SPēD SFPC: All Areas – Flashcards
Unlock all answers in this set
Unlock answersquestion
            Principle incident/ events required to be reported to DoD counterintelligence (CI) organizations
answer
        espionage, sabotage, terrorism, cyber
question
            Indicators of insider threats
answer
        1. Failure to report overseas travel or contact with foreign nationals  2. Seeking to gain higher clearance or expand access outside the job scope  3. Engaging in classified conversations without a need to know  4. Working hours inconsistent with job assignment or insistence on working in private  5. Exploitable behavior traits   6. Repeated security violations  7. Attempting to enter areas not granted access to  8. Unexplainable affluence/living above one's means  9. Anomalies (adversary taking actions which indicate they are knowledgeable to information)  10. Illegal downloads of information/files
question
            Elements that should be considered in identifying Critical Program Information
answer
        Elements which if compromised could:  1. cause significant degradation in mission effectiveness, 2. shorten the expected combat-effective life of the system 3. reduce technological advantage  4. significantly alter program direction; or  5. enable an adversary to defeat, counter, copy, or reverseengineer the technology or capability.
question
            asset, threat, vulnerability, risk, countermeasures
answer
        Elements that a security professional should consider when assessing and managing risks to DoD assets
question
            The three categories of Special Access Programs
answer
        acquisition, intelligence, and operations and support
question
            Three different types of threats to classified information
answer
        Insider Threat, Foreign Intelligence Entities (FIE) and Cybersecurity Threat
question
            The concept of an insider threat
answer
        An employee who may represent a threat to national security. These threats encompass potential espionage, violent acts against the Government or the nation, and unauthorized disclosure of classified information, including the vast amounts of classified data available on interconnected United States Government computer networks and systems.
question
            The purpose of the Foreign Visitor Program
answer
        To track and approve access by a foreign entity to information that is classified; and to approve access by a foreign entity to information that is unclassified, related to a U.S. Government contract, or plant visits covered by ITAR.
question
            Special Access Program
answer
        A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.
question
            Enhanced security requirements for protecting Special Access Program (SAP) information
answer
        Within Personnel Security: • Access Rosters; • Billet Structures (if required); • Indoctrination Agreement; • Clearance based on an appropriate investigation completed within the last 5 years; • Individual must materially contribute to the program in addition to having the need to know; • All individuals with access to SAP are subject to a random counterintelligence scope polygraph examination; • Polygraph examination, if approved by the DepSecDef, may be used as a mandatory access determination; • Tier review process; • Personnel must have a Secret or Top Secret clearance; • SF-86 must be current within one year; • Limited Access; • Waivers required for foreign cohabitants, spouses, and immediate family members. Within Industrial Security: The SecDef or DepSecDef can approve a carve-out provision to relieve Defense Security Service of industrial security oversight responsibilities. Within Physical Security: • Access Control; • Maintain a SAP Facility; • Access Roster; • All SAPs must have an unclassified nickname/ Codeword (optional). Within Information Security: • The use of HVSACO; • Transmission requirements (order of precedence).
question
            Responsibilities of the Government SAP Security Officer/Contractor Program Security Officer (GSSO/ CPSO)
answer
        From Revision 1 Department of Defense Overprint to the National Industrial Security Program Operating Manual Supplement - 1 April 2004: • Possess a personnel clearance and Program access at least equal to the highest level of Program classified information involved. • Provide security administration and management for his/her organization. • Ensure personnel processed for access to a SAP meet the prerequisite personnel clearance and/or investigative requirements specified. • Ensure adequate secure storage and work spaces. • Ensure strict adherence to the provisions of the NISPOM, its supplement, and the Overprint. • When required, establish and oversee a classified material control program for each SAP. • When required, conduct an annual inventory of accountable classified material. • When required, establish a SAPF. • Establish and oversee a visitor control program. • Monitor reproduction and/or duplication and destruction capability of SAP information • Ensure adherence to special communications capabilities within the SAPF. • Provide for initial Program indoctrination of employees after their access is approved; rebrief and debrief personnel as required. • Establish and oversee specialized procedures for the transmission of SAP material to and from Program elements • When required, ensure contractual specific security requirements such as TEMPEST Automated Information System (AIS), and Operations Security (OPSEC) are accomplished. • Establish security training and briefings specifically tailored to the unique requirements of the SAP.
question
            The four Cognizant Security Agencies (CSAs)
answer
        Department of Defense (DoD), Director of National Intelligence (DNI), Department of Energy (DoE), and the Nuclear Regulatory Commission (NRC).
question
            Cognizant Security Agencies (CSA)s' role in the National Industrial Security Program (NISP).
answer
        Establish an industrial security program to safeguard classified information under its jurisdiction.
question
            Critical Program Information in DoD
answer
        1. U.S. capability elements that contribute to the warfighter's advantage throughout the life cycle, which if compromised or subject to unauthorized disclosure, decrease the advantage. 2. Elements or components of a Research, Development, and Acquisition (RDA) program that, if compromised, could cause significant degradation in mission effectiveness; shorten the expected combat-effective life of the system; reduce technological advantage; significantly alter program direction; or enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability. Includes information about applications, capabilities, processes and end-items. Includes elements or components critical to a military system or network mission effectiveness. Includes technology that would reduce the U.S. technological advantage if it came under foreign control.
question
            Primary authorities governing foreign disclosure of classified military information
answer
        1. Arms Export Control Act 2. National Security Decision Memorandum 119 3. National Disclosure Policy-1 4. International Traffic in Arms Regulation (ITAR) 5. E.O.s 12829, 13526 6. Bilateral Security Agreements 7. DoD 5220.22-M, "NISPOM,"
question
            The purpose of the DD Form 254
answer
        Convey security requirements, classification guidance and provide handling procedures for classified material received and/or generated on a classified contract.
question
            Factors for determining whether U.S. companies are under Foreign Ownership, Control or Influence (FOCI)
answer
        1. Record of economic and government espionage against the U.S. targets 2. Record of enforcement/engagement in unauthorized technology transfer 3. Type and sensitivity of the information that shall be accessed 4. The source, nature and extent of FOCI 5. Record of compliance with pertinent U.S. laws, regulations and contracts 6. Nature of bilateral & multilateral security & information exchange agreements 7. Ownership or control, in whole or part, by a foreign government
question
            The purpose and the function of the Militarily Critical Technologies List (MCTL).
answer
        1. Serves as a technical reference for the development and implementation of DoD technology, security policies on international transfers of defense-related goods, services, and technologies as administered by the Director, Defense Technology Security Administration (DTSA). 2. Formulation of export control proposals and export license review
question
            Security Infraction
answer
        This event cannot reasonably be expected to and does not result in the loss, compromise, or suspected compromise of classified information
question
            DoD Manual 5200.01, Volumes 1-4
answer
        The manual that governs the DoD Information Security Program
question
            E.O. 13526
answer
        The executive order that governs the DoD Information Security Program
question
            32 CFR Parts 2001 & 2003, "Classified National Security Information; Final Rule"
answer
        The Information Security Oversight Office (ISOO) document that governs the DoD Information Security Program
question
            Security Violation
answer
        An event that results in or could be expected to result in the loss or compromise of classified information
question
            Unauthorized Disclosure
answer
        Communication or physical transfer of classified or controlled unclassified information to an unauthorized recipient
question
            SSBI
answer
        Initial investigation for military, contractors, and civilians: · Special-Sensitive positions · Critical-Sensitive positions1 · LAA · Top Secret clearance eligibility · IT-I duties
question
            ANACI
answer
        Initial investigation for civilians: · Noncritical-Sensitive positions2 · Confidential and Secret clearance eligibility · IT-II duties
question
            NACLC
answer
        Initial National Agency Check with Law and Credit for military and contractors:  · Secret or Confidential clearance eligibility · All military accessions and appointments · IT-II duties · IT-III duties (military only)
question
            NACI
answer
        National Agency Check with Inquiries for civilians and contractors: · Non-Sensitive positions · Low Risk · HSPD-12 Credentialing
question
            NAC
answer
        The fingerprint check portion of a PSI
question
            The purpose of due process in Personnel Security Program (PSP)
answer
        Ensures fairness by providing the subject the opportunity to appeal an unfavorable adjudicative determination
question
            The key procedures for initiating Personnel Security Investigations (PSIs)
answer
        1. Validate the need for an investigation 2. Initiate e-QIP 3. Review Personnel Security Questionnaire (PSQ) for completeness 4. Submit electronically to OPM
question
            DoD position sensitivity types and their investigative requirements.
answer
        1. Critical Sensitive 2. Non-Critical Sensitive 3. Non-Sensitive
question
            Investigative requirement for a Critical- Sensitive position
answer
        SSBI, SSBI-PR, or PPR
question
            Investigative requirement for a Non-Critical Sensitive position
answer
        ANACI or NACLC
question
            Investigative requirement for a Non-Sensitive position
answer
        NACI
question
            Revocation
answer
        The term when current security clearance eligibility determination is rescinded
question
            Denial
answer
        The term when an initial request for security clearance eligibility is not granted
question
            SOR
answer
        Statement of Reasons
question
            What is the purpose of the Statement of Reasons (SOR)?
answer
        The purpose of the SOR is to provide a comprehensive and detailed written explanation of why a preliminary unfavorable adjudicative determination was made.
question
            The 13 Adjudicative Guidelines
answer
        1. Allegiance to the United States 2. Foreign Influence 3. Foreign Preference 4. Sexual Behavior 5. Personal Conduct 6. Financial Considerations 7. Alcohol Consumption 8. Drug Involvement 9. Psychological Conditions 10. Criminal Conduct 11. Handling Protected Information 12. Outside Activities 13. Use of Information Technology Systems
question
            Three different types of approved classified material storage areas.
answer
        1. GSA-approved storage containers 2. Vaults (including modular vaults) 3. Open storage area (secure rooms, to include SCIFs and bulk storage areas)
question
            Construction requirements for vault doors
answer
        1. Constructed of metal 2. Hung on non-removable hinge pins or with interlocking leaves. 3. Equipped with a GSA-approved combination lock. 4. Emergency egress hardware (deadbolt or metal bar extending across width of door).
question
            The purpose of intrusion detection systems
answer
        To detect unauthorized penetration into a secured area
question
            The purpose of perimeter barriers
answer
        To define the physical limits of an installation, activity, or area, restrict, channel, impede access, or shield activities within the installation from immediate and direct observation
question
            The purpose of an Antiterrorism Program
answer
        Protect DoD personnel, their families, installations, facilities, information, and other material resources from terrorist acts
question
            Force Protection Condition levels
answer
        Normal, Alpha, Bravo, Charlie, Delta
question
            The concept of security-in-depth
answer
        Layered and complementary security controls sufficient to deter, detect, and document unauthorized entry and movement within an installation or facility.
question
            e-QIP
answer
        The system Mr. Smith needs to access when he needs to update his personal information on his Personnel Security Questionnaire for his re-investigation
question
            Personnel Security Investigation
answer
        The first phase of the security clearance process
question
            JCAVS
answer
        A security manager uses this system to communicate with the DoD CAF
question
            JAMS
answer
        This sub-system (used by adjudicators) and JCAVS make up the JPAS system
question
            JPAS
answer
        A DoD system of record for personnel security clearance information
question
            Scattered Castles
answer
        Intelligence Community (IC) Personnel Security Database that verifies personnel security access and visit certifications.
question
            Personnel Security Investigation (PSI)
answer
        The DoD uses this as the standard for the uniform collection of relevant and important background information about an individual.
question
            Access
answer
        PSIs are used to determine the eligibility of an individual for ___________ to classified information.
question
            Acceptance
answer
        PSIs are used to determine the eligibility of an individual for ___________ or retention to the armed forces.
question
            Assignment
answer
        PSIs are used to determine the eligibility of an individual for ___________ or retention to sensitive duties.
question
            False
answer
        True or False: The DoD CAF is the only authority who can grant an interim clearance.
question
            DoD CAF responsibilities
answer
        1. Making adjudicative decisions 2. The DoD CAF is a repository for investigative records 3. Initiating special investigations 4. The DoD CAF adjudicate by applying the whole person concept
question
            Designation of Sensitive Duties
answer
        Duties that have a great impact on National Security
question
            Continuous Evaluation
answer
        This is used to monitor employees for new information or changes that could affect their status.
question
            Reinvestigation
answer
        This is part of the Continuous Evaluation Program (CEP). It is done at certain intervals based on duties or access.
question
            True
answer
        True or False: Special access requirements are designed to provide an additional layer of security to some of our nation's most valuable assets.
question
            False. Threats and vulnerabilities are related but distinct. Threats to national security exploit vulnerabilities.
answer
        True or False: There is no difference between a threat and a vulnerability.
question
            E.O. 12968
answer
        The Executive Order (E.O.) that establishes a uniform Personnel Security Program
question
            DoD 5200.2-R
answer
        Implements and maintains the DoD personnel security policies and procedures
question
            USD(I) Memorandum, August 30, 2006
answer
        Defines the Adjudicative Guidelines
question
            DCII
answer
        This is a system of records of fraud investigations
question
            SII
answer
        This is a system of records of PSIs conducted by OPM
question
            Scope
answer
        This refers to when adjudicators must ensure that an investigation meets the minimum timeframe and element requirements before reviewing the investigation.
question
            Administrative Judge
answer
        During due process, military and civilian personnel may request an in-person appearance before this individual.
question
            DOHA
answer
        Administers due process for contractor personnel.
question
            PSAB/Appeal Board
answer
        This board makes the final appeal determination for all personnel
question
            Termination Briefing
answer
        This briefing is given when an individual's employment is terminated, clearance eligibility is withdrawn, or if the individual will be absent from duty for 60 days or more. It is also given to those who have been inadvertently exposed to classified information.
question
            Foreign Travel Briefing
answer
        This briefing that applies to cleared personnel who plan to travel in or through foreign countries, or attend meetings attended by representatives of other countries.
question
            Refresher Briefing
answer
        This briefing is presented annually to personnel who have access to classified information or assignment to sensitive duties.
question
            What SAPs aim to achieve
answer
        1. Protect technological breakthroughs 2. Cover exploitation of adversary vulnerabilities 3. Protect sensitive operational plans 4. Reduce intelligence on U.S. capabilities
question
            Protection Level
answer
        This communicates how the SAP is acknowledged and protected.
question
            Acknowledged
answer
        This protection level describes a SAP whose existence may be openly recognized. Its purpose may be identified. However, the details of the program (including its technologies, materials, and techniques) are classified as dictated by their vulnerability to exploitation and the risk of compromise. The funding is generally unclassified.
question
            Unacknowledged
answer
        This protection level describes a SAP whose existence and purpose are protected. The details, technologies, materials, and techniques are classified as dictated by their vulnerability to exploitation and the risk of compromise. The program funding is often classified, unacknowledged, or not directly linked to the program.
question
            SAP Lifecycle
answer
        1. Establishment (is extra protection warranted?) 2. Management and Administration (continued need? processed followed?) 3. Apportionment (proper measures in place? approval received) 4. Disestablishment (program no longer needed?)
question
            Component-level SAP Central Offices
answer
        Exist for each military component, the Joint Chiefs of Staff, Defense Advanced Research Projects Agency (DARPA), and Missile Defense Agency (MDA)
question
            Special Access Program Oversight Committee (SAPOC)
answer
        The final SAP approving body chaired by the Deputy Secretary of Defense
question
            Senior Review Group (SRG)
answer
        This group ensures there are no duplicative efforts across SAPs
question
            DoD Special Access Central Office (SAPCO)
answer
        DoD SAP legislative liaison that notifies Congress of SAP approval
question
            Authorization, Appropriations, and Intelligence Congressional
answer
        Congressional committees granted SAP access
question
            OSD-level SAP Central Offices
answer
        Exercise oversight authority for the specific SAP category under their purview.
question
            PIE-FAO
answer
        People, information, equipment, facilities, activities, and operations
question
            Antiterrorism Officer
answer
        This person is responsible for the installation's antiterrorism program
question
            CI Support
answer
        Responsible for providing valuable information on the capabilities, intentions, and threats of adversaries
question
            OPSEC Officer
answer
        This person analyzes threats to assets and their vulnerabilities
question
            Security Officer
answer
        This person is charged with management, implementation, and direction of all physical security programs
question
            Law Enforcement
answer
        Must be integrated into our intelligence gathering process so that they can be part of coordinating emergency responses and criminal incidents on a Federal installation
question
            Criticality
answer
        Determination based on an asset's importance to national security and effect of loss
question
            Area Security
answer
        Security is geared towards protecting an entire area of the installation or facility
question
            Threat
answer
        The intention and the capability of an adversary to undertake detrimental actions
question
            Point Security
answer
        Security focused on the resource itself
question
            Effective Protective Barriers
answer
        1. Steel barriers 2. Chain link fence 3. Barbed wire
question
            Purpose of protective barriers
answer
        1. Establishing boundaries 2. Protecting the facility 3. Stopping observation
question
            Controlling access
answer
        The establishment of a restricted area improves security by ______________ and providing additional layers of security.
question
            True
answer
        True or False: Site lighting is used to enable guard force personnel to observe activities inside or outside the installation
question
            False
answer
        True or False: Standby lighting is used when regular lighting is not available
question
            Two-way radio
answer
        Using these assists in security; however, there must always be back-up communication systems in addition to these
question
            Intrusion Detection Systems
answer
        This device sends a signal through wires when it has been triggered
question
            Closed Circuit Televisions (CCTV)
answer
        This system has a camera that captures a visual image, converts the image to a video signal, and transmits the image to a remote location
question
            Automated access control systems
answer
        This system allows one to be identified by their eye, handprint, or fingerprint
question
            Common Access Card (CAC)
answer
        This enables individuals to be able to authenticate themselves on security websites and securely log into computer systems
question
            Mechanical combination lock
answer
        Older style of lock; may be used for classified storage in certain cases
question
            Combination padlock
answer
        Lock that complies with UL Standard 768-Group 1
question
            Electromechanical combination lock
answer
        Lock that complies with FF-L-2740 series lock specification
question
            Low security padlock
answer
        Lock that has limited resistance to forced entry
question
            SCIF
answer
        A facility used by the intelligence community
question
            GSA
answer
        The governing authority to approve security containers
question
            Secure rooms
answer
        Areas designed and authorized for the open storage of classified information. These facilities are usually build to commercial construction standards and do not afford the extra security inherent with a vault.
question
            Vaults
answer
        Constructed to meet strict forcible entry standards, including reinforced concrete on all walls, ceiling, and floor, plus a hardened steel door
question
            High terrorist threat level
answer
        The terrorist threat level indicating anti-U.S. terrorists are operationally active and use large casualty-producing attacks as their preferred method of operation. There is a substantial DoD presence, and the operating environment favors the terrorist.
question
            Low terrorist threat level
answer
        The terrorist threat level indicating no terrorist group is detected or the terrorist group in non-threatening
question
            Significant terrorist threat level
answer
        The terrorist threat level indicating anti-U.S. terrorists are present and attack personnel as their preferred method of operation, or a group uses large casualty-producing attacks as their preferred method but has limited operational activity. The operating environment is neutral.
question
            Moderate terrorist threat level
answer
        The terrorist threat level indicating terrorists are present but there are no indications of anti-U.S. activity. The operating environment favors the host nation or the U.S.
question
            Physical security plan
answer
        At a minimum, these should include special and general guard orders, access and material control, protective barrier lighting systems, locks, and Intrusion Detection Systems (IDS)
question
            Industrial
answer
        Much of U.S. classified information originates within this environment
question
            Defense Security Service
answer
        Security compliance is overseen by this organization if a contractor works at his/her own facility
question
            Installation
answer
        A contractor must adhere to the security rules of the __________ commander when working at a government installation
question
            NISP
answer
        The program that covers protection of classified information by government contractors
question
            FSO responsibilities
answer
        1. Ensure compliance with the NISP 2. Follow NISPOM guidelines 3. Provide training for cleared individuals
question
            Chapter 8 of the NISPOM
answer
        If you are a government contractor working on a contractor-owned system at a contractor facility, you must follow the security provisions of this reference
question
            True
answer
        True or False: A SAP can retain security cognizance if necessary.
question
            Contracting Officer
answer
        A government employee with the authority to enter into, administer, and/or terminate contracts and make related determinations and findings
question
            COTR
answer
        This government employee is a subject matter expert who has regular contact with the contractor
question
            Statement of Work (SOW)
answer
        The document that outlines in detail what will be required to complete a contract
question
            DD Form 441
answer
        The document that establishes the government's authority to review the contractor's security program to ensure compliance
question
            DD Form 254
answer
        The form a contractor could use to determine if classified storage is required, and at what level
question
            Same
answer
        A cleared individual can only have access at the _______ level as the facility clearance
question
            JPAS
answer
        For the purpose of a visit to another cleared facility, a clearance can be verified by looking in ________
question
            Eligibility
answer
        The issuance of ________ is the responsibility of the DoD CAF
question
            Secret
answer
        Unauthorized disclosure of this information could reasonably be expected to cause serious damage to our national security.
question
            Top Secret
answer
        Unauthorized disclosure of this information could reasonably be expected to cause exceptionally grave damage to our national security.
question
            Confidential
answer
        Unauthorized disclosure of this information could reasonably be expected to cause damage to our national security.
question
            Derivative Classification
answer
        This is defined as the incorporating, paraphrasing, restating, or generating in new form any information that is already classified.
question
            Original Classification
answer
        This is defined as an initial determination that information requires, in the interest of national security, protection against unauthorized disclosure.
question
            Compilation
answer
        This is defined as unclassified information or classified information (at a lower level) that when the information is combined or associated reveals additional factors that qualifies for classification.
question
            Original Classification Authority
answer
        The term used to identify individuals specifically authorized in writing to make initial classification decisions.
question
            Security Classification Guides (SCG)
answer
        This contains classification levels, special requirements and duration instructions for programs, projects, plans, etc.
question
            Original Classification Process
answer
        The six step process an OCA applies in making classification determinations
question
            Declassification
answer
        The authorized change in the status of information goes from classified information to unclassified information
question
            Automatic declassification
answer
        The declassification system where Permanently Valuable Historical records are declassified when they are 25 years old
question
            Systematic declassification review
answer
        The declassification system where information exempted from automatic declassification is reviewed for possible declassification
question
            Mandatory Declassification Review (MDR)
answer
        The declassification system where the public can ask for classified information be review for declassification and public release
question
            Scheduled Declassification
answer
        The declassification system where an OCA, at the time the information is originally classified, sets a date or event for declassification
question
            Custodians
answer
        People who are in possession of, or who are otherwise charged with safeguarding classified information
question
            Options an OCA has when determining declassification
answer
        Specific Date, Specific Event, or by the 50X1-HUM Exemption
question
            The 25-year rule
answer
        The process where records automatically become declassified after 25 years
question
            Restricted Data and Formerly Restricted Data
answer
        This type of information does not provide declassification instructions
question
            Practices to follow when handling classified information
answer
        1. Properly destroy preliminary drafts, worksheets, and other material after they have served their purpose 2. Use approved secure communications circuits for telephone conversations to discuss classified information 3. Follow proper procedures when copying classified information 4. Use security forms such as SF 701 and SF 702
question
            SF 702
answer
        Security Container Check Sheet, which is used to record the opening and closing of your security container
question
            SF 701
answer
        The Activity Security Checklist intended to verify that you did not accidentally leave classified materials unsecured, as well as, to ensure the area is safe and secure. The blank spaces can be utilized for additional warranted security and safety items, such as a block to remind personnel to complete tasks, such as turning off coffee pots.
question
            Actual compromise
answer
        An unauthorized disclosure of classified information
question
            Neither confirm nor deny
answer
        If classified information appears in the public media, DoD personnel must be careful not to make any statement of comment that would confirm the accuracy or verify the classified status of the information
question
            Potential Compromise
answer
        The possibility of compromise could exist but it is not known with certainty
question
            DISA, Joint Interoperability Test Command (JITC)
answer
        This organization maintains a register of certified security digital facsimiles
question
            COMSEC
answer
        The protection resulting from the measures designed to deny unauthorized persons information of value that might be derived from the possession and study of telecommunications and to ensure the authenticity of such communications.
question
            Insert the envelope into the outer envelope
answer
        When the document has been sealed within a properly marked inner envelope you must...
question
            DCS
answer
        Defense Courier Service
question
            Secret information
answer
        This kind of information can be sent via USPS express only when it is the most effective means considering security, time, cost, and accountability.
question
            Top Secret information
answer
        This kind of information can never be sent via USPS
question
            Methods to send hard copy Confidential information
answer
        DCS, First Class mail, registered mail, and certified mail
question
            True
answer
        True or False: Hand carrying classified information should only be done as a last resort
question
            False
answer
        True or False: Anyone can determine the need for hand carrying classified information
question
            True
answer
        True or False: When someone is carrying classified information, written authorization is always required
question
            DD Form 2501
answer
        Courier Authorization Card
question
            Microfiche destruction
answer
        Burned or shredded to be destroyed. It can also be destroyed with chemicals that destroy the imprints.
question
            Typewriter ribbon destruction
answer
        Ribbons must be burned or shredded
question
            Floppy disk destruction
answer
        Must be burned, overwritten, or demagnetized
question
            Document destruction
answer
        Must be burned, shredded, or chemically decomposed of
question
            Videotape destruction
answer
        Must be burned, shredded, or demagnetized
question
            Initial Orientation Briefing
answer
        The initial briefing given to all personnel on the DoD Information Security Program
question
            Homeland Security Presidential Directive 12 (HSPD-12)
answer
        On August 27, 2004, President Bush signed this directive; Policy for a Common Identification Standard for Federal Employees and contractors. This requires government-wide development and implementation of a standard for secure and reliable forms of identification for Federal employees and contractors.
question
            DoD 5200.08-R
answer
        Physical Security Program regulation
question
            DoD Instruction 5200.08, Security of DoD Installations and Resources and the DoD Physical Security Review Board (PSRB)
answer
        This document authorizes commanders to issue regulations for the protection or security of property and places under their command. This document also establishes guidelines to build consistent minimum standards for protecting DoD installations and resources.
