106 Security Flashcards

1
Q

Discuss the purpose of personnel security.

A

Purpose of personnel security is to authorize initial and continued access to classified information and/or initial and continued assignment to sensitive duties to those persons whose loyalty, reliability and trustworthiness are such that entrusting them with classified information or assigning them to sensitive duties is clearly consistent with the interests of national security. Additionally, the PSP ensures that no final unfavorable personnel security determination will be made without compliance with all procedural requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TOP SECRET

A

(ORANGE) highest level, compromise would cause “exceptionally grave damage” to national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SECRET

A

(RED) compromise would cause “serious damage” to national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CONFIDENTIAL

A

(BLUE) lowest level, would cause “damage” to national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

UNCLASSIFIED

A

(GREEN) can be released without clearance, but is sometimes restricted—SBU (Sensitive, But Unclassified), FOUO (For Official Use Only), or NOFORN (No Foreign Officials).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain what is meant by ‘need to know’.

A

Limits materials to personnel who have the appropriate clearance and a necessity for the information to perform their duties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

State the type of investigation and how often it is updated for access to the following classification levels. (TOP SECRET)

A

SSBI – 5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

State the type of investigation and how often it is updated for access to the following classification levels. (SECRET)

A

NACLC – 10 and 15 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

State the type of investigation and how often it is updated for access to the following classification levels. (CONFIDENTIAL)

A

NACLC – 10 and 15 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

State the type of investigation and how often it is updated for access to the following classification levels. (SCI)

A

SSBI – 5 years

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Identify what a (SAER) is and its purpose.

A

Security Access Eligibility Report is used to identify changes in a person’s eligibility for a security clearance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Identify the events that should be reported to the SSO.

A

Any unlawful or criminal acts, foreign travel, changes in marital status, financial difficulties, and, but not limited to, any contact with foreign peoples or officials.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Identify who has overall authority of, and controls access to, a SCIF.

A

Special Security Officer (SSO).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SF700

A

security container information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

SF701

A

activity security checklist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

SF702

A

container checklist.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

SF703

A

Top Secret Cover Sheet (SF704-Secret Cover Sheet & SF705-Confidential Cover Sheet)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

SF153

A

COMSEC (CMS) Report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

SF312

A

classified information Non-Disclosure Agreement (NDA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

State when safe combinations should be changed.

A
  1. When first placed in use.
  2. When someone transfers out of the facility.
  3. When subjected to compromise.
  4. When taken out of service.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

State the responsibilities of the DDA

A

The DDA has the authority and responsibility to control disclosures of Classified Military Information (CMI) and Controlled Unclassified Information (CUI) to foreign governments and international organizations and their representatives or persons sponsored by them.

22
Q

State the purpose of the DCS.

A

Defense Courier Service: tasked with establishment, staffing, maintaining and operating an international network of couriers for secure transmission of classified documents and materials (USPS).

23
Q

Describe the procedures for preparing hard copy classified material for transportation via (DCS)

A

classified documents and material shall be addressed with the standardized DCS two-line address. Envelopes, labels, or tags with visible “postage and fees paid” indicia shall not be used. Security classification markings, special security caveats, and other extraneous markings must not appear on the outer wrapper. Nickname and/or special project markings previously approved by the DCS must be placed on the outer wrapper.

24
Q

Describe the procedures for preparing hard copy classified material for transportation via (Handcarry)

A

when transferring information inside a facility, use a coversheet. If it must be carried outdoors, double-wrap the item.

25
Q

State the THREATCON recognition and Force Protection levels and discuss what each represents.

A
  1. NORMAL: general threat of terrorist activity is possible.
  2. ALPHA: threat of possible terrorist activity is unpredictable.
  3. BRAVO: a predictable terrorist activity exists.
  4. CHARLIE: a terrorist attack is imminent.
  5. DELTA: terrorist attack is occurring or just occurred.
26
Q

Random Antiterrorism Measures (RAM)

A

used to deter possible terror plot by changing force protection posture (i.e. gate changes, hour changes, shift rotation changes, etc.).

27
Q

PSP

A

Physical Security Program, provides authorized access to classified material.

28
Q

ATFP

A

Anti-Terrorism Force Protection, provides a safe and secure environment for and deter acts of terrorism against DOD personnel, assets, and facilities.

29
Q

Explain and state the purpose of an EAP.

A

Emergency Action Plan: establishes procedures to protect classified information and communications security materials during emergency situations such as abandoning ship or natural disasters. Can only be initiated by the Commanding Officer or the highest ranking official

30
Q

Explain and state the purpose of Emergency Destruction Procedures.

A

Prescribes policy and procedures for planning, protecting, and destroying COMSEC material during emergency conditions

31
Q

State who can give the order to initiate Emergency Destruction.

A

The Commanding Officer or other responsible official must be aware of and approve the emergency plan as outlined in the CO’s battle orders.

32
Q

Explain how, and in what order, material is destroyed during Emergency Destruction.

A

Items are destroyed in the following order by burning, shredding, destroying, sinking, or physically smashing equipment.

  1. Priority One– Top Secret information
  2. Priority Two–Secret information
  3. Priority Three–Confidential information
33
Q

Define SCI.

A

Sensitive Compartmented Information. Classified information concerning or derived from intelligence sources, methods, or analytical processes that is required to be handled within formal access control systems

34
Q

Describe the Items that are PROHIBITED EXCEPT FOR OFFICIAL DUTY In a SCIF

A
  1. PROHIBITED EXCEPT FOR OFFICIAL DUTY:
    a. Two-way transmitting equipment.
    b. Recording equipment (audio, video, optical). Associated media will be controlled.
    c. Test, measurement, and diagnostic equipment.
35
Q

Describe the Items that are explicitly PROHIBITED IN SCIFs

A
  1. PROHIBITED IN SCIFs:
    a. Personally owned photographic, video, and audio recording equipment.
    b. Personally owned computers and associated media.
36
Q

explain differences between PDS vs Security Violation

A
  1. PDS: A failure to comply with the provisions of security regulations causing a potential compromise of classified information
  2. Security Violation: A compromise of classified information to persons not authorized to receive it or a serious failure to comply with the provisions of security regulations which is likely to result in compromise.
37
Q

Explain the security requirements for a SCIF

A

a solid, permanent facility that is sound-proof, one primary entrance with an automatic closing door, vents/ducts that are protected with bars, as well as opaque windows or no windows.

38
Q

Explain the security requirements for a T-SCIF

A

Tactical SCIF has physical barriers like a facilities SCIF, but also has physically armed sentries standing guard over the space.

39
Q

Explain vault recertification and recurring inspections.

A

For Secret and above, recertification and inspections occur every six months. For Confidential and below, every nine months.

40
Q

Discuss the need for access lists, required documentation logs, and two-person integrity.

A

All of these are required for accountability purposes and to prevent the loss or theft of materials.

41
Q

Explain the DOD escort policy.

A

The movement of all visitors shall be controlled to ensure that access to classified information is deliberate and consistent with the purpose of the visit.

42
Q

Discuss the procedures for sanitizing an area.

A

The removal of information from the media or equipment such that data recovery using any known technique or analysis is prevented.

43
Q

Discuss each of the following, giving their definition and the purpose of each:
a. COMSEC:
b. INFOSEC:
c. COMPUSEC:

A

a. COMSEC: Communications Security, protects classified and unclassified voice, video, and data systems.
b. INFOSEC: Information Security, protects US information and information systems.
c. COMPUSEC: Computer Security, protects computing systems against compromise.

44
Q

State the purpose of the ICD system.

A

Principal means by which the DNI provides guidance, policy, and direction, and instruction to the Intelligence Community.

45
Q

Identify SSO Navy

A

Special Security Officer for the Navy has been designated as the Cognizant Security Authority (CSA), and is responsible for implementing SCI security policy and procedures.

46
Q

106.31 List the duties and responsibilities of the SSO

A

The SSO is responsible for the operation (i.e. security, control, use, etc.) of all command Sensitive Compartmented Information Facilities (SCIFs).

47
Q

Identify who can be a CSM

A

The command security manager must be an officer or a civilian employee, GS-11 or above, with sufficient authority and staff to manage the program for the command.

48
Q

State the duties and responsibilities of a CSM.

A

The CSM ensures that the security programs are coordinated and inclusive of all requirements as outlined in SECNAVINST-M-5510.36. (See section 204 for more information)

49
Q

Explain and state the purpose of JPAS.

A

Joint Personnel Adjudication System: provides centralized, integrated system to assist verification of a person’s security clearance status and eligibility.

50
Q

106.35 Explain and state the responsibilities of DODCAF.

A

Department of the Navy Central Adjudication Facility reports directly to DIRNCIS and conducts clearance verification to enhance national security and protect government information.

51
Q

106.36 Discuss how long a Commanding Officer can administratively suspend access before DODCAF revokes a clearance.

52
Q

106.37 Discuss the security rules and procedures for magnetic and electronic media.

A
  1. Must be properly stored and labeled
  2. Must be degaussed and/or properly destroyed
  3. Records of materials and their destruction must be maintained