TBS PHASE 1 EXAM QUESTIONS AND VERIFIED
ANSWERS CORRECT TOP-RATED A+ 2026
UPDATE||LATEST EXAM!!!
define Operational Security (OPSEC), - Answer-The
process to deny the enemy critical information about us.
identify immediate actions for safeguarding suspected
classified material - Answer-Report all security violations
or suspected compromises, including espionage attempts,
to the security manager immediately.
identify the levels of classified materials security
classification - Answer-1. Top Secret -
2. Secret
3. Confidential - -
4. Unclassified -
,2|Page
top secret - Answer-- unauthorized disclosure can be
expected to cause exceptionally grave damage to national
security. Orange cards
Secret - Answer-unauthorized disclosure could be
expected to cause serious damage to national security.
Red card indicator
Confidential - Answer-- could be expected to cause
identifiable damage to national security- blue cards
Unclassified - Answer-any other material not marked
identify procedures for classified material spillage or
compromise - Answer-Report all security violations or
suspected compromises, including espionage attempts, to
the security manager immediately.
Use classified material in a controlled environment that
limits the number of people who have access to it.
Cover or close material if uncleared personnel approach.
Never leave classified material unsecured.
Never take classified material home.
,3|Page
Memorize safe combinations; written records of
combinations are only maintained in the CMCC and may
not be held by any individual.
Store nothing valuable with classified material.
Do not discuss classified material with anyone other than
cleared personnel with need to know.
Destroy material exactly when told using the prescribed
method.
identify the procedures for reporting persons suspected of
espionage - Answer-report the incident or person
immediately to your chain of command, security manager,
S-2 Intelligence Officer, or Naval Criminal Investigative
Services (NCIS
identify the methods used by foreign agents to collect
information - Answer-1. Exploiting or stealing classified
equipment and technology
2. Illegally transferring U.S. technology from third countries
3. Covert espionage.
, 4|Page
4. Recruitment of Americans to a foreign cause or the
exploitation of human intelligence.
5. Cyber attacks
identify procedures for handling of "For Official Use Only"
materials - Answer-
identify ways to safeguard personally identifiable
information (PII) in - Answer-1. Ensuring that PI/PII
contained in a system of records, , is protected so that the
security and confidentiality of the information is preserved.
2. Not disclosing any information contained in a system of
records
3. Not maintaining unpublished official files.
4. Safeguarding the privacy of individuals and
confidentiality of PI/PII contained in a system of records.