SIPRNET Security Annual Refresher Training (1 hr) (FOUO)
If you are an officer, senior noncommissioned officer, senior Army civilian, or senior foreign national, it is possible that you may be appointed to conduct a preliminary inquiry of possible loss or compromise of classified information. [Remediation Accessed :N]
False (correct)
SIPRNET removable hard drives may be stored in a fireproof, keyed file cabinet.
False (correct)
SIPRNET token PINS can consist of both numbers and letters.
False (correct)
The security of classified military information is not only a command responsibility of which of the following personnel?
Army leaders Soldiers DA Civilians/Contractors All of the Above (correct)
Because we use "Secret" level encryption devices and keys, the SIPRNET is completely and totally secure and can be used to transmit the most secure and sensitive information that we have in the Army and Department of Defense.
False (correct)
Which of the following statements concerning the hand-carrying of classified material is NOT correct? [Remediation Accessed :N]
The classified materials can be read or studied in public, however, the proper cover sheet (SF-703, 704 or 705) must be used. (correct)
Why do we conduct SIPRNET annual training? Choose each applicable answer.
There are real and growing threats to the Army MEDCOM in the cyber domain conflict. (correct) We desire to eliminate and minimize minor security violations within MEDCOM. (correct) We are required to do so by MEDCOM policy. (correct)
The purpose of this annual SIPRNET refresher training is to ensure that all MEDCOM SIPRNET users are aware of their responsibilities for the protection of classified data and systems in accordance with applicable Army regulations and MEDCOM policy on SIPRNET Security Procedures.
True (correct)
Which of the following actions are prohibited by Army Regulation 25-2, Information Assurance? [Remediation Accessed :N]
Storing and or using cellular telephones or other wireless devices where classified process takes place (correct)
When an incident of possible loss or compromise of classified information is reported, who does Army policy require to immediately initiate a preliminary inquiry with the focus on answering when, where, and how did the incident occur?
The Commander (correct)
Which of the following statements are true concerning information storage requirements? [Remediation Accessed :N]
A GSA approved security container is authorized for storage of Secret documents. (correct)
A member of the operations office has been handed a Secret document that he needs for his work. What is he responsible for as a custodian of that document? [Remediation Accessed :N]
Ensuring that the document is locked in a GSA approved security container whenever it is not in use or under the direct supervision of an authorized person. (correct)
SIPRNET token contain three individual public key infrastructure certificates. These certificates are used for all of the following actions EXCEPT what?
Gaining access through an entry control point (correct)
Top Secret operational and intelligence communications are integrated into what communications backbone? [Remediation Accessed :N]
JWICS (correct)
Which of the following choices represent common SIPRNET-related security violations?
Not being able to correctly identify mismarked classified information or products. Not understanding the requirements of or how to transmit classified information using facsimile or scanner. Mistakenly sending classified documents or information via unclassified means or through the NIPRNET. Using unauthorized external storage media devices such as thumb drives, flash drives, memory sticks and other portable and removable storage media. All of the above. (correct)
Which of the following choices is NOT one of the four distinct areas of potential threat against MEDCOM and the MEDCOM SIPRNET communications backbone? [Remediation Accessed :N]
Official correspondences between MEDCOM and other authorized entities for official government business. (correct)
Who maintains the security clearance access roster for the command?
The Command Security Manager (correct)
The Cyber Commands are large, capable, and powerful organizations, but our collective security really begins with what?
Your personal vigilance, attention, and adherence to our security standards and procedures (correct)
What Army regulation contains both the Army policy for handling the unauthorized disclosure of classification document and other security incidents, and general guidance or "how to" for commanders?
AR 380-5, Department of the Army Information Security Program (correct)
The local information Assurance Support Officer is responsible for which of the following actions?
All of the above (correct)