What type of declassification process occurs when information is scheduled to be classified on the 31st of December 25 years from the date of original classification?

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Terms in this set (27)

Unauthorized disclosure of _____ information can be expected to cause serious damage to national security.

Secret

Different types of written authorizations are needed to hand carry classified information depending on the type of transportation the individual will use.

True

Select ALL the correct responses. The purpose of the Information Security Program is multi-faceted. Which of the following objectives does the program achieve?

a. Provide guidance on how to classify, store, transport, and destroy information Correct
b. Promote the declassification of information no longer requiring protection Correct
c. Ensure the proper classification, protection, and downgrading of national security information

Which of the following statements describes what you should do when you derivatively classify and when there is a conflict between a source document and a Security Classification Guide?

Always use the Security Classification Guide over the source document

According to Executive Order 13526, how old must classified information that has been determined to have permanent historical value be before it is automatically declassified?

25 years

Executive Order 13526 lists nine categories of information eligible for exemption from automatic declassification.

True

Which policy document establishes the baseline information security requirements for the Department of Defense?

Department of Defense Manual 5200.01, DoD Information Security Program

Properly marked source documents are examples of authorized sources for derivative classification.

True

Original classification refers to the initial determination that information requires protection against unauthorized disclosure in the interest of national security. This is performed by an ___________________________ who applies a six-step process to making a classification determination

Original Classification Authority

Classification by compilation is the

aggregation of elements of information that are individually unclassified but become classified when combined

is information related to any DoD program or activity employing enhanced security measures exceeding those normally required for information at the same classification level.

Special Access Program

A security violation will always result in a compromise of classified information.

False

When wrapping classified information for transportation, the name of the individual - not the name of the government activity that employs the individual - should be written on the inner wrapping.

False

Classified information can only be stored in a GSA-approved container (such as one-drawer, field safe, two-drawer, five individual locking drawers, or modular vault).

False

Which of the following briefings are used to remind individuals of their continued security responsibilities and to inform them of potential changes to policies, principles, and procedures they learned from a previous briefing?

Refresher

Declassification instructions for classified documents including those containing Restricted Data or Formerly Restricted Data can be found on the front of the documents.

False

Classified items must be destroyed to avoid recognition or reconstruction. There are several authorized methods for destruction including burning, shredding, disintegrating, pulping, melting, chemical decomposition, mutilation to preclude recognition, and

Pulverizing

Unauthorized disclosure of _____ information can be expected to cause exceptionally grave damage to national security.

Top secret

Security infractions involve actions that may place classified information or operations at risk.

True

Executive Order 13526 states all classified information will be automatically declassified on December 31 of the year 25 years from the date of its original classification.

True

Correct
Mark 1.00 out of 1.00
Not flaggedFlag question
Question text
Use of the Security Container Check Sheet (SF-702) can assist when conducting an inquiry on an open security container incident.

True

The use of secure telephone equipment (STE or STU-III) ensures classified discussions are properly protected; however, the user must also remember to consider if someone is within hearing distance to their conversation.

True

When wrapping classified information for transportation, the complete return address of the sender's office needs to be written on the outer wrapping.

True

Courier briefings are provided to cleared personnel who are escorting or hand carrying classified information.

True

A professor from the University of Michigan submits a request for obtaining information concerning a classified project. The Original Classification Authority reviews the classified information requested and determines that the information can be declassified. This is an example of which declassification system?

Mandatory Declassification Review

Before wrapping material for transmission or transportation, you must first verify that all the markings on the document itself are correct, and markings on the letter of transmittal are also accurate.

True

If classified information is marked with a statement such as, "Reproduction requires approval of originator or higher DoD authority," you MUST first

contact those individuals (originator or higher DoD authority) prior to reproducing the information

Sets with similar terms

SFPC

60 terms

lrice1318

DoD INFORMATION SECURITY

74 terms

bweaver639

SFCP: Information Security

54 terms

SpinMe

SPēD - SFPC - General (Information Security)

92 terms

NJPhillips01

Sets found in the same folder

SFPC PREP - IF011.16 Introduction to Information S…

38 terms

Keli_Sequoia

Marking Classified Information IF105

61 terms

badcheater

DoD Personnel Security Policy

11 terms

erina42

SFPC: Physical Security

37 terms

SpinMe

Other sets by this creator

MGMT CH 12

13 terms

jackie_mckenzie8PLUS

MGMT CH 11

13 terms

jackie_mckenzie8PLUS

MGMT CH 10

13 terms

jackie_mckenzie8PLUS

MGMT CH 8

13 terms

jackie_mckenzie8PLUS

Verified questions

ADVANCED MATH

I have 100 units of a product in stock. The demand D for the item is a continuous random variable with the following density function: $$ f(d)=\left\{\begin{array}{ll}{\frac{1}{40}} & {\text { if } 80 \leq d \leq 120} \\ {0} & {\text { otherwise }}\end{array}\right. $$ a. Find the probability that supply is insufficient to meet demand. b. What is the expected number of items sold? What is the variance of the number of items sold?

Verified answer

ADVANCED MATH

Show that if X is regular, every pair of points of X have neighborhoods whose closures are disjoint.

Verified answer

ADVANCED MATH

Identify the fallacies of weak induction committed by the following arguments, giving a brief explanation for your answer. If no fallacy is committed, write “no fallacy.” There is substantial evidence that units of the Chinese military hack into the computers of American technology companies to steal intellectual property and trade secrets. But Chinese Premier Li Keqiang denies that this happens. Therefore, given Mr. Li's intimate knowledge of the Chinese military, we must conclude that the Chinese military does not engage in hacking.

Verified answer

ADVANCED MATH

The basket-of-eggs problem is often phrased in the following form: One egg remains when the eggs are removed from the basket 2, 3, 4, 5, or 6 at a time; but, no eggs remain if they are removed 7 at a time. Find the smallest number of eggs that could have been in the basket.

Verified answer

Other Quizlet sets

Trauma module

180 terms

hannahmcchesney1998

Social Studies Eight Grade- Reconstruction Section…

16 terms

Harmony-AE

Western Expansion Test

31 terms

Mrmccarthy2020

2. Antepartum nursing care

26 terms

Shaneeceg

Related questions

QUESTION

What is the Dogs of the Dow Strategy?

5 answers

QUESTION

Many Medicaid programs and commercial payers use the HCPCS level II coding system.

13 answers

QUESTION

In which circumstances would an external cause code be reported?

15 answers

QUESTION

A COMBINATION CODE IS A SINGLE CODE THAT MAY BE USED TO CLASSIFY TWO DIAGNOSIS

4 answers

Which will occur within 25 years from the date of original classification?

Scheduled Declassification A set date or event, determined by the Original Classification Authority (OCA), which will occur within 25 years from the date of original classification.

What type of declassification process is the set date or event determined by the original classification authority?

Automatic declassification is the declassification of information based upon the occurrence of a specific date or event as determined by the original classification authority; or the expiration of a maximum time frame for the duration of classification established under the Order (25 years).

What are the different types of declassification processes and systems?

There are three primary ways by which classified information is declassified: Automatic Declassification. Systematic Review. Mandatory Review.

What type of declassification process is the review of classified information that has been exempted from automatic?

Records exempted from automatic declassification are subject to the systematic review program. The Mandatory Declassification Review Program permits individuals or agencies to require an agency to review specific classified national security information for purposes of seeking its declassification.

Toplist

Neuester Beitrag

Stichworte