Unauthorized Disclosure of Classified Info Quiz
39 Questions
100 Views

Unauthorized Disclosure of Classified Info Quiz

Created by
@StylishPeach4517

Questions and Answers

Cleared employees may be sent to prison for unauthorized disclosure of classified information.

True

DoD security managers use the ________________________ to report incidents of unauthorized disclosure of classified information and to track their investigations and associated actions.

Industrial Security Facilities Database (ISFD)

If you report fraud and waste related to a classified program, you may receive protection under the Presidential Policy Directive 19 (PPD-19).

True

Who is responsible for specifying downgrading and declassification dates, events, and exemptions?

<p>Original Classification Authority</p> Signup and view all the answers

The unauthorized disclosure of this type of information is reasonably expected to cause damage to national security.

<p>secret</p> Signup and view all the answers

Who determines which Component has investigative primacy when responsibility for an inquiry into an unauthorized public media disclosure is unclear?

<p>Defense Security Service (DSS)</p> Signup and view all the answers

Unauthorized disclosure of information can ____________. (Select all that apply)

<p>Damage intelligence methods and sources</p> Signup and view all the answers

If you see classified information or controlled unclassified information (CUI) on a public internet site, what should you do?

<p>report to security manager or facility security office</p> Signup and view all the answers

Colonel Rogers has to submit his Congressional briefing for a prepublication review before his Senate hearing.

<p>False</p> Signup and view all the answers

As a cleared employee you pledged to ________________________ when you signed the Classified Information Nondisclosure Agreement.

<p>Be an Original Classification Authority of classified information</p> Signup and view all the answers

Leaving a classified document on a photocopier represents unauthorized disclosure due to improper safeguarding procedures.

<p>True</p> Signup and view all the answers

You can make copies of classified documents on any copier provided you alert others in the immediate area.

<p>False</p> Signup and view all the answers

If a classified data spill occurs, you must first destroy the hard drive to prevent any further unauthorized dissemination.

<p>False</p> Signup and view all the answers

As a cleared employee, you may view classified information if it’s already in the public domain.

<p>False</p> Signup and view all the answers

If you are a DoD employee, to whom should you report actual or suspected unauthorized disclosure of classified information?

<p>Defense Security Service (DSS)</p> Signup and view all the answers

Where should DoD employees look for guidance on safeguarding classified information?

<p>E.O. 13526 and DoDM 5200.01</p> Signup and view all the answers

When classified information or Controlled Unclassified Information (CUI) is transferred to an unsecured system, this is called a ______________.

<p>infraction</p> Signup and view all the answers

Who is the official channel for industry for engaging the news media?

<p>Derivative Classifier</p> Signup and view all the answers

Before releasing information to the public domain in what order must it be reviewed?

<p>Local command</p> Signup and view all the answers

When destroying or disposing of classified information, you must ____

<p>follow appropriate guidelines</p> Signup and view all the answers

Is whistleblowing the same as reporting an unauthorized disclosure?

<p>False</p> Signup and view all the answers

Yuri must safeguard the information immediately after finding it on the copy machine.

<p>True</p> Signup and view all the answers

An individual with access to classified information left print-outs containing classified info in an office.

<p>improper safeguarding</p> Signup and view all the answers

Which of the following statements is true about markings?

<p>?</p> Signup and view all the answers

How long is your non-disclosure agreement applicable?

<p>for a lifetime</p> Signup and view all the answers

Which of the following is not the responsibility of the security manager or facility security officer?

<p>sanction</p> Signup and view all the answers

The whistleblower protection enhancement act relates to reporting all except

<p>classified info</p> Signup and view all the answers

Jane found classified info in the office breakroom. What should she do?

<p>secure the info</p> Signup and view all the answers

If you see classified info, what should you do?

<p>Report it to security manager</p> Signup and view all the answers

An authorized recipient must meet which of the following requirements? (Select all that apply)

<p>Possess NDA</p> Signup and view all the answers

If classified information or controlled unclassified information (CUI) is in the public domain, it is still classified.

<p>True</p> Signup and view all the answers

When using social networking services, the penalties for ignoring requirements related to protecting classified info are the same.

<p>True</p> Signup and view all the answers

What type of unauthorized disclosure occurred when classified email was sent across an unapproved network?

<p>data spill</p> Signup and view all the answers

____ is described as the process by which info proposed for public release is examined by the defense office of prepublication and security.

<p>pre-publication review</p> Signup and view all the answers

Which of the following is a misconception?

<p>?</p> Signup and view all the answers

Authorized holders must meet the requirements to access ___ in accordance with a lawful government purpose.

<p>CUI</p> Signup and view all the answers

Which of the following is not the responsibility of the security manager?

<p>?</p> Signup and view all the answers

Many different types of personnel work with classified information. Which of the following must submit their work for prepublication review?

<p>Not government employees with military</p> Signup and view all the answers

Which of the following are some tools needed to properly safeguard classified information?

<p>All the above</p> Signup and view all the answers

Study Notes

Unauthorized Disclosure of Classified Information

  • Cleared employees face potential imprisonment for unauthorized disclosure of classified information.
  • DoD security managers report unauthorized disclosure incidents using the Industrial Security Facilities Database (ISFD).
  • Reporting fraud and waste in classified programs can provide protections under Presidential Policy Directive 19 (PPD-19).
  • The Original Classification Authority specifies downgrading and declassification dates, events, and exemptions.
  • Disclosure of "secret" information is anticipated to damage national security.
  • Defense Security Service (DSS) determines which Component has investigatory primacy for unauthorized public media disclosures.
  • Unauthorized information disclosures can undermine operations, damage intelligence sources, impact international alliances, and benefit adversaries.
  • Classified or Controlled Unclassified Information (CUI) found online should be reported to a security manager or facility security office.
  • Cleared employees must submit Congressional briefings for prepublication review if discussing classified information.
  • Upon signing the Classified Information Nondisclosure Agreement, employees pledge to safeguard classified information.
  • Improper safeguard can lead to unauthorized disclosures, such as leaving classified documents unattended.
  • Making copies of classified documents should follow specific protocols, notifying others in the vicinity.
  • In the event of a classified data spill, destroying the hard drive is not the first protocol.
  • Viewing classified information found online is prohibited, even if it's claimed to be in the public domain.
  • Actual or suspected unauthorized disclosures should be reported to designated authorities.
  • Guidance on safeguarding classified information is outlined in Executive Order 13526 and DoDM 5200.01.
  • Transferring classified information to unsecured systems constitutes an infraction.
  • Derivative Classifiers serve as the official channel for industry engagement with the news media.
  • Information must be reviewed starting from the local command before public release.
  • Approved destruction of classified information must adhere to established guidelines.
  • Whistleblowing and reporting unauthorized disclosures follow different protocols.
  • Unauthorized disclosures can result from improper information handling, such as leaving classified materials in public areas.
  • Non-disclosure agreements remain effective for a lifetime.
  • Security managers are not responsible for enforcing sanctions.
  • Whistleblower Protection Enhancement Act does not cover classified information reporting.
  • Classified information discovered in shared spaces must be secured immediately.
  • Reporting suspected classified information is essential to maintaining security protocols.
  • Authorized recipients of classified information must demonstrate a need-to-know, possess a non-disclosure agreement, and have favorable eligibility.
  • Information in the public domain can still be classified or designated as CUI.
  • Violating classified information requirements on social media incurs the same penalties.
  • Sending a classified email over unauthorized networks results in a data spill.
  • Pre-publication review is essential for examining information proposed for public release.
  • Certain groups, such as military members, may not require prepublication review for their work.
  • Tools for safeguarding classified information include physical security measures, training, and proper documentation.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

Test your knowledge about the unauthorized disclosure of classified information within the Department of Defense. This quiz covers key concepts, responsibilities, and systems used to manage security incidents. Perfect for anyone involved in or studying DoD security protocols.

More Quizzes Like This

Use Quizgecko on...
Browser
Browser