Basic COMSEC Policies and Procedures
Exam Questions With Verified Answers.
Which best describes the purpose of COMSEC? - answer✔Denies adversaries access to
information
Which of the following measures is taken to ensure the authenticity of information? -
answer✔COMSEC
What COMSEC component provides protection from interception and exploitation? -
answer✔Transmission Security
Tier 0 - answer✔Consists of the key production facilities and NSA's Central Office of Record.
Provides centralized key management services for all forms of COMSEC key
Tier 1 - answer✔Intermediate key generation and distribution center, Central Office of Record
(COR), and privilege managers for COMSEC accounts
Tier 2 - answer✔Layer of COMSEC Material Control System (CMCS) comprised of the
COMSEC Accounts that manage key and other COMSEC material
Tier 3 - answer✔End user of COMSEC equipment and/or material (LE)
Who is the Commanding Officer's primary advisor on matters concerning the security and
handling of COMSEC material and the associated record, reports, and audits? -
answer✔COMSEC Manager
At which Tier do LEs reside? - answer✔Tier 3
Which entity operates as part of the NSA and functions primarily as a high volume key
generation and distribution center? - answer✔Central Facility
Which of the following is used to distribute, control, and safeguard COMSEC material? -
answer✔CMCS
All COMSEC related information is covered within CMCS. - answer✔False
Effective key is key that is in the current period of time allowed for use. - answer✔True
, ©BRAINBARTER 2024/2025
For routine modification for material NOT previously authorized, managers must submit a
request how many days in advance? - answer✔60 Days
What term best describes the series of letters and numbers used to facilitate identification,
handling, accounting, and control of COMSEC material? - answer✔Short Title
Which of the following would be part of a short title for a United States Electronic Key? -
answer✔USEAD
The quantity of future editions of keying material (i.e., ROB) to be held by a COMSEC account
is determined by the CNO, CMC, COGARD TISCOM, FLTCINCs, and/or ISICs. -
answer✔True
Allowances are unique to the individual account. - answer✔True
Which are the responsibilities of the Controlling Authority? - answer✔Directs the establishment
and operations of cryptonet/circuits and manages the operational use and control of KEYMAT
assigned to a cryptonet/circuit. Manages traditional COMSEC material. Evaluates COMSEC
incidents and authorizes the issue/destruction of COMSEC material.
Which are the responsibilities of the CA/CMDAUTH? - answer✔Validates CF Form 1206 prior
to submission to Central Facility. Grants privileges to URs and associated key ordering
privileges. Manages modern key assets for a department, agency, or command
What type of accounts are Command Authorities responsible for establishing and managing? -
answer✔User Representatives
Who is responsible for managing traditional COMSEC material? - answer✔CONAUTH
Who manages Modern Key? - answer✔Command Authority
A CF Form 1205 is also known as a User Representative Partition Privilege Registration
Request. - answer✔True
What is a DAO code used to associate? - answer✔Ordering Privileges
When does a Modern Key expire? - answer✔One year from the date is was generated
How many spot check can CO delegate to XO? - answer✔Up to 2 of 4
How often should CO conduct spot checks? - answer✔Quarterly, at minimum
How often should Account Manager conduct spot checks? - answer✔Monthly, at minimum
What are the guidelines for Account Manager? - answer✔Inspect/Spot Check each LE, annually
, ©BRAINBARTER 2024/2025
How often must a CO perform spot checks? - answer✔Quarterly
Self-assessments must be conducted at least quarterly. - answer✔True
An access list is the only method allowed for a CO to "grant access in writing to a COMSEC
user." - answer✔False (a Designation or Appointment Letter for each individual may also be
used)
All COMSEC users must sign which document acknowledging access to COMSEC material? -
answer✔SD-572
What COMSEC component includes secure storage, limited access, life-cycle accountability,
and irretrievable destruction? - answer✔Physical Destruction
What type of information is needed by an adversary to develop measures or tactics to increase
their ability to exploit our vulnerabilities? - answer✔Mission Critical Information
Communications Security (COMSEC) is the prevention of unauthorized access to
telecommunications traffic, or to any written information that is transmitted or transferred. -
answer✔True
What is the purpose of Tier 0? - answer✔Centralized key management for all forms of COMSEC
key
Who is the end user that is responsible for the proper use, accountability, and destruction of
material assigned to their control by the COMSEC Manager? - answer✔LE
The CMCS consists of production facilities, COMSEC COR, distribution facilities (i.e., depots),
and COMSEC accounts - answer✔True
Which entity is responsible for administering the DON COMSEC program and is the service
authority for the DON? - answer✔NCMS
After verifying a command's assigned mission and communications capabilities, the ________
determine a command's authorized COMSEC material allowance. - answer✔CNO, CMC,
COGARD TISCOM, FLTCINCs. and/or ISICs
The KMI OMM is an example of a Maintenance and Operators Manual - answer✔True
A change in which of the following will justify an increase or decrease in an account's ROB
level? - answer✔Operational Requirements
The AMS in AMSH 1775 identifies this short title as being NATO material. - answer✔True
The purpose of ROB is to allow an account to sustain itself for a specified period of time in the
event of a deployment or operational commitment without the need of resupply. - answer✔True