All Areas II Flashcards
This enables individuals to be able to authenticate themselves on security websites and securely log into computer systems
Common Access Card (CAC)
Older style of lock; may be used for classified storage in certain cases
Mechanical combination lock
Lock that complies with UL Standard 768-Group 1
Combination padlock
Lock that complies with FF-L-2740 series lock specification
Electromechanical combination lock
Lock that has limited resistance to forced entry
Low security padlock
A facility used by the intelligence community
SCIF
The governing authority to approve security containers
GSA
Areas designed and authorized for the open storage of classified information. These facilities are usually build to commercial construction standards and do not afford the extra security inherent with a vault.
Secure rooms
Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel door
Vaults
The terrorist threat level indicating anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the operating environment favors the terrorist.
High terrorist threat level
The terrorist threat level indicating no terrorist group is detected or the terrorist group in non-threatening
Low terrorist threat level
The terrorist threat level indicating anti-U.S. terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity. The operat
Significant terrorist threat level
The terrorist threat level indicating terrorists are present but there are no indications of anti-U.S. activity. The operating environment favors the host nation or the U.S.
Moderate terrorist threat level
Physical security plan
At a minimum, these should include special and general guard orders, access and material control, protective barrier lighting systems, locks, and Intrusion Detection Systems (IDS)
Much of U.S. classified information originates within this environment
Industrial
Security compliance is overseen by this organization if a contractor works at his/her own facility
Defense Security Service
A contractor must adhere to the security rules of the __________ commander when working at a government installation
Installation
The program that covers protection of classified information
by government contractors
NISP
FSO responsibilities
- Ensure compliance with the NISP
- Follow NISPOM guidelines
- Provide training for cleared individuals
If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference
Chapter 8 of the NISPOM
True or False: A SAP can retain security cognizance if necessary.
True
A government employee with the authority to enter into, administer, and/or terminate contracts and make related determinations and findings
Contracting Officer
This government employee is a subject matter expert who has regular contact with the contractor
COTR
The document that outlines in detail what will be required to complete a contract
Statement of Work (SOW)
The document that establishes the government’s authority to review the contractor’s security program to ensure compliance
DD Form 441
The form a contractor could use to determine if classified storage is required, and at what level
DD Form 254
A cleared individual can only have access at the _______ level as the facility clearance
Same
For the purpose of a visit to another cleared facility, a clearance can be verified by looking in ________
JPAS
The issuance of ________ is the responsibility of the DoD CAF
Eligibility
Unauthorized disclosure of this information could reasonably be expected to cause serious damage to our national security.
Secret
Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.
Top Secret
Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.
Confidential
This is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
Derivative Classification
This is defined as an initial determination that information requires, in the interest of national security, protection against unauthorized disclosure.
Original Classification
This is defined as unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classification.
Compilation
The term used to identify individuals specifically authorized in writing to make initial classification decisions.
Original Classification Authority
This contains classification levels, special requirements and duration instructions for programs, projects, plans, etc.
Security Classification Guides (SCG)
The six step process an OCA applies in making classification determinations
Original Classification Process
The authorized change in the status of information goes from classified information to unclassified information
Declassification
The declassification system where Permanently Valuable Historical records are declassified when they are 25 years old
Automatic declassification
The declassification system where information exempted from automatic declassification is reviewed for possible declassification
Systematic declassification review
The declassification system where the public can ask for classified information be review for declassification and public release
Mandatory Declassification Review (MDR)
The declassification system where an OCA, at the time the information is originally classified, sets a date or event for declassification
Scheduled Declassification
People who are in possession of, or who are otherwise charged with safeguarding classified information
Custodians
Options an OCA has when determining declassification
Specific Date, Specific Event, or by the 50X1-HUM Exemption
The 25-year rule
The process where records automatically become declassified after 25 years
This type of information does not provide declassification instructions
Restricted Data and Formerly Restricted Data
Practices to follow when handling classified information
- Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose
- Use approved secure communications circuits for telephone conversations to discuss classified information
- Follow proper procedures when copyi
Security Container Check Sheet, which is used to record the opening and closing of your security container
SF 702
The Activity Security Checklist intended to verify that you did not accidentally leave classified materials unsecured, as well as, to ensure the area is safe and secure. The blank spaces can be utilized for additional warranted security and safety items,
SF 701
An unauthorized disclosure of classified information
Actual compromise
If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information
Neither confirm nor deny
The possibility of compromise could exist but it is not known with certainty
Potential Compromise
This organization maintains a register of certified security digital facsimiles
DISA, Joint Interoperability Test Command (JITC)
The protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications and to ensure the authenticity of such communications.
COMSEC
When the document has been sealed within a properly marked inner envelope you must…
Insert the envelope into the outer envelope
DCS
Defense Courier Service
This kind of information can be sent via USPS express only when it is the most effective means considering security, time, cost, and accountability.
Secret information
This kind of information can never be sent via USPS
Top Secret information
Methods to send hard copy Confidential information
DCS, First Class mail, registered mail, and certified mail
True or False: Hand carrying classified information should only be done as a last resort
True
True or False: Anyone can determine the need for hand carrying classified information
False
True or False: When someone is carrying classified information, written authorization is always required
True
DD Form 2501
Courier Authorization Card
Microfiche destruction
Burned or shredded to be destroyed. It can also be destroyed with chemicals that destroy the imprints.
Typewriter ribbon destruction
Ribbons must be burned or shredded
Floppy disk destruction
Must be burned, overwritten, or demagnetized
Document destruction
Must be burned, shredded, or chemically decomposed of
Videotape destruction
Must be burned, shredded, or demagnetized
The initial briefing given to all personnel on the DoD Information Security Program
Initial Orientation Briefing
Homeland Security Presidential Directive 12 (HSPD-12)
On August 27, 2004, President Bush signed this directive; Policy for a Common Identification Standard for Federal Employees and contractors. This requires government-wide development and implementation of a standard for secure and reliable forms of identi
DoD 5200.08-R
Physical Security Program regulation
This document authorizes commanders to issue regulations for the protection or security of property and places under their command. This document also establishes guidelines to build consistent minimum standards for protecting DoD installations and resour
DoD Instruction 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
You need to review the requirements that electromechanical locks meet. Which of the specifications should you reference.
Federal specification FF-L-2740 series
You need to secure classified information what locks could you use.
X-09 electromechanical lock
S&G 2937 mechanical lock
S&G 8077 padlock
You are selecting combination locks for your facility and must consider the requirements and features of various combination locks. Which locks are currently being produced/used?
S&G 2740B and Kaba Mas X-10
You need to open a security container that has an S&G 2740 lock. What type of lock is S&G 2740?
Electromechanical combination lock
You just received the security container that has the S&G 2740 electromechanical safe lock with a factory setting of 50-25-50. what should you do first?
Change the combination
Open the lock
Calibrate the lock
Calibrate the lock
You are responsible for creating, protecting, and changing combinations in your facility. What guidelines should you follow?
Do not write a combination down.
Do not change the locks combination on a Friday or the day before you go on leave.
Change a lock’s combination if the container is discovered unlocked and unattended.
Maintain records of who knows lock combinations.
Safegu
Guarding a specific asset or resource.
Point Security
Designating islands of high security within a sea of moderate security.
Enclaving
Protecting an entire area such as an installation or facility
Area Security
Integrating layers of security to protect DoD assets.
Security in Depth
Barbed wire and concertina wire may serve as a protective barrier by simply uncoiling it and laying it on the ground. True or false
True
Barbed wire is also known as razor wire. True or false?
False
Jersey barriers may be placed around buildings to prevent vehicles from getting too close to the buildings. True or false?
True
Rapidly flowing rivers are considered active barriers. True or false?
False
Although decorative, a concrete planter can serve as a protective barrier by preventing vehicle access. True or false?
True
A ________________is an area inside and outside the perimeter fence or barrier of the protected area. Ineffective clear zone must be free of visual obstructions such as bushes.
Clear zone
This method is intended to display a silhouette of any person passing between the light source in the building or to show the contrast of the person inside the building.
Surface lighting
This method is intended to make the inside of a protected area difficult to see from outside the protected area.
Glare projection
This method is intended to limit the width of the lighted strip outside the perimeter of a protected area so as not to interfere with adjoining property, nearby highways, railroads, navigable waters, or airports.
Controlled lighting
When planning protective site lighting, you should ensure that controls and switches are installed inside a protected area and locked or guarded or inside a central station such as an alarm monitoring station. True or false?
True
Flashlights are reliable form of continuous lighting. True or false?
False
Emergency lighting depends upon the power supply of the utility company. True or false?
False
Standby lighting is the type of lighting used when the primary power source fails. True or false?
False
The mission of all government security forces, civilian or military, contract forces, and military working dogs is to _____________ _________ _____________.
Protect DOD assets.
Government security forces may be either military or civilian. True or false?
True
Contract security forces may be either military or civilian. True or false?
False
Military working dogs can seek, detect, defend their handlers, and guard suspects. True or false?
True
PIR
A PIR sensor detects changes of infrared energy in its field of view.
BMS
Balanced magnetic switch/high security switch
PCU
Premise control unit
Fingerprints, hand geometry, handwriting, iris scan, and voice recognition are all examples of what type of access control system?
Biometric
Sensor/detector responds to what?
Physical stimulus