Section 17C--Information Protection Flashcards
Which source provides guidance for managing classified information and controlled unclassified information?
DoDM5200.01V1 and AFMAN16-1404V1
Classified information is designated accordingly to protect national security. What are its three levels of classification?
Top Secret, Secret, and Confidential
What is it called when there is an initial decision by an original classification authority that an item of information could reasonably be expected to cause identifiable or describable damage to the national security subjected to unauthorized disclosure and requires protection in the interest of national security?
Original classification
Consistent with which policy, does USAF identify, classify, downgrade, declassify, mark, protect, and destroy classified information? CUI will also be protected per it as well.
National policy
Which manual will be referenced to clearly identify all classified information by marking, designation, or electronic labelling?
DoDM5200.01V2 and AFMAN16-1404V2
What are the three most common markings on a classified document?
Banner lines, Portion markings, and Classification authority block
Which form is used to cover Confidential classified information outside of storage?
SF 705
Which form, titled Activity Security Checklist, is used to record the end of the day security c hecks, ensuring all vaults, secure rooms, and containers used for storing classified material are checked?
SF 701
NOTE: this form is required for any area where classified ifnormation is used or stored
True or False? Classified ifnormation systems should specifically be stored in a general services administration approved safe or in buildings or areas cleared for open storage of classified.
True
What is a security incident involving failure to comply with requirements which cannot reasonably be expected to, and does not, result in the loss or classified records, or in the suspected or actual compromise of classified information?
Infraction
An infraction may be unintentional or inadvertaent, and does not consititute a security violation; however, if left uncorrected, what could it lead to?
Security violation or compromise
Who is the designated authority grant, deny, and revoke security clearance eligibility using the Department of Defense 13 adjudicative guidelines, while applying the whole person concept and mitigating factors?
Department of Defense Central Adjudication Facility (DODCAF)
What option is given to individuals if the security clearance eligibility is denied or revoked?
Granted due process and may appeal