106: Security Flashcards

1
Q

106.1
Discuss the purpose of personnel security

A

make a reasonable determination that individuals with privileged access to classified information will remain loyal, reliable, and trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

106.2
Define, tell how they differ, and identify color codes of:
a. TOP SECRET
b. SECRET
c. CONFIDENTIAL
d. UNCASSIFIED

A

TOP SECRET - orange; exceptionally grave damage to national security
SECRET - red; serious damage to national security
CONFIDENTIAL - blue; damage to national security
UNCLASSIFIED - green; available to the general public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

106.3
Explain what is meant by ‘need to know’

A

you may have clearance, but knowing the information isnt necessary to carry out tasks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

106.4a
State the type of investigation and how often it is updated for Top Secret access

A

Single Scope Background Investigation; every 5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

106.4b
State the type of investigation and how often it is updated for Secret access

A

Access National Agency Check and Credit; every 10 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

106.4c
State the type of investigation and how often it is updated for Confidential access

A

ANACI; every 15 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

106.4d
State the type of investigation and how often it is updated for SCI access

A

prenomination interview; SSBI; every 5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

106.5
Identify what a SAER is and its purpose

A

Security Access Eligibility Report
used to identify any change in clearance eligibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

106.6
Identify the events that should be reported to the SSO

A

financial issues
legal issues
unauthorized absence
mental illness
marriage to a foreign national
anything that could question your character, integrity, physical and mental health needs to be reported

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

106.7
Identify who has overall authority of, and controls access to, a SCIF

A

Special Security Officer (SSO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

106.8a
Identify the use of an SF700

A

Security Container Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

106.8b
Identify the use of an SF701

A

Activity Security Checklist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

106.8c
Identify the use of an SF702

A

Security Container Check Sheet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

106.8d
Identify the use of an SF703

A

Top Secret Cover Sheet (Orange)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

106.8e
Identify the use of an SF153

A

COMSEC Material Report

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

106.8f
Identify the use of an SF312

A

Classified Information NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

106.9
State when safe combinations should be changed

A

when a combination lock is first installed or used
when a combination is believed to be compromised
after safe maintenance
when considered necessary by the CSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

106.10
State the responsibilities of the DDA

A

Designated Disclosure Authority
control disclosures of CMI (Classified Military Information) and CUI to foreign/international organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

106.11
State the purpose of the DCS

A

Defense Courier Service
used for transportation of sensitive classified materials including SCI; operated by USTRANSCOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

106.12a
Describe the procedures for preparing hard copy classified material for transportation via DCS

A

Defense Courier System - below 300lbs; properly addressed (no APO/FPO or street addresses); no postage and fees paid indicators; no outer special, security, or classification markings unless previously approved by DCS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

106.12b
Describe the procedures for preparing hard copy classified material for transportation via Handcarry

A

use a classified material covering when within the command; double wrap when outside the command; locked briefcase is ok except on commercial aircraft

22
Q

106.13
State the responsibilities of the TSCO

A

Top Secret Control Officer
muster be at least an officer, Chief or GS-7; can be the Security Manager; maintain accountability and annual inventory of all Top Secret material

23
Q

106.14
State the THREATCON recognition and Force Protection levels and discuss what each represents

A

THREATCON:
Normal - no known threat
Alpha - General threat of possible terrorist activity
Bravo - increased and more predictable threat of terrorist action
Charlie - imminent threat action or an incident has occurred
Delta - terrorist attack has occurred

FPCON:
Normal - no current terrorist activity
Alpha - small/general unpredictable terrorist activity
Bravo - somewhat predictable terrorist threat
Charlie - incident has occurred and activity is imminent
Delta - terrorist attack tsking place or just occurred

24
Q

106.15a
Define RAM

A

Random Antiterrorism Measures; implemented without a set pattern

25
106.15b Define PSP
Personnel Security Program; used to authorize initial and continued access to classified information and/or assignment to sensitive duties
26
106.15c Define ATFP
Anti-Terrorism Force Protection; actions taken to prevent or mitigate hostile actions against DoD personnel, resources, facilities, and critical information
27
106.16 Explain and state the purpose of an EAP
Emergency Action Plan plan to ensure personnel safety and security of cryptologic material in the event of an emergency
28
106.17 Explain and state the purpose of Emergency Destruction Procedures
two types: precautionary and complete policy and procedures for destroying COMSEC material during emergency conditions; considers potential effects on national security
29
106.18 State who can give the order to initiate Emergency Destruction
the CO
30
106.19 Explain how, and in what order, material is destroyed during Emergency Destruction
burning; shredding; pulping; mutilation; decomposition; pulverizing priority in order from highest to lowest classification
31
106.20 Define SCI
Sensitive Compartmented Information information/material that requires special controls for restricted handling within formal access controls
32
106.21 List the items prohibited in a SCIF and the security risks associated with them
no device that photographs, transmits receives, records, or stores data and IT software without prior approval
33
106.22 Define the difference between a security violation and a practice dangerous to security
violation - actual compromise that requires investigation PDS - failure to comply with regulations causing potential compromise
34
106.23a Explain the security requirements for a SCIF
Category 1 (exterior wall is in an uncontrolled area) Category 2 (exterior wall is in a controlled area)
35
106.23b Explain the security requirements for a TSCIF
appearance and construction standards or standard shipping container with lights, AC outlets, data ports, and an HVAC system with only power, phone/data, and outside air inputs
36
106.24 Explain vault recertification and recurring inspections
inspected and recertified by GSA trained personnel before used to protect classified information; must receive the "GSA Approved Recertified Security Container" sticker
37
106.25 Discuss the need for access lists, required documentation logs, and two-person integrity
access lists specify who/what is allowed access; documentation logs include visitor logs, event logs, and deck logs within a space; TPI is required to prevent loss or compromise of classified material
38
106.26 Explain the DoD escort policy
visitors of a secure space must be escorted at all times; escort must be command personnel (not visitors who are cleared for access) and must remain in view of visitor;
39
106.27 Discuss the procedures for sanitizing an area
removal of: data from media classified labels & markings activity logs so personnel without a need to know cannot access the material
40
106.28a Give the definition and purpose of COMSEC
Communications Security: deny unauthorized access to US Gov telecommunications concerning national security
41
106.28b Give the definition and purpose of INFOSEC
Information Security: protection of information and information systems from modification and unauthorized access
42
106.28c Give the definition and purpose of COMPUSEC
Computer Security: controls to ensure CIA of information stored and processed on a computer
43
106.29 State the purpose of the ICD system
Intelligence Community Directive established by DNI as the means to communicate with the Intelligence Community
44
106.30 Identify SSO Navy
Special Security Officer implements and oversees the SCI security program
45
106.31 List the duties and responsibilities of the SSO
supervise and administer SCI security maintain SCI documents (regulations, manuals, etc) for proper turnover official channel for SCI visitor access manages SCI security actions and procedures assists in processing SCI position and eligibility requests conducts SCI briefs, indocs, and debriefs investigates SCI infractions, makes recommendations, and prepares reports conducts continued SCI security training and awareness
46
106.32 Identify who can be a CSM
Command Security Manager GS-11 or Officer appointed by the CO with a favorable SSBI iwthin the last 5 years
47
106.33 State the duties and responsibilities of a CSM
storage and destruction of all classified information & establishing the Emergency Action Plan
48
106.34 Explain and state the purpose of JPAS
Joint Personnel Adjudication System - virtual consolidation of the DoD Central Adjudication Facility (CAFs) has been replaced with Defense Information Security System (DISS)
49
106.35 Explain and state the responsibilities of DoDCAF
Department of Defense Central Adjudication Facility apply national adjudication guidelines to information from background investigations conducted by the Office of Personnel Management (OPM)
50
106.36 Discuss how long a Commanding Officer can administratively suspend access before DoDCAF revokes a clearance
1 year in 90 day increments
51
106.37 Discuss the security rules and procedures for magnetic and electronic media
marked with the highest level of classification stored on the device and any special control notices that apply; for CD-ROMS, label may be affixed to the sleeve or storage container