Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT Show
Home Subjects Solutions Create Log in Sign up Upgrade to remove ads Only ₩37,125/year
Terms in this set (52)Security Program lifecycle Classification, Safeguarding, Dissemination, Declassification, and Destruction Which volumes of DoDM 5200.01 provide guidance and direction on classification management, marking, protection and handling requirements for classified info Volume 1 unauthorized disclosure of ______ information could reasonably be expected to cause serious damage to our national security secret unauthorized disclosure of ______ information could reasonably be expected to cause exceptionally grave damage to our national security Top Secret unauthorized disclosure of ______ information could reasonably be expected to cause damage to our national security Confidential What is the basic formula for granting access to classified information for individuals -Verify the individuals eligibility determination Incorporating, paraphrasing, restating, or generating in new form any information that is already classified and marking the newly developed material consistent with the classification markings that apply to the source information Derivative Classification Initial determination that information requires, in the interest of national security, protection against unauthorized disclosure Original Classification A derivative classifier may overrule an original classification determination if it is in the interest of national security False When marking a classified document, the classifier must always start with which section? The portions/paragraphs within the document If the banner marking is TOP SECRET, it is possible that some portion markings in that document can be U for Unclassified True What information will you find in the Classification Authority block on the front page of any classified document -classified
by who issues security classification guides? Original classification authorities what info does a security classification guide provide a derivative classifier -Classification level for each element of information to be protected Cover sheet for TOP SECRET information SF-703 Cover sheet for SECRET information SF-704 Cover sheet for CONFIDENTIAL information SF-705 Activity Security Checklist SF-701 Security Container Check sheet SF-702 Security Container info (contents and combo) SF-700 You may store classified into in your locked desk drawer while you go to lunch as long as you cover it with the appropriate classified cover sheet False If your office is preparing to undergo renovations for the next few months and you will not be able to store classified info according to the requirements as specified in DoDM 5200.01, Vol 3, which of the following should you request Waiver (temporary) When can TOP SECRET info be sent via the United States Postal Service? never While manuscripts, articles, theses, conference papers, briefings, brochures, and books must be sent to the Defense Office of Prepublication and Security Review (DOPSR) for review and approval before publishing, reports to Congress do not require prepublication False Your manager hands you a TOP SECRET document but you are only eligible for SECRET access. If you think this is a security incident, what type of security incident do you think it is? Violation Your Coworker, bob, did not place an SF-704 SECRET classified document while it was out of the security container. However, bob did maintain positive control of the document until he returned to the security container. If you think this was a security incident, what type of security incident Infraction The declassification system where the public can ask for classified info to be reviewed for declassification and public release Mandatory Declassification Review The declassification system where info exempted from automatic declassification is reviewd systematic declassification the declassification system where an OCA sets a date or event for declassification Scheduled Declassification the declassification system where info is declassified when it is 25 years old Automatic Declassification Where would you find approved destruction equipment NSA Evaluated Products Listing the only type of acceptable document shredding is with a crosscut shredder true Requests for waivers and exceptions must identify the specific provision or provisions of the ____for which the waiver or exception is sought DoD Information Security Manual Where do the reasons for classifying certain items, elements or categories of information originally come from? INCORRECT Original Classification Authorities What are the steps of the information security program lifecycle classification, marking, dissemination, downgrading, destruction what type of declassification process is a way for members of the public to request the review of specific classified info Mandatory declassification review The unauthorized disclosure of top secret info could reasonably be expected to cause _____to our national security Exceptionally grave Damage Who has responsibility for overall policy direction of information security program Director of the information security oversight office In which order must documents containing classified info be marked Portion markings, banner markings, classification authority block what is required to access classified info all the above when info, in the interest of national security, no longer requires protection at any level, it should be Declassified what info do security classification guides profice about systems, plans, programs, progects, or missions? all of the above whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers NSA What are the authorized places for storing classified info -IT systems If an individual fails to secure the sensitive compartmented information facility at the end of the day and , subsequently, unescorted cleaning personnel access the scif and see classified info, what type of security incident is this security violation The unauthorized disclosure of this type of info could reasonable be expected to cause serious damage to our national security Secret When classified info is in an authorized individuals hands, why should the individual use a classified document cover sheet? -alert holder of presence of classified info What is the first step an Original Classification Authority must take when originally classifying information Determine if the information is official government info If an individual inserts a thumb drive containing classified info on a computer in the office that is not part off classified info system, what type of security incident is this? spillage what info is listed in the classification authority block on a document containing classified info? INCORRECT Which level of classified info may be transported via USPS mail -secret _______occurs in some circumstances when info that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship Compilation Sets with similar terms
LEARNING DOMAIN #3638 terms kyle72 CIPP/US82 terms kyle_black32PLUS LD 36: Info systems24 terms DRockefeller MIS 140 Midterm66 terms eavioli Sets found in the same folderCBAT - APR-39_AV1-4 (SCORM 1.2)22 terms Tactical_Tommy CBAT - AN/AVR-2B LDS19 terms Tactical_Tommy Level 1 Antiterrorism Awareness Training (JS-US007…33 terms jkrebs24 DoD Annual Security24 terms nataliyaardin08 Other sets by this creatorCommanders Safety Course v3.151 terms DeanOsubmission BE-7629 terms DeanOsubmission Fundamentals of Personnel Recovery (PR 102) Course…116 terms DeanOsubmission GPS Exam13 terms DeanOsubmission Verified questions
ADVANCED MATH The municipal sewer line runs straight through a new subdivision from point A(20, 20) to point B(80, 60) on a survey map. Houses at C(30, 70) and D(85, 20) need connections to this sewer line. The developer calculates that connecting to the sewer line at points E(50, 40) and F(65, 50) will minimize digging and the length of pipe required. a) Verify that the developer has found the shortest route from each house to the sewer line. b) To the nearest metre, what length of pipe is needed for the two connections if the intervals between grid lines on the survey each represent 2 m? c) The excavation contractor suggests digging a straight trench between the two houses and connecting to the sewer line at the point where the trench meets it. Find the coordinates of this point. d) Should the developer use the contractor’s suggestion? Justify your answer. Verified answer ADVANCED MATH Prove the following statements: (a) If gcd(a, n) = 1, then the integers $$ c, c+a, c+2 a, c+3 a, \ldots, c+(n-1) a $$ form a complete set of residues modulo n for any c. (b) Any n consecutive integers form a complete set of residues modulo n. [Hint: Use part (a).] (c) The product of any set of n consecutive integers is divisible by n. Verified answer
ADVANCED MATH A company manufactures two products. If it charges a price pi for product it can sell qi units of product i, where q1 = 60 − 3p1 + p2 and q2 = 80 − 2p2 + p1. It costs $25 to produce a unit of product 1 and$72 to produce a unit of product 2. How many units of each product should be produced to maximize profits? Verified answer
ADVANCED MATH The Clarke family considers the option of renting a car for 1 day, rather than the full week. One agent recommends a full-size car for a flat fee of $90/day with unlimited kilometres. Another agent recommends a mid-size car that costs$40/day plus 25 cents/km driven. a) Write an equation to represent the cost for the full-size car. b) Write an equation to represent the cost for the mid-size car. c) Solve to find when the costs of the two car are the same. d) In what circumstances will the mid-size car cost less? e) If the Clarkes want to drive to visit relatives in Parksville, about 120 km away, which option will cost less? Explain. Remember that they plan to return the car the same day. Verified answer Other Quizlet setsQuiz 3 concepts: Biodiversity, Evolution, and Spec…44 terms Nicholas_Dewey9 Sem 3 Anatomy B3: Descending Pathways & Spinal Tra…17 terms syk004 Short Stories Test15 terms avocadopenguin duchess of malfi !!!!78 terms n0lannnn Related questionsQUESTION When the message is emotional or personal, what form of communication is usually best? 15 answers QUESTION Coinsurance is typically due after the claim has been what? 4 answers QUESTION Which HIM professionals are responsible for developing the appropriate method for resolving coding or documentation disputes that are identified during a coding audit? 8 answers QUESTION What is the 3 letter and 1 letter code for Aspartate? 13 answers What are the different types of declassification processes and systems?There are three primary ways by which classified information is declassified: Automatic Declassification. Systematic Review. Mandatory Review.
What is the original classification authority?OCA rollover: Original Classification Authority An individual authorized in writing, either by the President, the Vice-President, or by agency heads or other officials designated by the President, to originally classify information in the first instance.
What are the 3 types of classified information?Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret.
What is the first step an original classification authority must take when originally classifying?Since the OCA must be the only one to classify the information, the OCA must first determine whether the information is official. This means the information must be owned by, produced by or for, or under the control of the U.S. Government.
|