Security Flashcards
Three types of restricted areas are:
Exclusion, limited and controlled
Where are classified markings placed on charts, maps,and drawings?
Charts, maps, and drawings shall bear the appropriate classification marking under the legend, title block or scale.
Which restricted area could serve as a buffer zone?
Controlled
What does SCI mean?
Sensitive Compartmented Information
COMSEC incidents are divided into how many categories?
3
What categories are COMSEC incidents divided into?
Physical
Personnel
Cryptographic
What are the types of COMSEC incident reports?
Initial
Amplifying
Final
Interim
What type of report is submitted for each COMSEC incident?
Initial report
How often should unannounced spot checks be conducted?
Quarterly
How many EKMS spot checks can the CO delegate to the XO?
2
Classified material may be jettisoned at sea to how many depths?
1000 fathoms/ 6000ft
Who controls the COMSEC library?
EKMS Manager
What does NCIRES mean?
National COMSEC Incident Reporting and Evaluation System
The cover, first page, and title page (if any) must be prominently marked at the ___ and _____ of the page with the highest classification of information contained within the document.
Top and bottom
Superseded keying material on board an _______ is exempt from the 12-hour destruction standard.
Aircraft
Any Coast Guard member, military, civilian, contractor, Auxiliarist or other person associated with the Coast Guard, having knowledge of the loss, unauthorized disclosure, or possible compromise of classified information, sabotage, espionage or other subversive activites, sall immediatel advise his/her ____ within ___hours or the next business day.
CSO within 24 hours
For a classified e-mail, the classification authority block shall be placed after the _______ block, but before the overall classification marking string at the end of the e-mail. These blocks may appear as single linear text strings instead of the traditional appearance of three lines of text.
Signature
The unauthorized disclosure of ____ information could be expected to cause serious damage to the national security.
Secret
The unauthorized disclosure of ____ information could reasonably be expected to cause damage to national security.
Confidential
The unauthorized disclosure of ______ information could reasonably be expected to cause exceptionally grave damage to the national security.
Top Secret