Poor COMSEC practices do not increase the probability of information being modified or
used against us by the enemy to gain leverage and/or INTEL on U.S. objectives. (U1-
1.02) - answers True
What is the protective measure taken to ensure the authenticity of information? (U1-
1.01) - answers COMSEC
TEMPEST is a countermeasure of which of the following COMSEC Componet? (U1-
1.03) - answers Emission Security
What type of information is needed by an adversary to develop measures or tactics to
increase their ability to exploit our vulnerabilities? (U1-1.02) - answers Mission Critical
Information
The use of COMSEC denies adversaries access to mission critical information and
valuable intelligence that could be used to provide a clear picture of our _______. (U1-
1.02) - answers Dispositions, Intentions, Weaknesses (All of the above)
What system is used to distribute, control, and safeguard COMSEC material? (U1-2.04)
- answers CMCS
Which entity is responsible for the Administrative oversight of subordinate commands?
(U1-2.05) - answers Local Element
What is the purpose of Tier 0? (U1-2.06) - answers Centralized key management for all
forms of COMSEC key
Who is the Commanding Officer's primary advisor on matters concerning the security
and handling of COMSEC material and the associated records, reports, and audits?
(U1-2.07) - answers COMSEC Manager
, What office is responsible for shipping ready for issue equipment for the Navy? (U1-
2.05) - answers CMIO
KAMs are not considered COMSEC related information. (U2-1.03) - answers False
KAO is short title identifier for a Cryptographic Operators manual. (U2-1.04) - answers
True
What is the type of key that protects traffic on a circuit? (U2-1.01) - answers TEK
What does the first " A " represent in the following short title: AEAD 0000034354? (U2-
1.02) - answers Allied
After verifying a command's assigned mission and communications capabilities the
_________ determine a command's authorized COMSEC material allowance. (U2-1.05)
- answers CNO, CMC, COGARD TISCOM, FLTCINCs, and/or ISICs
The primary difference between CONAUTH and CA/CMDAUTH is Traditional vs
Modern Key. (U2-2.09) - answers True
Command Authorities manage Modern Key Assets for a department, agency, or
organization. (U2-2.09) - answers True
What type of message will a CONAUTH send to promulgate effective and supersession
information? (U2-2.08) - answers STATUS
How often must a COMSEC Account review their holdings to ensure a continuing need
for the quantity and all types of all COMSEC material held? (U2-1.06) - answers
Annually
What type of accounts are Command Authorities responsible for establishing and
managing? (U2-2.09) - answers User Representatives
Ordering Closed Partition Keys requires a CF Form 1205 and a CF Form 1206. (U2-
3.13) - answers True
Which of the following forms are required in order to establish a DAO code? (U2-3.11) -
answers CF Form 1202
What tool is available for download to track Modern Key expiration? (U2-3.12) -
answers Modern Key Tracker
How is Modern key obtained? (U2-3.10) - answers Ordered from COMSEC Central
Facility
A change in which of the following will justify an increase or decrease in an account's
ROB level? (U2-1.07) - answers Operational Requirements