3-35.
What is the purpose of
Two-Person Integrity?
1.
To prevent a single
person from having
access to COMSEC
material
2.
To prevent more than two
persons from having
access to COMSEC
material
3.
To provide for an
alternate custodian in
it.
the event the primary is
unavailable
4.
To allow for a division
of responsibilities
among the custodians
A.
CRYPTO
B.
Cryptoinformation
C.
Crypto-related
information
D.
Cryptosystem
Figure 3C
IN ANSWERING QUESTIONS 3-36 THROUGH
3-39, SELECT THE TERM FROM FIGURE
3C THAT IS DESCRIBED.
3-36.
Marking used to protect or
authenticate national
security-related information
on all keying material
associated equipment.
1.
A
2.
B
3.
C
4.
D
3-37.
Always classified and
normally concerns the
and
encryption or decryption
process of a cryptosystem.
1. A
2. B
3. C
4. D
25
3-38.
May be classified or
unclassified; normally
associated with
cryptomaterial but not
significantly descriptive of
1.
A
2.
B
3.
C
4.
D
3-39.
Encompasses all associated
items of cryptomaterial that
provide a single means of
encryption and decryption.
1.
A
2.
B
3.
C
4.
D
3-40.
A failure that adversely
affects the security of a
cryptosystem is known by
what term?
1.
Cryptoexposure
2.
Cryptoinstability
3.
Cryptodeficiency
4.
Cryptoinsecurity
3-41.
A system within a general
system confined to actual
encryption, decryption, or
authentication is known by
what term?
1.
Cryptovariable
2.
Specific cryptosystem
3.
Secondary cryptosystem
4.
Supporting cryptosystem
3-42.
The most frequently changed
element of a cryptosystem is
known by what term?
1.
Primary cryptovariable
2.
Secondary cryptovariable
3.
Crypto modifier
4.
Cryptosystem internal
variable