IPRNET Security Annual Refresher Training (1 hr) (FOUO)

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following statements are true concerning information storage requirements?

A GSA approved security container is authorized for storage of Secret documents.

What Army regulation contains both the Army policy for handling the unauthorized disclosure of classification document and other security incidents, and general guidance or "how to" for commanders?

AR 380-5, Department of the Army Information Security Program

A member of the operations office has been handed a Secret document that he needs for his work. What is he responsible for as a custodi: of that document?

Ensuring that the document is locked in a GSA approved security container whenever it is not in use or under the direct supervision of a authorized person.

If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information.

False

If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information.

False

SIPRNET removable hard drives may be stored in a fireproof, keyed file cabinet.

False

SIPRNET token contain three individual public key infrastructure certificates. These certificates are used for all of the following actions EXCEPT what?

Gaining access through an entry control point

Which of the following choices is NOT one of the four distinct areas of potential threat against MEDCOM and the MEDCOM SIPRNET communications backbone?

Official correspondences between MEDCOM and other authorized entities for official government business.

Which of the following actions are prohibited by Army Regulation 25-2, Information Assurance?

Storing and or using cellular telephones or other wireless devices where classified process takes place

When an incident of possible loss or compromise of classified information is reported, who does Army policy require to immediately initiate a preliminary inquiry with the focus on answering when, where, and how did the incident occur?

The commander

The Cyber Commands are large, capable, and powerful organizations, but our collective security really begins with what?

Your personal vigilance, attention, and adherence to our security standards and procedures


Ensembles d'études connexes

business ethics final exam chapters 4-6 and comprehensive exam

View Set

Research Methods, test two (Ch 10-11, 13-16)

View Set

6. Define experimental group and control group. 7 independent and dependent variables, and operational definition

View Set

Python Essentials 2_Part 2 Summary Test

View Set