Question: Which of the following is a good practice to aid in preventing spillage? brainly quizlet
Which of the following is a good practice to aid in preventing spillage 2020 cyber awareness knowledge check answerShow or Reveal the Answer
1. Always check to make sure you are using the CORRECT network for the level of data.
2. DO NOT use a classified network for unclassified work. Processing unclassified information on a classified network.
* Can unnecessarily consume mission-essential bandwidth.
* May illegally shield information from disclosure under the Freedom of Information Act (FOIA).
* Creates danger of spillage when attempting to remove the information to an unclassified media or hard copy.
3. Label all files, removable media and subject headers with appropriate classification markings.
4. Be aware of classification markings and all handling caveats.
5. Follow procedures for transferring data to and from outside agency and non-Government networks.
DoD Annual Security Awareness
What is the standard form of identification for DoD employees?
A: Common Access Card
B: Real ID
C: State Issue Driver's License
D: Common Access Credential
Show or Reveal the Answer
Classified information ca be safeguarded by using ____________.
A: Locked desk drawers
B: Vaults
C: Secure Rooms
D: Secure telephones
Show or Reveal the Answer
Secure Rooms
Secure telephones
Derivative classifiers are required to have all the following except ______.
A: a security clearance
B: derivative classification training
C: a need-to-know
D: approval of the original classification authority (OCA)
Show or Reveal the Answer
Which of the following are parts of the OPSEC process?
A: Identification of sensitive information
B: Analysis of threats
C: Application of appropriate countermeasures
D: Conduct vulnerability assessments
Show or Reveal the Answer
Application of appropriate countermeasures
Conduct vulnerability assessments
What coversheet is attached to help protect a Secret document?
A: SF706
B: SF704
C: SF705
D: SF703
Show or Reveal the Answer
Which of the following must be reported?
A: Change is statues
B: Adverse Information
C: Foreign contacts
D: All of the above
Show or Reveal the Answer
Physical Security is concerned with _____and _____ measures designed to prevent unauthorized access.
A: Access control, active
B: Active, inactive
C: Countermeasure, passive
D: Active, passive
Show or Reveal the Answer
What form is used to request a background investigation?
A: SF 702
B: SF 86
C: Sf 312
D: SF 700
Show or Reveal the Answer
The Personnel Security Program established _____ for Personnel Security determinations and overall program management responsibilities.
A: Clearance classification
B: Job selection criteria
C: Policies and procedures
Show or Reveal the Answer
Classified information can be destroyed using which of the following methods?
A: Burning
B: Shredding
C: Pulverizing
D: Recycling
Show or Reveal the Answer
Shredding
Pulverizing
Secret materials may be transmitted by the same method as Confidential materials.
A: TRUE
B: FALSE
Show or Reveal the Answer
Which level of classified information could cause damage to national security if compromised?
A: Secret
B: Top Secret
C: Controlled Unclassified Information (CUI)
D: Confidential
Show or Reveal the Answer
Prior to foreign travel, you must ensure that your Antiterrorism/Force Protection Level 1 training is current.
A: TRUE
B: FALSE
Show or Reveal the Answer
Incorporating, paraphrasing, restating, or generating in new form information that is already classified is known as _____.
A: Declassification
B: Original classification
C: Derivative classification
Show or Reveal the Answer
When opening and closing a security container, complete the _____.
A: SF 701
B: SF 700
C: SF 702
D: SF 703
Show or Reveal the Answer
What form is used to record end-of-day security checks?
A: SF 700
B: SF 701
C: SF 702
D: SF 703
Show or Reveal the Answer
You may be subjected to sanctions if you negligently disclose classified information.
A: TRUE
B: FALSE
Show or Reveal the Answer
A security infraction involves loss, compromise, or suspected compromise.
A: TRUE
B: FALSE
Show or Reveal the Answer
The physical security program prevents unauthorized access to which of the following?
A: Personnel
B: Facilities
C: Information
D: Equipment
Show or Reveal the Answer
Facilities
Information
Equipment
Which of the following is required to access classified information?
A: Signed SF 312
B: Approval of the Original Classification Authority (OCA)
C: Clearance eligibility at the appropriate level
D: Need-to-know
E: Approval of your advisor
Show or Reveal the Answer
Clearance eligibility at the appropriate level
Need-to-know
Which of the following materials are subject to pre-publication review?
A: Speeches
B: Books
C: Articles
Show or Reveal the Answer
Books
Articles
Which method may be used to transmit Confidential material to DoD agencies?
A: USPS First class mail
B: Street side collection box
C: Unsecured fax
D: USPS Fourth class mail
Show or Reveal the Answer
How often must you receive a defensive foreign travel briefing?
A: At least once a year
B: Never
C: Prior to travel
D: Every two years
Show or Reveal the Answer
Prior to travel
Top Secret documents can be transmitted by which of the following methods?
A: Defense Courier Service
B: U.S. Postal Service
C: FedEx
D: Secure Fax
Show or Reveal the Answer
Secure Fax
DoD Mandatory Controlled Unclassified Information (CUI) Training
Who is responsible for applying CUI markings and dissemination instruction?
A: Authorized common access card (CAC) holder
B: Authorized NIPRnet (Non-classified Internet Protocol Router (IP) Network) system
C: Authorized system access administrator
D: Authorized holder of the information at the time of creation
Show or Reveal the Answer
CUI documents must be reviewed according to which procedures before destruction?
A: Safeguarding
B: Transmission
C: Records Management
D: Marking
Show or Reveal the Answer
What is CUI Basic?
A: The subset of CUI requiring DoD personnel to submit and obtain information for entries into SF 86c
B: The subset of CUI in which the authorizing law, regulation, or government-wide policy contains specific handling controls that it requires or permits agencies to use
C: The subset of CUI for which the law, regulations, or government-wide policy does not set out specific handling or dissemination controls
D: The subset of CUI requiring DoD contractors to provide the information needed for the completion of DD Form 254
Show or Reveal the Answer
What is the goal of destroying CUI?
A: Make it unreadable
B: Make it indecipherable
C: Make it unrecoverable
D: All of the above
E: None of the above
Show or Reveal the Answer
What marking (banner and footer) acronym (at a minimum) is required on a DoD document containing controlled unclassified information?
A: FOUO
B: IAW
C: Unclassified
D: CUI
Show or Reveal the Answer
What level of system and network configuration is required for CUI?
A: Basic confidentiality
B: Moderate confidentiality
C: Advanced confidentiality
D: Enhanced confidentiality
Show or Reveal the Answer
Administrative, civil, or criminal sanctions may be imposed if there is an unauthorized disclosure (UD) of CUI?
A: TRUE
B: FALSE
Show or Reveal the Answer
It is mandatory to include a banner marking at the top of the page to alert the user that CUI is present.
A: TRUE
B: FALSE
Show or Reveal the Answer
What is the purpose of the ISOO CUI Registry?
A: A government-wide online repository for Federal-level guidance regarding CUI policy and practice
B: A DoD online repository for foreign guidance regarding CUI policy and practice
C: A DoD secure communications between Adjudicators, Security Officers and Component Adjudicators in support of eligibility and access management
D: A government-wide database of privacy information used to identify individuals' personally identifiable information (PII)
Show or Reveal the Answer
Who can decontrol CUI?
A: OCA, if in a Security Classification Guide
B: Designated office for decontrolling
C: All of the above
Show or Reveal the Answer
What is CUI Specified?
A: The subset of CUI in which the authorizing law, regulation, or government-wide policy contains specific handling controls that it requires or permits agencies to use
B: The subset of CUI for which the law, regulations, or government-wide policy does not set out specific handling or dissemination controls
C: The subset of CUI requiring DoD personnel to submit and obtain information for entries into SF 86c
D: The subset of CUI requiring DoD contractors to provide the information needed for the completion of DD Form 254
Show or Reveal the Answer
What is controlled unclassified information (CUI)?
A: Unclassified information requiring safeguarding and dissemination controls, pursuant to and consistent with applicable laws, regulations, and government-wide policies
B: Information always requiring a Freedom of Information Act (FOIA) element to ensure application of a 32 Code of Federal Regulation (CFR) Part 3012.56
C: Controlled information requiring a subset of markings pursuant to the Director of National Intelligence (DNI)
D: Unclassified information requiring classified markings pursuant to good order and discipline
Show or Reveal the Answer
What DoD instruction implements the DoD CUI program?
A: DoDI 5205.08, Access to Classified Cryptographic Information
B: DoDI 5200.39, Critical Program Information Identification and Protection Within Research, Development, Test, and Evaluation
C: DoDI 5200.48, Controlled Unclassified Information
D: DoDI 5200.01 DoD Information Security Program and Protection of Sensitive Compartmented Information
Show or Reveal the Answer
Who is responsible for protecting CUI?
A: DoD military only
B: DoD civilians only
C: DoD contractors only
D: DoD military, civilians, and contractors
Show or Reveal the Answer
At the time of creation of CUI material the authorized holder is responsible for determining:
A: CUI category, CUI markings and dissemination instructions
B: CUI category, CUI Registry designations, and CUI downgrading instructions
C: CUI category, CUI labeling, and destruction instructions
Show or Reveal the Answer
DOD Cyber Awareness Challenge, Insider threat awareness Test answers
Declassification is the authorized change in the status of information from classified to unclassified.
A.) TRUEB.) FALSE
Show or Reveal the Answer
Destruction refers to destroying classified information so that it can't be recognized or reconstructed.
A.) TRUEB.) FALSE
Show or Reveal the Answer
Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.
A.) TRUEB.) FALSE
Show or Reveal the Answer
Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.
A.) TRUEB.) FALSE
Show or Reveal the Answer
When not directly in an authorized individual's possession, classified documents must be stored in a GSA-approved security container.
A.) TRUEB.) FALSE
Show or Reveal the Answer
Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.
A.) TRUEB.) FALSE
Show or Reveal the Answer
Destruction refers to destroying classified information so that it can't be recognized or reconstructed.
A.) TRUEB.) FALSE
Show or Reveal the Answer
Spillage always requires an investigation to determine the extent of the compromise of classified information.
A.) TRUEB.) FALSE
Show or Reveal the Answer
The DoD workforce plays a vital role in ensuring the effectiveness of the DoD Information Security Program?
A.) TRUEB.) FALSE
Show or Reveal the Answer
The classification authority block identifies the authority, the source, and the duration of classification determination.
A.) TRUEB.) FALSE
Show or Reveal the Answer
Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release.
A.) TRUEB.) FALSE
Show or Reveal the Answer
A waiver is a permanent approved exclusion or deviation from information security standards.
A.) TRUEB.) FALSE
Show or Reveal the Answer
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
ANSWER: SecretThe unauthorized disclosure of Confidential information could reasonably be expected to cause __________ to our national security.
ANSWER: DamageThe unauthorized disclosure of Top Secret information could reasonably be expected to cause __________ to our national security.
ANSWER: Exceptionally grave damageThe unauthorized disclosure of this type of information could reasonably be expected to cause damage to our national security.
ANSWER: ConfidentialThe unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.
ANSWER: Serious damageThe unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security.
ANSWER: Top SecretWhich type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?
ANSWER: SecretWhich classified level is given to information that could reasonably be expected to cause serious damage to national security?
ANSWER: SecretWhat kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
ANSWER: Top SecretHow should you protect a printed classified document when it is not in use?
ANSWER: Store it in a General Services Administration (GSA)-approved vault or containerWhen classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply.
* To alert holders to the presence of classified information* To prevent inadvertent viewing of classified information by unauthorized personnel
Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?
ANSWER: All of the aboveWhen information, in the interest of national security, no longer requires protection at any level, it should be:
ANSWER: DeclassifiedWhen are "Downgrade To" instructions listed in the classification authority block on documents containing classified information?
ANSWER: As applicableWhat information do security classification guides (SCG) provide about systems, plans, programs, projects, or missions?
ANSWER: All of the aboveWhat is required to access classified information? Select all that apply.
* Eligibility* Signed SF-312, Nondisclosure Agreement
* Need-to-know
The communication or physical transfer of classified information to an unauthorized recipient is _________?
ANSWER: Unauthorized DisclosureWhat are the steps of the information security program life cycle?
ANSWER: Classification, safeguarding, dissemination, declassification, and destructionWhere can you find the Original Classification Authority's (OCA) contact information in a security classification guide (SCG)?
ANSWER: On the cover of the SCGThe purpose of the DoD information security program is to __________. Select all that apply.
* Demonstrate a commitment to transparency in Government* Protect national security information
Who provides implementation guidance for the Information Security Program within the DoD?
ANSWER: Heads of DoD ComponentsWhat is the first step an Original Classification Authority (OCA) must take when originally classifying information?
ANSWER: Determine if the information is official government informationWho can be an Original Classification Authority (OCA)?
ANSWER: An individual authorized in writing, either by the President, the Vice President, or by agency heads or officials designated by the PresidentWho designates whether information is classified and its classification level
Who designates whether information is classified and its classification level quizletWho designates whether information is classified and its classification level cyber security
Who designates whether information is classified and its classification level dod cyber awareness
Who designates whether information is classified and its classification level cyber awareness 2023
ANSWER: An individual designates whether information is classified and its classification level and authorize in writing, either by:
1. The President and, in the performance of executive duties, the Vice President;
2. Agency heads and officials designated by the President in the Federal Register; and
3. United States Government officials delegated this authority pursuant to paragraph (c) of this section.
Why must all documents containing classified information be marked using a sequential process?
ANSWER: All of the aboveWhat information is listed in the classification authority block on a document containing classified information? Select all that apply.
Who created the classified document* Classification level to downgrade to at a certain point in time (as applicable)
* Which source the information in the document was derived form
* Date on which to declassify the document
Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?
ANSWER: Original Classification AuthoritiesWho references information from security classification guides (SCG) in order to classify information?
ANSWER: Derivative classifiersWhich of the following is an example of information technology that is authorized for storing classified information?
ANSWER: On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)What are the authorized places for storing classified information? Select all that apply.
* In a GSA-approved security container* In information technology systems authorized for classified information
* In an authorized individual's head or hands
Which level of classified information may be transported via USPS mail? Select all that apply.
* Confidential* Secret
The name of the recipient of classified information must be included on which part(s) of the packaging?
ANSWER: Inner wrapped packageIf an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
ANSWER: Security ViolationWhat type of declassification process is the review of classified information that has been exempted from automatic declassification?
ANSWER: Systematic DeclassificationWhose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers?
ANSWER: National Security AgencyWho has responsibility for the overall policy direction of the Information Security Program?
ANSWER: Director of the Information Security Oversight Office (ISOO)_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
ANSWER: CompilationIf a derivative classifier believes information to be improperly classified, they can _____________ the classification decision.
ANSWER: ChallengeIn which order must documents containing classified information be marked?
ANSWER: Portion markings, banner markings, classification authority blockWhere do the reasons for classifying certain items, elements or categories of information originally come from?
ANSWER: Executive Order 13526What do derivative classifiers use to identify specific items or elements of information to be protected?
ANSWER: Security Classification Guides (SCG)Which form is used to record the securing of vaults, rooms, and containers used for storing classified material?
ANSWER: SF-702 Security Container Check SheetAll _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.
ANSWER: Locks forRequests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.
ANSWER: DoD Information Security ManualWhich of the following are applicable when using a phone for classified conversations? Select all that apply.
* Be aware of your surroundings and who might be able to hear your end of the conversation* Only use Secure Terminal Equipment (STE) phones
* Know how to use your Secure Terminal Equipment (STE)
What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?
ANSWER: Security InfractionWhat type of security incident has occurred when classified data is introduced on an information system not approved for that level of information?
ANSWER: SpillageWhat type of declassification process is a way for members of the public to request the review of specific classified information?
ANSWER: Mandatory Declassification Reviewcyber awareness 2019, 2020, 2021, 2022, 2023 answers
DOD Cyber Awareness Challenge Answers 1
DOD Cyber Awareness Challenge Knowledge Answers 2
DOD Initial Orientation and Awareness Training Answers
DoD Introduction to Information Security TEST ANSWERS
how many potential insider threat indicators does a person who is playful and charming
which of the following terms refers to harm inflicted on national security
which of the following is the best practice for handling cookies cyber awareness
which of the following helps protect data on your personal mobile devices
under which circumstances may you be subject to criminal
what should you do if an individual asks you to let her follow you into your controlled space
which represents a security best practice
what are some potential insider threat indicators authorized holders must meet the requirements to access
classified information can be destroyed using which of the following methods
classified information can be destroyed using which of the following methods
classified information can be safeguarded by using
classified information can be safeguarded by using
controlled unclassified information
cyber awareness challenge 2023
cyber awareness challenge 2023 answers
derivative classification is
derivative classifiers are required to have
derivative classifiers are required to have the following except
how often must you receive a defensive foreign travel briefing
how often must you receive a defensive foreign travel briefing
if the authorized sources do not provide sufficient guidance you should first
incorporating paraphrasing restating or generating
opsec process
personnel security program establishes
personnel security program establishes
secret materials may be transmitted by the same methods as confidential materials
the physical security program prevents unauthorized access to which of the following
the physical security program prevents unauthorized access to which of the following
top secret documents can be transmitted by which of the following methods
top secret documents can be transmitted by which of the following methods
what coversheet is attached to help protect a secret document
what does spillage refer to
what form is used to record end of day security checks
what form is used to record end of day security checks
what form is used to request a background investigation
what information most likely presents a security risk
what is an insider threat
what level of damage can the unauthorized disclosure of information classified as top secret reasonably be expected to cause
what should you do if a reporter asks you about potentially classified information on the web
when opening and closing a security container
which level of classified information could cause damage to national security
which of the following is a good practice to protect classified information
which of the following is a potential insider threat indicator
which of the following is not a correct way to protect sensitive information
which of the following is required to access classified information
which of the following is true of protecting classified data
which of the following materials are subject to pre-publication review
which of the following may help to prevent spillage
who designates whether information is classified and its classification level
you receive an inquiry from a reporter about potentially classified information on the internet
No comments:
Post a Comment