Annual Security Awareness Flashcards
53 Questions
100 Views

Annual Security Awareness Flashcards

Created by
@CompliantMemphis

Questions and Answers

When transporting classified information, the courier must have a DD Form 2501 and as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy-duty material.

True

What are the three classification levels of information?

Confidential, Secret, Top Secret.

What is the purpose of the SF 701 'Activity Security Checklist' and the SF 702 'Security Container Check Sheet'?

Used as part of the end-of-day security checks for classified material.

If you find classified material out of proper control, you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor.

<p>True</p> Signup and view all the answers

In the event of a natural disaster, what is the first priority concerning an emergency action procedure for classified material?

<p>Protection of life.</p> Signup and view all the answers

Using curbside mailboxes is an approved method for mailing classified information.

<p>False</p> Signup and view all the answers

Which of the following statements concerning security containers, vaults, or open storage areas are true? (Select all that apply)

<p>Do not store items such as weapons, money, jewelry, precious metals or drugs in the same container as classified material.</p> Signup and view all the answers

Which of the following are approved methods of discussing and transmitting classified material? (Select all that apply)

<p>Secure Telephone</p> Signup and view all the answers

Which of the following methods are routinely used for destroying classified information? (Select all that apply)

<p>Burning</p> Signup and view all the answers

Which statement must be on the front of a GSA-approved security container for storing classified information?

<p>General Services Administration-Approved Security Container.</p> Signup and view all the answers

Personnel who fail to report CI Activities of concern as outlined in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations.

<p>True</p> Signup and view all the answers

Cyber Vulnerabilities to DoD Systems may include?

<p>All the above.</p> Signup and view all the answers

DoD personnel who suspect a coworker of possible espionage should?

<p>Report directly to your CI or Security Office.</p> Signup and view all the answers

Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable?

<p>None of the above.</p> Signup and view all the answers

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that may be indicative of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity. Examples of PEI include?

<p>All of the above.</p> Signup and view all the answers

A Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as any known or suspected foreign organization, person, or group that conducts intelligence activities to acquire U.S. information.

<p>True</p> Signup and view all the answers

Counterintelligence is defined as information gathered to protect against espionage or intelligence activities conducted by foreign governments.

<p>True</p> Signup and view all the answers

If you feel you are being solicited for information, what should you do?

<p>All of the above.</p> Signup and view all the answers

Foreign Intelligence Entities seldom use the Internet or communications for collection methods.

<p>False</p> Signup and view all the answers

Foreign Intelligence Entities seldom use elicitation to extract information.

<p>False</p> Signup and view all the answers

Collection methods or operations frequently used by Foreign Intelligence Entities include?

<p>All the above.</p> Signup and view all the answers

Which of the following is not an example of an anomaly?

<p>Foreign diplomat attempts to defect.</p> Signup and view all the answers

Which statements are correct concerning why a person would need to obtain a security clearance? (Select all that apply)

<p>To ensure only trustworthy people hold national security sensitive positions.</p> Signup and view all the answers

All DoD civilian positions are categorized into which following security groups?

<p>Special Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive.</p> Signup and view all the answers

Which procedures are used to monitor personnel for new information or changes that could affect their eligibility for a security clearance?

<p>Continuous evaluation.</p> Signup and view all the answers

Which organization is the sole authority for determining clearance eligibility for non-intelligence agency DoD?

<p>Department of Defense Consolidated Adjudications Facility (DoD CAF).</p> Signup and view all the answers

Which of the following are part of the 13 national security adjudicators used to determine clearance eligibility? (Select all that apply)

<p>Personal conduct.</p> Signup and view all the answers

When a security clearance is denied or revoked, the decision is final.

<p>False</p> Signup and view all the answers

What are you expected to do when you hold a secret clearance or fill a national security sensitive position? (Select all that apply)

<p>Keep your security office informed of changes.</p> Signup and view all the answers

Which statements are true concerning continuous evaluation? (Select all that apply)

<p>Individuals granted security clearances may become unreliable after being granted initial eligibility.</p> Signup and view all the answers

Which statement is true concerning self-reporting for an individual who holds a security clearance?

<p>It is mandatory; it demonstrates personal integrity.</p> Signup and view all the answers

A security clearance determination is based on a pattern of behavior and not a single action.

<p>True</p> Signup and view all the answers

What is the primary goal of OPSEC?

<p>Increasing mission effectiveness while protecting critical information.</p> Signup and view all the answers

Which of the following are threats to our critical information? (Select all that apply)

<p>Terrorists.</p> Signup and view all the answers

Which of the following are considered critical information? (Select all that apply)

<p>Backorders affecting readiness.</p> Signup and view all the answers

How often do J or D code, major subordinate command, and regional command update their unique critical information list?

<p>Annually.</p> Signup and view all the answers

Which of the following are effective countermeasures to protect critical information? (Select all that apply)

<p>Encryption.</p> Signup and view all the answers

Friendly detectable actions are critical information.

<p>True</p> Signup and view all the answers

Geolocation applications are not authorized for use in?

<p>Operational Areas.</p> Signup and view all the answers

Official documents may be thrown away in recycle bins.

<p>False</p> Signup and view all the answers

It is illegal for someone to rummage through your trash when you leave it outside for pickup.

<p>False</p> Signup and view all the answers

All DLA personnel work with critical information.

<p>True</p> Signup and view all the answers

Which of the following are key objectives of DLA's Counterintelligence Mission? (Select all that apply)

<p>Stopping the theft of critical U.S. technologies.</p> Signup and view all the answers

Which term describes information gathered to identify, deceive, exploit, or protect against espionage?

<p>Counterintelligence.</p> Signup and view all the answers

Which term includes foreign intelligence and security services and is defined as any known or suspected foreign organization that conducts intelligence activities to acquire U.S. information?

<p>Foreign Intelligence Entity (FIE).</p> Signup and view all the answers

What is an activity or knowledge outside the norm that suggests a foreign entity has foreknowledge of U.S. information?

<p>Anomaly.</p> Signup and view all the answers

Foreign visits to DoD facilities should be coordinated how many days in advance?

<p>30 days.</p> Signup and view all the answers

Which technique is used to subtly and inconspicuously gather information about you or your mission?

<p>Elicitation.</p> Signup and view all the answers

An unexplained and sudden reversal of large debt is an indicator of counterintelligence concern and should be reported for further investigation.

<p>True</p> Signup and view all the answers

To whom are all DoD personnel required to report all projected foreign travel?

<p>Security representative.</p> Signup and view all the answers

Any deviation from foreign travel itineraries must be reported within how many days of returning from travel?

<p>5 days.</p> Signup and view all the answers

A one-time encounter with a foreign national involving the exchange of contact information must be reported to your security representative.

<p>True</p> Signup and view all the answers

Which term describes a known or suspected foreign organization conducting intelligence activities to acquire U.S. information?

<p>Foreign Intelligence Entity (FIE).</p> Signup and view all the answers

Study Notes

Security Protocols and Procedures

  • Couriers must have a DD Form 2501 for transporting classified information and use secured containers like locked briefcases or heavy-duty pouches.
  • Three classification levels of information are Confidential, Secret, and Top Secret.
  • SF 701 and SF 702 are checklists used for end-of-day security checks in locations handling classified material.

Handling Classified Material

  • If classified material is found uncontrolled, it should be secured and reported to a security representative immediately.
  • In emergencies, protecting life takes precedence over protecting classified material.
  • Curbside mailboxes are not approved for mailing classified information.

Security Containers and Communication

  • Security containers must protect their combinations at the highest classification level stored within. Only non-classified items should be stored separately from classified materials.
  • Approved methods for discussing classified information include SIPRnet, Secure Fax, and Secure Telephone.

Destruction and Clearance Procedures

  • Methods for destroying classified information include burning, approved cross-cut shredding, and wet-pulping.
  • GSA-approved security containers must be clearly labeled as such.

Counterintelligence and Cybersecurity

  • Failure to report Counterintelligence activities can lead to disciplinary actions.
  • Cyber vulnerabilities within DoD systems are a significant concern; all elements must be monitored for potential security threats.
  • DoD personnel suspecting espionage should report directly to the Counterintelligence or Security Office.

Reporting and Monitoring Framework

  • All foreign intelligence contacts or suspicious activities must be reported; nothing is exempt from scrutiny.
  • Potential Espionage Indicators include unusual behaviors that suggest foreign recruitment.
  • Continuous evaluation is essential to monitor personnel for changes affecting their eligibility for security clearances.

Security Clearance Requirements

  • Security clearances categorize DoD civilian positions into Special Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive.
  • The DoD Consolidated Adjudications Facility is the sole authority for clearance eligibility for non-intelligence agency personnel.
  • Self-reporting changes in personal circumstances is mandatory for individuals holding security clearances.

Operational Security (OPSEC)

  • The primary goal of OPSEC is to enhance mission efficiency while safeguarding critical information from adversaries.
  • Threats to critical information include private organizations, terrorists, and friendly foreign governments.
  • Effective countermeasures to protect critical information consist of encryption, shredding, and enforcing need-to-know policies.

Administrative and Reporting Protocols

  • Friendly detectable actions are classified as critical information and require protection.
  • Foreign visits to DoD facilities should be coordinated 30 days in advance.
  • Any foreign travel must be reported to a security representative, with deviations noted within five days of return.

Counterintelligence Activities

  • Elicitation is a covert technique used to gather sensitive information.
  • Counterintelligence seeks to identify, disrupt, and mitigate threats from foreign intelligence entities.
  • Anomalies can indicate foreign entities' knowledge of U.S. capabilities and should be thoroughly investigated.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on security and counterintelligence with these flashcards. Covering essential topics like classification levels and necessary documentation, this quiz is perfect for those involved in handling classified information. Enhance your understanding and awareness of security protocols today!

More Quizzes Like This

Use Quizgecko on...
Browser
Browser