Back to AI Flashcard MakerInformation Technology /DoD Annual Security Awareness Training – Knowledge Review Guide Part 2

DoD Annual Security Awareness Training – Knowledge Review Guide Part 2

Information Technology13 CardsCreated 5 months ago

This deck covers key concepts from the DoD Annual Security Awareness Training, including transmission of classified information, security protocols, and OPSEC procedures.

What requirements apply when transmitting Secret information? (Select all that apply)
a. External street-side collection boxes are prohibited when transmitting via USPS Express mail
b. The Waiver of Signature and Indemnity block can never be selected for
U.S. Express mail
c. Registered mail receipt is always required
d. USPS registered mail is never permitted

A & B

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/13

Key Terms

Term
Definition

What requirements apply when transmitting Secret information? (Select all that apply)
a. External street-side collection boxes are prohibited when transmitting via USPS Express mail
b. The Waiver of Signature and Indemnity block can never be selected for
U.S. Express mail
c. Registered mail receipt is always required
d. USPS registered mail is never permitted

A & B

Which method may be used to transmit confidential materials to DOD agencies?
a. USPS First class mail
b. USPS Parcel Post
c. Unsecured fax
d. Street-side collection box

A

Classified information can be destroyed using which of the following methods?
(Select all that apply)
a. Burning
b. Shredding
c. Pulverizing
d. Recycling

A, B, C

How is a security infraction different from a security violation?
a. Security infractions do not have to be reported to your security manager, but security violations do.
b. A security violation involves an incident that is expected to result in loss, compromise, or suspected compromise of classified information, and with a security infraction, this concern is ruled out.
c. Security infractions and violations both require an initial inquiry and an in-depth investigation.

B

If you find classified material out of proper control, what immediate actions should you take?
a. Destroy the information and report it to security manager.
b. Take custody of and safeguard the material and report it to the appropriate security authority.
c. Lock it in your desk drawer
d. Report it to your supervisor within 48 hours

B

Which of the materials listed are subject to prepublication review?
Books
Speeches
Articles
All of the above

All of the above

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

What requirements apply when transmitting Secret information? (Select all that apply)
a. External street-side collection boxes are prohibited when transmitting via USPS Express mail
b. The Waiver of Signature and Indemnity block can never be selected for
U.S. Express mail
c. Registered mail receipt is always required
d. USPS registered mail is never permitted

A & B

Which method may be used to transmit confidential materials to DOD agencies?
a. USPS First class mail
b. USPS Parcel Post
c. Unsecured fax
d. Street-side collection box

A

Classified information can be destroyed using which of the following methods?
(Select all that apply)
a. Burning
b. Shredding
c. Pulverizing
d. Recycling

A, B, C

How is a security infraction different from a security violation?
a. Security infractions do not have to be reported to your security manager, but security violations do.
b. A security violation involves an incident that is expected to result in loss, compromise, or suspected compromise of classified information, and with a security infraction, this concern is ruled out.
c. Security infractions and violations both require an initial inquiry and an in-depth investigation.

B

If you find classified material out of proper control, what immediate actions should you take?
a. Destroy the information and report it to security manager.
b. Take custody of and safeguard the material and report it to the appropriate security authority.
c. Lock it in your desk drawer
d. Report it to your supervisor within 48 hours

B

Which of the materials listed are subject to prepublication review?
Books
Speeches
Articles
All of the above

All of the above

Physical security is concerned with _________ and ___________ designed to prevent unauthorized access.
• Countermeasures, passive
• Access control, active
• Active, inactive
• Active, passive

Active, passive

The physical security program is designed to prevent unauthorized access to which of the following? (Select all that apply)
Personnel
Facilities
Information
Equipment

SELECT ALL

What is the standard form of identification for DOD employees?
© Common access card
• State issue driver's license
• Real ID
• Common access credential

CAC

Which of the following are included in the OPSEC cycle? (Select all that apply)
- Identification of sensitive information (SI)
- Analysis of Threats
- Apply Countermeasures
- Assessment of Risk

SELECT ALL

OPSEC is a method designed to identify, control, and protect ___________ that would allow adversaries to exploit DOD.
• Only classified national security information
• Only sensitive but unclassified information
• Government operational plans
*All critical information

All critical information

Prior to foreign travel, all DOD government personnel must _____________.
• Provide advanced notice of travel to the Security Office.
• Ensure Antiterrorism/Force Protection Level 1 training is current.
* Provide advanced notice of travel to the Security Office and ensure
Antiterrorism/Force Protection Level 1 training is current

* Provide advanced notice of travel to the Security Office and ensure

When must you receive a defensive foreign travel briefing? (Select all that apply)
- At least once a year
- Prior to foreign travel
- Every two years
- Never

At least once a year, Prior to foreign travel.