Dump 3 Flashcards

1
Q

The public statue passed to protect personal information in possession of federal agencies is:
a. The Espionage Statue
b. The Unauthorized Disclosure Act
c. The Omnibus Crime Control Act
d. The Privacy Act of 1974
e. None of the above

A

D – The Privacy Act of 1974

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The Privacy Act of 1974 provides which of the following safeguards?
a. Permits individuals to gain access to certain information pertaining to themselves in federal agency records
b. Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
c. Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
d. Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual’s rights under the Privacy Act of 1974
e. All of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following would not be permitted to review a student’s record according to the Family Educational Rights and the Privacy Act of 1974?
a. Law enforcement officials
b. Other school officials
c. The school’s registrar office
d. All of the above
e. None of the above

A

A – Law enforcement officials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following characteristics pertains to a good information management program?
a. An employee education program for those who utilize the classification system
b. Limited number of individuals who can initiate classification of information
c. Limitation of the duration during which the classification will remain in effect
d. All of the above
e. None of the above

A

D – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the three most common methods of information loss to be guarded against?
a. Newspaper articles, magazine articles, television
b. Employee payroll, personnel matters, market surveys
c. Theft by an insider, inadvertent disclosure, industrial espionage
d. Employee hirings, magazine articles, industrial espionage
e. None of the above

A

C – Theft by an insider, inadvertent disclosure, industrial espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The elements of an information security program include:
a. Informing employees that the information is to be protected
b. Establishing the use of patent or nondisclosure agreements
c. Designation of certain information as sensitive
d. Providing the means for employees to protect sensitive information
e. All of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following statements is not true in regard to an information security program?
a. The information security program is an attempt to make theft of sensitive information difficult, not necessarily to eliminate it.
b. The protection afforded against losses by either internal or external sources is, at best, limited.
c. A good information security program will provide total protection from industrial espionage
d. A trust relationship must be established and maintained with employees
e. The good will and compliance of employees is crucial for success

A

C – A good information security program will provide total protection from industrial espionage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vital records normally constitute what percentage of the company’s total records?
a. 2 percent
b. 5 percent
c. 10 percent
d. 15 percent
e. 20 percent

A

A – 2 percent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is considered to be an approved method of protecting vital records?
a. On-site storage in vaults or safes
b. Protection of original vital records
c. Natural dispersal within an outside organization
d. Planned dispersal of copies of vial records
e. All of the above

A

E – All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The term “social engineering” is:
a. A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity
b. The subtle elicitation of information without revealing the true purpose of the call
c. The specific design of a business structure to facilitate the interaction of the inhabitants
d. Both A and C
e. None of the above

A

B – The subtle elicitation of information without revealing the interaction of the inhabitants

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Competitive intelligence gathering is a legitimate activity that is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:
a. Alert senior management to changes in protocol in foreign countries
b. Alert senior management as to the personal habits of competitive senior management
c. Alert government intelligence agencies to marketplace changes
d. Alert senior management to marketplace changes in order to prevent surprise
e. All of the above

A

D – Alert government intelligence agencies to marketplace changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The Secretary of Defense is not authorized to act on behalf of the following agency or department in rendering industrial security services:
a. Department of Commerce
b. Central Intelligence Agency
c. Department of Justice
d. Department of Labor
e. None of the above

A

B – Central Intelligence Agency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The overall policy guidance for the defense Industrial Security Program is provided by:
a. The FBI
b. The Deputy Undersecretary of Defense for Policy
c. The Assistant Chief of Staff in Intelligence
d. The defense Intelligence Agency
e. None of the above

A

B – The Deputy Undersecretary of Defense for Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The Defense Industrial Security Program on behalf of all user agencies is administrated by the:
a. Director, Defense Investigative Service
b. Comptroller, Assistant Secretary of Defense
c. Deputy Undersecretary of Defense for Policy
d. Defense Industrial Security Clearance Office
e. None of the above

A

A – Director, Defense Investigative Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The executive order that applies to classified information is:
a. 1044
b. 1066
c. 12065
d. 12523
e. 14084

A

C – E.O. 12065

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A controlled area established to safeguard classified material that, because of its size or nature, cannot be adequately protected by other prescribed safeguards is termed to be:
a. a restricted area
b. a classified area
c. a closed area
d. a limited area
e. none of the above

A

C – A closed area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The DIS region office under the support of the director of industrial security that has jurisdiction over the geographical area in which a facility is located is called the:
a. Regional Security Office
b. Division Security Office
c. Clearance Office
d. Cognizant Security Office
e. None of the above

A

D – Cognizant Security Office

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Technical and intelligence information derived from foreign communications by other than the intended recipient is known as:
a. Restricted data
b. Communications intelligence
c. Classified security matters
d. Highly confidential
e. None of the above

A

B – Communications intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The designation that should be applied to information or material showing unauthorized disclosure that could reasonably be expected to cause damage to national security is:
a. Restricted
b. Top Secret
c. Confidential
d. Unauthorized disclosure
e. None of the above

A

C – Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Technical information used for training, maintenance, and inspection of classified military munitions of war would be classified as:
a. Restricted
b. Classified
c. Top secret
d. Confidential
e. Cosmic

A

D – Confidential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A designation or marking that identifies classified operational keying material and that indicates the material requiring special consideration with respect to access, storage, and handling is:
a. Cosmic
b. Special
c. Crypto
d. Communications intelligence
e. Red flagged

A

D – Communications intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The portion of internal security that is concerned with the protection of classified information in the hands of U.S. industry is called:
a. Information security
b. Classified security
c. National security
d. Industrial security
e. Communications security

A

D – Industrial security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The result of any system of administrative policies and procedures for identifying, controlling, and protecting from unauthorized disclosure of information and is authorized by executive order or statute is called:
a. Computer security
b. Industrial security
c. Personnel security
d. Communications security
e. Information security

A

E – Information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

An administrative determination that an individual is eligible for access to classified information is:
a. Personnel security clearance
b. Industrial security clearance
c. National security clearance
d. Communications security clearance
e. None of the above

A

A – Personnel security clearance

25
Q

The combinations to safes, containers, and vaults should be changed at intervals of:
a. Every three months
b. Every four months
c. Every six months
d. Every nine months
e. Every year

A

E – Every year

26
Q

The designation that shall be applied only to information or material that unauthorized disclosure could reasonably be expected to cause serious damage to national security is:
a. Restricted
b. Secret
c. Confidential
d. Top secret
e. Unauthorized disclosure

A

B – Secret

27
Q

Information regarding the revelation of significant military plans or intelligence operations should be classified as:
a. Restricted
b. Secret
c. Confidential
d. Top secret
e. Cosmic

A

B – Secret

28
Q

The designation that should only be applied to information or material that unauthorized disclosure could reasonably be expected to cause exceptionally grave damage to national security is:
a. Restricted
b. Secret
c. Confidential
d. Top secret
e. Cosmic

A

D – Top secret

29
Q

Information that could lead to the compromise of vital national defense plans or complex cryptologic and communications intelligence systems should be classified:
a. Restricted
b. Secret
c. Confidential
d. Top secret
e. Cosmic

A

D – Top secret

30
Q

Regulations of the Department of Defense require that the contractor shall establish such procedures as are necessary to ensure that any employee discovering the loss, compromise, or suspected compromise of classified information outside a facility promptly reports to:
a. The Defense Intelligence Agency
b. The Defense Industrial Security Clearance Office
c. The nearest FBI office
d. Comptroller, Assistant Security of Defense
e. The Industrial Security Office

A

C – The nearest FBI office

31
Q

Defense Department regulations require the identification card of a defense contractor to include a:
a. Distinctive color coding
b. Thumbprint
c. Photograph of the holder
d. Symbol code
e. All of the above

A

C – Photograph of the holder

32
Q

Which of the following should definitely not appear on the identification card of employees of defense contractors?
a. Distinctive color coding
b. Symbol code
c. Top secret, or secret
d. Confidential
e. Both C and D
f. All of the above

A

E – Both C and D

33
Q

No invitation, written or oral, shall be given to a foreign national or to a representative of a foreign interest to attend any session of a meeting sponsored by a Department of Defense activity until:
a. A full field investigation has resulted in the necessary security clearance
b. Approval for attendance has been received from the sponsoring activity
c. The Department of the State has given approval
d. The CIA has given approval
e. None of the above

A

B – Approval for attendance has been received from the sponsoring activity

34
Q

The basic document for conveying to the contractor the classification and declassification specifications for a classified contract is:
a. DD Form 254
b. DD Form 441
c. DD Form 482
d. DD Form 562
e. DD Form 1541

A

A – DD Form 254

35
Q

A document that is classified “confidential” shall exhibit the marking at:
a. The top of the page
b. The bottom of the page
c. The right-hand side of the page
d. The left-hand side of the page
e. Both the top and bottom of the page

A

E – Both the top and bottom of the page

36
Q

Unclassified material should be marked:
a. “Unclassified” at the top of the page
b. “Unclassified” at the bottom of the page
c. “Unclassified” at the top and bottom of the page
d. “Unclassified” anywhere on the page
e. With no marking

A

E – With no marking

37
Q

An unclassified document that is attached to a classified document should have a notation stating:
a. “Classified same as enclosure”
b. “Treat as classified”
c. “Unclassified when separated from classified enclosure”
d. No notation needed
e. None of the above

A

C – “Unclassified when separated from classified enclosure”

38
Q

Whenever classified information is downgraded, declassified, or upgraded, the material shall be promptly and conspicuously marked to indicate:
a. What was changed
b. The date it was changed
c. The identity of the person taking the action
d. All of the above
e. None of the above

A

D – All of the above

39
Q

Foreign classified material should be marked in accordance with instructions received from:
a. The Defense Intelligence Agency
b. The foreign contracting authority
c. The FBI
d. The Industrial Security Office
e. None of the above

A

B – The foreign contracting authority

40
Q

Department of Defense regulations regarding the protection of classified information requires that defense contractors maintain accountability of top secret information for a minimum time of:
a. One year
b. Two years
c. Three years
d. Four years
e. Five years

A

C – Three years

41
Q

When not in use, top secret information should be stored in a:
a. Class A vault
b. Class B vault
c. Class C vault
d. Class D vault
e. Class E vault

A

A – Class A vault

42
Q

Which of the following is prohibited by the department of Defense regulations regarding the method of transmitting top secret information outside a facility?
a. Electronic means in a crypto system
b. Armed Forces Courier Service
c. Designated courier that has been cleared
d. U.S. Postal Service
e. Specifically designated escort

A

D – U.S. Postal Service

43
Q

Secret information can be transmitted by which of the following means according to Department of Defense regulations?
a. Designated courier that has been cleared
b. U.S. Registered Mail
c. Armed Forces Courier Service
d. Both A and C
e. All of the above

A

E – All of the above

44
Q

Department of Defense regulations indicate that destruction of classified information can be accomplished by:
a. Melting
b. Burning
c. Mutilation
d. Chemical decomposition
e. All of the above

A

E – All of the above

45
Q

Which of the following has the appropriate security clearances in the destruction of top secret and secret information according to Department of Defense regulations?
a. Two employees of the defense contractor
b. Three employees of the defense contractor
c. Four employees of the defense contractor
d. One employee of the Department of Defense and two employees of the defense contractor
e. None of the above

A

A – Two employees of the defense contractor

46
Q

According to Department of Defense regulations, if classified material is removed from the facility for destruction, it should be destroyed:
a. The same day it was removed
b. Within two days
c. Within three days
d. Within one week
e. Within ten days

A

A – The same day it was removed

47
Q

According to Department of Defense regulations, to be eligible for a personnel security clearance for confidential information, the following age must be attained:
a. 16
b. 18
c. 20
d. 21
e. 25

A

A – 16

48
Q

According to Department of Defense regulations, the security clearance of a contractual employee shall be effective for:
a. Six months
b. One year
c. Two years
d. Five years
e. For as long as he or she is employed by the contractor

A

E – For as long as he or she is employed by the contractor

49
Q

According to Department of Defense regulations, the following are not eligible for a personnel security clearance:
a. All foreign nationals
b. All foreign nationals except those granted reciprocal clearances
c. Only foreign nationals that are from a communist country
d. Only foreign nationals that are under 16
e. None of the above

A

B – All foreign nationals except those granted reciprocal clearances

50
Q

A facility security clearance should not be granted to contractor activities:
a. In Puerto Rico
b. In facilities determined to be under foreign ownership, control, or influence
c. In U.S. trust territories
d. Both A and C
e. All of the above

A

B – In facilities determined to be under foreign ownership, control, or influence

51
Q

For personnel security clearances required in connection with a facility security clearance, applications shall be submitted to the:
a. Defense Intelligence Agency
b. Industrial Clearance Office
c. Contracting officer
d. Cognizant Security Office
e. Central Intelligence Agency

A

D – Cognizant Security Office

52
Q

According to Department of Defense regulations, “interim” personnel security clearances must be approved by the:
a. Defense Intelligence Agency
b. Industrial Clearance Office
c. Contracting officer
d. Cognizant Security Office
e. None of the above

A

C – Contracting officer

53
Q

Department of Defense regulations require initial approval in writing prior to processing any classified information in an ADP system by which of the following authorities:
a. The head of the Industrial Security Clearance Office
b. National Security Agency
c. Cognizant Security Office
d. The contracting officer
e. Defense Intelligence Agency

A

C – Cognizant Security Office

54
Q

An ADP system that operates in a manner where all users with access to the system have both a security clearance and a need-to-know status for all classified information that is in the system is known as:
a. Classified Security Mode
b. Restricted Security Mode
c. Controlled security Mode
d. Dedicated Security Mode
e. Limited Security Mode

A

D – Dedicated Security Mode

55
Q

An ADP system that operates in a manner in which all users with access to the system who have a security clearance for the highest classification and most restrictive types of information in the system is known as:
a. Classified Security Mode
b. Restricted Security Mode
c. Controlled Security Mode
d. System High security Mode
e. Dedicated Security Mode

A

D – System High Security Mode

56
Q

An ADP system that operates in a manner in which at least some of the users with access to the system have neither a security clearance nor a need-to-know status for all classified information that is in the system, but in a manner that the cognizant security officer or a higher authority has determined that the necessary degree of security has been achieved and maintained, is known as:
a. Limited Security Mode
b. Classified Security Mode
c. Controlled Security Mode
d. Restricted Security Mode
e. Dedicated Security Mode

A

C – Controlled Security Mode

57
Q

The ADP system security supervisor or designee should review the audit trail logs at least:
a. Daily
b. Weekly
c. Monthly
d. Bimonthly
e. Quarterly

A

B – Weekly

58
Q

The Department of Defense Personnel Security Questionnaire (industrial) Form is:
a. DD 16
b. DD 48
c. DD 254
d. DD 441
e. DD 482

A

B – DD 48

59
Q

According to Department of Defense regulations, which of the following documents are not acceptable proof of U.S. citizenship concerning the safeguarding of classified information?
a. Birth certificate
b. Certificate of naturalization
c. Certificate of citizenship
d. Uncertified copy of baptismal record
e. All of the above

A

D – Uncertified copy of baptismal record