Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT
Home
Subjects
Solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Terms in this set (27)
Unauthorized disclosure of _____ information can be expected to cause serious damage to national security.
Secret
Different types of written authorizations are needed to hand carry classified information depending on the type of transportation the individual will use.
True
Select ALL the correct responses. The purpose of the Information Security Program is multi-faceted. Which of the following objectives does the program achieve?
a. Provide guidance on how to classify, store, transport, and destroy information Correct
b. Promote the declassification of information no longer requiring protection Correct
c. Ensure
the proper classification, protection, and downgrading of national security information
Which of the following statements describes what you should do when you derivatively classify and when there is a conflict between a source document and a Security Classification Guide?
Always use the Security Classification Guide over the source document
According to Executive Order 13526, how old must classified information that has been determined to have permanent historical value be before it is automatically declassified?
25 years
Executive Order 13526 lists nine categories of information eligible for exemption from automatic declassification.
True
Which policy document establishes the baseline information security requirements for the Department of Defense?
Department of Defense Manual 5200.01, DoD Information Security Program
Properly marked source documents are examples of authorized sources for derivative classification.
True
Original classification refers to the initial determination that information requires protection against unauthorized disclosure in the interest of national security. This is performed by an ___________________________ who applies a six-step process to making a classification determination
Original Classification Authority
Classification by compilation is the
aggregation of elements of information that are individually unclassified but become classified when combined
is information related to any DoD program or activity employing enhanced security measures exceeding those normally required for information at the same classification level.
Special Access Program
A security violation will always result in a compromise of classified information.
False
When wrapping classified information for transportation, the name of the individual - not the name of the government activity that employs the individual - should be written on the inner wrapping.
False
Classified information can only be stored in a GSA-approved container (such as one-drawer, field safe, two-drawer, five individual locking drawers, or modular vault).
False
Which of the following briefings are used to remind individuals of their continued security responsibilities and to inform them of potential changes to policies, principles, and procedures they learned from a previous briefing?
Refresher
Declassification instructions for classified documents including those containing Restricted Data or Formerly Restricted Data can be found on the front of the documents.
False
Classified items must be destroyed to avoid recognition or reconstruction. There are several authorized methods for destruction including burning, shredding, disintegrating, pulping, melting, chemical decomposition, mutilation to preclude recognition, and
Pulverizing
Unauthorized disclosure of _____ information can be expected to cause exceptionally grave damage to national security.
Top secret
Security infractions involve actions that may place classified information or operations at risk.
True
Executive Order 13526 states all classified information will be automatically declassified on December 31 of the year 25 years from the date of its original classification.
True
Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Use of the Security Container Check Sheet (SF-702) can assist when conducting an inquiry on an open security container incident.
True
The use of secure telephone equipment (STE or STU-III) ensures classified discussions are properly protected; however, the user must also remember to consider if someone is within hearing distance to their conversation.
True
When wrapping classified information for transportation, the complete return address of the sender's office needs to be written on the outer wrapping.
True
Courier briefings are provided to cleared personnel who are escorting or hand carrying classified information.
True
A professor from the University of Michigan submits a request for obtaining information concerning a classified project. The Original Classification Authority reviews the classified information requested and determines that the information can be declassified. This is an example of which declassification system?
Mandatory Declassification Review
Before wrapping material for transmission or transportation, you must first verify that all the markings on the document itself are correct, and markings on the letter of transmittal are also accurate.
True
If classified information is marked with a statement such as, "Reproduction requires approval of originator or higher DoD authority," you MUST first
contact those individuals (originator or higher DoD authority) prior to reproducing the information
Sets with similar termsSFPC
60 terms
lrice1318
DoD INFORMATION SECURITY
74 terms
bweaver639
SFCP: Information Security
54 terms
SpinMe
SPēD - SFPC - General (Information Security)
92 terms
NJPhillips01
Sets found in the same folderSFPC PREP - IF011.16 Introduction to Information S…
38 terms
Keli_Sequoia
Marking Classified Information IF105
61 terms
badcheater
DoD Personnel Security Policy
11 terms
erina42
SFPC: Physical Security
37 terms
SpinMe
Other sets by this creatorMGMT CH 12
13 terms
jackie_mckenzie8PLUS
MGMT CH 11
13 terms
jackie_mckenzie8PLUS
MGMT CH 10
13 terms
jackie_mckenzie8PLUS
MGMT CH 8
13 terms
jackie_mckenzie8PLUS
Verified questions
ADVANCED MATH
I have 100 units of a product in stock. The demand D for the item is a continuous random variable with the following density function: $$ f(d)=\left\{\begin{array}{ll}{\frac{1}{40}} & {\text { if } 80 \leq d \leq 120} \\ {0} & {\text { otherwise }}\end{array}\right. $$ a. Find the probability that supply is insufficient to meet demand. b. What is the expected number of items sold? What is the variance of the number of items sold?
Verified answer
ADVANCED MATH
Show that if X is regular, every pair of points of X have neighborhoods whose closures are disjoint.
Verified answer
ADVANCED MATH
Identify the fallacies of weak induction committed by the following arguments, giving a brief explanation for your answer. If no fallacy is committed, write “no fallacy.” There is substantial evidence that units of the Chinese military hack into the computers of American technology companies to steal intellectual property and trade secrets. But Chinese Premier Li Keqiang denies that this happens. Therefore, given Mr. Li's intimate knowledge of the Chinese military, we must conclude that the Chinese military does not engage in hacking.
Verified answer
ADVANCED MATH
The basket-of-eggs problem is often phrased in the following form: One egg remains when the eggs are removed from the basket 2, 3, 4, 5, or 6 at a time; but, no eggs remain if they are removed 7 at a time. Find the smallest number of eggs that could have been in the basket.
Verified answer
Other Quizlet setsTrauma module
180 terms
hannahmcchesney1998
Social Studies Eight Grade- Reconstruction Section…
16 terms
Harmony-AE
Western Expansion Test
31 terms
Mrmccarthy2020
2. Antepartum nursing care
26 terms
Shaneeceg
Related questionsQUESTION
What is the Dogs of the Dow Strategy?
5 answers
QUESTION
Many Medicaid programs and commercial payers use the HCPCS level II coding system.
13 answers
QUESTION
In which circumstances would an external cause code be reported?
15 answers
QUESTION
A COMBINATION CODE IS A SINGLE CODE THAT MAY BE USED TO CLASSIFY TWO DIAGNOSIS
4 answers