Army Information Security Introduction Exam
20 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the first step an OCA must take when originally classifying information?

Determine if the information is official government information

When information, in the interest of national security, no longer requires protection at any level, it should be:

Declassified

What information do SCG provide about systems, plans, programs, projects, or missions?

All of the above

The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.

<p>Secret</p> Signup and view all the answers

If an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this?

<p>Spillage</p> Signup and view all the answers

Where do the reasons for classifying certain items, elements or categories of information originally come from?

<p>Executive Order 13526</p> Signup and view all the answers

What type of the classification process is a way for members of the public to request the review of specific classified information?

<p>Mandatory Declassification Review</p> Signup and view all the answers

What is required to access classified information? (Select all that apply)

<p>Eligibility</p> Signup and view all the answers

Which level of classified information may be transported via USPS mail? (Select all that apply)

<p>Confidential</p> Signup and view all the answers

What information is listed in the classification authority block on a document containing classified information? (Select all that apply)

<p>Classified by</p> Signup and view all the answers

Who has responsibility for the overall policy direction of the information security program?

<p>ISOO</p> Signup and view all the answers

If an individual fails to secure the SCIF at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?

<p>Security violation</p> Signup and view all the answers

In which order must documents containing classified information be marked?

<p>Banner markings</p> Signup and view all the answers

When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? (Select all that apply)

<p>To alert holders to the presence of classified information</p> Signup and view all the answers

Request for waivers and exceptions must identify the specific provision or provisions of the _______ for which the waiver or exception is sought.

<p>DoD Information Security Manual</p> Signup and view all the answers

The unauthorized disclosure of top-secret information could reasonably be expected to cause _________ to our national security.

<p>Exceptionally grave damage</p> Signup and view all the answers

Whose guidelines should you follow for the destruction of storage media such as thumb drives, Zip drives, and computers?

Signup and view all the answers

What are the steps for the information security program lifecycle?

<p>Classification, marking, dissemination, downgrading, and destruction</p> Signup and view all the answers

What are the authorized places for storing classified information? (Select all that apply)

<p>In an authorized individual's head or hands</p> Signup and view all the answers

________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified at a higher level, only if the combined information reveals an additional association or relationship.

<p>Compilation</p> Signup and view all the answers

Study Notes

Information Classification and Security Overview

  • The first step for an Original Classification Authority (OCA) is to determine if the information is official government information.
  • When national security information no longer requires protection, it must be declassified.
  • Security Classification Guides (SCG) provide comprehensive details on systems, plans, programs, projects, or missions.

Levels of Classified Information

  • "Secret" information, if disclosed unauthorized, could seriously damage national security.
  • "Top Secret" information, if disclosed, could cause exceptionally grave damage to national security.
  • Both Secret and Confidential information may be transported via USPS mail.

Security Incidents and Violations

  • Inserting a thumb drive containing classified information into an unclassified system is categorized as spillage.
  • Failing to secure a Sensitive Compartmented Information Facility (SCIF) leading to unauthorized access is classified as a security violation.

Classification Authority and Procedures

  • Classification authority blocks include details such as who classified it, the derivation source, downgrade guidelines, and declassification dates.
  • Executive Order 13526 outlines the origins of classification reasons.
  • Mandatory Declassification Review allows the public to request a review of specific classified items.

Access and Handling of Classified Information

  • Access to classified information requires eligibility, a need-to-know basis, a signed SF-312 form, and a nondisclosure agreement.
  • Using a classified document cover sheet alerts others to the presence of classified information and protects against unauthorized viewing.

Storage and Destruction of Classified Information

  • Authorized storage locations for classified information include GSA-approved security containers and certain authorized individuals' custody.
  • The information security program lifecycle encompasses classification, marking, dissemination, downgrading, and destruction.
  • Requests for waiver and exception should reference specific provisions from the DoD Information Security Manual.
  • Guidelines for the destruction of storage media must be adhered to ensure compliance and security.

Compilation of Information

  • Compilation occurs when unclassified information combined with lower-level classified information reveals additional sensitive relationships or associations.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on the fundamentals of information security within the Army. This quiz covers key concepts such as classification, declassification, and the responsibilities of an OCA. Perfect for those preparing for the information security certification exam.

More Like This

Use Quizgecko on...
Browser
Browser