JKO Annual Security Refresher Pretest
1) Which of the following are required markings on all classified documents?
All of the above
A security incident in which classified data is introduced to an information system with a lower level of classification, or to a system not accredited to process data of that restrictive category is an example of which type of security incident?
Data Spill
top secret documents can be transmitted by which of the following methods
Defense Courier Service, Secure Fax
Aggregating unclassified information together will never make the information classified
False
You do not have to report unofficial foreign travel to the Security Office.
False
After securing your space at the end of the day, you should try to badge back in to ensure it is locked.
True
Controlled unclassified information (CUI) requires the following markings: banner lines, portion markings, and a CUI designation indicator.
True
If you hold a top secret clearance, you are required to report to the security office when you have a foreign roommate over 30 calendar days, a co-habitant, and when you get married.
True
derivative classifiers are required to have all the following except
Approval of the original classification authority (OCA)
A security infraction involves loss, compromise, or suspected compromise.
False
SCI material can be processed on SIPRNET if the content is SECRET//SCI
False
The full receiving and return address, including names, along with the highest classification level and dissemination markings are required to be on the outer layer of classified documents double wrapped for mailing.
False
Wireless Wearable Fitness Devices are authorized within SCIFs.
False
which method may be used to transmit confidential materials to dod agencies
First Class mail
Which of the following is not a controlled unclassified information marking?
For Official Use Only
Which of the following is required to access classified information? )select all that apply)
NEEDS REVIEW
which of the following are parts of the opsec process
OPSEC process involves five steps: (1) identification of critical information, (2) analysis of threats, (3) analysis of vulnerabilities, (4) assessment of risk, and (5) application of appropriate
the personnel security program establishes______ for personnel security determinations and overall program management responsibilities
Policies and procedures
What form is used to record end-of-day security checks?
SF 701
what form is used to request a background investigation
SF86
When transporting SCI within the building (outside the SCIF), the material shall be placed in a locked brief case or locked pouch made of canvas or other heavy-duty material and must have an integral key-operated lock.
TRUE
You may be subject to loss or denial of classified access, suspension without pay, termination of employment, discharge from military service, and criminal prosecution if you knowingly, willfully, or negligently disclose classified information or CUI to unauthorized persons.
True
classified information can be safeguarded by using________. (select all that apply)
Vaults, Secure Rooms, Secure Telephones
physical security is concerned with______ and _______ measures designed to prevent unauthorized access
active, passive
which of the following materials are subject to pre-publication review
articles, speeches, books
which level of classified information could cause damage to national security
confidential
Specific material must be used for derivative classification decisions. Which of the following are authorized sources? Select all that apply.
- Security classification guides - Properly marked source documents -Contract Security Classification Specifications
Classified information is official government information that has been determined to require protection against unauthorized disclosure in the interest of National Security. Which of the following are levels of classified information? Select all that apply
- Top Secret - Confidential - Secret
a security infraction involves loss compromise or suspected compromise
false
Physical security is concerned with_____and ____ measures designed to prevent unauthorized access.
needs review
which of the following is required to access classified information
sf312, clearance eligibility at the appropriate level, need to know