Safeguarding and Dissemination Flashcards
What are the purposes of the SF7 01?
A) The SF 701, or the Security Container Check Sheet, is used to record the opening and closing of your security container.
B) The SF 701, or the TS cover sheet, is used to alert holders to the presence of Top Secret classified information and prevent inadvertent view of classified information by unauthorized personnel
C) The SF 701, or Active Security Container Check Sheet, is used to report security incidents.
D) The SF 701, or the Active Security Container Check Sheet, is used to record your end of day checks.
D) The SF 701, or the Active Security Container Check Sheet, is used to record your end of day checks.
A) The Security Container Check Sheet, used to record the opening and closing of your security container, is an SF 702
B) The TS cover sheet, used to alert holders to the presence of Top Secret classified information and prevent inadvertent view of classified information by unauthorized personnel, is an SF 703
C) Security incidents should be immediately reported to a supervisor and reported through the INSCOM website
What is the purpose of the SF 702?
A) The SF 702, or the Active Security Container Check Sheet, is used to record your end of day checks.
B) The SF 702, or the Security Container Check Sheet, is used to record the opening and closing of your security container.
C) The SF 702, or the Security Container Check Sheet, is used to report security incidents.
D) The SF 701, or the Secret cover sheet, is used to alert holders to the presence of Secret classified information and prevent inadvertent view of classified information by unauthorized personnel.
B) The SF 702, or the Security Container Check Sheet, is used to record the opening and closing of your security container.
A) The SF 701, or the Active Security Container Check Sheet, is used to record your end of day checks.
C) Security incidents should be immediately reported to a supervisor and reported through the INSCOM website
D) The Secret cover sheet, used to alert holders to the presence of Secret classified information and prevent inadvertent view of classified information by unauthorized personnel, is an SF 704.
How is classified information prepared for transport?
A) With the name and position of the recipient clearly marked on the outer envelope to avoid accidental unauthorized disclosure
B) When it is properly packaged and sent via certified USPS
C) Classified material needs to be prepared for shipment, packaged, and sealed in ways that minimize risk of accidental exposure and facilitates detection of tampering.
D) When it is properly packaged and an approved courier with DCS is available
C) Classified material needs to be prepared for shipment, packaged, and sealed in ways that minimize risk of accidental exposure and facilitates detection of tampering.
A) The name of the recipient should be written on the inner envelope only
B) Incorrect, only Secret and lower classification can be sent via USPS and only when it is the most effective means after weighting reduction in security and accountability against benefits to time and cost
D) Incorrect, Secret and Confidential information may be sent via USPS if it is the most effective means. Sending via DCS is not always required, but it is preferred.
What is a Security Violation?
A) Communication or physical transfer of classified or controlled unclassified information to an authorized recipient
B) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information.
C) When classified data is introduced on an information system not approved for that level of information.
D) An event that results in or could be expected to result in the loss or compromise of classified information.
D) An event that results in or could be expected to result in the loss or compromise of classified information.
A) Communication or physical transfer of classified or controlled unclassified information to an authorized recipient is Unauthorized Disclosure
B) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information is a Security Infraction
C) Spillage is when classified data is introduced on an information system not approved for that level of information. This may constitute a Security Violation, but is not the definition or only type of Security Incident.
What is Unauthorized Disclosure?
A) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information.
B) An event that results in or could be expected to result in the loss or compromise of classified information.
C) When the possibility of compromise could exist but it is not known with certainty.
D) Communication or physical transfer of classified or controlled unclassified information to an authorized recipient
D) Communication or physical transfer of classified or controlled unclassified information to an authorized recipient
A) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information is a Security Infraction
B) An event that results in or could be expected to result in the loss or compromise of classified information is a Security Violation
C) A potential compromise is when the possibility of compromise could exist but it is not known with certainty. It is a type of unauthorized disclosure, but is not the best definition because it leaves out actual disclosure.
What are the practices you must follow when handling classified information? (Multiple Answers)
A) Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose
B) Store all documents, no matter if they are classified or unclassified, with an SF 70X cover sheet
C) Use approved secure communications circuits for telephone conversations to discuss classified information
D) If you take classified documents home to work on, ensure they are properly marked and stored in a GSA approved container.
E) Follow proper procedures when copying classified information
F) Use security forms such as SF 701 and SF 702
The Correct Answers are:
A) Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose
C) Use approved secure communications circuits for telephone conversations to discuss classified information
E) Follow proper procedures when copying classified information
F) Use security forms such as SF 701 and SF 702
B) Is incorrect because SF 70X cover sheets should only be used with the corresponding classification of the document it is covering
D) Is incorrect because classified documents should never be taken out of the secure workplace they are authorized to be in: you should not be taking work home with you.
What is the purpose of the SF 701?
A) It is used to record the opening and closing of your security container.
B) It is a TS cover sheet
C) It is intended to verify that you did not accidentally leave classified materials unsecured, and to ensure the area is safe and secure.
D) It is a Secret cover sheet
C) It is intended to verify that you did not accidentally leave classified materials unsecured, and to ensure the area is safe and secure.
A) An SF 702 is used to record the opening and closing of your security container.
B) A TS cover sheet is an SF 703
D) A TS cover sheet is an SF 704
What are the blank spaces for on an SF 701?
A) To report security incidents.
B) To notate the documents that you are accountable for.
C) For additional warranted security and safety items.
D) None of the above
C) For additional warranted security and safety items.
A) Incorrect, to report security incidents, immediately tell your supervisor and report it through https://www.inscom.army.mil/isalute/
B) Incorrect, SF 701s should not have information about the document; it is only used to verify the documents are secure
D) Incorrect, the blank spaces in an SF 701 are for additional warranted security and safety items
Why would a DoD official use the term, “Neither confirm nor deny”?
A) If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information.
B) The information in question is still being reviewed under FOIA guidance
C) They watched too many Jack Ryan movies
D) They do not know the answer to the question being posed to them
A) If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information.
B) FOIA considerations do not weigh on DoD personnels’ responsibility to “niether confirm nor deny” comments or questions about classified information. Any classified information that has become fully or partially public should still be protected from further unauthorized disclosure.
C) No
D) Regardless of a DoD personnel’s knowledge about the subject, any questions or comments about classified information should never be confirmed nor denied in public.
What is an Actual Compromise?
A) When there is a knowing, willful, or negligent action that could reasonably be expected to result in the loss, suspected compromise or compromise of classified information.
B) The possibility of compromise could exist but it is not known with certainty
C) When classified data is introduced on an information system not approved for that level of information
D) An unauthorized disclosure of classified information
D) An unauthorized disclosure of classified information
A) A Security Violation describes a knowing, willful, or negligent action that could reasonably be expected to result in the loss, suspected compromise or compromise of classified information.
B) The possibility of compromise could exist but it is not known with certainty describes a Potential Compromise
C) Spillage is when classified data is introduced on an information system not approved for that level of information
What is a Potential Compromise?
A) A failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information.
B) The possibility of compromise could exist but it is not known with certainty
C) When there is a knowing, willful, or negligent action that could reasonably be expected to result in the loss, suspected compromise or compromise of classified information.
D) An unauthorized disclosure of classified information
B) The possibility of compromise could exist but it is not known with certainty
A) A Security Infraction is a failure to comply with security requirements which cannot reasonably be expected to, and does not result in the loss, suspected compromise, or compromise of classified information.
C) A Security Violation is a knowing, willful, or negligent action that could reasonably be expected to result in the loss, suspected compromise or compromise of classified information.
D) An Actual Compromise is an unauthorized disclosure of classified information
When the document has been sealed within a properly naked inner envelope you must…
A) Write the name of the recipient on the outer envelope and seal that carefully as well.
B) Send the document via an appropriate and approved transmission method
C) Insert the envelope into the outer envelope and seal it carefully
D) Take a picture of it and text it to the recipient.
C) Insert the envelope into the outer envelope and seal it carefully
A) Incorrect, you should not write the name of any individual on the outer wrapping
B) Incorrect, the inner envelope needs to be placed in an outer envelope first
D) Come on
What does DCS stand for in the context of physically transporting classified material?
A) Defense Courier Service
B) Division of Courier Systems
C) Distributed Control System
D) Digital Combat Simulator
A) Defense Courier Service
When can Secret Information be sent via USPS?
A) When it is properly packaged
B) Secret information can be mailed via USPS at any time
C) When it is the most effective means considering security, time, cost, and accountability
D) Secret information can never be mailed via USPS express
C) When it is the most effective means considering security, time, cost, and accountability
A) This is not the best answer as all classified information needs to be properly packaged regardless of the transportation method
B) Incorrect, Secret information can only be sent via USPS only when it is the most effective means considering security, time, cost, and accountability
D) Incorrect, Secret information can be sent via USPS when it is the most effective means after weighing reduction in security and accountability against benefits to time and cost
When can Top Secret Information be sent via USPS?
A) When it is the most effective means considering security, time, cost, and accountability
B) Only if DCS is not available
C) When it is mailed priority overnight in a GSA-approved locked container
D) Never
D) Never
A) Incorrect, Top Secret information can never be sent via USPS
B) Incorrect, cleared U.S. military and Government personnel and DoD contractor employees who have received the proper briefing can transport TS information if DCS agents are not available.
C) Incorrect, Top Secret information can never be sent via mail.
Identify the method that CANNOT be used to send hard copy Confidential Information.
A) Regular mail as long as it is properly packaged.
B) DCS
C) USPS First Class mail
D) USPS registered mail
E) USPS certified mail
Correct:
B) DCS
C) USPS First Class mail
D) USPS registered mail
E) USPS certified mail
A) Incorrect, Classified Information being transported by USPS can only be sent via certified, registered, or First Class mail
T/F: Hand carrying classified information should only be done as a last resort
True
T/F: Anyone can determine the need for hand carrying classified information
False
T/F: When someone is carrying classified information, written authorization is always required
True
What form is required to receive a Courier Authorization Card?
A) IA Fm 3059
B) MAARNG Fm 380-1
C) DD Fm 2501
D) DD 2875
C) DD Fm 2501
A) Incorrect, an IA Fm 3059 is used for requesting a Form Update or Investigation
B) Incorrect, a Fm 380-1 is the MAARNG form for requesting information from the G2
D) Incorrect, a DD 2875 is an information system access request form
T/F: Critical program information needs to be protected from unauthorized or inadvertent destruction, transfer, alteration, or loss.
True
T/F: Compromise of CPI can significantly alter program direction, shorten combat effective life of the system, or require additional research, development, test, and evaluation resources to counter impact of its loss.
True
What is a Program Protection Plan?
A) An emergency response plan
B) A single source document that specifies all protection efforts designed to deny unauthorized access to critical program information
C) The list of approved methods for transporting classified materials
D) A single source document that specifies all protection efforts designed to deny unauthorized access to classified information
B) A single source document that specifies all protection efforts designed to deny unauthorized access to critical program information
A) Incorrect, a PPP may include an emergency response plan, but it deals with all protection efforts.
C) Incorrect, a PPP is a single source document that specifies all protection efforts designed to deny unauthorized access to critical program information
D) Incorrect, PPPs are only developed for CPI
T/F: The PPP must needs to be classified according to its content
True
T/F: A security infraction occurs when any knowing, willful, or negligent action contradicts EO 13526, but does not compromise a violation
True
T/F: A security infraction, compared to a security violation, does not place classified information at risk.
False: any mishandling of classified material places it at risk, regardless of how extreme the mishandling was.
T/F: A security violation occurs when any knowing, willful, or negligent action could be reasonably expected to result in an unauthorized disclosure of classified information
True
T/F: Failure to properly downgrade information to a lower classification level is an example of a security infraction
False: though failure to properly downgrade information to a lower classification level is an issue for the purposes of effective communication and dissemination, it is not a security incident.
T/F: It is a security violation to knowingly, willfully, or negligently classify or continue to classify information contrary to the requirements of EO 13526
True
T/F: All security violations only involve a compromise of classified information
False: security violations may also involve incidents that can reasonably be expected to lead to the compromise of classified information.
A soldier and a sailor are discussing the topic of actual and potential compromise.
A) The soldier says that actual compromise involves an unauthorized disclosure of classified information
B) The sailor says that not all security violations involve actual compromise, they all involve the potential for compromise.
Who is correct
The soldier is correct: security violations involve both actual and potential compromise
T/F: A foreign exchange officer assigned to a joint forces command has full access to all classified information provided to the command.
False: A foreign exchange officer may not gain access to all classified information, regardless of how closely they are working with their U.S. counterparts. Example: documents marked NOFORN or that aren’t authorized for distribution to citizens of the officer’s country may not be disseminated to them.
T/F: US relief agency liaison officers have access to raw intelligence images and data related to humanitarian aid efforts.
False: Anyone attempting to obtain any classified information must meet the prerequisites. They do not automatically gain access because of a mission or tasking.
T/F: A retired Combat Commander has full access to all levels of classified information he was able to access prior to retirement
False: He no longer has a need-to-know as he is retired
T/F: A DoD civilian employee with a favorably adjudicated Tier 3 investigation adjudicated to 5 CFR 731 standards are eligible for TS information
False: They require a T5 investigation for TS eligibility
T/F: A DoD military member with a favorably adjudicated Tier 1 investigation is eligible for access to Confidential information
False: A Tier 1 investigation is used to determine suitability for employment with the DoD, but not access to classified information.