

Any attempt by an enemy to enter U.S. or allied communications systems and simulate our traffic to confuse and deceive.

162
Q

Pass and Advanced

  1. What is jamming?
A

The deliberate radiation, reradiation, or reflection of electromagnetic signals to disrupt enemy use of electronic devices, equipment, or systems.

163
Q

Pass and Advanced

  1. What does interference usually result from?
A

Spurious emissions and responses or from intermodulation products.

164
Q

Pass and Advanced

  1. What does AIS security cover?
A

The denial of service and the destruction of computer rooms, the loss of confidentiality, fraud, the theft of computer time as well as the computer itself.

165
Q

Pass and Advanced

  1. What is the AIS security goal?
A

To take all reasonable measures to protect AIS assets.

166
Q

Pass and Advanced

  1. What is the ultimate AIS asset?
A

Information.

167
Q

Pass and Advanced

  1. What is considered environmental threats?
A

Heat, humidity, explosions, dust, dirt, power peaks, power failures; and natural disasters like tire, floods, hurricanes, thunderstorms, and earthquakes.

168
Q

Pass and Advanced

  1. What are vulnerabilities caused by?
A

Lack of AIS security planning, poor management, disorganization, disorder, inadequate or improper procedures, open data and open door policies, undocumented software, unaware or unconcerned personnel.

169
Q

Pass and Advanced

  1. How can you help limit the vulnerabilities?
A

By following established AIS security policies and procedures.

170
Q

Pass and Advanced

  1. What causes successful attacks and adverse events?
A

A combination of threats, vulnerabilities, and AIS assets.

171
Q

Pass and Advanced

  1. How are risks usually expressed?
A

In terms of dollars per year, the annual loss expectancy.

172
Q

Pass and Advanced

  1. What is done once the threats and vulnerabilities are known and the likelihood and risk of a successful attack or an adverse event are determined?
A

A plan is developed to set up countermeasures (controls) to lessen or eliminate the vulnerabilities.

173
Q

Pass and Advanced

  1. What are the measures called that helps to recover from a successful attack or an adverse event?
A

Contingency plans.

174
Q

Pass and Advanced

  1. What is involved in risk management?
A

Assessing the risks, determining loss potential estimates, and selecting countermeasures appropriate to prevent, detect, minimize, and recover from successful attacks and adverse events.

175
Q

Pass and Advanced

  1. What does the degree of success of risk management depend on?
A

The vulnerability of the system or activity and the effectiveness of existing countermeasures.

176
Q

Pass and Advanced

  1. What are the five areas of consideration for the Navy?s AIS security program?
A

Hardware (I), data (II), human resources (III), software (IV), and communications (COMM) (V).

177
Q

Pass and Advanced

  1. Who is the only person that can ensure that AIS security receives the support required at every level?
A

The commanding officer (CO). .

178
Q

Pass and Advanced

  1. Who is responsible for taking the necessary steps to provide an adequate level of security for all AIS-related activities, automated information systems, and networks, including those developed, operated, maintained, or provided by contractors?
A

The CO and the AIS security staff.

179
Q

Pass and Advanced

  1. What person does each AIS facility have whose primary duty is to serve as the single point of contact for all matters relating to AIS security at your command?
A

An information system security manager (ISSM).

180
Q

Pass and Advanced

  1. What are the factors that determine the numbers and types of people assigned to the AIS security staff?
A

The type of activity, its size, its hardware configuration(s), types of work to be processed, etc.

181
Q

Pass and Advanced

  1. What type of personnel may your command?s AIS security staff include?
A

Command security manager, information system security manager (ISSM), information system security officer (ISSO), network security officer (N SO), and terminal area security officer (T ASO).

182
Q

Pass and Advanced

  1. What type of things does physical security deal with?
A

Personnel, the environment, the facility and its power supply(s), fire protection, physical access, and even the protection of software, hardware, and data files.

183
Q

Pass and Advanced

  1. What does the degree of physical security at your installation or command depend on?
A

Its physical characteristics, its vulnerability within the AIS environment, and the type of data processed.

184
Q

Pass and Advanced

  1. Minimum physical security requirements include what four basic areas your command must address?
A

Physical security protection, physical access controls, data tile protection, and natural disaster protection.

185
Q

Pass and Advanced

  1. What is the reason physical access controls are implemented?
A

To prevent unauthorized entry to your computer facility or remote terminal areas.

186
Q

Pass and Advanced

  1. What are the several ways physical access controls can be accomplished?
A

Conventional key and lock set, electronic key system, mechanical combination lock, or electronic combination lock.

187
Q

Pass and Advanced

  1. What temperature should be maintained in the computer facility?
A

7 2? Fahrenheit, +/-2?.

188
Q

Pass and Advanced

  1. What should be the humidity level of the computer facility?
A

55%, +/- 5%. I

189
Q

Pass and Advanced

  1. What precautions should be taken if your equipment has been exposed to water?
A

Do not turn it on until it has been thoroughly checked out by qualified maintenance personnel.

190
Q

Pass and Advanced

  1. What should be done if your system encounters power fluctuations?
A

The equipment should be shut down at once until the problem is corrected.

191
Q

Pass and Advanced

  1. What are some computer systems equipped with that provides the auxiliary power for your equipment that may be required if your command?s mission dictates continuous AIS support to fulfill its obligations or if your computer system is in an area where there are frequent brownouts?
A

An uninterrupted power source (UPS).

192
Q

Pass and Advanced

  1. What is one of the major elements of any command?s physical security program?
A

Fire protection.

193
Q

Pass and Advanced

  1. Fire extinguishers are placed within what distance of computer equipment?
A

50 feet.

194
Q

Pass and Advanced

  1. What type of fire extinguishers are used on electrical fires?
A

Only carbon dioxide or inert-gas Fire extinguishers.

195
Q

Pass and Advanced

  1. How does the FIPS (Federal Information Processing Standards) PUB 39 Glossary for Computer Systems Security define data security?
A

As ?The protection of data from unauthorized (accidental or intentional) modification, destruction, or disclosure.?

196
Q

Pass and Advanced

  1. In a remote terminal area, what are security requirements based upon?
A

The highest classification of data to be accessed through the terminals.

197
Q

Pass and Advanced

  1. What must be done if the computer system to which your remote terminal is connected is processing classified data and your terminal is not authorized, controlled, or protected for that classification of data?
A

It must be disconnected.

198
Q

Pass and Advanced

  1. What are the four security modes that provide for processing classified data?
A

System high, dedicated, multilevel, and controlled.

199
Q

Pass and Advanced

  1. When is a computer system operating in the system high security mode?
A

When the central computer facility and all of the connected peripheral devices and remote terminals are protected in accordance with the requirements for the highest classification category and type of material then contained in the system.

200
Q

Pass and Advanced

  1. When is a computer system operating in the dedicated security mode?
A

When the Central Computer facility and all of its Connected peripheral devices and remote terminals are exclusively used and controlled by specific users or group of users having a security clearance and need-to-know for the processing of a particular category(s) and type(s) of classified material.