Question 1
Question
What are the steps of the information security program lifecycle?
Answer
-
Classification, dissemination, downgrading, declassification, and destruction
-
Classification, safeguarding, dissemination, declassification, and destruction
-
Classification, marking, dissemination, downgrading, and destruction
Question 2
Question
Which volumes of DoDM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information?
Select all that apply.
Answer
-
Volume 1
-
Volume 2
-
Volume 3
-
Volume 4
-
All of the above
Question 3
Question
Unauthorized disclosure of _____________ information could reasonably be expected to cause serious damage to our national security.
Answer
-
Top Secret
-
Secret
-
Confidential
Question 4
Question
Unauthorized disclosure of _____________ information could reasonably be expected to cause exceptionally grave damage to our national security.
Answer
-
Top Secret
-
Secret
-
Confidential
Question 5
Question
Unauthorized disclosure of _____________ information could reasonably be expected to cause damage to our national security.
Answer
-
Top Secret
-
Secret
-
Confidential
Question 6
Question
What is the basic formula for granting access to classified information for individuals? Select all that apply.
Answer
-
Verify the individual’s eligibility determination
-
Determine the individual’s need-to-know
-
Acknowledge that the SF-312 has been executed
Question 7
Question
_____ is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
Question 8
Question
_____ is defined as an INITIAL determination that information requires, in the interest of national security, protection against unauthorized disclosure.
Question 9
Question
A derivative classifier may overrule an original classification determination if it is in the interest of national security.
Question 10
Question
When marking a classified document, the classifier must always start with which section?
Question 11
Question
If the banner marking is TOP SECRET, it is possible that some portion markings in that document can be U for Unclassified.
Question 12
Question
What information will you find in the Classification Authority Block on the front page of any classified document? Select all that apply.
Question 13
Question
Who issues security classification guides?
Question 14
Question
What information does a security classification guide provide a derivative classifier? Select all that apply.
Answer
-
Classification level for each element of information to be protected
-
Reason for classification
-
Duration of classification and any applicable downgrading instructions
-
Special control notices
-
OCA contact information
Question 15
Question
You may store classified information in your locked desk drawer while you go to lunch as long as you cover it with the appropriate classified cover sheet.
Question 16
Question
If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DoDM 5200.01, Volume 3, which of the following should you request?
Answer
-
Waiver
-
Exception
-
Security Incident
Question 17
Question
When can Top Secret information be sent via the United States Postal Service (USPS)?
Question 18
Question
While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.
Question 19
Question
Your manager hands you a Top Secret document but you are only eligible for Secret access. If you think this is a security incident, what type of security incident do you think it is?
Question 20
Question
Your co-worker, Bob, did not place an SF-704, Secret classified document cover sheet, on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?
Question 21
Question
The declassification system where the public can ask for classified information to be reviewed for declassification and public release
Answer
-
Scheduled Declassification
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
Question 22
Question
The declassification system where information exempted from automatic declassification is reviewed
Answer
-
Scheduled Declassification
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
Question 23
Question
The declassification system where an OCA sets a date or event for declassification
Answer
-
Scheduled Declassification
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
Question 24
Question
The declassification system where information is declassified when it is 25 years old
Answer
-
Scheduled Declassification
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
Question 25
Question
Where would you find approved destruction equipment?
Answer
-
Best Buy
-
GSA Catalog
-
NSA EPL
-
Amazon
Question 26
Question
The only type of acceptable document shredding is with a crosscut shredder.
Question 27
Question
The DoD workforce plays a vital role in ensuring the effectiveness of the DoD Information Security Program.
Question 28
Question
The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.
Question 29
Question
The unauthorized disclosure of Confidential information could reasonably be expected to cause ____________________ to our national security.
Question 30
Question
If a derivative classifier believes information to be improperly classified, they can _____________ the classification decision.
Answer
-
Challenge
-
Override
-
Ignore
Question 31
Question
Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.
Question 32
Question
Why must all documents containing classified information be marked using a sequential process?
Question 33
Question
The classification authority block identifies the authority, the source, and the duration of classification determination.
Question 34
Question
Where can you find the Original Classification Authority’s (OCA) contact information in a security classification guide (SCG)?
Question 35
Question
Where do the reasons for classifying certain items, elements or categories of information originally come from?
Question 36
Question
What is required to access classified information? Select all that apply.
Question 37
Question
Which of the following is an example of information technology that is authorized for storing classified information?
Answer
-
On a computer connected to the Non-classified Internet Protocol Router Network (NIPRNET)
-
On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)
-
On a personal computer of an authorized individual
Question 38
Question
Which of the following are applicable when using a phone for classified conversations? Select all that apply.
Answer
-
Only use Secure Terminal Equipment (STE) phones
-
Be aware of your surroundings and who might be able to hear your end of the conversation
-
Know how to use your Secure Terminal Equipment (STE)
Question 39
Question
Which form is used to record the securing of vaults, rooms, and containers used for storing classified material?
Answer
-
SF-701 Activity Security Checklist
-
SF-702 Security Container Check Sheet
-
SF-700 Security Container Information
Question 40
Question
What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?
Answer
-
Security Infraction
-
Spillage
-
Security Violation
Question 41
Question
Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release.
Question 42
Question
If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
Answer
-
Security Violation
-
Security Infraction
-
Spillage
Question 43
Question
What are the steps of the information security program lifecycle?
Answer
-
Classification, marking, dissemination, downgrading, and destruction
-
Classification, dissemination, downgrading, declassification, and destruction
-
Classification, safeguarding, dissemination, declassification, and destruction
Question 44
Question
When information, in the interest of national security, no longer requires protection at any level, it should be:
Answer
-
Declassified.
-
Classified.
-
Unclassified.
Question 45
Question
Who has responsibility for the overall policy direction of the Information Security Program?
Answer
-
Director of the Information Security Oversight Office (ISOO)
-
Heads of Defense Agencies
-
Under Secretary of Defense for Intelligence (USD(I))
-
Heads of DoD Components
Question 46
Question
What type of declassification process is the review of classified information that has been exempted from automatic declassification?
Answer
-
Automatic Declassification
-
Mandatory Declassification Review
-
Systematic Declassification
-
Scheduled Declassification
Question 47
Question
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
Answer
-
Top Secret
-
Secret
-
Confidential
Question 48
Question
Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers?
Question 49
Question
The unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security.
Answer
-
Top Secret
-
Secret
-
Confidential
Question 50
Question
What is the process of making the initial decision that information could reasonably be expected to cause identifiable damage to national security called?
Question 51
Question
All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.
Answer
-
Handles on
-
Doors on
-
Locks for
Question 52
Question
In which order must documents containing classified information be marked?
Answer
-
Portion markings, banner markings, classification authority block
-
Banner markings, portion markings, classification authority block
-
Portion markings, classification authority block, banner markings
Question 53
Question
The name of the recipient of classified information must be included on which part(s) of the packaging?
Question 54
Question
When are “Downgrade To” instructions listed in the classification authority block on documents containing classified information?
Answer
-
Never
-
Always
-
As applicable
Question 55
Question
Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.
Question 56
Question
Who references information from security classification guides (SCG) in order to classify information?
Question 57
Question
Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.
Question 58
Question
Spillage always requires an investigation to determine the extent of the compromise of classified information.
Question 59
Question
What type of security incident has occurred when classified data is introduced on an information system not approved for that level of information?
Answer
-
Security category
-
Spillage
-
Security Infraction
Question 60
Question
Who can be an Original Classification Authority (OCA)?
Answer
-
An individual authorized in writing, either by the President, the Vice President, or by agency heads or other officials designated by the President
-
All cleared personnel
-
nyone who works for the DoD
Question 61
Question
What type of declassification process is the set date or event, determined by the Original Classification Authority (OCA), which will occur within 25 years from the date of original classification?
Answer
-
Automatic Declassification
-
Mandatory Declassification Review
-
Scheduled Declassification
-
Systematic Declassification
Question 62
Question
The purpose of the DoD information security program is to _________________________. Select all that apply.
Answer
-
Demonstrate a commitment to transparency in Government
-
Classify as much government information as possible
-
Protect national security information
Question 63
Question
_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
Answer
-
Compilation
-
Contained in
-
Revealed by
Question 64
Question
What information is listed in the classification authority block on a document containing classified information? Select all that apply.
Answer
-
Which source the information in the document was derived from
-
Classification level to downgrade to at a certain point in time (as applicable)
-
Who created the classified document
-
Current classification level of the document
-
Date on which to declassify the document
Question 65
Question
Declassification is the authorized change in the status of information from classified to unclassified.
Question 66
Question
What are the authorized places for storing classified information? Select all that apply.
Answer
-
In a GSA-approved security container
-
In information technology systems authorized for classified information
-
In an authorized individual’s locked desk drawer
-
In an authorized individual’s head or hands
Question 67
Question
What do derivative classifiers use to identify specific items or elements of information to be protected?
Question 68
Question
A waiver is a permanent approved exclusion or deviation from information security standards.
Question 69
Question
Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?
Question 70
Question
What type of declassification process is a way for members of the public to request the review of specific classified information?
Answer
-
Systematic Declassification
-
Mandatory Declassification Review
-
Scheduled Declassification
-
Automatic Declassification
Question 71
Question
When not directly in an authorized individual’s possession, classified documents must be stored in a GSA-approved security container.
Question 72
Question
Who maintains listings of evaluated destruction products that have been tested and meet performance requirements for destroying classified information?
Question 73
Question
A derivative classifier may overrule an original classification determination if it is in the interest of national security.
Question 74
Question
The communication or physical transfer of classified information to an unauthorized recipient is ______________________?
Answer
-
Spillage
-
Unauthorized Disclosure
-
None of the above
Question 75
Question
When marking a classified document, the classifier must always start with which section?
Question 76
Question
Who provides implementation guidance for the Information Security Program within the DoD?
Answer
-
Heads of Defense Agencies
-
Under Secretary of Defense for Intelligence (USD(I))
-
Heads of DoD Components
-
Director of the Information Security Oversight Office (ISOO)
Question 77
Question
What information does a security classification guide provide a derivative classifier? Select all that apply.
Answer
-
Classification level for each element of information to be protected
-
Reason for classification
-
Duration of classification and any applicable downgrading instructions
-
Special control notices
-
OCA contact information
Question 78
Question
What is the basic formula for granting access to classified information for individuals?
Answer
-
Verify the individual’s eligibility determination
-
Determine the individuals need-to-know
-
Acknowledge that the SF-312 has been executed
Question 79
Question
If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DODM 5200.01, Volume 3, which of the following should you request?
Answer
-
Security Incident
-
Exception
-
Waiver
Question 80
Question
Your co-worker, Hassel, did not place a SF-704 Secret classified document coversheet on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?
Question 81
Question
When can Top Secret information be sent via the United States Postal Service (USPS)?
Question 82
Question
The only type of acceptable document shredding is with a cross-cut shredder.
Question 83
Question
While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.
Question 84
Question
Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.
Question 85
Question
Joe Biden hands you a Top Secret document, but you are only eligible for Secret Access. If you think this is a security incident, what type of security incident do you think it is?
Question 86
Question
When classified information is in an authorized individual’s hands, why should the individual use a classified document cover sheet? Select all that apply.
Answer
-
To alert holders to the presence of classified information
-
To prevent inadvertent viewing of classified information by unauthorized personnel
-
To record the removal of classified information from a GSA-approved security container
Question 87
Question
What is the first step an Original Classification Authority (OCA) must take when originally classifying information?
Answer
-
Determine if the unauthorized disclosure of information could result in damage to our national security.
-
Determine if the information falls in an authorized classification category and not on the prohibited list in Executive Order 13526.
-
Determine if the information is official government information.
Question 88
Question
Which level of classified information may be transported via USPS mail? Select all that apply.
Answer
-
Confidential
-
Secret
-
Top Secret
Question 89
Question
If Travis inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?
Answer
-
Security Infraction
-
Spillage
-
Security Violation
Question 90
Question
Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?
Answer
-
Confidential
-
Secret
-
Top Secret
-
All of the above
-
None of the above
Question 91
Question
The unauthorized disclosure of Top Secret information could reasonably be expected to cause ____________________ to our national security.