Sensitive Compartmented Information (SCI) Security Refresher
Sensitive Compartmented Information (SCI) Security Refresher A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported. You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico. When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government. Walls in SCIFs must extend from true floor to true ceiling. An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________. You must report external activist groups you or your co-workers are affiliated with regardless of their nature Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel. If the ISSO permits it, you may share your password in a SCIF. The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN). SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material. In a SCIF, SCI must always be stored in a GSA-approved container. After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form Which is the primary database used to verify personnel access to SCIFs outside DoD? If a SCIF has a high security lock, then an access control system is not required. The SCI control system marking should not be listed in the banner line on a classified document. _____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets. What piece of information is not required to be recorded on the SCIF visitor control log? The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.
Written for
- Institution
- Sensitive Compartmented Information
- Course
- Sensitive Compartmented Information
Document information
- Uploaded on
- February 4, 2023
- Number of pages
- 7
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Unknown
Subjects
-
compromise
-
sensitive compartmented information sci security refresher
-
sci security refresher
-
a security violation involves the loss
-
or suspected compromise of classified information security vi