Infosec Flashcards

1
Q

What is the primary purpose of Army Regulation 380-5?

A

To establish policies and procedures for the protection of Army information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Army Regulation 380-5 applies only to classified information.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: Army Regulation 380-5 is concerned with ________ information.

A

sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does the acronym AR stand for in the context of Army Regulation?

A

Army Regulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which Army Regulation outlines the responsibilities for information security?

A

Army Regulation 380-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Multiple Choice: Which of the following is NOT a type of information covered by AR 380-5? A) Classified B) Unclassified C) Sensitive D) Public

A

D) Public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the significance of safeguarding sensitive information according to AR 380-5?

A

To prevent unauthorized access and protect national security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: AR 380-5 includes guidelines for the destruction of sensitive information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What term describes the unauthorized disclosure of sensitive information?

A

Breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: Personnel handling sensitive information must complete ______ training.

A

information security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which Army Regulation provides guidance on the physical protection of sensitive information?

A

Army Regulation 380-5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Multiple Choice: Who is primarily responsible for the implementation of AR 380-5? A) Commanders B) Civilian Employees C) Contractors D) All of the above

A

D) All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of information does AR 380-5 specifically address?

A

Sensitive but unclassified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: AR 380-5 requires regular audits of information security practices.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fill in the blank: AR 380-5 mandates the use of ________ to protect sensitive information.

A

access controls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the term ‘information security’ refer to in AR 380-5?

A

The protection of information from unauthorized access and disclosure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Multiple Choice: Which of the following is a key element of information security according to AR 380-5? A) Training B) Monitoring C) Reporting D) All of the above

A

D) All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Who must report any security breaches as per AR 380-5?

A

All personnel with access to sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

True or False: AR 380-5 includes procedures for the reporting of incidents involving sensitive information.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Fill in the blank: The ________ is responsible for ensuring compliance with AR 380-5.

A

Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the role of training in AR 380-5?

A

To ensure all personnel understand their responsibilities regarding information security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Multiple Choice: Which of the following is a consequence of failing to comply with AR 380-5? A) Disciplinary action B) Increased funding C) Enhanced security D) None of the above

A

A) Disciplinary action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

True or False: AR 380-5 is updated annually.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Fill in the blank: AR 380-5 provides guidance on ________ of sensitive information.

A

storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What must personnel do before accessing sensitive information according to AR 380-5?

A

Obtain proper clearance and authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Multiple Choice: Which of the following is a key principle of AR 380-5? A) Need-to-know B) Open access C) Public availability D) None of the above

A

A) Need-to-know

27
Q

True or False: AR 380-5 applies to both military and civilian personnel.

A

True

28
Q

Fill in the blank: AR 380-5 specifies the ________ for handling sensitive information.

A

procedures

29
Q

What document must be referenced for specific definitions used in AR 380-5?

A

The Glossary of Terms

30
Q

Multiple Choice: Which of the following is an example of sensitive information? A) Social Security Numbers B) Public announcements C) Marketing materials D) None of the above

A

A) Social Security Numbers

31
Q

True or False: AR 380-5 allows for the sharing of sensitive information without proper authorization.

A

False

32
Q

Fill in the blank: AR 380-5 outlines the _______ for reporting security violations.

A

protocols

33
Q

What is the main focus of the security measures outlined in AR 380-5?

A

To protect sensitive but unclassified information from unauthorized disclosure.

34
Q

Multiple Choice: Which of the following best describes ‘sensitive information’? A) Information that can be shared publicly B) Information that requires protection from unauthorized access C) Information that is always classified D) All of the above

A

B) Information that requires protection from unauthorized access

35
Q

True or False: AR 380-5 provides guidelines for electronic transmission of sensitive information.

A

True

36
Q

Fill in the blank: The ________ is responsible for the oversight of information security programs.

A

Information Security Officer

37
Q

What must be established for the handling of sensitive information as per AR 380-5?

A

Clear policies and procedures.

38
Q

Multiple Choice: What should be done with outdated sensitive information? A) Archive it B) Destroy it C) Share it D) None of the above

A

B) Destroy it

39
Q

True or False: AR 380-5 requires regular reviews of information security practices.

A

True

40
Q

Fill in the blank: Personnel must be aware of their ________ regarding sensitive information.

A

responsibilities

41
Q

What is the purpose of access controls in AR 380-5?

A

To limit who can view or handle sensitive information.

42
Q

Multiple Choice: Which of the following is a recommended practice in AR 380-5? A) Sharing passwords B) Keeping sensitive information visible C) Locking sensitive documents D) None of the above

A

C) Locking sensitive documents

43
Q

True or False: AR 380-5 allows for the use of personal devices for handling sensitive information.

A

False

44
Q

Fill in the blank: AR 380-5 emphasizes the importance of ________ in protecting sensitive information.

A

training

45
Q

What is the role of the Information Security Officer in relation to AR 380-5?

A

To oversee the implementation of information security measures.

46
Q

Multiple Choice: Which of the following actions is prohibited under AR 380-5? A) Unauthorized access to sensitive information B) Regular audits C) Employee training D) None of the above

A

A) Unauthorized access to sensitive information

47
Q

True or False: AR 380-5 requires incident reports to be filed within 24 hours of a breach.

A

True

48
Q

Fill in the blank: AR 380-5 requires that all sensitive information be ________ when no longer needed.

A

destroyed

49
Q

What is the consequence of failing to report a security breach as per AR 380-5?

A

Disciplinary action may be taken.

50
Q

Multiple Choice: Which of the following is NOT a type of training required by AR 380-5? A) Onboarding training B) Annual refresher training C) Specialized training D) None of the above

A

D) None of the above

51
Q

True or False: Sensitive information can be shared via unsecured email according to AR 380-5.

A

False

52
Q

Fill in the blank: AR 380-5 outlines the ________ for reporting security incidents.

A

procedures

53
Q

What are the two main categories of information addressed in AR 380-5?

A

Classified and sensitive but unclassified information.

54
Q

Multiple Choice: Which of the following is a key tenet of information security in AR 380-5? A) Availability B) Integrity C) Confidentiality D) All of the above

A

D) All of the above

55
Q

True or False: AR 380-5 applies only to Army personnel.

A

False

56
Q

Fill in the blank: The ________ is accountable for the security of sensitive information.

A

Command

57
Q

What must be done with sensitive information when it is no longer needed?

A

It must be securely destroyed.

58
Q

Multiple Choice: Which of the following is a method of securing sensitive information? A) Encryption B) Public access C) Sharing passwords D) None of the above

A

A) Encryption

59
Q

True or False: AR 380-5 allows for the sharing of sensitive information without a need-to-know basis.

A

False

60
Q

Fill in the blank: Personnel must maintain ________ when handling sensitive information.

A

confidentiality

61
Q

What does AR 380-5 require for the physical storage of sensitive information?

A

It must be kept in secure locations.

62
Q

Multiple Choice: Which of the following is a violation of AR 380-5? A) Properly securing documents B) Sharing sensitive information on social media C) Completing required training D) None of the above

A

B) Sharing sensitive information on social media

63
Q

True or False: AR 380-5 requires that all incidents be documented and reported.

A

True

64
Q

Fill in the blank: AR 380-5 establishes the ________ for protecting sensitive information.

A

framework