Security Refresher Test 2023.
A security violation involves the loss, compromise, or suspected compromise of
classified information. Security violations must be reported.
true
You are required to report all foreign travel prior to departure, including day trips
to Canada and Mexico.
false
When you signed the SCI NdS, you agreed that anything you gained from
unauthorized disclosure of SCI would become the property of the United States
Government.
true
Walls in SCIFs must extend from true floor to true ceiling.
true
An SCI document that contains the dissemination control marking NOFORN
indicates this document ___________________________________.
a. Is not releasable to foreign nationals
You must report external activist groups you or your co-workers are affiliated
with regardless of their nature.
true
Visitors may enter a SCIF without a visitor certification if they are escorted by
indoctrinated personnel.
true
If the ISSO permits it, you may share your password in a SCIF.
false
The access control system for unattended SCIF entry must use
____________________ and _______________________ such as an access card
and personal identification number (PIN).
b. Authentication, verification
SCI couriers must be appointed __________, have a signed letter of authorization
and know the rules and regulations governing couriers and transporting
classified material.
in writing
In a SCIF, SCI must always be stored in a GSA-approved container.
false
After setting the alarm on a SCIF, spinning the lock, and displaying the closed
sign, you must complete the _____________________ form
b. SF-701 NOT correct
Which is the primary database used to verify personnel access to SCIFs outside
DoD?
b. Joint Personnel Adjudication System (JPAS) NOT CORRECT
If a SCIF has a high security lock, then an access control system is not required.
false
, The SCI control system marking should not be listed in the banner line on a
classified document.
false
_____________ is technically derived intelligence data other than imagery and
signals intelligence that locates, identifies, or describes distinctive
characteristics of targets.
f. Measurement and Signature Intelligence (MASINT)
What piece of information is not required to be recorded on the SCIF visitor
control log?
f. Visitor's date of birth
The three primary types of SCIFs are referred to as closed storage SCIF, open
storage SCIF, and ___________________.
a. Continuous Operation SCIF
You must report any systemic weaknesses and anomalies.
true
When closing a closed storage SCIF you must ensure all classified material has
been stored, security containers are closed and locked, locked sign is displayed
on security containers, and the SF-701 form is completed.
true
SCI is required to be stored in a GSA-approved container in a Closed Storage
SCIF.
true
One company must be responsible for the installation, maintenance, and
monitoring of the Intrusion Detection System (IDS) for SCIFs.
true
SCI Material cannot be stored in _________________________________.
b. An open storage SCIF (WRONG)
_____________ uses imagery, imagery intelligence, or geospatial information to
describe, assess, and visually depict physical features and geographically
referenced activities on the earth.
b. Imagery Intelligence (IMINT) (WRONG)
Which of the following is the preferred method for transporting an SCI document
from one SCIF to another?
a. Defense Courier Service (DCS)
IS components, media, and/or memory may be brought into a SCIF and removed
from a SCIF if it has been properly logged and approved by the
__________________________.
c. Special Security Officer (SSO) or Information Systems Security Officer (ISSO)
Which of the following is an escort in a SCIF not required to do?
d. Process the visitor certifications for their visitors
You've noticed that Sydney has been very unhappy and disgruntled at work lately
in the SCIF. You are required to report this information about Sydney.
true
How long must SCIF visitor control logs be retained?
. 1 year after the last entry
Sensitive Compartmented Information (SCI) is ______________________.