Pregunta 1
Pregunta
What are the steps of the information security program lifecycle?
Respuesta
-
Classification, dissemination, downgrading, declassification, and destruction
-
Classification, safeguarding, dissemination, declassification, and destruction
-
Classification, marking, dissemination, downgrading, and destruction
Pregunta 2
Pregunta
Which volumes of DoDM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information?
Select all that apply.
Respuesta
-
Volume 1
-
Volume 2
-
Volume 3
-
Volume 4
-
All of the above
Pregunta 3
Pregunta
Unauthorized disclosure of _____________ information could reasonably be expected to cause serious damage to our national security.
Respuesta
-
Top Secret
-
Secret
-
Confidential
Pregunta 4
Pregunta
Unauthorized disclosure of _____________ information could reasonably be expected to cause exceptionally grave damage to our national security.
Respuesta
-
Top Secret
-
Secret
-
Confidential
Pregunta 5
Pregunta
Unauthorized disclosure of _____________ information could reasonably be expected to cause damage to our national security.
Respuesta
-
Top Secret
-
Secret
-
Confidential
Pregunta 6
Pregunta
What is the basic formula for granting access to classified information for individuals? Select all that apply.
Respuesta
-
Verify the individual’s eligibility determination
-
Determine the individual’s need-to-know
-
Acknowledge that the SF-312 has been executed
Pregunta 7
Pregunta
_____ is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
Pregunta 8
Pregunta
_____ is defined as an INITIAL determination that information requires, in the interest of national security, protection against unauthorized disclosure.
Pregunta 9
Pregunta
A derivative classifier may overrule an original classification determination if it is in the interest of national security.
Pregunta 10
Pregunta
When marking a classified document, the classifier must always start with which section?
Pregunta 11
Pregunta
If the banner marking is TOP SECRET, it is possible that some portion markings in that document can be U for Unclassified.
Pregunta 12
Pregunta
What information will you find in the Classification Authority Block on the front page of any classified document? Select all that apply.
Pregunta 13
Pregunta
Who issues security classification guides?
Pregunta 14
Pregunta
What information does a security classification guide provide a derivative classifier? Select all that apply.
Respuesta
-
Classification level for each element of information to be protected
-
Reason for classification
-
Duration of classification and any applicable downgrading instructions
-
Special control notices
-
OCA contact information
Pregunta 15
Pregunta
You may store classified information in your locked desk drawer while you go to lunch as long as you cover it with the appropriate classified cover sheet.
Pregunta 16
Pregunta
If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DoDM 5200.01, Volume 3, which of the following should you request?
Respuesta
-
Waiver
-
Exception
-
Security Incident
Pregunta 17
Pregunta
When can Top Secret information be sent via the United States Postal Service (USPS)?
Pregunta 18
Pregunta
While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.
Pregunta 19
Pregunta
Your manager hands you a Top Secret document but you are only eligible for Secret access. If you think this is a security incident, what type of security incident do you think it is?
Pregunta 20
Pregunta
Your co-worker, Bob, did not place an SF-704, Secret classified document cover sheet, on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?
Pregunta 21
Pregunta
The declassification system where the public can ask for classified information to be reviewed for declassification and public release
Respuesta
-
Scheduled Declassification
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
Pregunta 22
Pregunta
The declassification system where information exempted from automatic declassification is reviewed
Respuesta
-
Scheduled Declassification
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
Pregunta 23
Pregunta
The declassification system where an OCA sets a date or event for declassification
Respuesta
-
Scheduled Declassification
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
Pregunta 24
Pregunta
The declassification system where information is declassified when it is 25 years old
Respuesta
-
Scheduled Declassification
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
Pregunta 25
Pregunta
Where would you find approved destruction equipment?
Respuesta
-
Best Buy
-
GSA Catalog
-
NSA EPL
-
Amazon
Pregunta 26
Pregunta
The only type of acceptable document shredding is with a crosscut shredder.
Pregunta 27
Pregunta
The DoD workforce plays a vital role in ensuring the effectiveness of the DoD Information Security Program.
Pregunta 28
Pregunta
The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.
Pregunta 29
Pregunta
The unauthorized disclosure of Confidential information could reasonably be expected to cause ____________________ to our national security.
Pregunta 30
Pregunta
If a derivative classifier believes information to be improperly classified, they can _____________ the classification decision.
Respuesta
-
Challenge
-
Override
-
Ignore
Pregunta 31
Pregunta
Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.
Pregunta 32
Pregunta
Why must all documents containing classified information be marked using a sequential process?
Pregunta 33
Pregunta
The classification authority block identifies the authority, the source, and the duration of classification determination.
Pregunta 34
Pregunta
Where can you find the Original Classification Authority’s (OCA) contact information in a security classification guide (SCG)?
Pregunta 35
Pregunta
Where do the reasons for classifying certain items, elements or categories of information originally come from?
Pregunta 36
Pregunta
What is required to access classified information? Select all that apply.
Pregunta 37
Pregunta
Which of the following is an example of information technology that is authorized for storing classified information?
Respuesta
-
On a computer connected to the Non-classified Internet Protocol Router Network (NIPRNET)
-
On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)
-
On a personal computer of an authorized individual
Pregunta 38
Pregunta
Which of the following are applicable when using a phone for classified conversations? Select all that apply.
Respuesta
-
Only use Secure Terminal Equipment (STE) phones
-
Be aware of your surroundings and who might be able to hear your end of the conversation
-
Know how to use your Secure Terminal Equipment (STE)
Pregunta 39
Pregunta
Which form is used to record the securing of vaults, rooms, and containers used for storing classified material?
Respuesta
-
SF-701 Activity Security Checklist
-
SF-702 Security Container Check Sheet
-
SF-700 Security Container Information
Pregunta 40
Pregunta
What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?
Respuesta
-
Security Infraction
-
Spillage
-
Security Violation
Pregunta 41
Pregunta
Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release.
Pregunta 42
Pregunta
If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
Respuesta
-
Security Violation
-
Security Infraction
-
Spillage
Pregunta 43
Pregunta
What are the steps of the information security program lifecycle?
Respuesta
-
Classification, marking, dissemination, downgrading, and destruction
-
Classification, dissemination, downgrading, declassification, and destruction
-
Classification, safeguarding, dissemination, declassification, and destruction
Pregunta 44
Pregunta
When information, in the interest of national security, no longer requires protection at any level, it should be:
Respuesta
-
Declassified.
-
Classified.
-
Unclassified.
Pregunta 45
Pregunta
Who has responsibility for the overall policy direction of the Information Security Program?
Respuesta
-
Director of the Information Security Oversight Office (ISOO)
-
Heads of Defense Agencies
-
Under Secretary of Defense for Intelligence (USD(I))
-
Heads of DoD Components
Pregunta 46
Pregunta
What type of declassification process is the review of classified information that has been exempted from automatic declassification?
Respuesta
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
-
Scheduled Declassification
Pregunta 47
Pregunta
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
Respuesta
-
Top Secret
-
Secret
-
Confidential
Pregunta 48
Pregunta
Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers?
Pregunta 49
Pregunta
The unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security.
Respuesta
-
Top Secret
-
Secret
-
Confidential
Pregunta 50
Pregunta
What is the process of making the initial decision that information could reasonably be expected to cause identifiable damage to national security called?
Pregunta 51
Pregunta
All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.
Respuesta
-
Handles on
-
Doors on
-
Locks for
Pregunta 52
Pregunta
In which order must documents containing classified information be marked?
Respuesta
-
Portion markings, banner markings, classification authority block
-
Banner markings, portion markings, classification authority block
-
Portion markings, classification authority block, banner markings
Pregunta 53
Pregunta
The name of the recipient of classified information must be included on which part(s) of the packaging?
Pregunta 54
Pregunta
When are “Downgrade To” instructions listed in the classification authority block on documents containing classified information?
Respuesta
-
Never
-
Always
-
As applicable
Pregunta 55
Pregunta
Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.
Pregunta 56
Pregunta
Who references information from security classification guides (SCG) in order to classify information?
Pregunta 57
Pregunta
Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.
Pregunta 58
Pregunta
Spillage always requires an investigation to determine the extent of the compromise of classified information.
Pregunta 59
Pregunta
What type of security incident has occurred when classified data is introduced on an information system not approved for that level of information?
Respuesta
-
Security category
-
Spillage
-
Security Infraction
Pregunta 60
Pregunta
Who can be an Original Classification Authority (OCA)?
Respuesta
-
An individual authorized in writing, either by the President, the Vice President, or by agency heads or other officials designated by the President
-
All cleared personnel
-
nyone who works for the DoD
Pregunta 61
Pregunta
What type of declassification process is the set date or event, determined by the Original Classification Authority (OCA), which will occur within 25 years from the date of original classification?
Respuesta
-
Automatic Declassification
-
Mandatory Declassification Review
-
Scheduled Declassification
-
Systematic Declassification
Pregunta 62
Pregunta
The purpose of the DoD information security program is to _________________________. Select all that apply.
Respuesta
-
Demonstrate a commitment to transparency in Government
-
Classify as much government information as possible
-
Protect national security information
Pregunta 63
Pregunta
_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
Respuesta
-
Compilation
-
Contained in
-
Revealed by
Pregunta 64
Pregunta
What information is listed in the classification authority block on a document containing classified information? Select all that apply.
Respuesta
-
Which source the information in the document was derived from
-
Classification level to downgrade to at a certain point in time (as applicable)
-
Who created the classified document
-
Current classification level of the document
-
Date on which to declassify the document
Pregunta 65
Pregunta
Declassification is the authorized change in the status of information from classified to unclassified.
Pregunta 66
Pregunta
What are the authorized places for storing classified information? Select all that apply.
Respuesta
-
In a GSA-approved security container
-
In information technology systems authorized for classified information
-
In an authorized individual’s locked desk drawer
-
In an authorized individual’s head or hands
Pregunta 67
Pregunta
What do derivative classifiers use to identify specific items or elements of information to be protected?
Pregunta 68
Pregunta
A waiver is a permanent approved exclusion or deviation from information security standards.
Pregunta 69
Pregunta
Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?
Pregunta 70
Pregunta
What type of declassification process is a way for members of the public to request the review of specific classified information?
Respuesta
-
Systematic Declassification
-
Mandatory Declassification Review
-
Scheduled Declassification
-
Automatic Declassification
Pregunta 71
Pregunta
When not directly in an authorized individual’s possession, classified documents must be stored in a GSA-approved security container.
Pregunta 72
Pregunta
Who maintains listings of evaluated destruction products that have been tested and meet performance requirements for destroying classified information?
Pregunta 73
Pregunta
A derivative classifier may overrule an original classification determination if it is in the interest of national security.
Pregunta 74
Pregunta
The communication or physical transfer of classified information to an unauthorized recipient is ______________________?
Respuesta
-
Spillage
-
Unauthorized Disclosure
-
None of the above
Pregunta 75
Pregunta
When marking a classified document, the classifier must always start with which section?
Pregunta 76
Pregunta
Who provides implementation guidance for the Information Security Program within the DoD?
Respuesta
-
Heads of Defense Agencies
-
Under Secretary of Defense for Intelligence (USD(I))
-
Heads of DoD Components
-
Director of the Information Security Oversight Office (ISOO)
Pregunta 77
Pregunta
What information does a security classification guide provide a derivative classifier? Select all that apply.
Respuesta
-
Classification level for each element of information to be protected
-
Reason for classification
-
Duration of classification and any applicable downgrading instructions
-
Special control notices
-
OCA contact information
Pregunta 78
Pregunta
What is the basic formula for granting access to classified information for individuals?
Respuesta
-
Verify the individual’s eligibility determination
-
Determine the individuals need-to-know
-
Acknowledge that the SF-312 has been executed
Pregunta 79
Pregunta
If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DODM 5200.01, Volume 3, which of the following should you request?
Respuesta
-
Security Incident
-
Exception
-
Waiver
Pregunta 80
Pregunta
Your co-worker, Hassel, did not place a SF-704 Secret classified document coversheet on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?
Pregunta 81
Pregunta
When can Top Secret information be sent via the United States Postal Service (USPS)?
Pregunta 82
Pregunta
The only type of acceptable document shredding is with a cross-cut shredder.
Pregunta 83
Pregunta
While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.
Pregunta 84
Pregunta
Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.
Pregunta 85
Pregunta
Joe Biden hands you a Top Secret document, but you are only eligible for Secret Access. If you think this is a security incident, what type of security incident do you think it is?
Pregunta 86
Pregunta
When classified information is in an authorized individual’s hands, why should the individual use a classified document cover sheet? Select all that apply.
Respuesta
-
To alert holders to the presence of classified information
-
To prevent inadvertent viewing of classified information by unauthorized personnel
-
To record the removal of classified information from a GSA-approved security container
Pregunta 87
Pregunta
What is the first step an Original Classification Authority (OCA) must take when originally classifying information?
Respuesta
-
Determine if the unauthorized disclosure of information could result in damage to our national security.
-
Determine if the information falls in an authorized classification category and not on the prohibited list in Executive Order 13526.
-
Determine if the information is official government information.
Pregunta 88
Pregunta
Which level of classified information may be transported via USPS mail? Select all that apply.
Respuesta
-
Confidential
-
Secret
-
Top Secret
Pregunta 89
Pregunta
If Travis inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?
Respuesta
-
Security Infraction
-
Spillage
-
Security Violation
Pregunta 90
Pregunta
Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?
Respuesta
-
Confidential
-
Secret
-
Top Secret
-
All of the above
-
None of the above
Pregunta 91
Pregunta
The unauthorized disclosure of Top Secret information could reasonably be expected to cause ____________________ to our national security.