SIPRNET Security Annual Refresher Training (1 hr) (FOUO)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following choices represent common SIPRNET-related security violations?

All of the Above

Because we use "Secret" level encryption devices and keys, the SIPRNET is completely and totally secure and can be used to transmit the most secure and sensitive information that we have in the Army and Department of Defense.

False

If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information.

False

SIPRNET removable hard drives may be stored in a fireproof, keyed file cabinet.

False

SIPRNET token contain three individual public key infrastructure certificates. These certificates are used for all of the following actions EXCEPT what?

Gaining access through an entry control point

When an incident of possible loss or compromise of classified information is reported, who does Army policy require to immediately initiate a preliminary inquiry with the focus on answering when, where, and how did the incident occur?

The Commander

Which of the following statements concerning the hand-carrying of classified material is NOT correct?

The classified materials can be read or studied in public, however, the proper cover sheet (SF-703, 704 or 705) must be used.

The local information Assurance Support Officer is responsible for which of the following actions?

All of the Above

The security of classified military information is not only a command responsibility of which of the following personnel?

All of the Above

Which of the following statements are true concerning information storage requirements?

A GSA approved security container is authorized for storage of Secret documents.

The Cyber Commands are large, capable, and powerful organizations, but our collective security really begins with what?

Your personal vigilance, attention, and adherence to our security standards and procedures

What Army regulation contains both the Army policy for handling the unauthorized disclosure of classification document and other security incidents, and general guidance or "how to" for commanders?

AR 380-5, Department of the Army Information Security Program

Who maintains the security clearance access roster for the command?

The Command Security Manager

Why do we conduct SIPRNET annual training? Choose each applicable answer.

(Not all of them)

Top Secret operational and intelligence communications are integrated into what communications backbone?

JWICS

Which of the following choices is NOT one of the four distinct areas of potential threat against MEDCOM and the MEDCOM SIPRNET communications backbone?

Official correspondences between MEDCOM and other authorized entities for official government business.

Which of the following actions are prohibited by Army Regulation 25-2, Information Assurance?

Storing and or using cellular telephones or other wireless devices where classified process takes place


Conjuntos de estudio relacionados

Chapter 11 Disorders of Sex and Gender

View Set

Introduction to Networking - Chapter 1

View Set

AP Macro: Edge Ex: Money Creation

View Set

Minerals and their properties study guide

View Set

4 Types of Readiness to Learn (PEEK)

View Set