Security Specialist online course Flashcards
Hijacking is a good example of which threat type?
Terrorist
Which of the following is NOT an authorized source of classification
guidance?
DD Form 441
Acquiring technological secrets and selling them to foreign intelligence
operatives is a good example of which threat type?
Insider
Robbery is a good example of which threat type?
Criminal
A project manager stops by your office. Several members of his team
recently experienced difficult events in their personal lives, and he is worried
about them. Which of the following is not a perceived life crisis?
Car breaking down while driving home from work on a cold, rainy
night
What is the partnership between the U.S. Government and industry to
protect classified information?
The National Industrial Security Program (NISP)
Which of the following is NOT a Cognizant Security Agency (CSA) for the
National Industrial Security Program (NISP)?
Department of Treasury
Who has the authority to enter into, administer, and terminate contracts?
Contracting Officer (CO)
The___security program identifies the materials, processes, and
information requiring protection.
Information
Why does the Information Security Program (ISP) exist?
To mitigate the risk of unauthorized disclosure of protected
information
Which official, listed below, cannot authorize an individual in writing - original classification authority (OCA)?
The Security Manager
What is the incorporating, paraphrasing, restating, or generating in new form
information already classified?
Derivative classification
Which of the following is NOT an authorized source of classification
guidance?
DD Form 441
What is taking information from an authorized source of classification
guidance and re-wording it in a new or different document?
Paraphrasing (or restating)
What are the three required elements on a derivatively classified document?
Portion marking, banner marking (overall marking), classification
authority block
Which of the following is a determination to re- designate classified
information to a lower level of classification?
Downgrading
When information no longer requires protection, it is
Declassified
Derivative classifiers make declassification determinations.
False
What are the four systems for declassification?
Scheduled, Automatic, Mandatory Review, Systematic Review