(SCI) Security Refresher UPDATED
Actual Exam Questions and CORRECT
Answers
A security violation involves the loss, compromise, or suspected compromise of classified
information. Security violations must be reported. - CORRECT ANSWER✔✔- true
You are required to report all foreign travel prior to departure, including day trips to Canada
and Mexico. - CORRECT ANSWER✔✔- false
When you signed the SCI NdS, you agreed that anything you gained from unauthorized
disclosure of SCI would become the property of the United States Government. - CORRECT
ANSWER✔✔- true
Walls in SCIFs must extend from true floor to true ceiling. - CORRECT ANSWER✔✔- true
An SCI document that contains the dissemination control marking NOFORN indicates this
document ___________________________________. - CORRECT ANSWER✔✔- a. Is not
releasable to foreign nationals
You must report external activist groups you or your co-workers are affiliated with regardless
of their nature. - CORRECT ANSWER✔✔- true
Visitors may enter a SCIF without a visitor certification if they are escorted by indoctrinated
personnel. - CORRECT ANSWER✔✔- true
If the ISSO permits it, you may share your password in a SCIF. - CORRECT ANSWER✔✔-
false
The access control system for unattended SCIF entry must use ____________________ and
_______________________ such as an access card and personal identification number
(PIN). - CORRECT ANSWER✔✔- b. Authentication, verification
, SCI couriers must be appointed __________, have a signed letter of authorization and know
the rules and regulations governing couriers and transporting classified material. - CORRECT
ANSWER✔✔- in writing
In a SCIF, SCI must always be stored in a GSA-approved container. - CORRECT
ANSWER✔✔- false
After setting the alarm on a SCIF, spinning the lock, and displaying the closed sign, you must
complete the _____________________ form - CORRECT ANSWER✔✔- b. SF-701 NOT
correct
Which is the primary database used to verify personnel access to SCIFs outside DoD? -
CORRECT ANSWER✔✔- b. Joint Personnel Adjudication System (JPAS) NOT CORRECT
If a SCIF has a high security lock, then an access control system is not required. - CORRECT
ANSWER✔✔- false
The SCI control system marking should not be listed in the banner line on a classified
document. - CORRECT ANSWER✔✔- false
_____________ is technically derived intelligence data other than imagery and signals
intelligence that locates, identifies, or describes distinctive characteristics of targets. -
CORRECT ANSWER✔✔- f. Measurement and Signature Intelligence (MASINT)
What piece of information is not required to be recorded on the SCIF visitor control log? -
CORRECT ANSWER✔✔- f. Visitor's date of birth
The three primary types of SCIFs are referred to as closed storage SCIF, open storage SCIF,
and ___________________. - CORRECT ANSWER✔✔- a. Continuous Operation SCIF
You must report any systemic weaknesses and anomalies. - CORRECT ANSWER✔✔- true