SOLUTIONS GRADED A+
✔✔Which of the following is a true statement regarding the special handling
requirements of Foreign Government Information (FGI)?
a. When the classification marking on a document containing FGI is not in English, or
when the foreign government marking requires a different degree of protection than
the same U.S. classification designation, a U.S. marking that results in a degree of
protection equivalent to that required by the foreign government shall be applied.
b. A U.S. document containing FGI cannot be declassified or downgraded below the
highest level of FGI contained in the document without the permission of the foreign
government or international organization that originated the information.
c. Those holding security clearances issued by the U.S. government cannot access
U.S. documents containing FGI without written consent from the originating foreign
government.
d. The receiving DoD Components must maintain re - ✔✔B
✔✔Which of the following is a requirement for access to North Atlantic Treaty
Organization (NATO) information?
a. Personnel has been subject of a Single Scope Background Investigation (SSBI),
including a National Agency Check (NAC) on the spouse and all members of the
individual's immediate family of 18 years of age or over who are United States citizens
other than by birth or who are resident aliens.
b. Personnel has been subject of a favorably adjudicated background investigation (BI)
(10-year scope), Tier 5, current within five years prior to the assignment, and completed
a NATO brief.
c. Personnel has been subject of a favorably adjudicated BI (10-year scope), Defense
National Agency Check with Inquiries (DNACI)/ National Agency Check with Inquiries
(NACI) or NACI Entrance National Agency Check (ENTNAC), current within five years
prior to the assignment.
d. Personnel requiring access to NATO COSMIC (Top Secret) or - ✔✔B
✔✔According to Executive Order 13556, which of the following
is considered a type of controlled unclassified information (CUI)?
a. Communications Security (COMSEC) Information
b. Declassified Information
c. Law Enforcement Sensitive (LES) Information
d. North Atlantic Treaty Organization (NATO) Information - ✔✔C. Law Enforcement
Sensitive Information
✔✔What is the purpose of marking classified materials?
a. To alert holders to the presence of classified information, how to properly protect it,
and for how long.
,b. To deter foreign adversaries from committing actions aimed at accessing such
information.
c. To provide guidance for interpretation and analysis of classified information.
d. To alert holders to the methods used to collect classified information. - ✔✔A
✔✔What is included in the markings of classified information?
a. Derivative classifier as the authority to make declassification determinations.
b. Agencies and authorities that have previously accessed the classified information.
c. Document holder as the sole authority to make transfer and dissemination
determinations.
d. Sources and reasons for the classification. - ✔✔C
✔✔What is the purpose of the Controlled
Access Program Coordination (CAPCO) register?
a. To identify the categories, types, and levels of Special Access Programs (SAPs.)
b. To define the authorities for classifying, declassifying, and regrading sensitive
documents.
c. To identify the official classification and control markings, and their authorized
abbreviations and portion markings.
d. To define the requirements, restrictions, and measures necessary to safeguard
classified information from unauthorized disclosure. - ✔✔C
✔✔When a classified data spill occurs, who is responsible for ensuring that policy
requirements for addressing an unauthorized disclosure are met?
a. Activity Security Manager
b. Information Assurance Staff
c. Information Assurance Manager
d. Information Assurance Officer - ✔✔A
✔✔There are five information assurance attributes that are important to protect and
defend DoD networks and information. If there was a loss in non- repudiation, what
would this cause in relation to information assurance?**
a. Data is no longer reliable, accurate, nor trusted.
b. Data may potentially be available to unauthorized users via electronic form.
c. General communications are no longer trusted.
d. Potential of unauthorized access to classified data.
e. Data is no longer available to authorized users, and missions cannot be conducted. -
✔✔B
✔✔Which of the following examples describes
a security violation rather than a security infraction?
a. On a busy day, Karen printed classified documents on the printer in her open
storage/secure room. She forgot about the documents and they remained on the printer
for about an hour before she retrieved them.
, b. Karen was late for a meeting in a different area of her building. She put a classified
document in a folder she believed was marked for carrying classified materials. When
handing out the materials, Karen realized that the folder was not marked for carrying
classified materials, she had put the documents in the wrong folder.
c. At the end of the day, Karen was leaving and taking with her unclassified documents
she would review at home. When she began to review those documents that night, she
realized that classified materials had slipped in between the unclassified materials.
d. Karen was working a mission rela - ✔✔C
✔✔The inability to deny you are the sender of an email would be an indication of a
lapse in:**
a. Non-Repudiation
b. Confidentiality
c. Integrity
d. Availability - ✔✔A. Non-repudiation
✔✔Unauthorized disclosure and loss of privacy is a lapse in:**
a. Confidentiality
b. Integrity
c. Availability
d. Authentication - ✔✔A
✔✔Which of the following is the first action done to downgrade, declassify
or remove classification markings? a. Through the appropriate chain of command,
contact the original classification authority (OCA) to confirm that information does not
have an extended classification period.
b. Change the classification authority block to indicate "Declassify ON:" to show the new
declassification instructions.
c. Take all classification markings off the document and redistribute.
d. Request a waiver from the Information Security Oversight. Office (ISOO) to remove
the declassification markings. - ✔✔A
✔✔All of the
following are requirements to perform classified activities from non-traditional locations
(e.g., the employees home), EXCEPT:
a. The employee must be trained to operate classified information systems.
b. The employee must be trained on protection and storage of classified information and
Communications Security (COMSEC) materials.
c. The employee must receive written approval for use of classified information and
equipment at home.
d. The employee must have an office space that meets requirements comparable to the
Sensitive Compartmented Information Facility (SCIF). - ✔✔B
✔✔What is the purpose of the Personnel Security Program (PSP)?
a. To define original classification for DoD assets and information.