SFPC BANK Flashcards
CERTIFICATION
Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)?
A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information.
Reference: 5200.01 Vol 1 and 4, Feb 24, 2012
A paragraph of a document which includes an “N” as part of the portion marking indicates what specific type of classified information is contained in the paragraph?
The additional (N) in the portion marking denotes that the classified material in the paragraph contains Critical Nuclear Weapons Designation Information (CNWDI). Reference: 5200.01 Vol 2, Mar 19, 2013 p17-18
Which of the following is a requirement for access to North Atlantic Treaty Organization (NATO) Information?
Personnel has been subject of a favorably adjudicated background investigation (BI) 10 year scope, Tier 5, current within five years prior to the assignment, and completed a NATO brief.
Reference: 5200.01 Vol 1, Feb 24, 2012 p30
According to Executive Order 13556, which of the following is considered a type of controlled unclassified information (CUI)?
Law Enforcement Sensitive (LES) Information- ref Ex Ord 13556
What is the purpose of the marking classified materials?
To alert holders to the presence of classified information, how to properly protect it, and for how long.
Reference: 5200.01 Vol 2, Mar 19, 2013 p17-18
What is included in the markings of classified information?
Document holder as the sole authority to make transfer and dissemination determinations.
Reference: 5200.01 Vol 2, Mar 19, 2013 p17-18
What is the purpose of the Controlled Access Program Coordination (CAPCO) register?
To identify the official classification and control markings, and their authorized abbreviations and portion markings.
Reference: 5200.01 Vol 2, Mar 19, 2013
When a classified data spill occurs, who is responsible for ensuring that policy requirements for addressing an unauthorized disclosure are met?
Activity Security Manager
Reference: DoDM 5200.01
There are five information assurance attributes that are important to protect and defend DoD Networks and information. If there was a loss in non-repudiation, what would this cause in relation to information assurance?
Data is no longer reliable, accurate, nor trusted.
Reference: DoDM 5200.01 v3
Which of the following examples describes a security violation rather than a security infraction?
At the end of the day, Karen was leaving and taking with her unclassified documents she would review at home. When she began to review those documents that night, she realized that classified materials had slipped in between the unclassified materials.
Reference: 5200.01 v3, March 19, 2013 p86
The inability to deny you are the sender of an email would be an indication of a lapse in?
Non-repudiation
Reference: Committee on National Security Systems Instruction No. 4009, Glossary. 5200.01 v3, March 19, 2013 p105
Unauthorized disclosure and loss of privacy is a lapse in?
Confidentiality
Reference: 4009, 5200.01 March 19, 2013 p86
Which of the following is the first action done to downgrade, declassify, or remove classification markings?
Through the appropriate chain of command, contact the original classification authority (OCA) to confirm that information does not have an extended classification period.
Reference: 5200.01, v2 March 19, 2013 p35-6
All of the following are requirements to perform classified activities from non-traditional locations, except:
The employee must receive written approval for use of classified information and equipment at home.
Reference: 5200.01 v3, March 19, 2013 p108-9
What is the purpose of the Personnel Security Program (PSP)?
To ensure that only loyal, trustworthy, and reliable individuals may access classified information or perform sensitive duties.
Reference: 5200.2-R, Feb 23, 1996, p13-93
DoD reciprocally accepts existing national security eligibility determinations or clearances from other Government agencies in accordance with which of the following policy documents?
Executive Order 13526, “Classified National Security Information”.
Reference: 5200.02-R
Current association with an organization dedicated to overthrowing the government by any means including violence is an example of which adjudication guideline?
Allegiance to the United States
Reference: 5200.02-R, App 8
Which of the following is considered an element of the Personnel Security Program?
Continuous Evaluation
Reference: 5200.02-R, Feb 23, 1996, p13-93
Limited access to classified information for specific programs may be approved for non-US citizens only under which of the following conditions?
The prior 10 years of the subject’s can be appropriately investigated.
Reference: 5200.02
Which of the following investigative requirement for access to Single Integrated Operational Plan-Extremely Sensitive Information (SIOP-ESI)?
Individual has a valid favorably adjudicated Tier 5 or Single Scope Background (SSBI) Investigation.
Reference: 5200.02-R, Feb 23, 1996
Which of the following is not qualifying criteria for personnel assigned to nuclear weapons personnel reliability assurance positions?
Individual is subject to a periodic reinvestigation every three years
Reference: 5200.02-R
Which is the following is correct regarding the investigation requirement for initial assignment to a Presidential Support Activities (i.e. Yankee White) Category 2 position?
Favorably completed Tier 5/Single Scope Background Investigation (SSBI) within 36 months preceding selection.
Reference: 5200.02-R, Feb 23, 1996, p29-31
Which of the following adjudication processes refers to a person’s identifiable character traits and conduct sufficient to decide whether employment or continued employment would or would not protect the integrity or promote the efficiency of the Federal Service?
Suitability adjudication
Reference: 5200.02-R
All unclassified DoD information in the possession or control of non-DoD entities on non-DoD information systems, to the extent provided by the applicable grant, shall minimally be safeguarded under which of the following standards?
Organizational wireless connections holding such information must be encrypted, and those accessing such information must use encrypted wireless connections where available when traveling.
Reference: 5200.01, v2 and v3, March 19, 2013; 5220.22-R, Dec 4, 1985; 5220.22-M Feb 28, 2006
Copies of personnel security investigative reports must be destroyed by DoD recipient organizations, within how many days following completion of the necessary personnel security determination?
90 days
Reference: 5200.2-R
Which of the following limitations is true regarding Limited Access Authorization (LAA) to non-U.S. citizens?
LAAs shall only be granted access at the Secret and Confidential levels.
Reference: 5200.2-R
Which of the following is NOT considered when making a security clearance eligibility determination?
Education Level
Reference: 5200.2-R
A position designated as a DoD noncritical-sensitive civilian position may fall under any of the following criteria, EXCEPT:
A position requiring eligibility for access to Top Secret information.
Reference: 5200.2-R
What information must a statement of reasons (SOR) include?
SOR must state why an unfavorable national security eligibility determination is being proposed. SOR must explain each security concern and state the specific facts that trigger each security concern. The SOR must identify applicable adjudicative guidelines for each concern, and provide the disqualifying conditions and mitigating conditions for each guideline. ALL OF THE ABOVE
Reference: 5200.2-R
Which type of briefing is used to obtain confirmation that a cleared employee agrees never to disclose classified information to an unauthorized person?
Special Briefings- Non-disclosure
Reference: 5200.01-M, Feb 24, 2012
DETERENCE
DETERRENCE is the security system performance goal of immediate indication of deliberate attempts; security probing and warning for inadvertent or mistaken intention is an example of which system security capability. Reference: 5200.08-R
When it comes to secure rooms, containers, and vaults… weapons or sensitive items should not be stored in the same security container as classified information. General Services Administration approves security containers used to store classified information.
TRUE
Reference: 5200.01 v3, Feb 24, 2012 p45-6
Which is the following is NOT a distinct phase of the Intrusion Detection System?
CONTROL
Reference: DoDM 5200.01-V3
Which of the following would be considered a public safety crime?
Theft of ammunition shipment for the purpose of criminal or gang related activity.
Reference: DoDM 5200.08R, May 27, 2009
Which of the following best describes the goal of the Physical Security Program?
To protect assets against compromise resulting from activities such as espionage, sabotage, terrorism, damage or loss, and criminal.
Reference: 5200.08-R, May 27, 2009, p 12-15
The process of integrating active and passive complementary physical security measures to ensure the protection of DoD assets is known as which of the following concepts?
Security-in-depth.
Reference: 5200.08-R, May 27, 2009, p 12-15
The stealing of sensitive, proprietary information related to U.S. aerospace and defense technologies with the intent to provide such information to a foreign adversary is an example of which type of threat to DoD assets?
Economic espionage.
Reference: 5200.08-R, May 27, 2009