Question: Which of the following is a good practice to aid in preventing spillage? brainly quizlet
Which of the following is a good practice to aid in preventing spillage 2020 cyber awareness knowledge check answerShow or Reveal the Answer
To prevent inadvertent spillage
1. Always check to make sure you are using the CORRECT network for the level of data.
2. DO NOT use a classified network for unclassified work. Processing unclassified information on a classified network.
* Can unnecessarily consume mission-essential bandwidth.
* May illegally shield information from disclosure under the Freedom of Information Act (FOIA).
* Creates danger of spillage when attempting to remove the information to an unclassified media or hard copy.
3. Label all files, removable media and subject headers with appropriate classification markings.
4. Be aware of classification markings and all handling caveats.
5. Follow procedures for transferring data to and from outside agency and non-Government networks.
1. Always check to make sure you are using the CORRECT network for the level of data.
2. DO NOT use a classified network for unclassified work. Processing unclassified information on a classified network.
* Can unnecessarily consume mission-essential bandwidth.
* May illegally shield information from disclosure under the Freedom of Information Act (FOIA).
* Creates danger of spillage when attempting to remove the information to an unclassified media or hard copy.
3. Label all files, removable media and subject headers with appropriate classification markings.
4. Be aware of classification markings and all handling caveats.
5. Follow procedures for transferring data to and from outside agency and non-Government networks.
DOD Cyber Awareness Challenge, Insider threat awareness Test answers
Declassification is the authorized change in the status of information from classified to unclassified.
ANSWER: True
Destruction refers to destroying classified information so that it can't be recognized or reconstructed.
ANSWER: True
Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.
ANSWER: True
Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.
ANSWER: False
When not directly in an authorized individual's possession, classified documents must be stored in a GSA-approved security container.
ANSWER: True
Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.
ANSWER: True
Destruction refers to destroying classified information so that it can't be recognized or reconstructed.
ANSWER: True
Spillage always requires an investigation to determine the extent of the compromise of classified information.
ANSWER: True
The DoD workforce plays a vital role in ensuring the effectiveness of the DoD Information Security Program?
ANSWER: True
The classification authority block identifies the authority, the source, and the duration of classification determination.
ANSWER: True
Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release.
ANSWER: True
A waiver is a permanent approved exclusion or deviation from information security standards.
ANSWER: False
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
ANSWER: Secret
When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply.
- To alert holders to the presence of classified information
- To prevent inadvertent viewing of classified information by unauthorized personnel
Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?
ANSWER: All of the above
When information, in the interest of national security, no longer requires protection at any level, it should be:
ANSWER: Declassified
When are "Downgrade To" instructions listed in the classification authority block on documents containing classified information?
ANSWER: As applicable
What information do security classification guides (SCG) provide about systems, plans, programs, projects, or missions?
ANSWER: All of the above
What is required to access classified information? Select all that apply.
- Eligibility
- Signed SF-312, Nondisclosure Agreement
- Need-to-know
The communication or physical transfer of classified information to an unauthorized recipient is _________?
ANSWER: Unauthorized Disclosure
What are the steps of the information security program life cycle?
ANSWER: Classification, safeguarding, dissemination, declassification, and destruction
The unauthorized disclosure of Confidential information could reasonably be expected to cause __________ to our national security.
ANSWER: Damage
Where can you find the Original Classification Authority's (OCA) contact information in a security classification guide (SCG)?
ANSWER: On the cover of the SCG
The purpose of the DoD information security program is to __________. Select all that apply.
- Demonstrate a commitment to transparency in Government
- Protect national security information
Who provides implementation guidance for the Information Security Program within the DoD?
ANSWER: Heads of DoD Components
The unauthorized disclosure of Top Secret information could reasonably be expected to cause __________ to our national security.
ANSWER: Exceptionally grave damage
The unauthorized disclosure of this type of information could reasonably be expected to cause damage to our national security.
ANSWER: Confidential
What is the first step an Original Classification Authority (OCA) must take when originally classifying information?
ANSWER: Determine if the information is official government information
Who can be an Original Classification Authority (OCA)?
ANSWER: An individual authorized in writing, either by the President, the Vice President, or by agency heads or officials designated by the President
Why must all documents containing classified information be marked using a sequential process?
ANSWER: All of the above
What information is listed in the classification authority block on a document containing classified information? Select all that apply.
- Who created the classified document
- Classification level to downgrade to at a certain point in time (as applicable)
- Which source the information in the document was derived form
- Date on which to declassify the document
Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?
ANSWER: Original Classification Authorities
Who references information from security classification guides (SCG) in order to classify information?
ANSWER: Derivative classifiers
Which of the following is an example of information technology that is authorized for storing classified information?
ANSWER: On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)
What are the authorized places for storing classified information? Select all that apply.
- In a GSA-approved security container
- In information technology systems authorized for classified information
- In an authorized individual's head or hands
Which level of classified information may be transported via USPS mail? Select all that apply.
- Confidential
- Secret
The name of the recipient of classified information must be included on which part(s) of the packaging?
ANSWER: Inner wrapped package
If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
ANSWER: Security Violation
What type of declassification process is the review of classified information that has been exempted from automatic declassification?
ANSWER: Systematic Declassification
Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers?
ANSWER: National Security Agency
Who has responsibility for the overall policy direction of the Information Security Program?
ANSWER: Director of the Information Security Oversight Office (ISOO)
The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.
ANSWER: Serious damage
The unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security.
ANSWER: Top Secret
_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
ANSWER: Compilation
If a derivative classifier believes information to be improperly classified, they can _____________ the classification decision.
ANSWER: Challenge
In which order must documents containing classified information be marked?
ANSWER: Portion markings, banner markings, classification authority block
Where do the reasons for classifying certain items, elements or categories of information originally come from?
ANSWER: Executive Order 13526
What do derivative classifiers use to identify specific items or elements of information to be protected?
ANSWER: Security Classification Guides (SCG)
Which form is used to record the securing of vaults, rooms, and containers used for storing classified material?
ANSWER: SF-702 Security Container Check Sheet
All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.
ANSWER: Locks for
Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.
ANSWER: DoD Information Security Manual
Which of the following are applicable when using a phone for classified conversations? Select all that apply.
- Be aware of your surroundings and who might be able to hear your end of the conversation
- Only use Secure Terminal Equipment (STE) phones
- Know how to use your Secure Terminal Equipment (STE)
What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?
ANSWER: Security Infraction
What type of security incident has occurred when classified data is introduced on an information system not approved for that level of information?
ANSWER: Spillage
What type of declassification process is a way for members of the public to request the review of specific classified information?
ANSWER: Mandatory Declassification Review
cyber awareness 2019, 2020, 2021 answers
how many potential insider threat indicators does a person who is playful and charming
which of the following terms refers to harm inflicted on national security
which of the following is the best practice for handling cookies cyber awareness
which of the following helps protect data on your personal mobile devices
under which circumstances may you be subject to criminal
what should you do if an individual asks you to let her follow you into your controlled space
which represents a security best practice
what are some potential insider threat indicators
No comments:
Post a Comment