QUESTIONS WITH VERIFIED ANSWERS
1. If an employee has been absent from duty for 70 days and is returning to
work, what steps should be taken regarding their security clearance and
information handling according to the DoD Information Security Program?
No action is needed; the employee can resume duties without any
briefing
The employee should receive a Termination Briefing
before returning to work
The employee must undergo a full security clearance review before
returning
The employee should be immediately granted access to classified
information
2. If a government contractor discovers a box of old typewriter ribbons
containing classified information, what steps should they take to ensure
compliance with the DoD Information Security Program?
Store them in a locked cabinet until further notice
Dispose of them in the regular trash
Burn or shred the ribbons immediately
Send them to a recycling facility for proper disposal
3. If you are tasked with creating a derivative classification document
based on a classified source, which of the following actions would be
most
appropriate if you are unsure about the classification level of certain
information?
Classify the information at the highest level to be safe.
Consult the OCA or relevant guidelines to clarify the
classification level.
Omit the information entirely from the document.
, Use your best judgment without consulting any sources.
Paraphrase the information without concern for its original
classification.
4. Which of the following is NOT a component of Program Protection
Planning as defined by the Department of Defense Information Security
Program?
Classification Management
Foreign Disclosure
Operations Security (OPSEC)
Public Relations Management
5. What is defined as an unauthorized disclosure of classified
information within the DoD Information Security Program?
Security violation
Security infraction
Information assurance breach
Critical Program Information leak
6. Explain why the destruction of typewriter ribbons is important in
the context of the DoD Information Security Program.
To reduce waste and promote recycling
To prevent unauthorized access to classified information
To comply with environmental regulations
To ensure the ribbons can be reused
7. Explain the significance of assessing both intent and capability when
evaluating potential threats to the DoD Information Security
Program.
It helps to identify only the most obvious threats.
, It allows for a comprehensive understanding of how threats can
manifest.
It focuses solely on external threats, ignoring internal risks.
It simplifies the threat assessment process by reducing variables.
8. Explain the significance of reviewing inherited Critical Program Information
(CPI) in the context of the DoD Information Security Program.
It ensures that all classified information is destroyed.
It helps maintain the protection of sensitive information from
inherited systems.
It allows for the sharing of information between different
departments.
It eliminates the need for Original Classification Authorities.
9. Explain the significance of derivative classification in the context of
the Department of Defense Information Security Program.
It ensures that all classified information remains confidential and is
not shared.
It allows for the creation of new classified documents based on
existing classified information, maintaining the integrity of
sensitive data.
It simplifies the classification process by eliminating the need for
Original Classification Authorities.
It is a method used to declassify information that is no longer
sensitive.
10. If a new technology is developed that enhances missile guidance
systems, which of the following actions should be taken according to
the
Department of Defense Information Security Program?
Immediately declassify the technology to promote transparency.
, Add the technology to the Military Critical Technology List
for protection.
Share the technology with foreign allies without
restrictions. Conduct a public demonstration of the
technology.
11. What two documents are needed to access restricted data (RD)?
SF 312 and AF 2583
SF 312 Only
SF 701
AF 2563 only
12. Explain how Program Protection Planning aligns with risk
management principles in the context of the Department of Defense
Information Security Program.
It focuses solely on increasing security budgets.
It aims to apply security measures that are both cost-effective
and aligned with identified risks.
It disregards cost considerations in favor of maximum security.
It prioritizes the declassification of information over protection.
13. Which of the following is NOT a practice to follow when handling
classified information according to the DoD Information Security
Program?
Properly destroy preliminary drafts and worksheets after use
Use unapproved communication methods for
discussing classified information
Follow proper procedures when copying classified information
Use security forms such as SF 701 and SF 702