EKMS 1E, EKMS POLICY AND PROCEDURES FOR NAVY ELECTRONIC KEY MANAGEMENT SYSTEM TIERS 2&3 Flashcards

1
Q

Which material is used to protect U.S. Government and partner classified or sensitive unclassified communications or information from unauthorized persons?

A

Communications Security (COMSEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which system was established to distribute, control, and safeguard Communications Security (COMSEC) material?

A

(COMSEC) Material Control System (CMCS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an interoperable collection of systems, facilities, and components developed by the services and agencies of the U.S. Government to automate the planning, ordering, filling, generation, distribution, accountability, storage, usage, destruction and management of electronic key and other types of Communications Security (COMSEC) material?

A

Electronic Key Management System (EKMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The overall Electronic Key Management System (EKMS) architecture consists of how many layers or tiers?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Electronic Key Management System (EKMS) Tier consists of the National Security Agency’s (NSA) Fort Meade and Finksburg Key Facilities and provides centralized key management services for all forms of Communications Security (COMSEC) key?

A

Tier 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which Electronic Key Management System (EKMS) layer serves as the intermediate key generation and distribution center, central offices of record (COR), privilege managers, and registration authorities for EKMS/COMSEC accounts?

A

Tier 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What houses the physical Electronic Key Management System (EKMS) servers that are used for accounting and will provide for the generation and distribution of many traditional key types for large nets?

A

Common Tier I (CT1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which Electronic Key Management System (EKMS) layer is comprised of the EKMS Accounts that manage and other Communications Security (COMSEC) material?

A

Tier 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which Electronic Key Management System (EKMS) layer is the lowest tier or layer of the EKMS architecture?

A

Tier 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What serves as Tier 0 and is the executive agent for developing and implementing national level policy affecting the control of Communications Security (COMSEC) material ?

A

National Security Agency (NSA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which term is used to refer to the Tier 1 site having primary COR (Central Office of Record) responsibility for a portion of the Tier 2 accounts?

A

Primary Tier 1 Segment (PT1S)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who has overall responsibility and authority for implementation of National Communications Security (COMSEC) policy within the Department of the Navy (DoN)?

A

Chief of Naval Operations (CNO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What serves as Communications Security (COMSEC) resource sponsor for the Marine Corps?

A

Headquarters Marine Corps (HQMC) C4 CY

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What administers the Department of the Navy (DoN) Communications Security (COMSEC) program and is the Service Authority for the Department of the Navy (DoN)?

A

Naval Communications Security Material System (NCMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What receives, stores, and ships Ready for Issue (RFI) equipment and is the Physical Material Handling Segment (PMHS) for Navy in the EKMS?

A

COMSEC Material Issuing Office (CMIO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the consolidated (Air Force, Army, Navy and NSA) Communications Security (COMSEC) distribution facility for keying material?

A

United States National Distribution Authority (USNDA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is responsible for evaluating Communications Security (COMSEC) incidents and authorizing the issue/destruction of COMSEC material under their control?

A

Controlling Authority (CONAUTH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A Communications Security (COMSEC) account is an administrative entity in which custody and control of Communications Security (COMSEC) material are maintained. These accounts are called Tier 2 accounts and are identified by an account number consisting of how many digits?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How many LCMS System Administrators at a minimum must be appointed?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Who is the Commanding Officers (CO’s) primary advisor on matters concerning the security and handling of Communications Security (COMSEC) material and the associated records, reports, and audits?

A

COMSEC Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How many variants of Local Elements are there?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How many categories do Local Elements (LEs) in transit fall into?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is defined as any activity, organization, or person(s) performing some type of key management-related function or functions, which has been assigned an EKMS ID?

A

Key Management Entity (KME)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the FIREFLY POC for modern key privileges?

A

Naval Communications Security Material System (NCMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Communications Security (COMSEC) material must be handled and safeguarded based on its assigned classification and accounted for based on which code?
Accountability Legend (AL)
26
How many standard classification markings are used to indicate the classification of Communications Security (COMSEC) material?
4
27
A short title consists of how many alphanumeric characters without special characters, e.g., /, -, etc.?
24
28
Within Local COMSEC Management Software (LCMS), electronically generated keying material can be assigned an accounting number of what?
0
29
Short titles are created and defined based on guidance found in which publication?
CNSSI-4033
30
Which codes determine how Communications Security (COMSEC) material is accounted for within the (COMSEC) Material Control System (CMCS)?
Accountability Legend (AL)
31
How many Accountability Legend (AL) codes are used to identify the minimum accounting controls required for Communications Security (COMSEC) material?
5
32
Which Accountability Legend (AL) is assigned to traditional hardcopy Communications Security (COMSEC) material that is continuously accountable to the Central Office of Record (COR) by accounting (serial/register) number from production to destruction?
AL Code 1
33
Which Accountability Legend (AL) code is assigned to traditional hard copy Communications Security (COMSEC) material that is continuously accountable to the Central Office of Record (COR) by quantity from production to destruction?
AL Code 2
34
Which Accountability Legend (AL) code is assigned to traditional hardcopy Communications Security (COMSEC) material that after initial receipt to the Central Office of Record (COR), Communications Security (COMSEC) material is locally accountable by quantity and handled/safeguarded based on its classification?
AL Code 4
35
Which Accountability Legend (AL) code is assigned to electronically generated keys for Communications Security (COMSEC) material that is electronically generated and continuously accountable to the Central Office of Record (COR) from production to destruction?
AL Code 6
36
Which Accountability Legend (AL) code is assigned to electronically generated keys for Communications Security (COMSEC) material that is electronically generated and locally accountable to the generating facility?
AL Code 7
37
Electronic key generated under the provisions of which series other than the KP (KOK-22) is not assigned an Accountability Legend (AL) code?
NAG 16
38
COMSEC Material Issuing Office (CMIO) Norfolk is required to continuously account to the Central Office of Record (COR) for all Accountability Legend (AL) material falling under which code?
AL Code 4
39
Which marking or designator identifies all Communications Security (COMSEC) keying material that is used to protect or authenticate classified or sensitive unclassified government or government-derived information, the loss of which could adversely affect national security?
CRYPTO
40
Any physical media to be transferred or issued, other than a KSD-64A, on which electronic keys have been loaded will have a short title and an Accountability Legend (AL) code of 1 or what else?
4
41
Which type of Electronic Key Management System (EKMS) Message key is a modern (asymmetric) key used to create FIREFLY vectors (credentials) to encrypt keying material for distribution between EKMS accounts or to perform benign fill techniques?
KP FIREFLY
42
Which type of Electronic Key Management System key is a modern key generated by the EKMS CF and filled from a KSD-64A cryptographically "sign" EKMS messages?
Message Signature Key (MSK)
43
FIREFLY Key and Message Signature Key (MSK) along with the KP Privilege Certificate (PRIV CERT) must be requested from what whenever an LMD/KP is brought on-line for the first time (site initialization) or following a catastrophic failure of the LMD/KP that results in the system requiring a new site initialization?
Naval Communications Security Material System (NCMS)
44
Procedures for loading of either the FireFly (FF) Vector Set or Message Signature Key (MSK) are outlined in which series?
EKMS-704
45
There are several keys the Key Processor (KP) generates and uses internally which the user never encounters directly, but are affected by certain LMD/KP processes; these processes are: Site Re-initialization, KP Changeover, and what else?
KP re-key
46
Which process enables the recovery of all protected data stored on the Local Management Device (LMD) and is used when a key processor (KP) must be replaced with a new Key Processor (KP) due to failure or recertification?
Site Reinitialization
47
Which process is used to re-encrypt the Local Management Device (LMD) database when the crypto period of the Key Encryption Key Local (KEKL) expires?
Changeover
48
Changeover will be performed following a Site Reinitialization and at a minimum of every three months thereafter (maximum of how many days between Changeovers)?
92
49
Which process is when the Account Manager requests an update to the FIREFLY Key?
KP Rekey
50
How often at a minimum must KP Rekeys be performed?
Annually
51
What must be processed prior to conducting a KP rekey and posting new credentials?
Bulk Encrypted Transactions (BETs)
52
What are designed to enable to KOK-22A (KP) to locally produce keying material for existing and emerging Communications Security (COMSEC) equipment?
KG Rules
53
What is a designator which identifies secure telecommunications or information handling equipment, or an associated cryptographic component, which is unclassified but controlled within the (COMSEC) Material Control System (CMCS)?
Controlled Cryptographic Item (CCI)
54
Communications Security (COMSEC) keying material will, at all times, be in one of how many status conditions?
3
55
Which Communications Security (COMSEC) keying material status condition means it is being held for future use?
Reserve
56
Which Communications Secuirty (COMSEC) keying material status condition means it is authorized for use?
Effective
57
Which Communications Security (COMSEC) keying material status condition means it is no longer authorized for use and must be destroyed within the time frames in Article 540?
Superseded
58
Which term refers to a time when a particular item of Communications Security (COMSEC) material is no longer eligible for use?
Supersession
59
How many ways can Communications Security (COMSEC) material be superseded?
3
60
Which type of Communications Security (COMSEC) material supersession is based on a specific, pre-determined supersession date for each edition of material by the Controlling Authority?
Regular
61
Which type of Communications Security (COMSEC) material supersession is not pre-determined but which occurs as a result of use?
Irregular
62
Which type of Communications Security (COMSEC) material supersession is defined as an unplanned change of supersession, usually as the result of a compromise directed by the Controlling Authority?
Emergency
63
What reflects most Communications Security (COMSEC) material distributed to Department of the Navy (DoN) accounts and is a guide and not an authoritative source for destruction of keying material?
Status of COMSEC Material Report (SCMR)
64
What contains status information for NATO Communications Security (COMSEC) material and must be held by Department of the Navy (DoN) accounts which hold NATO material?
AMSG-600
65
Status information for keying material designated for use as part of the Inter-Theater COMSEC Package (ICP) is promulgated in a series of messages using pre-determined date-time-groups (DTGs) by the Joint COMSEC Management Office (JCMO) on what basis?
Quarterly
66
Policy and procedures for handling Two-Person Controlled (TPC)/Sealed Authentication Systems (SAS) material are contained in which series?
CJCSI 3260.01
67
The status of Communications Security (COMSEC) manuals and publications is normally listed on which page within these documents?
Letter of Promulgation (LOP)
68
Communications Security (COMSEC) material is divided into how many categories or material types?
3
69
Which type of Communications Security (COMSEC) material supplies either encoding means for manual and auto-manual cryptosystems or key for machine cryptosystems?
Keying
70
Which type of keying material includes keylists, codes, authenticators, Identify Friend or Foe (IFF) keying material, and one-time pads, but does not include canister-packaged key tapes?
Paper
71
Which type of keying material is designed to permit the extraction and removal of individual segments of key for hourly, daily, weekly, etc... use?
Extractable
72
Which type of keying material is designed to remain intact throughout its entire effective period?
Non-extractable
73
Which type of keying material includes electronically genereated key, either produced by a KP or other key variable generating device, electronic keys converted from key tape, electronic keys stored on magnetic media (e.g., floppy disk) and key loaded onto a fill device (e.g., KSD 64A)?
Electronic
74
Which type of keying material includes, key tapes, keying plugs, keyed microcircuits, removable media (e.g., floppy disks), magnetic tapes, and keying material in solid state form such as programmable read-only memories (PROMs), read-only memories (ROMs), metallic oxide semi-conductor (MOS) chips, and micro-miniature tamper protection systems (micro-TPS)?
Non-paper
75
Communications Security (COMSEC) keying material packaged in canisters has a preprinted digraph, consisting of how many letters, printed to the left of the short title on each extractable segment of the tape leader?
2
76
Due to the ongoing DoD-wide transition to the Key Management Infrastructure (KMI) driven by the NSA-directed End-of-Life) for EKMS, the EKMS Manager COI is only available in how many geographical locations?
2
77
All USN military personnel appointed or designated as an Account Managers, Alternate, LEs Issuing or LE User, must complete the applicable portions of the latest version of NAVEDTRA 43462-1 (EKMS PQS) or what else for the position they are fulfilling?
NAVEDTRA 43462-2 (KMI PQS)
78
Department of the Navy (DoN) Communications Security (COMSEC) accounts have the option to receive a Training Visit from their local Central Office of Record (COR) Audit Team at any time. It is HIGHLY RECOMMENDED and in the command's best interest to take advantage of the training and assistance services prior to an audit, deployment or upon change of command or Manager. How many training visits will be funded by Naval Communications Security Material System (NCMS) per audit cycle?
1
79
All Department of the Navy (DoN) Communications Security (COMSEC) accounts must undergo a formal CMS COR Audit at least once every how many months?
24
80
Communications Security (COMSEC) Account Managers are required to use the current version of which publication to conduct a semi-annual self-assessment?
EKMS-3
81
Which Audit Teams constitute a worldwide network of COMSEC subject matter experts established to provide assistance and training to personnel assigned Communications Security (COMSEC) responsibilities?
Central Office of Record (COR)
82
Central Office of Record (COR) Auditiors must attend the Central Office of Record (COR) Audit Team Training seminar once every how many months to maintain certification?
36
83
How often are EKMS/KMI Town Halls hosted, permitting funding, by Naval Communications Security Material System (NCMS) and are primarily intended for Commanding Officers (COs), COR Auditors, and account Managers?
Annually
84
Central Office of Record (COR) Audit Team responsibilities are divided among how many teams?
11
85
How many steps are required to establish a Communications Security (COMSEC) account?
6
86
The distribution of all Communications Security (COMSEC) material requires authorization from who in relation to the material?
Controlling Authority (CONAUTH)
87
Who are responsible for obtaining Controlling Authority (CONAUTH) validation for Communications Security (COMSEC) material not reflected in fleet instructions as part of the commands standard allowance?
Immediate Superiors in Command (ISICs)
88
At least how many days is required to establish a Communications Security (COMSEC) account and to provide the initial Communications Security (COMSEC) material?
45
89
The account Manager must coordinate with the area Defense Courier Division (DCD) station and establish a Defense Courier (DC) account by submitting which form?
USTRANSCOM Form 10
90
Accounts expecting to receive over-the-counter (OTC) service from CMIO must submit which form to the Communications Security (COMSEC) Material Issuing Office (CMIO) reflecting account personnel authorized to receipt for and courier Communications Security (COMSEC) equipment for their command?
CMS Form 1
91
Upon receipt of a Communications Security (COMSEC) account establishment message reflecting the account number assigned to the command from Naval Communications Security Material System (NCMS), the command must establish a User Representative (UR) account with the Electronic Key Management System (EKMS) Central Facility (CF). This is accomplished through completion and submission of which form to the commands Command Authority (CA)?
CF Form 1206
92
When an installation date is received, the command, not the installation team, must submit a request for a FIREFLY Vector Set (FF), Message Signature Key (MSK), and how many KSV-21 cards with Electronic Key Management System (EKMS) privileges in accordance with Article 670 to this manual?
2
93
When appointing Electronic Key Management System (EKMS) personnel, the Commanding Officer must consider the size of the account, the number of Local Elements (LEs) supported, the location where the Local Elements (LEs) operate, and which other requirements?
Two-Person Integrity (TPI)
94
Which form must be reviewed and executed by personnel with access to cryptographic information?
SD Form 572
95
Each numbered Communications Security (COMSEC) account will have a Manager, and a minimum of how many alternates appointed by the current Commanding Officer?
1
96
Individual appointment letters for Communications Security (COMSEC) account managers and alternates will be updated/signed by the incoming CO/OIC within how many days of assumption of command?
60
97
What is the minimum required enlisted pay grade to be assigned as a Communications Security (COMSEC) account manager?
E-6
98
What is the minimum required enlisted pay grade to be assigned as a Communications Security (COMSEC) account manager alternate?
E-5
99
Temporary access for which clearance level may only be authorized by DON CAF?
SCI
100
What is the minimum required enlisted paygrade to be assigned as a Local Element (LE) issuing (for keying material designated as CRYPTO)?
E-5
101
Commanding Officers are authorized to waive the length of government service required for Managers. If approved, waivers will be granted for the minimum duration required for the unit to comply with the policy in which the waiver was obtained, up to a maximum of how many years?
1
102
The Communications Security (COMSEC) account manager may not be absent for more than how many days?
60
103
During the temporary absence of the Communications Security (COMSEC) account manager, the Primary Alternate Manager must administer the account but may not do so for longer than how many days?
60
104
In accordance with which publication can Commanding Officers or Officers in Charge grant temporary access to individuals pending completion of full investigative requirements and pending establishment of security clearance eligibility by the DON CAF?
SECNAV M-5510.30
105
What is used to determine the highest classification of Communications Security (COMSEC) material that an account may hold?
Highest Classification Indicator (HCI)
106
Commands that undergo a shift in claimancy or a name change will refer to which series for instructions on modifying their own Common Account Data (CAD) and uploading account registration changes and credentials to the Directory Server?
EKMS 704
107
Assignment of a Staff CMS Responsibility Officer (SCMSRO) does not relieve the appointing official of ultimate responsibility for the proper management of an Electronic Key Management System (EKMS) account. The SCMSRO may delegate how many of the Commanding Officer (CO) spot checks to the Communications Officer (COMMO), as long as the COMMO is not designated as the Communications Security (COMSEC) Account Manager or Alternate?
2
108
What must be executed between the Electronic Key Management System (EKMS) account command and the Local Element (LE) command when a Local Element (LE) is responsible to a Commanding Officer other than that of the numbered Electronic Key Management System (EKMS) account command or issuing activity?
Letter of Agreement (LOA)
109
Letters of Agreement remain in effect until modified or the support is no longer required. LOAs/MOUs will be reviewed at a minimum of how often?
Triennially
110
Commanding Officers (crypto net members) can extend crypto periods for how many hours without Controlling Authority authorization when necessary to complete a transmission or conversation?
2
111
How often at a minimum must Commanding Officers (COs) conduct spot checks of the Communications Security (COMSEC) Vault and spaces where Communications Security (COMSEC) material is used and stored?
Quarterly
112
How often at a minimum must training be held to ensure that all personnel handling Communications Security (COMSEC) material must be familiar with and adhere to proper communications Security (COMSEC) procedures?
Monthly
113
The Communications Security (COMSEC) account manager must ensure that procedures are established to reassign local custody responsibility for Communications Security (COMSEC) material held by individuals permanently leaving the command, and those who are departing on TAD/TDY in excess of how many days?
30
114
The Communications Security (COMSEC) account manager must ensure that modifications to Communications Security (COMSEC) equipment are promptly and properly performed by qualified individuals in accordance with which series and that modification residue is disposed of properly?
OPNAVINST 2221.3
115
The Communications Security (COMSEC) account manager must track and manage production and destruction dates for Modern Key held by the account and ensure timely submission of key orders for replacement material required no later than how many days from the expiration date of the keys currently held?
30
116
Which personnel are responsible to their Commanding Officer for the proper management and security of all Communications Security (COMSEC) material held by the command?
Local Element (LE)
117
Local Element (LE) personnel issue Communications Security (COMSEC) material on local custody forms after verifying that the recipient is authorized to hold Communications Security (COMSEC) material and has executed which form?
SD Form 572
118
Each person authorized access to Communications Security (COMSEC) material as a user or witness, when required is personally responsible for the proper safeguarding, accountability, usage and what else in regards to the material?
Disposal
119
Construction specifications for shore-based Communications Security (COMSEC) storage vaults used to store keying material constructed or modified after 01 Jan 2013 will be in accordance with which publication?
ICD-705
120
All personnel having access to cryptographic information (keying material, book packaged material marked/ designated crypto, or equipment which permits extraction of key (SKL, TKL, KP)) must be authorized in writing by the current Commanding Officer or "Acting Commanding Officer". The use of what is not authorized in granting access to COMSEC material?
By Direction
121
Access lists used for granting access to cryptographic information will be updated whenever the status of an individual changes, upon Change of Command or how often at a minimum?
Annually
122
While only U.S. citizens are eligible for a security clearance, a resident alien or foreign national may be granted a "Limited Access Authorization" (LAA) in compliance with DoD 5200.2-R section C3.4.3 Such individuals may have access to COMSEC material no higher than what, if they have an LAA based on a completed successful background investigation and indoctrination, on a "need to know" basis, when their duties require such access?
Confidential
123
Who may not be appointed as Communications Security (COMSEC) Account Managers, Clerks, or equipment maintenance personnel nor have access to safes or areas where Communications Security (COMSEC) keying material is accounted for, visible, or stored?
Resident aliens
124
The release of Communications Security (COMSEC) material to a contractor account or direct issuance to contractor personnel as Local Elements (LEs) by a DON COMSEC account is restricted to U.S. Industrial firms operating under contract to the U.S. Navy in accordance with the provisions of which series?
OPNAVINST 2221.5
125
What is the system of storage and handling designed to prohibit individual access by requiring the presence of at least two authorized individuals, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed?
Two-Person Integrity (TPI)
126
Two-Person Integrity (TPI) storage requires the use of an approved Communications Security (COMSEC) vault or which type of approved security container?
General Services Administration (GSA)
127
Combinations must be changed at least once every how many years?
2
128
Combinations to Communications Security (COMSEC) material security containers, KP PINs and LCMS passwords must be recorded and individually wrapped in aluminum foil and protectively packaged in a separate combination envelope (which form)?
SF-700
129
How often at a minimum must an inventory document be created and used to inspect SF-700s?
Monthly
130
In an emergency, the Commanding Officer or other designated authority may direct the opening of any Communications Security (COMSEC) material security container. At least how many individuals shall be present to conduct and witness the emergency opening?
2
131
The Local Management Device (LMD) is pre-configured to lock out accounts after 3 failed attempts and to request a password change every how many days?
90
132
If unauthorized adjustments or suspicious activity is detected on the LMD, consult local, service-specific Information Assurance (IA) policy or which series for any required reporting?
SECNAVINST 5239.3
133
The LMD/KP including connecting cables, must be maintained, operated, and stored in a space approved for the open storage of which type of material?
SECRET
134
What must be maintained for each lock on a Communications Security (COMSEC) storage container?
SF-702
135
Which form must be prepared and maintained when a container, lock or vault door is put in use?
OF-89
136
The FIREFLY vector set is classified based on the Highest Classification Indicator (HCI) of the account; designated as CRYPTO; accounted for as ALC 1 or what else and permits the ability to generate and exchange credentials to transfer or receive keying material up to the Highest Classification Indicator (HCI)?
6
137
All magnetic media, including backup media, floppy diskettes, etc... used in the LMD/KP must be classified and safeguarded at which level?
SECRET
138
PINS must be changed at a minimum of every how many days or upon change of personnel?
90
139
When shipping keying material marked CRYPTO, packages will contain no more than how many editions for material that is superseded quarterly or more frequently?
4
140
All TOP SECRET and SECRET keying material marked or designated CRYPTO and items that embody or describe a cryptographic logic or algorithm must be transported by one of how many different methods?
3
141
SECRET COMSEC equipment may be shipped by cleared commercial carrier using what?
Protective Security Services (PSS)
142
Within CONUS, FTRs shipped separately from the associated device may be shipped as SECRET collateral using a GSA authorized carrier per which publication?
SECNAV M-5510.36
143
What is the "Application/License for Permanent Export of Unclassified Defense Articles and Related Technical Data" form number?
Form DSP-5
144
What is the "Application/License for Temporary Export of Unclassified Defense Articles" form number?
Form DSP-73
145
Courier personnel, including government, military or contractor personnel must have current, written authorization in the form of official travel orders, a DD-2501 or which other form from their organization?
DHS 11000-1
146
Controlled Cryptographic Items (CCIs) are centrally accountable in the (COMSEC) Material Control System (CMCS) to the Central Office of Record (COR) by serial number (ALC 1) or what else?
Quantity (ALC 2)
147
What is not required for access to keyed or unkeyed Controlled Cryptographic Item (CCI) unless the equipment permits extraction of key?
SD-572
148
Regardless of the method used to transport Controlled Cryptographic Item (CCI), the transferring command must, within how many hours of shipping, notify the intended recipient of the method of transportation and a list of Controlled Cryptographic Items (CCIs) that have been shipped?
24
149
If a shipment of Controlled Cryptographic Item (CCI) equipment has not been received within how many working days after the expected delivery date, contact the originator of the shipment immediately?
5
150
What provides the ability to view all expired modern (asymmetric) or superseded traditional (symmetric) electronic keying material?
Local COMSEC Management Software (LCMS)
151
Which series provides step-by-step guidance in preparing destruction reports and destroying electronic key at the account level?
EKMS 704
152
Routine Destruction of Regularly and Irregularly Superseded Keying Material must be destroyed immediately after use when more than one copy of the key setting is available, or as soon as possible after the cryptoperiod and always within how many hours after the end of the cryptoperiod?
12
153
Superseded segments of sealed segmented/extractable keying material (unissued or issued) need not be destroyed until the entire edition is superseded or the keying material is unsealed, whichever occurs first. When retained until the entire edition is superseded, unissued must be destroyed no later than 5 days after the month in which supersession occurs, issued must be destroyed no later than how many hours after the entire edition supersedes?
12
154
To permit processing of message traffic receieved after the effective cryptoperiod of a key, keying material for all auto manual off-line systems (e.g., KL-42, KL-43, KL-51, AN/PYQ20 or later devices intended for off-line encryption) may be retained up to, but no longer than, how many hours after supersession?
72
155
GPS keying material may be retained and used for up to how many hours after the regularly scheduled supersession period to comply with the NAVSTAR GPS Selective Availability and Anti-Spoofing Host Application Equipment Design Requirements with the Precise Positioning Security Module (SAASM)?
12
156
Destruction of Maintenance Manuals, Operating Instructions, and General Doctrinal Publications must be destroyed within how many days after the end of the month in which superseded?
5
157
When authorization to destroy Communications Security (COMSEC) equipment has been received by an account from NCMS//N3// and a deadline destruction date has not been identified, destroy within how many days of receipt of the destruction is authorized?
90
158
Only devices and methods approved by NSA, as reflected on which NSA list will be used for terminal destruction of COMSEC material?
Evaluated Products List (EPL)
159
How many ways may paper Communications Security (COMSEC) material be destroyed?
3
160
Pulping (wet process) must break down the paper Communications Security (COMSEC) material to non-legible fiber residue (which size)?
5 mm
161
Acetone or methylene chloride may be used to destroy microfiche or microfilm when burning is not feasible. Enclose each in a separate paper jacket or place in the chemical bath one at a time for approximately how many minutes?
5
162
Which type of fire should not be used to burn magnetic tapes on aluminum reels as it may cause an explosion?
Sodium-nitrate
163
Submarines in port may destroy microfiche, floppy disks, and superseded key tape using a NSA-approved shredder and retain the residue onboard until return to sea and the next available jettisoning operation. When at-sea, submerged submarines with hydraulic compactors shall compress the shredded material into a standard disposable perforated metal container with a minimum weight of 30 pounds, then jettison no closer than how many nautical miles from land in accordance with Navy and Submarine regulations?
12
164
How many types of Communications Security (COMSEC) facilities are there?
4
165
Facilities that generate, process, or transfer unencrypted classified information by electrical, electronic, electro-mechanical, or optical means shall conform to the guidance and standards herein and which other series?
OPNAVINST C5510.93
166
A general Communications Security (COMSEC) inspection must be conducted prior to initial activation, where practicable, but in no case later than how many days after activation?
90
167
What must be conducted when facilities are initially activated or reactivated after foreign occupation, or when there is known or suspected access by foreign maintenance or construction personnel, or when clandestine surveillance or recording devices are suspected in or near a Communications Security (COMSEC) facility?
Technical Security Evaluation (TSE)
168
In a continuously manned facility, a security check will be conducted at least once every how many hours to ensure all classified COMSEC information is properly safeguarded, and that physical security protection system/devices (e.g., door locks and vent covers) are functioning properly?
24
169
What is the "End of Day Security Checklist" form number?
SF-701
170
Which type of inspection is designed to detect attempts at technical exploitation of Communications Security (COMSEC) equipment by tampering, bugging, key extraction, or reverse engineering?
Quadrant
171
Which type of area that, when staffed, must be occupied by two or more appropriately cleared individuals who must remain within sight of each other?
No-Lone Zone (NLZ)
172
Windows less than how many feet above the ground at an unattended fixed secure telecommunications facility, measured from the bottom of the window, or are easily accessible by means of objects directly beneath that window, will be covered by an IDS?
18 | Page 5-7
173
Unattended fixed secure telecommunications facilities must be inspected at approximately how many-day intervals to confirm the integrity of the facility?
30
174
Which term is defined as the area within a structure occupied by a DOD bulk encryption facility?
Space
175
Which term is defined as the structure that contains a space?
Site
176
What manages the authorized allowance of Communications Security (COMSEC) material as validated by the Immediate Superior in Command (ISIC) of the command?
CMIO Norfolk
177
What is the primary means used by the Central Office of Record (COR) to obtain Point of Contact (POC) data for Electronic Key Management System (EKMS) Accounts?
Common Account Data (CAD)
178
How often at a minimum must Communications Security (COMSEC) account managers review and update Common Account Data (CAD)?
Semi-Annually
179
Shipboard allowances for Communications Security (COMSEC) equipment, related devices, equipment manuals and operating instructions by ship type and/or design are based, in part, upon the guidance in which series?
OPNAVINST 2300.44
180
Chief of Naval Operations (CNO) validation and approval is required for all cryptographic equipment and associated ancillary devices. Further guidance related to equipment allowances, transfers, recertification, etc... can be found in which series?
EKMS-5
181
Reserve-on-Board (ROB) levels typically range from how many months of keying material?
2-6
182
Each Communications Security (COMSEC) Account Manager must review their holdings at a minimum of how often to ensure a continuing need for the quantity and types of all Communications Security (COMSEC) material held still exists?
Annually
183
Superseded material received in a Reserve-on-Board (ROB) shipment must be destroyed within how many hours of opening the shipment?
12
184
Three months of Reserve-on-Board (ROB) is standard for most Electronic Key Management System (EKMS) accounts, however, some COMFLT/TYCOM identified units are authorized to hold how many months of material to support extended operations?
7
185
A request to increase Reserve-on-Board (ROB) levels for Short Titles the account is validated for requires at least 60 days notice if material is shipped via Defense Courier Service (DCS). A request to decrease a Reserve-on-Board (ROB) level requires a minimum of how many days notice?
14
186
The United States Transportation Command, Defense Courier Division (USTRANSCOM TCJ3-C) operates a network of how many
18
187
Requests for Special movements will be processed and entered into Defense Courier Service (DCS) within how many hours or less?
48
188
Regardless of grade or position, personnel picking up material from Defense Courier Division (DCD) must be authorized by the current CO/OIC of the account as reflected on which form on file with the servicing Defense Courier Division (DCD) station?
Form-10
189
Which form reflects Communications Security (COMSEC) Account Managers and Alternates authorized to receipt for and courier Communications Security (COMSEC) material between their command and the COMSEC Material Issuing Office (CMIO)?
CMS Form 1
190
A routine modification to a command's authorized allowance for physical keying material can be met by regular Defense Courier Service (DCS) delivery (minimum of how many days lead-time)?
60
191
Who is the approving authority for any increase in allowance related to Communications Security (COMSEC) equipment?
Chief of Naval Operations (CNO)
192
Requests for standard deployment keymat, as listed in the COMFLT, TYCOM, or CG area instructions, must be submitted a minimum of how many days before departure from homeport?
60
193
COMSEC Material Issuing Office (CMIO) will respond to requests for electronic key within how many hours?
48
194
LMD/KP-equipped Electronic Key Management System (EKMS) accounts are authorized to generate which key locally without prior authorization from Naval Communications Security Material System (NCMS)?
AL Code 7
195
Which series contains a list of equipment types the Key Processor (KP) is capable of producing keys for?
EKMS 704
196
There are several keys the Key Processor (KP) generates and uses internally which the user never encounters directly, but are affected by certain LMD/KP processes; these processes are: Site Re-initialization, KP Changeover, and what else?
KP re-key
197
Which process enables the recovery of all protected data stored on the Local Management Device (LMD) and is used when a Key Processor (KP) must be replaced with a new Key Processor (KP) due to failure or recertification?
Site Reinitialization
198
Which process is used to re-encrypt the Local Management Device (LMD) database when the crypto period of the Key Encryption Key Local (KEKL) expires?
Changeover
199
Changeover will be performed following a Site Reinitialization and at a minimum of every three months thereafter (maximum of how many days between Changeovers)?
92
200
Which process is when the Account Manager requests an update to the FIREFLY Key?
KP Rekey
201
How often at a minimum must KP Rekeys be performed?
Annually
202
What must be processed prior to conducting a KP rekey and posting new credentials?
Bulk Encrypted Transactions (BETs)
203
What are designed to enable to KOK-22A (KP) to locally produce keying material for existing and emerging Communications Security (COMSEC) equipment?
KG Rules
204
What is a designator which identifies secure telecommunications or information handling equipment, or an associated cryptographic component, which is unclassified but controlled within the (COMSEC) Material Control System (CMCS)?
Controlled Cryptographic Item (CCI)
205
Communications Security (COMSEC) keying material will, at all times, be in one of how many status conditions?
3
206
Which Communications Security (COMSEC) keying material status condition means it is being held for future use?
Reserve
207
Which Communications Security (COMSEC) keying material status condition means it is authorized for use?
Effective
208
Which Communications Security (COMSEC) keying material status condition means it is no longer authorized for use and must be destroyed within the time frames in Article 540?
Superseded
209
Which term refers to a time when a particular item of Communications Security (COMSEC) material is no longer eligible for use?
Supersession
210
How many ways can Communications Security (COMSEC) material be superseded?
3
211
Which type of Communications Security (COMSEC) material suppression is based on a specific, pre-determined supersession date for each edition of material by the Controlling Authority?
Regular
212
Which type of Communications Security (COMSEC) material supersession is not pre-determined but which occurs as a result of use?
Irregular
213
Which type of Communications Security (COMSEC) material supersession is defined as an unplanned change of supersession, usually as a result of a compromise directed by the Controlling Authority?
Emergency
214
What reflects most Communications Security (COMSEC) material distributed to Department of the Navy (DoN) accounts and is a guide and not an authoritative source for destruction of keying material?
Status of COMSEC Material Report (SCMR)
215
What contains status information for NATO Communications Security (COMSEC) material and must be held by Department of the Navy (DoN) accounts which hold NATO material?
AMSG-600
216
Status information for keying material designated for use as part of the Inter - Theater COMSEC Package (ICP) is promulgated in a series of messages using pre-determined date-time-groups (DTGs) by the Joint COMSEC Management Office (JCMO) on what basis?
Quarterly
217
Policy and procedures for handling Two-Person Controlled (TPC)/Sealed Authentication Systems (SAS) material are contained in which series?
CJCSI 3260.01
218
The status of Communications Security (COMSEC) manuals and publications is normally listed on which page within these documents?
Letter of Promulgation (LOP)
219
Communications Security (COMSEC) material is divided into how many categories or material types?
3
220
Which type of Communications Security (COMSEC) material supplies either encoding means for manual and auto-manual cryptosystems or key for machine cryptosystems?
Keying
221
Which type of keying material includes keylists, codes, authenticators, Identify Friend or Foe (IFF) keying material, and one-time pads, but does not include canister-packaged key tapes?
Paper
222
Which type of keying material is designed to permit the extraction and removal of individual segments of key for hourly, daily, weekly, etc... use?
Extractable
223
Which type of keying material is designed to remain intact throughout its entire effective period?
Non-extractable
224
Which type of keying material includes electronically generated key, either produced by a KP or other key variable generating device, electronic keys converted from key tape, electronic keys stored on magnetic media (e.g., floppy disk) and key loaded onto a fill device (e.g., KSD 64A)?
Electronic
225
Which type of keying material includes, key tapes, keying plugs, keyed microcircuits, removable media (e.g., floppy disks), magnetic tapes, and keying material in solid state form such as programmable read-only memories (PROMs), read-only memories (ROMs), metallic oxide semi-conductor (MOS) chips, and micro-miniature tamper protection systems (micro-TPS)?
Non-paper
226
Communications Security (COMSEC) keying material packaged in canisters has a preprinted digraph, consisting of how many letters, printed to the left of the short title on each extractable segment of the tape leader?
2
227
Due to the ongoing DoD-wide transition to the Key Management Infrastructure (KMI) driven by the NSA-directed End-of-Life) for EKMS, the EKMS Manager COI is only available in how many geographical locations?
2
228
All USN military personnel appointed or designated as an Account Managers, Alternate, LEs Issuing or LE User, must complete the applicable portions of the latest version of NAVEDTRA 43462-1 (EKMS PQS) or what else for the position they are fulfilling?
NAVEDTRA 43462-2 (KMI PQS)
229
Department of the Navy (DoN) Communications Security (COMSEC) accounts have the option to receive a Training Visit from their local Central Office of Record (COR) Audit Team at any time. It is HIGHLY RECOMMENDED and in the command's best interest to take advantage of the training and assistance services prior to an audit, deployment or upon change of command or Manager. How many training visits will be funded by Naval Communications Security Material System (NCMS) per audit cycle?
1
230
All Department of the Navy (DoN) Communications Security (COMSEC) accounts must undergo a formal CMS COR Audit at least once every how many months?
24
231
Communications Security (COMSEC) Account Managers are required to use the current version of which publication to conduct a semi-annual self-assessment?
EKMS-3
232
Which Audit Teams constitue a worldwide network of COMSEC subject matter experts established to provide assistance and training to personnel assigned Communications Security (COMSEC) responsibilities?
Central Office of Record (COR)
233
Central Office of Record (COR) Auditors must attend the Central Office of Record (COR) Audit Team Training seminar once every how many months to maintain certification?
36
234
How often are EKMS/KMI Town Halls hosted, permitting funding, by Naval Communications Security Material System (NCMS) and are primarily intended for Commanding Officers (COs), COR Auditiors, and account Managers?
Annually
235
Central Office of Record (COR) Audit Team responsibilities are divided among how many teams?
11
236
How many steps are required to establish a Communications Security (COMSEC) account?
6
237
The distribution of all Communications Security (COMSEC) material requires authorization from who in relation to the material?
Controlling Authority (CONAUTH)
238
Who are responsible for obtaining Controlling Authority (CONAUTH) validation for Communications Security (COMSEC) material not reflected in fleet instructions as part of the commands standard allowance?
Immediate Superiors in Command (ISICs)
239
At least how many days is required to establish a Communications Security (COMSEC) account and to provide the initial Communications Security (COMSEC) material?
45
240
The account Manager must coordinate with the area Defense Courier Division (DCD) station and establish a Defense Courier (DC) account by submitting which form?
USTRANSCOM Form 10
241
Accounts expecting to receive over-the-counter (OTC) service from the CMIO must submit which form to the Communications Security (COMSEC) Material Issuing Office (CMIO) reflecting account personnel authorized for reveipt for and courier Communications Security (COMSEC) equipment for their command?
CMS Form 1
242
Upon receipt of a Communications Security (COMSEC) account establishment message reflecting the account number assigned to the command from Naval Communications Security Material System (NCMS), the command must establish a User Representative (UR) account with the Electronic Key Management System (EKMS) Central Facility (CF). This is accomplished through completion and submission of which form to the commands Command Authority (CA)?
CF Form 1206
243
When an installation date is received, the command, not the installation team, must submit a request for a FIREFLY Vector Set (FF), Message Signature Key (MSK), and how many KSV-21 cards with Electronic Key Management System (EKMS) privileges in accordance with Article 670 to this manual?
2
244
When appointing Electronic Key Management System (EKMS) personnel, the Commanding Officer must consider the size of the account, the number of Local Elements (LEs) supported, the location where the Local Elements (LEs) operate, and which other requirements?
Two-Person Integrity (TPI)
245
Which form must be reviewed and executed by personnel with access to cryptographic information?
SD Form 572
246
Each numbered Communications Security (COMSEC) account will have a Manager, and a minimum of how many alternates appointed by the current Commanding Officer?
1
247
Individual appointment letters for Communications Security (COMSEC) account managers and alternates will be updated/signed by the incoming CO/OIC within how many days of assumption of command?
60
248
What is the minimum required enlisted paygrade to be assigned as a Communications Security (COMSEC) account manager?
E-6
249
What is the minimum required enlisted paygrade to be assigned as a Communications Security (COMSEC) account manager alternate?
E-5
250
Temporary access for which clearance level may only be authorized by DON CAF?
SCI
251
What is the minimum required enlisted paygrade to be assigned as a Local Element (LE) issuing (for keying material designated as CRYPTO)?
E-5
252
Commanding Officers are authorized to waive the length of government service required for Managers. If approved, waivers will be granted for the minimum duration required for the unit to comply with the policy in which the waiver was obtained, up to a maximum of how many years?
1
253
The Communications Security (COMSEC) account manager may not be absent for more than how many days?
60
254
In accordance with which publication can Commanding Officers or Officers in Charge grant temporary access to individuals pending completion of full investigative requirements and pending establishment of security clearance eligibility by the DON CAF?
SECNAV M-5510.30
255
What is used to determine the highest classification of Communications Security (COMSEC) material that an account may hold?
Highest Classification Indicator (HCI)
256
Commands that undergo a shift in claimancy or a name change will refer to which series for instructions on modifying their own Common Account Data (CAD) and uploading account registration changes and credentials to the Directory Server?
EKMS 704
257
Assignment of a Staff CMS Responsibility Officer (SCMSRO) does not relieve the appointing official of ultimate responsibility for the proper management of an Electronic Key Management System (EKMS) account. The SCMSRO may delegate how many of the Commanding Officer (CO) spot checks to the Communications Security (COMSEC) Account Manager or Alternate?
2
258
What must be executed between the Electronic Key Management System (EKMS) account command and the Local Element (LE) command when a Local Element (LE) is responsible to a Commanding Officer other than that of the numbered Electronic Key Management System (EKMS) account command or issuing activity?
Letter of Agreement (LOA)
259
Letters of Agreement remain in effect until modified or the support is no longer required. LOAs/MOUs will be reviewed at a minimum of how often?
Triennially
260
Commanding Officers (cryptonet members) can extend cryptoperiods for how many hours without Controlling Authority authorization when necessary to complete a transmission or conversation?
2
261
How often at a minimum must Commanding Officers (COs) conduct spot checks of the Communications Security (COMSEC) Vault and spaces where Communications Security (COMSEC) material is used and stored?
Quarterly
262
How often at a minimum must training be held to ensure that all personnel handling Communications Security (COMSEC) material are familiar with and adhere to proper Communications Security (COMSEC) procedures?
Monthly
263
The Communications Security (COMSEC) account manager must ensure that procedures are established to reassign local custody responsibility for Communications Security (COMSEC) material held by individuals permanently leaving the command, and those who are departing on TAD/TDY in excess of how many days?
30
264
The Communications Security (COMSEC) account manager must ensure that modifications to Communications Security (COMSEC) equipment are promptly and properly performed by qualified individuals in accordance with which series and that modification residue is disposed of properly?
OPNAVINST 2221.3
265
The Communications Security (COMSEC) account manager must track and manage production and destruction dates for Modern Key held by the account and ensure timely submission of key orders for replacement material required no later than how many days from the expiration date of the keys currently held?
30
266
Which personnel are responsible to their Commanding Officer for the proper management and security of all Communications Security (COMSEC) material held by the command?
Local Element (LE)
267
Local Element (LE) personnel issue Communications Security (COMSEC) material on local custody forms after verifying that the recipient is authorized to hold Communications Security (COMSEC) material and has executed which form?
SD Form 572
268
Each person authorized access to Communications Security (COMSEC) material as a user or witness, when required is personally responsible for the proper safeguarding, accountability, usage and what else in regards to the material?
Disposal
269
Construction specifications for shore-based Communications Security (COMSEC) storage vaults used to store keying material constructed or modified after 01 Jan 2013 will be in accordance with which publication?
ICD-705
270
All personnel having access to cryptographic information (keying material, book packaged material marked/designated crypto, or equipment which permits extraction of key (SKL, TKL, KP)) must be authorized in writing by the current Commanding Officer or "Acting Commanding Officer". The use of what is not authorized in granting access to COMSEC material?
By Direction
271
Access lists used for granting access to cryptographic information will be updated whenever the status of an individual changes, upon Change of Command or how often at a minimum?
Annually
272
While only U.S. citizens are eligible for a security clearance, a resident alien or foreign national may be granted a "Limited Access Authorization" (LAA) in compliance with DoD 5200.2-R section C3.4.3 Such individuals may have access to COMSEC material no higher than what, if they have an LAA based on a completed successful background investigation and indoctrination, on a "need to know" basis, when their duties require such access?
Confidential
273
Who may not be appointed as Communications Security (COMSEC) Account Managers, Clerks, or equipment maintenance personnel nor have access to safes or areas where Communications Security (COMSEC) keying material is accounted for, visible, or stored?
Resident aliens
274
The release of Communications Security (COMSEC) material to a contractor account or direct issuance to contractor personnel as Local Elements (LEs) by a DON COMSEC account is restricted to U.S. Industrial firms operating under contract to the U.S. Navy in accordance with the provisions of which series?
OPNAVINST 2221.5
275
What is the system of storage and handling designed to prohibit individual access by requiring the presence of at least two authorized individuals, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed?
Two-Person Integrity (TPI)
276
Two-Person Integrity (TPI) storage requires the use of an approved Communications Security (COMSEC) vault or which type of approved security container?
General Services Administration (GSA)
277
Combinations must be changed at least once every how many years?
2
278
Combinations to Communications Security (COMSEC) material security containers, KP PINs and LCMS passwords must be recorded and individually wrapped in aluminum foil and protectively packaged in a separate combination envelope (which form)?
SF-700
279
How often at a minimum must an inventory document be created and used to inspect SF-700s?
Monthly
280
In an emergency, the Commanding Officer or other designated authority may direct the opening of any Communications Security (COMSEC) material security container. At least how many individuals shall be present to conduct and witness the emergency opening?
2
281
The Local Management Device (LMD) is pre-configured to lock out accounts after 3 failed attempts and to request a password change every how many days?
90
282
If unauthorized adjustments or suspicious activity is detected on the LMD, consult local, service-specific Information Assurance (IA) policy or which series for any required reporting?
SECNAVINST 5239.3
283
The LMD/KP including connecting cables, must be maintained, operated, and stored in a space approved for the open storage of which type of material?
SECRET
284
What must be maintained for each lock on a Communications Security (COMSEC) storage container?
SF-702
285
Which form must be prepared and maintained when a container, lock or vault door is put in use?
OF-89
286
The FIREFLY vector set is classified based on the Highest Classification Indicator (HCI) of the account; designation as CRYPTO; accounted for as ALC 1 or what else and permits the ability to generate and exchange credentials to transfer or receive keying material up to the Highest Classification Indicator (HCI)?
6
287
All magnetic media, including back up media, floppy diskettes, etc... used in the LMD/KP must be classified and safeguarded at which level?
SECRET
288
PINS must be changed at a minimum of every how many days or upon a change of personnel?
90
289
When shipping keying material marked CRYPTO, packages will contain no more than how many editions for material that is superseded quarterly or more frequently?
4
290
All TOP SECRET and SECRET keying material marked or designated CRYPTO and items that embody or describe a cryptographic logic or algorithm must be transported by one of how many different methods?
3
291
SECRET COMSEC equipment may be shipped by cleared commercial carrier using what?
Protective Security Services (PSS)
292
Within CONUS, FTRs shipped separately from the associated device may be shipped as SECRET collateral using a GSA authorized carrier per which publication?
SECNAV M-5510.36
293
What is the "Application/License for Permanent Export of Unclassified Defense Articles and Related Technical Data" form number?
Form DSP-5
294
What is the "Application/License for Temporary Export of Unclassified Defense Articles" form number?
Form DSP-73
295
Courier personnel, including government, military or contractor personnel must have current, written authorization in the form of official travel orders, a DD-2501 or which other form from their organization?
DHS 11000-1
296
Controlled Cryptographic Items (CCIs) are centrally accountable in the (COMSEC) Material Control System (CMCS) to the Central Office of Record (COR) by serial number (ALC 1) or what else?
Quantity (ALC 2)
297
What is not required for access to keyed or unkeyed Controlled Cryptographic Item (CCI) unless the equipment permits extraction of key?
SD-572
298
Regardless of the method used to transport Controlled Cryptographic Items (CCIs) that have been shipped?
24
299
If a shipment of Controlled Cryptographic Item (CCI) equipment has not been received within how many working days after the expected delivery date, contact the originator of the shipment immediately?
5
300
What provides the ability to view all expired modern (asymmetric) or superseded traditional (symmetric) electronic keying material?
Local COMSEC Management Software (LCMS)
301
Which series provides step-by-step guidance in preparing destruction reports and destroying electronic key at the account level?
EKMS 704
302
Routine Destruction of Regularly and Irregularly Superseded Keying Material must be destroyed immediately after use when more than one copy of the key setting is available, or as soon as possible after the cryptoperiod and always within how many hours after the end of the cryptoperiod?
12
303
Superseded segments of sealed segmented/extractable keying material (unissused or issued) need not be destroyed until the entire edition is superseded or the keying material is unsealed, whichever occurs first. When retained until the entire edition is superseded, unissued must be destroyed no later than 5 days after the month n which e supersession occurs, issued must be destroyed no later than how many hours after the entire edition supersedes?
12
304
To permit processing of message traffic received after the effective cryptoperiod of a key, keying material for all auto manual off-line systems (e.g., KL-42, KL-43, KL-51, AN/PYQ20 or later devices intended for offline encryption) may be retained up to, but no longer than, how many hours after supersession?
72
305
GPS keying material may be retained and used for up to how many hours after the regularly scheduled supersession period to comply with the NAVSTAR GPS Selective Availability and Anti-Spoofing Host Application Equipment Design Requirements with the Precise Positioning Security Module (SAASM)?
12
306
Destruction of Maintenance Manuals, Operating Instructions, and General Doctrinal Publications must be destroyed within how many days after theend of the month in which it is superseded?
5
307
When authorization to destroy Communications Security (COMSEC) equipment has been received by an account from NCMS//N3//and a deadline destruction date has not been identified, destroy within how many days of receipt of the destruction authorization?
90
308
Only devices and methods approved by the NSA, as reflected on which NSA list will be used for termination destruction of COMSEC material?
Evaluated Products List (EPL)
309
How many ways may paper Communications Security (COMSEC) material to non-legible fiber residue (which size)?
5 mm
310
Acetone or methylene chloride may be used to destroy microfiche or microfilm when burning is not feasible. Enclose each in a separate paper jacket or place in the chemical bath one at a time for approximately how many minutes?
5
311
Which type of fire should not be used to burn magnetic tapes on aluminum reels as it may cause an explosion?
Sodium-nitrate
312
Submarines in port may destroy microfiche, floppy disks, and superseded key tape using a NSA-approved shredder and retain the residue onboard until return to sea and the next available jettisoning operation. When at-sea, submerged submarines with hydraulic compactors shall compress the shredded material into a standard disposable perforated metal container with a minimum weight of 30 pounds, then jettison no closer than how many nautical miles from land in accordance with Navy and Submarine regulations?
12
313
How many types of Communications Security (COMSEC) facilities are there?
4
314
Facilities that generate, process, or transfer unencrypted classified information by electrical, electronic, electro-mechanical, or optical means shall conform to the guidance and standards herein and which other series?
OPNAVINST C5510.93
315
A general Communications Security (COMSEC) inspection must be conducted prior to initial activation, where practicable, but in no case later than how many days after activation?
90
316
What must be conducted when facilities are initially activated or reactivated after foreign occupation, or when there is known or suspected access by foreign maintenance or construction personnel, or when clandestine surveillance or recording devices are suspected in or near a Communications Security (COMSEC) facility?
Technical Security Evaluation (TSE)
317
In a continuously manned facility, a security check will be conducted at least once every how many hours to ensure all classified COMSEC information is properly safeguarded, and that physical security protection system/devices (e.g., door locks and vent covers) are functioning properly?
24
318
What is the "End of Day Security Checklist" form number?
SF-701
319
Which type of inspection is designed to detect attempts at technical exploitation of Communications Security (COMSEC) equipment by tampering, bugging, key extraction, or reverse engineering?
Quadrant
320
Which type of area that, when staffed, must be occupied by two or more appropriately cleared individuals who must remain within sight of each other?
No-Lone Zone (NLZ)
321
Windows less than how many feet above the ground at an unattended fixed secure telecommunications facility, measured from bottom of the window, or are easily accessible by means of objects directly beneath that window, will be covered by an IDS?
18
322
Unattended fixed secure telecommunications facilities must be inspected at approximately how many-day intervals to confirm the integrity of the facility?
30
323
Which term is defined as the area within a structure occupied by a DoD bulk encryption facility?
Space
324
Which term is defined as the structure that contains a space?
Site
325
What manages the authorized allowance of Communications Security (COMSEC) material as validated by the Immediate Superior in Command (ISIC) of the command?
CMIO Norfolk
326
What is the primary means used by the Central Office of Record (COR) to obtain Point Of Contact (POC) data for Electronic Key Management System (EKMS) Accounts?
Common Account Data (CAD)
327
How often at a minimum must Communications Security (COMSEC) account managers review and update Common Account Data (CAD)?
Semi-Annually
328
Shipboard allowances for Communications Security (COMSEC) equipment, related devices, equipment annuals and operating instructions by shiptype and/or design are based, in part, upon the guidance in which series?
OPNAVINST 2300.44
329
Chief of Naval Operations (CNO) validation and approval is required for all cryptographic equipment and associated ancillary devices. Further guidance related to equipment allowances , transfers, recertification, etc... can be found in which series?
EKMS-5
330
Reserve-on-Board (ROB) levels typically range from how many months of keying material?
2-6
331
Each Communications Security (COMSEC) Account Manager must review their holdings at a minimum of how often to ensure a continuing need for the quantity and types of all Communications Security (COMSEC) material held still exists?
Annually
332
Superseded material received in a Reserve-on-Board (ROB) shipment must be destroyed within how many hours of opening the shipment?
12
333
Three months of Reserve-on-Board (ROB) is standard for most Electronic Key Management System (EKMS) accounts, however, some COMFLT/TYCOM identified units are authorized to hold how many months of material to support extended operations?
7
334
A request to increase Reserve-on-Board (ROB) levels for Short Titles the account is validated for requires at least 60 days notice if material is shipped via Defense Courier Service (DCS). A request to decrease a Reserve-on-Board (ROB) level requires a minimum of how many days notice?
14
335
The United States Transportation Command, Defense Courier Division (USTRANSCOM TCJ3-C) operates a network of how many stations to provide the secure, timely and efficient global distribution of classified and sensitive material for the U.S. Government and its allies?
18
336
Requests for Special movements will be processed and entered into Defense Courier Service (DCS) within how many hours or less?
48
337
Regardless of grade or position, personnel picking up material from Defense Courier Division (DCD) must be authorized by the current CO/OIC of the account as reflected on which form on file with the servicing Defense Courier Division (DCD) station?
Form-10
338
Which form reflects Communications Security (COMSEC) Account Managers and Alternates authorized to receipt for and courier Communications Security (COMSEC) material between their command and the COMSEC Material Issuing Office (CMIO)?
CMS Form 1
339
A routine modification to a command's authorized allowance for physical keying material can be met by regular Defense Courier Service (DCS) delivery (minimum of how many days lead-time)?
60
340
Who is the approving authority for any increase in allowance related to Communications Security (COMSEC) equipment?
Chief of Naval Operations (CNO)
341
Requests for standard deployment keymat, as listed in the COMFLT, TYCOM, or CG area instructions, must be submitted a minimum of how many days before departure from homeport?
60
342
COMSEC Material Issuing Office (CMIO) will respond to requests for electronic key within how many hours?
48
343
LMD/KP-equipped Electronic Key Management System (EKMS) accounts are authorized to generate which key locally without prior authorization from Naval Communications Security Material System (NCMS)?
AL Code 7
344
Which series contains a list of equipment types the Key Processor (KP) is capable of producing keys for?
EKMS 704
345
Electronic Key Management System (EKMS) accounts are encouraged to generate their own AL Code 7 key for cryptonets of how many or less nodes?
10
346
Temporary transfers of Communications Security (COMSEC) equipment will be in accordance with which series?
EKMS-5
347
Regardless of format, temporary transfer of keying material is restricted to no more than two editions and a period not to exceed how many months?
3
348
Afloat commands which are permanently re-locating to a homeport in a different ocean area must inform Naval Communications Security Material System (NCMS) and the COMSEC Material Issuing Office (CMIO) of new OPAREA physical Communications Security (COMSEC) material requirements how many days prior to departure from their present homeport?
60
349
Each Electronic Key Management System (EKMS) account will establish and maintain how many different Communications Security (COMSEC)-related files?
4
350
What is the "Secure Data Network System (SDNS) Key Order Requests form number?
CF Form 1050
351
How often are Account Managers authorized to generate an inventory for material issued and have (2) Local Element (LE) personnel conduct an inventory of all material issued and sign/return the inventory to the Communications Security (COMSEC) Account Manager?
Semi-annually
352
The Local Custody File must contain a signed document (i.e., SF-153 or locally prepared equivalent form) for each item of Communications Security (COMSEC) material issued to authorized LEs. Material issued to personnel who have signed for Communications Security (COMSEC) material who go on leave or TAD in excess of how many days or who transfer, are reassigned or retire must be returned within Local COMSEC Management Software (LCMS) to the COMSEC Account Manager and reissued?
30
353
Which form is used to document the receipt, transfer, destruction, inventory, possession, relief from accountability and generation of COMSEC material?
SF-153
354
A transfer is the movement of Communications Security (COMSEC) material, hardcopy or electronic, between two Electronic Key Management System (EKMS) accounts. How many types of transfers are there?
2
355
The physical transfer of AL Code 1, 2, or 4 material between Department of the Navy (DoN) accounts requires a hard copy of which form to be enclosed with the material?
TRI SF-153
356
The physical transfer of all AL Code 1, 2, or which other Communications Security (COMSEC) material involving a DON EKMS accounts must be reported to the COR via a TRI EKMS Transaction prepared by the account transferring the material?
6
357
Except in cases of extreme emergency (e.g., enemy attack, civil uprising, or natural disaster, or terrorism), Communications Security (COMSEC) material must always be destroyed by how many appropriately cleared and authorized persons?
2
358
Local destruction records are optional for AL Code 4 and which other Communications Security (COMSEC) material classified CONFIDENTIAL and below, regardless of CRYPTO markings?
7
359
What provides the interface for the operator to direct the destruction of locally held electronic key, request and confirm destruction of material by a non-Local Management Device (LMD) account or Local Element (LE), report destruction to a superior account, and process electronic destruction reports from an account?
Local COMSEC Management Software (LCMS)
360
Which form is used to return AL Code 1 or 2 Communications Security (COMSEC) material to proper accountability controls?
SF-153
361
Which type of expired credentials are the most common reason an account cannot reconcile for received Bulk-Encrypted Transactions (BETs)?
FIREFLY
362
Communications Security (COMSEC) Account Managers must report receipt of corrupt Bulk-Encrypted Transactions (BETs) within how many business days of downloading the Bulk-Encrypted Transaction (BET)?
3
363
What are generated by originators of Communications Security (COMSEC) material transfers at specified time intervals to notify the intended recipient of overdue receipts?
Tracers
364
How many days from the date of a shipment is the first tracer sent?
30
365
How many days from the date of a shipment is the second tracer sent?
40
366
How many days from the date of a shipment is the third tracer sent?
50
367
Shipment originators that do not receive a communication or a receipt from the intended recipient within how many days of the date of the first tracer action will generate a Communications Security (COMSEC) Material Incident Report ("Physical Incident")?
60
368
Failure to respond to a final tracer notice from the Central Facility (CF) may result in the Modern Key being marked as compromised and placed on which list?
Compromised Key List (CKL)
369
What is the process through which received accountable material is added to the local account's data base?
Reconciliation
370
Most Communications Security (COMSEC) material is shipped from the United States National Distribution Authority (USNDA), COMSEC Material Issuing Office (CMIO) and other accounts via which service?
Defense Courier Service (DCS)
371
Which up-to-date form is required to be on file at the COMSEC Material Issuing Office (CMIO) for pick-ups or turn-in of material?
CMS Form 1
372
Local COMSEC Management Software (LCMS) supports reconciling of electronic and hard copy receipts for material received and material distributed. How many functions are available for reconciling received material?
3
373
What are conducted to ensure the completeness of Communications Security (COMSEC) material?
Page checks
374
How often must all Communications Security (COMSEC) material (including equipment and publications) assigned AL Code 1, 2, 4, 6, and 7 be inventoried?
Semi-annually
375
The Central Office of Record (COR) must be notified via official naval message or digitally-signed PKI email no later than how many days prior to the start date of a Change of Manager inventory?
10
376
How many types of Electronic Key Management System (EKMS) inventories are there?
5
377
Procedures for electronic submission of a Semi-Annual Inventory Report (SAIR) can be found in which series?
EKMS-704
378
The Central Office of Record (COR) will monitor the response to inventory transactions and will notify commands that fail to return a reconciled inventory within how many days?
30
379
Surface units conducting either crew or hull swaps must notify the Central Office of Record (COR) via naval message no later than how many days prior to the turnover?
120
380
Which report satisfies National and Navy policy which requires an inventory be completely conducted, documented, reported to and reconciled by the Central Office of Record (COR) to document a Change of Communications Security (COMSEC) Account Manager?
Change of Custodian Inventory Report (CCIR)
381
Which inventory is a primary management tool intended to assist Communications Security (COMSEC) Account Managers in determining the health and status of the account?
Change of Account Location (COAL)
382
A new Communications Security (COMSEC) Account Manager must be appointed and a Change of Manager Inventory conducted if the COMSEC Account Manager is or will be absent for more than how many days?
60
383
Material in the custody of a Crypto Repair Facility (CRF) or a maintenance pool for less than how many years may be inventoried by sighting the local custody document for the material?
1
384
What is automatically generated by the Central Office of Record (COR) upon submission of an Electronic Key Management System (EKMS) inventory?
Inventory Reconciliation Status Transaction (IRST)
385
Which form must be completed by every person with access to cryptographic information?
SD-572
386
Except as permitted by the respective Operational Security Doctrine (OSD) for the device, Communications Security (COMSEC) keying material in either hard copy or electronic form marked or designated CRYPTO, may not be issued any earlier than how many days prior to the effective period (month) of the material without prior authorization of the Controlling Authority (CONAUTH)?
30
387
If keying material is issued to a LE via a FD, the loading of the FD and issue can only occur just before the planned mission. If a SKL or TKL is used, loading of the encrypted key may occur how many hours prior to the planned mission?
24
388
Electronic key in a FD superseded during a mission will be zeroized within how many hours of supersession?
12
389
Within how many working days of receipt, EKMS key transactions stored on removable media must be uploaded to the LMD or LMD/KP, as applicable, and the media destroyed by burning or melting or returned to DIRNSA for destruction?
3
390
What is the only functioning entity under the Cryptographic Equipment Exchange Program (CEEP)?
CRF San Diego
391
KGV-68Bs installed in missiles are considered embedded Communications Security (COMSEC) and are accountable within the (COMSEC) Material Control System (CMCS) as which items?
ALC 2
392
How many KGV-68Bs are typically installed in each missile?
2
393
Items returned to the Communications Security (COMSEC) Account Manager prior to the end of the month reflected on the watch-to-watch inventory will be done using which form and lined out from the date of return on the watch-to-watch inventory and be initialed by two Local Element (LE) personnel?
SF-153
394
What is the reproduction of less than an entire copy of COMSEC material called?
Extract
395
Extracts of other Communications Security (COMSEC) material, including keying material not marked CRYPTO, do not have to be documented on local custody forms. This material must be handled and accounted for based on its assigned classification in accordance with which publication?
SECNAV M-5510.36
396
Communications Security (COMSEC) Account Managers who transfer AL Code 4 publications to another Electronic Key Management System (EKMS) account must forward all amendments or corrections to the command(s) holding the basic publication for a period not to exceed how many days?
90
397
Destruction of amendment residue may be verified in one of how many ways at the option of the Communications Security (COMSEC) Account Manager?
2
398
Classified and unclassified amendment residue must be destroyed as soon as possible but no later than how many working days after an amendment entry?
5
399
Keying material marked or designated as what is the most sensitive item of COMSEC material?
CRYPTO
400
Which Communications Security (COMSEC) keying material report is a two-sided document used to record destruction of individual, one-time keying material segments of Communications Security (COMSEC) material?
CMS 25
401
What is used to record destruction of multiple copy segments (i.e., 1/01, 1/02, 1/03, etc.) of COMSEC keying material packaged in canisters?
CMS 25MC