Podcast
Questions and Answers
Physical security is concerned with _______ and ________ measures designed to prevent unauthorized access.
Physical security is concerned with _______ and ________ measures designed to prevent unauthorized access.
active, passive
Which level of classified information could cause damage to national security if compromised?
Which level of classified information could cause damage to national security if compromised?
confidential
What form is used to request a background investigation?
What form is used to request a background investigation?
SF 86
How often must you receive a different sense of foreign travel briefing? (Select all that apply)
How often must you receive a different sense of foreign travel briefing? (Select all that apply)
Signup and view all the answers
When opening and closing a security container, complete the ________.
When opening and closing a security container, complete the ________.
Signup and view all the answers
What form is used to record end of the day security checks?
What form is used to record end of the day security checks?
Signup and view all the answers
Which of the following must be reported? (Select all that apply)
Which of the following must be reported? (Select all that apply)
Signup and view all the answers
Incorporating, paraphrasing, restating or generating new form information that is already classified is known as?
Incorporating, paraphrasing, restating or generating new form information that is already classified is known as?
Signup and view all the answers
Which of the following is required to access classified information? (Select all that apply)
Which of the following is required to access classified information? (Select all that apply)
Signup and view all the answers
Top-secret documents can be transmitted by which of the following methods? (Select all that apply)
Top-secret documents can be transmitted by which of the following methods? (Select all that apply)
Signup and view all the answers
Prior to foreign travel, one must ensure that they have taken care of protection level I training.
Prior to foreign travel, one must ensure that they have taken care of protection level I training.
Signup and view all the answers
Classified information can be safeguarded using ___________________. (Select all that apply)
Classified information can be safeguarded using ___________________. (Select all that apply)
Signup and view all the answers
What is the standard form of identification for DoD employees?
What is the standard form of identification for DoD employees?
Signup and view all the answers
Secret materials may be transmitted by the same methods as confidential materials.
Secret materials may be transmitted by the same methods as confidential materials.
Signup and view all the answers
The physical security program prevents unauthorized access to which of the following? (Select all that apply)
The physical security program prevents unauthorized access to which of the following? (Select all that apply)
Signup and view all the answers
What cover sheet is attached to help protect a Secret document?
What cover sheet is attached to help protect a Secret document?
Signup and view all the answers
You may be subject to sanctions if you negligently disclose classified information.
You may be subject to sanctions if you negligently disclose classified information.
Signup and view all the answers
Which materials are subject to pre-publication review? (Select all that apply)
Which materials are subject to pre-publication review? (Select all that apply)
Signup and view all the answers
A security infraction involves loss, compromise, or suspected compromise.
A security infraction involves loss, compromise, or suspected compromise.
Signup and view all the answers
The personal security program establishes ___________ or personal security determinations and overall program management responsibilities.
The personal security program establishes ___________ or personal security determinations and overall program management responsibilities.
Signup and view all the answers
Classified information can be destroyed using which of the following methods?
Classified information can be destroyed using which of the following methods?
Signup and view all the answers
Which method may be used to transmit confidential materials to DoD agencies?
Which method may be used to transmit confidential materials to DoD agencies?
Signup and view all the answers
Which of the following are parts of the OPSEC process? (Select all that apply)
Which of the following are parts of the OPSEC process? (Select all that apply)
Signup and view all the answers
Derivative classifiers are required to have all the following except ____________.
Derivative classifiers are required to have all the following except ____________.
Signup and view all the answers
Study Notes
Physical Security
- Focuses on active and passive measures to prevent unauthorized access.
Classified Information Levels
- Confidential information could damage national security if compromised.
Background Investigation
- Use SF 86 form to request a background investigation.
Foreign Travel Briefing
- Required at least once a year and prior to travel.
Security Container Management
- Complete SF 702 when opening and closing a security container.
Security Checks Documentation
- SF 701 is used to record end-of-the-day security checks.
Reporting Requirements
- All noteworthy events or conditions must be reported.
Derivative Classification
- Involves incorporating, paraphrasing, or generating new forms of classified information.
Access to Classified Information
- Requires a signed SF 312, clearance eligibility at the appropriate level, and a need to know.
Top-Secret Document Transmission
- Can be transmitted via Defense courier service and secure fax.
Protection Level I Training
- Must be ensured prior to foreign travel, confirming true.
Safeguarding Classified Information
- Options include vaults, secure rooms, and secure telephones.
DoD Identification
- The Common Access Card is the standard ID for DoD employees.
Secret Material Transmission
- False that secret materials may be transmitted using the same methods as confidential materials.
Physical Security Program Goals
- Prevents unauthorized access to personnel, facilities, information, and equipment.
Secret Document Protection
- Use SF 704 cover sheet to help protect secret documents.
Sanctions for Information Disclosure
- Individuals may face sanctions for negligently disclosing classified information.
Pre-Publication Review
- Required for books, speeches, and articles.
Security Infraction Definition
- False that a security infraction involves loss, compromise, or suspected compromise.
Personal Security Program
- Establishes policies and procedures for personal security determinations and overall program management.
Destruction of Classified Information
- Can be destroyed by burning, shredding, and pulverizing; not recycling.
Confidential Materials Transmission
- Can be sent to DoD agencies via USPS first-class mail.
OPSEC Process Components
- Includes identification of sensitive information, analysis of threats, application of appropriate countermeasures, and vulnerability assessment.
Derivative Classifier Requirements
- Do not need approval from the original classification authority.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Test your knowledge on key concepts of security awareness with these flashcards. This quiz covers important terms and definitions regarding physical security, classified information, and background checks. Perfect for anyone looking to enhance their security knowledge.