Podcast
Questions and Answers
A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.
A security violation involves the loss, compromise, or suspected compromise of classified information. Security violations must be reported.
True
You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.
You are required to report all foreign travel prior to departure, including day trips to Canada and Mexico.
False
When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government.
When you signed the SCI NdS, you agreed that anything you gained from unauthorized disclosure of SCI would become the property of the United States Government.
True
Walls in SCIFs must extend from true floor to true ceiling.
Walls in SCIFs must extend from true floor to true ceiling.
Signup and view all the answers
An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________.
An SCI document that contains the dissemination control marking NOFORN indicates this document ___________________________________.
Signup and view all the answers
You must report external activist groups you or your co-workers are affiliated with regardless of their nature.
You must report external activist groups you or your co-workers are affiliated with regardless of their nature.
Signup and view all the answers
Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel.
Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated personnel.
Signup and view all the answers
If the ISSO permits it, you may share your password in a SCIF.
If the ISSO permits it, you may share your password in a SCIF.
Signup and view all the answers
The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN).
The access control system for unattended SCIF entry must use ____________________ and _______________________ such as an access card and personal identification number (PIN).
Signup and view all the answers
SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material.
SCI couriers must be appointed __________, have a signed letter of authorization and know the rules and regulations governing couriers and transporting classified material.
Signup and view all the answers
In a SCIF, SCI must always be stored in a GSA-approved container.
In a SCIF, SCI must always be stored in a GSA-approved container.
Signup and view all the answers
After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form.
After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must complete the _____________________ form.
Signup and view all the answers
Which is the primary database used to verify personnel access to SCIFs outside DoD?
Which is the primary database used to verify personnel access to SCIFs outside DoD?
Signup and view all the answers
If a SCIF has a high security lock, then an access control system is not required.
If a SCIF has a high security lock, then an access control system is not required.
Signup and view all the answers
The SCI control system marking should not be listed in the banner line on a classified document.
The SCI control system marking should not be listed in the banner line on a classified document.
Signup and view all the answers
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.
Signup and view all the answers
What piece of information is not required to be recorded on the SCIF visitor control log?
What piece of information is not required to be recorded on the SCIF visitor control log?
Signup and view all the answers
The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.
The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF, and ___________________.
Signup and view all the answers
You must report any systemic weaknesses and anomalies.
You must report any systemic weaknesses and anomalies.
Signup and view all the answers
When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed.
When closing a closed storage SCIF you must ensure all classified material has been stored, security containers are closed and locked, locked sign is displayed on security containers, and the SF-701 form is completed.
Signup and view all the answers
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.
Signup and view all the answers
One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs.
One company must be responsible for the installation, maintenance, and monitoring of the Intrusion Detection System (IDS) for SCIFs.
Signup and view all the answers
SCI Material cannot be stored in _________________________________.
SCI Material cannot be stored in _________________________________.
Signup and view all the answers
_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth.
_____________ uses imagery, imagery intelligence, or geospatial information to describe, assess, and visually depict physical features and geographically referenced activities on the earth.
Signup and view all the answers
Which of the following is the preferred method for transporting an SCI document from one SCIF to another?
Which of the following is the preferred method for transporting an SCI document from one SCIF to another?
Signup and view all the answers
IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________.
IS components, media, and/or memory may be brought into a SCIF and removed from a SCIF if it has been properly logged and approved by the __________________________.
Signup and view all the answers
Which of the following is an escort in a SCIF not required to do?
Which of the following is an escort in a SCIF not required to do?
Signup and view all the answers
You've noticed that Sydney has been very unhappy and disgruntled at work lately in the SCIF. You are required to report this information about Sydney.
You've noticed that Sydney has been very unhappy and disgruntled at work lately in the SCIF. You are required to report this information about Sydney.
Signup and view all the answers
How long must SCIF visitor control logs be retained?
How long must SCIF visitor control logs be retained?
Signup and view all the answers
Sensitive Compartmented Information (SCI) is ______________________.
Sensitive Compartmented Information (SCI) is ______________________.
Signup and view all the answers
You are not required to report adverse information about others who also have SCI access. You are only required to report adverse information about yourself.
You are not required to report adverse information about others who also have SCI access. You are only required to report adverse information about yourself.
Signup and view all the answers
The ___________________________ processes SCIF visitor certifications.
The ___________________________ processes SCIF visitor certifications.
Signup and view all the answers
_____________ includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media which is derived from visual photography, radar sensors, and electro-optics.
_____________ includes representations of objects reproduced electronically or by optical means on film, electronic display devices, or other media which is derived from visual photography, radar sensors, and electro-optics.
Signup and view all the answers
SCI material is not required to be stored in a GSA-approved container in an open storage SCIF.
SCI material is not required to be stored in a GSA-approved container in an open storage SCIF.
Signup and view all the answers
Which SCI control system is designed to protect imagery intelligence?
Which SCI control system is designed to protect imagery intelligence?
Signup and view all the answers
When you signed the _______________, you acknowledged that you were advised that mishandling SCI could cause irreparable harm to the United States and you are obligated not to disclose SCI to anyone who is not authorized to receive it.
When you signed the _______________, you acknowledged that you were advised that mishandling SCI could cause irreparable harm to the United States and you are obligated not to disclose SCI to anyone who is not authorized to receive it.
Signup and view all the answers
Current SCI control systems are HCS, SI, and ________________.
Current SCI control systems are HCS, SI, and ________________.
Signup and view all the answers
A French citizen you met at a party has taken a strong interest in finding out more about your employment. Because you do not return his phone calls, however, this is not considered a foreign contact that must be reported.
A French citizen you met at a party has taken a strong interest in finding out more about your employment. Because you do not return his phone calls, however, this is not considered a foreign contact that must be reported.
Signup and view all the answers
Who provides construction and security requirements for SCIFs?
Who provides construction and security requirements for SCIFs?
Signup and view all the answers
Who is responsible for terminating SCI access?
Who is responsible for terminating SCI access?
Signup and view all the answers
_____________ is the collection of intelligence through public sources.
_____________ is the collection of intelligence through public sources.
Signup and view all the answers
Who heads the Intelligence Community (IC)?
Who heads the Intelligence Community (IC)?
Signup and view all the answers
You must consult your SCIF's ____________ to learn what you are or are not permitted to tell your family members about your work location and mission.
You must consult your SCIF's ____________ to learn what you are or are not permitted to tell your family members about your work location and mission.
Signup and view all the answers
SCI control systems are additional measures used to protect intelligence sources and methods or analytical procedures that are beyond those used to protect non-SCI classified information.
SCI control systems are additional measures used to protect intelligence sources and methods or analytical procedures that are beyond those used to protect non-SCI classified information.
Signup and view all the answers
When you sign the SCI Nondisclosure Statement (NdS), you are _________________________.
When you sign the SCI Nondisclosure Statement (NdS), you are _________________________.
Signup and view all the answers
You should never connect classified and unclassified systems together.
You should never connect classified and unclassified systems together.
Signup and view all the answers
Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.
Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.
Signup and view all the answers
You are required to remove your name badge as soon as you leave your SCIF so as not to call attention to yourself.
You are required to remove your name badge as soon as you leave your SCIF so as not to call attention to yourself.
Signup and view all the answers
When you signed the SCI NdS, you acknowledged that this agreement will last until you retire or separate from the Federal Government, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI.
When you signed the SCI NdS, you acknowledged that this agreement will last until you retire or separate from the Federal Government, unless you are released in writing by an authorized representative of the department or agency that last granted you with access to SCI.
Signup and view all the answers
Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.
Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.
Signup and view all the answers
SCIF windows must be secured at ground level and up to _____________ above ground level.
SCIF windows must be secured at ground level and up to _____________ above ground level.
Signup and view all the answers
You are permitted to discuss SCI outside your SCIF as long as it is with one of your SCIF co-workers.
You are permitted to discuss SCI outside your SCIF as long as it is with one of your SCIF co-workers.
Signup and view all the answers
For access to SCIFs during business hours, cipher locks may be used for high security areas and compartments.
For access to SCIFs during business hours, cipher locks may be used for high security areas and compartments.
Signup and view all the answers
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.
SCI is required to be stored in a GSA-approved container in a Closed Storage SCIF.
Signup and view all the answers
SCI Material cannot be stored in _________________________________.
SCI Material cannot be stored in _________________________________.
Signup and view all the answers
SCI material must be _____________________ prior to giving the package to the courier.
SCI material must be _____________________ prior to giving the package to the courier.
Signup and view all the answers
Which of the following is true about escorts in SCIFs?
Which of the following is true about escorts in SCIFs?
Signup and view all the answers
In a SCIF, reproduction equipment must display a sign indicating the highest level of classification allowed to be reproduced on that equipment.
In a SCIF, reproduction equipment must display a sign indicating the highest level of classification allowed to be reproduced on that equipment.
Signup and view all the answers
You placed a For Sale ad in the local newspaper in an attempt to sell your old car. Because this involves contact with the media, you are required to report it.
You placed a For Sale ad in the local newspaper in an attempt to sell your old car. Because this involves contact with the media, you are required to report it.
Signup and view all the answers
Equipment leaving latent images on itself or on other material or that has the capability to connect to remote diagnostic centers, such as by telephone line, is prohibited for classified reproduction.
Equipment leaving latent images on itself or on other material or that has the capability to connect to remote diagnostic centers, such as by telephone line, is prohibited for classified reproduction.
Signup and view all the answers
____________ is the collection of intelligence through public sources.
____________ is the collection of intelligence through public sources.
Signup and view all the answers
Visitors who are not certified may access classified information as long as their affiliation or position warrants it.
Visitors who are not certified may access classified information as long as their affiliation or position warrants it.
Signup and view all the answers
Copies of classified documents are not subject to the same control, accountability, and destruction procedures as the original document.
Copies of classified documents are not subject to the same control, accountability, and destruction procedures as the original document.
Signup and view all the answers
You are required to have a pre-publication review of any material you create based on your access to classified information before it enters _______________.
You are required to have a pre-publication review of any material you create based on your access to classified information before it enters _______________.
Signup and view all the answers
The SCIF Fixed Facility Checklist is used to obtain SCIF accreditation.
The SCIF Fixed Facility Checklist is used to obtain SCIF accreditation.
Signup and view all the answers
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.
_____________ is technically derived intelligence data other than imagery and signals intelligence that locates, identifies, or describes distinctive characteristics of targets.
Signup and view all the answers
When you signed the SCI NdS, you gave up protection under the Whistleblower Protection Act.
When you signed the SCI NdS, you gave up protection under the Whistleblower Protection Act.
Signup and view all the answers
You should never connect classified and unclassified systems together.
You should never connect classified and unclassified systems together.
Signup and view all the answers
We use classification management to determine the nature of information and assign proper classification markings, SCI control system markings, dissemination controls, and declassification instructions.
We use classification management to determine the nature of information and assign proper classification markings, SCI control system markings, dissemination controls, and declassification instructions.
Signup and view all the answers
Security violations are required to be reported, but infractions are not required to be reported.
Security violations are required to be reported, but infractions are not required to be reported.
Signup and view all the answers
Christopher works in a SCIF and is having an Internet relationship in a chat room (outside of work hours) with a woman who is not a U.S. citizen. Christopher is required to report this relationship.
Christopher works in a SCIF and is having an Internet relationship in a chat room (outside of work hours) with a woman who is not a U.S. citizen. Christopher is required to report this relationship.
Signup and view all the answers
What piece of information is not required to be recorded on the SCIF visitor control log?
What piece of information is not required to be recorded on the SCIF visitor control log?
Signup and view all the answers
_____________ is the collection of intelligence using human sources such as diplomats, military attaches, and spies.
_____________ is the collection of intelligence using human sources such as diplomats, military attaches, and spies.
Signup and view all the answers
_____________ is the collection of verbal and nonverbal signals from land, sea, and satellite. These signals are protected within the Communications Intelligence, (COMINT) SCI control system.
_____________ is the collection of verbal and nonverbal signals from land, sea, and satellite. These signals are protected within the Communications Intelligence, (COMINT) SCI control system.
Signup and view all the answers
Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.
Equipment used to destroy SCI paper materials must be listed in the ___________________________________________________________.
Signup and view all the answers
Destruction of SCI must be conducted by SCI indoctrinated personnel.
Destruction of SCI must be conducted by SCI indoctrinated personnel.
Signup and view all the answers
Which SCI control system is designed to protect signals intelligence including communications intelligence and electronic intelligence?
Which SCI control system is designed to protect signals intelligence including communications intelligence and electronic intelligence?
Signup and view all the answers
You must report any systemic weaknesses and anomalies.
You must report any systemic weaknesses and anomalies.
Signup and view all the answers
Which of the following statements is correct?
Which of the following statements is correct?
Signup and view all the answers
The DNI issued several _________________ and ________________ which provide security policy for the protection of national intelligence as well as the personnel security requirements for access to SCI, and physical and technical security requirements for SCIFs.
The DNI issued several _________________ and ________________ which provide security policy for the protection of national intelligence as well as the personnel security requirements for access to SCI, and physical and technical security requirements for SCIFs.
Signup and view all the answers
Jill works in a SCIF. Jill is party to a malpractice lawsuit. Jill is required to report this legal involvement.
Jill works in a SCIF. Jill is party to a malpractice lawsuit. Jill is required to report this legal involvement.
Signup and view all the answers
Spills are deliberate unauthorized disclosures of classified information to the media whereas leaks are accidental or intentional unauthorized disclosures of classified information across computer systems.
Spills are deliberate unauthorized disclosures of classified information to the media whereas leaks are accidental or intentional unauthorized disclosures of classified information across computer systems.
Signup and view all the answers
When you signed the SCI NdS, you acknowledged that any breach of this agreement could result in the termination of your SCI access and your employment as well as prosecution of you under U.S. criminal laws.
When you signed the SCI NdS, you acknowledged that any breach of this agreement could result in the termination of your SCI access and your employment as well as prosecution of you under U.S. criminal laws.
Signup and view all the answers
Which of the following is not a requirement of a secure telephone system in a SCIF?
Which of the following is not a requirement of a secure telephone system in a SCIF?
Signup and view all the answers
____________________ is required to access certain areas of a SCIF and classified information.
____________________ is required to access certain areas of a SCIF and classified information.
Signup and view all the answers
Who provides accreditation for DoD SCIFs?
Who provides accreditation for DoD SCIFs?
Signup and view all the answers
Visitors who have a visitor certification do not require an escort.
Visitors who have a visitor certification do not require an escort.
Signup and view all the answers
John has access to SCI and is currently legally separated from his wife. John is required to report this incident.
John has access to SCI and is currently legally separated from his wife. John is required to report this incident.
Signup and view all the answers
SCI is one of eight categories of information that require classified protection as outlined in Executive Order 13526.
SCI is one of eight categories of information that require classified protection as outlined in Executive Order 13526.
Signup and view all the answers
If a SCIF has a high security lock, then an access control system is not required.
If a SCIF has a high security lock, then an access control system is not required.
Signup and view all the answers
Walls in SCIFs must extend from true floor to true ceiling.
Walls in SCIFs must extend from true floor to true ceiling.
Signup and view all the answers
SI is the SCI control system marking abbreviation for which SCI control system?
SI is the SCI control system marking abbreviation for which SCI control system?
Signup and view all the answers
The biggest vulnerability in SCIF forced entry is the ____________________.
The biggest vulnerability in SCIF forced entry is the ____________________.
Signup and view all the answers
You signed an SCI Nondisclosure Statement during the __________________ process.
You signed an SCI Nondisclosure Statement during the __________________ process.
Signup and view all the answers
You are required to report suspicious co-worker activities.
You are required to report suspicious co-worker activities.
Signup and view all the answers
All Sensitive Compartmented Information Facilities (SCIFs) can be used to store Sensitive Compartmented Information (SCI).
All Sensitive Compartmented Information Facilities (SCIFs) can be used to store Sensitive Compartmented Information (SCI).
Signup and view all the answers
Which SCI control system is designed to protect human intelligence?
Which SCI control system is designed to protect human intelligence?
Signup and view all the answers
Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.
Walls within a SCIF require acoustical protection measures and sound masking systems to protect SCI.
Signup and view all the answers
Jim works in a SCIF. Jim got drunk and passed out in a bar over the weekend. Jim is required to report this incident.
Jim works in a SCIF. Jim got drunk and passed out in a bar over the weekend. Jim is required to report this incident.
Signup and view all the answers
Study Notes
Sensitive Compartmented Information (SCI) Overview
- Security violations involve loss or compromise of classified information and must be reported.
- Foreign travel must be reported prior to departure, including trips to Canada and Mexico.
- Unauthorized disclosure of SCI becomes the property of the U.S. Government upon signing the SCI Nondisclosure Statement (NdS).
- Access control systems for unattended SCIF (Sensitive Compartmented Information Facility) entry require authentication and verification methods.
SCIF Operations
- SCIF walls must extend from the floor to the ceiling to ensure security.
- The access control system must be in place even if the SCIF has a high-security lock.
- SCI material may only be stored in GSA-approved containers in closed storage SCIFs, not in open storage SCIFs.
- All SCI must be stored securely and must be transported carefully; it must be double-wrapped prior to courier delivery.
Visitor and Personnel Requirements
- Visitors without certification must be escorted by indoctrinated personnel at all times.
- Reports of suspicious activities or systemic weaknesses must be made immediately.
- Legal involvement, such as lawsuits or foreign contacts, must be reported by those with SCI access.
- SCIF visitor control logs must be retained for at least one year after the last entry.
Intelligence and Security Measures
- Measurement and Signature Intelligence (MASINT) is non-imagery derived intelligence identifying characteristics of targets.
- Open Source Intelligence (OSINT) refers to the collection of intelligence through public sources.
- The Director of National Intelligence (DNI) heads the Intelligence Community, which oversees various security directives.
- Security violations are required to be reported, and infractions must also be monitored.
Equipment and Destruction Protocols
- Equipment for destroying SCI paper must be listed in the NSA Evaluated Products List.
- The highest level of classification allowed for reproduction must be indicated on reproduction equipment.
- Only SCI-indoctrinated personnel may destroy SCI materials.
General Security Practices
- Discussing SCI outside the SCIF is prohibited, even with co-workers.
- It is illegal to connect classified and unclassified systems together to prevent data leaks.
- Personnel may retain their SCI access as long as they comply with confidentiality agreements and do not disclose classified information without authorization.
Reporting Obligations and Policies
- Employees must report any changes in status, including part-time employment and personal legal issues.
- SCIF construction and security requirements are regulated by the Defense Intelligence Agency.
- The SCI control systems (HCS, SI, TK) protect varying classifications of intelligence, ensuring sensitive information remains secure.
Compliance and Accreditations
- The SCIF Fixed Facility Checklist is crucial for obtaining SCIF accreditation.
- All security protocols must be strictly followed to prevent unauthorized access and information compromise.
- Adherence to all established security directives is essential for maintaining classification integrity and national security.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz tests your knowledge on Sensitive Compartmented Information (SCI), including security protocols, SCIF operations, and visitor requirements. Understand the importance of safeguarding classified information and compliance with regulations related to SCI. Evaluate your grasp on access controls and the safe handling of sensitive data.