A: Tier 2 R
B: Tier 3 R
C: Tier 4 R
D: Tier 5 R
Show or Reveal the Answer
Tier 3 R
A favorably adjudicated background investigation is required for access to classified information.
A: TRUE
B: FALSE
Show or Reveal the Answer
TRUE
Which of the following must be reported?
A: Driving while intoxicated
B: Divorce
C: A new car purchase
D: Issuance of a restraining order
E: Vacation to Disney World
Show or Reveal the Answer
Driving while intoxicated,
divorce,
issuance of a restraining order
divorce,
issuance of a restraining order
Which of the following levels of classified information could cause serious damage to National Security if compromised?
A: Controlled Unclassified Information
B: Confidential
C: Secret
D: Top Secret
Show or Reveal the Answer
Secret
The Classification Authority Block must be placed:
A: On the face of the document
B: On every page of the document
C: On the last page of the document
Show or Reveal the Answer
on the face of the document
Working papers must be remarked within _______days as a finished document.
A: 60 days
B: 90 days
C: 180 days
D: 365 days
Show or Reveal the Answer
180 days
Which form is used to record combinations of security containers?
A: SF 312 – Classified Information Non-Disclosure Agreement
B: SF 700 – Security Container Information
C: SF 701 – Activity Security Checklist
D: SF 702 – Security Container Check Sheet
Show or Reveal the Answer
SF 700 – Security Container Information
The SF 700 Security Container Information must be completed to record the combinations to security containers, secure rooms, and controlled area doors and to identify personnel to be contacted if a security container or facility are found open and unattended.
The SF 700 Security Container Information must be completed to record the combinations to security containers, secure rooms, and controlled area doors and to identify personnel to be contacted if a security container or facility are found open and unattended.
SECRET material may be sent via certified mail.
A: TRUE
B: FALSE
Show or Reveal the Answer
FALSE
Which of the following methods are appropriate for destroying classified information?
A: Shredding
B: Burning
C: Recycling
D: Throw in trash
Show or Reveal the Answer
Shredding, burning
A data spill is a ________________.
A: Security infraction
B: Security violation
C: None of the above
Show or Reveal the Answer
Security violation
Personnel who receive questions regarding classified information appearing in the media shall be referred to:
A: Your Security Office
B: Your Public Affairs and Security Office
C: The DOD Director
D: The local U.S. Congressional delegation and your Public Affairs Office
Show or Reveal the Answer
Your Public Affairs and Security Office
Contractor personnel are cleared under which program?
A: Physical Security Program (PSP)
B: Information Security Program (ISP)
C: National Industrial Security Program (NISP)
D: Operations Security Program (OSP)
Show or Reveal the Answer
National Industrial Security Program (NISP)
The standard DOD-wide form of identification is the __________________.
A: State driver’s license
B: Common access credential
C: Common access card
D: Central access card
Show or Reveal the Answer
Common access card
Intrusion detection systems are only used on the exterior of a facility or installation.
A: TRUE
B: FALSE
Show or Reveal the Answer
FALSE
OPSEC is a methodology that denies critical information to the adversary.
A: TRUE
B: FALSE
Show or Reveal the Answer
TRUE
How often must you receive a defensive foreign travel briefing?
A: At least once a year
B: Prior to travel
C: At least twice a year
D: Every two years
Show or Reveal the Answer
At least once a year, prior to travel
cyber awareness 2019, 2020, 2021, 2022, 2023 answers
DOD Cyber Awareness Challenge Answers 1
DOD Cyber Awareness Challenge Knowledge Answers 2
DOD Initial Orientation and Awareness Training Answers
DoD Introduction to Information Security TEST ANSWERS
No comments:
Post a Comment