All Areas II Flashcards

1
Q

This enables individuals to be able to authenticate themselves on security websites and securely log into computer systems

A

Common Access Card (CAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Older style of lock; may be used for classified storage in certain cases

A

Mechanical combination lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Lock that complies with UL Standard 768-Group 1

A

Combination padlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Lock that complies with FF-L-2740 series lock specification

A

Electromechanical combination lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Lock that has limited resistance to forced entry

A

Low security padlock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A facility used by the intelligence community

A

SCIF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The governing authority to approve security containers

A

GSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Areas designed and authorized for the open storage of classified information. These facilities are usually build to commercial construction standards and do not afford the extra security inherent with a vault.

A

Secure rooms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel door

A

Vaults

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The terrorist threat level indicating anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the operating environment favors the terrorist.

A

High terrorist threat level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The terrorist threat level indicating no terrorist group is detected or the terrorist group in non-threatening

A

Low terrorist threat level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The terrorist threat level indicating anti-U.S. terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity. The operat

A

Significant terrorist threat level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The terrorist threat level indicating terrorists are present but there are no indications of anti-U.S. activity. The operating environment favors the host nation or the U.S.

A

Moderate terrorist threat level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Physical security plan

A

At a minimum, these should include special and general guard orders, access and material control, protective barrier lighting systems, locks, and Intrusion Detection Systems (IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Much of U.S. classified information originates within this environment

A

Industrial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security compliance is overseen by this organization if a contractor works at his/her own facility

A

Defense Security Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A contractor must adhere to the security rules of the __________ commander when working at a government installation

A

Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The program that covers protection of classified information

by government contractors

A

NISP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

FSO responsibilities

A
  1. Ensure compliance with the NISP
  2. Follow NISPOM guidelines
  3. Provide training for cleared individuals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference

A

Chapter 8 of the NISPOM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

True or False: A SAP can retain security cognizance if necessary.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A government employee with the authority to enter into, administer, and/or terminate contracts and make related determinations and findings

A

Contracting Officer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

This government employee is a subject matter expert who has regular contact with the contractor

A

COTR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The document that outlines in detail what will be required to complete a contract

A

Statement of Work (SOW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The document that establishes the government’s authority to review the contractor’s security program to ensure compliance

A

DD Form 441

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The form a contractor could use to determine if classified storage is required, and at what level

A

DD Form 254

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A cleared individual can only have access at the _______ level as the facility clearance

A

Same

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

For the purpose of a visit to another cleared facility, a clearance can be verified by looking in ________

A

JPAS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The issuance of ________ is the responsibility of the DoD CAF

A

Eligibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Unauthorized disclosure of this information could reasonably be expected to cause serious damage to our national security.

A

Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.

A

Top Secret

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.

A

Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.

A

Derivative Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

This is defined as an initial determination that information requires, in the interest of national security, protection against unauthorized disclosure.

A

Original Classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

This is defined as unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classification.

A

Compilation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The term used to identify individuals specifically authorized in writing to make initial classification decisions.

A

Original Classification Authority

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

This contains classification levels, special requirements and duration instructions for programs, projects, plans, etc.

A

Security Classification Guides (SCG)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The six step process an OCA applies in making classification determinations

A

Original Classification Process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The authorized change in the status of information goes from classified information to unclassified information

A

Declassification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The declassification system where Permanently Valuable Historical records are declassified when they are 25 years old

A

Automatic declassification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The declassification system where information exempted from automatic declassification is reviewed for possible declassification

A

Systematic declassification review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The declassification system where the public can ask for classified information be review for declassification and public release

A

Mandatory Declassification Review (MDR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The declassification system where an OCA, at the time the information is originally classified, sets a date or event for declassification

A

Scheduled Declassification

44
Q

People who are in possession of, or who are otherwise charged with safeguarding classified information

A

Custodians

45
Q

Options an OCA has when determining declassification

A

Specific Date, Specific Event, or by the 50X1-HUM Exemption

46
Q

The 25-year rule

A

The process where records automatically become declassified after 25 years

47
Q

This type of information does not provide declassification instructions

A

Restricted Data and Formerly Restricted Data

48
Q

Practices to follow when handling classified information

A
  1. Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose
  2. Use approved secure communications circuits for telephone conversations to discuss classified information
  3. Follow proper procedures when copyi
49
Q

Security Container Check Sheet, which is used to record the opening and closing of your security container

A

SF 702

50
Q

The Activity Security Checklist intended to verify that you did not accidentally leave classified materials unsecured, as well as, to ensure the area is safe and secure. The blank spaces can be utilized for additional warranted security and safety items,

A

SF 701

51
Q

An unauthorized disclosure of classified information

A

Actual compromise

52
Q

If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information

A

Neither confirm nor deny

53
Q

The possibility of compromise could exist but it is not known with certainty

A

Potential Compromise

54
Q

This organization maintains a register of certified security digital facsimiles

A

DISA, Joint Interoperability Test Command (JITC)

55
Q

The protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications and to ensure the authenticity of such communications.

A

COMSEC

56
Q

When the document has been sealed within a properly marked inner envelope you must…

A

Insert the envelope into the outer envelope

57
Q

DCS

A

Defense Courier Service

58
Q

This kind of information can be sent via USPS express only when it is the most effective means considering security, time, cost, and accountability.

A

Secret information

59
Q

This kind of information can never be sent via USPS

A

Top Secret information

60
Q

Methods to send hard copy Confidential information

A

DCS, First Class mail, registered mail, and certified mail

61
Q

True or False: Hand carrying classified information should only be done as a last resort

A

True

62
Q

True or False: Anyone can determine the need for hand carrying classified information

A

False

63
Q

True or False: When someone is carrying classified information, written authorization is always required

A

True

64
Q

DD Form 2501

A

Courier Authorization Card

65
Q

Microfiche destruction

A

Burned or shredded to be destroyed. It can also be destroyed with chemicals that destroy the imprints.

66
Q

Typewriter ribbon destruction

A

Ribbons must be burned or shredded

67
Q

Floppy disk destruction

A

Must be burned, overwritten, or demagnetized

68
Q

Document destruction

A

Must be burned, shredded, or chemically decomposed of

69
Q

Videotape destruction

A

Must be burned, shredded, or demagnetized

70
Q

The initial briefing given to all personnel on the DoD Information Security Program

A

Initial Orientation Briefing

71
Q

Homeland Security Presidential Directive 12 (HSPD-12)

A

On August 27, 2004, President Bush signed this directive; Policy for a Common Identification Standard for Federal Employees and contractors. This requires government-wide development and implementation of a standard for secure and reliable forms of identi

72
Q

DoD 5200.08-R

A

Physical Security Program regulation

73
Q

This document authorizes commanders to issue regulations for the protection or security of property and places under their command. This document also establishes guidelines to build consistent minimum standards for protecting DoD installations and resour

A

DoD Instruction 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)

74
Q

You need to review the requirements that electromechanical locks meet. Which of the specifications should you reference.

A

Federal specification FF-L-2740 series

75
Q

You need to secure classified information what locks could you use.

A

X-09 electromechanical lock
S&G 2937 mechanical lock
S&G 8077 padlock

76
Q

You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced/used?

A

S&G 2740B and Kaba Mas X-10

77
Q

You need to open a security container that has an S&G 2740 lock. What type of lock is S&G 2740?

A

Electromechanical combination lock

78
Q

You just received the security container that has the S&G 2740 electromechanical safe lock with a factory setting of 50-25-50. what should you do first?
Change the combination
Open the lock
Calibrate the lock

A

Calibrate the lock

79
Q

You are responsible for creating, protecting, and changing combinations in your facility. What guidelines should you follow?

A

Do not write a combination down.
Do not change the locks combination on a Friday or the day before you go on leave.
Change a lock’s combination if the container is discovered unlocked and unattended.
Maintain records of who knows lock combinations.
Safegu

80
Q

Guarding a specific asset or resource.

A

Point Security

81
Q

Designating islands of high security within a sea of moderate security.

A

Enclaving

82
Q

Protecting an entire area such as an installation or facility

A

Area Security

83
Q

Integrating layers of security to protect DoD assets.

A

Security in Depth

84
Q

Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground. True or false

A

True

85
Q

Barbed wire is also known as razor wire. True or false?

A

False

86
Q

Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings. True or false?

A

True

87
Q

Rapidly flowing rivers are considered active barriers. True or false?

A

False

88
Q

Although decorative, a concrete planter can serve as a protective barrier by preventing vehicle access. True or false?

A

True

89
Q

A ________________is an area inside and outside the perimeter fence or barrier of the protected area. Ineffective clear zone must be free of visual obstructions such as bushes.

A

Clear zone

90
Q

This method is intended to display a silhouette of any person passing between the light source in the building or to show the contrast of the person inside the building.

A

Surface lighting

91
Q

This method is intended to make the inside of a protected area difficult to see from outside the protected area.

A

Glare projection

92
Q

This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.

A

Controlled lighting

93
Q

When planning protective site lighting, you should ensure that controls and switches are installed inside a protected area and locked or guarded or inside a central station such as an alarm monitoring station. True or false?

A

True

94
Q

Flashlights are reliable form of continuous lighting. True or false?

A

False

95
Q

Emergency lighting depends upon the power supply of the utility company. True or false?

A

False

96
Q

Standby lighting is the type of lighting used when the primary power source fails. True or false?

A

False

97
Q

The mission of all government security forces, civilian or military, contract forces, and military working dogs is to _____________ _________ _____________.

A

Protect DOD assets.

98
Q

Government security forces may be either military or civilian. True or false?

A

True

99
Q

Contract security forces may be either military or civilian. True or false?

A

False

100
Q

Military working dogs can seek, detect, defend their handlers, and guard suspects. True or false?

A

True

101
Q

PIR

A

A PIR sensor detects changes of infrared energy in its field of view.

102
Q

BMS

A

Balanced magnetic switch/high security switch

103
Q

PCU

A

Premise control unit

104
Q

Fingerprints, hand geometry, handwriting, iris scan, and voice recognition are all examples of what type of access control system?

A

Biometric

105
Q

Sensor/detector responds to what?

A

Physical stimulus