Scheduled maintenance: Saturday, September 10 from 11PM to 12AM PDT
Home
Subjects
Solutions
Create
Log in
Sign up
Upgrade to remove ads
Only ₩37,125/year
-
Flashcards
-
Learn
-
Test
-
Match
-
Flashcards
-
Learn
-
Test
-
Match
Navy information security relias
Terms in this set (20)
What type of declassification process is a way for members of the public to request the review of specific classified information?
Mandatory Declassification review
what is the first step an original classification authority must take when originally classifying
Determine if the information is official government information
whose guidelines should you follow for the destruction of storage media such as thumb drives, zip drivers, and computers?
National security agency
When classified information is in an authorized individual's hands, why should the individual use a classified document cover sheet? Select all that apply.
- To alert holders to the presence of classified information- To prevent inadvertent viewing of classified information by unauthorized personnel
If an individual fails to secure the Sensitive Compartmented Information Facility (SCIF) at the end of the day and, subsequently, unescorted cleaning personnel access the SCIF and see classified information, what type of security incident is this?
security violation
When information, in the interest of national security, no longer requires protection at any level, it should be:
Declassified
In which order must documents containing classified information be marked?
Portion markings, banner markings, classification authority block
What information do security classification guides (SCG) provide about systems, plans, programs, projects, or missions?
all of the above
Requests for waivers and exceptions must identify the specific provision or provisions of the _________________for which the waiver or exception is sought.
DOD information security manual
if an individual inserts a thumb drive containing classified information on a computer in the office that is not part of the classified information system, what type of security incident is this
...
The unauthorized disclosure of Top Secret information could reasonably be expected to cause __________ to our national security.
Exceptionally grave damage
What are the steps of the information security program life cycle?
...
What is required to access classified information? Select all that apply.
- Eligibility- Signed SF-312, Nondisclosure Agreement- Need-to-know
The unauthorized disclosure of this type of information could reasonably be expected to cause serious damage to our national security.
secret
Who has responsibility for the overall policy direction of the Information Security Program?
Director of the Information Security Oversight Office (ISOO)
Which level of classified information may be transported via USPS mail? Select all that apply.
- Confidential- Secret
Where do the reasons for classifying certain items, elements or categories of information originally come from?
Executive Order 13526
What information is listed in the classification authority block on a document containing classified information? Select all that apply.
- Who created the classified document- Classification level to downgrade to at a certain point in time (as applicable)- Which source the information in the document was derived form- Date on which to declassify the document
_________________ occurs in some circumstances when information that is individually unclassified, or classified at a lower level, may be classified, or classified at a higher level, only if the combined information reveals an additional association or relationship.
Compilation
What are the authorized places for storing classified information? Select all that apply.
In a GSA-approved security container- In information technology systems authorized for classified information- In an authorized individual's head or hands
Recommended textbook solutions
Elementary Number Theory
7th EditionDavid Burton
776 solutions
Complex Analysis: A First Course with Applications
3rd EditionDennis G. Zill, Patrick D. Shanahan
1,433 solutions
Advanced Engineering Mathematics
10th EditionErwin Kreyszig
4,134 solutions
Book of Proof
2nd EditionRichard Hammack
340 solutions
Sets with similar termsSFPC
60 terms
lrice1318
DoD INFORMATION SECURITY
74 terms
bweaver639
SPēD - SFPC - General (Information Security)
92 terms
NJPhillips01
Marking Classified Information
30 terms
Victoria_Olson9PLUS
Sets found in the same folderDoD Insider Threat Awareness
22 terms
TCB_14
UNAUTHORIZED DISCLOSURE REFRESHER COURSE
54 terms
txgurl3
Insider threat awareness
36 terms
john_van_den_berg
Unauthorized Disclosure of Classified Information
29 terms
BuhayNiKamatayan
Other sets by this creatorinisder threat awarness DoD
14 terms
ace2dodger
Unauthorized Disclosure of classified infromation
27 terms
ace2dodger
Verified questions
ADVANCED MATH
Determine the equivalence classes for the relation of (a) congruence modulo 2. (b) congruence modulo 8. (c) congruence modulo 1. (d) congruence modulo 7.
Verified answer
ADVANCED MATH
Decrypt the ciphertext 1030 1511 0744 1237 1719 that was encrypted using the RSA algorithm with key (n, k) = (2623, 869). [Hint: The recovery exponent is j = 29.]
Verified answer
ADVANCED MATH
Find the unique solution of each of the following superincreasing knapsack problems: (a) $118=4 x_{1}+5 x_{2}+10 x_{3}+41 x_{5}+99 x_{6}$ (b) $51=3 x_{1}+5 x_{2}+9 x_{3}+18 x_{4}+37 x_{5}$ (c) $54=x_{1}+2 x_{2}+5 x_{3}+9 x_{4}+18 x_{5}+40 x_{6}$
Verified answer
ADVANCED MATH
Of the 32 teams that qualified for the 2010 World Cup in South Africa, 24 were among the top teams in pretournament rankings. There were 13 European teams, and of the countries represented there, 28 had flags with colours other than red or white. Eleven top-ranked teams were from Europe, and 22 top ranked teams had flags with colors other than red or white. There were 10 European countries whose flag had a color other than red or white, and 9 of those were among the top-ranked teams. How many non-European countries with a red and white flag were not among the top-ranked teams?
Verified answer
Other Quizlet setsBoating Test
60 terms
TeetaOzaeta
Physiology of the Gastrointestinal Tract
161 terms
Danielle_Henry0908
Pharmacology: Heart Failure
62 terms
colleen_clinton1
Professional Standards and Responsibilities (CH. 4)
93 terms
msc47673
Related questionsQUESTION
If a person wants to get to know a person in class who he or she finds attractive and talks to a friend who also knows the person, he or she is using...?
5 answers
QUESTION
Write a Verilog assignment that drives each bit of w with a 0 value.
4 answers
QUESTION
when reporting 51 modifier to indicate multiple procedures performed which procedure should be reported first on the claim
10 answers
QUESTION
The NCCI files contain a CCM indicator. What does the CCM indicator 0 mean?
5 answers