of the following security program areas would you find practitioners who train and/
or advise Original Classification Authorities in the application of
... [Show More] the process for making
classification determinations?
A. Information Security
B. Physical Security
C. Personnel Security
D. Industrial Security - A. Information Security
Which of the following security program areas would you find practitioners working with a
facility's Antiterrorism Officer to deploy defensive measures designed to reduce the facility's
vulnerability from terrorist attacks?
A. Information Security
B. Physical Security
C. Personnel Security
D. Industrial Security - B. Physical Security
Which of the following security programs areas would you find practitioners involved with
processes that monitor employees for new information that could affect their security clearance
eligibility status?
A. Foreign Disclosure
B. Information Security
C. International Security
D. Operations Security
E. Personnel Security
F. Physical Security
G. Research and Technology Protection
H. Information Assurance - E. Personnel Security
Two security professionals - Paul and Ashley - are discussing security program areas.
Paul says that Information Security practitioners train and/or advise Original Classification
Authorities in the application of the process for making classification determinations.
Ashley says that Physical Security practitioners work with a facility's Antiterrorism Officer to
deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks.
Who is correct?
A. Paul is correct
B. Ashley is correct
C. Paul and Ashley are both correct
D. Paul and Ashley are both incorrect - C. Paul and Ashley are both correct
Two security professionals - Paul and Ashley - are discussing security program areas.
Paul says that Information Security practitioners work with a facility's Antiterrorism Officer to
deploy defensive measures designed to reduce the facility's vulnerability from terrorist attacks.
Ashley says that Personnel Security practitioners train and/or advise Original Classification
Authorities in the application of the process for making classification determinations.
Who is correct?
A. Paul is correct
B. Ashley is correct
C. Paul and Ashley are both correct
D. Paul and Ashley are both incorrect - D. Paul and Ashley are both incorrect
Which of the following is a true statement regarding the special handling requirements of Foreign Government Information (FGI)?
a. When the classification marking on a document containing FGI is not in English, or when the foreign government marking requires a different degree of protection than
the same U.S. classification designation, a U.S. marking that results in a degree of protection equivalent to that required by the foreign government shall be applied.
b. A U.S. document containing FGI cannot be declassified or downgraded below the highest level of FGI contained in the document without the permission of the foreign government or international organization that originated the information.
c. Those holding security clearances issued by the U.S. government cannot access U.S. documents containing FGI without written consent from the originating foreign government.
d. The receiving DoD Components must maintain records for 1 year of the receipt, internal distribution, destruction, annual inventory, access, reproduction, and transmittal of foreign government Top Secret information. - B
Which of the following is a requirement for access to North Atlantic Treaty Organization (NATO) information?
a. Personnel has been subject of a Single Scope Background Investigation (SSBI), including a National Agency Check (NAC) on the spouse and all members of the individual's immediate family of 18 years of age or over who are United States citizens other than by birth or who are resident aliens.
b. Personnel has been subject of a favorably adjudicated background investigation (BI) (10-year scope), Tier 5, current within five years prior to the assignment, and completed a NATO brief.
c. Personnel has been subject of a favorably adjudicated BI (10-year scope), Defense National Agency Check with Inquiries (DNACI)/ National Agency Check with Inquiries (NACI) or NACI Entrance National Agency Check (ENTNAC), current within five years prior to the assignment.
d. Personnel requiring access to NATO COSMIC (Top Secret) or SECRET information must at least possess the equivalent interim U.S. security clearance. - B
According to Executive Order 13556, which of the following
is considered a type of controlled unclassified information (CUI)?
a. Communications Security (COMSEC) Information
b. Declassified Information
c. Law Enforcement Sensitive (LES) Information
d. North Atlantic Treaty Organization (NATO) Information - C. Law Enforcement Sensitive Information
What is the purpose of marking classified materials?
a. To alert holders to the presence of classified information, how to properly protect it, and for how long.
b. To deter foreign adversaries from committing actions aimed at accessing such information.
c. To provide guidance for interpretation and analysis of classified information.
d. To alert holders to the methods used to collect classified information. - A
What is included in the markings of classified information?
a. Derivative classifier as the authority to make declassification determinations.
b. Agencies and authorities that have previously accessed the classified information.
c. Document holder as the sole authority to make transfer and dissemination determinations.
d. Sources and reasons for the classification. - C
What is the purpose of the Controlled
Access Program Coordination (CAPCO) register?
a. To identify the categories, types, and levels of Special Access Programs (SAPs.)
b. To define the authorities for classifying, declassifying, and regrading sensitive documents.
c. To identify the official classification and control markings, and their authorized abbreviations and portion markings.
d. To define the requirements, restrictions, and measures necessary to safeguard classified information from unauthorized disclosure. - C
When a classified data spill occurs, who is responsible for ensuring that policy requirements for addressing an unauthorized disclosure are met?
a. Activity Security Manager
b. Information Assurance Staff
c. Information Assurance Manager
d. Information Assurance Officer - A [Show Less]