Introduction to Information Security Quiz
25 Questions
100 Views

Introduction to Information Security Quiz

Created by
@ReputableTangent4657

Questions and Answers

List the 6 duration/length declassification options for OCAs.

  1. Less than 10 years, 2) At 10 years, 3) Up to 25 years, 4) 50X1-HUM (w/ no date or event), 5) 50X2-WMD (w/ no date or event), 6) 25X (w/ a date or event)

E.O. 13526 lists how many categories of information eligible for exemption from automatic declassification?

9

The use of secured telephone equipment ensures classified discussions are properly protected, however the user must also remember to consider if someone is within hearing distance. True or False?

True

Determining that information requires protection against unauthorized disclosure in the interest of national security is which type of classification?

<p>Derivative Classification</p> Signup and view all the answers

Which classification system is initiated through a request from any individual who is interested in making the classified information available to the public?

<p>Mandatory declassification review</p> Signup and view all the answers

Heads of the DOD components are responsible for establishing procedures for transmission and transportation of classified information and information bearing material that ______?

<p>minimizes risk of compromise while permitting most cost-effective means</p> Signup and view all the answers

DOD components and agencies add their own requirements to the departments baseline requirements to ensure that security measures are effective for their unique missions and functions. True or False?

<p>True</p> Signup and view all the answers

There is only one minimum storage requirement for all levels of classified materials. True or False?

<p>False</p> Signup and view all the answers

Classified information can only be stored in a GSA-approved container. True or False?

<p>False</p> Signup and view all the answers

[Blank] is information related to any DOD program or activity employing enhanced security measures exceeding those normally required for information at the same classification level.

<p>Special access program</p> Signup and view all the answers

A security classification guide provides guidance on how to destroy classified information. True or False?

<p>False</p> Signup and view all the answers

When transmitting classified information over a secure fax machine, what must be verified for the receiver of the information?

<p>Proper security access and need to know</p> Signup and view all the answers

The activity security checklist (SF 701) is used during end of day checks to verify and record all classified information in the area is secured at the end of each working day. True or False?

<p>True</p> Signup and view all the answers

Security infractions involve actions that may place classified information or operations at risk. True or False?

<p>True</p> Signup and view all the answers

Who designates when and what types of information are classified through compilation?

<p>Original classification authorities</p> Signup and view all the answers

The purpose of the information security program aims to achieve which three objectives?

<ol> <li>Proper classification protection and downgrading of national security information, 2) Promote the declassification of information no longer required, 3) Guidance on how to classify, store, transport, and destroy information.</li> </ol> Signup and view all the answers

Neither confirm nor deny principle is used in response to classified information appearing in the public media. True or False?

<p>True</p> Signup and view all the answers

Which briefing must newly cleared individuals receive before they are allowed access to classified information?

<p>Initial orientation</p> Signup and view all the answers

The most common example of COMSEC Requirements involved security telephonic equipment. True or False?

<p>True</p> Signup and view all the answers

What briefings are provided to cleared personnel escorting or carrying classified information?

<p>Courier briefings</p> Signup and view all the answers

The delegation of authority for an OCA will specify the highest level the OCA can classify a piece of information. True or False?

<p>True</p> Signup and view all the answers

Before wrapping material for transmission or transportation, what must be verified for accuracy?

<p>Marking on the document itself and the letter of transmittal</p> Signup and view all the answers

Unauthorized disclosure of confidential information can be expected to cause [Blank]?

<p>Damage to national security</p> Signup and view all the answers

What briefings are provided to individuals who have been granted an initial top secret clearance and/or initial indoctrination into a special access program?

<p>Attestation</p> Signup and view all the answers

E.O. 13526 calls for a basic classification policy that advocates for classifying information only when necessary. What is this maximum duration?

<p>25</p> Signup and view all the answers

Study Notes

Declassification Options

  • Six duration/length declassification options outlined for Original Classification Authorities (OCAs):
    • Less than 10 years
    • At 10 years
    • Up to 25 years
    • 50X1-HUM (without date or event)
    • 50X2-WMD (without date or event)
    • 25X (with a date or event)

Automatic Declassification Exemption

  • Executive Order 13526 specifies nine categories eligible for exemption from automatic declassification.

Secured Communication

  • Use of secured telephone equipment protects classified discussions, but users must ensure no unauthorized listeners are nearby.

Classification Type

  • Derivative Classification involves determining that information needs protection against unauthorized disclosure for national security.

Declassification Review Process

  • Mandatory declassification review can be initiated through requests from individuals wishing to access classified information.

Risk Management in Transmission

  • Heads of DOD components must implement procedures for transmitting classified information that minimize compromise risks while being cost-effective.

Security Customization

  • DOD components and agencies can add specific requirements to baseline security measures to effective address their unique missions.

Storage Requirements

  • There is not a single minimum storage requirement applicable to all classified materials.

Approved Containers

  • Classified information is not restricted to storage in GSA-approved containers.

Enhanced Security Programs

  • Special Access Program refers to DOD activities or programs that use enhanced security measures beyond normal requirements.

Security Classification Guides

  • Security classification guides do not provide instructions for destroying classified information.

Verification Before Transmission

  • Verification of proper security access and the need to know must be confirmed when transmitting classified information via secure fax machines.

End of Day Security Check

  • The activity security checklist (SF 701) is utilized for verifying and recording classified information security at day's end.

Security Infractions

  • Security infractions refer to actions potentially jeopardizing classified information or operations.

Classification Designation

  • Original Classification Authorities designate the classification of information through compilation.

Information Security Program Objectives

  • Three key objectives of the information security program:
    • Proper classification protection and downgrading of national security information
    • Encourage declassification of unneeded information
    • Guidance on classification, storage, transport, and destruction of information

No Confirmation Principle

  • The principle of neither confirming nor denying is applied concerning classified information in the public domain.

Initial Security Briefing

  • Newly cleared individuals must receive an initial orientation briefing prior to accessing classified information.

Common Communication Security

  • The most frequent example of Communications Security (COMSEC) requirements involves the security of telephonic equipment.

Courier Briefings

  • Cleared personnel escorting or carrying classified information are provided with courier briefings.

Delegation of Classification Authority

  • The delegation of authority for an OCA specifies the maximum classification level for which the OCA can classify information.

Document Verification

  • Before transmitting materials, accuracy of markings on the document and the accompanying letter of transmittal must be verified.

National Security Consequences

  • Unauthorized disclosures of confidential information are expected to cause damage to national security.

Attestation Briefings

  • Attestation briefings are provided to individuals with initial top secret clearance and those indoctrinated into special access programs.

Classification Policy Advocacy

  • Executive Order 13526 calls for a classification policy emphasizing that information should only be classified when necessary.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge on declassification options and exemptions in information security. This quiz covers various categories and criteria as outlined in Executive Order 13526. Challenge yourself with flashcards designed to reinforce key concepts in the field of information security.

Use Quizgecko on...
Browser
Browser