questions with 100% Correct Answers| Latest
Update
Poor COMSEC practices do not increase the probability of information being modified or used
against us by the enemy to gain leverage and/or INTEL on U.S. objectives. (U1-1.02)
True
What is the protective measure taken to ensure the authenticity of information? (U1-1.01)
COMSEC
TEMPEST is a countermeasure of which of the following COMSEC Component? (U1-1.03)
Emission Security
What type of information is needed by an adversary to develop measures or tactics to increase
their ability to exploit our vulnerabilities? (U1-1.02)
Mission Critical Information
,The use of COMSEC denies adversaries access to mission critical information and valuable
intelligence that could be used to provide a clear picture of our _______. (U1-1.02)
Dispositions, Intentions, Weaknesses (All of the above)
What system is used to distribute, control, and safeguard COMSEC material? (U1-2.04)
CMCS
Which entity is responsible for the Administrative oversight of subordinate commands? (U1-
2.05)
Local Element
What is the purpose of Tier 0? (U1-2.06)
Centralized key management for all forms of COMSEC key
Who is the Commanding Officer's primary advisor on matters concerning the security and
handling of COMSEC material and the associated records, reports, and audits? (U1-2.07)
COMSEC Manager
,What office is responsible for shipping ready for issue equipment for the Navy? (U1-2.05)
CMIO
KAMs are not considered COMSEC related information. (U2-1.03)
False
KAO is short title identifier for a Cryptographic Operators manual. (U2-1.04)
True
What is the type of key that protects traffic on a circuit? (U2-1.01)
TEK
What does the first " A " represent in the following short title: AEAD 0000034354? (U2-1.02)
Allied
, After verifying a command's assigned mission and communications capabilities the _________
determine a command's authorized COMSEC material allowance. (U2-1.05)
CNO, CMC, COGARD TISCOM, FLTCINCs, and/or ISICs
The primary difference between CONAUTH and CA/CMDAUTH is Traditional vs Modern Key. (U2-
2.09)
True
Command Authorities manage Modern Key Assets for a department, agency, or organization.
(U2-2.09)
True
What type of message will a CONAUTH send to promulgate effective and supersession
information? (U2-2.08)
STATUS