• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/133

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

133 Cards in this Set

  • Front
  • Back
The layer of EKMS comprised of the EKMS accounts that manage key and other COMSEC material.
Tier 2
____ exercises overall authority for all Coast Guard telecommunications issues, including COMSEC matters
Tiscom
Each EKMS Tier 2 account is assigned and identified by a ___ digit EKMS account number which also serves as the account's EKMS ID.
Six-digit
___ AL codes are used to identify the mimimum accdounting controls required for COMSEC material.
Five
AL code _: COMSEC material is continuously accountable to the COR by quantity from production to destruction.
AL Code 2
EKMS Inspectors must be retrained every __ months to maintain their authorization to inspect EKMS accounts.
36
During the temporary absence of the EKMS Manager, the Alternate Manager must administer the account. However, the Alternate Manager may not administer the account for more than __ days.
60
Resident aliens who are U.S. Government civilian, military, or contractor personnel that have been lawfully admitted into the U.S. and have been granted a final clearance based on a background investigation, may be granted access to COMSEC material classified no higher than ____.
CONFIDENTIAL
What does EKMS 3, annex D cover?
Inspection Guide Vault
What EKMS tier is referred to as the Central Facility?
Tier 0, NSA
The SKL is what AL code?
AL1
The KSV-21 card is what AL code?
AL1
How many types of Comsec Incidents?
3, Personal, Physical, and Cryptographic
How many different reports are there in a Comsec Incident?
4, Initial, Amplifying, Final, Interim
How often are Comsec Inventories conducted?
Semianually, by EKMS account number
How often are COMTAC inspection conducted?
Annually
What does SIPRNET stand for?
Secret Internet Protocol Router Network
What is the classification of a onetime keying material destruction report when filled in?
Confidential
What do you record destruction of a single one time keying material on?
CMS 25
What is the classification of a KYV-5 that has no crypto in it?
Unclassified CCI
What must be put in a KG-84C in order to receive key?
KEK, Key encryption key
What type of battery is in the SKL?
Lithium Ion
Who do you notify if someone that has access to classified material and commits or attempts to commit suicide?
Security Manager
____ The layer of the EKMS which serves as the intermediate key generation and distribution center, central offices of record (COR), privilege managers, and registration authorities for EKMS/COMSEC accounts.
Tier 1
All Interim security clearances shall be granted by the ____.
SECCEN (M5520.12C)
Registered Mail shall be treated as _____.
SECRET
_____ is the program manager for the Coast Guard Classified Information Management Program and overseas the overall Security Program.
COMDT
Safe combinations must be changed at least ______.
Annually
When a safe is taken out of service, the combination shall be reset to ______.
50-25-50
What is the SF-700 and long do you retain it?
Security Container Information, Retain for 3 months
What manually is COMDTINST M5510.23A?
Classified Information Management Program
The unauthorized disclosure of ____ information could be expected to cause serious damage to the national security.
Secret
The unauthorized disclosure of ____ information could reasonably be expected to cause damage to national security.
Confidential.
The unauthorized disclosure of ______ information could reasonably be expected to cause exceptionally grave damage to the national security.
Top Secret.
An _______ shall be developed for protecting, removing or destroying classified information in case of fire, natural disaster, civil disturbance, terrorist activities, or enemy action
Emergency Action Plan (EAP)
New purchases of combination locks for GSA-approved security containers, vault doors and secure rooms conform to Federal Specification _______.
FF-L-2740A
Only authorized persons having an appropriate security clearance and ______- may change combinations to security containers, vaults, and secure rooms used for the storage of classified information.
Need-to-know.
Combination padlocks are reset to the standard combination?
10-20-30
All _____ information shall be strictly accounted for and covered by a continuous chain of signature recipts.
Top Secret
What Manual is COMDTINST M2600.1?
COMTAC publications Policy and Procedures Manual
Records of destruction shall be retained for ____ years from the date of final disposition for Top Secret materials.
Five
Units located outside the 50 United states and all deployable units shall include in their Emergency Action Plan (EAP) a "___________" for the disposition of classified information during an emergency.
Destruction Bill
Any Coast Guard member, military, civilian, contractor, Auxiliarist or other person associated with the Coast Guard, having knowledge of the loss, unauthorized disclosure, or possible compromise of classified information, sabotage, espionage or other subversive activites, sall immediatel advise his/her ____ within 24 hours or the next business day.
CSO
What manual is COMDTINST 5530.1?
U.S. Coast Guard Physical Security and Force Protection Program
Tier __ Central Facility Composite of NSA's Fort Meade and Finksburg Key Facilities that provides centralized key management services for all forms of key.
Tier 0
AL Code __ Comsec material is continuosusly accountable to the Central Office of Record by accounting serial/register number from production to destruction.
AL Code 1
Destroy Classified Material: How small must the particles be if shredding a document?
Burning, Shredding, particles 1/32 of an inch in width by 1/2 inch in length.
How long must an individual's access history be maintained at the Command Level after the member is no longer part of the unit?
An individual's access history will be maintained at the command level for a period of four years after transfer, discharge or retirement
Which Accountability legend (AL) Code is accountable to the COR by serial/register from production to destruction?
AL Code 1
Who controls the COMSEC library?
EKMS Manager
What are the four categories of a COMSEC Library?
Chrono file, Correspondence and Message File, General Message File, and a Local Custody File.
How often should you inspect SF-700s?
Monthly
What are the 3 forms a safe is required to have?
SF-700, SF-702, OP form 89
Local destruction records for Secret and Top Secret must be retained for how long?
Local destruction records for S and TS must be retained for 90 days.
This contains a copy of each effective directive of the command and higher authority that relates to CMS matters?
Directive File
The layer of EKMS which servies as the intermediate key generation and distridution center, Central Office of Record, Privilege Certificate Manager.
Tier 1
This layer of EKMS comprised of EKMS accounts that manage key and/or other COMSEC material.
Tier 2
What is a SF-700 used for?
Storing of combinations (envelope)
What is a Q Clearance?
Dept of Energy, equivalent to a TS
What are the 3 categories of Comsec Incident?
Cryptographic, Personnel, and Physical
What is a SF-701 used for?
Activity Security Checklist
What type of Incident is this: Use of comsec keying material that is compromised, superseded, defective, previously used, or incorrect application of keying material?
Cryptographic Incident
What type of Incident is this: Use of COMSEC equipment or device that has not been approved by NSA?
Cryptographic Incident
What is a SF-702 used for?
Security Container check sheet.
What type of Incident is this: COMSEC improperly packaged or shipped?
Physical Incident
What is the number of feet inside of a fence that must be maintained as a clear zone?
30 ft
Who is responsible for EKMS Spot checks?
CO
The contractual agreement between the U.S. Government and you, in which you agree to never disclose classified information to an unauthorized person is?
SF 312 non disclosure agreement
Who is responsible for maintaining a list of all persons assigned to a unit with access to classified info?
CSO
What form is used to request a clearance?
CG-5588
How often are EKMS Spot Checks Conducted?
Quarterly
All registered mail shall be protected as ___ until delevered to the SCP?
Secret
What level of access is granted for a green badge with white background?
UNCLASS
Interim Top Secret Clearance is valid for a period of time not to exceed ____.
6 months
A district SECMGR shall be a GS-___ or above?
GS-13
Who must you obtain permission from before making a copy of a Top Secret document?
The Orginator
If COMSEC equipment needs to be repaired, where do you send it?
Crypto Repair Facility (CRF)
What are the four types of COMSEC Incidents reports?
Initial, Amplifying, Final and Interim
How soon after establishing a COMTAC account at a newly commissioned unit should it be inspected?
6 months
Accountability records for TS and Secret information shall be retained for?
4 years after final dispostion
What SOP shall be affixed to the outside front of the container?
Steps to be taken if the container is found open
SF-702s are retained for how long?
3 Months
What is a SF-703?
Top Secret cover sheet
Superseded classified CD-ROMs should be?
Sent to NSA for disposal.
What are two variants of Local Elements?
LE (Using) and LE (Issuing)
AL CODE ___COMSEC material that is electronically generated and locally accountable to the generating facility.
AL CODE 7
AL CODE ___ After initial receipt to the Central Office of Records (COR) COMSEC material is locally accountable by quantity and handled/safeguarded based on its classification.
AL CODE 4
All EKMS accounts must undergo a formal CMS inspection and EKMS audit every ___ months. This inspection is unannounced.
24 months.
CMS inspectors must be retrained every __ months to maintain their authorization to inspect CMS accounts.
36 months
All EKMS accounts are required to receive a training visit every ___ months.
18 months.
There are three categories of Type 1 keying material: Operational Key, Seed Key, and ___ key.
Test Key
Local destruction records are mandatory for all AL CODES 1, 2, and __ comsec material regardless of classification.
6
CMS __ is a two-sided document used to record destruction of individual, one-time keying material segments of comsec material.
CMS 25
What in COMDTINST M5500.13A?
AIS Security Manual
A risk assessment shall be accomplished every ___ years for existing installations and facilities.
Five.
Newly commissioned units shall be inspected within __ months of commissioning.
6 months
Inventory all COMTAC material upon relief of the CO, Relief of the PCO and at least _____.
Annually.
Emergency power systems shall be tested monthly and the records maintained for __ .
1 Year
An interim security clearance for Secret and Confidential is valid for a period not to exceed ____ days.
270
What form must be used as a permanent record of all repairs/parts replacement and retained for the service life of the security container/vault door.
Optional form 89
What type of COMSEC incident is this:
Unauthorized disclosure of Personal Identification Numbers (PINs) and/or passwords that are used on systems, which also allow access to COMSEC material/information.
Personnel Incident
What type of COMSEC incident is this:
Unauthorized access to COMSEC material by uncleared persons.
Physical Incident
Superseded COMSEC material received in an ROB
shipment must be destroyed as soon as possible but always within __ hours of opening the shipment.
12
The Local Custody File must contain a signed document (i.e., ____ or locally prepared equivalent form) for each item of COMSEC material charged to the account which has been issued to authorized LEs.
SF-153
COMSEC Material Accounting Reports ____are used to document the; receipt, transfer, destruction, inventory, possession, relief from accountability and generation of COMSEC material and provide an audit trail for each item of accountable COMSEC material. These reports may be prepared manually or be computer generated.
SF-153
The ______ transfer of AL Code 1, 2, or 4 material between DON accounts requires a hard copy TRI SF-153.
Physical
N
ATO Classified information in the Coast Guard’s possession shall be safeguarded in accordance with the U.S. Coast Guard NATO Security Manual, COMDTINST _____ (series) and is not discussed further within this section.
5500.19
The cover, first page, and title page (if any) must be prominently marked at the ___ and _____ of the page with the highest classification of information contained within the document
Top and Bottom
Upon the expiration of certification, an individual may not derivatively classify until he/she is re-certified. A waiver, not to exceed __ days, may be granted by the DCMS-34, depending upon operational circumstances.
60 days
Portion Marking. When using more than one classified source document in creating a derivative document, portion mark the classified information incorporated in the derivative document with the level indicated on the source documents. Portion mark all other unclassified portions “(U)”. In exhibit 3-2, paragraph one of the derivative document incorporates “Secret” information from paragraph one of source 1 and paragraph two of the derivative document incorporates “Confidential” information from paragraph two of source 2. The remainder is unclassified.
read
Enter the standard notation “__________” on the “Derived from” line of the derivative document to indicate that more than one classified source was used.
Multiple Sources
Subject lines shall be portion marked to reflect the sensitivity of the information in the subject line itself and shall not reflect any classification markings for the e-mail content or attachments. Subject lines and titles shall be portion marked before the subject or title.
read
For a classified e-mail, the classification authority block shall be placed after the _______ block, but before the overall classification marking string at the end of the e-mail. These blocks may appear as single linear text strings instead of the traditional appearance of three lines of text.
SIGNATURE
The Security Container Information, Form SF ___ Part 1, shall be affixed to the inside of the locking drawer or inside of the door and is to be maintained for each vault, secure room, or security container used for the storing of classified information
700
Classified document cover sheets (Standard Forms (SF) 703(TS), 704(S), and 705(C)) are placed on classified documents when not in a ___ approved storage container.
GSA
Use the Standard Form (SF) ___, "Activity Security Checklist”, to record such checks. An integral part of the security check system is the securing of all vaults, secure rooms, and containers used for the storage of classified material;
701
Standard Form ___, "Security Container Check Sheet," is placed on or near each security container/vault/secure room and used to record all openings and closing.
702
An Emergency Action Plan (EAP) shall be developed for protecting, removing or destroying classified information in case of ____, natural disaster, civil disturbance, terrorist activities, or enemy action.
Fire
The EAP(s) shall be maintained in the locking drawer of the security container in the first folder closest to the lock. The EAP(s) are reviewed for currency at least ____ a year.
Once
The frequency of the EAP tests shall be at the discretion of the Commanding Officer, but no less than ___ per year.
Once
As of 1 October 2012, the S&G 8077A/AB padlock will no longer be authorized for use for the protection of classified information*.
read
For commands located outside the U.S. and its territories and deployable commands, planning must include both an Emergency Action Plan (EAP) for natural disasters and an Emergency Destruction Procedures (EDP) for ______ action.
Hostile
The three options available in an emergency are: securing the material, removing it from the scene of the emergency, or destroying it. Planners must consider which of these options may be applicable to their command.
read
Three categories of COMSEC material that may require destruction in hostile emergencies are: COMSEC keying material, COMSEC-related material (e.g., maintenance manuals, operating instructions, and general doctrinal publications), and equipment.
read
What three ways is COMSEC material superseded?
Regular, Irregular, and Emergency.
Superseded keying material on board an _______ is exempt from the 12-hour destruction standard.
Aircraft
The local key Encryption Key (LKEK) is superseded and must be updated every ___ months.
Three
A receipt must be forwarded within __ hours after receiving COMSEC material
96
CMS _ is used to verify equipment modifications
CMS 5
Unissued keymat may be held until the end of the month destruction, but must be bestroyed no later than ____ working days after the month in which supersession occurs.
Five
Destruction of COMSEC equipment will NOT be destroyed at the local command level, but will be disposed of as directed by DCMS//30//. Destroy within __ days of receipt of the destruction authorization.
90 days
Local destruction records are mandatory for all ALC 1,2, and _comsec material regardless of classification.
6
What does NCIRES mean?
National Comsec Incident Reporting and Evaluation System