STEPP Multiple Questions and Answers All
Correct.
The purpose of the dod information security program is to
_________________________. Select all that apply.
Select one or more:
A.
Protect national security information
B.
Demonstrate a commitment to transparency in Government
C.
Classify as much government information as possible - Correct
answer A and B
Which volumes of dodm 5200.01 provide guidance and direction
on classification management, marking, protection, and handling
requirements for classified information? Select all that apply.
Select one or more:
A.
Volume 1
B.
Volume 2
C.
Volume 3
D.
Volume 4 - Correct answer A, B and C
The unauthorized disclosure of this type of information could
reasonably be expected to cause exceptionally grave damage to
our national security.
Select one:
A.
Top Secret
B.
,Secret
C.
Confidential - Correct answer A
The unauthorized disclosure of this type of information could
reasonably be expected to cause damage to our national security.
Select one:
A.
Top Secret
B.
Secret
C.
Confidential - Correct answer C
Derivative classifiers are the individuals who generate or create
new material based on existing classification guidance.
Select one:
True
False - Correct answer True
If a derivative classifier believes information to be improperly
classified, they can _____________ the classification decision.
Select one:
A.
Ignore
B.
Override
C.
Challenge - Correct answer C
In which order must documents containing classified information
be marked?
Select one:
A.
Portion markings, banner markings, classification authority block
,B.
Portion markings, classification authority block, banner markings
C.
Banner markings, portion markings, classification authority block -
Correct answer A
What information is listed in the classification authority block on a
document containing classified information? Select all that apply.
Select one or more:
A.
Date on which to declassify the document
B.
Who created the classified document
C.
Classification level to downgrade to at a certain point in time (as
applicable)
D.
Which source the information in the document was derived from
E.
Current classification level of the document - Correct answer A, B,
C, D
Who references information from security classification guides
(SCG) in order to classify information?
Select one:
A.
Derivative classifiers
B.
Original Classification Authorities
C.
Both derivative classifiers and Original Classification Authorities -
Correct answer A
Who issues security classification guides (SCG) for systems,
plans, programs, projects, or missions?
, Select one:
A.
Derivative classifiers
B.
Original Classification Authorities
C.
Both derivative classifiers and Original Classification Authorities -
Correct answer B
All _____________ GSA-approved security containers must
conform to Federal Specification FF-L-2740.
Select one:
A.
Handles on
B.
Doors on
C.
Locks for - Correct answer C
When classified information is in an authorized individual's hands,
why should the individual use a classified document cover sheet?
Select all that apply.
Select one or more:
A.
To prevent inadvertent viewing of classified information by
unauthorized personnel
B.
To alert holders to the presence of classified information
C.
To record the removal of classified information from a GSA-
approved security container - Correct answer A and B
What is required to access classified information? Select all that
apply.
Select one or more:
Correct.
The purpose of the dod information security program is to
_________________________. Select all that apply.
Select one or more:
A.
Protect national security information
B.
Demonstrate a commitment to transparency in Government
C.
Classify as much government information as possible - Correct
answer A and B
Which volumes of dodm 5200.01 provide guidance and direction
on classification management, marking, protection, and handling
requirements for classified information? Select all that apply.
Select one or more:
A.
Volume 1
B.
Volume 2
C.
Volume 3
D.
Volume 4 - Correct answer A, B and C
The unauthorized disclosure of this type of information could
reasonably be expected to cause exceptionally grave damage to
our national security.
Select one:
A.
Top Secret
B.
,Secret
C.
Confidential - Correct answer A
The unauthorized disclosure of this type of information could
reasonably be expected to cause damage to our national security.
Select one:
A.
Top Secret
B.
Secret
C.
Confidential - Correct answer C
Derivative classifiers are the individuals who generate or create
new material based on existing classification guidance.
Select one:
True
False - Correct answer True
If a derivative classifier believes information to be improperly
classified, they can _____________ the classification decision.
Select one:
A.
Ignore
B.
Override
C.
Challenge - Correct answer C
In which order must documents containing classified information
be marked?
Select one:
A.
Portion markings, banner markings, classification authority block
,B.
Portion markings, classification authority block, banner markings
C.
Banner markings, portion markings, classification authority block -
Correct answer A
What information is listed in the classification authority block on a
document containing classified information? Select all that apply.
Select one or more:
A.
Date on which to declassify the document
B.
Who created the classified document
C.
Classification level to downgrade to at a certain point in time (as
applicable)
D.
Which source the information in the document was derived from
E.
Current classification level of the document - Correct answer A, B,
C, D
Who references information from security classification guides
(SCG) in order to classify information?
Select one:
A.
Derivative classifiers
B.
Original Classification Authorities
C.
Both derivative classifiers and Original Classification Authorities -
Correct answer A
Who issues security classification guides (SCG) for systems,
plans, programs, projects, or missions?
, Select one:
A.
Derivative classifiers
B.
Original Classification Authorities
C.
Both derivative classifiers and Original Classification Authorities -
Correct answer B
All _____________ GSA-approved security containers must
conform to Federal Specification FF-L-2740.
Select one:
A.
Handles on
B.
Doors on
C.
Locks for - Correct answer C
When classified information is in an authorized individual's hands,
why should the individual use a classified document cover sheet?
Select all that apply.
Select one or more:
A.
To prevent inadvertent viewing of classified information by
unauthorized personnel
B.
To alert holders to the presence of classified information
C.
To record the removal of classified information from a GSA-
approved security container - Correct answer A and B
What is required to access classified information? Select all that
apply.
Select one or more: