Sensitive Compartmented Information (SCI) Security Refresher

¡Supera tus tareas y exámenes ahora con Quizwiz!

Jill works in a SCIF. Jill is party to a malpractice lawsuit. Jill is required to report this legal involvement.

True

You are required to report suspicious co-worker activities

True

You must report any systemic weaknesses and anomalies.

True

The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.

a. Continuous Operation SCIF

You must consult your SCIF's ____________to learn what you are or are not permitted to tell your family members about your work location and mission.

b. ISSO WRONG

_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth.

b. Imagery Intelligence (IMINT) (WRONG)

The ___________________________ processes SCIF visitor certifications.

b. Special Security Officer (SSO) or Special Security Representative (SSR)

SI is the SCI control system marking abbreviation for which SCI control system?

b. TALENT KEYHOLE (WRONG)

When you signed the SCI NdS, you gave up protection under the Whistleblower Protection Act

false

When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government.

true

Who is responsible for terminating SCI access?

. Special Security Officer (SSO), or designee WRONG

SCIF windows must be secured at ground level and up to _____________ above ground level.

18 feet

You signed an SCI Nondisclosure Statement during the __________________ process.

Debriefing (WRONG)

All Sensitive Compartmented Information Facilities (SCIFs) can be used to store Sensitive Compartmented Information (SCI).

False

Spills are deliberate unauthorized disclosures of classified information to the media whereas leaks are accidental or intentional unauthorized disclosures of classified information across computer systems.

False

How long must SCIF visitor control logs be retained?

. 1 year after the last entry

_____________ is the collection of verbal and nonverbal signals from land, sea, and satellite. These signals are protected within the Communications Intelligence, (COMINT) SCI control system.

. Geospatial Intelligence (GEOINT) (WRONG)

After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form

b. SF-701 NOT correct

You are required to have a pre-publication review of any material you create based on your access to classified information before it enters _______________.

b. The public domain

SCI Material cannot be stored in _________________________________.

c. An open storage SCIF (WRONG)

Sensitive Compartmented Information (SCI) is ______________________.

c. Classified national intelligence information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems

Which of the following is not a requirement of a secure telephone system in a SCIF?

c. Detects attempted or actual unauthorized human entry into a SCIF

Who heads the Intelligence Community (IC)?

c. Director of National Intelligence

Which SCI control system is designed to protect signals intelligence including communications intelligence and electronic intelligence?

c. HCS (HCS) (wrong)

_____________ includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media which is derived from visual photography, radar sensors, and electro-optics.

c. Imagery Intelligence (IMINT)

The DNI issued several _________________ and ________________ which provide security policy for the protection of national intelligence as well as the personnel security requirements for access to SCI, and physical and technical security requirements for SCIFs.

c. Intelligence Community Directives, Intelligence Community Policy Guidance documents

_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.

c. Measurement and Signature Intelligence (MASINT)

Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.

c. NSA Evaluated Products List of High Security Crosscut Paper Shredders

Which of the following is true about escorts in SCIFs

c. Only personnel assigned to the SCIF are authorized to escort non-indoctrinated or contractor personnel within the government area.

IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________.

c. Special Security Officer (SSO) or Information Systems Security Officer (ISSO)

Which SCI control system is designed to protect human intelligence?

c. TALENT KEYHOLE (TK) (WRONG)

Which of the following statements is correct?

c. You must report any part-time employment (WRONG)

Which of the following is an escort in a SCIF not required to do?

d. Process the visitor certifications for their visitors

SCI material must be _____________________ prior to giving the package to the courier.

double wrapped

_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.

f. Measurement and Signature Intelligence (MASINT)

What piece of information is not required to be recorded on the SCIF visitor control log?

f. Visitor's date of birth

A French citizen you met at a party has taken a strong interest in finding out more about your employment. Because you do not return his phone calls, however, this is not considered a foreign contact that must be reported.

false

Copies of classified documents are not subject to the same control, accountability, and destruction procedures as the original document.

false

If a SCIF has a high security lock, then an access control system is not required.

false

If the ISSO permits it, you may share your password in a SCIF.

false

In a SCIF, SCI must always be stored in a GSA-approved container.

false

Security violations are required to be reported, but infractions are not required to be reported.

false

The SCI control system marking should not be listed in the banner line on a classified document.

false

Visitors who are not certified may access classified information as long as their affiliation or position warrants it.

false

Visitors who have a visitor certification do not require an escort.

false

When you signed the SCI NdS, you acknowledged that this agreement will last until you retire or separate from the Federal Government, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI.

false

You are not required to report adverse information about others who also have SCI access. You are only required to report adverse information about yourself.

false

You are permitted to discuss SCI outside your SCIF as long as it is with one of your SCIF co-workers.

false

You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.

false

You placed a For Sale ad in the local newspaper in an attempt to sell your old car. Because this involves contact with the media, you are required to report it.

false

SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material.

in writing

A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.

true

Christopher works in a SCIF and is having an Internet relationship in a chat room (outside of work hours) with a woman who is not a U.S. citizen. Christopher is required to report this relationship.

true

Destruction of SCI must be conducted by SCI indoctrinated personnel.

true

Equipment leaving latent images on itself or on other material or that has the capability to connect to remote diagnostic centers, such as by telephone line, is prohibited for classified reproduction.

true

For access to SCIFs during business hours, cipher locks may be used for high security areas and compartments.

true

In a SCIF, reproduction equipment must display a sign indicating the highest level of classification allowed to be reproduced on that equipment

true

Jim works in a SCIF. Jim got drunk and passed out in a bar over the weekend. Jim is required to report this incident.

true

John has access to SCI and is currently legally separated from his wife. John is required to report his se

true

One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs.

true

SCI control systems are additional measures used to protect intelligence sources and methods or analytical procedures that are beyond those used to protect non-SCI classified information.

true

SCI is one of eight categories of information that require classified protection as outlined in Executive Order 13526.

true

SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.

true

SCI material is not required to be stored in a GSA-approved container in an open storage SCIF.

true

The SCIF Fixed Facility Checklist is used to obtain SCIF accreditation.

true

Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel.

true

Walls in SCIFs must extend from true floor to true ceiling.

true

Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.

true

We use classification management to determine the nature of information and assign proper classification markings, SCI control system markings, dissemination controls, and declassification instructions.

true

When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed.

true

When you signed the SCI NdS, you acknowledged that any breach of this agreement could result in the termination of your SCI access and your employment as well as prosecution of you under U.S. criminal laws.

true

You are required to remove your name badge as soon as you leave your SCIF so as not to call attention to yourself.

true

You must report any systemic weaknesses and anomalies.

true

You must report external activist groups you or your co-workers are affiliated with regardless of their nature.

true

You should never connect classified and unclassified systems together.

true

You've noticed that Sydney has been very unhappy and disgruntled at work lately in the SCIF. You are required to report this information about Sydney.

true

What piece of information is not required to be recorded on the SCIF visitor control log?

visitors birth date

Which of the following is the preferred method for transporting an SCI document from one SCIF to another?

a. Defense Courier Service (DCS)

Who provides construction and security requirements for SCIFs?

a. Defense Intelligence Agency (DIA) WRONG

The biggest vulnerability in SCIF forced entry is the ____________________.

a. Emergency exit doors

____________ is the collection of intelligence through public sources.

a. Human Intelligence (HUMINT) (WRONG)

An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________.

a. Is not releasable to foreign nationals

____________________is required to access certain areas of a SCIF and classified information.

a. Need-to-know

_____________ is the collection of intelligence through public sources.

a. Open Source Intelligence (OSINT)

When you signed the _______________, you acknowledged that you were advised that mishandling SCI could cause irreparable harm to the United States and you are obligated not to disclose SCI to anyone who is not authorized to receive it.

a. SCI NdS

Current SCI control systems are HCS, SI, and ________________.

a. TALENT KEYHOLE

Which SCI control system is designed to protect imagery intelligence?

a. TALENT KEYHOLE (TK)

SCI Material cannot be stored in _________________________________.

b. An open storage SCIF (WRONG)

The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN).

b. Authentication, verification

Who provides accreditation for DoD SCIFs

b. Defense Intelligence Agency (DIA)

Which is the primary database used to verify personnel access to SCIFs outside DoD?

b. Joint Personnel Adjudication System (JPAS) NOT CORRECT

When you sign the SCI Nondisclosure Statement (NdS), you are ________________________.

b. Making a lifelong commitment to protect U. S. Government classified intelligence information

Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.

b. NSA Evaluated Products List of High Security Crosscut Paper Shredders

_____________ is the collection of intelligence using human sources such as diplomats, military attaches, and spies.

b. Open Source Intelligence (OSINT)


Conjuntos de estudio relacionados

Legal and Social exam 2 questions

View Set

Principles of Children's Development

View Set

CESHOP Real Estate Appraisal Practice Tests

View Set

Articulations of the tibia, patella, fibula and knee joint

View Set

Chapter 12-Money Management Strategy

View Set

Exam 1: Health assessment and mental health (mood/affect)

View Set