Casey Neville
Quiz by , created more than 1 year ago

SFPC SFPC Quiz on INFOSEC Quiz, created by Casey Neville on 05/05/2022.

240
2
0
Casey Neville
Created by Casey Neville about 2 years ago
Close

INFOSEC Quiz

Question 1 of 91

1

What are the steps of the information security program lifecycle?

Select one of the following:

  • Classification, dissemination, downgrading, declassification, and destruction

  • Classification, safeguarding, dissemination, declassification, and destruction

  • Classification, marking, dissemination, downgrading, and destruction

Explanation

Question 2 of 91

1

Which volumes of DoDM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information?
Select all that apply.

Select one or more of the following:

  • Volume 1

  • Volume 2

  • Volume 3

  • Volume 4

  • All of the above

Explanation

Question 3 of 91

1

Unauthorized disclosure of _____________ information could reasonably be expected to cause serious damage to our national security.

Select one of the following:

  • Top Secret

  • Secret

  • Confidential

Explanation

Question 4 of 91

1

Unauthorized disclosure of _____________ information could reasonably be expected to cause exceptionally grave damage to our national security.

Select one of the following:

  • Top Secret

  • Secret

  • Confidential

Explanation

Question 5 of 91

1

Unauthorized disclosure of _____________ information could reasonably be expected to cause damage to our national security.

Select one of the following:

  • Top Secret

  • Secret

  • Confidential

Explanation

Question 6 of 91

1

What is the basic formula for granting access to classified information for individuals? Select all that apply.

Select one or more of the following:

  • Verify the individual’s eligibility determination

  • Determine the individual’s need-to-know

  • Acknowledge that the SF-312 has been executed

Explanation

Question 7 of 91

1

_____ is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.

Select one of the following:

  • Original Classification

  • Derivative Classification

Explanation

Question 8 of 91

1

_____ is defined as an INITIAL determination that information requires, in the interest of national security, protection against unauthorized disclosure.

Select one of the following:

  • Derivative Classification

  • Original Classification

Explanation

Question 9 of 91

1

A derivative classifier may overrule an original classification determination if it is in the interest of national security.

Select one of the following:

  • True

  • False

Explanation

Question 10 of 91

1

When marking a classified document, the classifier must always start with which section?

Select one of the following:

  • The banner

  • The portions/paragraphs within the document

  • The classification authority block

Explanation

Question 11 of 91

1

If the banner marking is TOP SECRET, it is possible that some portion markings in that document can be U for Unclassified.

Select one of the following:

  • True

  • False

Explanation

Question 12 of 91

1

What information will you find in the Classification Authority Block on the front page of any classified document? Select all that apply.

Select one or more of the following:

  • Classified By

  • Post At

  • Derived From

  • Downgrade To (if applicable)

  • Declassify On

  • All of the above

Explanation

Question 13 of 91

1

Who issues security classification guides?

Select one of the following:

  • Derivative classifiers

  • Original classification authorities

  • Security managers

Explanation

Question 14 of 91

1

What information does a security classification guide provide a derivative classifier? Select all that apply.

Select one or more of the following:

  • Classification level for each element of information to be protected

  • Reason for classification

  • Duration of classification and any applicable downgrading instructions

  • Special control notices

  • OCA contact information

Explanation

Question 15 of 91

1

You may store classified information in your locked desk drawer while you go to lunch as long as you cover it with the appropriate classified cover sheet.

Select one of the following:

  • True

  • False

Explanation

Question 16 of 91

1

If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DoDM 5200.01, Volume 3, which of the following should you request?

Select one of the following:

  • Waiver

  • Exception

  • Security Incident

Explanation

Question 17 of 91

1

When can Top Secret information be sent via the United States Postal Service (USPS)?

Select one of the following:

  • When Defense Courier Operations (DCO) is not available

  • When the information needs to be signed for

  • Never

Explanation

Question 18 of 91

1

While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.

Select one of the following:

  • True

  • False

Explanation

Question 19 of 91

1

Your manager hands you a Top Secret document but you are only eligible for Secret access. If you think this is a security incident, what type of security incident do you think it is?

Select one of the following:

  • Infraction

  • Violation

  • Spillage

  • This is not a security incident because it was handed to you by your manager.

Explanation

Question 20 of 91

1

Your co-worker, Bob, did not place an SF-704, Secret classified document cover sheet, on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?

Select one of the following:

  • Infraction

  • Violation

  • Spillage

  • This is not a security incident because Bob maintained positive control of the document.

Explanation

Question 21 of 91

1

The declassification system where the public can ask for classified information to be reviewed for declassification and public release

Select one of the following:

  • Scheduled Declassification

  • Automatic Declassification

  • Mandatory Declassification Review

  • Systematic Declassification

Explanation

Question 22 of 91

1

The declassification system where information exempted from automatic declassification is reviewed

Select one of the following:

  • Scheduled Declassification

  • Automatic Declassification

  • Mandatory Declassification Review

  • Systematic Declassification

Explanation

Question 23 of 91

1

The declassification system where an OCA sets a date or event for declassification

Select one of the following:

  • Scheduled Declassification

  • Automatic Declassification

  • Mandatory Declassification Review

  • Systematic Declassification

Explanation

Question 24 of 91

1

The declassification system where information is declassified when it is 25 years old

Select one of the following:

  • Scheduled Declassification

  • Automatic Declassification

  • Mandatory Declassification Review

  • Systematic Declassification

Explanation

Question 25 of 91

1

Where would you find approved destruction equipment?

Select one of the following:

  • Best Buy

  • GSA Catalog

  • NSA EPL

  • Amazon

Explanation

Question 26 of 91

1

The only type of acceptable document shredding is with a crosscut shredder.

Select one of the following:

  • True

  • False

Explanation

Question 27 of 91

1

The DoD workforce plays a vital role in ensuring the effectiveness of the DoD Information Security Program.

Select one of the following:

  • True

  • False

Explanation

Question 28 of 91

1

The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security.

Select one of the following:

  • Exceptionally grave damage

  • Serious damage

  • Damage

Explanation

Question 29 of 91

1

The unauthorized disclosure of Confidential information could reasonably be expected to cause ____________________ to our national security.

Select one of the following:

  • Exceptionally grave damage

  • Serious damage

  • Damage

Explanation

Question 30 of 91

1

If a derivative classifier believes information to be improperly classified, they can _____________ the classification decision.

Select one of the following:

  • Challenge

  • Override

  • Ignore

Explanation

Question 31 of 91

1

Derivative classifiers are the individuals who generate or create new material based on existing classification guidance.

Select one of the following:

  • True

  • False

Explanation

Question 32 of 91

1

Why must all documents containing classified information be marked using a sequential process?

Select one of the following:

  • To mitigate confusion

  • To prevent marking errors

  • To prevent potential unauthorized disclosure

  • All of the above

Explanation

Question 33 of 91

1

The classification authority block identifies the authority, the source, and the duration of classification determination.

Select one of the following:

  • True

  • False

Explanation

Question 34 of 91

1

Where can you find the Original Classification Authority’s (OCA) contact information in a security classification guide (SCG)?

Select one of the following:

  • On the cover of the SCG

  • On the last page of classification instructions of the SCG

  • The contact information for the OCA is not contained in the SCG

Explanation

Question 35 of 91

1

Where do the reasons for classifying certain items, elements or categories of information originally come from?

Select one of the following:

  • Executive Order 13526

  • Original Classification Authorities

  • Security Classification Guide (SCG)

Explanation

Question 36 of 91

1

What is required to access classified information? Select all that apply.

Select one or more of the following:

  • Need-to-know

  • Eligibility

  • Signed SF-312, Nondisclosure Agreement

Explanation

Question 37 of 91

1

Which of the following is an example of information technology that is authorized for storing classified information?

Select one of the following:

  • On a computer connected to the Non-classified Internet Protocol Router Network (NIPRNET)

  • On a computer connected to the Secure Internet Protocol Router Network (SIPRNET)

  • On a personal computer of an authorized individual

Explanation

Question 38 of 91

1

Which of the following are applicable when using a phone for classified conversations? Select all that apply.

Select one or more of the following:

  • Only use Secure Terminal Equipment (STE) phones

  • Be aware of your surroundings and who might be able to hear your end of the conversation

  • Know how to use your Secure Terminal Equipment (STE)

Explanation

Question 39 of 91

1

Which form is used to record the securing of vaults, rooms, and containers used for storing classified material?

Select one of the following:

  • SF-701 Activity Security Checklist

  • SF-702 Security Container Check Sheet

  • SF-700 Security Container Information

Explanation

Question 40 of 91

1

What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container?

Select one of the following:

  • Security Infraction

  • Spillage

  • Security Violation

Explanation

Question 41 of 91

1

Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release.

Select one of the following:

  • True

  • False

Explanation

Question 42 of 91

1

If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?

Select one of the following:

  • Security Violation

  • Security Infraction

  • Spillage

Explanation

Question 43 of 91

1

What are the steps of the information security program lifecycle?

Select one of the following:

  • Classification, marking, dissemination, downgrading, and destruction

  • Classification, dissemination, downgrading, declassification, and destruction

  • Classification, safeguarding, dissemination, declassification, and destruction

Explanation

Question 44 of 91

1

When information, in the interest of national security, no longer requires protection at any level, it should be:

Select one of the following:

  • Declassified.

  • Classified.

  • Unclassified.

Explanation

Question 45 of 91

1

Who has responsibility for the overall policy direction of the Information Security Program?

Select one of the following:

  • Director of the Information Security Oversight Office (ISOO)

  • Heads of Defense Agencies

  • Under Secretary of Defense for Intelligence (USD(I))

  • Heads of DoD Components

Explanation

Question 46 of 91

1

What type of declassification process is the review of classified information that has been exempted from automatic declassification?

Select one of the following:

  • Automatic Declassification

  • Mandatory Declassification Review

  • Systematic Declassification

  • Scheduled Declassification

Explanation

Question 47 of 91

1

The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.

Select one of the following:

  • Top Secret

  • Secret

  • Confidential

Explanation

Question 48 of 91

1

Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers?

Select one of the following:

  • National Security Agency

  • Local information systems personnel

  • Original Classification Authorities

Explanation

Question 49 of 91

1

The unauthorized disclosure of this type of information could reasonably be expected to cause exceptionally grave damage to our national security.

Select one of the following:

  • Top Secret

  • Secret

  • Confidential

Explanation

Question 50 of 91

1

What is the process of making the initial decision that information could reasonably be expected to cause identifiable damage to national security called?

Select one of the following:

  • Compilation

  • Original classification

  • Derivative classification

Explanation

Question 51 of 91

1

All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740.

Select one of the following:

  • Handles on

  • Doors on

  • Locks for

Explanation

Question 52 of 91

1

In which order must documents containing classified information be marked?

Select one of the following:

  • Portion markings, banner markings, classification authority block

  • Banner markings, portion markings, classification authority block

  • Portion markings, classification authority block, banner markings

Explanation

Question 53 of 91

1

The name of the recipient of classified information must be included on which part(s) of the packaging?

Select one of the following:

  • Outer wrapped package

  • Inner wrapped package

  • On both the inner and outer wrapped packages

Explanation

Question 54 of 91

1

When are “Downgrade To” instructions listed in the classification authority block on documents containing classified information?

Select one of the following:

  • Never

  • Always

  • As applicable

Explanation

Question 55 of 91

1

Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.

Select one of the following:

  • DoD Information Security Manual

  • Executive Order 13526

  • Security Classification Guide

Explanation

Question 56 of 91

1

Who references information from security classification guides (SCG) in order to classify information?

Select one of the following:

  • Derivative classifiers

  • Original Classification Authorities

  • Both derivative classifiers and Original Classification Authorities

Explanation

Question 57 of 91

1

Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.

Select one of the following:

  • True

  • False

Explanation

Question 58 of 91

1

Spillage always requires an investigation to determine the extent of the compromise of classified information.

Select one of the following:

  • True

  • False

Explanation

Question 59 of 91

1

What type of security incident has occurred when classified data is introduced on an information system not approved for that level of information?

Select one of the following:

  • Security category

  • Spillage

  • Security Infraction

Explanation

Question 60 of 91

1

Who can be an Original Classification Authority (OCA)?

Select one of the following:

  • An individual authorized in writing, either by the President, the Vice President, or by agency heads or other officials designated by the President

  • All cleared personnel

  • nyone who works for the DoD

Explanation

Question 61 of 91

1

What type of declassification process is the set date or event, determined by the Original Classification Authority (OCA), which will occur within 25 years from the date of original classification?

Select one of the following:

  • Automatic Declassification

  • Mandatory Declassification Review

  • Scheduled Declassification

  • Systematic Declassification

Explanation

Question 62 of 91

1

The purpose of the DoD information security program is to _________________________. Select all that apply.

Select one or more of the following:

  • Demonstrate a commitment to transparency in Government

  • Classify as much government information as possible

  • Protect national security information

Explanation

Question 63 of 91

1

_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.

Select one of the following:

  • Compilation

  • Contained in

  • Revealed by

Explanation

Question 64 of 91

1

What information is listed in the classification authority block on a document containing classified information? Select all that apply.

Select one or more of the following:

  • Which source the information in the document was derived from

  • Classification level to downgrade to at a certain point in time (as applicable)

  • Who created the classified document

  • Current classification level of the document

  • Date on which to declassify the document

Explanation

Question 65 of 91

1

Declassification is the authorized change in the status of information from classified to unclassified.

Select one of the following:

  • True

  • False

Explanation

Question 66 of 91

1

What are the authorized places for storing classified information? Select all that apply.

Select one or more of the following:

  • In a GSA-approved security container

  • In information technology systems authorized for classified information

  • In an authorized individual’s locked desk drawer

  • In an authorized individual’s head or hands

Explanation

Question 67 of 91

1

What do derivative classifiers use to identify specific items or elements of information to be protected?

Select one of the following:

  • Original Classification Authorities

  • Security Classification Guides (SCG)

  • Executive Order 13526

Explanation

Question 68 of 91

1

A waiver is a permanent approved exclusion or deviation from information security standards.

Select one of the following:

  • True

  • False

Explanation

Question 69 of 91

1

Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?

Select one of the following:

  • Derivative classifiers

  • Original Classification Authorities

  • Both derivative classifiers and Original Classification Authorities

Explanation

Question 70 of 91

1

What type of declassification process is a way for members of the public to request the review of specific classified information?

Select one of the following:

  • Systematic Declassification

  • Mandatory Declassification Review

  • Scheduled Declassification

  • Automatic Declassification

Explanation

Question 71 of 91

1

When not directly in an authorized individual’s possession, classified documents must be stored in a GSA-approved security container.

Select one of the following:

  • True

  • False

Explanation

Question 72 of 91

1

Who maintains listings of evaluated destruction products that have been tested and meet performance requirements for destroying classified information?

Select one of the following:

  • Department of Defense

  • National Security Agency

  • Original Classification Authorities

Explanation

Question 73 of 91

1

A derivative classifier may overrule an original classification determination if it is in the interest of national security.

Select one of the following:

  • True

  • False

Explanation

Question 74 of 91

1

The communication or physical transfer of classified information to an unauthorized recipient is ______________________?

Select one of the following:

  • Spillage

  • Unauthorized Disclosure

  • None of the above

Explanation

Question 75 of 91

1

When marking a classified document, the classifier must always start with which section?

Select one of the following:

  • The banner

  • The portions/paragraphs within the document

  • The classification authority block

Explanation

Question 76 of 91

1

Who provides implementation guidance for the Information Security Program within the DoD?

Select one of the following:

  • Heads of Defense Agencies

  • Under Secretary of Defense for Intelligence (USD(I))

  • Heads of DoD Components

  • Director of the Information Security Oversight Office (ISOO)

Explanation

Question 77 of 91

1

What information does a security classification guide provide a derivative classifier? Select all that apply.

Select one or more of the following:

  • Classification level for each element of information to be protected

  • Reason for classification

  • Duration of classification and any applicable downgrading instructions

  • Special control notices

  • OCA contact information

Explanation

Question 78 of 91

1

What is the basic formula for granting access to classified information for individuals?

Select one or more of the following:

  • Verify the individual’s eligibility determination

  • Determine the individuals need-to-know

  • Acknowledge that the SF-312 has been executed

Explanation

Question 79 of 91

1

If your office is preparing to undergo renovations for the next few months and you will not be able to store classified information according to the requirements as specified in DODM 5200.01, Volume 3, which of the following should you request?

Select one of the following:

  • Security Incident

  • Exception

  • Waiver

Explanation

Question 80 of 91

1

Your co-worker, Hassel, did not place a SF-704 Secret classified document coversheet on a classified document while it was out of the security container. However, Bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident do you think it was?

Select one of the following:

  • Infraction

  • Violation

  • Spillage

  • This is not a security incident because Hassel maintained positive control of the document.

Explanation

Question 81 of 91

1

When can Top Secret information be sent via the United States Postal Service (USPS)?

Select one of the following:

  • When Defense Courier Operations (DCO) is not available

  • When the information needs to be signed for

  • Never

Explanation

Question 82 of 91

1

The only type of acceptable document shredding is with a cross-cut shredder.

Select one of the following:

  • True

  • False

Explanation

Question 83 of 91

1

While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication review.

Select one of the following:

  • True

  • False

Explanation

Question 84 of 91

1

Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.

Select one of the following:

  • True

  • False

Explanation

Question 85 of 91

1

Joe Biden hands you a Top Secret document, but you are only eligible for Secret Access. If you think this is a security incident, what type of security incident do you think it is?

Select one of the following:

  • Infraction

  • Violation

  • Spillage

  • This is not a security incident, he is the president.

Explanation

Question 86 of 91

1

When classified information is in an authorized individual’s hands, why should the individual use a classified document cover sheet? Select all that apply.

Select one or more of the following:

  • To alert holders to the presence of classified information

  • To prevent inadvertent viewing of classified information by unauthorized personnel

  • To record the removal of classified information from a GSA-approved security container

Explanation

Question 87 of 91

1

What is the first step an Original Classification Authority (OCA) must take when originally classifying information?

Select one of the following:

  • Determine if the unauthorized disclosure of information could result in damage to our national security.

  • Determine if the information falls in an authorized classification category and not on the prohibited list in Executive Order 13526.

  • Determine if the information is official government information.

Explanation

Question 88 of 91

1

Which level of classified information may be transported via USPS mail? Select all that apply.

Select one or more of the following:

  • Confidential

  • Secret

  • Top Secret

Explanation

Question 89 of 91

1

If Travis inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?

Select one of the following:

  • Security Infraction

  • Spillage

  • Security Violation

Explanation

Question 90 of 91

1

Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information?

Select one of the following:

  • Confidential

  • Secret

  • Top Secret

  • All of the above

  • None of the above

Explanation

Question 91 of 91

1

The unauthorized disclosure of Top Secret information could reasonably be expected to cause ____________________ to our national security.

Select one of the following:

  • Exceptionally grave damage

  • Serious damage

  • Damage

Explanation