Annual Security Awareness Flashcards
53 Questions
103 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

When transporting classified information, the courier must have a DD Form 2501 and as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy-duty material.

True (A)

What are the three classification levels of information?

Confidential, Secret, Top Secret.

What is the purpose of the SF 701 'Activity Security Checklist' and the SF 702 'Security Container Check Sheet'?

Used as part of the end-of-day security checks for classified material.

If you find classified material out of proper control, you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor.

<p>True (A)</p> Signup and view all the answers

In the event of a natural disaster, what is the first priority concerning an emergency action procedure for classified material?

<p>Protection of life.</p> Signup and view all the answers

Using curbside mailboxes is an approved method for mailing classified information.

<p>False (B)</p> Signup and view all the answers

Which of the following statements concerning security containers, vaults, or open storage areas are true? (Select all that apply)

<p>Do not store items such as weapons, money, jewelry, precious metals or drugs in the same container as classified material. (A), The combination must be protected at the same level as the highest classification of the material authorized for storage. (B)</p> Signup and view all the answers

Which of the following are approved methods of discussing and transmitting classified material? (Select all that apply)

<p>Secure Telephone (A), SIPRnet (B), Secure Fax (C)</p> Signup and view all the answers

Which of the following methods are routinely used for destroying classified information? (Select all that apply)

<p>Burning (A), Wet-pulping (B), Approved cross-cut shredding (C)</p> Signup and view all the answers

Which statement must be on the front of a GSA-approved security container for storing classified information?

<p>General Services Administration-Approved Security Container.</p> Signup and view all the answers

Personnel who fail to report CI Activities of concern as outlined in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations.

<p>True (A)</p> Signup and view all the answers

Cyber Vulnerabilities to DoD Systems may include?

<p>All the above.</p> Signup and view all the answers

DoD personnel who suspect a coworker of possible espionage should?

<p>Report directly to your CI or Security Office.</p> Signup and view all the answers

Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable?

<p>None of the above.</p> Signup and view all the answers

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that may be indicative of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity. Examples of PEI include?

<p>All of the above.</p> Signup and view all the answers

A Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as any known or suspected foreign organization, person, or group that conducts intelligence activities to acquire U.S. information.

<p>True (A)</p> Signup and view all the answers

Counterintelligence is defined as information gathered to protect against espionage or intelligence activities conducted by foreign governments.

<p>True (A)</p> Signup and view all the answers

If you feel you are being solicited for information, what should you do?

<p>All of the above.</p> Signup and view all the answers

Foreign Intelligence Entities seldom use the Internet or communications for collection methods.

<p>False (B)</p> Signup and view all the answers

Foreign Intelligence Entities seldom use elicitation to extract information.

<p>False (B)</p> Signup and view all the answers

Collection methods or operations frequently used by Foreign Intelligence Entities include?

<p>All the above.</p> Signup and view all the answers

Which of the following is not an example of an anomaly?

<p>Foreign diplomat attempts to defect.</p> Signup and view all the answers

Which statements are correct concerning why a person would need to obtain a security clearance? (Select all that apply)

<p>To ensure only trustworthy people hold national security sensitive positions. (A), To ensure trustworthy people have access to classified information. (B)</p> Signup and view all the answers

All DoD civilian positions are categorized into which following security groups?

<p>Special Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive.</p> Signup and view all the answers

Which procedures are used to monitor personnel for new information or changes that could affect their eligibility for a security clearance?

<p>Continuous evaluation.</p> Signup and view all the answers

Which organization is the sole authority for determining clearance eligibility for non-intelligence agency DoD?

<p>Department of Defense Consolidated Adjudications Facility (DoD CAF).</p> Signup and view all the answers

Which of the following are part of the 13 national security adjudicators used to determine clearance eligibility? (Select all that apply)

<p>Personal conduct. (A), Criminal conduct. (B), Allegiance to the United States. (C)</p> Signup and view all the answers

When a security clearance is denied or revoked, the decision is final.

<p>False (B)</p> Signup and view all the answers

What are you expected to do when you hold a secret clearance or fill a national security sensitive position? (Select all that apply)

<p>Keep your security office informed of changes. (A), Report potential security concerns about co-workers. (B), Comply with high standards of conduct. (C)</p> Signup and view all the answers

Which statements are true concerning continuous evaluation? (Select all that apply)

<p>Individuals granted security clearances may become unreliable after being granted initial eligibility. (A), Individuals holding security clearances are subjected to periodic reinvestigations. (B), Individuals holding security clearance are subject to a reasonable degree of monitoring by supervisors. (C)</p> Signup and view all the answers

Which statement is true concerning self-reporting for an individual who holds a security clearance?

<p>It is mandatory; it demonstrates personal integrity.</p> Signup and view all the answers

A security clearance determination is based on a pattern of behavior and not a single action.

<p>True (A)</p> Signup and view all the answers

What is the primary goal of OPSEC?

<p>Increasing mission effectiveness while protecting critical information.</p> Signup and view all the answers

Which of the following are threats to our critical information? (Select all that apply)

<p>Terrorists. (A), Friendly foreign governments. (B), Private organizations. (C)</p> Signup and view all the answers

Which of the following are considered critical information? (Select all that apply)

<p>Backorders affecting readiness. (A), PII. (B), IT system architecture. (C)</p> Signup and view all the answers

How often do J or D code, major subordinate command, and regional command update their unique critical information list?

<p>Annually.</p> Signup and view all the answers

Which of the following are effective countermeasures to protect critical information? (Select all that apply)

<p>Encryption. (A), Shredding. (B), Enforcing need-to-know. (C)</p> Signup and view all the answers

Friendly detectable actions are critical information.

<p>True (A)</p> Signup and view all the answers

Geolocation applications are not authorized for use in?

<p>Operational Areas.</p> Signup and view all the answers

Official documents may be thrown away in recycle bins.

<p>False (B)</p> Signup and view all the answers

It is illegal for someone to rummage through your trash when you leave it outside for pickup.

<p>False (B)</p> Signup and view all the answers

All DLA personnel work with critical information.

<p>True (A)</p> Signup and view all the answers

Which of the following are key objectives of DLA's Counterintelligence Mission? (Select all that apply)

<p>Stopping the theft of critical U.S. technologies. (A), Developing and implementing capabilities to detect insider threats. (B), Neutralizing attempts to exploit U.S. Supply Chain. (C)</p> Signup and view all the answers

Which term describes information gathered to identify, deceive, exploit, or protect against espionage?

<p>Counterintelligence.</p> Signup and view all the answers

Which term includes foreign intelligence and security services and is defined as any known or suspected foreign organization that conducts intelligence activities to acquire U.S. information?

<p>Foreign Intelligence Entity (FIE).</p> Signup and view all the answers

What is an activity or knowledge outside the norm that suggests a foreign entity has foreknowledge of U.S. information?

<p>Anomaly.</p> Signup and view all the answers

Foreign visits to DoD facilities should be coordinated how many days in advance?

<p>30 days.</p> Signup and view all the answers

Which technique is used to subtly and inconspicuously gather information about you or your mission?

<p>Elicitation.</p> Signup and view all the answers

An unexplained and sudden reversal of large debt is an indicator of counterintelligence concern and should be reported for further investigation.

<p>True (A)</p> Signup and view all the answers

To whom are all DoD personnel required to report all projected foreign travel?

<p>Security representative.</p> Signup and view all the answers

Any deviation from foreign travel itineraries must be reported within how many days of returning from travel?

<p>5 days.</p> Signup and view all the answers

A one-time encounter with a foreign national involving the exchange of contact information must be reported to your security representative.

<p>True (A)</p> Signup and view all the answers

Which term describes a known or suspected foreign organization conducting intelligence activities to acquire U.S. information?

<p>Foreign Intelligence Entity (FIE).</p> Signup and view all the answers

Flashcards

Classification Levels

Three levels classify information based on sensitivity: Confidential, Secret, and Top Secret.

Courier Security

Couriers transporting classified information must utilize a DD Form 2501 and use secured containers like locked briefcases or pouches.

Security Checklists

SF 701 and SF 702 are checklists used to ensure security measures are in place at locations handling classified material after hours.

Handling Uncontrolled Classified Material

If you find classified information out of its designated secure location, immediately report it to a security representative and secure it.

Signup and view all the flashcards

Emergency Priority

In emergencies, protecting human life is the top priority, even over classified information.

Signup and view all the flashcards

Mailing Classified Information

Curbside mailboxes are not acceptable for sending classified information. It is not secure enough.

Signup and view all the flashcards

Security Container Security

Security containers must be secure enough to safeguard the highest level of classified material stored within.

Signup and view all the flashcards

Separating Classified and Unclassified

Non-classified items should never be stored in the same container as classified materials. Keep them separate.

Signup and view all the flashcards

Secure Communication Channels

Safe and approved methods to discuss classified information include SIPRnet, Secure Fax, and Secure Telephone.

Signup and view all the flashcards

Destroying Classified Information

Methods for destroying classified information include burning, approved cross-cut shredding, and wet-pulping.

Signup and view all the flashcards

Security Container Labeling

GSA-approved security containers must have clear labeling to identify them.

Signup and view all the flashcards

Reporting Counterintelligence Activities

Failing to report counterintelligence activities can lead to disciplinary actions. It is important to be vigilant.

Signup and view all the flashcards

Cybersecurity Threats

Cyber vulnerabilities within DoD systems are a critical concern. Constant monitoring for security threats is necessary.

Signup and view all the flashcards

Reporting Espionage

DoD personnel suspecting espionage should report directly to the Counterintelligence or Security Office.

Signup and view all the flashcards

Foreign Intelligence Reporting

All foreign intelligence contacts or suspicious activities must be reported. Nothing is exempt from scrutiny.

Signup and view all the flashcards

Potential Espionage Indicators

Unusual behaviors like sharing information inappropriately or exhibiting unusual interest in classified material can indicate potential espionage.

Signup and view all the flashcards

Continuous Security Clearance Evaluation

Regularly assessing personnel for changes that could affect their security clearance eligibility is crucial for maintaining a secure environment.

Signup and view all the flashcards

Security Clearance Categories

DoD civilian positions are categorized into four levels based on their security clearance needs: Special Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive.

Signup and view all the flashcards

DoD CAF Authority

The DoD Consolidated Adjudications Facility is the sole authority for deciding who can be cleared for non-intelligence agencies.

Signup and view all the flashcards

Self-Reporting Changes

Individuals with security clearances must report any significant changes in personal circumstances, such as financial difficulties, marital disputes, or changes in address.

Signup and view all the flashcards

OPSEC Goal

The main goal of OPSEC is to safeguard critical information from adversaries while ensuring mission success.

Signup and view all the flashcards

OPSEC Threats

Threats to critical information can come from various sources like private organizations, terrorist groups, and even other governments.

Signup and view all the flashcards

OPSEC Countermeasures

Effective countermeasures to secure critical information include encrypting data, shredding sensitive documents, and adhering to 'need-to-know' policies.

Signup and view all the flashcards

Friendly Detectable Actions

Actions that can be observed by adversaries are considered critical information and need protection under OPSEC.

Signup and view all the flashcards

Foreign Visit Coordination

Foreign visits to DoD facilities must be scheduled 30 days in advance for security coordination.

Signup and view all the flashcards

Reporting Foreign Travel

All foreign travel by DoD personnel must be reported to a security representative, even if it is not official travel, and any deviations must be reported within five days of returning.

Signup and view all the flashcards

Elicitation

Elicitation is a covert technique used by foreign intelligence agents to gather sensitive information from unsuspecting individuals.

Signup and view all the flashcards

Counterintelligence Goal

The goal of counterintelligence is to identify, disrupt, and mitigate threats from foreign intelligence agencies.

Signup and view all the flashcards

Anomalies in Counterintelligence

Anomalies, such as a foreign entity's unusual knowledge of US capabilities, may indicate potential espionage and require investigation.

Signup and view all the flashcards

Study Notes

Security Protocols and Procedures

  • Couriers must have a DD Form 2501 for transporting classified information and use secured containers like locked briefcases or heavy-duty pouches.
  • Three classification levels of information are Confidential, Secret, and Top Secret.
  • SF 701 and SF 702 are checklists used for end-of-day security checks in locations handling classified material.

Handling Classified Material

  • If classified material is found uncontrolled, it should be secured and reported to a security representative immediately.
  • In emergencies, protecting life takes precedence over protecting classified material.
  • Curbside mailboxes are not approved for mailing classified information.

Security Containers and Communication

  • Security containers must protect their combinations at the highest classification level stored within. Only non-classified items should be stored separately from classified materials.
  • Approved methods for discussing classified information include SIPRnet, Secure Fax, and Secure Telephone.

Destruction and Clearance Procedures

  • Methods for destroying classified information include burning, approved cross-cut shredding, and wet-pulping.
  • GSA-approved security containers must be clearly labeled as such.

Counterintelligence and Cybersecurity

  • Failure to report Counterintelligence activities can lead to disciplinary actions.
  • Cyber vulnerabilities within DoD systems are a significant concern; all elements must be monitored for potential security threats.
  • DoD personnel suspecting espionage should report directly to the Counterintelligence or Security Office.

Reporting and Monitoring Framework

  • All foreign intelligence contacts or suspicious activities must be reported; nothing is exempt from scrutiny.
  • Potential Espionage Indicators include unusual behaviors that suggest foreign recruitment.
  • Continuous evaluation is essential to monitor personnel for changes affecting their eligibility for security clearances.

Security Clearance Requirements

  • Security clearances categorize DoD civilian positions into Special Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive.
  • The DoD Consolidated Adjudications Facility is the sole authority for clearance eligibility for non-intelligence agency personnel.
  • Self-reporting changes in personal circumstances is mandatory for individuals holding security clearances.

Operational Security (OPSEC)

  • The primary goal of OPSEC is to enhance mission efficiency while safeguarding critical information from adversaries.
  • Threats to critical information include private organizations, terrorists, and friendly foreign governments.
  • Effective countermeasures to protect critical information consist of encryption, shredding, and enforcing need-to-know policies.

Administrative and Reporting Protocols

  • Friendly detectable actions are classified as critical information and require protection.
  • Foreign visits to DoD facilities should be coordinated 30 days in advance.
  • Any foreign travel must be reported to a security representative, with deviations noted within five days of return.

Counterintelligence Activities

  • Elicitation is a covert technique used to gather sensitive information.
  • Counterintelligence seeks to identify, disrupt, and mitigate threats from foreign intelligence entities.
  • Anomalies can indicate foreign entities' knowledge of U.S. capabilities and should be thoroughly investigated.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on security and counterintelligence with these flashcards. Covering essential topics like classification levels and necessary documentation, this quiz is perfect for those involved in handling classified information. Enhance your understanding and awareness of security protocols today!

More Like This

Security Awareness HUB Flashcards
24 questions

Security Awareness HUB Flashcards

BeneficialThermodynamics avatar
BeneficialThermodynamics
Counterintelligence Awareness Quiz
12 questions

Counterintelligence Awareness Quiz

WellReceivedSquirrel7948 avatar
WellReceivedSquirrel7948
Use Quizgecko on...
Browser
Browser