Security Specialist online course Flashcards

1
Q

Hijacking is a good example of which threat type?

A

Terrorist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following is NOT an authorized source of classification
guidance?

A

DD Form 441

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Acquiring technological secrets and selling them to foreign intelligence
operatives is a good example of which threat type?

A

Insider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Robbery is a good example of which threat type?

A

Criminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A project manager stops by your office. Several members of his team
recently experienced difficult events in their personal lives, and he is worried
about them. Which of the following is not a perceived life crisis?

A

Car breaking down while driving home from work on a cold, rainy
night

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the partnership between the U.S. Government and industry to
protect classified information?

A

The National Industrial Security Program (NISP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is NOT a Cognizant Security Agency (CSA) for the
National Industrial Security Program (NISP)?

A

Department of Treasury

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who has the authority to enter into, administer, and terminate contracts?

A

Contracting Officer (CO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The___security program identifies the materials, processes, and
information requiring protection.

A

Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why does the Information Security Program (ISP) exist?

A

To mitigate the risk of unauthorized disclosure of protected

information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which official, listed below, cannot authorize an individual in writing - original
classification authority (OCA)?
A

The Security Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the incorporating, paraphrasing, restating, or generating in new form
information already classified?

A

Derivative classification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is NOT an authorized source of classification
guidance?

A

DD Form 441

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is taking information from an authorized source of classification
guidance and re-wording it in a new or different document?

A

Paraphrasing (or restating)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three required elements on a derivatively classified document?

A

Portion marking, banner marking (overall marking), classification
authority block

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is a determination to re- designate classified
information to a lower level of classification?

A

Downgrading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When information no longer requires protection, it is

A

Declassified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Derivative classifiers make declassification determinations.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the four systems for declassification?

A

Scheduled, Automatic, Mandatory Review, Systematic Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

All of the following are factors in determining a method of transporting
classified materials

A

Size of package
Time requirement
Weight of material

21
Q

What are the four components of a distribution statement?

A

Authorized audience, reason for control, date of determination,
controlling office

22
Q

The Freedom of Information Act (FOIA) contains how many exemptions:

A

Nine

23
Q

What agency maintains the equipment evaluated product listing (EPL) for
destroying classified materials?

A

National Security Agency

24
Q

What is the formula used to determine access to classified information?

A

Access = Clearance + SF 312 + Need-to-Know

25
Q

Which of the following is NOT an authorized area for classified information?

A

Non-classified Internet Protocol (IP) Router Network (NIPRnet)

26
Q

What Standard Form (SF) records security container information?

A

700

27
Q

What Standard Form (SF) records the activity’s end-of-day security checks?

A

701

28
Q

What Standard Form (5F) records the activity’s security container checks?

A

702

29
Q

Part 1 of the SF 700 is not classified. It contains personally identifiable
information (PIl), protected by sealing Part 1 in an opaque envelope. What is
the statement printed on the outside of the envelope?

A

Security Container Information

30
Q

What vulnerability could a meeting or conference involving classified
information present?

A

Unauthorized Disclosure (UD)

31
Q

Security education, training, and awareness (SETA) is NOT important during a classified meeting or conference.

A

False

32
Q

Who is responsible for the overall management, functioning, and
effectiveness of the information security program (ISP)?

A

Head of the DoD Component

33
Q
What is an internal review and evaluation of an activities information
security program (ISP)?
A

Staff Assisted Visit (SAV)

34
Q

What is a “no fault” look at aspects of the information security program (ISP)?

A

Self-inspection

35
Q

What is an approved permanent exclusion or deviation from an information
security standard or requirement?

A

Exception

36
Q

What compromises national security?

A

National defense and foreign relations

37
Q

Which of the following is NOT a cybersecurity attribute?

A

Controllability

38
Q

Enclaving is creating an area of higher security within a larger area of lower
or more general security.

A

True

39
Q

What is the fifth step in the risk management process?

A

Determine countermeasures

40
Q

What is the fifth step in the risk management process?

A

Determine countermeasures

41
Q

What is the standard default combination for locks (electromechanical)
meeting FF-L-2740?

A

50-25-50

42
Q

Whose responsibility is physical security?

A

Commander or Director

43
Q

What Federal Specification must combination locks on vault doors, secure
rooms, and security containers follow to protect classified information?

A

FF-L-2740

44
Q

The adjudicative process is an examination of a sufficient period of a
person’s life to make an affirmative determination that the person is an
acceptable security risk.

A

True

45
Q

An authorized agency initiates a request for a national security eligibility
utilizing

A

SF-86 (eQIP)

46
Q

What is the purpose of the Personnel Security Program (PSP)?

A

To make reasonable determination individuals granted access to
classified information are loyal, trustworthy, and reliable.

47
Q

How many National Security Adjudicative Guidelines are there?

A

13

48
Q

What type of security investigation would be required to make a Top Secret
eligibility determination for an individual in a critical sensitive position?

A

Tier 5

49
Q

What type of security investigation would be required to make a Secret
eligibility determination for an individual in a non-critical sensitive position?

A

NACLC