Pages

✅ DoD Introduction to Information Security TEST ANSWERS

Question: Which of the following is a good practice to aid in preventing spillage? brainly quizlet

Which of the following is a good practice to aid in preventing spillage 2020 cyber awareness knowledge check answer

Show or Reveal the Answer

To prevent inadvertent spillage
1. Always check to make sure you are using the CORRECT network for the level of data.
2. DO NOT use a classified network for unclassified work. Processing unclassified information on a classified network.
* Can unnecessarily consume mission-essential bandwidth.
* May illegally shield information from disclosure under the Freedom of Information Act (FOIA).
* Creates danger of spillage when attempting to remove the information to an unclassified media or hard copy.
3. Label all files, removable media and subject headers with appropriate classification markings.
4. Be aware of classification markings and all handling caveats.
5. Follow procedures for transferring data to and from outside agency and non-Government networks.

DoD Annual Security Awareness



What is the standard form of identification for DoD employees?
A: Common Access Card
B: Real ID
C: State Issue Driver's License
D: Common Access Credential

Show or Reveal the Answer

Common Access Card

Classified information ca be safeguarded by using ____________.
A: Locked desk drawers
B: Vaults
C: Secure Rooms
D: Secure telephones

Show or Reveal the Answer

Vaults
Secure Rooms
Secure telephones

Derivative classifiers are required to have all the following except ______.
A: a security clearance
B: derivative classification training
C: a need-to-know
D: approval of the original classification authority (OCA)

Show or Reveal the Answer

approval of the original classification authority (OCA)

Which of the following are parts of the OPSEC process?
A: Identification of sensitive information
B: Analysis of threats
C: Application of appropriate countermeasures
D: Conduct vulnerability assessments

Show or Reveal the Answer

Analysis of threats
Application of appropriate countermeasures
Conduct vulnerability assessments

What coversheet is attached to help protect a Secret document?
A: SF706
B: SF704
C: SF705
D: SF703

Show or Reveal the Answer

SF704

Which of the following must be reported?
A: Change is statues
B: Adverse Information
C: Foreign contacts
D: All of the above

Show or Reveal the Answer

All of the above

Physical Security is concerned with _____and _____ measures designed to prevent unauthorized access.
A: Access control, active
B: Active, inactive
C: Countermeasure, passive
D: Active, passive

Show or Reveal the Answer

Active, passive

What form is used to request a background investigation?
A: SF 702
B: SF 86
C: Sf 312
D: SF 700

Show or Reveal the Answer

SF 86

The Personnel Security Program established _____ for Personnel Security determinations and overall program management responsibilities.
A: Clearance classification
B: Job selection criteria
C: Policies and procedures

Show or Reveal the Answer

Policies and procedures

Classified information can be destroyed using which of the following methods?
A: Burning
B: Shredding
C: Pulverizing
D: Recycling

Show or Reveal the Answer

Burning
Shredding
Pulverizing

Secret materials may be transmitted by the same method as Confidential materials.
A: TRUE
B: FALSE

Show or Reveal the Answer

FALSE

Which level of classified information could cause damage to national security if compromised?
A: Secret
B: Top Secret
C: Controlled Unclassified Information (CUI)
D: Confidential

Show or Reveal the Answer

Confidential

Prior to foreign travel, you must ensure that your Antiterrorism/Force Protection Level 1 training is current.
A: TRUE
B: FALSE

Show or Reveal the Answer

TRUE

Incorporating, paraphrasing, restating, or generating in new form information that is already classified is known as _____.
A: Declassification
B: Original classification
C: Derivative classification

Show or Reveal the Answer

Derivative classification

When opening and closing a security container, complete the _____.
A: SF 701
B: SF 700
C: SF 702
D: SF 703

Show or Reveal the Answer

SF 702

What form is used to record end-of-day security checks?
A: SF 700
B: SF 701
C: SF 702
D: SF 703

Show or Reveal the Answer

SF 701

You may be subjected to sanctions if you negligently disclose classified information.
A: TRUE
B: FALSE

Show or Reveal the Answer

TRUE

A security infraction involves loss, compromise, or suspected compromise.
A: TRUE
B: FALSE

Show or Reveal the Answer

FALSE

The physical security program prevents unauthorized access to which of the following?
A: Personnel
B: Facilities
C: Information
D: Equipment

Show or Reveal the Answer

Personnel
Facilities
Information
Equipment

Which of the following is required to access classified information?
A: Signed SF 312
B: Approval of the Original Classification Authority (OCA)
C: Clearance eligibility at the appropriate level
D: Need-to-know
E: Approval of your advisor

Show or Reveal the Answer

Signed SF 312
Clearance eligibility at the appropriate level
Need-to-know

Which of the following materials are subject to pre-publication review?
A: Speeches
B: Books
C: Articles

Show or Reveal the Answer

Speeches
Books
Articles

Which method may be used to transmit Confidential material to DoD agencies?
A: USPS First class mail
B: Street side collection box
C: Unsecured fax
D: USPS Fourth class mail

Show or Reveal the Answer

USPS First class mail

How often must you receive a defensive foreign travel briefing?
A: At least once a year
B: Never
C: Prior to travel
D: Every two years

Show or Reveal the Answer

At least once a year
Prior to travel

Top Secret documents can be transmitted by which of the following methods?
A: Defense Courier Service
B: U.S. Postal Service
C: FedEx
D: Secure Fax

Show or Reveal the Answer

Defense Courier Service
Secure Fax

DoD Mandatory Controlled Unclassified Information (CUI) Training




Who is responsible for applying CUI markings and dissemination instruction?
A: Authorized common access card (CAC) holder
B: Authorized NIPRnet (Non-classified Internet Protocol Router (IP) Network) system
C: Authorized system access administrator
D: Authorized holder of the information at the time of creation

Show or Reveal the Answer

Authorized holder of the information at the time of creation

CUI documents must be reviewed according to which procedures before destruction?
A: Safeguarding
B: Transmission
C: Records Management
D: Marking

Show or Reveal the Answer

Records Management

What is CUI Basic?
A: The subset of CUI requiring DoD personnel to submit and obtain information for entries into SF 86c
B: The subset of CUI in which the authorizing law, regulation, or government-wide policy contains specific handling controls that it requires or permits agencies to use
C: The subset of CUI for which the law, regulations, or government-wide policy does not set out specific handling or dissemination controls
D: The subset of CUI requiring DoD contractors to provide the information needed for the completion of DD Form 254

Show or Reveal the Answer

The subset of CUI for which the law, regulations, or government-side policy does not set out specific handling or dissemination controls

What is the goal of destroying CUI?
A: Make it unreadable
B: Make it indecipherable
C: Make it unrecoverable
D: All of the above
E: None of the above

Show or Reveal the Answer

All of the above

What marking (banner and footer) acronym (at a minimum) is required on a DoD document containing controlled unclassified information?
A: FOUO
B: IAW
C: Unclassified
D: CUI

Show or Reveal the Answer

CUI

What level of system and network configuration is required for CUI?
A: Basic confidentiality
B: Moderate confidentiality
C: Advanced confidentiality
D: Enhanced confidentiality

Show or Reveal the Answer

Moderate confidentiality

Administrative, civil, or criminal sanctions may be imposed if there is an unauthorized disclosure (UD) of CUI?
A: TRUE
B: FALSE

Show or Reveal the Answer

TRUE

It is mandatory to include a banner marking at the top of the page to alert the user that CUI is present.
A: TRUE
B: FALSE

Show or Reveal the Answer

TRUE

What is the purpose of the ISOO CUI Registry?
A: A government-wide online repository for Federal-level guidance regarding CUI policy and practice
B: A DoD online repository for foreign guidance regarding CUI policy and practice
C: A DoD secure communications between Adjudicators, Security Officers and Component Adjudicators in support of eligibility and access management
D: A government-wide database of privacy information used to identify individuals' personally identifiable information (PII)

Show or Reveal the Answer

A government-wide online repository for Federal-level guidance regarding CUI policy and practice

Who can decontrol CUI?
A: OCA, if in a Security Classification Guide
B: Designated office for decontrolling
C: All of the above

Show or Reveal the Answer

All of the above

What is CUI Specified?
A: The subset of CUI in which the authorizing law, regulation, or government-wide policy contains specific handling controls that it requires or permits agencies to use
B: The subset of CUI for which the law, regulations, or government-wide policy does not set out specific handling or dissemination controls
C: The subset of CUI requiring DoD personnel to submit and obtain information for entries into SF 86c
D: The subset of CUI requiring DoD contractors to provide the information needed for the completion of DD Form 254

Show or Reveal the Answer

The subset of CUI in which the authorizing law, regulation, or government-wide policy contains specific handling controls that it requires or permits agencies to use

What is controlled unclassified information (CUI)?
A: Unclassified information requiring safeguarding and dissemination controls, pursuant to and consistent with applicable laws, regulations, and government-wide policies
B: Information always requiring a Freedom of Information Act (FOIA) element to ensure application of a 32 Code of Federal Regulation (CFR) Part 3012.56
C: Controlled information requiring a subset of markings pursuant to the Director of National Intelligence (DNI)
D: Unclassified information requiring classified markings pursuant to good order and discipline

Show or Reveal the Answer

Unclassified information requiring safeguarding and dissemination controls, pursuant to and consistent with applicable laws, regulations, and government-wide policies

What DoD instruction implements the DoD CUI program?
A: DoDI 5205.08, Access to Classified Cryptographic Information
B: DoDI 5200.39, Critical Program Information Identification and Protection Within Research, Development, Test, and Evaluation
C: DoDI 5200.48, Controlled Unclassified Information
D: DoDI 5200.01 DoD Information Security Program and Protection of Sensitive Compartmented Information

Show or Reveal the Answer

DoDI 5200.48, Controlled Unclassified Information

Who is responsible for protecting CUI?
A: DoD military only
B: DoD civilians only
C: DoD contractors only
D: DoD military, civilians, and contractors

Show or Reveal the Answer

DoD military, civilians, and contractors

At the time of creation of CUI material the authorized holder is responsible for determining:
A: CUI category, CUI markings and dissemination instructions
B: CUI category, CUI Registry designations, and CUI downgrading instructions
C: CUI category, CUI labeling, and destruction instructions

Show or Reveal the Answer

CUI category, CUI markings and dissemination instructions

DOD Cyber Awareness Challenge, Insider threat awareness Test answers


Declassification is the authorized change in the status of information from classified to unclassified.
ANSWER: True

Destruction refers to destroying classified information so that it can't be recognized or reconstructed.
ANSWER: True

Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.
ANSWER: True

Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.
ANSWER: False

When not directly in an authorized individual's possession, classified documents must be stored in a GSA-approved security container.
ANSWER: True

Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.
ANSWER: True

Destruction refers to destroying classified information so that it can't be recognized or reconstructed.
ANSWER: True

Spillage always requires an investigation to determine the extent of the compromise of classified information.
ANSWER: True

The DoD workforce plays a vital role in ensuring the effectiveness of the DoD Information Security Program?
ANSWER: True

The classification authority block identifies the authority, the source, and the duration of classification determination.
ANSWER: True

Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release.
ANSWER: True

A waiver is a permanent approved exclusion or deviation from information security standards.
ANSWER: False

The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
ANSWER: Secret

The unauthorized disclosure of Confidential information could reasonably be expected to cause __________ to our national security.
ANSWER: Damage

The unauthorized disclosure of Top Secret information could reasonably be expected to cause __________ to our national security.
ANSWER: Exceptionally grave damage

The unauthorized disclosure of this type of information could reasonably be expected to cause damage to our national security.
ANSWER: Confidential

The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.
ANSWER: Serious damage

The unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security.
ANSWER: Top Secret

Which type of information could reasonably be expected to cause serious damage to national security if disclosed without authorization?
ANSWER: Secret

Which classified level is given to information that could reasonably be expected to cause serious damage to national security?
ANSWER: Secret

What kind of information could reasonably be expected to cause serious damage to national security in the event of unauthorized disclosure?
ANSWER: Top Secret

How should you protect a printed classified document when it is not in use?
ANSWER: Store it in a General Services Administration (GSA)-approved vault or container

When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply.
- To alert holders to the presence of classified information
- To prevent inadvertent viewing of classified information by unauthorized personnel

Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?
ANSWER: All of the above

When information, in the interest of national security, no longer requires protection at any level, it should be:
ANSWER: Declassified

When are "Downgrade To" instructions listed in the classification authority block on documents containing classified information?
ANSWER: As applicable

What information do security classification guides (SCG) provide about systems, plans, programs, projects, or missions?
ANSWER: All of the above

What is required to access classified information? Select all that apply.
- Eligibility
- Signed SF-312, Nondisclosure Agreement
- Need-to-know

The communication or physical transfer of classified information to an unauthorized recipient is _________?
ANSWER: Unauthorized Disclosure

What are the steps of the information security program life cycle?
ANSWER: Classification, safeguarding, dissemination, declassification, and destruction

Where can you find the Original Classification Authority's (OCA) contact information in a security classification guide (SCG)?
ANSWER: On the cover of the SCG

The purpose of the DoD information security program is to __________. Select all that apply.
- Demonstrate a commitment to transparency in Government
- Protect national security information

Who provides implementation guidance for the Information Security Program within the DoD?
ANSWER: Heads of DoD Components

What is the first step an Original Classification Authority (OCA) must take when originally classifying information?
ANSWER: Determine if the information is official government information

Who can be an Original Classification Authority (OCA)?
ANSWER: An individual authorized in writing, either by the President, the Vice President, or by agency heads or officials designated by the President

Why must all documents containing classified information be marked using a sequential process?
ANSWER: All of the above

What information is listed in the classification authority block on a document containing classified information? Select all that apply.
- Who created the classified document
- Classification level to downgrade to at a certain point in time (as applicable)
- Which source the information in the document was derived form
- Date on which to declassify the document

Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?
ANSWER: Original Classification Authorities

Who references information from security classification guides (SCG) in order to classify information?
ANSWER: Derivative classifiers

Which of the following is an example of information technology that is authorized for storing classified information?
ANSWER: On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)

What are the authorized places for storing classified information? Select all that apply.
- In a GSA-approved security container
- In information technology systems authorized for classified information
- In an authorized individual's head or hands

Which level of classified information may be transported via USPS mail? Select all that apply.
- Confidential
- Secret

The name of the recipient of classified information must be included on which part(s) of the packaging?
ANSWER: Inner wrapped package

If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
ANSWER: Security Violation

What type of declassification process is the review of classified information that has been exempted from automatic declassification?
ANSWER: Systematic Declassification

Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers?
ANSWER: National Security Agency

Who has responsibility for the overall policy direction of the Information Security Program?
ANSWER: Director of the Information Security Oversight Office (ISOO)

_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
ANSWER: Compilation

If a derivative classifier believes information to be improperly classified, they can _____________ the classification decision.
ANSWER: Challenge

In which order must documents containing classified information be marked?
ANSWER: Portion markings, banner markings, classification authority block

Where do the reasons for classifying certain items, elements or categories of information originally come from?
ANSWER: Executive Order 13526

What do derivative classifiers use to identify specific items or elements of information to be protected?
ANSWER: Security Classification Guides (SCG)

Which form is used to record the securing of vaults, rooms, and containers used for storing classified material?
ANSWER: SF-702 Security Container Check Sheet

All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.
ANSWER: Locks for

Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.
ANSWER: DoD Information Security Manual

Which of the following are applicable when using a phone for classified conversations? Select all that apply.
- Be aware of your surroundings and who might be able to hear your end of the conversation
- Only use Secure Terminal Equipment (STE) phones
- Know how to use your Secure Terminal Equipment (STE)

What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?
ANSWER: Security Infraction

What type of security incident has occurred when classified data is introduced on an information system not approved for that level of information?
ANSWER: Spillage

What type of declassification process is a way for members of the public to request the review of specific classified information?
ANSWER: Mandatory Declassification Review

cyber awareness 2019, 2020, 2021 answers

how many potential insider threat indicators does a person who is playful and charming
which of the following terms refers to harm inflicted on national security
which of the following is the best practice for handling cookies cyber awareness
which of the following helps protect data on your personal mobile devices
under which circumstances may you be subject to criminal
what should you do if an individual asks you to let her follow you into your controlled space
which represents a security best practice
what are some potential insider threat indicators

No comments:

Post a Comment