IPRNET Security Annual Refresher Training (1 hr) (FOUO)
Which of the following statements are true concerning information storage requirements?
A GSA approved security container is authorized for storage of Secret documents.
What Army regulation contains both the Army policy for handling the unauthorized disclosure of classification document and other security incidents, and general guidance or "how to" for commanders?
AR 380-5, Department of the Army Information Security Program
A member of the operations office has been handed a Secret document that he needs for his work. What is he responsible for as a custodi: of that document?
Ensuring that the document is locked in a GSA approved security container whenever it is not in use or under the direct supervision of a authorized person.
If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information.
False
If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information.
False
SIPRNET removable hard drives may be stored in a fireproof, keyed file cabinet.
False
SIPRNET token contain three individual public key infrastructure certificates. These certificates are used for all of the following actions EXCEPT what?
Gaining access through an entry control point
Which of the following choices is NOT one of the four distinct areas of potential threat against MEDCOM and the MEDCOM SIPRNET communications backbone?
Official correspondences between MEDCOM and other authorized entities for official government business.
Which of the following actions are prohibited by Army Regulation 25-2, Information Assurance?
Storing and or using cellular telephones or other wireless devices where classified process takes place
When an incident of possible loss or compromise of classified information is reported, who does Army policy require to immediately initiate a preliminary inquiry with the focus on answering when, where, and how did the incident occur?
The commander
The Cyber Commands are large, capable, and powerful organizations, but our collective security really begins with what?
Your personal vigilance, attention, and adherence to our security standards and procedures