2024/2025
What specifies classification levels, special requirements, and declassification
instructions for classified programs, projects, and plans? - CORRECT ANSWER-
Security Classification Guide
Which of the following is a true statement regarding the special handling requirements
of Foreign Government Information (FGI)?
A)When the classification marking on a document containing FGI is not in English, or
when the foreign government marking requires a different degree of protection than the
same U.S. classification designation, a U.S. marking that results in a degree of
protection equivalent to that required by the foreign government shall be applied.
B) A U.S. document containing FGI cannot be declassified or downgraded below the
highest level of FGI contained in the document without the permission of the foreign
government or international organization that originated the information.
C) Those holding security clearances issued by the U.S. government cannot access
U.S. documents containing FGI without written consent from the originating foreign
government.
D) The receiving DoD Components must maintain reco - CORRECT ANSWER-B) A
U.S. document containing FGI cannot be declassified or downgraded below the highest
level of FGI contained in the document without the permission of the foreign
government or international organization that originated the information.
Two security professionals - Paul and Ashley - are discussing the destruction of
classified information. Paul says the destruction of classified documents and material
shall be accomplished by means that eliminate risk of reconstruction of the classified
information they contain. Ashley says the material that has been identified for
destruction shall continue to be protected, as appropriate, for its classification until it is
actually destroyed. Who is correct? - CORRECT ANSWER-Paul and Ashley are both
correct.
A paragraph of a document which includes an "(N)" as part of the portion marking
indicates what specific type of classified information is contained in the paragraph? -
CORRECT ANSWER-Critical Nuclear Weapons Design Information (CNWDI)
What are the investigative and briefing requirements for access to NATO information? -
CORRECT ANSWER-Favorably adjudicated background investigation (T3 (10-year
scope) T5 within 5 years prior to assignment), and completed a NATO Briefing.
,According to E.O. 13556, which is considered a type of controlled unclassified
information?
-Communications Security (COMSEC) Information
-Declassified Information
-Law Enforcement Sensitive (LES) Information
-North Atlantic Treaty Organization (NATO) Information - CORRECT ANSWER-Law
Enforcement Sensitive Information
What is the purpose of marking classified materials? - CORRECT ANSWER-To alert
holders to the presence of classified information, how to properly protect it, and for how
long.
What is included in the markings of classified information? - CORRECT ANSWER-
Document holder as the sole authority to make transfer and dissemination
determinations.
What is the purpose of the Controlled Access Program Coordination (CAPCO) register?
- CORRECT ANSWER-To identify the official classification and control markings, and
their authorized abbreviations and portion markings.
When a classified data spill occurs, who is responsible for ensuring that policy
requirements for addressing an unauthorized disclosure are met? - CORRECT
ANSWER-Activity Security Manager
There are five information assurance attributes that are important to protect and defend
DoD networks and information. If there was a loss in non-repudiation, what would this
cause in relation to information assurance? - CORRECT ANSWER-Data may potentially
be available to unauthorized users via electronic form.
What are the 5 information assurance attributes that are important to protect and defend
DoD networks and information? - CORRECT ANSWER-Confidentiality
Integrity
Availability
Authenticity
Non-repudiation
At the end of the day, Karen was leaving and taking with her unclassified documents
she would review at home. When she began to review those documents that night, she
realized that classified materials had slipped in between the unclassified materials. Is
this a security violation or infraction? - CORRECT ANSWER-Security Violation
The ability to deny you are the sender of an email would be an indication of a lapse in
what? - CORRECT ANSWER-Integrity
Unauthorized disclosure and loss of privacy is a lapse in what? - CORRECT ANSWER-
Confidentiality
,What is the first action done to downgrade, declassify or remove classification
markings? - CORRECT ANSWER-Contact the Original Classification Authority through
the appropriate chain of command to confirm that the information does not have an
extended classification period.
What are some requirements to perform classified activities from a non-traditional
location? (e.g. the employee's home) - CORRECT ANSWER-Employee must be trained
to properly operate classified information systems, on the protection and storage of
classified information, and Communications Security (COMSEC) materials.
The employee must receive written approval for use of classified information and
equipment at home.
What is the purpose of the Personnel Security Program? - CORRECT ANSWER-To
ensure that only loyal, trustworthy, and reliable individuals may access classified
information or perform sensitive duties.
DoD reciprocally accepts existing national security eligibility determinations or
clearances from other Government agencies in accordance with which policy
document? - CORRECT ANSWER-Executive Order 13467, "Reforming Processes
Related to Suitability for Government Employment, Fitness for Contractor Employees,
and Eligibility for Access to Classified National Security Information"
Review of Tier 5 on an individual disclosed that the subject had been a member of an
anarchist organization dedicated to disestablishing existing Federal laws and
overthrowing the U.S. government by any means necessary, including violence.
Although the subject terminated his membership with the organization upon learning he
would be investigated for a clearance for his new position, he still maintains social
contact with several members of the anarchist organization. Based on this information,
which of the adjudicative guidelines is most appropriate for an adjudicator to apply to
the case? - CORRECT ANSWER-Allegiance to the United States
Which of the following is an element of the Personnel Security Program?
-Risk Assessment and Analysis
-Implementation
-Classification
-Continuous Vetting - CORRECT ANSWER-Continuous Vetting (Formerly Continuous
Evaluation)
Limited access to classified information for specific programs may be approved for non-
US citizens only if the following condition is met. - CORRECT ANSWER-The prior ten
years of the subject's life can be appropriately investigated.
, What is the investigative requirement for access to Single Integrated Operational Plan -
Extremely Sensitive Information (SIOP-ESI)? - CORRECT ANSWER-Individual has a
valid favorably adjudicated Tier 5 or Single Scope Background (SSBI) Investigation.
What is the criteria for personnel to be qualified for assignment to nuclear weapons
personnel reliability assurance positions? - CORRECT ANSWER-Individual is a U.S.
Citizen
Individual has a security clearance eligibility in accordance with the position
Individual must be continuously evaluated
What is the investigation requirement for initial assignment to a Presidential Support
Activity (i.e. Yankee White) Category 2 position? - CORRECT ANSWER-Favorably
completed Tier 5/Single Scope Background Investigation (SSBI) within 36 months
preceding selection.
What is the name of the adjudication process that refers to a person's identifiable
character traits and conduct sufficient to decide whether employment or continued
employment would or would not protect the integrity or promote the efficiency of Federal
service? - CORRECT ANSWER-Suitability Adjudication
All unclassified DoD information in the possession or control of non-DoD entities on
non-DoD information systems, to the extent provided by the applicable grant, shall
minimally be safeguarded under what standards? - CORRECT ANSWER-
Organizational wireless connections holding such information must be encrypted, and
those accessing such information must use encrypted wireless connections where
available when traveling.
Copies of personnel security investigative reports must be destroyed by DoD recipient
organizations, within how many days following completion of the necessary personnel
security determination? - CORRECT ANSWER-90 Days
What level(s) of access may be granted with Limited Access Authorization for non-U.S.
citizens? - CORRECT ANSWER-LAAs shall only be granted access at the Secret and
Confidential Levels
Which of the following is not considered when making a security clearance eligibility
determination?
Education Level
Alcohol Consumption
Financial Considerations
Psychological Conditions - CORRECT ANSWER-Education Level
A position that does not require eligibility for access to classified information, but having
the potential to cause significant or serious damage to national security may be
designated as what position sensitivity? - CORRECT ANSWER-noncritical sensitive