All Areas II Flashcards

(105 cards)

1
Q

This enables individuals to be able to authenticate themselves on security websites and securely log into computer systems

A

Common Access Card (CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Older style of lock; may be used for classified storage in certain cases

A

Mechanical combination lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lock that complies with UL Standard 768-Group 1

A

Combination padlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lock that complies with FF-L-2740 series lock specification

A

Electromechanical combination lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lock that has limited resistance to forced entry

A

Low security padlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A facility used by the intelligence community

A

SCIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The governing authority to approve security containers

A

GSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Areas designed and authorized for the open storage of classified information. These facilities are usually build to commercial construction standards and do not afford the extra security inherent with a vault.

A

Secure rooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel door

A

Vaults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The terrorist threat level indicating anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the operating environment favors the terrorist.

A

High terrorist threat level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The terrorist threat level indicating no terrorist group is detected or the terrorist group in non-threatening

A

Low terrorist threat level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The terrorist threat level indicating anti-U.S. terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity. The operat

A

Significant terrorist threat level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The terrorist threat level indicating terrorists are present but there are no indications of anti-U.S. activity. The operating environment favors the host nation or the U.S.

A

Moderate terrorist threat level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical security plan

A

At a minimum, these should include special and general guard orders, access and material control, protective barrier lighting systems, locks, and Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Much of U.S. classified information originates within this environment

A

Industrial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security compliance is overseen by this organization if a contractor works at his/her own facility

A

Defense Security Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A contractor must adhere to the security rules of the __________ commander when working at a government installation

A

Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The program that covers protection of classified information

by government contractors

A

NISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FSO responsibilities

A
  1. Ensure compliance with the NISP
  2. Follow NISPOM guidelines
  3. Provide training for cleared individuals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference

A

Chapter 8 of the NISPOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or False: A SAP can retain security cognizance if necessary.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A government employee with the authority to enter into, administer, and/or terminate contracts and make related determinations and findings

A

Contracting Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This government employee is a subject matter expert who has regular contact with the contractor

A

COTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The document that outlines in detail what will be required to complete a contract

A

Statement of Work (SOW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The document that establishes the government's authority to review the contractor's security program to ensure compliance
DD Form 441
26
The form a contractor could use to determine if classified storage is required, and at what level
DD Form 254
27
A cleared individual can only have access at the _______ level as the facility clearance
Same
28
For the purpose of a visit to another cleared facility, a clearance can be verified by looking in ________
JPAS
29
The issuance of ________ is the responsibility of the DoD CAF
Eligibility
30
Unauthorized disclosure of this information could reasonably be expected to cause serious damage to our national security.
Secret
31
Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.
Top Secret
32
Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.
Confidential
33
This is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
Derivative Classification
34
This is defined as an initial determination that information requires, in the interest of national security, protection against unauthorized disclosure.
Original Classification
35
This is defined as unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classification.
Compilation
36
The term used to identify individuals specifically authorized in writing to make initial classification decisions.
Original Classification Authority
37
This contains classification levels, special requirements and duration instructions for programs, projects, plans, etc.
Security Classification Guides (SCG)
38
The six step process an OCA applies in making classification determinations
Original Classification Process
39
The authorized change in the status of information goes from classified information to unclassified information
Declassification
40
The declassification system where Permanently Valuable Historical records are declassified when they are 25 years old
Automatic declassification
41
The declassification system where information exempted from automatic declassification is reviewed for possible declassification
Systematic declassification review
42
The declassification system where the public can ask for classified information be review for declassification and public release
Mandatory Declassification Review (MDR)
43
The declassification system where an OCA, at the time the information is originally classified, sets a date or event for declassification
Scheduled Declassification
44
People who are in possession of, or who are otherwise charged with safeguarding classified information
Custodians
45
Options an OCA has when determining declassification
Specific Date, Specific Event, or by the 50X1-HUM Exemption
46
The 25-year rule
The process where records automatically become declassified after 25 years
47
This type of information does not provide declassification instructions
Restricted Data and Formerly Restricted Data
48
Practices to follow when handling classified information
1. Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose 2. Use approved secure communications circuits for telephone conversations to discuss classified information 3. Follow proper procedures when copyi
49
Security Container Check Sheet, which is used to record the opening and closing of your security container
SF 702
50
The Activity Security Checklist intended to verify that you did not accidentally leave classified materials unsecured, as well as, to ensure the area is safe and secure. The blank spaces can be utilized for additional warranted security and safety items,
SF 701
51
An unauthorized disclosure of classified information
Actual compromise
52
If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information
Neither confirm nor deny
53
The possibility of compromise could exist but it is not known with certainty
Potential Compromise
54
This organization maintains a register of certified security digital facsimiles
DISA, Joint Interoperability Test Command (JITC)
55
The protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications and to ensure the authenticity of such communications.
COMSEC
56
When the document has been sealed within a properly marked inner envelope you must...
Insert the envelope into the outer envelope
57
DCS
Defense Courier Service
58
This kind of information can be sent via USPS express only when it is the most effective means considering security, time, cost, and accountability.
Secret information
59
This kind of information can never be sent via USPS
Top Secret information
60
Methods to send hard copy Confidential information
DCS, First Class mail, registered mail, and certified mail
61
True or False: Hand carrying classified information should only be done as a last resort
True
62
True or False: Anyone can determine the need for hand carrying classified information
False
63
True or False: When someone is carrying classified information, written authorization is always required
True
64
DD Form 2501
Courier Authorization Card
65
Microfiche destruction
Burned or shredded to be destroyed. It can also be destroyed with chemicals that destroy the imprints.
66
Typewriter ribbon destruction
Ribbons must be burned or shredded
67
Floppy disk destruction
Must be burned, overwritten, or demagnetized
68
Document destruction
Must be burned, shredded, or chemically decomposed of
69
Videotape destruction
Must be burned, shredded, or demagnetized
70
The initial briefing given to all personnel on the DoD Information Security Program
Initial Orientation Briefing
71
Homeland Security Presidential Directive 12 (HSPD-12)
On August 27, 2004, President Bush signed this directive; Policy for a Common Identification Standard for Federal Employees and contractors. This requires government-wide development and implementation of a standard for secure and reliable forms of identi
72
DoD 5200.08-R
Physical Security Program regulation
73
This document authorizes commanders to issue regulations for the protection or security of property and places under their command. This document also establishes guidelines to build consistent minimum standards for protecting DoD installations and resour
DoD Instruction 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
74
You need to review the requirements that electromechanical locks meet. Which of the specifications should you reference.
Federal specification FF-L-2740 series
75
You need to secure classified information what locks could you use.
X-09 electromechanical lock S&G 2937 mechanical lock S&G 8077 padlock
76
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced/used?
S&G 2740B and Kaba Mas X-10
77
You need to open a security container that has an S&G 2740 lock. What type of lock is S&G 2740?
Electromechanical combination lock
78
You just received the security container that has the S&G 2740 electromechanical safe lock with a factory setting of 50-25-50. what should you do first? Change the combination Open the lock Calibrate the lock
Calibrate the lock
79
You are responsible for creating, protecting, and changing combinations in your facility. What guidelines should you follow?
Do not write a combination down. Do not change the locks combination on a Friday or the day before you go on leave. Change a lock's combination if the container is discovered unlocked and unattended. Maintain records of who knows lock combinations. Safegu
80
Guarding a specific asset or resource.
Point Security
81
Designating islands of high security within a sea of moderate security.
Enclaving
82
Protecting an entire area such as an installation or facility
Area Security
83
Integrating layers of security to protect DoD assets.
Security in Depth
84
Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground. True or false
True
85
Barbed wire is also known as razor wire. True or false?
False
86
Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings. True or false?
True
87
Rapidly flowing rivers are considered active barriers. True or false?
False
88
Although decorative, a concrete planter can serve as a protective barrier by preventing vehicle access. True or false?
True
89
A ________________is an area inside and outside the perimeter fence or barrier of the protected area. Ineffective clear zone must be free of visual obstructions such as bushes.
Clear zone
90
This method is intended to display a silhouette of any person passing between the light source in the building or to show the contrast of the person inside the building.
Surface lighting
91
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
Glare projection
92
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
Controlled lighting
93
When planning protective site lighting, you should ensure that controls and switches are installed inside a protected area and locked or guarded or inside a central station such as an alarm monitoring station. True or false?
True
94
Flashlights are reliable form of continuous lighting. True or false?
False
95
Emergency lighting depends upon the power supply of the utility company. True or false?
False
96
Standby lighting is the type of lighting used when the primary power source fails. True or false?
False
97
The mission of all government security forces, civilian or military, contract forces, and military working dogs is to _____________ _________ _____________.
Protect DOD assets.
98
Government security forces may be either military or civilian. True or false?
True
99
Contract security forces may be either military or civilian. True or false?
False
100
Military working dogs can seek, detect, defend their handlers, and guard suspects. True or false?
True
101
PIR
A PIR sensor detects changes of infrared energy in its field of view.
102
BMS
Balanced magnetic switch/high security switch
103
PCU
Premise control unit
104
Fingerprints, hand geometry, handwriting, iris scan, and voice recognition are all examples of what type of access control system?
Biometric
105
Sensor/detector responds to what?
Physical stimulus