What information do security classification guides SCG provide about Systems Plans Programs projects or missions?

Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT

Home

Subjects

Solutions

Create

Log in

Sign up

Upgrade to remove ads

Only ₩37,125/year

  • Flashcards

  • Learn

  • Test

  • Match

  • Flashcards

  • Learn

  • Test

  • Match

Navy information security relias

Terms in this set (20)

What type of declassification process is a way for members of the public to request the review of specific classified information?

Mandatory Declassification review

what is the first step an original classification authority must take when originally classifying

Determine if the information is official government information

whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drivers, and computers?

National security agency

When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply.

- To alert holders to the presence of classified information- To prevent inadvertent viewing of classified information by unauthorized personnel

If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?

security violation

When information, in the interest of national security, no longer requires protection at any level, it should be:

Declassified

In which order must documents containing classified information be marked?

Portion markings, banner markings, classification authority block

What information do security classification guides (SCG) provide about systems, plans, programs, projects, or missions?

all of the above

Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.

DOD information security manual

if an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this

...

The unauthorized disclosure of Top Secret information could reasonably be expected to cause __________ to our national security.

Exceptionally grave damage

What are the steps of the information security program life cycle?

...

What is required to access classified information? Select all that apply.

- Eligibility- Signed SF-312, Nondisclosure Agreement- Need-to-know

The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.

secret

Who has responsibility for the overall policy direction of the Information Security Program?

Director of the Information Security Oversight Office (ISOO)

Which level of classified information may be transported via USPS mail? Select all that apply.

- Confidential- Secret

Where do the reasons for classifying certain items, elements or categories of information originally come from?

Executive Order 13526

What information is listed in the classification authority block on a document containing classified information? Select all that apply.

- Who created the classified document- Classification level to downgrade to at a certain point in time (as applicable)- Which source the information in the document was derived form- Date on which to declassify the document

_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.

Compilation

What are the authorized places for storing classified information? Select all that apply.

In a GSA-approved security container- In information technology systems authorized for classified information- In an authorized individual's head or hands

Recommended textbook solutions

What information do security classification guides SCG provide about Systems Plans Programs projects or missions?

Elementary Number Theory

7th EditionDavid Burton

776 solutions

What information do security classification guides SCG provide about Systems Plans Programs projects or missions?

Complex Analysis: A First Course with Applications

3rd EditionDennis G. Zill, Patrick D. Shanahan

1,433 solutions

What information do security classification guides SCG provide about Systems Plans Programs projects or missions?

Advanced Engineering Mathematics

10th EditionErwin Kreyszig

4,134 solutions

What information do security classification guides SCG provide about Systems Plans Programs projects or missions?

Book of Proof

2nd EditionRichard Hammack

340 solutions

Sets with similar terms

SFPC

60 terms

lrice1318

DoD INFORMATION SECURITY

74 terms

bweaver639

SPēD - SFPC - General (Information Security)

92 terms

NJPhillips01

Marking Classified Information

30 terms

Victoria_Olson9PLUS

Sets found in the same folder

DoD Insider Threat Awareness

22 terms

TCB_14

UNAUTHORIZED DISCLOSURE REFRESHER COURSE

54 terms

txgurl3

Insider threat awareness

36 terms

john_van_den_berg

Unauthorized Disclosure of Classified Information

29 terms

BuhayNiKamatayan

Other sets by this creator

inisder threat awarness DoD

14 terms

ace2dodger

Unauthorized Disclosure of classified infromation

27 terms

ace2dodger

Verified questions

ADVANCED MATH

Determine the equivalence classes for the relation of (a) congruence modulo 2. (b) congruence modulo 8. (c) congruence modulo 1. (d) congruence modulo 7.

Verified answer

ADVANCED MATH

Decrypt the ciphertext 1030 1511 0744 1237 1719 that was encrypted using the RSA algorithm with key (n, k) = (2623, 869). [Hint: The recovery exponent is j = 29.]

Verified answer

ADVANCED MATH

Find the unique solution of each of the following superincreasing knapsack problems: (a) $118=4 x_{1}+5 x_{2}+10 x_{3}+41 x_{5}+99 x_{6}$ (b) $51=3 x_{1}+5 x_{2}+9 x_{3}+18 x_{4}+37 x_{5}$ (c) $54=x_{1}+2 x_{2}+5 x_{3}+9 x_{4}+18 x_{5}+40 x_{6}$

Verified answer

ADVANCED MATH

Of the 32 teams that qualified for the 2010 World Cup in South Africa, 24 were among the top teams in pretournament rankings. There were 13 European teams, and of the countries represented there, 28 had flags with colours other than red or white. Eleven top-ranked teams were from Europe, and 22 top ranked teams had flags with colors other than red or white. There were 10 European countries whose flag had a color other than red or white, and 9 of those were among the top-ranked teams. How many non-European countries with a red and white flag were not among the top-ranked teams?

Verified answer

Other Quizlet sets

Boating Test

60 terms

TeetaOzaeta

Physiology of the Gastrointestinal Tract

161 terms

Danielle_Henry0908

Pharmacology: Heart Failure

62 terms

colleen_clinton1

Professional Standards and Responsibilities (CH. 4)

93 terms

msc47673

Related questions

QUESTION

If a person wants to get to know a person in class who he or she finds attractive and talks to a friend who also knows the person, he or she is using...?

5 answers

QUESTION

Write a Verilog assignment that drives each bit of w with a 0 value.

4 answers

QUESTION

when reporting 51 modifier to indicate multiple procedures performed which procedure should be reported first on the claim

10 answers

QUESTION

The NCCI files contain a CCM indicator. What does the CCM indicator 0 mean?

5 answers

What information does security classification guide provide?

A security classification guide is the written record of an original classification decision or series of decisions regarding a system, plan, program, project, or mission.

WHO issues security classification guides SCG for Systems Plans Programs projects or mission?

Department of Defense (DoD) 5200.1-R, Information Security Program and Army Regulation (AR) 380-5, Department of the Army Information Security Program provide for the issuance of a security classification guide (SCG) for each system, plan, program, or project involving classified information.

What does a security classification guide provide quizlet?

a collection of precise decisions and comprehensive guidance regarding a specific system, plan, program, mission, or project. an originally classified document or a derivatively classified document developed from an original source.

What information is listed in the classification Authority block on a document containing classified information quizlet?

(U) The CLASSIFICATION AUTHORITY BLOCK will identify the individual who created the document, the source of classification, and the declassification instructions.