FY20 INTRODUCTION TO INFORMATION SECURITY (SECDEF DIRECTED) - pre test

1. How often must you receive a defensive foreign travel briefing? Check all the apply.

At least once a year.
Prior to travel

2. Top Secret document can be transmitted by which of the following methods? Select all that apply.

I got this Wrong.

3. What form is used to request a background investigation?

SF 86

4. Classified information can be safeguarded by using ***. Select all that apply.

Vaults, secure rooms, secure telephones

5. What is the standard form of indentification for DoD employees?

CAC - Common Access Card

6. Prior to foreign travel, you must ensure that your Antiterrorism / Force Protection Level 1 training is current.

True

7. Incorporating, paraphrasing, restating, or generating in new form information that is already classified is know as ***

Derivative classification

8. Which level of classified informatin could cause damage to national security if compromised?

Confidential

9. Classified information can be destroyed using which of the following methods?

Shredding, burning, pulverizing

10. The Personnel Security Program establishes *** for Personnel Security determinations and overall program management responsibilities.

Policies and procedures

11. Which of the following materials are subject to pre-publication review? Select all that apply.

books, speech, article

12. You may be subject to sanctions if you negligently disclose classified information.

True.

13. Secret materials may be transmitted by the same methods as Confidential materials.

False.

14. When opening and closing a security container, complete the ***

SF 702

15. The physical security program prevents unauthorized access to which of the following? Select all that apply.

Personnel, facilities, information, equipment

16. Derivative classifiers are required to have all the following except ***

approval of OCA

17. A security infraction involves loss, compromise, or suspected compromise.

False is the correct answer.

18. Which method may be used to transmit Confidential materials to DoD agencies?

USPS first class mail

19. Which of the following are parts of the OPSEC process? Select all that apply.

Got this wrong.

OPSEC Process Five Steps

- Identification.
- Analysis of threats.
- Analysis of vulnerabilities.
Assessment of risks.
- Application of appropriate countermeasures.

20. Which of the following must be reported?

All of the above.

21. Physical security is concerned with *** and *** measures designed to prevent unauthorized access.

active,passive

22. What coversheet is attached to help protect a Secret document?

SF 704

23. Which of the following is required to access classified information? Select all that apply.

Clearance eligibility, need-to-know, SF312

24. What form is used to record end-of-day security checks?

SF 701

Top Secret documents can be transmitted by which of the following methods? (Select all that apply)

Defense Courier Service
Secure Fax