100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Annual Security and Counterintelligence Awareness 2022 with complete solution

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
06-06-2023
Written in
2022/2023

Annual Security and Counterintelligence Awareness 2022 with complete solution When transporting classified information, the courier must have a DD Form 2501, and as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy duty material? -Answer- True What are the three classification levels of information? -Answer- 1. Confidential.. 2. Secret. 3. Top Secret. What is the purpose of the SF 701 "Activity Security Checklist" and the SF 702 "Security Container Check Sheet?" -Answer- They are used as part of the end-of-day security checks activities that process or store classified material. If you find classified material out of proper control you should take custody of the material and safeguard it, if possible, and immediately notify your security representative or supervisor? -Answer- True. In the event of a natural disaster, which of the following statements is true concerning an emergency action procedure for classified material? -Answer- The first priority is protection of life, followed by the protection of classified material. Using curbside mailboxes is an approved method for mailing classified information? - Answer- False. Which of the following statement below are true concerning security containers, vaults, or open storage areas? Select all that apply. -Answer- 1. The combination must be protected at the same level as the highest classification of the material authorized for storage. 2. Do not store items such as weapons, money, jewelry, precious metals or drugs in the same container as classified material. Which of the following are approved methods of discussing and transmitting classified material? Select all that apply. -Answer- 1. SIPRnet. 2. Secure Fax. 3. Secure Telephone. Which of the following methods are routinely used for destroying classified information? Select all that apply. -Answer- 1. Burning. 2. Approved cross-cut shredding. 3. Wet-pulping. Which of the following statements below must be on the front of a GSA-approved security container for storing classified information? -Answer- "General Services Administration-Approved Security Container" Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD Directive 5240.06 are subject to appropriate disciplinary action under regulations - Answer- True. Cyber Vulnerabilities to DoD Systems may include: -Answer- All the above. DoD personnel who suspect a coworker of possible espionage should: -Answer- Report directly to your CI or Security Office. Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and Behaviors; which of the following is not reportable? -Answer- None of the above. Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that 'may be indicative' of potential espionage activities by an individual who may have volunteered or been recruited by a foreign entity as a writing espionage agent. Examples of PEI include: -Answer- All of the above. Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or suspected foreign organization, person, or group (public, private, or governmental) that conducts intelligence activities to acquire U.S. information, block or impair U.S. intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The term includes foreign intelligence and security services and international terrorists." - Answer- True. Counterintelligence as defined in the National Security Act of 1947, is "information gathered and activities conducted to protect against espionage, other intelligence activities, sabotage, or assassinations conducted by or on behalf of foreign governments or elements thereof, foreign organizations or foreign persons, or international terrorist activities." -Answer- True. If you feel you are being solicited for information which of the following should you do? - Answer- All of the above. Foreign Intelligence Entities seldom use the Internet or other communications including social networking services as a collection method? -Answer- False. Foreign Intelligence Entities seldom use elicitation to extract information from people who have access to classified or sensitive information? -Answer- False. Collection Methods or operation frequently used by Foreign Intelligence Entities to collect information from DoD on the critical technology being produced within the cleared defense contractor facilities we support include: -Answer- All the above. Which of the following is not an example of an anomaly? -Answer- Foreign diplomat attempts to defect.. Which of the following statements are correct concerning why a person would need to obtain a security clearance? Select all that apply. -Answer- 1. To ensure trustworthy people have access to classified information. 2. To ensure only trustworthy people hold national security sensitive positions. All DoD civilian positions are categorized into which following security groups? -AnswerSpecial Sensitive, Critical Sensitive, Non-Critical Sensitive, and Non-Sensitive. Which of the following procedures is used to monitor personnel for new information or changes that could affect their eligibility to hold a security clearance or fill a sensitive position? -Answer- Continuous evaluation. Which of the following organizations is the sole authority for determining the clearance eligibility for non-intelligence agency DoD? -Answer- Department of Defense Consolidated Adjudications Facility (DoD CAF) Which of the following are part of the 13 national security adjudicators use to determine your eligibility for a clearance? Select all that apply. -Answer- 1. Personal conduct. 2. Criminal conduct. 3. Allegiance to the United States. When a security clearance is denied or revoked, the

Show more Read less









Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
June 6, 2023
Number of pages
6
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Annual Security and Counterintelligence Awareness 2022
with complete solution
When transporting classified information, the courier must have a DD Form 2501, and
as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy
duty material? -Answer- True

What are the three classification levels of information? -Answer- 1. Confidential..

2. Secret.

3. Top Secret.

What is the purpose of the SF 701 "Activity Security Checklist" and the SF 702 "Security
Container Check Sheet?" -Answer- They are used as part of the end-of-day security
checks activities that process or store classified material.

If you find classified material out of proper control you should take custody of the
material and safeguard it, if possible, and immediately notify your security
representative or supervisor? -Answer- True.

In the event of a natural disaster, which of the following statements is true concerning
an emergency action procedure for classified material? -Answer- The first priority is
protection of life, followed by the protection of classified material.

Using curbside mailboxes is an approved method for mailing classified information? -
Answer- False.

Which of the following statement below are true concerning security containers, vaults,
or open storage areas? Select all that apply. -Answer- 1. The combination must be
protected at the same level as the highest classification of the material authorized for
storage.

2. Do not store items such as weapons, money, jewelry, precious metals or drugs in the
same container as classified material.

Which of the following are approved methods of discussing and transmitting classified
material? Select all that apply. -Answer- 1. SIPRnet.

2. Secure Fax.

3. Secure Telephone.

Which of the following methods are routinely used for destroying classified information?
Select all that apply. -Answer- 1. Burning.

, 2. Approved cross-cut shredding.

3. Wet-pulping.

Which of the following statements below must be on the front of a GSA-approved
security container for storing classified information? -Answer- "General Services
Administration-Approved Security Container"

Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD
Directive 5240.06 are subject to appropriate disciplinary action under regulations -
Answer- True.

Cyber Vulnerabilities to DoD Systems may include: -Answer- All the above.

DoD personnel who suspect a coworker of possible espionage should: -Answer- Report
directly to your CI or Security Office.

Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and
Behaviors; which of the following is not reportable? -Answer- None of the above.

Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that
'may be indicative' of potential espionage activities by an individual who may have
volunteered or been recruited by a foreign entity as a writing espionage agent.
Examples of PEI include: -Answer- All of the above.

Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S.
intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The
term includes foreign intelligence and security services and international terrorists." -
Answer- True.

Counterintelligence as defined in the National Security Act of 1947, is "information
gathered and activities conducted to protect against espionage, other intelligence
activities, sabotage, or assassinations conducted by or on behalf of foreign
governments or elements thereof, foreign organizations or foreign persons, or
international terrorist activities." -Answer- True.

If you feel you are being solicited for information which of the following should you do? -
Answer- All of the above.

Foreign Intelligence Entities seldom use the Internet or other communications including
social networking services as a collection method? -Answer- False.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Brainboost Bedfordshire University
View profile
Follow You need to be logged in order to follow users or courses
Sold
21
Member since
4 year
Number of followers
14
Documents
727
Last sold
1 month ago

3.4

5 reviews

5
2
4
0
3
1
2
2
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions