INFOSEC Quiz

Description

SFPC SFPC Quiz on INFOSEC Quiz, created by Casey Neville on 05/05/2022.
Casey Neville
Quiz by Casey Neville, updated more than 1 year ago
Casey Neville
Created by Casey Neville over 2 years ago
379
2

Resource summary

Question 1

Question
What are the steps of the information security program lifecycle?
Answer
  • Classification, dissemination, downgrading, declassification, and destruction
  • Classification, safeguarding, dissemination, declassification, and destruction
  • Classification, marking, dissemination, downgrading, and destruction

Question 2

Question
Which volumes of DoDM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information? Select all that apply.
Answer
  • Volume 1
  • Volume 2
  • Volume 3
  • Volume 4
  • All of the above

Question 3

Question
Unauthorized disclosure of _____________ information could reasonably be expected to cause serious damage to our national security.
Answer
  • Top Secret
  • Secret
  • Confidential

Question 4

Question
Unauthorized disclosure of _____________ information could reasonably be expected to cause exceptionally grave damage to our national security.
Answer
  • Top Secret
  • Secret
  • Confidential

Question 5

Question
Unauthorized disclosure of _____________ information could reasonably be expected to cause damage to our national security.
Answer
  • Top Secret
  • Secret
  • Confidential

Question 6

Question
What is the basic formula for granting access to classified information for individuals? Select all that apply.
Answer
  • Verify the individual’s eligibility determination
  • Determine the individual’s need-to-know
  • Acknowledge that the SF-312 has been executed

Question 7

Question
_____ is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
Answer
  • Original Classification
  • Derivative Classification

Question 8

Question
_____ is defined as an INITIAL determination that information requires, in the interest of national security, protection against unauthorized disclosure.
Answer
  • Derivative Classification
  • Original Classification

Question 9

Question
A derivative classifier may overrule an original classification determination if it is in the interest of national security.
Answer
  • True
  • False

Question 10

Question
When marking a classified document, the classifier must always start with which section?
Answer
  • The banner
  • The portions/paragraphs within the document
  • The classification authority block

Question 11

Question
If the banner marking is TOP SECRET, it is possible that some portion markings in that document can be U for Unclassified.
Answer
  • True
  • False

Question 12

Question
What information will you find in the Classification Authority Block on the front page of any classified document? Select all that apply.
Answer
  • Classified By
  • Post At
  • Derived From
  • Downgrade To (if applicable)
  • Declassify On
  • All of the above

Question 13

Question
Who issues security classification guides?
Answer
  • Derivative classifiers
  • Original classification authorities
  • Security managers

Question 14

Question
What information does a security classification guide provide a derivative classifier? Select all that apply.
Answer
  • Classification level for each element of information to be protected
  • Reason for classification
  • Duration of classification and any applicable downgrading instructions
  • Special control notices
  • OCA contact information

Question 15

Question
You may store classified information in your locked desk drawer while you go to lunch as long as you cover it with the appropriate classified cover sheet.
Answer
  • True
  • False

Question 16

Question
If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DoDM 5200.01, Volume 3, which of the following should you request?
Answer
  • Waiver
  • Exception
  • Security Incident

Question 17

Question
When can Top Secret information be sent via the United States Postal Service (USPS)?
Answer
  • When Defense Courier Operations (DCO) is not available
  • When the information needs to be signed for
  • Never

Question 18

Question
While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.
Answer
  • True
  • False

Question 19

Question
Your manager hands you a Top Secret document but you are only eligible for Secret access. If you think this is a security incident, what type of security incident do you think it is?
Answer
  • Infraction
  • Violation
  • Spillage
  • This is not a security incident because it was handed to you by your manager.

Question 20

Question
Your co-worker, Bob, did not place an SF-704, Secret classified document cover sheet, on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?
Answer
  • Infraction
  • Violation
  • Spillage
  • This is not a security incident because Bob maintained positive control of the document.

Question 21

Question
The declassification system where the public can ask for classified information to be reviewed for declassification and public release
Answer
  • Scheduled Declassification
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification

Question 22

Question
The declassification system where information exempted from automatic declassification is reviewed
Answer
  • Scheduled Declassification
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification

Question 23

Question
The declassification system where an OCA sets a date or event for declassification
Answer
  • Scheduled Declassification
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification

Question 24

Question
The declassification system where information is declassified when it is 25 years old
Answer
  • Scheduled Declassification
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification

Question 25

Question
Where would you find approved destruction equipment?
Answer
  • Best Buy
  • GSA Catalog
  • NSA EPL
  • Amazon

Question 26

Question
The only type of acceptable document shredding is with a crosscut shredder.
Answer
  • True
  • False

Question 27

Question
The DoD workforce plays a vital role in ensuring the effectiveness of the DoD Information Security Program.
Answer
  • True
  • False

Question 28

Question
The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.
Answer
  • Exceptionally grave damage
  • Serious damage
  • Damage

Question 29

Question
The unauthorized disclosure of Confidential information could reasonably be expected to cause ____________________ to our national security.
Answer
  • Exceptionally grave damage
  • Serious damage
  • Damage

Question 30

Question
If a derivative classifier believes information to be improperly classified, they can _____________ the classification decision.
Answer
  • Challenge
  • Override
  • Ignore

Question 31

Question
Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.
Answer
  • True
  • False

Question 32

Question
Why must all documents containing classified information be marked using a sequential process?
Answer
  • To mitigate confusion
  • To prevent marking errors
  • To prevent potential unauthorized disclosure
  • All of the above

Question 33

Question
The classification authority block identifies the authority, the source, and the duration of classification determination.
Answer
  • True
  • False

Question 34

Question
Where can you find the Original Classification Authority’s (OCA) contact information in a security classification guide (SCG)?
Answer
  • On the cover of the SCG
  • On the last page of classification instructions of the SCG
  • The contact information for the OCA is not contained in the SCG

Question 35

Question
Where do the reasons for classifying certain items, elements or categories of information originally come from?
Answer
  • Executive Order 13526
  • Original Classification Authorities
  • Security Classification Guide (SCG)

Question 36

Question
What is required to access classified information? Select all that apply.
Answer
  • Need-to-know
  • Eligibility
  • Signed SF-312, Nondisclosure Agreement

Question 37

Question
Which of the following is an example of information technology that is authorized for storing classified information?
Answer
  • On a computer connected to the Non-classified Internet Protocol Router Network (NIPRNET)
  • On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)
  • On a personal computer of an authorized individual

Question 38

Question
Which of the following are applicable when using a phone for classified conversations? Select all that apply.
Answer
  • Only use Secure Terminal Equipment (STE) phones
  • Be aware of your surroundings and who might be able to hear your end of the conversation
  • Know how to use your Secure Terminal Equipment (STE)

Question 39

Question
Which form is used to record the securing of vaults, rooms, and containers used for storing classified material?
Answer
  • SF-701 Activity Security Checklist
  • SF-702 Security Container Check Sheet
  • SF-700 Security Container Information

Question 40

Question
What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?
Answer
  • Security Infraction
  • Spillage
  • Security Violation

Question 41

Question
Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release.
Answer
  • True
  • False

Question 42

Question
If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
Answer
  • Security Violation
  • Security Infraction
  • Spillage

Question 43

Question
What are the steps of the information security program lifecycle?
Answer
  • Classification, marking, dissemination, downgrading, and destruction
  • Classification, dissemination, downgrading, declassification, and destruction
  • Classification, safeguarding, dissemination, declassification, and destruction

Question 44

Question
When information, in the interest of national security, no longer requires protection at any level, it should be:
Answer
  • Declassified.
  • Classified.
  • Unclassified.

Question 45

Question
Who has responsibility for the overall policy direction of the Information Security Program?
Answer
  • Director of the Information Security Oversight Office (ISOO)
  • Heads of Defense Agencies
  • Under Secretary of Defense for Intelligence (USD(I))
  • Heads of DoD Components

Question 46

Question
What type of declassification process is the review of classified information that has been exempted from automatic declassification?
Answer
  • Automatic Declassification
  • Mandatory Declassification Review
  • Systematic Declassification
  • Scheduled Declassification

Question 47

Question
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
Answer
  • Top Secret
  • Secret
  • Confidential

Question 48

Question
Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers?
Answer
  • National Security Agency
  • Local information systems personnel
  • Original Classification Authorities

Question 49

Question
The unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security.
Answer
  • Top Secret
  • Secret
  • Confidential

Question 50

Question
What is the process of making the initial decision that information could reasonably be expected to cause identifiable damage to national security called?
Answer
  • Compilation
  • Original classification
  • Derivative classification

Question 51

Question
All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.
Answer
  • Handles on
  • Doors on
  • Locks for

Question 52

Question
In which order must documents containing classified information be marked?
Answer
  • Portion markings, banner markings, classification authority block
  • Banner markings, portion markings, classification authority block
  • Portion markings, classification authority block, banner markings

Question 53

Question
The name of the recipient of classified information must be included on which part(s) of the packaging?
Answer
  • Outer wrapped package
  • Inner wrapped package
  • On both the inner and outer wrapped packages

Question 54

Question
When are “Downgrade To” instructions listed in the classification authority block on documents containing classified information?
Answer
  • Never
  • Always
  • As applicable

Question 55

Question
Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.
Answer
  • DoD Information Security Manual
  • Executive Order 13526
  • Security Classification Guide

Question 56

Question
Who references information from security classification guides (SCG) in order to classify information?
Answer
  • Derivative classifiers
  • Original Classification Authorities
  • Both derivative classifiers and Original Classification Authorities

Question 57

Question
Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.
Answer
  • True
  • False

Question 58

Question
Spillage always requires an investigation to determine the extent of the compromise of classified information.
Answer
  • True
  • False

Question 59

Question
What type of security incident has occurred when classified data is introduced on an information system not approved for that level of information?
Answer
  • Security category
  • Spillage
  • Security Infraction

Question 60

Question
Who can be an Original Classification Authority (OCA)?
Answer
  • An individual authorized in writing, either by the President, the Vice President, or by agency heads or other officials designated by the President
  • All cleared personnel
  • nyone who works for the DoD

Question 61

Question
What type of declassification process is the set date or event, determined by the Original Classification Authority (OCA), which will occur within 25 years from the date of original classification?
Answer
  • Automatic Declassification
  • Mandatory Declassification Review
  • Scheduled Declassification
  • Systematic Declassification

Question 62

Question
The purpose of the DoD information security program is to _________________________. Select all that apply.
Answer
  • Demonstrate a commitment to transparency in Government
  • Classify as much government information as possible
  • Protect national security information

Question 63

Question
_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
Answer
  • Compilation
  • Contained in
  • Revealed by

Question 64

Question
What information is listed in the classification authority block on a document containing classified information? Select all that apply.
Answer
  • Which source the information in the document was derived from
  • Classification level to downgrade to at a certain point in time (as applicable)
  • Who created the classified document
  • Current classification level of the document
  • Date on which to declassify the document

Question 65

Question
Declassification is the authorized change in the status of information from classified to unclassified.
Answer
  • True
  • False

Question 66

Question
What are the authorized places for storing classified information? Select all that apply.
Answer
  • In a GSA-approved security container
  • In information technology systems authorized for classified information
  • In an authorized individual’s locked desk drawer
  • In an authorized individual’s head or hands

Question 67

Question
What do derivative classifiers use to identify specific items or elements of information to be protected?
Answer
  • Original Classification Authorities
  • Security Classification Guides (SCG)
  • Executive Order 13526

Question 68

Question
A waiver is a permanent approved exclusion or deviation from information security standards.
Answer
  • True
  • False

Question 69

Question
Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?
Answer
  • Derivative classifiers
  • Original Classification Authorities
  • Both derivative classifiers and Original Classification Authorities

Question 70

Question
What type of declassification process is a way for members of the public to request the review of specific classified information?
Answer
  • Systematic Declassification
  • Mandatory Declassification Review
  • Scheduled Declassification
  • Automatic Declassification

Question 71

Question
When not directly in an authorized individual’s possession, classified documents must be stored in a GSA-approved security container.
Answer
  • True
  • False

Question 72

Question
Who maintains listings of evaluated destruction products that have been tested and meet performance requirements for destroying classified information?
Answer
  • Department of Defense
  • National Security Agency
  • Original Classification Authorities

Question 73

Question
A derivative classifier may overrule an original classification determination if it is in the interest of national security.
Answer
  • True
  • False

Question 74

Question
The communication or physical transfer of classified information to an unauthorized recipient is ______________________?
Answer
  • Spillage
  • Unauthorized Disclosure
  • None of the above

Question 75

Question
When marking a classified document, the classifier must always start with which section?
Answer
  • The banner
  • The portions/paragraphs within the document
  • The classification authority block

Question 76

Question
Who provides implementation guidance for the Information Security Program within the DoD?
Answer
  • Heads of Defense Agencies
  • Under Secretary of Defense for Intelligence (USD(I))
  • Heads of DoD Components
  • Director of the Information Security Oversight Office (ISOO)

Question 77

Question
What information does a security classification guide provide a derivative classifier? Select all that apply.
Answer
  • Classification level for each element of information to be protected
  • Reason for classification
  • Duration of classification and any applicable downgrading instructions
  • Special control notices
  • OCA contact information

Question 78

Question
What is the basic formula for granting access to classified information for individuals?
Answer
  • Verify the individual’s eligibility determination
  • Determine the individuals need-to-know
  • Acknowledge that the SF-312 has been executed

Question 79

Question
If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DODM 5200.01, Volume 3, which of the following should you request?
Answer
  • Security Incident
  • Exception
  • Waiver

Question 80

Question
Your co-worker, Hassel, did not place a SF-704 Secret classified document coversheet on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?
Answer
  • Infraction
  • Violation
  • Spillage
  • This is not a security incident because Hassel maintained positive control of the document.

Question 81

Question
When can Top Secret information be sent via the United States Postal Service (USPS)?
Answer
  • When Defense Courier Operations (DCO) is not available
  • When the information needs to be signed for
  • Never

Question 82

Question
The only type of acceptable document shredding is with a cross-cut shredder.
Answer
  • True
  • False

Question 83

Question
While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.
Answer
  • True
  • False

Question 84

Question
Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.
Answer
  • True
  • False

Question 85

Question
Joe Biden hands you a Top Secret document, but you are only eligible for Secret Access. If you think this is a security incident, what type of security incident do you think it is?
Answer
  • Infraction
  • Violation
  • Spillage
  • This is not a security incident, he is the president.

Question 86

Question
When classified information is in an authorized individual’s hands, why should the individual use a classified document cover sheet? Select all that apply.
Answer
  • To alert holders to the presence of classified information
  • To prevent inadvertent viewing of classified information by unauthorized personnel
  • To record the removal of classified information from a GSA-approved security container

Question 87

Question
What is the first step an Original Classification Authority (OCA) must take when originally classifying information?
Answer
  • Determine if the unauthorized disclosure of information could result in damage to our national security.
  • Determine if the information falls in an authorized classification category and not on the prohibited list in Executive Order 13526.
  • Determine if the information is official government information.

Question 88

Question
Which level of classified information may be transported via USPS mail? Select all that apply.
Answer
  • Confidential
  • Secret
  • Top Secret

Question 89

Question
If Travis inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?
Answer
  • Security Infraction
  • Spillage
  • Security Violation

Question 90

Question
Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?
Answer
  • Confidential
  • Secret
  • Top Secret
  • All of the above
  • None of the above

Question 91

Question
The unauthorized disclosure of Top Secret information could reasonably be expected to cause ____________________ to our national security.
Answer
  • Exceptionally grave damage
  • Serious damage
  • Damage
Show full summary Hide full summary

Similar

SFPC (Possible Test Questions)
Casey Neville
PHYSEC Quiz
Casey Neville
CYBER Quiz
Casey Neville
INDUSTRIAL Quiz
Casey Neville
Infosec Quiz
Mike Benich
EBW: Onderwerp 1, Gr7 (KABV)
mvloch
A Christmas Carol Quotes
0serenityrose0
GCSE AQA Chemistry - Unit 3
James Jolliffe
GCSE Maths Conversions
EmilieT
Flame tests
Joshua Rees
GoConqr Guide to Flowcharts for Business
Sarah Egan