CDSE Information Security test answers Already Passed
CDSE Information Security test answers Already Passed What are the steps of the information security program lifecycle? Classification, safeguarding, dissemination, declassification, and destruction Who provides implementation guidance for the Information Security Program within the DoD? a.Under Secretary of Defense for Intelligence (USD(I)) b. Director of the Information Security Oversight Office (ISOO) c. Heads of DoD Components ------WRONG--- d. Heads of Defense Agencies The unauthorized disclosure of Secret information could reasonably be expected to cause ____________________ to our national security. Serious damage The unauthorized disclosure of Confidential information could reasonably be expected to cause ____________________ to our national security. Exceptionally grave damage ---WRONG b. Serious damage c. Damage---???? Derivative classifiers are the individuals who generate or create new material based on existing classification guidance. TRUE _________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship. Revealed by b. Contained in ---WRONG c. Compilation In which order must documents containing classified information be marked? Portion markings, banner markings, classification authority block b. Portion markings, classification authority block, banner markings-----WRONG c. Banner markings, portion markings, classification authority block What information is listed in the classification authority block on a document containing classified information? Select all that apply. a. Classification level to downgrade to at a certain point in time (as applicable) ---CORRECT b. Who created the classified document c. Date on which to declassify the document----CORRECT d. Current classification level of the document e. Which source the information in the document was derived from Who references information from security classification guides (SCG) in order to classify information? a. Derivative classifiers b. Original Classification Authorities---WRONG c. Both derivative classifiers and Original Classification Authorities When not directly in an authorized individual's possession, classified documents must be stored in a GSA-approved security container. TRUE When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply. a. To prevent inadvertent viewing of classified information by unauthorized personnel--CORRECT b. To record the removal of classified information from a GSA-approved security container c. To alert holders to the presence of classified information Cleared U.S. military, civilian employees, or contractors may hand carry which type of classified information? ALL THE ABOVE Access control measures detect and deter deliberate attempts to gain unauthorized access to classified information. TRUE Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought. b. DoD Information Security Manual If an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this? a. Security Infraction---WRONG b. Spillage c. Security Violation What type of security incident has occurred if an individual neglects to complete the SF702 after securing the container? a. Security Infraction b. Spillage c. Security Violation ---WRONG What type of declassification process is the set date or event, determined by the Original Classification Authority (OCA), which will occur within 25 years from the date of original classification? Systematic Declassification -- wrong What type of declassification process occurs when information is scheduled to be declassified on the 31st of December, 25 years from the date of original classification? a. Automatic Declassification b. Mandatory Declassification Review--WRONG c. Systematic Declassification d. Scheduled Declassification Whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drives, and computers? a. Local information systems personnel b. Original Classification Authorities---WRONG c. National Security Agency The purpose of the DoD information security program is to _________________________. Select all that apply. -Protect national security information -Demonstrate a commitment to transparency in Government Which volumes of DoDM 5200.01 provide guidance and direction on classification management, marking, protection, and handling requirements for classified information? Select all that apply. a. Volume 1 b. Volume 2 c. Volume 3 Why must all documents containing classified information be marked using a sequential process? All of the above When are "Downgrade To" instructions listed in the classification authority block on documents containing classified information? As applicable What do derivative classifiers use to identify specific items or elements of information to be protected? Security Classification Guides (SCG) Where do the reasons for classifying certain items, elements or categories of information originally come from? Executive Order 13526 All _____________ GSA-approved security containers must conform to Federal Specification FF-L-2740. Locks for Which form is used to record the securing of vaults, rooms, and containers used for storing classified material? SF-702 Security Container Check Sheet The name of the recipient of classified information must be included on which part(s) of the packaging? Inner wrapped package Materials and work products submitted by Government, industry, and DoD civilians, contractors, and military members are subject to review by the Defense Office of Prepublication and Security Review (DOPSR) for public and controlled release. True What type of security incident has occurred when classified data is introduced on an information system not approved for that level of information? Spillage Spillage always requires an investigation to determine the extent of the compromise of classified information. True What type of declassification process is a way for members of the public to request the review of specific classified information? Mandatory Declassification Review Who maintains listings of evaluated destruction products that have been tested and meet performance requirements for destroying classified information? National Security Agency
Written for
- Institution
- CDSE Information Security
- Module
- CDSE Information Security
Document information
- Uploaded on
- December 3, 2023
- Number of pages
- 10
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cdse information security test answers already pas
Content preview
Also available in package deal