Cyber Protection and SCIF Procedures
13 Questions
100 Views

Cyber Protection and SCIF Procedures

Created by
@AdmiringInspiration

Questions and Answers

Which Cyber Protection Condition (CPCON) establishes a protection priority focus on critical functions only?

  • CPCON 1 (correct)
  • CPCON 4
  • CPCON 3
  • CPCON 2
  • What is an example of two-factor authentication?

    A Common Access Card and Personal Identification Number

    The Common Access Card (CAC) does not contain certificates for identification, encryption, and digital signature.

    False

    What must authorized personnel do before permitting another individual to enter a Sensitive Compartmented Information Facility (SCIF)?

    <p>Confirm the individual's need-to-know and access</p> Signup and view all the answers

    A compromise of Sensitive Compartmented Information (SCI) occurs when a person who does not have the required clearance or access caveats comes into possession of SCI _____.

    <p>in any manner</p> Signup and view all the answers

    Portable electronic devices (PEDs) in a SCIF can be connected to any information system.

    <p>False</p> Signup and view all the answers

    What portable electronic devices (PEDs) are permitted in a SCIF?

    <p>Only expressly authorized government-owned PEDs</p> Signup and view all the answers

    What is the response to an incident such as opening an uncontrolled DVD on a computer in a SCIF?

    <p>All of these</p> Signup and view all the answers

    What must you do before using an unclassified laptop and peripherals in a collateral classified environment?

    <p>Ensure that any embedded cameras, microphones, and Wi-Fi are physically disabled</p> Signup and view all the answers

    It is safe to assume that open storage in a secure facility is authorized to protect classified information.

    <p>False</p> Signup and view all the answers

    What level of damage to national security can you reasonably expect Top Secret information to cause if disclosed?

    <p>Exceptionally grave damage</p> Signup and view all the answers

    You must have your organization's permission to telework.

    <p>True</p> Signup and view all the answers

    Classified data does not need to be appropriately marked.

    <p>False</p> Signup and view all the answers

    Study Notes

    Cyber Protection Conditions

    • CPCON 1 focuses on protecting critical functions only.

    Authentication Methods

    • Two-factor authentication example: Combines a Common Access Card (CAC) with a Personal Identification Number (PIN).

    Common Access Card (CAC) Features

    • CAC contains essential certificates for identification, encryption, and digital signatures.

    SCIF Entry Protocol

    • Authorized personnel must verify an individual's need-to-know and access before entry into a Sensitive Compartmented Information Facility (SCIF).

    Sensitive Compartmented Information (SCI) Compromise

    • A compromise occurs when unauthorized individuals gain possession of SCI.

    Portable Electronic Devices (PEDs) in SCIFs

    • Government-owned PEDs may only connect to systems of the same classification level if authorized.

    Authorized PEDs in SCIF

    • Only expressly authorized government-owned PEDs are permitted in a SCIF.

    Incident Response in SCIFs

    • Opening an uncontrolled DVD in a SCIF triggers a comprehensive response (all listed actions are relevant).

    Using Unclassified Laptops in Classified Environments

    • Before using unclassified laptops and peripherals, ensure all embedded cameras, microphones, and Wi-Fi functionalities are physically disabled.

    Securing Classified Information

    • Do not assume that open storage in a secure facility is permissible; verify authorization.

    Impact of Disclosure of Top Secret Information

    • Disclosure of Top Secret information can reasonably be expected to cause exceptionally grave damage to national security.

    Telework Policy

    • Permission from the organization is necessary before engaging in telework.

    Classified Data Protection

    • All classified materials must be marked appropriately to ensure proper handling and security.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers essential principles of cyber protection conditions, authentication methods, and security protocols for Sensitive Compartmented Information Facilities (SCIFs). Test your knowledge on concepts like Common Access Card (CAC) features, authorized personnel protocols, and incident response measures within SCIF environments.

    More Quizzes Like This

    Bài kiểm tra
    20 questions

    Bài kiểm tra

    WellBacklitHope avatar
    WellBacklitHope
    Use Quizgecko on...
    Browser
    Browser