INFOSEC Quiz

Descripción

SFPC SFPC Test sobre INFOSEC Quiz, creado por Casey Neville el 05/05/2022.
Casey Neville
Test por Casey Neville, actualizado hace más de 1 año
Casey Neville
Creado por Casey Neville hace más de 2 años
383
2

Resumen del Recurso

Pregunta 1

Pregunta
What are the steps of the information security program lifecycle?
Respuesta
  • Classification, dissemination, downgrading, declassification, and destruction
  • Classification, safeguarding, dissemination, declassification, and destruction
  • Classification, marking, dissemination, downgrading, and destruction

Pregunta 2

Pregunta
Which volumes of DoDM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information? Select all that apply.
Respuesta
  • Volume 1
  • Volume 2
  • Volume 3
  • Volume 4
  • All of the above

Pregunta 3

Pregunta
Unauthorized disclosure of _____________ information could reasonably be expected to cause serious damage to our national security.
Respuesta
  • Top Secret
  • Secret
  • Confidential

Pregunta 4

Pregunta
Unauthorized disclosure of _____________ information could reasonably be expected to cause exceptionally grave damage to our national security.
Respuesta
  • Top Secret
  • Secret
  • Confidential

Pregunta 5

Pregunta
Unauthorized disclosure of _____________ information could reasonably be expected to cause damage to our national security.
Respuesta
  • Top Secret
  • Secret
  • Confidential

Pregunta 6

Pregunta
What is the basic formula for granting access to classified information for individuals? Select all that apply.
Respuesta
  • Verify the individual’s eligibility determination
  • Determine the individual’s need-to-know
  • Acknowledge that the SF-312 has been executed

Pregunta 7

Pregunta
_____ is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
Respuesta
  • Original Classification
  • Derivative Classification

Pregunta 8

Pregunta
_____ is defined as an INITIAL determination that information requires, in the interest of national security, protection against unauthorized disclosure.
Respuesta
  • Derivative Classification
  • Original Classification

Pregunta 9

Pregunta
A derivative classifier may overrule an original classification determination if it is in the interest of national security.
Respuesta
  • True
  • False

Pregunta 10

Pregunta
When marking a classified document, the classifier must always start with which section?
Respuesta
  • The banner
  • The portions/paragraphs within the document
  • The classification authority block

Pregunta 11

Pregunta
If the banner marking is TOP SECRET, it is possible that some portion markings in that document can be U for Unclassified.
Respuesta
  • True
  • False

Pregunta 12

Pregunta
What information will you find in the Classification Authority Block on the front page of any classified document? Select all that apply.
Respuesta
  • Classified By
  • Post At
  • Derived From
  • Downgrade To (if applicable)
  • Declassify On
  • All of the above

Pregunta 13

Pregunta
Who issues security classification guides?
Respuesta
  • Derivative classifiers
  • Original classification authorities
  • Security managers

Pregunta 14

Pregunta
What information does a security classification guide provide a derivative classifier? Select all that apply.
Respuesta
  • Classification level for each element of information to be protected
  • Reason for classification
  • Duration of classification and any applicable downgrading instructions
  • Special control notices
  • OCA contact information

Pregunta 15

Pregunta
You may store classified information in your locked desk drawer while you go to lunch as long as you cover it with the appropriate classified cover sheet.
Respuesta
  • True
  • False

Pregunta 16

Pregunta
If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DoDM 5200.01, Volume 3, which of the following should you request?
Respuesta
  • Waiver
  • Exception
  • Security Incident

Pregunta 17

Pregunta
When can Top Secret information be sent via the United States Postal Service (USPS)?
Respuesta
  • When Defense Courier Operations (DCO) is not available
  • When the information needs to be signed for
  • Never

Pregunta 18

Pregunta
While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.
Respuesta
  • True
  • False

Pregunta 19

Pregunta
Your manager hands you a Top Secret document but you are only eligible for Secret access. If you think this is a security incident, what type of security incident do you think it is?
Respuesta
  • Infraction
  • Violation
  • Spillage
  • This is not a security incident because it was handed to you by your manager.

Pregunta 20

Pregunta
Your co-worker, Bob, did not place an SF-704, Secret classified document cover sheet, on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?
Respuesta
  • Infraction
  • Violation
  • Spillage
  • This is not a security incident because Bob maintained positive control of the document.

Pregunta 21

Pregunta
The declassification system where the public can ask for classified information to be reviewed for declassification and public release
Respuesta
  • Scheduled Declassification
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification

Pregunta 22

Pregunta
The declassification system where information exempted from automatic declassification is reviewed
Respuesta
  • Scheduled Declassification
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification

Pregunta 23

Pregunta
The declassification system where an OCA sets a date or event for declassification
Respuesta
  • Scheduled Declassification
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification

Pregunta 24

Pregunta
The declassification system where information is declassified when it is 25 years old
Respuesta
  • Scheduled Declassification
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification

Pregunta 25

Pregunta
Where would you find approved destruction equipment?
Respuesta
  • Best Buy
  • GSA Catalog
  • NSA EPL
  • Amazon

Pregunta 26

Pregunta
The only type of acceptable document shredding is with a crosscut shredder.
Respuesta
  • True
  • False

Pregunta 27

Pregunta
The DoD workforce plays a vital role in ensuring the effectiveness of the DoD Information Security Program.
Respuesta
  • True
  • False

Pregunta 28

Pregunta
The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.
Respuesta
  • Exceptionally grave damage
  • Serious damage
  • Damage

Pregunta 29

Pregunta
The unauthorized disclosure of Confidential information could reasonably be expected to cause ____________________ to our national security.
Respuesta
  • Exceptionally grave damage
  • Serious damage
  • Damage

Pregunta 30

Pregunta
If a derivative classifier believes information to be improperly classified, they can _____________ the classification decision.
Respuesta
  • Challenge
  • Override
  • Ignore

Pregunta 31

Pregunta
Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.
Respuesta
  • True
  • False

Pregunta 32

Pregunta
Why must all documents containing classified information be marked using a sequential process?
Respuesta
  • To mitigate confusion
  • To prevent marking errors
  • To prevent potential unauthorized disclosure
  • All of the above

Pregunta 33

Pregunta
The classification authority block identifies the authority, the source, and the duration of classification determination.
Respuesta
  • True
  • False

Pregunta 34

Pregunta
Where can you find the Original Classification Authority’s (OCA) contact information in a security classification guide (SCG)?
Respuesta
  • On the cover of the SCG
  • On the last page of classification instructions of the SCG
  • The contact information for the OCA is not contained in the SCG

Pregunta 35

Pregunta
Where do the reasons for classifying certain items, elements or categories of information originally come from?
Respuesta
  • Executive Order 13526
  • Original Classification Authorities
  • Security Classification Guide (SCG)

Pregunta 36

Pregunta
What is required to access classified information? Select all that apply.
Respuesta
  • Need-to-know
  • Eligibility
  • Signed SF-312, Nondisclosure Agreement

Pregunta 37

Pregunta
Which of the following is an example of information technology that is authorized for storing classified information?
Respuesta
  • On a computer connected to the Non-classified Internet Protocol Router Network (NIPRNET)
  • On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)
  • On a personal computer of an authorized individual

Pregunta 38

Pregunta
Which of the following are applicable when using a phone for classified conversations? Select all that apply.
Respuesta
  • Only use Secure Terminal Equipment (STE) phones
  • Be aware of your surroundings and who might be able to hear your end of the conversation
  • Know how to use your Secure Terminal Equipment (STE)

Pregunta 39

Pregunta
Which form is used to record the securing of vaults, rooms, and containers used for storing classified material?
Respuesta
  • SF-701 Activity Security Checklist
  • SF-702 Security Container Check Sheet
  • SF-700 Security Container Information

Pregunta 40

Pregunta
What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?
Respuesta
  • Security Infraction
  • Spillage
  • Security Violation

Pregunta 41

Pregunta
Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release.
Respuesta
  • True
  • False

Pregunta 42

Pregunta
If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
Respuesta
  • Security Violation
  • Security Infraction
  • Spillage

Pregunta 43

Pregunta
What are the steps of the information security program lifecycle?
Respuesta
  • Classification, marking, dissemination, downgrading, and destruction
  • Classification, dissemination, downgrading, declassification, and destruction
  • Classification, safeguarding, dissemination, declassification, and destruction

Pregunta 44

Pregunta
When information, in the interest of national security, no longer requires protection at any level, it should be:
Respuesta
  • Declassified.
  • Classified.
  • Unclassified.

Pregunta 45

Pregunta
Who has responsibility for the overall policy direction of the Information Security Program?
Respuesta
  • Director of the Information Security Oversight Office (ISOO)
  • Heads of Defense Agencies
  • Under Secretary of Defense for Intelligence (USD(I))
  • Heads of DoD Components

Pregunta 46

Pregunta
What type of declassification process is the review of classified information that has been exempted from automatic declassification?
Respuesta
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification
  • Scheduled Declassification

Pregunta 47

Pregunta
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
Respuesta
  • Top Secret
  • Secret
  • Confidential

Pregunta 48

Pregunta
Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers?
Respuesta
  • National Security Agency
  • Local information systems personnel
  • Original Classification Authorities

Pregunta 49

Pregunta
The unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security.
Respuesta
  • Top Secret
  • Secret
  • Confidential

Pregunta 50

Pregunta
What is the process of making the initial decision that information could reasonably be expected to cause identifiable damage to national security called?
Respuesta
  • Compilation
  • Original classification
  • Derivative classification

Pregunta 51

Pregunta
All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.
Respuesta
  • Handles on
  • Doors on
  • Locks for

Pregunta 52

Pregunta
In which order must documents containing classified information be marked?
Respuesta
  • Portion markings, banner markings, classification authority block
  • Banner markings, portion markings, classification authority block
  • Portion markings, classification authority block, banner markings

Pregunta 53

Pregunta
The name of the recipient of classified information must be included on which part(s) of the packaging?
Respuesta
  • Outer wrapped package
  • Inner wrapped package
  • On both the inner and outer wrapped packages

Pregunta 54

Pregunta
When are “Downgrade To” instructions listed in the classification authority block on documents containing classified information?
Respuesta
  • Never
  • Always
  • As applicable

Pregunta 55

Pregunta
Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.
Respuesta
  • DoD Information Security Manual
  • Executive Order 13526
  • Security Classification Guide

Pregunta 56

Pregunta
Who references information from security classification guides (SCG) in order to classify information?
Respuesta
  • Derivative classifiers
  • Original Classification Authorities
  • Both derivative classifiers and Original Classification Authorities

Pregunta 57

Pregunta
Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.
Respuesta
  • True
  • False

Pregunta 58

Pregunta
Spillage always requires an investigation to determine the extent of the compromise of classified information.
Respuesta
  • True
  • False

Pregunta 59

Pregunta
What type of security incident has occurred when classified data is introduced on an information system not approved for that level of information?
Respuesta
  • Security category
  • Spillage
  • Security Infraction

Pregunta 60

Pregunta
Who can be an Original Classification Authority (OCA)?
Respuesta
  • An individual authorized in writing, either by the President, the Vice President, or by agency heads or other officials designated by the President
  • All cleared personnel
  • nyone who works for the DoD

Pregunta 61

Pregunta
What type of declassification process is the set date or event, determined by the Original Classification Authority (OCA), which will occur within 25 years from the date of original classification?
Respuesta
  • Automatic Declassification
  • Mandatory Declassification Review
  • Scheduled Declassification
  • Systematic Declassification

Pregunta 62

Pregunta
The purpose of the DoD information security program is to _________________________. Select all that apply.
Respuesta
  • Demonstrate a commitment to transparency in Government
  • Classify as much government information as possible
  • Protect national security information

Pregunta 63

Pregunta
_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
Respuesta
  • Compilation
  • Contained in
  • Revealed by

Pregunta 64

Pregunta
What information is listed in the classification authority block on a document containing classified information? Select all that apply.
Respuesta
  • Which source the information in the document was derived from
  • Classification level to downgrade to at a certain point in time (as applicable)
  • Who created the classified document
  • Current classification level of the document
  • Date on which to declassify the document

Pregunta 65

Pregunta
Declassification is the authorized change in the status of information from classified to unclassified.
Respuesta
  • True
  • False

Pregunta 66

Pregunta
What are the authorized places for storing classified information? Select all that apply.
Respuesta
  • In a GSA-approved security container
  • In information technology systems authorized for classified information
  • In an authorized individual’s locked desk drawer
  • In an authorized individual’s head or hands

Pregunta 67

Pregunta
What do derivative classifiers use to identify specific items or elements of information to be protected?
Respuesta
  • Original Classification Authorities
  • Security Classification Guides (SCG)
  • Executive Order 13526

Pregunta 68

Pregunta
A waiver is a permanent approved exclusion or deviation from information security standards.
Respuesta
  • True
  • False

Pregunta 69

Pregunta
Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?
Respuesta
  • Derivative classifiers
  • Original Classification Authorities
  • Both derivative classifiers and Original Classification Authorities

Pregunta 70

Pregunta
What type of declassification process is a way for members of the public to request the review of specific classified information?
Respuesta
  • Systematic Declassification
  • Mandatory Declassification Review
  • Scheduled Declassification
  • Automatic Declassification

Pregunta 71

Pregunta
When not directly in an authorized individual’s possession, classified documents must be stored in a GSA-approved security container.
Respuesta
  • True
  • False

Pregunta 72

Pregunta
Who maintains listings of evaluated destruction products that have been tested and meet performance requirements for destroying classified information?
Respuesta
  • Department of Defense
  • National Security Agency
  • Original Classification Authorities

Pregunta 73

Pregunta
A derivative classifier may overrule an original classification determination if it is in the interest of national security.
Respuesta
  • True
  • False

Pregunta 74

Pregunta
The communication or physical transfer of classified information to an unauthorized recipient is ______________________?
Respuesta
  • Spillage
  • Unauthorized Disclosure
  • None of the above

Pregunta 75

Pregunta
When marking a classified document, the classifier must always start with which section?
Respuesta
  • The banner
  • The portions/paragraphs within the document
  • The classification authority block

Pregunta 76

Pregunta
Who provides implementation guidance for the Information Security Program within the DoD?
Respuesta
  • Heads of Defense Agencies
  • Under Secretary of Defense for Intelligence (USD(I))
  • Heads of DoD Components
  • Director of the Information Security Oversight Office (ISOO)

Pregunta 77

Pregunta
What information does a security classification guide provide a derivative classifier? Select all that apply.
Respuesta
  • Classification level for each element of information to be protected
  • Reason for classification
  • Duration of classification and any applicable downgrading instructions
  • Special control notices
  • OCA contact information

Pregunta 78

Pregunta
What is the basic formula for granting access to classified information for individuals?
Respuesta
  • Verify the individual’s eligibility determination
  • Determine the individuals need-to-know
  • Acknowledge that the SF-312 has been executed

Pregunta 79

Pregunta
If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DODM 5200.01, Volume 3, which of the following should you request?
Respuesta
  • Security Incident
  • Exception
  • Waiver

Pregunta 80

Pregunta
Your co-worker, Hassel, did not place a SF-704 Secret classified document coversheet on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?
Respuesta
  • Infraction
  • Violation
  • Spillage
  • This is not a security incident because Hassel maintained positive control of the document.

Pregunta 81

Pregunta
When can Top Secret information be sent via the United States Postal Service (USPS)?
Respuesta
  • When Defense Courier Operations (DCO) is not available
  • When the information needs to be signed for
  • Never

Pregunta 82

Pregunta
The only type of acceptable document shredding is with a cross-cut shredder.
Respuesta
  • True
  • False

Pregunta 83

Pregunta
While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.
Respuesta
  • True
  • False

Pregunta 84

Pregunta
Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.
Respuesta
  • True
  • False

Pregunta 85

Pregunta
Joe Biden hands you a Top Secret document, but you are only eligible for Secret Access. If you think this is a security incident, what type of security incident do you think it is?
Respuesta
  • Infraction
  • Violation
  • Spillage
  • This is not a security incident, he is the president.

Pregunta 86

Pregunta
When classified information is in an authorized individual’s hands, why should the individual use a classified document cover sheet? Select all that apply.
Respuesta
  • To alert holders to the presence of classified information
  • To prevent inadvertent viewing of classified information by unauthorized personnel
  • To record the removal of classified information from a GSA-approved security container

Pregunta 87

Pregunta
What is the first step an Original Classification Authority (OCA) must take when originally classifying information?
Respuesta
  • Determine if the unauthorized disclosure of information could result in damage to our national security.
  • Determine if the information falls in an authorized classification category and not on the prohibited list in Executive Order 13526.
  • Determine if the information is official government information.

Pregunta 88

Pregunta
Which level of classified information may be transported via USPS mail? Select all that apply.
Respuesta
  • Confidential
  • Secret
  • Top Secret

Pregunta 89

Pregunta
If Travis inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?
Respuesta
  • Security Infraction
  • Spillage
  • Security Violation

Pregunta 90

Pregunta
Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?
Respuesta
  • Confidential
  • Secret
  • Top Secret
  • All of the above
  • None of the above

Pregunta 91

Pregunta
The unauthorized disclosure of Top Secret information could reasonably be expected to cause ____________________ to our national security.
Respuesta
  • Exceptionally grave damage
  • Serious damage
  • Damage
Mostrar resumen completo Ocultar resumen completo

Similar

SFPC (Possible Test Questions)
Casey Neville
PHYSEC Quiz
Casey Neville
CYBER Quiz
Casey Neville
INDUSTRIAL Quiz
Casey Neville
Infosec Quiz
Mike Benich
Huesos del Cuerpo Humano
Diego Santos
Traducciones de Latín
Diego Santos
Modelo de Examen de Inglés - Selectividad
juanmadj
MAPA DE IDEAS
fumbapirane
Deeper Learning
maya velasquez
VOCABULARIO DE INGLÉS
Sandra Molina Garcia