Army Information Security Introduction Exam

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the first step an OCA must take when originally classifying information?

Determine if the information is official government information

When information, in the interest of national security, no longer requires protection at any level, it should be:

Declassified

What information do SCG provide about systems, plans, programs, projects, or missions?

All of the above

The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.

<p>Secret</p> Signup and view all the answers

If an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?

<p>Spillage</p> Signup and view all the answers

Where do the reasons for classifying certain items, elements or categories of information originally come from?

<p>Executive Order 13526</p> Signup and view all the answers

What type of the classification process is a way for members of the public to request the review of specific classified information?

<p>Mandatory Declassification Review</p> Signup and view all the answers

What is required to access classified information? (Select all that apply)

<p>Eligibility (A), Nondisclosure Agreement (B), Need-to-Know (C), Signed SF-312 (D)</p> Signup and view all the answers

Which level of classified information may be transported via USPS mail? (Select all that apply)

<p>Confidential (B), Secret (D)</p> Signup and view all the answers

What information is listed in the classification authority block on a document containing classified information? (Select all that apply)

<p>Classified by (A), Date on which to declassify the doc (B), Classification level to downgrade to at a certain point in time (C), Derived from (D)</p> Signup and view all the answers

Who has responsibility for the overall policy direction of the information security program?

<p>ISOO</p> Signup and view all the answers

If an individual fails to secure the SCIF at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?

<p>Security violation</p> Signup and view all the answers

In which order must documents containing classified information be marked?

<p>Banner markings</p> Signup and view all the answers

When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? (Select all that apply)

<p>To alert holders to the presence of classified information (A), To prevent inadvertent view of classified information by unauthorized personnel (B)</p> Signup and view all the answers

Request for waivers and exceptions must identify the specific provision or provisions of the _______ for which the waiver or exception is sought.

<p>DoD Information Security Manual</p> Signup and view all the answers

The unauthorized disclosure of top-secret information could reasonably be expected to cause _________ to our national security.

<p>Exceptionally grave damage</p> Signup and view all the answers

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Signup and view all the answers

What are the steps for the information security program lifecycle?

<p>Classification, marking, dissemination, downgrading, and destruction</p> Signup and view all the answers

What are the authorized places for storing classified information? (Select all that apply)

<p>In an authorized individual's head or hands (A), In a GSA-approved security container (B), In information technology systems authorized for classified information (C)</p> Signup and view all the answers

________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified at a higher level, only if the combined information reveals an additional association or relationship.

<p>Compilation</p> Signup and view all the answers

Flashcards

OCA's First Step

The first step for an Original Classification Authority is to determine if the information is official government information.

Declassification

When national security information no longer requires protection, it must be declassified.

SCG

Security Classification Guides provide comprehensive details on systems, plans, programs, projects, or missions.

"Secret" Information

Information that, if disclosed unauthorized, could seriously damage national security.

Signup and view all the flashcards

"Top Secret" Information

Information that, if disclosed, could cause exceptionally grave damage to national security.

Signup and view all the flashcards

Spillage

Inserting a thumb drive containing classified information into an unclassified system.

Signup and view all the flashcards

Security Violation

Failing to secure a Sensitive Compartmented Information Facility (SCIF) leading to unauthorized access.

Signup and view all the flashcards

Classification Authority Blocks

Details such as who classified it, the derivation source, downgrade guidelines, and declassification dates.

Signup and view all the flashcards

Executive Order 13526

Outlines the origins of classification reasons.

Signup and view all the flashcards

Mandatory Declassification Review

Allows the public to request a review of specific classified items.

Signup and view all the flashcards

Access to Classified Information

Eligibility, a need-to-know basis, a signed SF-312 form, and a nondisclosure agreement.

Signup and view all the flashcards

Classified Document Cover Sheet

Alerts others to the presence of classified information and protects against unauthorized viewing.

Signup and view all the flashcards

Authorized Storage Locations

GSA-approved security containers and certain authorized individuals' custody.

Signup and view all the flashcards

Information Security Program Lifecycle

Classification, marking, dissemination, downgrading, and destruction.

Signup and view all the flashcards

Requests for Waiver and Exception

Should reference specific provisions from the DoD Information Security Manual.

Signup and view all the flashcards

Compilation

Unclassified information combined with lower-level classified information reveals additional sensitive relationships or associations.

Signup and view all the flashcards

Study Notes

Information Classification and Security Overview

  • The first step for an Original Classification Authority (OCA) is to determine if the information is official government information.
  • When national security information no longer requires protection, it must be declassified.
  • Security Classification Guides (SCG) provide comprehensive details on systems, plans, programs, projects, or missions.

Levels of Classified Information

  • "Secret" information, if disclosed unauthorized, could seriously damage national security.
  • "Top Secret" information, if disclosed, could cause exceptionally grave damage to national security.
  • Both Secret and Confidential information may be transported via USPS mail.

Security Incidents and Violations

  • Inserting a thumb drive containing classified information into an unclassified system is categorized as spillage.
  • Failing to secure a Sensitive Compartmented Information Facility (SCIF) leading to unauthorized access is classified as a security violation.

Classification Authority and Procedures

  • Classification authority blocks include details such as who classified it, the derivation source, downgrade guidelines, and declassification dates.
  • Executive Order 13526 outlines the origins of classification reasons.
  • Mandatory Declassification Review allows the public to request a review of specific classified items.

Access and Handling of Classified Information

  • Access to classified information requires eligibility, a need-to-know basis, a signed SF-312 form, and a nondisclosure agreement.
  • Using a classified document cover sheet alerts others to the presence of classified information and protects against unauthorized viewing.

Storage and Destruction of Classified Information

  • Authorized storage locations for classified information include GSA-approved security containers and certain authorized individuals' custody.
  • The information security program lifecycle encompasses classification, marking, dissemination, downgrading, and destruction.
  • Requests for waiver and exception should reference specific provisions from the DoD Information Security Manual.
  • Guidelines for the destruction of storage media must be adhered to ensure compliance and security.

Compilation of Information

  • Compilation occurs when unclassified information combined with lower-level classified information reveals additional sensitive relationships or associations.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Use Quizgecko on...
Browser
Browser