Introduction to Information Security Flashcards
25 Questions
100 Views

Introduction to Information Security Flashcards

Created by
@SlickBinary8749

Questions and Answers

What could reasonably be expected to cause serious damage to our national security?

Exceptionally grave damage

Derivative classifiers are the individuals who generate new material based on existing classification guidance.

True

When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? (Select all that apply)

  • To make it more official
  • To prevent inadvertent viewing of classified information by unauthorized personnel (correct)
  • To decorate the document cover
  • To alert holders to the presence of classified information (correct)
  • What type of classified information can cleared U.S. military, civilian employees, or contractors hand carry?

    <p>All of the above</p> Signup and view all the answers

    What should happen when information no longer requires protection in the interest of national security?

    <p>Declassified</p> Signup and view all the answers

    When are 'Downgrade To' instructions listed in the classification authority block on documents?

    <p>As applicable</p> Signup and view all the answers

    What do security classification guides (SCG) provide?

    <p>All of the above</p> Signup and view all the answers

    What is required to access classified information? (Select all that apply)

    <p>Eligibility</p> Signup and view all the answers

    The communication or physical transfer of classified information to an unauthorized recipient is known as?

    <p>Unauthorized disclosure</p> Signup and view all the answers

    What are the steps of the information security program life cycle?

    <p>Not provided</p> Signup and view all the answers

    The unauthorized disclosure of Confidential information could reasonably be expected to cause?

    <p>Damage</p> Signup and view all the answers

    Classification levels may be abbreviated (i.e., TS, S, C) in the banner of classified documents.

    <p>False</p> Signup and view all the answers

    Where can you find the Original Classification Authority's (OCA) contact information?

    <p>On the cover of the SCG</p> Signup and view all the answers

    When not directly in an authorized individual's possession, classified documents must be stored in a GSA-approved security container.

    <p>True</p> Signup and view all the answers

    Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information.

    <p>True</p> Signup and view all the answers

    Destruction refers to destroying classified information so that it can't be recognized or reconstructed.

    <p>True</p> Signup and view all the answers

    What is the purpose of the DoD information security program? (Select all that apply)

    <p>Demonstrate a commitment to transparency in Government</p> Signup and view all the answers

    Who provides implementation guidance for the Information Security Program within the DoD?

    <p>Heads of DoD Components</p> Signup and view all the answers

    The unauthorized disclosure of Top Secret information could reasonably be expected to cause?

    <p>Exceptionally grave damage</p> Signup and view all the answers

    The unauthorized disclosure of this type of information could reasonably be expected to cause damage to our national security.

    <p>Confidential</p> Signup and view all the answers

    What is the first step an Original Classification Authority (OCA) must take when originally classifying information?

    <p>Determine if the information is official government information</p> Signup and view all the answers

    Who can be an Original Classification Authority (OCA)?

    <p>An individual authorized in writing by the President, Vice President, or agency heads</p> Signup and view all the answers

    Why must all documents containing classified information be marked using a sequential process?

    <p>All of the above</p> Signup and view all the answers

    What information is listed in the classification authority block on a document containing classified information? (Select all that apply)

    <p>Who created the classified document</p> Signup and view all the answers

    Who issues security classification guides (SCG) for systems, plans, programs, projects, or missions?

    <p>Original Classification Authorities</p> Signup and view all the answers

    Study Notes

    Classification Levels and Impact

    • Unauthorized disclosure of Top Secret information can cause exceptionally grave damage to national security.
    • Confidential information disclosure can cause damage to national security.

    Classification Guidance and Documentation

    • Derivative classifiers use existing classification guidelines to create new materials.
    • Security Classification Guides (SCGs) provide essential details about systems, plans, programs, projects, or missions.

    Access to Classified Information

    • Access requires eligibility, a signed Nondisclosure Agreement (SF-312), and a need-to-know basis.
    • Cleared U.S. military, civilian employees, or contractors can hand carry classified information.

    Document Management and Protection

    • Classified documents must utilize classified document cover sheets to prevent inadvertent viewing by unauthorized personnel.
    • When not in the possession of authorized individuals, classified documents should be stored in GSA-approved security containers.

    Information Lifecycle and Processing

    • Information should be declassified when no longer needing protection for national security.
    • Access control measures help detect and deter unauthorized attempts to access classified information.

    Classification Authority and Procedures

    • Original Classification Authorities (OCAs) are responsible for creating and marking classified documents.
    • Marking documents follows a sequential process to ensure all classified information is properly labeled.
    • The classification authority block contains critical information such as the creator, classification level downgrade, source of information, and declassification date.

    Security Program and Responsibilities

    • The DoD information security program aims to protect national security information and demonstrate governmental transparency.
    • Implementation guidance for the Information Security Program is provided by the heads of DoD components.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge with these flashcards focused on key terms and concepts in information security. Understand classification levels, the implications of unauthorized disclosures, and the roles of individuals in maintaining security. Perfect for students and professionals alike looking to strengthen their security literacy.

    More Quizzes Like This

    Use Quizgecko on...
    Browser
    Browser