Safeguarding and Dissemination Flashcards

1
Q

What are the purposes of the SF7 01?

A) The SF 701, or the Security Container Check Sheet, is used to record the opening and closing of your security container.
B) The SF 701, or the TS cover sheet, is used to alert holders to the presence of Top Secret classified information and prevent inadvertent view of classified information by unauthorized personnel
C) The SF 701, or Active Security Container Check Sheet, is used to report security incidents.
D) The SF 701, or the Active Security Container Check Sheet, is used to record your end of day checks.

A

D) The SF 701, or the Active Security Container Check Sheet, is used to record your end of day checks.

A) The Security Container Check Sheet, used to record the opening and closing of your security container, is an SF 702
B) The TS cover sheet, used to alert holders to the presence of Top Secret classified information and prevent inadvertent view of classified information by unauthorized personnel, is an SF 703
C) Security incidents should be immediately reported to a supervisor and reported through the INSCOM website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of the SF 702?

A) The SF 702, or the Active Security Container Check Sheet, is used to record your end of day checks.
B) The SF 702, or the Security Container Check Sheet, is used to record the opening and closing of your security container.
C) The SF 702, or the Security Container Check Sheet, is used to report security incidents.
D) The SF 701, or the Secret cover sheet, is used to alert holders to the presence of Secret classified information and prevent inadvertent view of classified information by unauthorized personnel.

A

B) The SF 702, or the Security Container Check Sheet, is used to record the opening and closing of your security container.

A) The SF 701, or the Active Security Container Check Sheet, is used to record your end of day checks.
C) Security incidents should be immediately reported to a supervisor and reported through the INSCOM website
D) The Secret cover sheet, used to alert holders to the presence of Secret classified information and prevent inadvertent view of classified information by unauthorized personnel, is an SF 704.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is classified information prepared for transport?

A) With the name and position of the recipient clearly marked on the outer envelope to avoid accidental unauthorized disclosure
B) When it is properly packaged and sent via certified USPS
C) Classified material needs to be prepared for shipment, packaged, and sealed in ways that minimize risk of accidental exposure and facilitates detection of tampering.
D) When it is properly packaged and an approved courier with DCS is available

A

C) Classified material needs to be prepared for shipment, packaged, and sealed in ways that minimize risk of accidental exposure and facilitates detection of tampering.

A) The name of the recipient should be written on the inner envelope only
B) Incorrect, only Secret and lower classification can be sent via USPS and only when it is the most effective means after weighting reduction in security and accountability against benefits to time and cost
D) Incorrect, Secret and Confidential information may be sent via USPS if it is the most effective means. Sending via DCS is not always required, but it is preferred.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a Security Violation?

A) Communication or physical transfer of classified or controlled unclassified information to an authorized recipient
B) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information.
C) When classified data is introduced on an information system not approved for that level of information.
D) An event that results in or could be expected to result in the loss or compromise of classified information.

A

D) An event that results in or could be expected to result in the loss or compromise of classified information.

A) Communication or physical transfer of classified or controlled unclassified information to an authorized recipient is Unauthorized Disclosure
B) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information is a Security Infraction
C) Spillage is when classified data is introduced on an information system not approved for that level of information. This may constitute a Security Violation, but is not the definition or only type of Security Incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Unauthorized Disclosure?

A) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information.
B) An event that results in or could be expected to result in the loss or compromise of classified information.
C) When the possibility of compromise could exist but it is not known with certainty.
D) Communication or physical transfer of classified or controlled unclassified information to an authorized recipient

A

D) Communication or physical transfer of classified or controlled unclassified information to an authorized recipient

A) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information is a Security Infraction
B) An event that results in or could be expected to result in the loss or compromise of classified information is a Security Violation
C) A potential compromise is when the possibility of compromise could exist but it is not known with certainty. It is a type of unauthorized disclosure, but is not the best definition because it leaves out actual disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the practices you must follow when handling classified information? (Multiple Answers)

A) Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose
B) Store all documents, no matter if they are classified or unclassified, with an SF 70X cover sheet
C) Use approved secure communications circuits for telephone conversations to discuss classified information
D) If you take classified documents home to work on, ensure they are properly marked and stored in a GSA approved container.
E) Follow proper procedures when copying classified information
F) Use security forms such as SF 701 and SF 702

A

The Correct Answers are:
A) Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose
C) Use approved secure communications circuits for telephone conversations to discuss classified information
E) Follow proper procedures when copying classified information
F) Use security forms such as SF 701 and SF 702

B) Is incorrect because SF 70X cover sheets should only be used with the corresponding classification of the document it is covering
D) Is incorrect because classified documents should never be taken out of the secure workplace they are authorized to be in: you should not be taking work home with you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the purpose of the SF 701?

A) It is used to record the opening and closing of your security container.
B) It is a TS cover sheet
C) It is intended to verify that you did not accidentally leave classified materials unsecured, and to ensure the area is safe and secure.
D) It is a Secret cover sheet

A

C) It is intended to verify that you did not accidentally leave classified materials unsecured, and to ensure the area is safe and secure.

A) An SF 702 is used to record the opening and closing of your security container.
B) A TS cover sheet is an SF 703
D) A TS cover sheet is an SF 704

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the blank spaces for on an SF 701?

A) To report security incidents.
B) To notate the documents that you are accountable for.
C) For additional warranted security and safety items.
D) None of the above

A

C) For additional warranted security and safety items.

A) Incorrect, to report security incidents, immediately tell your supervisor and report it through https://www.inscom.army.mil/isalute/
B) Incorrect, SF 701s should not have information about the document; it is only used to verify the documents are secure
D) Incorrect, the blank spaces in an SF 701 are for additional warranted security and safety items

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why would a DoD official use the term, “Neither confirm nor deny”?

A) If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information.
B) The information in question is still being reviewed under FOIA guidance
C) They watched too many Jack Ryan movies
D) They do not know the answer to the question being posed to them

A

A) If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information.

B) FOIA considerations do not weigh on DoD personnels’ responsibility to “niether confirm nor deny” comments or questions about classified information. Any classified information that has become fully or partially public should still be protected from further unauthorized disclosure.
C) No
D) Regardless of a DoD personnel’s knowledge about the subject, any questions or comments about classified information should never be confirmed nor denied in public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an Actual Compromise?

A) When there is a knowing, willful, or negligent action that could reasonably be expected to result in the loss, suspected compromise or compromise of classified information.
B) The possibility of compromise could exist but it is not known with certainty
C) When classified data is introduced on an information system not approved for that level of information
D) An unauthorized disclosure of classified information

A

D) An unauthorized disclosure of classified information

A) A Security Violation describes a knowing, willful, or negligent action that could reasonably be expected to result in the loss, suspected compromise or compromise of classified information.
B) The possibility of compromise could exist but it is not known with certainty describes a Potential Compromise
C) Spillage is when classified data is introduced on an information system not approved for that level of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Potential Compromise?

A) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information.
B) The possibility of compromise could exist but it is not known with certainty
C) When there is a knowing, willful, or negligent action that could reasonably be expected to result in the loss, suspected compromise or compromise of classified information.
D) An unauthorized disclosure of classified information

A

B) The possibility of compromise could exist but it is not known with certainty

A) A Security Infraction is a failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information.
C) A Security Violation is a knowing, willful, or negligent action that could reasonably be expected to result in the loss, suspected compromise or compromise of classified information.
D) An Actual Compromise is an unauthorized disclosure of classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

When the document has been sealed within a properly naked inner envelope you must…

A) Write the name of the recipient on the outer envelope and seal that carefully as well.
B) Send the document via an appropriate and approved transmission method
C) Insert the envelope into the outer envelope and seal it carefully
D) Take a picture of it and text it to the recipient.

A

C) Insert the envelope into the outer envelope and seal it carefully

A) Incorrect, you should not write the name of any individual on the outer wrapping
B) Incorrect, the inner envelope needs to be placed in an outer envelope first
D) Come on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does DCS stand for in the context of physically transporting classified material?

A) Defense Courier Service
B) Division of Courier Systems
C) Distributed Control System
D) Digital Combat Simulator

A

A) Defense Courier Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When can Secret Information be sent via USPS?

A) When it is properly packaged
B) Secret information can be mailed via USPS at any time
C) When it is the most effective means considering security, time, cost, and accountability
D) Secret information can never be mailed via USPS express

A

C) When it is the most effective means considering security, time, cost, and accountability

A) This is not the best answer as all classified information needs to be properly packaged regardless of the transportation method
B) Incorrect, Secret information can only be sent via USPS only when it is the most effective means considering security, time, cost, and accountability
D) Incorrect, Secret information can be sent via USPS when it is the most effective means after weighing reduction in security and accountability against benefits to time and cost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When can Top Secret Information be sent via USPS?

A) When it is the most effective means considering security, time, cost, and accountability
B) Only if DCS is not available
C) When it is mailed priority overnight in a GSA-approved locked container
D) Never

A

D) Never

A) Incorrect, Top Secret information can never be sent via USPS
B) Incorrect, cleared U.S. military and Government personnel and DoD contractor employees who have received the proper briefing can transport TS information if DCS agents are not available.
C) Incorrect, Top Secret information can never be sent via mail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Identify the method that CANNOT be used to send hard copy Confidential Information.

A) Regular mail as long as it is properly packaged.
B) DCS
C) USPS First Class mail
D) USPS registered mail
E) USPS certified mail

A

Correct:
B) DCS
C) USPS First Class mail
D) USPS registered mail
E) USPS certified mail

A) Incorrect, Classified Information being transported by USPS can only be sent via certified, registered, or First Class mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

T/F: Hand carrying classified information should only be done as a last resort

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

T/F: Anyone can determine the need for hand carrying classified information

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

T/F: When someone is carrying classified information, written authorization is always required

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What form is required to receive a Courier Authorization Card?

A) IA Fm 3059
B) MAARNG Fm 380-1
C) DD Fm 2501
D) DD 2875

A

C) DD Fm 2501

A) Incorrect, an IA Fm 3059 is used for requesting a Form Update or Investigation
B) Incorrect, a Fm 380-1 is the MAARNG form for requesting information from the G2
D) Incorrect, a DD 2875 is an information system access request form

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

T/F: Critical program information needs to be protected from unauthorized or inadvertent destruction, transfer, alteration, or loss.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

T/F: Compromise of CPI can significantly alter program direction, shorten combat effective life of the system, or require additional research, development, test, and evaluation resources to counter impact of its loss.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Program Protection Plan?

A) An emergency response plan
B) A single source document that specifies all protection efforts designed to deny unauthorized access to critical program information
C) The list of approved methods for transporting classified materials
D) A single source document that specifies all protection efforts designed to deny unauthorized access to classified information

A

B) A single source document that specifies all protection efforts designed to deny unauthorized access to critical program information

A) Incorrect, a PPP may include an emergency response plan, but it deals with all protection efforts.
C) Incorrect, a PPP is a single source document that specifies all protection efforts designed to deny unauthorized access to critical program information
D) Incorrect, PPPs are only developed for CPI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

T/F: The PPP must needs to be classified according to its content

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

T/F: A security infraction occurs when any knowing, willful, or negligent action contradicts EO 13526, but does not compromise a violation

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

T/F: A security infraction, compared to a security violation, does not place classified information at risk.

A

False: any mishandling of classified material places it at risk, regardless of how extreme the mishandling was.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

T/F: A security violation occurs when any knowing, willful, or negligent action could be reasonably expected to result in an unauthorized disclosure of classified information

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

T/F: Failure to properly downgrade information to a lower classification level is an example of a security infraction

A

False: though failure to properly downgrade information to a lower classification level is an issue for the purposes of effective communication and dissemination, it is not a security incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

T/F: It is a security violation to knowingly, willfully, or negligently classify or continue to classify information contrary to the requirements of EO 13526

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

T/F: All security violations only involve a compromise of classified information

A

False: security violations may also involve incidents that can reasonably be expected to lead to the compromise of classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

A soldier and a sailor are discussing the topic of actual and potential compromise.

A) The soldier says that actual compromise involves an unauthorized disclosure of classified information
B) The sailor says that not all security violations involve actual compromise, they all involve the potential for compromise.

Who is correct

A

The soldier is correct: security violations involve both actual and potential compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

T/F: A foreign exchange officer assigned to a joint forces command has full access to all classified information provided to the command.

A

False: A foreign exchange officer may not gain access to all classified information, regardless of how closely they are working with their U.S. counterparts. Example: documents marked NOFORN or that aren’t authorized for distribution to citizens of the officer’s country may not be disseminated to them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

T/F: US relief agency liaison officers have access to raw intelligence images and data related to humanitarian aid efforts.

A

False: Anyone attempting to obtain any classified information must meet the prerequisites. They do not automatically gain access because of a mission or tasking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

T/F: A retired Combat Commander has full access to all levels of classified information he was able to access prior to retirement

A

False: He no longer has a need-to-know as he is retired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

T/F: A DoD civilian employee with a favorably adjudicated Tier 3 investigation adjudicated to 5 CFR 731 standards are eligible for TS information

A

False: They require a T5 investigation for TS eligibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

T/F: A DoD military member with a favorably adjudicated Tier 1 investigation is eligible for access to Confidential information

A

False: A Tier 1 investigation is used to determine suitability for employment with the DoD, but not access to classified information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

A soldier and a sailor are discussing the topic of protecting classified information.

A) The soldier says that a foreign disclosure officer uses a Delegation of Disclosure Authority Letter to approve the release of US classified information to a foreign national.
B) The sailor says that if approved by a senior intelligence officer, SCI intelligence information can be stored outside of a secure room.

Who is correct?

A

The soldier is correct. Classified information can never be stored outside of GSA approved containers.

38
Q

T/F: A local national employed by the DoD in Germany with a ten-year-old Tier 3 investigation is eligible for access to Secret Information

A

False: Individuals with Tier 3 and Tier 5 investigations are subject to a re-submission of their SF-86 every five years to remain in compliance with the continuous monitoring inherent to the principle of Continuous Evaluation.

39
Q

T/F: When classified information is removed from GSA approved storage, the individual must use the proper classified document cover sheet.

A

True

40
Q

T/F: Unless restricted by the originating agency, Top Secret, Secret, and Confidential information may be reproduced to the extent required by operational needs.

A

True

41
Q

T/F: An SF 702 (Security Container Check Sheet) can be modified to include safety requirements

A

False, safety requirements would be notated on an SF 701. An SF 702 is use to record the securing of vaults, rooms, and containers.

42
Q

T/F: Reproduced classified material needs to be placed under the same accountability, safeguarding, and control requirements governing the original material.

A

True

43
Q

T/F: An information custodian must account for, control, and mark working papers in the same manner required of classified documents.

A

True, the only difference is to mark them clearly as a working paper.

44
Q

T/F: An SF 701 (Activity Security Checklist) is used to record end-of-day checks for areas that process or store classified information.

A

True

45
Q

T/F: When in an open area within a classified work area, the use of secure telephone equipment ensures classified discussions are properly protected.

A

False, an individual must always make sure they are alone or are only in ear-shot of individuals with the proper prerequisites to hear classified information–even if they are on a secure telephone.

46
Q

T/F: Each office that reproduces classified information must have procedures in place to ensure that both the copy and the original are properly protected.

A

True

47
Q

T/F: Determining whether or not a classified document has a reproduction control notice is the first thing a custodian should check prior to making copies of the document.

A

True

48
Q

T/F: The Security Container Sheet (SF 702) is used to record the documents stored in a security container and its combination

A

False, this would be notated on an SF 700

49
Q

A soldier and a sailor are discussing procedures for safeguarding classified materials in their work area.

A) The soldier says that any workplace that handles classified information must have established procedures in place to avoid the unauthorized disclosure of classified materials.

B) The sailor says that any workplace that removes classified information from the area without authorization constitutes a security violation.

Who is correct?

A

Both are correct.

50
Q

T/F: Custodians are responsible for ensuring that classified information is secured in an approved storage container or an approved open storage area

A

True

51
Q

T/F: The SF 703, 704, and 705 may be used for special or sensitive information other than Top Secret, Secret, and Confidential documents respectively

A

False, each SF 70X cover sheet must be used on a document with the corresponding classification level.

52
Q

T/F: Custodians are responsible for ensuring that all classified information in their possession is under the direct control of authorized persons

A

True

53
Q

T/F: Custodians are responsible for verifying a person’s need to know and access before providing that individual with any classified information

A

True

54
Q

T/F: Custodians of classified information must follow all established procedures to ensure that unauthorized persons do not gain access to classified information

A

True

55
Q

A soldier and a sailor are discussing the topic of storing classified information:

A) The soldier says that there are three authorized places in which an individual can store classified information: individual’s head, hands, and an approved container

B) The sailor says that an approved storage container must be used whenever the classified material is not under supervision of a custodian

Who is correct?

A

Both are correct

56
Q

A soldier and a sailor are discussing the topic of storing classified information:

A) The soldier says that most commonly used containers for storing materials are approved by the GSA.

B) The sailor says that classified information can only be stored in a GSA approved container.

Who is correct?

A

The sailor is correct. ALL containers that may store classified material are approved by the GSA.

57
Q

A soldier and a sailor are discussing the topic of open storage:

A) The soldier says that open storage is a term used to describe the ability to store classified information openly in an area that has been approved for that purpose.

B) The sailor says that open storage areas are designed to provide alternate safeguarding requirements in lieu of a vault or a secure working space.

Who is correct?

A

Both are correct

58
Q

T/F: Prior to gaining access to classified information, an individual who wants access to classified information needs to establish that he or she has a need-to-know.

A

False, the holder or custodian of the classified information needs to determine if the prospective recipient has a need to know. The prospective recipient may be asked to state their reasons, but the onus of responsibility lies with the person disclosing the information.

59
Q

T/F: An information custodian must verify that an individual who wants access to classified information has the appropriate clearance, has a need-to-know, and has a completed SF312

A

True

60
Q

T/F: SF312 is a contractual agreement between the classified information custodian and the cleared employee stating that the latter agrees to never disclose classified information to an unauthorized person.

A

False, the SF312 is an agreement between the employee and the U.S. Government, not the information custodian.

61
Q

A soldier and a sailor are discussing the topic of transmitting and transporting classified information

A) The soldier says that DoD Component Heads are responsible for establishing transmission and transportation procedures that minimize the risk inherent in transmission and transportation.

B) The sailor says that in order to use a fax machine to transmit classified documents, a custodian needs to secure communication equipment over a secure communications circuit approved for the transmission of classified information at the level of classified document.

Who is correct?

A

Both are correct

62
Q

A soldier and a sailor are discussing the topic of transmitting and transporting classified information.

A) The soldier says that DSS maintains a register of certified secure digital facsimiles.

B) The sailor says that due to the sensitive nature of COMSEC information, it is subject to the special transmission procedures found in the National Security Telecommunications and Information Systems Security (NSTISSI) NO 4001

Who is correct?

A

The sailor is correct. DISA, not DSS, maintains a register of certified secure digital facsimiles.

63
Q

A soldier and a sailor are discussing the topic of transmitting and transporting classified information.

A) The soldier says that the DoDM 5200.01, Information Security Program, provides guidance for the transmission and transportation of classified information

B) The sailor says that the Defense Information System Agency (DISA) maintains a register of certified COMSEC equipment

Who is correct?

A

The soldier is correct. The NSA is the approval authority of COMSEC standards, techniques, equipment, and protected services for national security systems.

64
Q

A soldier and a sailor are discussing the topic of transmitting and transporting classified information:

A) The soldier says that a custodian always needs to verify that the receiver of a faxed document has the proper clearance eligibility and need-to-know.

B) The sailor says that custodians need to remember that the intended recipient of a faced document may not be the same person who receives the faxed document.

Who is correct?

A

Both are correct

65
Q

T/F: Both the inner and outer wrapping need to be addressed to an official government activity or DoD Contractor.

A

True

66
Q

T/F: When using the U.S. Postal Service, the outer wrappers need to include the name of the intended recipient.

A

False, the outer wrapping should never be addressed to an individual.

67
Q

This classified level is the highest level that can be transmitted using the U.S. Postal Service First Class Mail:

A) Top Secret
B) Secret
C) Confidential
D) Controlled Unclassified Information

A

,

A) Incorrect, TS information cannot be mailed
B) Incorrect, S information can only be mailed express or via registered mail
D) Incorrect, CUI is not classified

68
Q

T/F: The sender’s complete return address needs to be on the inner wrapping, but should not be on the outer wrapping.

A

False, the return address should be on the outer wrapping.

69
Q

T/F: Both the inner and outer wrapping must identify the highest classification level of the information the package will contain.

A

False, only the inner wrapping should contain any classification markings

70
Q

T/F: Any applicable special markings (other than classification level) needs to be written on the inner wrapping

A

True

71
Q

A soldier and a sailor are discussing the requirements for transporting classified material.

A) The soldier says that there are different carrier requirements for transporting Confidential, Secret, and Top-Secret information
B) The sailor says that individuals can hand carry classified information without the appropriate clearance or need to know.

Who is correct

A

The soldier is correct. Anyone handling classified information needs the prerequisites to do so.

72
Q

A soldier and a sailor are discussing requirements for transporting classified material:

A) The soldier says that Secret information can be mailed via the US Postal Service express mail within and between the 50 states, DC, and Puerto Rico
B) The sailor says that Top Secret Information can be mailed via the US Postal Service express mail within and between the 50 states, DC, and Puerto Rico

Who is correct?

A

The soldier is correct. Top Secret information cannot be mailed via the USPS

73
Q

This classification level is the highest level that can be transmitted through direct contact between appropriately cleared personnel:

A) Top Secret
B) Secret
C) Confidential
D) CUI

A

A) Top Secret

B) Incorrect, TS information can be directly relayed which means S can as well.
C) Incorrect, TS information can be directly relayed which means C can as well.
D) Incorrect, CUI is not classified by definition

74
Q

This classification level is the highest level that can be transmitted using the Defense Courier Service:

A) Top Secret
B) Secret
C) Confidential
D) CUI

A

A) Top Secret

B) Incorrect, TS information can be transported using DCS which means S can as well.
C) Incorrect, TS information can be transported using DCS which means C can as well.
D) Incorrect, CUI is not classified by definition.

75
Q

This classification level is the highest level that can be transmitted using the GSA contract holder for overnight delivery:

A) Top Secret
B) Secret
C) Confidential
D) CUI

A

B) Secret

A) Incorrect, Secret is the highest level that can be transmitted using the GSA contract holder for overnight delivery
C) Incorrect, Secret can be transmitted using the GSA contract holder for overnight delivery so Confidential can as well
D) Incorrect, CUI is not classified

76
Q

A soldier and a sailor are discussing requirements for hand carrying classified information.

A) The soldier says that there are different types of authorization for hand carrying classified information depending on the type of transportation that will be utilized.
B) The sailor says that individuals personally hand carrying information is liable for the material being transported and should not deviate from the authorized travel schedule.

Who is correct?

A

Both are correct

77
Q

A soldier and a sailor are discussing requirements for hand carrying classified information.

A) The soldier says that hand carrying classified information should be considered as the first option for transmitting classified information.
B) The sailor says that written authorization is required to hand carry classified information

Who is correct?

A

The sailor is correct. Hand carryings should be a last resort.

78
Q

A soldier and a sailor are discussing the content of a courier briefing.

A) The soldier says that courier briefings inform individuals personally hand carrying the classified information of their security responsibilities
B) The sailor says that the courier briefing informs the US Postal Service of its responsibility for ensuring that its employees are taking the appropriate m measures to protect classified material that they are hand carrying

Who is correct?

A

The soldier is correct

79
Q

What is COMSEC?

A) The protection of telecommunications and assurance of authenticity for those communications
B) Crypto security, emission security, transmission security, and physical security
C) The protection of information related to space
D) Both a and b

A

D) Both A and B are correct

80
Q

T/F: Due to the sensitive nature of COMSEC information, it is subject to to the special transmission procedures found in the National Security Telecommunications and Information Systems Security Instruction (NSTISSI) No. 4001

A

False: The NSA is the approval authority for COMSEC standards, techniques, equipment, and protected services for national security systems. The NSA also certifies or approves cryptographic systems and techniques

81
Q

What does Information System refer to?

A) A set of information resources organized for the collection, storage, processing, maintenance use, sharing, dissemination, disposition, display, or transmission of information.
B) The Internet
C) A network of running intelligence products derived from classified information to reach a conclusion or assumption
D) Secure or classified networks like NIPR or SIPR

A

A) A set of information resources organized for the collection, storage, processing, maintenance use, sharing, dissemination, disposition, display, or transmission of information.

B) The internet is an information system, but not the definition of information system
C) An information system does not refer to intelligence products
D) NIPR and SIPR are information systems, but they are not the only information systems and do not constitute a definition

82
Q

T/F: Information assurance personnel enforce confidentiality by preventing the disclosure of information to unauthorized individuals or information systems

A

True

83
Q

T/F: Information assurance programs and personnel leverage personnel and information security measures to prevent unauthorized access to classified information and information systems

A

True

84
Q

T/F: Information assurance programs and personnel contribute to the information security goal to ensure that classified information being processed, stored, and transmitted by information systems, and the information systems themselves, are protected

A

True

85
Q

T/F: Permitting unauthorized individuals to look over your shoulder at your computer screen while you have confidential data displayed is considered a breach of confidentiality.

A

True

86
Q

T/F: Information assurance personnel enforce integrity by preventing the authorized modification of a system’s processes, stores, and transmits

A

True

87
Q

T/F: To ensure availability, IA personnel need to ensure that the computing systems used to store and process information, the security controls and measures used to protect it, and the communication changes used to access it are functioning correctly.

A

True

88
Q

T/F: Information assurance refers to the measures that protect and defend information and information systems by ensuring their availability, integrity, and authentication, confidentiality, and non repudiation

A

True , these are the five key principles of IA

89
Q

A soldier and a sailor are discussing the unique challenges of protecting classified information on an information system.

A) The soldier says that security practitioners may encounter situations such as spillage of classified information if they access it on an unclassified system.
B) The sailor says that security practitioners may encounter situations such as classified information being processed by an information system that is not accredited to process classified information.

Who is correct?

A

Both are correct

90
Q
A