Disclosure of Classified Information and
CUI 3/2024
When classified information or CUI appears in books, journals, print articles, internet-based
articles, etc., this is considered what type of UD?
A. Espionage
B. Data Spills
C. Public Domain
D. Improper Safeguarding of Information
C
Which of the following types of UD involve the transfer of classified information or CUI onto
an information system not authorized at the appropriate security level or having the required
CUI protection?
A. Data Spills
B. Public Domain
C. Improper Safeguarding of Information
D. Espionage
A
Which of the following terms identify activities designed to obtain, deliver, communicate, or
transmit classified information or CUI intended to aid foreign power?
A. Data spills
B. Public Domain
C. Improper Safeguarding of Information
D. Espionage
D
Improper safeguarding of information is defined as using inappropriate measures and
controls to protect classified information and/or CUI. (True or False)
A. True
, B. False
A
Classified information or CUI that has been put in the public domain is free to share. (True or
False)
A. True
B. False
B
The policy for the Whistleblower Protection Act (WPEA) is the same as that of Unauthorized
Disclosure (UD). (True or False)
A. True
B. False
B
Whistleblowing should be used to report which of the following? (Select all that apply)
A. Gross waste of funds
B. Gross mismanagement
C. Substantial danger to public health and safety D. Information disclosed to a reporter or
journalist
ABC
You have a classified document you would like to share with your coworker, Julie. What
requirements must Julie meet to be an authorized recipient? (Select all that apply)
A. Need-to-know
B. The same rank or position you hold or higher
C. Signed NDA
D. Favorable eligibility determination for access to the level of the classified information to be
shared
ACD
Which of the following describes your responsibility to protect classified information from
unauthorized disclosure? (Select all that apply)
A. Take it home to analyze the information first
B. Use classified document cover sheets
C. Follow guidelines for the reproduction of classified information
D. Store classified information in GSA-approved security containers or other approved
methods