- How often must you receive a defensive foreign travel briefing? Check all the apply.
At least once a year.
Prior to travel
- Top Secret document can be transmitted by which of the following methods? Select all that apply.
I got this Wrong.
- What form is used to request a background investigation?
SF 86
- Classified information can be safeguarded by using ***. Select all that apply.
Vaults, secure rooms, secure telephones
- What is the standard form of indentification for DoD employees?
CAC – Common Access Card
- Prior to foreign travel, you must ensure that your Antiterrorism / Force Protection Level 1 training is current.
True
- Incorporating, paraphrasing, restating, or generating in new form information that is already classified is know as ***
Derivative classification
- Which level of classified informatin could cause damage to national security if compromised?
Confidential
- Classified information can be destroyed using which of the following methods?
Shredding, burning, pulverizing
- The Personnel Security Program establishes *** for Personnel Security determinations and overall program management responsibilities.
Policies and procedures
- Which of the following materials are subject to pre-publication review? Select all that apply.
books, speech, article
- You may be subject to sanctions if you negligently disclose classified information.
True.
- Secret materials may be transmitted by the same methods as Confidential materials.
False.
- When opening and closing a security container, complete the ***
SF 702
- The physical security program prevents unauthorized access to which of the following? Select all that apply.
Personnel, facilities, information, equipment
- Derivative classifiers are required to have all the following except ***
approval of OCA
- A security infraction involves loss, compromise, or suspected compromise.
False is the correct answer.
- Which method may be used to transmit Confidential materials to DoD agencies?
USPS first class mail
- Which of the following are parts of the OPSEC process? Select all that apply.
Got this wrong.
OPSEC Process Five Steps
- Identification.
- Analysis of threats.
- Analysis of vulnerabilities.
Assessment of risks. - Application of appropriate countermeasures.
- Which of the following must be reported?
All of the above.
- Physical security is concerned with *** and *** measures designed to prevent unauthorized access.
active,passive
- What coversheet is attached to help protect a Secret document?
SF 704
- Which of the following is required to access classified information? Select all that apply.
Clearance eligibility, need-to-know, SF312
- What form is used to record end-of-day security checks?
SF 701
Top Secret documents can be transmitted by which of the following methods? (Select all that apply)
Defense Courier Service
Secure Fax