Annual Security and Counterintelligence Awareness 2022 with complete solution
1 view 0 purchase
Course
Security and Counterintelligence
Institution
Security And Counterintelligence
Annual Security and Counterintelligence Awareness 2022
with complete solution
When transporting classified information, the courier must have a DD Form 2501, and
as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy
duty material? -Answer- True
What are the thr...
Annual Security and Counterintelligence Awareness 2022
with complete solution
When transporting classified information, the courier must have a DD Form 2501, and
as a minimum use a locked briefcase or zippered pouch made of canvas or other heavy
duty material? -Answer- True
What are the three classification levels of information? -Answer- 1. Confidential..
2. Secret.
3. Top Secret.
What is the purpose of the SF 701 "Activity Security Checklist" and the SF 702 "Security
Container Check Sheet?" -Answer- They are used as part of the end-of-day security
checks activities that process or store classified material.
If you find classified material out of proper control you should take custody of the
material and safeguard it, if possible, and immediately notify your security
representative or supervisor? -Answer- True.
In the event of a natural disaster, which of the following statements is true concerning
an emergency action procedure for classified material? -Answer- The first priority is
protection of life, followed by the protection of classified material.
Using curbside mailboxes is an approved method for mailing classified information? -
Answer- False.
Which of the following statement below are true concerning security containers, vaults,
or open storage areas? Select all that apply. -Answer- 1. The combination must be
protected at the same level as the highest classification of the material authorized for
storage.
2. Do not store items such as weapons, money, jewelry, precious metals or drugs in the
same container as classified material.
Which of the following are approved methods of discussing and transmitting classified
material? Select all that apply. -Answer- 1. SIPRnet.
2. Secure Fax.
3. Secure Telephone.
Which of the following methods are routinely used for destroying classified information?
Select all that apply. -Answer- 1. Burning.
, 2. Approved cross-cut shredding.
3. Wet-pulping.
Which of the following statements below must be on the front of a GSA-approved
security container for storing classified information? -Answer- "General Services
Administration-Approved Security Container"
Personnel who fail to report CI Activities of concern as outlines in Enclosure 4 of DoD
Directive 5240.06 are subject to appropriate disciplinary action under regulations -
Answer- True.
Cyber Vulnerabilities to DoD Systems may include: -Answer- All the above.
DoD personnel who suspect a coworker of possible espionage should: -Answer- Report
directly to your CI or Security Office.
Under DoD 5240.06 Reportable Foreign Intelligence Contacts, Activities, Indicators and
Behaviors; which of the following is not reportable? -Answer- None of the above.
Potential espionage indicators (PEIs) are activities, behaviors, or circumstances that
'may be indicative' of potential espionage activities by an individual who may have
volunteered or been recruited by a foreign entity as a writing espionage agent.
Examples of PEI include: -Answer- All of the above.
Foreign Intelligence Entity (FIE) is defined in DoD Directive 5240.06 as "any known or
suspected foreign organization, person, or group (public, private, or governmental) that
conducts intelligence activities to acquire U.S. information, block or impair U.S.
intelligence collection, influence U.S. policy, or disrupt U.S. systems and programs. The
term includes foreign intelligence and security services and international terrorists." -
Answer- True.
Counterintelligence as defined in the National Security Act of 1947, is "information
gathered and activities conducted to protect against espionage, other intelligence
activities, sabotage, or assassinations conducted by or on behalf of foreign
governments or elements thereof, foreign organizations or foreign persons, or
international terrorist activities." -Answer- True.
If you feel you are being solicited for information which of the following should you do? -
Answer- All of the above.
Foreign Intelligence Entities seldom use the Internet or other communications including
social networking services as a collection method? -Answer- False.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Brainboost. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.