Across
- 4. Who is tier 0 in COMSEC
- 6. Form used to grant/revoke comsec access
- 8. 2 categories of PDS
- 10. Spot checks are conducted how often?
- 13. What tier is an LE Using
- 14. Inventories are conducted how often
- 18. Document used to store combinations
- 19. SKL's and TKL's are considered this
- 20. Only way to verify supersession date (___ Message)
- 24. Classification of SKL/TKL w/out CIK
Down
- 1. 3 Types of incidents (C/PE/PH)
- 2. Types of incident reports (I/A/F)
- 3. ____ Cryptopgraphic Item
- 5. Retention period for SF-701/SF-702 (days)
- 6. What ALC refers to locally generated keys
- 7. Who conducts a spot check? (__/__)
- 9. True or False, Deleting a key before expiration is an incident
- 11. True or false, TPI is required for Secret materiel
- 12. Document used for hand receipts
- 13. True or False, expiration of non NATO key is a PDS
- 14. Document used for in/out and guard checks
- 15. What time do keys officially expire (zulu)
- 16. Checklist used at the end of the day
- 17. Key Managment ____ (KMI)
- 21. What encryption type does the USMC use
- 22. What ALC refers to non-locally generated keys
- 23. Used to document maintenance to a lock
- 25. Under whose authority is a custodian appointed
- 26. The individual authorized to conduct DTD audits
