Annual Security and Counterintelligence Awareness

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following statements are true concerning continuous evaluation? Select all that apply.

1. Individuals holding security clearances are subjected to periodic reinvestigations. 2. Individuals holding security clearance are subject to a reasonable degree of monitoring by supervisors, coworkers, and security professionals. 3. Individuals granted security clearances sometimes fall into a pattern of unreliable or untrustworthy behavior after being granted an initial eligibility.

Which of the following are part of the 13 national security adjudicators use to determine your eligibility for a clearance? Select all that apply.

1. Personal conduct. 2. Criminal conduct. 3. Allegiance to the United States.

Which of the following are threats to our critical information? Select all that apply.

1. Private organizations. 2. Terrorists. 3. Friendly foreign governments.

Which of the following are approved methods of discussing and transmitting classified material? Select all that apply.

1. SIPRnet. 2. Secure Fax. 3. Secure Telephone.

Which of the following statement below are true concerning security containers, vaults, or open storage areas? Select all that apply.

1. The combination must be protected at the same level as the highest classification of the material authorized for storage. 2. Do not store items such as weapons, money, jewelry, precious metals or drugs in the same container as classified material.

Which of the following statements are correct concerning why a person would need to obtain a security clearance? Select all that apply.

1. To ensure trustworthy people have access to classified information. 2. To ensure only trustworthy people hold national security sensitive positions.

Foreign visits to DoD facilities should be coordinated how many days in advance/

30 days.

Any deviation from foreign travel itineraries must be reported within how many days of returning from travel?

5 days.

Which of the following procedures is used to monitor personnel for new information or changes that could affect their eligibility to hold a security clearance or fill a sensitive position?

Continuous evaluation.

Which of the following terms describes information gathered and activities conducted to identify, deceive, exploit, disrupt, or protect against espionage?

Counterintelligence.

Which of the following organizations is the sole authority for determining the clearance eligibility for non-intelligence agency DoD?

Department of Defense Consolidated Adjudications Facility (DoD CAF)

Which of the following is a technique used to subtly and inconspicuously gather information about you, your mission, or, your colleagues?

Elicitation.

Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information?

False.

Foreign Intelligence Entities seldom use the Internet or other communications including social networking services as a collection method?

False.

It is illegal for someone to rummage through your trash when you leave it outside for pickup?

False.

Official documents may be thrown away in recycle bins?

False.

Using curbside mailboxes is an approved method for mailing classified information?

False.

When a security clearance is denied or revoked, the decision is final?

False.

Which of the following terms describes a known or suspected foreign organization, person, or group who conducts intelligence activities to acquire U.S. information?

Foreign Intelligence Entity (FIE).

Which of the following terms include foreign intelligence and security services and international terrorists and is defined as any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block, or impair U.S. Intelligence collection, influence U.S. policy, or disrupt U.S. system and programs?

Foreign Intelligence Entity (FIE).

Which of the following is not an example of an anomaly?

Foreign diplomat attempts to defect..

What is the primary goal of OPSEC?

Increasing mission effectiveness while protecting critical information from exploitation by our adversaries.

Which of the following statements is true concerning self-reporting for an individual who holds a security clearance?

It is mandatory. It also demonstrates personal integrity and is preferable to the incident or change being discovered and reported by others.

Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable?

None of the above.

Which of the following statements below must be on the front of a GSA-approved security container for storing classified information?

"General Services Administration-Approved Security Container"

Which of the following are critical information? Select all that apply.

1. Backorders affecting readiness. 2. IT system architecture. 3. PII.

Which of the following methods are routinely used for destroying classified information? Select all that apply.

1. Burning. 2. Approved cross-cut shredding. 3. Wet-pulping.

Which of the following are you expected to do when you hold a secret clearance, of fill a national security sensitive position? Select all that apply.

1. Comply with the high standards of conduct required of persons having access to classified information or performing national sensitive duties. 2. Keep your security office informed of certain changes in your personal life or activities that have potential security ramifications. 3. Report any factual information that comes to your attention that raises potential security concerns about co-workers.

What are the three classification levels of information?

1. Confidential.. 2. Secret. 3. Top Secret.

Which of the following are key objectives of DLA's Counterintelligence Mission? Select all that apply.

1. Developing and implementing capabilities to detect, deter, and mitigate insider threats. 2. Stopping the theft and exploration of critical U.S. technologies, data, and information. 3. Neutralizing or mitigating adversarial attempts to exploit U.S. Supply Chain and Acquisition vulnerabilities.

Which of the following are effective countermeasures to protect critical information? Select all that apply.

1. Encryption. 2. Shredding. 3. Enforcing need-to-know.

Geolocation applications are not authorized for use in:

Operational Areas.

DoD personnel who suspect a coworker of possible espionage should:

Report directly to your CI or Security Office.

To whom are all DoD personnel required to report all projected foreign travel?

Security representative.

All DoD civilian positions are categorized into which following security groups?

Special Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive.

In the event of a natural disaster, which of the following statements is true concerning an emergency action procedure for classified material?

The first priority is protection of life, followed by the protection of classified material.

What is the purpose of the SF 701 "Activity Security Checklist" and the SF 702 "Security Container Check Sheet?"

They are used as part of the end-of-day security checks activities that process or store classified material.

When transporting classified information, the courier must have a DD Form 2501, and as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy duty material?

True

A one-time encounter with a foreign national involving the exchange of contact information must be reported to your security representative?

True.

A security clearance determination is based on a pattern of behavior and not a single action?

True.

All DLA personnel work with critical information?

True.

An unexplained and sudden reversal of large debt is an indicator of counterintelligence concern and should be reported for further investigation?

True.

Counterintelligence as defined in the National Security Act of 1947, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities."

True.

Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists."

True.

Friendly detectable actions are critical information?

True.

If you find classified material out of proper control you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor?

True.

Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations

True.

If you feel you are being solicited for information which of the following should you do?

All of the above.

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include:

All of the above.

Collection Methods or operation frequently used by Foreign Intelligence Entities to collect information from DoD on the critical technology being produced within the cleared defense contractor facilities we support include:

All the above.

Cyber Vulnerabilities to DoD Systems may include:

All the above.

How often does J or D code, major subordinate command and regional command update their unique critical information list?

Annually.

Which of the following is an activity or knowledge, outside the norm, that suggests a foreign entity has foreknowledge of U.S. information, processes, or capabilities?

Anomaly.


Kaugnay na mga set ng pag-aaral

(Chapter 13) How Safe Is Our Food Supply?

View Set

Chapter 14: Family Assessment and Interventions - PrepU

View Set

9. Közjavak és közös erőforrások

View Set