Deck 3 Flashcards

Get That MONEY!!!

1
Q

Pass and Advanced

  1. When is a computer system operating in the multilevel security mode?
A

When it provides a capability permitting various categories and types of classified materials to be stored and processed concurrently in a computer system and permitting selective access to such material concurrently by un-cleared users and users having differing security clearances and need-to-know.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pass and Advanced

  1. When is a computer system operating in the controlled security mode?
A

When at least some personnel (users) with access to the system have neither a security clearance nor a need-to-know for all classified material then contained in the computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pass and Advanced

  1. What data is unclassified data that requires special protection?
A

Sensitive unclassified data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pass and Advanced

  1. What Act imposes numerous requirements upon federal agencies to prevent the misuse of data about individuals, respect its confidentiality, and preserve its integrity?
A

The Privacy Act of 1974.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pass and Advanced

  1. What are the major provisions of the Privacy Act that most directly involve computer security?
A

Limiting disclosure of personal information to authorized persons and agencies; requiring accuracy, relevance, timeliness, and completeness of records; and requiring the use of safeguards to ensure the confidentiality and security of records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pass and Advanced

  1. What has the Navy established to assure protection for AIS processing of sensitive unclassified data?
A

The limited AIS access security mode. ‘

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Pass and Advanced

  1. When is a computer system or network operating in the limited access security mode?
A

When the type of data being processed is categorized as unclassified and requires the implementation of special access controls to restrict the access to the data only to individuals who by their job function have a need to access the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Pass and Advanced

  1. Why is AIS media protection important?
A

Because it is where data, information and programs are stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pass and Advanced

  1. What does the amount of protection depend on?
A

The classification of data, the type of AIS storage media used, the value of the material on it, and the ease with which the material can be replaced or regenerated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pass and Advanced

  1. What items are considered AIS media?
A

Magnetic tapes, disks, diskettes, disk packs, drums, cathode-ray tube (CRT) displays, hard copy (paper), core storage, mass memory stoarage, printer ribbons, carbon paper, and computer output microfilm and microfiche.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pass and Advanced

  1. For purposes of control, AIS media can be divided into what two types or categories?
A

Work copy media and finished media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Pass and Advanced

  1. What media is temporary in nature?
A

Work copy media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Pass and Advanced

  1. How long is working copy media retained?
A

180 days.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pass and Advanced

  1. What procedures are designed to ensure that an adequate level of protection is provided?
A

Your activity?s standard operating procedures (SOPs).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pass and Advanced

  1. Why is it important for your activity to have procedures for making AIS media?
A

To protect the media from unauthorized, accidental, or intentional disclosure, modification, destruction, or loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pass and Advanced

  1. What must each magnetic tape, diskette, and disk pack be externally marked with?
A

A stick-on label with the overall security classification and a permanently assigned identification number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Pass and Advanced

  1. When the tapes, diskettes, and disk packs are to be declassified by degaussing, when are all external labels indicating the classification not removed?
A

Not unless the media will be immediately used to store information of the same classification.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Pass and Advanced

  1. To what degree must the media be destroyed?
A

Beyond recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Pass and Advanced

  1. What provides the basis for an AIS security program?
A

The risk analysis and higher authority instructions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Pass and Advanced

  1. What are the steps to take that will help in planning an AIS security program?
A

Perform preliminary planning, perform a preliminary risk analysis, select and implement urgent ?quick fix? security measures, perform and document a detailed risk analysis, justify costs and document action plans, carry out the approved action plans, and repeat the detailed risk analysis and subsequent steps regularly, at least annually.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Pass and Advanced

  1. How can the AIS technical manager determine what changes, if any, should be made in the security program to keep it effective?
A

By evaluating changes in command mission, the local environment, the hardware configuration, and tasks performed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pass and Advanced

  1. What should you have a thorough knowledge of before implementing any security plan?
A

How numerous higher authority instructions relate to physical security, data protection, and security in general.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Pass and Advanced

  1. What are the instructions and manuals you can refer to in learning about AIS security and when making security decisions?
A

The Department of the Navy Automatic Data Processing Security, OPNAVINST 5239.1 with enclosures, Guidelines for Automatic Data Processing Risk Analysis, FIPS PUB 65 (enclosure 3 to OPNAVINST 5239.1), Department of the Navy Information Security Program Regulation, SECNAVINST 5510.36, and Department of the Navy Information Systems Security (INFOSEC) Program, SECNAVINST 5239.3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Pass and Advanced

  1. When planning a security program, what things should the AIS technical manager be aware of?
A

The types of threats that may be encountered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Pass and Advanced

  1. What should the AIS facility upper management begin development of the security program with?
A

A risk analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Pass and Advanced

  1. What is a risk analysis as related to AIS security?
A

The study of potential hazards that could threaten the performance, integrity, and normal operations of an AIS facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Pass and Advanced

  1. What is the first step to consider when preparing the risk analysis?
A

Estimate the potential losses to which the AIS facility is exposed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Pass and Advanced

  1. What is the objective of the loss potential estimate?
A

To identify critical aspects of the AIS facility operation and to place a monetary value on the loss estimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Pass and Advanced

  1. What is the second step of the risk analysis?
A

Evaluate the threats to the AIS facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Pass and Advanced

  1. What is the third step in the risk analysis?
A

Combine the estimates of the value of potential loss and probability of loss to develop an estimate of annual loss expectancy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Pass and Advanced

  1. What is the criteria to use when selecting specific remedial measures?
A

The annual cost is to be less than the reduction in expected annual loss that could be caused by threats, and 2) The mix of remedial measures selected is to be the one having the lowest total cost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Pass and Advanced

  1. What should be a key part of the AIS faciIity?s security program?
A

Fire safety.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Pass and Advanced

  1. What elements should fire safety include?
A

Location, design, construction, and maintenance of the AIS facility to minimize the exposure to fire damage, measures to ensure prompt detection of and response to a fire emergency, provision for quick human intervention and adequate means to extinguish tires; and provision of adequate means and personnel to limit damage and effect prompt recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Pass and Advanced

  1. What is the first factor to consider in evaluating the fire safety of an AIS facility?
A

The tire exposure results from the nature of the occupancy (material) of adjacent buildings and the AIS facility building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Pass and Advanced

  1. What does the degree of hazard associated with a given occupancy (material) depend on?
A

The amount of combustible materials, the ease with which they can be ignited, and the likelihood of a source of ignition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Pass and Advanced

  1. What are the second and third fire safety factors?
A

The design and construction of the building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Pass and Advanced

  1. What is the approximate destruction time of a heavy timber construction?
A

l plus hours.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Pass and Advanced

  1. What is the approximate destruction time of a wood frame construction?
A

Minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Pass and Advanced

  1. What is the fourth factor in fire safety?
A

The way in which the building is operated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Pass and Advanced

  1. What should be taken into consideration in the location and spacing of an effective fire detection system?
A

The direction and velocity of air flow, the presence of areas with stagnant air, and the location of equipment and other potential tire sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Pass and Advanced

  1. Fire extinguishment may be accomplished by using what four methods?
A

Portable or hand extinguishers, hose lines, automatic sprinkler systems, or volume extinguishant systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Pass and Advanced

  1. What is the minimum temperature required to activate an automatic sprinkler system?
A

13 5?F .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Pass and Advanced

  1. To ensure the effectiveness of portable extinguishers, what are the measures to be observed?
A

Extinguishers should be placed in readily accessible locations, not in corners or behind equipment, each location should be marked for rapid identification, and each extinguisher should have inspection tags.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Pass and Advanced

  1. What are power fluctuations, usually caused by inclement weather, that causes unpredictable results on hardware, logic, and data transfer referred to as?
A

Transients.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Pass and Advanced

  1. How can the effects of internal transients be minimized?
A

By isolating the AIS hardware from other facility loads.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Pass and Advanced

  1. If the AIS facility is in a remote area, what is usually required as a backup power source?
A

An uninterrupted power supply (UPS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Pass and Advanced

  1. Depending on the ampere-hour capacity of the battery (or batteries), how long can the UPS support its load without the prime power source?
A

A maximum of 45 minutes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Pass and Advanced

  1. If the risk analysis shows a major loss from power outages lasting 30 to 45 minutes or beyond, what can be installed?
A

An onsite generator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Pass and Advanced

  1. Is the physical protection of an AIS facility as stringent for an AIS facility that processes unclassified data as it is for an AIS facility that processes classified data?
A

No.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Pass and Advanced

  1. When the threat analysis indicates the need to protect the property boundary of the AIS facility, how can this be accomplished?
A

By installing fences or other physical barriers, outside lighting, or perimeter intrusion detectors, or by using a patrol force.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Pass and Advanced

  1. What should be taken into account in evaluating the need for perimeter protection?
A

The possibility that electromagnetic or acoustic emanations from AIS hardware may be intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Pass and Advanced

  1. What system provides a means of detecting and announcing proximity or intrusion that endangers or may endanger the security of a command?
A

The intnision detection system (IDS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Pass and Advanced

  1. What are the physical and personnel security requirements for the central computer facility area based upon?
A

The overall requirements of the total AIS system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Pass and Advanced

  1. What are the remote terminal area requirements based upon?
A

The highest classified and most restrictive category and type of material that will be accessed through the terminal under system constraints.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Pass and Advanced

  1. The approval and authority to authorize temporary exceptions to security measures for the DOD component?s system in the network requires how many components?
A

Two.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Pass and Advanced

  1. What person conducts au annual security survey of the AIS facility area?
A

The AIS technical manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Pass and Advanced

  1. What is prepared and executed for the accomplishment of the command?s specific mission?
A

Operation plans and the command?s organizational manual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Pass and Advanced

  1. What are the three types of contingency plans that make up a COOP security program for an AIS facility?
A

Emergency response, backup operations, and recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Pass and Advanced

  1. In reference to AIS security, what term is used to refer to steps taken immediately after an emergency occurs to protect life and property and to minimize the impact of the emergency?
A

Emergency response planning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Pass and Advanced

  1. If evacuation of work are as is ordered or likely, how should all personnel be instructed?
A

1)Put working papers and other unclassified material in desks or file cabinets and close them, 2) Turn off equipment, but leave room lights on, and 3) Close doors as areas are evacuated, but ensure that locks and bolts are not secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Pass and Advanced

  1. What should be defined in the loss control plan? `
A

The steps to be taken, assign responsibilities for general and specific steps, and provide any needed materials and equipment in handy locations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Pass and Advanced

  1. What factors should be considered to evaluate alternate backup modes and offsite facilities?
A

AIS hardware usage, transportation of military and civil service personnel with needed supplies and materials, maintenance personnel at the offsite location, and overtime cost factor for civil service personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Pass and Advanced

  1. What is a plan for backup operation that is not expected to extend much beyond the cause of delay which forces a shift to the backup operation?
A

Minimum duration plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Pass and Advanced

  1. What is a plan for backup operation for as long as it takes to reconstruct the AIS facility after total destruction?
A

A worst-case plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Pass and Advanced

  1. Each COOP backup plan should cover what five basic areas?
A

Performance specifications, user instructions, technical requirements for each AIS task, computer system specifications, and administrative information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Pass and Advanced

  1. What should be the final element of the AIS security program for every naval AIS facility?
A

A review or inspection process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Pass and Advanced

  1. What are the major factors to consider in determining the frequency of internal inspections?
A

The frequency of external inspections, the rate of change of the AIS, the amount and adequacy of controls, the threats that face the facility, the results of previous inspections, and the directions of higher authority.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Pass and Advanced

  1. What is one of the main principles in selecting an inspection team?
A

Members should not be responsible for AIS operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Pass and Advanced

  1. What does the size of the inspection team depend upon?
A

The size of the facility and the scope of the inspection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Pass and Advanced

  1. What must be developed to properly conduct an internal inspection of security?
A

A comprehensive inspection plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Pass and Advanced

  1. What is the first step of an inspection plan?
A

To examine the security policy for the AIS facility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Pass and Advanced

  1. What type of inspection is designed to test on a no-notice basis certain elements of security and control?
A

A surprise inspection. -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Pass and Advanced

  1. When a scheduled inspection is conducted, what is normally the first step?
A

. An interview with AIS personnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Pass and Advanced

  1. When is a good time for the inspection team to convene to review progress and to compare notes?
A

At the end of each day?s activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Pass and Advanced

  1. What information is included in the inspection report?
A

An executive summary, a description of the inspection, a detailed report of observations made, conclusions drawn from the observations, and recommendations for corrective actions, as appropriate. t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Pass and Advanced

  1. Who is responsible for implementing an inspection follow-up?
A

The commanding officer (CO) of the command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Pass and Advanced

  1. What instruction provides guidelines for use by all Navy organizations in implementing any security safeguards that they must adopt to implement the Privacy Act?
A

The Department of the Navy Information Systems Security (INFOSEC) Program, SECNAVINST 5239.3.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Pass and Advanced

  1. What instruction implements the Privacy Act and personal privacy and rights of individuals regarding their personal records?
A

The Department ofthe Navy Privacy Act (PA) Program, SECNAVINST 5211.5.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Pass and Advanced

  1. Who is responsible for administering and supervising the execution of the Privacy Act and SECNAVINST 5211.5 within the Department of the Navy and is designated as the principal Privacy Act coordinator for the Department of the Navy?
A

The Chief of Naval Operations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Pass and Advanced

  1. What is data integrity?
A

The state existing when data agrees with the source from which it is derived, and when it has not been either accidentally or maliciously altered, disclosed, or destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Pass and Advanced

  1. What is data security?
A

The protection of data from accidental or intentional, but unauthorized, modification, destruction, or disclosure.

82
Q

Pass and Advanced

  1. Safeguards that provide data protection are grouped into what three categories?
A

Physical security measures, information management practices, and computer system/network security controls.

83
Q

Pass and Advanced

  1. What is the first step toward improving a system?s security?
A

To determine its security risks.

84
Q

Pass and Advanced

  1. What three ways does a personal data security risk assessment benefits a command?
A

It provides a basis for deciding whether additional security safeguards are needed for personal data; it ensures that additional security safeguards help to counter all the serious personal data security risks; and it saves money that might have been wasted on safeguards that do not significantly lower the overall data risks and exposures.

85
Q

Pass and Advanced

  1. What is the goal of a risk assessment?
A

To identify and prioritize those events that would compromise the integrity and confidentiality of personal data.

86
Q

Pass and Advanced

  1. What does the seriousness of a risk depend on?
A

Both the potential impact of the event and its probability of occurrence.

87
Q

Pass and Advanced

  1. What individuals should make up the risk assessment team?
A

A representative of the operating facility supported by or having jurisdiction over the data under consideration, the programmer responsible for support of the operation or function under consideration, a representative from the facility responsible for managing AIS operations, a system programmer (if the command has system programmers in a separate functional area), a computer specialist assigned the responsibility for overseeing or inspecting system security; and the individual responsible for security.

88
Q

Pass and Advanced

  1. What are the most commonly encountered security risks?
A

Accidents, errors, and omissions.

89
Q

Pass and Advanced

  1. Commands designing large computer networks should consider what risks early in the planning stage?
A

Misidentified access, operating system flaws, subverting programs, spoofing, and eavesdropping.

90
Q

Pass and Advanced

  1. What techniques and procedures do information management practices refer to?
A

Those used to control the many operations performed on information to accomplish the com1nand?s objectives.

91
Q

Pass and Advanced

  1. What publication can you refer to for knowledge of personal identification and identification techniques?
A

The Guidelines on Evaluation of Techniques for Automated Personal Identification, FIPS PUB 48.

92
Q

Pass and Advanced

  1. What instruction contains guidelines for identification and access?
A

The Department of the Navy Information Security Program (ISP) Regulation, SECNA V1NST55I 0.36 (formerly OPNAVINST 5510.1).

93
Q

Pass and Advanced

  1. What are compromising emanations (CE)?
A

Unintentional data-related or intelligence-bearing signals, also referred to as ?TEMPEST?

94
Q

Pass and Advanced

  1. What determines the vulnerability ofa ship, aircraft, shore station, transportable equipment, or a contractor facility?
A

A TEMPEST Vulnerability Assessment.

95
Q

Pass and Advanced

  1. What TEMPEST Vulnerability Assessment factors create vulnerability?
A

Susceptibility, environment, and threat.

96
Q

Pass and Advanced

  1. What must be submitted prior to processing classified data?
A

A Tempest Vulnerability Assessment Request (T VAR).

97
Q

Pass and Advanced

  1. Is a TVAR required from any ship?
A

No.

98
Q

Pass and Advanced

  1. What is used to prevent an enemy from detecting, identifying, and locating friendly forces?
A

Emission control (EMCON).

99
Q

Pass and Advanced

  1. For lT?s, what does EMCON usually mean?
A

Either full radio silence or HF EMCON.

100
Q

Pass and Advanced

  1. What does the degree of security of spaces aboard ship and areas within a shore activity depend upon?
A

Its purpose and the nature of the work, information, equipment, or materials concerned.

101
Q

Pass and Advanced

  1. When may persons who have not been cleared for access to the information contained within an area, be admitted into an area?
A

When they are controlled by an escort at all times.

102
Q

Pass and Advanced

  1. Who is responsible for controlling access to restricted areas?
A

The commanding officer or the officer in charge over security spaces.

103
Q

Pass and Advanced

S03. Does anyone have a right to have access to classified information or spaces based solely on clearance, rank, or position?

A

No.

104
Q

Pass and Advanced

  1. What is used to record the arrival and departure of authorized personnel whose names do not appear on the access list?
A

A communications center visitors log (or register).

105
Q

Pass and Advanced

  1. What personnel may have access to NATO messages?
A

Only those personnel who hold a security clearance equal to or greater than the clearance required for U.S. material.

106
Q

Pass and Advanced

  1. What instruction is the authority for the proper handling, storage, accounting, classification, and clearances of NATO material?
A

NATO Security Procedures (U), OPNAVINST C5510. 101.

107
Q

Pass and Advanced

  1. Who does the final responsibility for determining whether a person is granted access to a security area rest upon?
A

The individual who has the authorized possession, knowledge, or control ofthe information involved and not upon the prospective recipient.

108
Q

Pass and Advanced

  1. What should you do if you find an open and unattended container or cabinet containing classified matter?
A

Report it to the senior duty officer; do not touch the container or contents, but guard them until the duty officer arrives.

109
Q

Pass and Advanced

  1. How often must the combinations of security containers containing classified information be changed?
A

At least every 2 years, unless more frequent change is dictated by the type of material stored within.

110
Q

Pass and Advanced

  1. When Top Security, Secret, and Confidential classification markings are used in a document, where should they be placed?
A

At the top and bottom center of each page.

111
Q

Pass and Advanced

  1. What is the symbol used to indicate paragraph classification for Top Secret?
A

TS.

112
Q

Pass and Advanced

  1. What is the symbol used to indicate paragraph classification for Confidential?
A

C.

113
Q

Pass and Advanced

  1. What is the marking ?Restricted Data? (RD) applied to?
A

All data concerned with the design, manufacture, or use of nuclear weapons, also the special nuclear material used in energy production.

114
Q

Pass and Advanced

  1. What does the marking ?Formerly Restricted Data? (FRD) pertain to?
A

Defense information that has been removed from the RD category but must still be safeguarded as classified defense information.

115
Q

Pass and Advanced

  1. When can FRD material be released to foreign nationals?
A

Under specific international agreement.

116
Q

Pass and Advanced

  1. What messages is the LIMDIS designator applied to?
A

Only classified messages which, because of the subject matter, require limited distribution within the addressed activity.

117
Q

Pass and Advanced

  1. What is the designation used on official information not requiring a security classification but which must be withheld and protected from public release?
A

FOUO (For Official Use Only).

118
Q

Pass and Advanced

  1. When is the special designation EFTO not required on unclassified messages?
A

When the unclassified messages are addressed exclusively among Navy, Marine Corps, and Coast Guard commands.

119
Q

Pass and Advanced

  1. What marking means special category?
A

SPECAT.

120
Q

Pass and Advanced

  1. What is the marking applied when message distribution must be limited to the named recipient?
A

PERSONAL FOR.

121
Q

Pass and Advanced

  1. What personnel may originate PERSONAL FOR messages?
A

Only flag officers, officers in a command status, or their designated representatives.

122
Q

Pass and Advanced

  1. Does the United States have a security classification equivalent to NATO RESTRICTED?
A

No.

123
Q

Pass and Advanced

  1. Since the United States does not have a security classification equivalent to ALLIED RESTRICTED, how are these messages handled?
A

In the same manner as Confidential messages.

124
Q

Pass and Advanced

  1. What functions do the accounting and control of classified messages serve?
A

Limit dissemination; prevent unnecessary reproduction; and determine the oice or person normally responsible for the security of the material.

125
Q

Pass and Advanced

  1. Who is responsible for the command?s overall security program, which includes the security of classified information, personnel security, and the command?s security education program?
A

Security manager.

126
Q

Pass and Advanced

  1. Who appoints the security manager?
A

The commanding officer.

127
Q

Pass and Advanced

  1. Who is responsible for the receipt, custody, accounting, and disposition of Top Secret material in the command?
A

Top Secret Control Officer (TSCO).

128
Q

Pass and Advanced

  1. Who is responsible to the security manager for the protection of classified information processed in the automated system?
A

The information System Security Officer (ISSO).

129
Q

Pass and Advanced

  1. What is the individual called who has possession of or is charged with the responsibility for safeguarding and accounting for classified material or information?
A

The ?custodian? of that material or information.

130
Q

Pass and Advanced

  1. What type of material does classified material exclude?
A

Communications security (COMSEC) material.

131
Q

Pass and Advanced

  1. What document may he used to record destruction of Top Secret material?
A

OPNAV form 5511/12, or any other record which includes complete identification of the material, number of copies destroyed, date of destruction, and personnel completing destruction.

132
Q

Pass and Advanced

  1. How long are the records of the destruction retained?
A

2 years.

133
Q

Pass and Advanced

  1. When may Top Secret documents be reproduced?
A

Only when granted permission of the originator or higher authority.

134
Q

Pass and Advanced

  1. What form is attached to Top Secret material that circulates within a command or activity?
A

A Record of Disclosure, OPNAV Form 5511/13.

135
Q

Pass and Advanced

  1. Who must sign the attached Record of Disclosure?
A

Each person having knowledge of the contents of a Top Secret document.

136
Q

Pass and Advanced

  1. Is there a requirement to maintain records of receipt, distribution, or disposition of Confidential material?
A

No, however, Confidential material must still be protected from unauthorized disclosure by access control and compliance with regulations on marking, storage, transmission, and destruction.

137
Q

Pass and Advanced

  1. What instruction contains specific procedures on security requirement for handling and storing AIS material?
A

The Department of the Navy Automatic Data Processing Security Program, OPNAVINST 523 9.1.

138
Q

Pass and Advanced

  1. How is destruction of superseded and obsolete classified materials that have served their purpose termed?
A

?Routine destruction.?

139
Q

Pass and Advanced

  1. What are the ways Top Secret, Secret, and Confidential material may be destroyed?
A

By burning, pulping, pulverizing, or shredding.

140
Q

Pass and Advanced

  1. What is the most efficient method of destroying combustible material?
A

Bunting.

141
Q

Pass and Advanced

  1. Top Secret material will be destroyed by how many witnessing officials?
A

Two.

142
Q

Pass and Advanced

  1. When may one person destroy Secret messages?
A

If a record of destruction is made.

143
Q

Pass and Advanced

  1. What must be done to bound publications before they are placed in the burning bags, to ensure the complete destruction?
A

The pages must be torn apart and crumpled. `

144
Q

Pass and Advanced

  1. What are the measurements the crosscut shredding machines must reduce classified material to?
A

No greater than 3/64 inch wide by ?/2 inch long.

145
Q

Pass and Advanced

  1. What must the material be placed in that has to be jettisoned during emergency destruction?
A

Weighted bags.

146
Q

Pass and Advanced

  1. When using the jettisoning method of destruction, what should be the sea depth?
A

1,000 fathoms or more. _

147
Q

Pass and Advanced

  1. What arc the plans called that provide for the protection, removal, or destruction of classified material?
A

Emergency plans.

148
Q

Pass and Advanced

  1. What is the primary requirement of an emergency plan?
A

It adequately provides for the rapid and complete destruction of the classified material.

149
Q

Pass and Advanced

  1. What are the three areas of emergencies emergency plans must cover?
A

Natural disasters, such as hurricanes; civil disturbances, such as rioting; and enemy action.

150
Q

Pass and Advanced

  1. When the emergency plan is implemented, what is the priority of destruction based on?
A

The potential effect on national security should the material fall into hostile hands.

151
Q

Pass and Advanced

  1. What type of material falls into the first priority for emergency destruction?
A

Top Secret COMSEC material and classified components of equipment and all other Top Secret

152
Q

Pass and Advanced

  1. What type of material falls into the second priority for emergency destruction?
A

Secret COMSEC material and all other Secret material. `

153
Q

Pass and Advanced

  1. What type of material falls into the third priority for emergency destruction?
A

Confidential COMSEC material and all other Confidential material.

154
Q

Pass and Advanced

  1. What should be done after you have destroyed the classified material for which you are responsible?
A

Destroy any unclassified equipment that could be of use to an enemy.

155
Q

Pass and Advanced

  1. What is required in addition to an emergency plan?
A

A plan of action in the event of tire.

156
Q

Pass and Advanced

  1. What unit docs all electronic digital computer systems consist of?
A

A central processing unit (CPU).

157
Q

Pass and Advanced

  1. How does the CPU communicate with the peripheral devices?
A

Through input/output (I/O) channels.

158
Q

Pass and Advanced

  1. What is the central processing unit?
A

The brain of the computer, which is referred to as the CPU.

159
Q

Pass and Advanced

  1. What unit maintains order within the computer system and directs the flow of traffic (operations) and data?
A

The control unit.

160
Q

Pass and Advanced

  1. Does the control unit perform the actual processing operations on the data?
A

No.

161
Q

Pass and Advanced

  1. How does the control unit control the flow of all data entering and leaving the computer?
A

By communicating or interfacing with the arithmetic-logic unit, memory, and I/O areas.

162
Q

Pass and Advanced

  1. What part of a computer regulates the flow of signals that control the operation of the computer?
A

Timing.

163
Q

Pass and Advanced

  1. What portion of a computer makes up the decision-making and memory-type functions?
A

instruction and control.

164
Q

Pass and Advanced

  1. What is the process of locating the operand (specific information) for a given operation?
A

Addressing.

165
Q

Pass and Advanced

  1. What is an interrupt?
A

A break in the normal flow of operation of a computer.

166
Q

Pass and Advanced

  1. What is control memory?
A

A random-access memory (RAM) consisting of addressable storage registers.

167
Q

Pass and Advanced

  1. What is cache memory?
A

A small, high-speed RAM buffer located between the CPU and main memory, which can increase the speed of the PC.

168
Q

Pass and Advanced

  1. What are chips with a set of software instructions supplied by the manufacturer built into them that enables the computer to perform its I/O operations?
A

Read-only memory (ROM).

169
Q

Pass and Advanced

  1. What unit performs all arithmetic operations (addition, subtraction, multiplication, and division) and logic operations?
A

The arithmetic-logic unit (ALU).

170
Q

Pass and Advanced

  1. What are the four purposes the primary storage, also called internal, storage, main storage, main memory, or just memory, serves?
A

Holds data transferred from an I/O device to the input storage area, where it remains until the computer is ready to process it; holds both the data being processed and the intermediate results of the arithmetic-logic operations; holds the processing results in an output storage area for transfer to an I/O device; and holds the program statements transferred from an I/O device.

171
Q

Pass and Advanced

  1. How can primary storage be classified?
A

By its physical or functional characteristics.

172
Q

Pass and Advanced

  1. What are the common types of primary storage devices?
A

Magnetic core storage, semiconductor storage, and bubble storage.

173
Q

Pass and Advanced

  1. What is another name for semiconductor memory chips?
A

integrated circuits (ICS).

174
Q

Pass and Advanced

  1. What are the advantages of semiconductor storage?
A

Fast internal processing speeds, high reliability, low power consumption, high density (many circuits), and low cost.

175
Q

Pass and Advanced

  1. What is the drawback of semiconductor storage?
A

It must have a constant power source, which is called volatile storage.

176
Q

Pass and Advanced

  1. What type of storage is generally used in laptops?
A

Bubble storage.

177
Q

Pass and Advanced

  1. How can memory be functionally classified?
A

By its operational features: random-access memory (RAM), read-only memory (ROM), programmable read-only memory (PROM), and erasable programmable read-only memory (EPROM).

178
Q

Pass and Advanced

  1. In the computer, what is the working memory called?
A

Random-access memory (RAM).

179
Q

Pass and Advanced

  1. What memory enables you to bootstrap the computer without the programs and data being lost even when the computer is powered down?
A

Read-only memory (ROM).

180
Q

Pass and Advanced

  1. Can you put any of your own data or programs into ROM?
A

No.

181
Q

Pass and Advanced

  1. What term is used to describe the permanently installed programs?
A

Micro program, or firmware.

182
Q

Pass and Advanced

  1. What is the memory outside the main body of the computer where you can store programs and data for future use?
A

Secondary storage or auxiliary storage.

183
Q

Pass and Advanced

  1. What are the two reasons you need secondary storage?
A

Because the computers, working memory (primary storage) is finite and limited in size, it cannot always hold all the data you need, and second, in secondary storage, data and programs do not disappear when power is turned off as they do when semiconductor memories are used.

184
Q

Pass and Advanced

  1. What are the three types of secondary storage most commonly used?
A

Magnetic tape, magnetic disk/diskette, and magnetic drum.

185
Q

Pass and Advanced

  1. What is the term used when peripheral devices are under the control of the CPU?
A

?Online?

186
Q

Pass and Advanced

  1. What are peripheral devices considered to be when they perform their functions independently, not under direct control of the CPU?
A

?Offline?

187
Q

Pass and Advanced

  1. What is the unit that moves magnetic tape across read/write heads that read and write the information?
A

Magnetic tape units.

188
Q

Pass and Advanced

  1. What units are storage devices that read and write information on the magnetized surfaces of rotating disks?
A

Magnetic disk drive units.

189
Q

Pass and Advanced

  1. What do floppy disk drive units consist of?
A

A diskette drive (the mechanism within which the diskette rotates) and a controller containing the electronic circuit that feeds signals into and from the diskette.

190
Q

Pass and Advanced

  1. Are computer consoles normally used for keying data from source documents for reproduction jobs?
A

No.

191
Q

Pass and Advanced

  1. What type of printer is normally used with larger computers to print supply requisitions, paychecks, inventory, or financial reports at 10 lines per second and faster?
A

High-speed printers.

192
Q

Pass and Advanced

  1. What provides for communications between the CPU and all peripheral devices?
A

Input/output (I/O) channels.

193
Q

Pass and Advanced

S93. What are the two types of duplex channels?

A

Half-duplex, and full-duplex.

194
Q

Pass and Advanced

  1. What channel provides for simultaneous transmission in both directions, as in the use of the telephone?
A

Full-duplex channel.

195
Q

Pass and Advanced

  1. Data may be transmitted over a channel in one of what two ways?
A

Either serial mode or parallel mode.

196
Q

Pass and Advanced

  1. In parallel transmission, how many wires do you usually have going between the computer and the peripheral devices?
A

Nine or ten.

197
Q

Pass and Advanced

  1. What are the signals called that communicate information back and forth between the peripheral device and the computer?
A

Handshaking signals.

198
Q

Pass and Advanced

  1. What is the drawback to parallel transmission?
A

The computer cannot be too far away from the peripheral device.

199
Q

Pass and Advanced

  1. What is the acronym for modulator-demodulator?
A

Modem.

200
Q

Pass and Advanced

  1. What is the function of a modem?
A

It converts the digital signal produced by your terminal (or the computer) to an audio signal suitable for transmission over the communications line; then the modem at the other end of the line reconverts the audio signal back to a digital signal before it is supplied to the computer (or your terminal).