1. How often must you receive a defensive foreign travel briefing? Check all the apply.
Nội dung chính Show
- Which method may be used transmit CONFIDENTIAL materials to DoD agencies?
- Which of the following are authorized methods for transmitting SECRET material?
- Who provides implementation guidance for the information security program within the DoD quizlet?
- What coversheet is used to protect SECRET documents?
At least once a year.
Prior to travel
2. Top Secret document can be transmitted by which of the following methods? Select all that apply.
I got this Wrong.
3. What form is used to request a background investigation?
SF 86
4. Classified information can be safeguarded by using ***. Select all that apply.
Vaults, secure rooms, secure telephones
5. What is the standard form of indentification for DoD employees?
CAC - Common Access Card
6. Prior to foreign travel, you must ensure that your Antiterrorism / Force Protection Level 1 training is current.
True
7. Incorporating, paraphrasing, restating, or generating in new form information that is already classified is know as ***
Derivative classification
8. Which level of classified informatin could cause damage to national security if compromised?
Confidential
9. Classified information can be destroyed using which of the following methods?
Shredding, burning, pulverizing
10. The Personnel Security Program establishes *** for Personnel Security determinations and overall program management responsibilities.
Policies and procedures
11. Which of the following materials are subject to pre-publication review? Select all that apply.
books, speech, article
12. You may be subject to sanctions if you negligently disclose classified information.
True.
13. Secret materials may be transmitted by the same methods as Confidential materials.
False.
14. When opening and closing a security container, complete the ***
SF 702
15. The physical security program prevents unauthorized access to which of the following? Select all that apply.
Personnel, facilities, information, equipment
16. Derivative classifiers are required to have all the following except ***
approval of OCA
17. A security infraction involves loss, compromise, or suspected compromise.
False is the correct answer.
18. Which method may be used to transmit Confidential materials to DoD agencies?
USPS first class mail
19. Which of the following are parts of the OPSEC process? Select all that apply.
Got this wrong.
OPSEC Process Five Steps
- Identification.
- Analysis of threats.
- Analysis of vulnerabilities.
Assessment of risks.
- Application of appropriate countermeasures.
20. Which of the following must be reported?
All of the above.
21. Physical security is concerned with *** and *** measures designed to prevent unauthorized access.
active,passive
22. What coversheet is attached to help protect a Secret document?
SF 704
23. Which of the following is required to access classified information? Select all that apply.
Clearance eligibility, need-to-know, SF312
24. What form is used to record end-of-day security checks?
SF 701
Recommended textbook solutionsSocial Psychology
10th EditionElliot Aronson, Robin M. Akert, Samuel R. Sommers, Timothy D. Wilson
525 solutions
Operations Management: Sustainability and Supply Chain Management
12th EditionBarry Render, Chuck Munson, Jay Heizer
1,698 solutions
Applied Calculus for the Managerial, Life, and Social Sciences
8th EditionSoo Tan
6,275 solutions
Anderson's Business Law and the Legal Environment, Comprehensive Volume
23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene
369 solutions
Recommended textbook solutionsAnderson's Business Law and the Legal Environment, Comprehensive Volume
23rd EditionDavid Twomey, Marianne Jennings, Stephanie Greene
369 solutions
Century 21 Accounting: General Journal
11th EditionClaudia Bienias Gilbertson, Debra Gentene, Mark W Lehman
1,012 solutions
Marketing Essentials: The Deca Connection
1st EditionCarl A. Woloszyk, Grady Kimbrell, Lois Schneider Farese
1,600 solutions
Calculus for Business, Economics, Life Sciences and Social Sciences
13th EditionKarl E. Byleen, Michael R. Ziegler, Michae Ziegler, Raymond A. Barnett
3,913 solutions
Which method may be used transmit CONFIDENTIAL materials to DoD agencies?
SECRET and CONFIDENTIAL may be transmitted by: [1] Registered mail through U.S. Army, Navy, or Air Force postal facilities; [2] By an appropriately cleared contractor employee; [3] By a U.S. civil ser- vice employee or military person, who has been des- ignated by the GCA; [4] By U.S. and Canadian 3-4-1 Page 2 ...
Secret Information You can transmit Secret materials via a cleared commercial carrier, or a cleared commercial messenger service. You can also use a GSA-approved commercial delivery company. Finally, you may use any other method as directed in writing by the GCA.
Who provides implementation guidance for the information security program within the DoD quizlet?
13526 and further defines what the Executive Branch agencies must do to comply with E.O. requirements. The Undersecretary of Defense for Intelligence, or USD[I], provides implementation guidance for the Information Security Program within the DoD.
What coversheet is used to protect SECRET documents?
Cover sheets are required with classified documents, [i.e., Form SF-703, Top Secret Cover Sheet; Form SF-704, Secret Cover Sheet; and Form SF-705, Confidential Cover Sheet]. Form DS-1902, Access Control Sheet Top Secret Information, must be permanently affixed to all Top Secret material.