A+
The purpose of the DoD information security program is to
_________________________. Select all that apply.
Select one or more:
a.
Protect national security information
b.
Demonstrate a commitment to transparency in Government
c.
Classify as much government information as possible - answer A and B
Which volumes of DoDM 5200.01 provide guidance and direction on classification
management, marking, protection, and handling requirements for classified information?
Select all that apply.
Select one or more:
a.
Volume 1
b.
Volume 2
c.
Volume 3
d.
Volume 4 - answer A, B and C
The unauthorized disclosure of this type of information could reasonably be expected to
cause exceptionally grave damage to our national security.
Select one:
a.
Top Secret
b.
Secret
c.
Confidential - answer A
The unauthorized disclosure of this type of information could reasonably be expected to
cause damage to our national security.
Select one:
a.
Top Secret
b.
Secret
c.
,Confidential - answer C
Derivative classifiers are the individuals who generate or create new material based on
existing classification guidance.
Select one:
True
False - answer True
If a derivative classifier believes information to be improperly classified, they can
_____________ the classification decision.
Select one:
a.
Ignore
b.
Override
c.
Challenge - answer C
In which order must documents containing classified information be marked?
Select one:
a.
Portion markings, banner markings, classification authority block
b.
Portion markings, classification authority block, banner markings
c.
Banner markings, portion markings, classification authority block - answer A
What information is listed in the classification authority block on a document containing
classified information? Select all that apply.
Select one or more:
a.
Date on which to declassify the document
b.
Who created the classified document
c.
Classification level to downgrade to at a certain point in time (as applicable)
d.
Which source the information in the document was derived from
e.
Current classification level of the document - answer A, B, C, D
Who references information from security classification guides (SCG) in order to classify
information?
Select one:
a.
Derivative classifiers
,b.
Original Classification Authorities
c.
Both derivative classifiers and Original Classification Authorities - answer A
Who issues security classification guides (SCG) for systems, plans, programs, projects,
or missions?
Select one:
a.
Derivative classifiers
b.
Original Classification Authorities
c.
Both derivative classifiers and Original Classification Authorities - answer B
All _____________ GSA-approved security containers must conform to Federal
Specification FF-L-2740.
Select one:
a.
Handles on
b.
Doors on
c.
Locks for - answer C
When classified information is in an authorized individual's hands, why should the
individual use a classified document cover sheet? Select all that apply.
Select one or more:
a.
To prevent inadvertent viewing of classified information by unauthorized personnel
b.
To alert holders to the presence of classified information
c.
To record the removal of classified information from a GSA-approved security container
- answer A and B
What is required to access classified information? Select all that apply.
Select one or more:
a.
Signed SF-312, Nondisclosure Agreement
b.
Need-to-know
c.
Eligibility - answer A, B and C
, Which of the following are applicable when using a phone for classified conversations?
Select all that apply.
Select one or more:
a.
Know how to use your Secure Terminal Equipment (STE)
b.
Be aware of your surroundings and who might be able to hear your end of the
conversation
c.
Only use Secure Terminal Equipment (STE) phones - answer A, B and C
Which level of classified information may be transported via USPS mail? Select all that
apply.
Select one or more:
a.
Confidential
b.
Secret
c.
Top Secret - answer A and B
What type of security incident has occurred when classified data is introduced on an
information system not approved for that level of information?
Select one:
a.
Spillage
b.
Security Infraction
c.
Security category - answer A
If an individual inserts a thumb drive containing classified information on a computer in
the office that is not part of the classified information system, what type of security
incident is this?
Select one:
a.
Security Violation
b.
Spillage
c.
Security Infraction - answer B
What type of declassification process is the review of classified information that has
been exempted from automatic declassification?
Select one:
a.