Security Training Flashcards
20 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which method may be used to transmit confidential materials to DoD agencies?

  • DHL Express Mail
  • FedEx Overnight Mail
  • UPS Ground
  • USPS First Class Mail (correct)
  • Physical security is concerned with BLANK and BLANK measures designed to prevent unauthorized access.

    ACTIVE & PASSIVE

    Classified information can be destroyed using which of the following methods? (Select all that apply)

  • Shredding (correct)
  • Recycling
  • Pulverizing (correct)
  • Burning (correct)
  • Top secret documents can be transmitted by which of the following methods? (Select all that apply)

    <p>Secure Fax</p> Signup and view all the answers

    You may be subject to sanctions if you negligently disclose classified information.

    <p>True</p> Signup and view all the answers

    A security infraction involves loss, compromise, or suspected compromise.

    <p>False</p> Signup and view all the answers

    The personnel security program establishes BLANK for personnel security determinations and overall program management responsibilities.

    <p>policies &amp; procedures</p> Signup and view all the answers

    What is the standard form of identification for DoD employees?

    <p>CAC</p> Signup and view all the answers

    Prior to foreign travel, you must ensure that your antiterrorism measures are in place.

    <p>True</p> Signup and view all the answers

    Secret materials may be transmitted by the same methods as confidential materials.

    <p>False</p> Signup and view all the answers

    What coversheet is attached to a secret document?

    <p>SF 704</p> Signup and view all the answers

    How often must you receive a defensive foreign travel briefing? (Select all that apply)

    <p>Prior to travel</p> Signup and view all the answers

    What does OPSEC Pro include?

    <p>(1) Identification of critical information, (2) analysis of threats, (3) analysis of vulnerabilities, (4) assessment of risk, and (5) application of appropriate countermeasures.</p> Signup and view all the answers

    Which level of classified information could cause damage to national security if compromised?

    <p>Confidential</p> Signup and view all the answers

    When opening and closing a security container, complete the form BLANK.

    <p>SF 702</p> Signup and view all the answers

    Classified information can be safeguarded by using which of the following? (Select all that apply)

    <p>Secure Rooms</p> Signup and view all the answers

    Which of the following must be reported?

    <p>All</p> Signup and view all the answers

    Incorporating paraphrasing, restating, or generating information that is already classified is known as?

    <p>Derivative Classification</p> Signup and view all the answers

    What form is used to request a background investigation?

    <p>SF 86</p> Signup and view all the answers

    What form is used to record end-of-day security checks?

    <p>SF 701</p> Signup and view all the answers

    Study Notes

    Transmission of Confidential Materials

    • Confidential materials may be transmitted to DoD agencies via USPS First Class Mail.

    Physical Security Measures

    • Physical security involves both active and passive measures to prevent unauthorized access.

    Destruction of Classified Information

    • Classified information can be destroyed using:
      • Burning
      • Shredding
      • Pulverizing

    Transmission of Top Secret Documents

    • Top Secret documents can be transmitted using:
      • Defense Courier Service
      • Secure Fax

    Sanctions for Disclosing Classified Information

    • Individuals may face sanctions for negligently disclosing classified information.

    Definition of a Security Infraction

    • A security infraction does not necessarily involve loss, compromise, or suspected compromise.

    Personnel Security Program

    • The personnel security program includes policies and procedures for personnel security determinations and overall program management.

    Identification for DoD Employees

    • The Common Access Card (CAC) is the standard identification for DoD employees.

    Antiterrorism Briefings Before Foreign Travel

    • It is essential to verify antiterrorism measures prior to foreign travel.

    Transmission of Secret Materials

    • Secret materials must not be transmitted using the same methods as confidential materials.

    Coversheet for Secret Documents

    • The SF 704 coversheet is specifically for secret documents.

    Defensive Foreign Travel Briefing Frequency

    • Defensive foreign travel briefings must occur prior to travel and at least once a year.

    OPSEC Process

    • OPSEC involves:
      • Identification of critical information
      • Analysis of threats
      • Analysis of vulnerabilities
      • Assessment of risk
      • Application of appropriate countermeasures

    Classification Level Impact

    • Confidential information could cause damage to national security if compromised.

    Security Container Documentation

    • The SF 702 form is used when opening and closing a security container.

    Safeguarding Classified Information

    • Classified information can be safeguarded using:
      • Secure rooms
      • Secure phones
      • Vaults

    Reporting Requirements

    • All incidents must be reported.

    Derivative Classification

    • Incorporation of paraphrasing, restating, or generating classified information is known as derivative classification.

    Background Investigation Request Form

    • The SF 86 form is used to request a background investigation.

    End-of-Day Security Checks Form

    • The SF 701 form is utilized to record end-of-day security checks.

    Confidential Information Definition

    • Confidential information is defined as information that could cause damage to national security if compromised.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on security protocols with these flashcards. This quiz covers methods of transmitting confidential materials, understanding physical security measures, and destruction methods for classified information. Enhance your security awareness and ensure you are informed on essential practices.

    More Like This

    Confidential Informant Procedures
    3 questions
    Confidential Funds
    6 questions

    Confidential Funds

    IntimateSalamander avatar
    IntimateSalamander
    Wastewater Engineering Online Review Program
    15 questions
    Use Quizgecko on...
    Browser
    Browser