JKO Annual Security Refresher Pretest

Ace your homework & exams now with Quizwiz!

1) Which of the following are required markings on all classified documents?

All of the above

A security incident in which classified data is introduced to an information system with a lower level of classification, or to a system not accredited to process data of that restrictive category is an example of which type of security incident?

Data Spill

top secret documents can be transmitted by which of the following methods

Defense Courier Service, Secure Fax

Aggregating unclassified information together will never make the information classified

False

You do not have to report unofficial foreign travel to the Security Office.

False

After securing your space at the end of the day, you should try to badge back in to ensure it is locked.

True

Controlled unclassified information (CUI) requires the following markings: banner lines, portion markings, and a CUI designation indicator.

True

If you hold a top secret clearance, you are required to report to the security office when you have a foreign roommate over 30 calendar days, a co-habitant, and when you get married.

True

derivative classifiers are required to have all the following except

Approval of the original classification authority (OCA)

A security infraction involves loss, compromise, or suspected compromise.

False

SCI material can be processed on SIPRNET if the content is SECRET//SCI

False

The full receiving and return address, including names, along with the highest classification level and dissemination markings are required to be on the outer layer of classified documents double wrapped for mailing.

False

Wireless Wearable Fitness Devices are authorized within SCIFs.

False

which method may be used to transmit confidential materials to dod agencies

First Class mail

Which of the following is not a controlled unclassified information marking?

For Official Use Only

Which of the following is required to access classified information? )select all that apply)

NEEDS REVIEW

which of the following are parts of the opsec process

OPSEC process involves five steps: (1) identification of critical information, (2) analysis of threats, (3) analysis of vulnerabilities, (4) assessment of risk, and (5) application of appropriate

the personnel security program establishes______ for personnel security determinations and overall program management responsibilities

Policies and procedures

What form is used to record end-of-day security checks?

SF 701

what form is used to request a background investigation

SF86

When transporting SCI within the building (outside the SCIF), the material shall be placed in a locked brief case or locked pouch made of canvas or other heavy-duty material and must have an integral key-operated lock.

TRUE

You may be subject to loss or denial of classified access, suspension without pay, termination of employment, discharge from military service, and criminal prosecution if you knowingly, willfully, or negligently disclose classified information or CUI to unauthorized persons.

True

classified information can be safeguarded by using________. (select all that apply)

Vaults, Secure Rooms, Secure Telephones

physical security is concerned with______ and _______ measures designed to prevent unauthorized access

active, passive

which of the following materials are subject to pre-publication review

articles, speeches, books

which level of classified information could cause damage to national security

confidential

Specific material must be used for derivative classification decisions. Which of the following are authorized sources? Select all that apply.

- Security classification guides - Properly marked source documents -Contract Security Classification Specifications

Classified information is official government information that has been determined to require protection against unauthorized disclosure in the interest of National Security. Which of the following are levels of classified information? Select all that apply

- Top Secret - Confidential - Secret

a security infraction involves loss compromise or suspected compromise

false

Physical security is concerned with_____and ____ measures designed to prevent unauthorized access.

needs review

which of the following is required to access classified information

sf312, clearance eligibility at the appropriate level, need to know


Related study sets

ECON 3 - International Economics - Midterm Study

View Set

Informatika előrehozott középszintű érettségi

View Set

CCNA - Class 3 (OSI Model and TCP/IP Suite)

View Set

The Strategy of International Business - INTB Exam 3 Chapter 12

View Set

Chapter 3: Cellular Form and Function (BIO201)

View Set

American Yawp Chapter 7, American Yawp Chapter 4, Chapter 5 American Yawp, Chapter 5 - American Yawp: The American Revolution, American Yawp Chapter 4, Chapter 4 Vocabulary "The American Yawp", American Yawp Chapter 5, American Yawp Chapter 6, Americ...

View Set