106: Security Flashcards

(20 cards)

1
Q

106.1
Discuss the purpose of personnel security

A

make a reasonable determination that individuals with privileged access to classified information will remain loyal, reliable, and trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

106.2
Define, tell how they differ, and identify color codes of:
a. TOP SECRET
b. SECRET
c. CONFIDENTIAL
d. UNCASSIFIED

A

TOP SECRET - orange; exceptionally grave damage to national security
SECRET - red; serious damage to national security
CONFIDENTIAL - blue; damage to national security
UNCLASSIFIED - green; available to the general public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

106.3
Explain what is meant by ‘need to know’

A

you may have clearance, but knowing the information isnt necessary to carry out tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

106.5
Identify what a SAER is and its purpose

A

Security Access Eligibility Report
used to identify any change in clearance eligibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

106.6
Identify the events that should be reported to the SSO

A

financial issues
legal issues
unauthorized absence
mental illness
marriage to a foreign national
anything that could question your character, integrity, physical and mental health needs to be reported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

106.8a
Identify the use of an SF700

A

Security Container Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

106.8b
Identify the use of an SF701

A

Activity Security Checklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

106.8c
Identify the use of an SF702

A

Security Container Check Sheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

106.8d
Identify the use of an SF703

A

Top Secret Cover Sheet (Orange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

106.8f
Identify the use of an SF312

A

Classified Information NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

106.9
State when safe combinations should be changed

A

when a combination lock is first installed or used
when a combination is believed to be compromised
after safe maintenance
when considered necessary by the CSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

106.12a
Describe the procedures for preparing hard copy classified material for transportation via DCS

A

Defense Courier System - below 300lbs; properly addressed (no APO/FPO or street addresses); no postage and fees paid indicators; no outer special, security, or classification markings unless previously approved by DCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

106.12b
Describe the procedures for preparing hard copy classified material for transportation via Handcarry

A

use a classified material covering when within the command; double wrap when outside the command; locked briefcase is ok except on commercial aircraft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

106.15a
Define RAM

A

Random Antiterrorism Measures; implemented without a set pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

106.15b
Define PSP

A

Personnel Security Program; used to authorize initial and continued access to classified information and/or assignment to sensitive duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

106.15c
Define ATFP

A

Anti-Terrorism Force Protection; actions taken to prevent or mitigate hostile actions against DoD personnel, resources, facilities, and critical information

17
Q

106.18
State who can give the order to initiate Emergency Destruction

18
Q

106.23a
Explain the security requirements for a SCIF

A

Category 1 (exterior wall is in an uncontrolled area)
Category 2 (exterior wall is in a controlled area)

19
Q

106.23b
Explain the security requirements for a TSCIF

A

appearance and construction standards or standard shipping container with lights, AC outlets, data ports, and an HVAC system with only power, phone/data, and outside air inputs

20
Q

106.25
Discuss the need for access lists, required documentation logs, and two-person integrity

A

access lists specify who/what is allowed access; documentation logs include visitor logs, event logs, and deck logs within a space; TPI is required to prevent loss or compromise of classified material